Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
ate shit on live tv
Feb 15, 2004

by Azathoth

jwh posted:

Second generation IRS info is public now.

Nothing too unexpected, I guess- twice the RAM, multi-core processors, more extensibility via modules, more integration points.

1941s, the successor to the 1841, still won't do voice.

ISMs replacing AIMs, no AIM slots in ISR G2.

They do look cool though.

I think you mean ISR.

But yea, the 1900 series is nice, They basically all look like the 880, and they are definitely a long awaited upgrade to the lower level ISRs. The 3900's won't be coming for another year IIRC, but the 1900's and 2900's can replace 2800's and 3800's respectively. There is still some internal conflict about voice, placement and OS liscensing, but the hardware is nice.

Oh also the 1900's mark the end of end-user trusted IOS loads. Basically before you could run any code you wanted on your router and no one would care except maybe TAC. Now the new code has the capability to have use licensing built in, tehy are still deciding to what extent to use this new capability, though I'll bet that the Field Account teams are against it. It makes it harder on the SEs to work with various customers.

Adbot
ADBOT LOVES YOU

jwh
Jun 12, 2002

Powercrazy posted:

I think you mean ISR.
You're right. It's been a long day.

Powercrazy posted:

Oh also the 1900's mark the end of end-user trusted IOS loads. Basically before you could run any code you wanted on your router and no one would care except maybe TAC. Now the new code has the capability to have use licensing built in, tehy are still deciding to what extent to use this new capability, though I'll bet that the Field Account teams are against it. It makes it harder on the SEs to work with various customers.
We first noticed this with the 881G, which we first got our hands on about six weeks ago. But yeah, the times they are a changin'.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010
Here a good comparison of x9xx routers and modules. While the aforementioned licensing issue will suck, at least they will have universal IOS images between the ISR platforms. They haven't updated their router performance pdf yet unfortunately.

Also the 1900 looks like some old 30s radio.

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
Not Cisco related but this has the best concentration of people who would need this. Anyone have some recommendations on serial concentrators for OOB management? They need to have:

An integrated POTS modem or an input to plug a modem into
Not reboot Sun servers if it loses power.
-48VDC option is a huge plus.
RS232 with RJ45 outputs.
Dual PSU or Dual PSU input is a huge plus.


I'm currently using Cisco 3600s with async cards for it now and the Sun reboot issue along with the general flakiness of them is making me want to make a case to buy something purpose built for this.

jwh
Jun 12, 2002

FatCow posted:

Not Cisco related but this has the best concentration of people who would need this. Anyone have some recommendations on serial concentrators for OOB management? They need to have:

An integrated POTS modem or an input to plug a modem into
Not reboot Sun servers if it loses power.
-48VDC option is a huge plus.
RS232 with RJ45 outputs.
Dual PSU or Dual PSU input is a huge plus.

Yes, Lantronix SLC appliances. I love them. You will love them. Buy them.

You should look specifically at the SLC04824T-02 product- 48 ports of RS232 over RJ45, dual DC power supplies, NEBS compliant.

edit: to elaborate, they can be used a la Raritan, ie., web-based Java-delivered console applet, or by proxying the console ports as TCP ports on the management interface of the appliance, making device console ports SSH accessible. Authentication can be then tied to external protocols, such as tacacs+. It's very nice.

squidflakes
Aug 27, 2009


SHORTBUS
Is there any reason interesting traffic ACLs have to match exactly between ASAs on either end of a L2L connection?

If ASA1:

access-list asa1 extended permit ip 10.0.16.0 255.255.255.0 10.1.16.0 255.255.255.0



and ASA2:

access-list asa2 extended permit ip host 10.1.16.1 10.0.16.0 255.255.255.0
access-list asa2 extended permit ip host 10.1.16.2 10.0.16.0 255.255.255.0


Source traffic on ASA1 is interesting if it is coming from the whole /24 destined for the other /24

Source traffic on ASA2 is interesting from those specific IPs only destined for the remote /24

I don't see an issue here, but I have another firewall admin furiously insisting that interesting traffic ACLs have to match.

ate shit on live tv
Feb 15, 2004

by Azathoth
I don't see an issue at all. Maybe the other admin is worried about asymmetric routing issues even though they don't apply in this case? Maybe he is just OCD?

It is working, right?

vty
Nov 8, 2007

oh dott, oh dott!
What are your opinions of SRX (Juniper) vs ASAs?

I'm looking into an SRX 240 for IPS/VPN/Firewalling, or a 5510.

I wish we had a networking/enterprise/whatever subforum.

squidflakes
Aug 27, 2009


SHORTBUS

Powercrazy posted:

I don't see an issue at all. Maybe the other admin is worried about asymmetric routing issues even though they don't apply in this case? Maybe he is just OCD?

It is working, right?

It's been working for two years until today. The tunnel dropped and the admin on the other side of the connection flipped the gently caress out. He said something about my policy not being correct and said he found this in his logs.

Tunnel rejected: Policy not found for Src:10.0.64.0, Dst: 10.30.106.0!

Meanwhile, my isakmp debug is returning

<normal IKE/isakmp connection junk>
Oct 23 15:37:00 [IKEv1]: Group = 2xx.xxx.xxx.xxx, IP = 2xx.xxx.xxx.xxx, Connection terminated for peer 2xx.xxx.xxx.xxx. Reason: Peer Terminate Remote Proxy N/A, Local Proxy N/A
Oct 23 15:37:00 [IKEv1]: Group = 2xx.xxx.xxx.xxx, IP = 2xx.xxx.xxx.xxx, Removing peer from correlator table failed, no match!


I updated the ACL to match the specific hosts (which he kept calling a Policy. Not sure where he's getting that) and a few minutes later the tunnel is re-established. This happened at the same time as the application server on our end getting a process restarted so :iiam:

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE

bell biv devoe posted:

I wish we had a networking/enterprise/whatever subforum.

I wouldn't mind if someone fired off a NSP questions thread for discussions of non CJ networking. Maybe it's just because I have very little Cisco kit in my network.

FatCow fucked around with this message at 00:16 on Oct 24, 2009

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:

I wouldn't mind if someone fired off a NSP questions thread for discussions of non CJ networking. Maybe it's just because I have very little Cisco kit in my network.

There's not really much of an xSP base to support a thread like that though.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

bell biv devoe posted:

What are your opinions of SRX (Juniper) vs ASAs?

I'm looking into an SRX 240 for IPS/VPN/Firewalling, or a 5510.

I wish we had a networking/enterprise/whatever subforum.

With real world traffic mix and features enabled discount the data sheet throughput #s by up to 25% on the SRX.

Yes I work for Cisco. No I'm not in sales.

tortilla_chip
Jun 13, 2007

k-partite
I'm trying to do policy based routing on the internal gig interface (g1/0/2) on a Etherswitch Module (NME-16ES-1G). I'm running 12.2(35)SE5 IPSERVICESK9-M which according to the CFN supports policy based routing. The feature is available on all the other physical interfaces, just not the one used for internal routing between the ISR and ES... has anyone else run into this?

jwh
Jun 12, 2002

tortilla_chip posted:

I'm trying to do policy based routing on the internal gig interface (g1/0/2) on a Etherswitch Module (NME-16ES-1G). I'm running 12.2(35)SE5 IPSERVICESK9-M which according to the CFN supports policy based routing. The feature is available on all the other physical interfaces, just not the one used for internal routing between the ISR and ES... has anyone else run into this?

I don't think you can apply PBR to a ESW interface, as the ESW interfaces can't be made routed interfaces. Can you apply the policy to a VLAN SVI?

tortilla_chip
Jun 13, 2007

k-partite
I am under the impression that there is a difference between the ES and ESW models. The ES allows you to give an ip address to g1/0/2 on the ES and g1/0 (or whatever slot is applicable) on the ISR.

