Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
permanoob
Sep 28, 2004

Yeah it's a lot like that.

Tremblay posted:

Is there a static NAT or PAT statement for the inside SQL box?

Yeap

quote:

nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 192.168.1.0 255.255.255.0 0 0
static (inside,outside) X.X.X.235 psdc netmask 255.255.255.255 0 0
static (inside,outside) X.X.X.236 psapps netmask 255.255.255.255 0 0
static (inside,outside) X.X.X.237 test1 netmask 255.255.255.255 0 0
static (inside,outside) X.X.X.238 test2 netmask 255.255.255.255 0 0

Adbot
ADBOT LOVES YOU

jwh
Jun 12, 2002

jwh posted:

Anyway, I'm on vacation, but I can get the configs to you on Monday. Actually, I may have already posted them in this thread, but I don't know where.

Here's a rough skeleton configuration. You'll need to tweak it, and load the package files onto the flash. You'll also want to drop the VRF stuff if you aren't doing Multi-VRF on the box. Oh, and you'll have to run the IOS HTTP server on a different port than the standard 80 or 443 if you want to use the CSD Admin console.

Let me know if you run into any trouble.

code:
webvpn gateway test-r1
 hostname test-r1
 ip address 1.2.3.4 port 443 // this is the "outside" IP
 http-redirect port 80
 ssl encryption 3des-sha1 aes-sha1
 ssl trustpoint TP-self-signed-3159803857 // don't enter the ssl trustpoint, it'll be generated automatically
 inservice

!
webvpn cef
 !
webvpn install svc flash:/webvpn/svc.pkg
 !
webvpn install csd flash:/webvpn/sdesktop.pkg
 !
webvpn context default
 ssl authenticate verify all
 !
 no inservice
!
!
webvpn context test 
 title "Test, Inc."
 ssl authenticate verify all
 !
 login-message "Test WebVPN"
 !
 policy group test
   functions file-access
   functions file-browse
   functions svc-required
   svc address-pool "vpn-pool-test"
   svc default-domain "test.com"
   svc dns-server primary 10.1.2.3
   svc dns-server secondary 10.1.2.4
  vrf-name test
  default-group-policy test
  aaa authentication list test-acs-list
  aaa accounting list test-acs-list
  gateway test-r1
  csd enable
  inservice

Sir Sidney Poitier
Aug 14, 2006

My favourite actor


I'm going to be embarking on a CCNA course with a company who will provide me with 'lab kit' which comprises of:

quote:

2 x Cisco 2610 routers with a WIC1T interface each & 2 x Cisco Catalyst 2900 switches + all the necessary cables

I know bugger all about Cisco hardware, how does one actually access the interface for these devices to program them? Is it via SSH or something? I'm assuming whatever it is will be OS independent?

I'm planning to get them to send me the hardware before I start the course so I can have a fiddle in advance. I'll probably want to do it with my Macbook.

I don't see these two devices listed on the Cisco site, so I'm assuming they're slightly outdated. Will they still be alright for learning/practising on?

jwh
Jun 12, 2002

Anjow posted:

I'm going to be embarking on a CCNA course with a company who will provide me with 'lab kit' which comprises of:


I know bugger all about Cisco hardware, how does one actually access the interface for these devices to program them? Is it via SSH or something? I'm assuming whatever it is will be OS independent?

I'm planning to get them to send me the hardware before I start the course so I can have a fiddle in advance. I'll probably want to do it with my Macbook.

I don't see these two devices listed on the Cisco site, so I'm assuming they're slightly outdated. Will they still be alright for learning/practising on?

You'll access them via a console cable, which can connect to your serial port on your computer. Although if you're going to use your Macbook, you might need to pick up a USB to Serial converter. Once you have them configured enough to be reachable on your network, you can talk to them via telnet, or optionally SSH (provided you're running an IOS image that supports SSH).

They're older routers, but they're fine for learning.

inignot
Sep 1, 2003

WWBCD?

Twlight posted:

I've began monitoring on our Cisco equipment at work. I'm monitoring the interface load and its over 100 at some points during the day. I need to know more about how interface load is calculated. Anyone know of any documentation or ideas as to how it's done?

What are you looking at to get the number that's over 100? If it's from show int the load is displayed as some value/255, so 125/255 would be around 50%. Also, input and output loads are tracked separately.

brc64
Mar 21, 2008

I wear my sunglasses at night.
hah, wrong topic, sorry

FuncType
Mar 29, 2007

Tactical Wiener Lover
I am currently planning to study to get my CCNA. I have a question about IOS in general. At my current place of employment I have installed and configured an 1841 to work as our incoming router on a second T1 line. I'd really like to pull the IOS image off of it and use it with GNS3. Will the IOS image from an 1800 series router work as an image on the 2600 series router?

jwh
Jun 12, 2002

zycl0n posted:

Will the IOS image from an 1800 series router work as an image on the 2600 series router?

Unfortunately, the answer is no.

Although, and here's the good news, you can pull the image off the 1800 and use it with Dynamips.

Biggz
Dec 27, 2005

I have had a request from my manager to teach a couple of co-workers the CCNA material.

We are a cisco partner so can get equipment on Not for resale deals quite cheaply.

I have looked for CCNA lab suggestions and they appear to be CCNA labs "on a budget" on old equipment.

We will be buying the new equipment shortly, what *new* hardware would you recommend?

I would only need to be teaching 2 people so the one lab would do.

Also, but i'm not holding my breath about this one, is it possible to get a hold of the CCNA teaching materials? When I did my CCNA at a netacademy there were brilliant slide shows and presentations along with a Lab book.

I can probably find my old lab book but I think CCNA has been updated since mine was published and I'd much rather teach the new course.

Has anyone done anything similar to this and what approach did you take?

BoNNo530
Mar 18, 2002

Are there any good resources out there for DMVPN? Our company uses this at a ton of sites. The senior engineer put it all together and doesn't have time to really explain/train the material. The director is sending me to a SNRS class but they only have one lab centered around DMVPN. I also have an old CCSP book with nothing on DMVPN. :(

jwh
Jun 12, 2002

BoNNo530 posted:

Are there any good resources out there for DMVPN?

I was principal architect on a pretty big DMVPN project- the doc that helped me the most was this one: http://www.cisco.com/univercd/cc/td/doc/solution/dmvpn_x.pdf

If you have any questions about DMVPN, feel free to ask away, and I'll do my best to help out.

H110Hawk
Dec 28, 2006

Biggz posted:

We will be buying the new equipment shortly, what *new* hardware would you recommend?

Also, but i'm not holding my breath about this one, is it possible to get a hold of the CCNA teaching materials? When I did my CCNA at a netacademy there were brilliant slide shows and presentations along with a Lab book.

I would pick up a couple of L3 capable 12-port switches, and a few small routers with WIC's you can hook together. I don't have any specific model recommendation, but you really only need 5 total boxes to play with everything the ccna books suggest. I would get the units they sell the most of in that feature range, so that they can be familiar with the units they sell.

I assume this means something like a Cat4948, Cat 3570? Whats the new hot poo poo stacking switch? And then something like a 2600 or 1800 series router.

Or, you know, just throw a pile of 6500 series chassis into a room with various sups and line cards, then see what they can get routing!

Boner Buffet
Feb 16, 2006

H110Hawk posted:

Or, you know, just throw a pile of 6500 series chassis into a room with various sups and line cards, then see what they can get routing!

Why would you suggest that? They're cheap pieces of crap!

inignot
Sep 1, 2003

WWBCD?

BoNNo530 posted:

Are there any good resources out there for DMVPN?

Here's a few:

http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6658/DMVPN_Overview.pdf

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_white_paper09186a008018983e.shtml#intro

I did a dmvpn project, it wasn't that bad. Setting up an IOS based Certificate Authority to authenticate the dmvpn sessions made me want to get down on my knees and cry like a woman though.

jwh
Jun 12, 2002

inignot posted:

Here's a few:

http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6658/DMVPN_Overview.pdf

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_white_paper09186a008018983e.shtml#intro

I did a dmvpn project, it wasn't that bad. Setting up an IOS based Certificate Authority to authenticate the dmvpn sessions made me want to get down on my knees and cry like a woman though.


I was too much of a wuss to try to get that working. The wildcard isakmp key seems to work ok, although I'm still a little weird on the whole idea.

Truth is, after several weeks of poking at the tunnel interface configurations, I realized that things were far more likely to not work than to work, and anybody crafty enough to derive the isakmp key, the tunnel key, the nhrp key, the nhrp network id, and then get the routing working correctly probably deserved to get on the network. Hell, I'd probably try to hire them.

BoNNo530
Mar 18, 2002

jwh posted:

I was principal architect on a pretty big DMVPN project- the doc that helped me the most was this one: http://www.cisco.com/univercd/cc/td/doc/solution/dmvpn_x.pdf

If you have any questions about DMVPN, feel free to ask away, and I'll do my best to help out.

THANKS!

inignot posted:

Here's a few:

http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6658/DMVPN_Overview.pdf

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_white_paper09186a008018983e.shtml#intro

I did a dmvpn project, it wasn't that bad. Setting up an IOS based Certificate Authority to authenticate the dmvpn sessions made me want to get down on my knees and cry like a woman though.

Thank you!


Both of these look helpful.

XakEp
Dec 20, 2002
Amor est vitae essentia

I've got a fun one. Got my hands on a 4230 IDS (yes, I know its ancient - its for playing with not deployment) and the guy I got it from did not know the password/username for it. I cant get into the darn thing, does anyone know how to do a hard reset of the box? I dont know what version the software is running.

para
Nov 30, 2006
I'm fairly new to Cisco. I'm currently reading through the ICND2 Cisco Press book, have bought a couple routers and a switch from ebay, and am prepping for taking the CCNA exam.

I have a Cisco 2621 that I am trying to test out as an internet access router on my cable connection (to temporarily replace my WRT54G Linksys). So I set it up to be a DHCP client on the internet port, a DHCP server for the clients, and NAT for internet access.

I am now trying to add a static NAT rule that will allow external devices who are accessing port 80 to be sent to my internal web server machine, 192.168.1.102. I can't seem to get this to work -- it looks like it's okay in the 'show ip nat translations' table, but it is failing when I try to access it in a browser.

Any ideas on what I could be doing wrong? This is my first time configuring NAT. It seemed easy enough, until I cought this little snag.

code:
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$RJOJ$9LWUK5DR3jOodw5nkvInz1
!
no aaa new-model
ip subnet-zero
ip cef
!
!
no ip domain lookup
ip dhcp excluded-address 192.168.1.1 192.168.1.99
!
ip dhcp pool DHCP_POOL
   network 192.168.1.0 255.255.255.0
   default-router 192.168.1.1 
   dns-server 4.2.2.2 4.2.2.1 
!
ip audit po max-events 100
!
!
!
!
!
!
!
!
!
!
!
!
!
! 
!
!
!
!
interface Loopback0
 ip address 10.1.1.1 255.0.0.0
!
interface FastEthernet0/0
 ip address dhcp
 ip nat outside
 duplex auto
 speed auto
!
interface Serial0/0
 ip address 192.168.2.1 255.255.255.0
 clock rate 8000000
!
interface FastEthernet0/1
 ip address 192.168.1.1 255.255.255.0
 ip nat inside
 duplex auto
 speed auto
!
router eigrp 1
 redistribute static
 network 192.168.0.0 0.0.255.255
 no default-information out
 no auto-summary
!
ip nat inside source list NAT_POOL interface FastEthernet0/0 overload
ip nat inside source static tcp 192.168.1.102 80 interface FastEthernet0/0 80
no ip http server
no ip http secure-server
ip classless
!
!
!
ip access-list standard NAT_POOL
 permit any
!
!
!
!
!
banner motd ^C
******************
* Cisco 2621     *
******************^C
!
line con 0
 exec-timeout 0 0
 password 7 070C285F4D06
 logging synchronous
 login
line aux 0
 password 7 045802150C2E
 logging synchronous
 login
line vty 0 4
 password 7 045802150C2E
 logging synchronous
 login
line vty 5 15
 password 7 045802150C2E
 logging synchronous
 login
!
!
end
code:
R1#show ver
Cisco Internetwork Operating System Software 
IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.3(18), RELEASE SOFTWARE (fc3)
Technical Support: [url]http://www.cisco.com/techsupport[/url]
Copyright (c) 1986-2006 by cisco Systems, Inc.
Compiled Wed 15-Mar-06 14:16 by dchih
Image text-base: 0x80008098, data-base: 0x81A0888C

ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.3(18), RELEASE SOFTWARE (fc3)

R1 uptime is 1 hour, 7 minutes
System returned to ROM by power-on
System image file is "flash:c2600-ik9o3s3-mz.123-18.bin"
I feel stupid not being able to figure this out.

Paul Boz_
Dec 21, 2003

Sin City
If you're trying to access your web server via the outside world there's a good chance your ISP is blocking port 80. We did that at my previous employer and caused a few residential customers problems similar to what you're experiencing.

Can you post your NAT xlate table? Your config is right on with the doccd as far as the static nat port mapping.

http://www.cisco.com/en/US/docs/ios/ipaddr/command/reference/iad_nat.html#wp1011696

Paul Boz_ fucked around with this message at 00:17 on Jun 22, 2008

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
I have a question regarding the number of routes and memory on a 6509.

We have 2 6509s taking full BGP routes and they are both dying horribly. It appears that the problem is running out of memory for routes and defaulting to software routing.

What I don't quite understand is that the WS-SUP720-3BXL should be able to do 1M routes I don't seem to be able to get anywhere near there.

code:
lax1-core>sh mod
Mod Ports Card Type                              Model              Serial No.
--- ----- -------------------------------------- ------------------ -----------
  1   48  48 port 10/100/1000mb EtherModule      WS-X6148-GE-TX     xxxxxxxxxxx
  2   48  48 port 10/100/1000mb EtherModule      WS-X6148-GE-TX     xxxxxxxxxxx
  3   16  Pure SFM-mode 16 port 1000mb GBIC      WS-X6816-GBIC      xxxxxxxxxxx
  4   16  Pure SFM-mode 16 port 1000mb GBIC      WS-X6816-GBIC      xxxxxxxxxxx
  5    2  Supervisor Engine 720 (Active)         WS-SUP720-3BXL     xxxxxxxxxxx


Mod  Sub-Module                  Model              Serial       Hw     Status
---- --------------------------- ------------------ ----------- ------- -------
  3  Distributed Forwarding Card WS-F6K-DFC3A       xxxxxxxxxxx  2.4    Ok
  4  Distributed Forwarding Card WS-F6K-DFC3A       xxxxxxxxxxx  2.4    Ok
  5  Policy Feature Card 3       WS-F6K-PFC3BXL     xxxxxxxxxxx  1.7    Ok
  5  MSFC3 Daughterboard         WS-SUP720          xxxxxxxxxxx  2.4    Ok

lax1-core>sh ver
Cisco IOS Software, s72033_rp Software (s72033_rp-ADVIPSERVICESK9_WAN-VM), Version 12.2(33)SXH2, RELEASE SOFTWARE (fc1)
ROM: System Bootstrap, Version 12.2(17r)S2, RELEASE SOFTWARE (fc1)
cisco WS-C6509 (R7000) processor (revision 2.0) with 1040384K/8192K bytes of memory.

Do we need to use WS-F6K-DFC3BXL to be able to use the full 1M of routes the 720-3BXL can do?

FatCow fucked around with this message at 22:03 on Jun 22, 2008

XakEp
Dec 20, 2002
Amor est vitae essentia

gaaaaah. finally got into the darn IDS, but now I keep getting an error. Error: No active virtual sensor. wtf - i cant find anything on working this problem anywhere for v4.1. to make this even more annoying i cant access the command/control interface over the network. wont ping a thing. ugh.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

Do we need to use WS-F6K-DFC3BXL to be able to use the full 1M of routes the 720-3BXL can do?

I believe the switch will drop to the lowest common denominator pfc/dfc wise. what's your output from "# show platform hardware pfc mode"?

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
code:
#show platform hardware pfc mode
PFC operating mode : PFC3A
Is it possible to shut the DFCs down so the PFC can run at full speed?

FatCow fucked around with this message at 05:11 on Jun 23, 2008

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

code:
#show platform hardware pfc mode
PFC operating mode : PFC3A
Is it possible to shut the DFCs down so the PFC can run at full speed?

No- the DFCs take the place of the usual daughtercard that permits PFC based operation (the CFC). If you still have your CFCs on the shelf you can pull the linecards and swap the DFC for the CFC.

inignot
Sep 1, 2003

WWBCD?

para posted:

I feel stupid not being able to figure this out.

Show and debug commands are the way to figure these things out, not staring at the config and waiting for the error to jump out at you.

Do roughly this:
code:
conf t
no logging console
logging buffered 16000 debug
end

clear log
debug ip nat 
clear ip nat trans *
show ip nat trans
show log

ILikeVoltron
May 17, 2003

I <3 spyderbyte!
Anybody know how to do a "configure replace" on an ASA device?

Edit: found an answer : "write erase; copy tftp start"

ILikeVoltron fucked around with this message at 19:27 on Jun 23, 2008

Paul Boz_
Dec 21, 2003

Sin City

ILikeVoltron posted:

Anybody know how to do a "configure replace" on an ASA device?

Yeah, I checked the master command reference (http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c4.html) and found no trace of it. Just replace the startup config with a good backup or reloading the ASA without writing changes to the startup.

[edit] Didn't see your edit :)

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

FatCow posted:

code:
#show platform hardware pfc mode
PFC operating mode : PFC3A
Is it possible to shut the DFCs down so the PFC can run at full speed?

shutting down DFC's isn't something you really want to do.

what's CEF looking like on the box? Also what does

show mls cef summary
show mls cef maximum-routes

say

atticus fucked around with this message at 19:26 on Jun 24, 2008

Panthrax
Jul 12, 2001
I'm gonna hit you until candy comes out.
I've been Googling around for like an hour today, and I can't find an answer how to do this. I need to enable a dial-peer to send DTMF via INFO, not in-band or rfc2833. According to a few docs on cisco.com you can do it, but it doesn't actually tell you HOW to do it, and there's no other options in the help menu other than rtp-nte, or proprietary/h245 poo poo. We're running IOS 12.3(22). Any ideas?

ior
Nov 21, 2003

What's a fuckass?

atticus posted:

shutting down DFC's isn't something you really want to do.

Running without DFC´s works just fine, 90% of my customers are running CFC mode with no ill effects, just keep in mind that you loose out on local switching and is therefore limited by the 40Gbps/slot backplane.

atticus
Nov 7, 2002

this is how u post~
:madmax::hf::riker:

ior posted:

Running without DFC´s works just fine, 90% of my customers are running CFC mode with no ill effects, just keep in mind that you loose out on local switching and is therefore limited by the 40Gbps/slot backplane.

Sure, running without DFC's works, but it depends on the function. If you're pushing a fuckton of multicast like we do, the amount of replication required can eat a CFC alive. CFC's "work" but if you have DFCs, why disable them? That's like spending the money on a decent monitor but only running it at 800x600.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE

atticus posted:

shutting down DFC's isn't something you really want to do.

what's CEF looking like on the box? Also what does

show mls cef summary
show mls cef maximum-routes

say

We worked around it by filtering .* for BGP and setting a default route. There is nothing full routes gives us that we need or even use.

We have the proper DFCs on order and I'll be doing a bunch of remote hands soon. :(

Tremblay
Oct 8, 2002
More dog whistles than a Petco

XakEp posted:

gaaaaah. finally got into the darn IDS, but now I keep getting an error. Error: No active virtual sensor. wtf - i cant find anything on working this problem anywhere for v4.1. to make this even more annoying i cant access the command/control interface over the network. wont ping a thing. ugh.

4.1? Holy crap old. You will not be able to reach the box until you run setup.

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids9/index.htm

IP addresses are entered as x.x.x.x/mask_bits

Also pay attention to the ACL section of setup, most people blow through that while doing everything else right.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

We worked around it by filtering .* for BGP and setting a default route. There is nothing full routes gives us that we need or even use.

We have the proper DFCs on order and I'll be doing a bunch of remote hands soon. :(

You should also be able to tell your provider to put you on a default-only route map, so they send you a default and nothing else, that way when you're ready to go full tables you just call them back and tell them to switch you back to their regular customer route map, you "soft clear in" and bam, instant full tables.

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue

Girdle Wax posted:

You should also be able to tell your provider to put you on a default-only route map, so they send you a default and nothing else, that way when you're ready to go full tables you just call them back and tell them to switch you back to their regular customer route map, you "soft clear in" and bam, instant full tables.

This is what we did at my last ISP job. At our peering points we only had one provider, but multiple links to them, so def-route was better than pulling full tables on old 7513s with RSP8s :)

H.R. Paperstacks fucked around with this message at 13:26 on Jun 25, 2008

Paul Boz_
Dec 21, 2003

Sin City
You guys hear about the new CCNA-Security, CCNA-Wireless, and CCNA-Voice?

I got the CCNA-Sec book via Safari and its actually pretty good for a Cisco Press book. I'll probably snag the sec and voice.

jbiel posted:

This is what we did at my last ISP job. At our peering points we only had one provider, but multiple links to them, so def-route was better than pulling full tables on old 7513s with RSP8s :)

Same here. We had one guy that swore full tables on 7206vxr's with crazy prepending was the best solution. Definitely a no-go.

windex
Aug 2, 2006

One thing living in Japan does is cement the fact that ignoring the opinions of others is a perfectly valid life strategy.
I have something interesting going on in the office, so thought I'd contribute to the thread. We're in the middle of deploying a Nexus 7000-series for our core data center IP and Ethernet-SAN (ATA-over-Ethernet) distribution and switching needs.

If anybody has any questions about the platform (NX-OS, which is kind of a SAN-OS offshoot, not IOS) or the switch itself, I'll try to get to them. I will note the following, though:

* NX-OS is still buggy as hell. They've been releasing new code every 3-4 weeks. Some of the bugs are severe. ( see: http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_0/nx-os/release/notes/401_nx-os_release_note.html#wp93388 )

* NX-OS has no stateful firewall services and no stateful firewall modules exist for the N7K. Neither of these things are roadmapped for the switch. It also can't do Reflexive ACL's, which are kind-of stateful. For a DMZ, you wind up having to configure switch ports as untrusted and use a number of L2/L3 switch features to make up for it in an imperfect but practical way (Port Security, Unicast RFP, Dynamic ARP Inspection, IP Source Guard, and then ACL's once your switchports are locked down).

* I've only got 48-port GbE modules until the switch proves itself and the 32-port 10GbE modules drop in price a little, although those modules will be coming sooner rather than later as I have a 10GbE network to build up next year.

* Important note: I am not a fancy Cisco certified engineer, I got all my experience working for service providers and data centers on 7500-series routers, and 5500/6500-series catalyst switches. But, I did spend an entire month doing homework on this switch prior to suggesting we spend six figures on it (we were long overdue for an upgrade, with most of our network on some 6500's with sup2's and 16-port GbE cards).

So, if you have any questions you don't want to bother a Cisco rep with about this switch, I probably already have and know the answer. :)

Paul Boz_
Dec 21, 2003

Sin City
The Nexus is cool but until they get a lot of the bugs out I don't see it as a six figure switch. I'm quite content with 10k's :colbert:

Bias aside, how different is the OS from IOS?

windex
Aug 2, 2006

One thing living in Japan does is cement the fact that ignoring the opinions of others is a perfectly valid life strategy.

Paul Boz_ posted:

The Nexus is cool but until they get a lot of the bugs out I don't see it as a six figure switch. I'm quite content with 10k's :colbert:

Bias aside, how different is the OS from IOS?

It's not really that bad from the documentation. I'll have more live time on it next week.

We're not fully up and running yet, all I've done so far is power it up just enough to insure everything was working and have a look at it. They actually got us the switch three weeks early from their estimate, and we only had 1 spare 220V L6 receptacle wired up and need to get 4 new ones wired up for it for production, which happens next week. I do have to say it looks awfully pretty once racked up and installed properly, especially when you're staring at a huge mess of a couple 6500's right beside it.

The areas that are different are very well clarified in the relevant sections of the NX-OS documentation, with a huge text block that says "Warning: Configuration blah blah in this section blah blah differs from IOS considerably blah blah.", and usually it's not even that different, it just takes a little time to research when you run into it, but considering that most of the configuration bloat on this thing is going to be the L2/L3 security features we used to ignore on the 6500's since we had good firewalls, I don't have a lot of familiarity with those areas anyway so learning them on the N7K is not a big deal.

If anything the hardest thing to deal with in our new configuration are the ASA's we're putting on the perimeter, which don't configure much like FWSM's, and there's a lot of considerations to make with those since they don't just plug into the switch and work magically.

Oddly enough (or not), it wasn't the switch itself that was the six figures. In fact, we got an amazing deal and I've been on the phone with an awful lot of people from Cisco who helped develop this thing (because we're their guinea pigs). It was having to buy a couple ASA 5540's to replace our FWSM's and a 7201 to do IP-SLB (and replace our CSM's) that added to the cost considerably (for the record, 7201's are about half the price of the ACE's, and the ACE has a load of L4-7 security features we have in place elsewhere).

I was also pretty darn biased against this thing until I saw what everyone else's 10GbE switch options looked like. I might have to deal with some bugs up front, but at least Cisco isn't going to release a switch backplane upgrade in the future that immediately renders everything else in the chassis obsolete.

I kinda got offtopic here, but wanted to share one last thing:

The funniest thing so far with this thing is that all of the install documents have huge disclaimers about how they are a work in progress, etc, etc, all over them. There are still editors notes, along with responses from engineers, which are basically both groups bickering with each other. They also forgot to document how to install that nice fancy cover to the front of the chassis entirely, which led to a bit of taking the front of the switch apart to try to figure out how to get it on there.

Adbot
ADBOT LOVES YOU

Paul Boz_
Dec 21, 2003

Sin City
Emailed you about Nexus docs.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply