|
It's pretty easy to set up a Linux machine running nfdump and nfsen, which are free. I don't know about performance but if you just need to handle a bit of traffic I've used them before and had no problems.
|
# ? Mar 26, 2016 01:54 |
|
|
# ? Apr 23, 2024 07:47 |
|
Nfsen.
|
# ? Mar 26, 2016 03:09 |
|
pmacct
|
# ? Mar 26, 2016 22:41 |
|
PRTG is free for a 100 sensors and the netflow sensor isn't too shabby.
|
# ? Mar 28, 2016 12:01 |
|
Is there a good way to actually search ciscos bug fix website? A TAC engineer just sent me a bug but when I tried to search by the exact terms in it I couldn't find it on my own.
|
# ? Mar 28, 2016 16:34 |
|
Bigass Moth posted:Is there a good way to actually search ciscos bug fix website? A TAC engineer just sent me a bug but when I tried to search by the exact terms in it I couldn't find it on my own. Search on its bug ID, may required some special access instead of just an off the street cco login.
|
# ? Mar 28, 2016 17:50 |
|
But what if you don't know the bug ID going in, or that there even is a bug?
|
# ? Mar 28, 2016 18:16 |
|
Bigass Moth posted:But what if you don't know the bug ID going in, or that there even is a bug? https://bst.cloudapps.cisco.com/bugsearch/?referring_site=mm Is this what you're looking for, or is it not what you mean?
|
# ? Mar 28, 2016 18:43 |
|
That is what I'm referring to. Actually searching for bugs has so far returned nothing I'm looking for unless searching by bug ID.
|
# ? Mar 28, 2016 18:50 |
|
I presumed that since you were working with a TAC engineer you would just ask him.
|
# ? Mar 28, 2016 18:52 |
|
I'm not sure I understand the situation, but if you have some information about the bug I can try and dig up the bugID for you if it's publicly viewable. If you still have the TAC engineer around he should be able to give you the bugID though.
|
# ? Mar 28, 2016 18:54 |
|
My situation is I would like to find these bugs reports myself but o do not know if the search function will allow that.
|
# ? Mar 28, 2016 19:00 |
|
I think he's been given a link to a bug that is viewable under whatever CCO access he has, but is looking for a way to search for known bugs rather than just opening TAC cases each time he hits a suspected bug.
|
# ? Mar 28, 2016 19:01 |
|
Thanks Ants posted:I think he's been given a link to a bug that is viewable under whatever CCO access he has, but is looking for a way to search for known bugs rather than just opening TAC cases each time he hits a suspected bug. Exactly, trying to be anticipatory instead of reactionary.
|
# ? Mar 28, 2016 19:03 |
|
Well, I think that's the way to do it. I searched just now when I provided the link and was able to find a bug I remembered from a few years back, so it definitely has some of them. The amount of detail in bug documentation varies though, so you might have problems getting a hit on a documented bug even if you're using keywords that make sense.
|
# ? Mar 28, 2016 19:05 |
|
I'm looking for a way to create some pretty geographical network maps (preferably web-based,) something like this: https://www.earthlink.com/why-earthlink/our-network, but preferably also a pop-out to see details of each POP (individual devices and their connections within a building.) I don't need live monitoring, or even automatic discovery. I can generate a list of Lat/Lon coordinates for each device and a list of connections between POPs. Basically, I have a number of sites (that are built as tiers) across a few states. The issue with doing it from google maps is that there doesn't seem to be an easy way to represent multiple devices in the same building (or at least a tiered diagram) and the connections between them. I guess I can roll something in http://matplotlib.org/basemap/users/examples.html or similar, but if anyone knows any tools that can do most of the work for me, that would be great.
|
# ? Mar 29, 2016 17:01 |
|
If anyone is running Firepower, you'll want to install 6.0.1. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp
|
# ? Mar 31, 2016 15:05 |
|
Jedi425 posted:I know in my limited experience with them the Brocade switches are generally solid products. We call them Brocants. There was a push into these where I work and the few we put in are already on the block to be replaced by Cisco again. My experience is probably just as limited, however we have switches constantly failing and the UI is a mess.
|
# ? Apr 2, 2016 20:17 |
|
OhDearGodNo posted:We call them Brocants. They're better than Linksys, I guess? If you can live with them never fixing bugs you care about as a trade off to save some cash, sure I guess? I know of a large organization using their alleged top of line stuff (nationwide, many 100gbps interfaces per chassis, etc) and there's several bugs they simply won't acknowledge or fix. They're forklifting them back to something sane, like Juniper.
|
# ? Apr 2, 2016 20:53 |
|
Why Juniper over Arista? Especially if you need 100G switching.
|
# ? Apr 2, 2016 21:24 |
|
Routing (They're replacing MLXe's routers) . Juniper now has QFX10k's now with a variety of 100g ports on the switching side, too.
|
# ? Apr 2, 2016 21:45 |
|
falz posted:Routing (They're replacing MLXe's routers) . Juniper now has QFX10k's now with a variety of 100g ports on the switching side, too. What connector do you use for 100g, is it fiber?
|
# ? Apr 2, 2016 21:57 |
|
Yep just good 'ol single mode.
|
# ? Apr 3, 2016 00:25 |
|
We're dumping our MLXe installs as well. When the roadmap is full of SDN on their 'service provider' router you know they've just given up.
|
# ? Apr 3, 2016 02:06 |
|
OhDearGodNo posted:We call them Brocants. There was a push into these where I work and the few we put in are already on the block to be replaced by Cisco again. What are you using? We have some low-end VDXs in service, and they've been stable.
|
# ? Apr 3, 2016 02:51 |
|
broke-broke / Ruckus related http://fortune.com/2016/04/04/brocade-buys-ruckus-wireless/ "Brocade Communications, a maker of networking gear, is buying Ruckus Wireless, a company with a fast-growing Wi-Fi product roster, for roughly $1.5 billion in cash and stock"
|
# ? Apr 4, 2016 16:15 |
|
So they're going to spin off Xclaim or just shitcan the range I assume
|
# ? Apr 4, 2016 16:19 |
|
Looking for a sanity check. A customer just bought a building that has Cisco VG224 24 port FXS boxes in place already currently attached to a CUCM system. I'm playing with one to see if we can support them on their Asterisk system when we switch over the phones rather than having them buy a set of Adtran TA924s that would be functionally identical. These are just acting as 24 port dumb ATAs to feed resident lines in a nursing home, no advanced call control features required. Inbound calls to extension, outbound calls straight to DID numbers or 911 with no dialing 9 or any of that silliness. This config seems to work properly with the two lines I have registered right now and I have no reason not to believe that if I add more dial-peer entries for the rest of the ports they'll work just as well. Have I missed anything that'll bite me in the rear end later? code:
|
# ? Apr 6, 2016 21:57 |
|
I recently got my CCNA and have a job interview for a NOC or helpdesk position for coming up on Friday. The recruiter told me the interviewer would probably ask me some technical questions like CCNA level LAN/WAN type questions. So having never done an interview for this type of job before (hopefully my first step in a networking career) can anyone give me any idea what kind of questions I might be asked? I have tonight and tomorrow night to bone up on it.
|
# ? Apr 7, 2016 04:45 |
|
if i were asking questions to a guy applying for an entry level networking job, i would ask about spanning tree, ospf, bgp, layer 2 vs layer 3, how to locate a device on the network given only an ip, mostly simple things like that. I am looking more for a base level of knowledge, and just want to eliminate the boot camp graduates.
|
# ? Apr 7, 2016 05:29 |
|
adorai posted:if i were asking questions to a guy applying for an entry level networking job, i would ask about spanning tree, ospf, bgp, layer 2 vs layer 3, how to locate a device on the network given only an ip, mostly simple things like that. I am looking more for a base level of knowledge, and just want to eliminate the boot camp graduates. Cool thanks. Although I hope they dont ask me much about BGP other than what it is. Thats not part of the CCNA curriculum so I dont know much about it.
|
# ? Apr 7, 2016 05:53 |
|
Charliegrs posted:Cool thanks. Although I hope they dont ask me much about BGP other than what it is. Thats not part of the CCNA curriculum so I dont know much about it. Learn up on BGP and how it works, it's not a terribly deep subject, but it's vital to understand. Same with OSPF (has that been incorporated into CCNA yet?) Otherwise, understanding of subnetting/subnet masks and gateways for troubleshooting purposes, knowing how to troubleshoot a bad connection by crawling up the stack from physical layer to layer 4, and by checking steps along the way from source to destination. Understanding how to translate TCP flags (particularly RST) into identifying problems is always a plus too.
|
# ? Apr 7, 2016 12:55 |
|
I wouldn't ask a fresh ccna guy about bgp since it isn't covered by the test. I would ask to explain how ospf and eigrp work and are different, explain basic routing and switching principles, and other easy questions like how switch port security and vlans work.
|
# ? Apr 7, 2016 13:19 |
|
I ask entry-level guys about what an IP Address is, what a default gateway is, what a default route is, what a Network is, Subnetting, Spanning-Tree, what routing protocols are, explain basic network commands: ping, traceroute, nslookup, netstat, etc. Difference between UDP/TCP, difference between SSH and Telnet. Then I'll go into specifics about either Cisco, or Juniper, or whatever they have on their resume. Usually if they can get to Spanning-tree, they are good enough for an entry level network guy for me.
|
# ? Apr 7, 2016 18:57 |
|
All right, I'm missing something simple here, and I'm hoping someone can point out what stupid I did. A connected network from router 1 isn't showing up on the other side of an MPLS link on router 2 via BGP. Router 1: router bgp 65001 bgp router-id 100.65.0.6 bgp log-neighbor-changes redistribute connected neighbor 100.65.0.5 remote-as 3549 neighbor 100.65.0.5 allowas-in neighbor 10.21.12.12 remote-as 111 neighbor 10.21.12.13 remote-as 112 auto-summary Router 2: router bgp 65001 bgp router-id 100.65.0.1 bgp log-neighbor-changes redistribute connected neighbor 100.65.0.1 remote-as 3549 neighbor 100.65.0.1 allowas-in neighbor 172.16.0.3 remote-as 98 neighbor 172.16.0.4 remote-as 65002 Router 1 is connected directly to 10.21.12.0/24 and 10.21.15.0/24 along with a few other networks indirectly (10.21.16.0/24 and 10.21.8.0/24 via the firewall) yet the routing table in Router 2 looks like this: B 10.21.8.0/24 [20/0] via 100.65.0.1, 13:19:36 B 10.21.11.0/24 [20/0] via 100.65.0.1, 13:06:39 B 10.21.12.0/24 [20/0] via 100.65.0.1, 12:45:52 B 10.21.16.0/24 [20/0] via 100.65.0.1, 12:41:53 I mean this isn't exactly a next level complicated setup. Why the hell does 10.21.15.0/24 not show up in router 2?
|
# ? Apr 7, 2016 18:58 |
|
What's the routing table on Router1 look like? Specifically 'sh ip route 10.21.15.0'
|
# ? Apr 7, 2016 19:00 |
|
Powercrazy posted:What's the routing table on Router1 look like? Specifically 'sh ip route 10.21.15.0' Routing entry for 10.21.15.0/24 Known via "connected", distance 0, metric 0 (connected, via interface) Redistributing via bgp 65001 Advertised by bgp 65001 Routing Descriptor Blocks: * directly connected, via GigabitEthernet0/2 Route metric is 0, traffic share count is 1 Here's what we're receiving on router 2: bvt-1921-1#sh ip bgp neighbors 100.65.0.1 received-routes BGP table version is 2015, local router ID is 172.16.0.247 Status codes: s suppressed, d damped, h history, * valid, > best, i - internal, r RIB-failure, S Stale, m multipath, b backup-path, f RT-Filter, x best-external, a additional-path, c RIB-compressed, Origin codes: i - IGP, e - EGP, ? - incomplete RPKI validation codes: V valid, I invalid, N Not found Network Next Hop Metric LocPrf Weight Path *> 10.0.0.0 100.65.0.1 0 3549 3549 ? * 10.10.10.0/24 100.65.0.1 0 3549 3549 98 393887 ? * 10.10.11.0/24 100.65.0.1 0 3549 3549 98 393887 ? *> 10.21.8.0/24 100.65.0.1 0 3549 3549 112 113 i *> 10.21.11.0/24 100.65.0.1 0 3549 3549 111 i *> 10.21.12.0/24 100.65.0.1 0 3549 3549 111 i *> 10.21.16.0/24 100.65.0.1 0 3549 3549 111 i * 10.22.0.0/24 100.65.0.1 0 3549 3549 98 100 ? * 10.22.2.0/24 100.65.0.1 0 3549 3549 98 100 65333 7385 7385 100 ? * 10.22.4.0/24 100.65.0.1 0 3549 3549 98 100 65333 7385 7385 100 ? * 10.22.55.0/30 100.65.0.1 0 3549 3549 98 100 65333 7385 7385 i * 10.64.40.0/21 100.65.0.1 0 3549 3549 98 393887 ? * 10.212.134.0/24 100.65.0.1 0 3549 3549 98 393887 ? * 67.136.70.0/29 100.65.0.1 0 3549 3549 98 100 65333 7385 ? * 68.137.185.64/30 100.65.0.1 0 3549 3549 98 100 ? * 70.98.151.176/29 100.65.0.1 0 3549 3549 98 100 65333 ? *> 100.0.0.0 100.65.0.1 0 3549 3549 ? * 100.65.0.0/30 100.65.0.1 0 3549 i *> 100.65.0.4/30 100.65.0.1 0 3549 i *> 110.0.0.0 100.65.0.1 0 3549 3549 ? * 192.168.2.0 100.65.0.1 0 3549 3549 98 393887 ? *> 203.45.253.0 100.65.0.1 0 3549 3549 ? DigitalMocking fucked around with this message at 19:08 on Apr 7, 2016 |
# ? Apr 7, 2016 19:04 |
|
Bigass Moth posted:I wouldn't ask a fresh ccna guy about bgp since it isn't covered by the test. I would ask to explain how ospf and eigrp work and are different, explain basic routing and switching principles, and other easy questions like how switch port security and vlans work. Powercrazy posted:I ask entry-level guys about what an IP Address is, what a default gateway is, what a default route is, what a Network is, Subnetting, Spanning-Tree, what routing protocols are, explain basic network commands: ping, traceroute, nslookup, netstat, etc. Difference between UDP/TCP, difference between SSH and Telnet. Then I'll go into specifics about either Cisco, or Juniper, or whatever they have on their resume. I'm feeling a little overprepared for ICND2 right about now...
|
# ? Apr 7, 2016 19:14 |
|
Japanese Dating Sim posted:I'm feeling a little overprepared for ICND2 right about now... Hope you're ready for questions like what characters are not legal in cisco's implementation of chap authentication.
|
# ? Apr 7, 2016 19:26 |
|
|
# ? Apr 23, 2024 07:47 |
|
Methanar posted:Hope you're ready for questions like what characters are not legal in cisco's implementation of chap authentication. The important things in life!
|
# ? Apr 7, 2016 19:37 |