Edit: Figured it out. Forgot to issue "no switchport" to g1/0/2 after nuking the config and upgrading IOS images.

Edit 2: Also need "sdm prefer routing"

tortilla_chip fucked around with this message at 00:29 on Oct 27, 2009

lilbean
Oct 2, 2003

Does anyone have anything positive or negative to say about the ACE modules? I'm currently looking into building a new production environment for eCommerce and a pair of the standalone ACE 4710 devices look like it'll do a ton of poo poo I need - OWASP-compliant scanning (gently caress PCI), SSL termination, load balancing, etc. Plus it's vastly cheaper than the F5 BigIP line I'm using now.

ElCondemn
Aug 7, 2005


lilbean posted:

Does anyone have anything positive or negative to say about the ACE modules? I'm currently looking into building a new production environment for eCommerce and a pair of the standalone ACE 4710 devices look like it'll do a ton of poo poo I need - OWASP-compliant scanning (gently caress PCI), SSL termination, load balancing, etc. Plus it's vastly cheaper than the F5 BigIP line I'm using now.

I evaluated the ACE a while back, we went with F5 because of some application dependencies that relied on SIP header rewrites. Since then we've solved our application dependency and moved to Netscaler as opposed to F5 or ACE, but feature wise I think the ACE works almost as well as the Netscaler.

In the past I've used the CSS and while it worked it could have used more features, the same goes for the ACE. The Netscaler however has pretty much all the features as the F5, including "global" load balancing but missing the ability to rewrite SIP headers and iRules. It depends on what you want feature wise but if all you need is some basic load balancing and maybe SSL offload the ACE should fit you just fine.

Inphinity
Sep 21, 2003

I'm looking for some suggestions / advice on products to use and compatibility, so hopefully someone here knows.

We have a central office (~30 users), 4 branch offices (~5 users each), and a small number (4, possibly going to 6 soon) mobile users.

The 5 offices all have ADSL or ADSL2+ connections.

We need to implement VPN tunnels between each branch office, and the central office. And we need mobile users to be able to connect to their relevant office, which could be the central office, or any branch office, depending which project they're assigned to at the time.

So, from my view we need
Central Office: Appliance to handle 4 or more concurrent permanent VPN tunnels, plus 4 or more concurrent VPN mobile client connections
Branch offices: Appliance to handle 1 permanent VPN tunnel, plus 4 or more concurrent VPN mobile client connections.

Should we look at IPSec or SSL? Does it matter? I've deal with PPTP and IPSec VPNs before but not SSL VPNs.

What are suggestions for the appliances? I was wondering if we could go with an ASA 5505 at the central office and 861ISRs at the branches, but I don't fully understand the compatibility implications of using different models (and different product lines) in regards to connectivity.

Will these devices talk to each other?

Is there a better option?

Will a single mobile client software connect to whatever devices we get at all the offices?

All of the sites I believe have Linksys WAG200G routers at present. Can we keep these, and just point the DMZ to the new appliances?

ate shit on live tv
Feb 15, 2004

by Azathoth
You'll want to use IP Sec for your permanent VPN tunnels. SSL is great for particular applications over a web-browser or something, but IP Sec over a GRE tunnel is the standard way to handle VPN Tunnels.

As far as hardware smaller ISRs (861s sound good) at the branch office with a slightly larger ISR, say a 2800 at the CO is a good plan. With how small your office is and how few remote users you have a separate ASA 5505 isn't necessary unless you are hosting significant web traffic or whatever.

You don't need separate user VPN capability for your branch offices unless there is something specific there that you want access to in the case that your main office goes down, however if you want it I'm pretty sure that 861s can handle a small number of individual user VPNs. Generally you will have your remote users just log into the CO and access whatever resources they want that way.

For your user VPN it depends if you want to pay for the Cisco VPN agent. I don't recall the licensing price offhand, but I imagine that if you talk to your account rep you can get a decent number of licenses for pretty cheap when you order all the gear. I haven't dealt with SSL VPN, but it might be the way to go if you don't trust the end user machine, or if they are using multiple non-standardized platforms, Windows, OSX, Linux, BeOS whatever.

As far as your Linksys routers, I assume you want to keep the wireless on them? If that is the case all the ISRs can be equipped with wireless, the new 880's and 1900's have wireless N capability, but if you don't want to pay for that, then you can certainly do some double nat trickery and make them work, transparently to the end user.

ate shit on live tv fucked around with this message at 23:39 on Nov 3, 2009

Inphinity
Sep 21, 2003

Powercrazy posted:

As far as hardware smaller ISRs (861s sound good) at the branch office with a slightly larger ISR, say a 2800 at the CO is a good plan.

As far as your Linksys routers, I assume you want to keep the wireless on them? If that is the case all the ISRs can be equipped with wireless, the new 880's and 1900's have wireless N capability, but if you don't want to pay for that, then you can certainly do some double nat trickery and make them work, transparently to the end user.

Awesome, thanks for your advice. I'll get some pricing.

The only reason we are interested in keeping the existing routers is because I didn't think the ISRs have built-in ADSL modems? If they can connect directly to the phone line for the DSL, great! We don't need the wireless capability.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

For your user VPN it depends if you want to pay for the Cisco VPN agent. I don't recall the licensing price offhand, but I imagine that if you talk to your account rep you can get a decent number of licenses for pretty cheap when you order all the gear. I haven't dealt with SSL VPN, but it might be the way to go if you don't trust the end user machine, or if they are using multiple non-standardized platforms, Windows, OSX, Linux, BeOS whatever.

On the ASA platform there's a basic SSLVPN license now that lets you use remote access SSLVPN using the AnyConnect client for as many peers as you're licensed for IPsec RA peers, good thing too since they're discontinuing the IPsec RA client, and have no plans for an x64 version.

Inphinity
Sep 21, 2003

ragzilla posted:

On the ASA platform there's a basic SSLVPN license now that lets you use remote access SSLVPN using the AnyConnect client for as many peers as you're licensed for IPsec RA peers, good thing too since they're discontinuing the IPsec RA client, and have no plans for an x64 version.

Does that mean we should go with an ASA, so that we can use the SSL client? - we have some users with 64-bit editions of Windows 7.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

Inphinity posted:

Awesome, thanks for your advice. I'll get some pricing.

The only reason we are interested in keeping the existing routers is because I didn't think the ISRs have built-in ADSL modems? If they can connect directly to the phone line for the DSL, great! We don't need the wireless capability.

Some of the 8xx line do iirc, but ISR and G2 would require you to purchase a ADSL interface card.

Inphinity posted:

Does that mean we should go with an ASA, so that we can use the SSL client? - we have some users with 64-bit editions of Windows 7.

There is SSLVPN support on ISR and G2.

Erwin
Feb 17, 2006

I just purchased four 7960 IP phones for $50 each from eBay for use with our Speakeasy hosted VOIP service. I wasn't very familiar with Cisco VOIP phones and didn't realize that changing firmware was going to be such a hassle.

They came with MGCP firmware, and Speakeasy said it's on us to get the right version of SIP firmware on the phones. Unfortunately Cisco seems to require a service contract to download firmware for phones (this seems really stupid, but whatever).

It seemed to me that Speakeasy would have firmware for the 7960s on their TFTP server, since they SELL 7960s (for $395) and I would imagine that they upgrade firmware once in a while. Unfortunately there is no OS79XX.txt on the TFTP server.

So here are my questions:

1.) If I buy a Cisco service contract for one phone, is it legal to use that firmware on all of my phones? I may get more in the future and I wouldn't want to not pay Cisco their dues :rolleyes:

2.) Is there another cheap or free, yet still legal way to put SIP firmware on these phones? Speakeasy said they specifically require version 03-08-07.

CrackTsunami
Sep 21, 2004
I enjoy the eating of babies.
Not really, it's part of having a smartnet contract. Almost all IOS images are not available without a contract (with exception of some of the switch images).

Once you have a contract for one phone you could theoretically install the same firmware on the rest of them but keep in mind this may violate the license with Cisco. Same with IOS images really - one contract gives you access to a lot of stuff. Cisco is starting to crack down on this and will eventually eliminate it with the universal images/license keys on the ISR2s.

lilbean
Oct 2, 2003

Steve Slavery posted:

I evaluated the ACE a while back, we went with F5 because of some application dependencies that relied on SIP header rewrites. Since then we've solved our application dependency and moved to Netscaler as opposed to F5 or ACE, but feature wise I think the ACE works almost as well as the Netscaler.

In the past I've used the CSS and while it worked it could have used more features, the same goes for the ACE. The Netscaler however has pretty much all the features as the F5, including "global" load balancing but missing the ability to rewrite SIP headers and iRules. It depends on what you want feature wise but if all you need is some basic load balancing and maybe SSL offload the ACE should fit you just fine.
Great, thanks for the information. Sounds like it'll be a good match for my needs.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

Erwin posted:

I just purchased four 7960 IP phones for $50 each from eBay for use with our Speakeasy hosted VOIP service. I wasn't very familiar with Cisco VOIP phones and didn't realize that changing firmware was going to be such a hassle.

They came with MGCP firmware, and Speakeasy said it's on us to get the right version of SIP firmware on the phones. Unfortunately Cisco seems to require a service contract to download firmware for phones (this seems really stupid, but whatever).

It seemed to me that Speakeasy would have firmware for the 7960s on their TFTP server, since they SELL 7960s (for $395) and I would imagine that they upgrade firmware once in a while. Unfortunately there is no OS79XX.txt on the TFTP server.

So here are my questions:

1.) If I buy a Cisco service contract for one phone, is it legal to use that firmware on all of my phones? I may get more in the future and I wouldn't want to not pay Cisco their dues :rolleyes:

2.) Is there another cheap or free, yet still legal way to put SIP firmware on these phones? Speakeasy said they specifically require version 03-08-07.

I believe we provide free SW if the device is affected by a PSIRT. You'd have to open a TAC case, but I'd think that would be free too in that case.

Xenomorph
Jun 13, 2001
Some douche is using an IP that is supposed to belong to me.

We're both set to static.

I would like to go to this douche and tell him to stop using my IP. Unfortunately, I don't know where he's at, and there are like 300 Computers here. I'm not going to check them all!

I have his MAC address. A lookup on it tells me its from a Dell.

We have a bunch of Cisco 2950 and 2960G switches.

Is there a way for me to narrow down what port the MAC address may be on?

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE
You should have:

show mac-address-table address nnnn.mmmm.oooo
or
show mac address-table address nnnn.mmmm.oooo

chestnut santabag
Jul 3, 2006

Xenomorph posted:

Some douche is using an IP that is supposed to belong to me.

We're both set to static.

I would like to go to this douche and tell him to stop using my IP. Unfortunately, I don't know where he's at, and there are like 300 Computers here. I'm not going to check them all!

I have his MAC address. A lookup on it tells me its from a Dell.

We have a bunch of Cisco 2950 and 2960G switches.

Is there a way for me to narrow down what port the MAC address may be on?

switch#show mac-address-table
I think.
Although with 300 pcs, you should probably do what the above post says.

chestnut santabag fucked around with this message at 22:35 on Nov 4, 2009

Casimirus
Mar 28, 2005
Yes.

Xenomorph posted:

Some douche is using an IP that is supposed to belong to me.

We're both set to static.

I would like to go to this douche and tell him to stop using my IP. Unfortunately, I don't know where he's at, and there are like 300 Computers here. I'm not going to check them all!

I have his MAC address. A lookup on it tells me its from a Dell.

We have a bunch of Cisco 2950 and 2960G switches.

Is there a way for me to narrow down what port the MAC address may be on?

Layer 2 traceroute to find the switch, on that switch sh mac-address-table | inc the.mac.address.in.lowercase

Sojourner
Jun 6, 2007

Get In
Ciscoworks campus manager has the ability to poll switches periodically for their mac table and search the the location of the offender based on mac or IP. I realize using that is probably not an option, but it is a neat feature.

Shutdown the punks switchport and wait for someone to call complaining their morezilla firefox isn't working anymore.

*edit*

apparently I'm un-ironically challenged at grammar

Xenomorph
Jun 13, 2001
How do I do a do a Layer 2 traceroute?

"traceroute mac" and "traceroute-mac" aren't valid commands on the switches I've connected to (mostly 2950s).

Xenomorph fucked around with this message at 23:24 on Nov 4, 2009

Sojourner
Jun 6, 2007

Get In

Xenomorph posted:

How do I do a do a Layer 2 traceroute?

Traceroute mac, from privileged exec. Not all Routers/switches will support it, so you may be doing show mac add | include *mac* to find him.

ate shit on live tv
Feb 15, 2004

by Azathoth
Also try:
sh arp | incl (ip address)

That should tell you which port the switch is seeing the IP on. You will probably have to find keep going from switch to switch until you see the switch port that is directly connected to the computer in question.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

Also try:
sh arp | incl (ip address)

That should tell you which port the switch is seeing the IP on. You will probably have to find keep going from switch to switch until you see the switch port that is directly connected to the computer in question.

This is a terrible idea (show mac-address-table is the correct answer).

Or if CiscoWorks Campus is out of your budget you could take a look at NetDisco which will perform a similar function for free[1].

1: Assumes you consider implementing a Linux+Postgres+Perl+Mason stack with sparse documentation as 'free'.

ate shit on live tv
Feb 15, 2004

by Azathoth

ragzilla posted:

This is a terrible idea (show mac-address-table is the correct answer).

Or if CiscoWorks Campus is out of your budget you could take a look at NetDisco which will perform a similar function for free[1].

1: Assumes you consider implementing a Linux+Postgres+Perl+Mason stack with sparse documentation as 'free'.

Whats wrong with sh arp? I used it all the time with sh mac- in order to hunt down duplicate ip addresses. Also there might be more than one other computer that has a duplicate IP Address, sh arp would tell him that, he might also have the wrong mac address, again, sh arp would let him verify that.

And more generally how is running any show command a "terrible idea?"

ate shit on live tv fucked around with this message at 02:38 on Nov 5, 2009

Tremblay
Oct 8, 2002
More dog whistles than a Petco

Powercrazy posted:

Whats wrong with sh arp? I used it all the time with sh mac- in order to hunt down duplicate ip addresses. Also there might be more than one other computer that has a duplicate IP Address, sh arp would tell him that, he might also have the wrong mac address, again, sh arp would let him verify that.

And more generally how is running any show command a "terrible idea?"

Unless you ping from your management vlan interface you aren't going to see anything on 2960/2950.

I think that is his point anyhow.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Powercrazy posted:

Whats wrong with sh arp? I used it all the time with sh mac- in order to hunt down duplicate ip addresses. Also there might be more than one other computer that has a duplicate IP Address, sh arp would tell him that, he might also have the wrong mac address, again, sh arp would let him verify that.

And more generally how is running any show command a "terrible idea?"

sh arp is only going to be of any use if it's a layer 3 switch, and the device is actually communicating with the switch (I don't think the ARP table is updated for packets passing through an L3 switch), or tremblay's case where you ping/communicate with the device from the management svi of the switch and the management svi is the same vlan as the problem device. sh mac is always going to show the mac address table which is updated by pass-through frames.

Pretty much what tremblay said.

Adbot
ADBOT LOVES YOU

ate shit on live tv
Feb 15, 2004

by Azathoth
Ah yea I see what you are saying, didn't think about that. But its still not a "terrible" idea, just a useless one.

Terrible usually implies some kind of destructive behavior like say running clear ip bgp * on a 7600 or GSR at some CO.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply