Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Lonoxmont posted:

Thanks guys, looks like I got lucky, and all that happened was the sonicwall has to do the routing for the new range until I get all the /24 changed to /22 on the clients on my end. So everything stayed up and running, but until everything has the new hostmask it is still a bottleneck through the sonicwall (I presume). At some point I will probably get around to moving the default gateway etc where the sonicwall lives to somewhere closer to the beginning of the address space, where networking stuff should go. Not looking forward to running through all the clients again for that.

If your clients are all windows based, you could use powershell to do it!

Adbot
ADBOT LOVES YOU

Lonoxmont
Aug 28, 2018
I'm too stupid to put something witty here. Sorry. :canada:

MF_James posted:

If your clients are all windows based, you could use powershell to do it!

Oh? I was vaguely toying with trying to finagle something through Group Policy to do that, but if there is an easier way I am :allears:

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Lonoxmont posted:

Oh? I was vaguely toying with trying to finagle something through Group Policy to do that, but if there is an easier way I am :allears:

This guy has some powershell that can do it locally, you just need to invoke via remote powershell and possibly step through an array of computer names, make a few other changes, and possibly have it step through each netadapter found in the event you have wireless, wired and other possibilities.

The thing I'm not sure about, and possibly someone else can comment on, is if you will run into a problem running the script part-way through due to the changes being made.

CrazyLittle
Sep 11, 2001





Clapping Larry

Lonoxmont posted:

Thanks guys, looks like I got lucky, and all that happened was the sonicwall has to do the routing for the new range until I get all the /24 changed to /22 on the clients on my end. So everything stayed up and running, but until everything has the new hostmask it is still a bottleneck through the sonicwall (I presume). At some point I will probably get around to moving the default gateway etc where the sonicwall lives to somewhere closer to the beginning of the address space, where networking stuff should go. Not looking forward to running through all the clients again for that.

set your router to 10.1.0.0 /15

Lonoxmont
Aug 28, 2018
I'm too stupid to put something witty here. Sorry. :canada:

CrazyLittle posted:

set your router to 10.1.0.0 /15

That sounds like a bad idea from a performance standpoint, from what I have been told.

CrazyLittle
Sep 11, 2001





Clapping Larry

Lonoxmont posted:

That sounds like a bad idea from a performance standpoint, from what I have been told.

Nothing magical about that subnet aside from being able to set an IP that some stupid devices won't recognize as a valid address... which it is.

Thanks Ants
May 21, 2004

#essereFerrari


Confuse the gently caress out of everybody who comes to work on that network and enable proxy ARP

Chuck Finley
Oct 27, 2010

Partycat posted:

This is why I love reserved or static DHCP , because I dot have to chase statically configured garbage around that ends up being some embedded poo poo I have no password to.

It's also just nice to have all that information in a database (that's not an excel spreadsheet or some impromptu IP database you threw together), so you can leverage it later for stuff.

ElCondemn posted:

Having very large subnets means you also have a larger broadcast domain, so be wary of that as it can cause problems as you add more hosts (like larger impact during broadcast storms etc.)

I mean, yeah, a bigger subnet means the possibility for more hosts, but you should be taking precautions on the layer 2 access side of things to prevent this anyway (storm control, port security?).

MF_James posted:

This guy has some powershell that can do it locally, you just need to invoke via remote powershell and possibly step through an array of computer names, make a few other changes, and possibly have it step through each netadapter found in the event you have wireless, wired and other possibilities.

The thing I'm not sure about, and possibly someone else can comment on, is if you will run into a problem running the script part-way through due to the changes being made.

Couldn't you just readdress everything major that needs to be statically assigned and then pull the client PC MACs from the ARP table on the SonicWall, put some reservations on via DHCP, presto blamo. Unless I'm missing something here, that seems the most straightforward way unless you really want things to stay statically assigned without the use of DHCP. We recently migrated from a very old server running an also old version of pfSense to a Netgate appliance, resubnetted our entire company LAN (broke up our dwindling /24 full of statics into 5 /22's by dept), and that's essentially how we did it. Pulled the MACs, binded via DHCP, and then slowly told everyone to switch to DHCP (mind you we kept two active firewalls live for the transition).

Chuck Finley fucked around with this message at 14:34 on Sep 22, 2018

ate shit on live tv
Feb 15, 2004

by Azathoth
Interviewed a candidate today who claimed he had his CCNA and CCNP, didn't get any of the my layer 2 questions except Port-channels. I've said it before over 10 years ago itt, and I stand by it, if you don't understand Layer2, you aren't a network engineer.

MF_James
May 8, 2008
I CANNOT HANDLE BEING CALLED OUT ON MY DUMBASS OPINIONS ABOUT ANTI-VIRUS AND SECURITY. I REALLY LIKE TO THINK THAT I KNOW THINGS HERE

INSTEAD I AM GOING TO WHINE ABOUT IT IN OTHER THREADS SO MY OPINION CAN FEEL VALIDATED IN AN ECHO CHAMBER I LIKE

Chuck Finley posted:

Couldn't you just readdress everything major that needs to be statically assigned and then pull the client PC MACs from the ARP table on the SonicWall, put some reservations on via DHCP, presto blamo. Unless I'm missing something here, that seems the most straightforward way unless you really want things to stay statically assigned without the use of DHCP. We recently migrated from a very old server running an also old version of pfSense to a Netgate appliance, resubnetted our entire company LAN (broke up our dwindling /24 full of statics into 5 /22's by dept), and that's essentially how we did it. Pulled the MACs, binded via DHCP, and then slowly told everyone to switch to DHCP (mind you we kept two active firewalls live for the transition).

Yeah there are a lot of ways to do it, I was just giving an option that fit within the current framework.

I'm often bad about that, I'm used to doing hacky poo poo and not having any options to change things to the correct/a better way of doing things.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

ate poo poo on live tv posted:

Interviewed a candidate today who claimed he had his CCNA and CCNP, didn't get any of the my layer 2 questions except Port-channels. I've said it before over 10 years ago itt, and I stand by it, if you don't understand Layer2, you aren't a network engineer.

Well don't leave us hanging on what some of the questions were!

Kazinsal
Dec 13, 2011



Yeah like are these questions like "what is ARP" and "why do we need spanning tree" or are we talking things like "what is the most commonly used protocol that operates on 802.2 LLC SNAP"

Partycat
Oct 25, 2004

Kazinsal posted:

"what is the most commonly used protocol that operates on 802.2 LLC SNAP"

Levi’s

ate shit on live tv
Feb 15, 2004

by Azathoth
Super basic as this was a phone interview:
I started out asking about Cisco hardware as his resume said he had experience with Cisco 35xx, 45xx, 29xx, 65xx's etc.
"what are some of the basic differences between the various 6500 chassis', can you name what you worked with?" (I was looking for at a minimum the numbers of slots, i.e. 6504, 6506, 6509 etc. bringing up the "E" chassis would have been fine too, just something to indicate you have interacted with a Cisco 6500, maybe eventually asked about supervisor cards eventually.)
Him: "not sure"
Ok fine, he's not really super in to hardware, maybe he's never actually seen one (wouldn't surprise me tbqh).
What about the CLI, what commands have you run, what information were you looking for?
He doesn't answer me with anything specific, i.e. "show vlan" or anything like that. But he mentions that he had to add a switch to a VTP domain, and set the proper password, which fine, I guess that's possible. Then he talks about how he had to prune the vlans on the trunk port, which completely defeats the purpose of VTP to begin with I asked him a probing question about what VTP does, but he was light on details.

Ok let's just do some basic layer 2.
Me: Suppose you have 3 unconfigured cisco/arista switches and you set them up in a triangle topology. Switch 1 connected to switch 2 and switch 3, and switch 2 and 3 connected to each other.
Him: The lowest "mac-address" would become the root, (actually the lowest bridge-id, but I don't really care that answer works for me).
Me: "Great" let's call the root "switch 1" would all the links in this topology be passing traffic?
Him: stammering about port-costs and priority's and native-vlans etc etc eventually mentions blocking.
Me: Ok, which link would be blocked?
Him: ...
Me: Ok well which switch wouldn't be blocking any of its ports? (it's the root)
Him: ...
What if we added another link between switch 1, the root, and switch 2?
Him: It would be blocked
What if we wanted it not to be blocked?
Him: ether-channel the two ports.
Ok, would the port-cost of this new logical link be lower or higher then the cost of the one link?
Him: That's a good question...

Sigh, it's not that I expected him to be perfect, but the conversation we had during these questions indicated that he had memorized definitions and protocols, but didn't really know what they did, or why. Like he knew that to make an ether-channel the protocol you used was LACP (and of course he mentioned PAGP, as I'd expect someone who had just memorized stuff, but these days in an interview I wouldn't even mention PAGP since afaik, even Cisco doesn't support it anymore.)
He also didn't know that you could setup an etherchannel without any type of link aggregation protocol. He mentioned VPC on the Nexus, but didn't know what problem it solved, or why you'd use it.
I hope my expectations aren't too high for interviewing someone who claims they passed their CCNA and CCNP.


I didn't even talk about ARP or TCP etc, because if you can't answer basic switching questions you aren't a network engineer.

My coworker who was in the same room asked him some basics about BGP, i.e. how do you control out-bound, how can you influence in-bound? Missed them both... :/

ate shit on live tv fucked around with this message at 22:12 on Sep 25, 2018

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

ate poo poo on live tv posted:

Interviewed a candidate today who claimed he had his CCNA and CCNP, didn't get any of the my layer 2 questions except Port-channels. I've said it before over 10 years ago itt, and I stand by it, if you don't understand Layer2, you aren't a network engineer.
well it is all in the cloud now.

Methanar
Sep 26, 2013

by the sex ghost
Our last round of hiring I was really disappointed that I wasn't able to grill anybody on bare metal anything let alone BGP or networkingisms because everyone who applied had only ever worked on AWS.

Was a bit of an eye-opener

ate shit on live tv
Feb 15, 2004

by Azathoth

Methanar posted:

Our last round of hiring I was really disappointed that I wasn't able to grill anybody on bare metal anything let alone BGP or networkingisms because everyone who applied had only ever worked on AWS.

Was a bit of an eye-opener

:yikes:

Look I'm all about the cloud, used properly, but if you don't need someone who knows layer 2 or bgp etc, then you don't really need network engineer.

Methanar
Sep 26, 2013

by the sex ghost

ate poo poo on live tv posted:

:yikes:

Look I'm all about the cloud, used properly, but if you don't need someone who knows layer 2 or bgp etc, then you don't really need network engineer.

I don't quite follow.

What I was talking about was a case where we were hiring Linux SREs who could code, or devs who were comfortable doing infra things. Out of like 15 people that I interviewed, only 1 of them had any meaningful non-cloud experiences at all. At the time I didn't realize that working in an physical DC was becoming such a lost art. Particularly where you can't do things like just throw money at Amazon to do your edge load balancing for you or have to consider capacity planning, or etc etc etc

I didn't really think it was that unreasonable expect awareness of virtual MAC based HA as an example off the top of my head. Or being able to walk through a troubleshooting scenario where you have data loss because you are emitting jumbo packets to the internet that get fragmented down to 1500 somewhere in the middle, but the ICMP fragment requests get dropped at your edge because of your firewall policy that didn't permit ICMP.

Or the classic example of you type "traceroute google.com`. How does this work?

Methanar fucked around with this message at 06:28 on Sep 27, 2018

Methanar
Sep 26, 2013

by the sex ghost

Methanar posted:


I didn't really think it was that unreasonable expect awareness of virtual MAC based HA as an example off the top of my head.


To add to this virtual MAC bit. One of the guys that we did hire set up keepalived on a network that was shared with our NAT installation that was using CARP. There was a few moments of mass confusion when terrible things happened because the guy didn't know that keepalived and CARP were both implementations of virtual MAC HA and that you can't have them share VRRP groups in the same broadcast domain.

Methanar fucked around with this message at 06:35 on Sep 27, 2018

PancakeTransmission
May 27, 2007

You gotta improvise, Lisa: cloves, Tom Collins mix, frozen pie crust...


Plaster Town Cop
Is there any way to do Netflow on a Layer 3 switch (that is now acting as a replacement internal router) in a way that separates traffic by vlans, in the same way that a router can? Say... a 3850?

Because I'm running into issues with the whole "can't run flexible netflow on a SVI". We can get flow exporting fine via the physical interface, but rather than simply knowing the total amount on the exit interface, we'd rather know there was 10GB egress on Vlan 1234 (to a core switch from a remote network for example) - the way we could do easily on a dedicated router. Google has been unhelpful other than parroting "flexible netflow is not supported on SVIs".

tortilla_chip
Jun 13, 2007

k-partite
You could do a loopback cable and do Netflow off the subints.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
All hail shitloops

BaseballPCHiker
Jan 16, 2006

This is a fun bug!
https://www.cisco.com/c/en/us/support/docs/field-notices/642/fn64228.html

quote:

Field Notice: FN - 64228 - ASA 5506, ASA 5506W, ASA 5506H, ASA 5508, and ASA 5516 Might Fail After 18 Months or Longer Due to Clock Signal Component Failure

My boss buys most everything grey market and of course we dont have smart net on any of these. I get to look forward to replacing several ASAs in the next month...

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

We replaced 3 ASA's due to that bug. Didn't need smartnet, just that they're under warranty (which is not the same thing as smartnet).

Kazinsal
Dec 13, 2011



We've still got some outstanding RMA requests on that bug, 18 months later. We're entering the fun zone now.

wolrah
May 8, 2006
what?

BaseballPCHiker posted:

This is a fun bug!
https://www.cisco.com/c/en/us/support/docs/field-notices/642/fn64228.html


My boss buys most everything grey market and of course we dont have smart net on any of these. I get to look forward to replacing several ASAs in the next month...

That one hit a lot of vendors, because it's actually a flaw in the Intel C2000 processor which is widely used in network appliances.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
They're pretty late to the game if they didn't already try to fix that poo poo last year. Everyone else seemed to. Maybe you got the bad hardware from someone dumpster diving on eBay?

ate shit on live tv
Feb 15, 2004

by Azathoth

falz posted:

They're pretty late to the game if they didn't already try to fix that poo poo last year. Everyone else seemed to. Maybe you got the bad hardware from someone dumpster diving on eBay?

It was almost certainly this. Some of those defective ASA's ended up in the grey-market and you bought them.

Also everyone should do something like this on their edge:

code:
set policy-options prefix-list router-ipv4 apply-path "interfaces <*> unit <*> family inet address <*>"

set firewall filter BCP38 term OUR_ROUTES from source-prefix-list OUR-ROUTES
set firewall filter BCP38 term OUR_ROUTES from source-prefix-list router-ipv4
set firewall filter BCP38 term OUR_ROUTES then accept
set firewall filter BCP38 term SPOOFED then discard

set interfaces xe-0/0/1:0 unit 0 family inet filter output BCP38
Where xe-0/0/1 is whatever link is going to your ISP.

ate shit on live tv fucked around with this message at 21:55 on Oct 3, 2018

CrazyLittle
Sep 11, 2001





Clapping Larry
I'm looking at 10/40/100gig switches and don't particularly enjoy the $20k pricepoint of Cisco Cat9500 or Arista's new generation. Anyone here use Cisco Nexus 9300, or specifically Cisco N9K-C93180YC-EX ? Any thoughts on these boxes? I probably won't need any fancy features like NAT or MPLS on them since it'll be sitting in between 2+n routers, but netflow might be a nice bonus.

Also what does Arista's grey-market support services look like? Non-existant? Can you get bug fixes / firmware patches for 7280SE's anymore?

Thanks Ants
May 21, 2004

#essereFerrari


Would the Juniper EX4650 work for you?

CrazyLittle
Sep 11, 2001





Clapping Larry

Thanks Ants posted:

Would the Juniper EX4650 work for you?

Probably? But it's also $20k

Thanks Ants
May 21, 2004

#essereFerrari


Fair enough, just did a quick look on CDW and it’s not a huge amount more than the Cisco - I just assumed that the discounts available on each would be similar.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
You likely get sflow, not netflow. Not sure if it is all of them, but at least some 9300s are Broadcom based.

We have a bunch of 9336pqs pushing packets in our DCs with no issues.

BaseballPCHiker
Jan 16, 2006

quote:

It was almost certainly this. Some of those defective ASA's ended up in the grey-market and you bought them.

Grey market comes back to bite us again. I wish my boss would just go with someone like CDW for all of this but instead he spends half his day shopping around for "deals". The worst part is that now when we do try and go through normal channels people will be shocked by the price.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

CrazyLittle posted:

I'm looking at 10/40/100gig switches and don't particularly enjoy the $20k pricepoint of Cisco Cat9500 or Arista's new generation. Anyone here use Cisco Nexus 9300, or specifically Cisco N9K-C93180YC-EX ? Any thoughts on these boxes? I probably won't need any fancy features like NAT or MPLS on them since it'll be sitting in between 2+n routers, but netflow might be a nice bonus.

Also what does Arista's grey-market support services look like? Non-existant? Can you get bug fixes / firmware patches for 7280SE's anymore?

We use the 93180YC-FX and 93180YC-EX in the data center. They shouldn't be 20k for the box if you use one of the big resellers. They can get you 60% off list without much trouble.

Your biggest pain point is going to be optics because they are stupid expensive unless you go 3rd party. Cisco is a bit more lenient with 3rd party optics, with Arista you have to call into support and tell them the optic you're using and they will give you the unlock code. Some of the optics dont have a code yet like 40/100bidi

tortilla_chip
Jun 13, 2007

k-partite
9300s are all Cisco silicon. The 3ks are where the commodity line lives

ragzilla
Sep 9, 2005
don't ask me, i only work here


tortilla_chip posted:

9300s are all Cisco silicon. The 3ks are where the commodity line lives

9200/9300 are hybrid Cisco/Broadcom (BRKARC-2222/BRKDCT-3640). Broadcom supply the forwarding ASIC (the NFE, Trident II/Tomahawk) and Cisco silicon does the ACI stuff/VXLAN routing/flow/enhanced buffering and queuing by supplying the switch fabric (ASE/ALE ASIC).

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Look at qfx100003 (juniper silicon) and qfx5110/ qfx5200(?) Which is broadcom.

doomisland
Oct 5, 2004

falz posted:

Look at qfx100003 (juniper silicon) and qfx5110/ qfx5200(?) Which is broadcom.

qfx10000000003 and mx10000000000000000003

thanks juniper

Adbot
ADBOT LOVES YOU

Pile Of Garbage
May 28, 2007



Did Cisco ever release a model with >3 zeros in the name? I immediately thought of CSS but that was only 11500 (I assume the 5 was a courtesy move because ugh).

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply