Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
madsushi
Apr 19, 2009

Baller.
#essereFerrari

Powercrazy posted:

I can't understand why people want the actual device graphic. Just stick with simple Rectangles and circles for Routers/Switches.

There's a difference between high-level overviews (simple shapes are fine) and meticulous documentation (you want EVERY port mapped). Sometimes you need to Visio every single cable.

Adbot
ADBOT LOVES YOU

evil_bunnY
Apr 2, 2003

Bluecobra posted:

Their list pricing has always been retarded. Even though their switches are now listed in my Dell Premier account, I still need to go through my account manager to get the correct pricing. We're paying about $15K for a 1U stackable 48-port wire rate 10GbE switch (plus 4 40GbE ports) which isn't too shabby.
Yeah that's what I was quoted for 4810's a while ago. Powerconnects just don't come in 48P 10GBE configurations.

ate shit on live tv
Feb 15, 2004

by Azathoth

madsushi posted:

There's a difference between high-level overviews (simple shapes are fine) and meticulous documentation (you want EVERY port mapped). Sometimes you need to Visio every single cable.

If you care about every single port than a graphical visio representation isn't what you want.

You want a spreadsheet that would look similar to this:
pre:
Port       VLAN       HOST
Gig1/1/2   234        NYESX203
Gig1/1/3   345        NY-VSPHERE
etc.
Adding columns/sheets for each switch. Or probably you would have the spreadsheet sorted by physical location or something.

Meticulously mapping each port with Visio seems like the wrong tool for the job.

madsushi
Apr 19, 2009

Baller.
#essereFerrari

Powercrazy posted:

If you care about every single port than a graphical visio representation isn't what you want.

You want a spreadsheet that would look similar to this:
pre:
Port       VLAN       HOST
Gig1/1/2   234        NYESX203
Gig1/1/3   345        NY-VSPHERE
etc.
Adding columns/sheets for each switch. Or probably you would have the spreadsheet sorted by physical location or something.

Meticulously mapping each port with Visio seems like the wrong tool for the job.

Like I said, sometimes you need to. I once did a massive Visio spelling out every single port in our core chassis and where it went to distribution switches and servers. It was printed out on a huge poster and it's in the wall of our datacenter now. Management wants it, they get it.

evil_bunnY
Apr 2, 2003

madsushi posted:

I once did a massive Visio spelling out every single port in our core chassis and where it went to distribution switches and servers. It was printed out on a huge poster and it's in the wall of our datacenter now. Management wants it, they get it.
This is what I did, but for a planned upgrade. It has the added advantage of allowing to delegate the actual racking to someone else.

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Can anyone see any reason Cisco side why this etherchannel won't bundle and come up/up?




interface GigabitEthernet1/0/51
description Portchannel to MPLS
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 60
switchport mode trunk
channel-group 1 mode active
end


interface GigabitEthernet1/0/52
description Portchannel to MPLS
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 60
switchport mode trunk
channel-group 1 mode active
end

interface Port-channel1
description Portchannel to MPLS
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 60
switchport mode trunk
end

show etherchannel sum
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
U - in use f - failed to allocate aggregator

M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
d - default port


Number of channel-groups in use: 1
Number of aggregators: 1

Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(SD) LACP Gi1/0/51(D) Gi1/0/52(D)


Port-channel1 is down, line protocol is down (notconnect)
Hardware is EtherChannel, address is 0000.0000.0000 (bia 0000.0000.0000)
Description: Portchannel to MPLS
MTU 1500 bytes, BW 10000 Kbit/sec, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Auto-duplex, Auto-speed, link type is auto, media type is unknown
input flow-control is off, output flow-control is unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts (0 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out

Sir Sidney Poitier
Aug 14, 2006

My favourite actor


What are the settings on the other side? I had a channel that wouldn't come up not long ago, both sides were set to auto, when one had to be set to passive.

ate shit on live tv
Feb 15, 2004

by Azathoth
Also are the actual member interfaces up/up?

Any logging? What are you trying to port channel to?

Ninja Rope
Oct 22, 2005

Wee.

madsushi posted:

Like I said, sometimes you need to. I once did a massive Visio spelling out every single port in our core chassis and where it went to distribution switches and servers. It was printed out on a huge poster and it's in the wall of our datacenter now. Management wants it, they get it.

For that I use an actual picture of the device and draw on it. Is there even a visio icon for a front view of a 6500, with options for each available blade and unfilled slot? I seem to recall there was but I can't find it now.

some kinda jackal
Feb 25, 2003

 
 
I guess I'm in the minority, but I always think generic network device icons look so much more professional -- and just that much cooler -- than specific device icons :clint:

jwh
Jun 12, 2002

I find product stencils to be distracting, but that's my own opinion.

Minimalism is important when you're working with complex illustrations.

jwh
Jun 12, 2002

Like this:

Only registered members can see post attachments!

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR

Anjow posted:

What are the settings on the other side? I had a channel that wouldn't come up not long ago, both sides were set to auto, when one had to be set to passive.

Yeah.

I need to start being an rear end in a top hat and assuming that it's not my fault.

"Oh, you know how I told you everything was auto? Well... I need you to hard code stuff. I just realized I have to set speed on our side and that's probably why you're still down."

Of course, this comes after 2 hours of me wondering WTF is going on with my side.

ate shit on live tv
Feb 15, 2004

by Azathoth

jwh posted:

Like this:



Perfect except for the wirehops. Since it is unusual that wires actually touch (in network diagrams never) you can just have the wires cross. If they do actually touch, then you can denote that with a dot on the intersection. Also use colors for the wires that are different than the lines of the elements, or at least a different line weight.

ate shit on live tv fucked around with this message at 20:56 on Mar 14, 2012

adorai
Nov 2, 2002

10/27/04 Never forget
Grimey Drawer

adorai posted:

Given our minimal need of 10Gbe it's more or less impossible to justify going Nexus 5k, it's simply too damned expensive. The 4900 series appears to be quite expensive as well. Do we have any other alternatives?
So coming back to this. I have manipulated the quote from my partner considerably, and I am the point where I think I know what I want to buy, but want to get some feedback. Our original quote had us replacing our existing VMware switch stack with 2x 5548s and 2x 2224s. Instead, I have worked out that I can purchase 10Gbe HBAs for all of our VMware servers and our NetApp as part of a refresh, buy 2x 5548s and 0x 2224s, and my price with all necessary SFPs and a year of smartnet is around $35k. The biggest downside is that some of our random servers will continue to be served by 2x procurve gigabit switches connected to our new nexus switches only by one 1Gbe fiber link each.

Without knowledge of my environment, am I stupid for getting the 5548s without the 2224s? It knocks over $8k off my price when including smartnet.

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Particular software you rendered that with?

abigserve
Sep 13, 2009

this is a better avatar than what I had before

jwh posted:

Like this:



What do the squares represent in this diagram?

workape
Jul 23, 2002

Are you using actual optical SFP's for 10G? If so, why aren't you using twinax for your 10G connectivity? That should save you sufficient cash that you could likely get the FEX's that you want to pick up.

lol internet.
Sep 4, 2007
the internet makes you stupid
Trying to use GNS3 for cisco testing. I can't seem to use the crypto command, any reason why?

It doesn't appear as an option when i type ? in the CLI.

I'm was testing this with a c3640 router on the C3640-is-mz.122-1.image

nzspambot
Mar 26, 2010

lol internet. posted:

Trying to use GNS3 for cisco testing. I can't seem to use the crypto command, any reason why?

It doesn't appear as an option when i type ? in the CLI.

I'm was testing this with a c3640 router on the C3640-is-mz.122-1.image

That images doesn't support crypto you'll need to search the :filez: for something with a k8/k9 in it eg:

c3640-js-mz.122-1.bin = no crypto
c3640-jk9s-mz.122-1.bin = crypto

use http://tools.cisco.com/ITDIT/CFN/Dispatch?showAllSoftware=true to find what you need to "find

edit:

IP PLUS c3640-is-mz.122-1.bin = what you have
IP PLUS IPSEC 3DES c3640-ik9s-mz.122-1.bin = what you need

nzspambot fucked around with this message at 07:54 on Mar 15, 2012

jwh
Jun 12, 2002

abigserve posted:

What do the squares represent in this diagram?

Servers or appliances.

ate shit on live tv
Feb 15, 2004

by Azathoth
Is there a way to combine port-security with a default err-disable?

What i want to do is have a port secured with sticky-mac, and if it ever loses link to automatically err-disable.

We have IP Phones in public/unmonitored areas and right now someone can just unplug the phone and plug in their laptop and happily have access to the whole network. Yes I know that 802.1x is the "right" way to do this, but that is not something you can just roll out without significant planning and cooperation of all the various organizations.

Any ideas?

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

Powercrazy posted:

Is there a way to combine port-security with a default err-disable?

What i want to do is have a port secured with sticky-mac, and if it ever loses link to automatically err-disable.

We have IP Phones in public/unmonitored areas and right now someone can just unplug the phone and plug in their laptop and happily have access to the whole network. Yes I know that 802.1x is the "right" way to do this, but that is not something you can just roll out without significant planning and cooperation of all the various organizations.

Any ideas?

This will shutdown the interface if someone tries to unplug the phone and plug something else in..

switchport port-security maximum 1
switchport port-security violation shutdown
switchport port-security

ate shit on live tv
Feb 15, 2004

by Azathoth
That is easily defeatable by changing your mac-address to match the phone's (which is conveniently stamped on the phone).

wolrah
May 8, 2006
what?

Powercrazy posted:

That is easily defeatable by changing your mac-address to match the phone's (which is conveniently stamped on the phone).

This also gains you access to the "Voice VLAN" if configured on quite a few switches. Every one I've bothered to take a look at does it based on the first six of the phone's MAC. Set your computer to 00:04:F2:xx:xx:xx (Polycom) or 00:13:C4:xx:xx:xx (Cisco 79x0) and magically you're a phone.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
Welp,

use VACL's to block all traffic except VoIP?

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue

Powercrazy posted:

That is easily defeatable by changing your mac-address to match the phone's (which is conveniently stamped on the phone).

They make hardware boxes you can put on the wall jacks. Quite common in public areas.

Edit: Hoffman Box is what we've used from time to time.

H.R. Paperstacks fucked around with this message at 19:23 on Mar 15, 2012

CrazyLittle
Sep 11, 2001





Clapping Larry

Sepist posted:

Welp,

use VACL's to block all traffic except VoIP?

I do wonder why offices would bother setting up a voice vlan if regular traffic isn't blocked on that VLAN as well.

wolrah
May 8, 2006
what?

CrazyLittle posted:

I do wonder why offices would bother setting up a voice vlan if regular traffic isn't blocked on that VLAN as well.

A lot of phones use TFTP to autoconfigure from a machine set in DHCP option 66. This is also used for PXE booting PCs. If you can't or don't feel like setting up your boot server to handle both or different DHCP options for different devices, just put them on their own VLAN and problem solved. Same thing if the customer has a data router they can't or won't give up but which does not handle voice well, a voice VLAN makes it really easy to add a second router for voice without having to change anything on the existing network.

If you're thinking about it from that side of things, it's just making your life easier and the security aspect might not even come up.

Also if someone's on your voice network they can still capture credentials from a config file (either sniffing during a phone boot or just pretending to be a phone themselves and requesting them from the server) since while most phones support config encryption it's generally a real pain to set up and doesn't work with most config management systems. Now they can register to your PBX as one of your phones and look just like any other internal caller.

ate shit on live tv
Feb 15, 2004

by Azathoth

CrazyLittle posted:

I do wonder why offices would bother setting up a voice vlan if regular traffic isn't blocked on that VLAN as well.

The other advantage of a voice vlan is allowing you to save on ports. Once you have IP Phones rolled out, instead of needing a PC port and a Phone port, all you need is a phone port, and the PC plugs into the phone. Network segregation is also useful for applying end-to-end QoS in order to prioritize latency sensitive traffic.

Security is NEVER a reason to use VLANs.

CrazyLittle
Sep 11, 2001





Clapping Larry
Right - agreed on all accounts. My point is that if you're going to go to the effort to establish a voice VLAN, why not take the extra few minutes to block unrelated traffic? If you allow unrelated traffic on the voice VLAN then you're also allowing people to break your QoS policies by masquerading as a phone to download their sweet sweet porn at prioritized status.

ate shit on live tv
Feb 15, 2004

by Azathoth
This is true, however you can't get to the internet from our voice vlan, nor can you join the domain. You can get an IP and get everywhere, but for the user who wants to masquerade as a phone for QoS purposes he is wasting his time.

If he wants to do something illicit, well, that is what I'm trying to solve. Oh also our IP Phones are the ones that do the QoS tagging, so even if you were in the Voice Vlan, you still won't get prioritization over the WAN.

ruro
Apr 30, 2003

Ultimately if someone has physical access to your network port all you can do is lock it down as best you can. Having said that I find it odd that you have a phone in an area not monitored or at least periodically checked by building security (if you have any), that's just asking for trouble.

Tremblay
Oct 8, 2002
More dog whistles than a Petco

ruro posted:

Ultimately if someone has physical access to your network port all you can do is lock it down as best you can. Having said that I find it odd that you have a phone in an area not monitored or at least periodically checked by building security (if you have any), that's just asking for trouble.

Why not just use port security on that one port and be done with it?

ate shit on live tv
Feb 15, 2004

by Azathoth

Tremblay posted:

Why not just use port security on that one port and be done with it?

I'd love to. But how would you "lock down" that port.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

Powercrazy posted:

I'd love to. But how would you "lock down" that port.

After much research I've determined the best solution for you is to put a shotgun in the wall with the trigger tied to the ethernet jack on the phone, soon as they pull it they get shot to death. I think you need to put a sign up letting them know though

ate shit on live tv
Feb 15, 2004

by Azathoth
Yea. That is basically what I was thinking oh well. Time to embrace security theater, and maybe push 802.1x on the side.

Boner Buffet
Feb 16, 2006
even though it's a small business switch and i can't expect much, the configuration interface for the cisco 300 series was designed by someone about to die from an OD of heroin.

wolrah
May 8, 2006
what?

Boner Buffet posted:

even though it's a small business switch and i can't expect much, the configuration interface for the cisco 300 series was designed by someone about to die from an OD of heroin.

Oh goodie. I have one of those (SF300-24P) coming in for a customer tomorrow. They lost their only PoE switch capable of both Prestandard and 802.3af and this was the most desirable (read: cheapest) replacement option. At least they don't use any managed switch features, it's just there for the PoE, so I should only have to deal with it if I need to remote reboot them.

Is it just the same old SRW224G4P interface or did they somehow make it worse after the Cisco rebranding?

Adbot
ADBOT LOVES YOU

Tremblay
Oct 8, 2002
More dog whistles than a Petco

Powercrazy posted:

I'd love to. But how would you "lock down" that port.

Hard code the MAC into the port configuration and only allow one auth'd MAC per that port. Any violation will shutdown the port (default action). I seem to be missing something... 802.1x will work it just seems overkill for this.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply