Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
ate shit on live tv
Feb 15, 2004

by Azathoth

Sepist posted:

Try making a second IKE policy using all non-defaults and see if you get the same thing, that is weird. I have seen quite a few times where the only way to fix a phase 1 failure was actually reloading the ASA.

I did that too :/

I really hope it isn't resolved by reloading the ASA, because wtf is that? This isn't critical production infrastructure (yet) so rebooting isn't a big deal but still rebooting devices is sometihng that I'd expect to do like 10+ years ago, not now.

Adbot
ADBOT LOVES YOU

Mulloy
Jan 3, 2005

I am your best friend's wife's sword student's current roommate.
Wondering if anyone has seen anything like this before: We have a SIP connection with a carrier over an IP Sec tunnel. I am not sure what their exact models are, but on our end we have the IPSec tunnel hitting a Palo Alto. Extremely infrequently they will send 6 SIP Invites of which we only see the 6th and response with a TRYING before they cancel.

It's not necessarily Cisco specific, but I figured if anyone had seen anything like this it might be here.

Protokoll
Mar 28, 2003

Here we go Lina.
Here we go Lina.
COME ON, LINA!
What is the default IOS-XR behavior in the following scenario?

HQ <--> LER1 <--> LER2 <--> Branch

I have two label edge routers that are directly connected. The customer's HQ is connected to one LER and their branch office is connected to another LER. There is no LSR between the two LERs. If a customer sends data from their HQ to their Branch, how will penultimate hop popping affect the label structure?

My expectation would be that two labels are applied at the PE ingress interface (peered with the HQ) and the outside label is popped off as it leaves the egress interface to the other LER. I have run this by everyone I know and no one has been able to say confidently how this will work. Can anyone confirm or deny my suspicions?

Edit: My technical explanation to support my idea.

The packet enters the ingress subinterface at the PE untagged and, per default MPLS behavior, it should be tagged twice and forwarded into the MPLS network. The outer label determines the path the packet travels from the first LER to the second LER and the inner label identifies the egress VRF. Since LER1 and LER2 are iBGP peers (using loopback interfaces; important, or PHP will break the LSP), the LER1 router should reference its LFIB and pop the outer label and forward the traffic to LER2. LER2 will then reference its LFIB, pop the final label and forward the traffic according to its routing table.

What is wrong about this understanding?

Protokoll fucked around with this message at 02:08 on Dec 6, 2013

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

Powercrazy posted:

I really hope it isn't resolved by reloading the ASA, because wtf is that?
This has been a solution to many ASA (and pix) related IPSec issues I've had in the past. In at least a few of those cases that was after re-IPing the outside interface which apparently confused it.

Contingency
Jun 2, 2007

MURDERER

Powercrazy posted:

Nope still nothing.

When I debug on the router I get this:
pre:
*Dec  5 21:11:33.259: ISAKMP:(0): beginning Aggressive Mode exchange
*Dec  5 21:11:33.259: ISAKMP:(0): sending packet to xxy.xy.xxy.4 my_port 500 peer_port 500 (I) AG_INIT_EXCH
*Dec  5 21:11:33.259: ISAKMP:(0):Sending an IKE IPv4 Packet.
*Dec  5 21:11:33.263: ISAKMP (0): received packet from xxy.xy.xxy.4 dport 500 sport 500 Global (I) AG_INIT_EXCH
*Dec  5 21:11:33.263: ISAKMP:(0):Notify has no hash. Rejected.
*Dec  5 21:11:33.263: ISAKMP (0): Unknown Input IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY:  state = IKE_I_AM1
*Dec  5 21:11:33.263: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
*Dec  5 21:11:33.263: ISAKMP:(0):Old State = IKE_I_AM1  New State = IKE_I_AM1
The other end is an ASA, what hash is it talking about? I assume the ASA is sending an error message in plaintext and this router is expecting an encrypted payload. Of course on the ASA I get the help debug output of:


Claiming it's failing phase 1.

I haven't set up a dynamic crypto map entry before. How should the ASA's tunnel group (which contains the PSK used to derive the hash) look?

falz posted:

This has been a solution to many ASA (and pix) related IPSec issues I've had in the past. In at least a few of those cases that was after re-IPing the outside interface which apparently confused it.

There was a bug that resulted in a stuck SPI, and your only recourse was to reboot. This was fixed in later revisions of 8.2 and 8.3 though, so it shouldn't be a problem these days.

DeNofa
Aug 25, 2009

WILL AMOUNT TO NOTHING IN LIFE.

Powercrazy posted:

*Dec 5 21:11:33.263: ISAKMP:(0):Old State = IKE_I_AM1 New State = IKE_I_AM1


Claiming it's failing phase 1.

The IOS side is trying to do aggressive mode but the ASA doesn't have any AM configuration. Is there any reason you would want to do aggressive mode (just say no)? Otherwise just remove that config and do main mode, which is more of a standard for site to site tunnels.


On my phone so quoting is a pain, but remove that ISAKMP peer configuration all together OR add in aggressive mode config on the ASA. Don't do the second option. MM for life.

DeNofa fucked around with this message at 14:32 on Dec 6, 2013

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
There is no config for AM mode on an ASA IIRC, only config to disable it

tortilla_chip
Jun 13, 2007

k-partite

Protokoll posted:

What is the default IOS-XR behavior in the following scenario?

HQ <--> LER1 <--> LER2 <--> Branch

LER2 will advertise an outer label of 3 (implicit-null) for transport to it and then the inner label will be an arbitrary value corresponding to the service.

LER1 will push the arbitrary inner label only, switch the packet to LER2, and then LER2 will pop the label.

LER1#sh mpls forwarding prefix LER2_LOOP/32

Should show an outgoing label of Pop.

tortilla_chip fucked around with this message at 15:34 on Dec 6, 2013

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Found a great little ASA syslog bug. If syslog reporting is using TCP and the ASA loses connection to the syslog server, it blocks most if not all traffic.

I see this reported as a "security feature". I mean, I guess shutting down the entire network is "secure" but that's not really something you want to happen in production.

ate shit on live tv
Feb 15, 2004

by Azathoth

DeNofa posted:

The IOS side is trying to do aggressive mode but the ASA doesn't have any AM configuration. Is there any reason you would want to do aggressive mode (just say no)? Otherwise just remove that config and do main mode, which is more of a standard for site to site tunnels.


On my phone so quoting is a pain, but remove that ISAKMP peer configuration all together OR add in aggressive mode config on the ASA. Don't do the second option. MM for life.

Yea I would usually use Main Mode, but I had read that for an unknown end point of an ipsec tunnel, that I would need to use Aggressive Mode. And yes afaik the ASA will happily do Aggressive Mode unless explicitly disabled. In anycase i'm working with TAC now, so I can't wait for their configuration to fail and then spending another day or to on something as mundane as a site to site ipsec tunnel :allears:

I haven't even gotten to the complicated part yet...

e: Finally got that resolved. The root issue is that an explicit Aggressive Mode isn't required even though the documentation (and the ASA warning messages) imply it is. What happens is the client, in this case the router, starts in Main Mode, Because of the dynamic crypto map, the ASA then tells the router to try again in aggressive mode, aggressive mode starts, and then the Tunnel comes up normally. So Hurrah, it's working.

Time for the complicated part....

ate shit on live tv fucked around with this message at 18:37 on Dec 6, 2013

jwh
Jun 12, 2002

Mulloy posted:

Wondering if anyone has seen anything like this before: We have a SIP connection with a carrier over an IP Sec tunnel. I am not sure what their exact models are, but on our end we have the IPSec tunnel hitting a Palo Alto. Extremely infrequently they will send 6 SIP Invites of which we only see the 6th and response with a TRYING before they cancel.

It's not necessarily Cisco specific, but I figured if anyone had seen anything like this it might be here.

Has the other side provided captures that show they're really sending 6 SIP invites?

You could try and packet cap on the palo tunnel interface.

Or, if there's not a lot of traffic, just look for ESP packets that would correspond to their SIP invites.

I would be trying to make sure the SIP invites are in fact making it out of their infrastructure.

less than three
Aug 9, 2007



Fallen Rib
Oh hey, a pair of 4948s. Let's set them up!



Or not.

ate shit on live tv
Feb 15, 2004

by Azathoth
Nice.

psydude
Apr 1, 2008

Has anyone ever seen a case where a network cable will only work when plugged in one way? That is to say that one specific end must be in the jack and the other must be in the machine, and if you reverse them then you'll lose connectivity. I'd never heard of this before until a few days ago when I experienced it in a widespread fashion here.

ate shit on live tv
Feb 15, 2004

by Azathoth
I'd imagine that kind of issue is caused by one machine with nonstandard metal connectors so after the first time you plug that cable in it's bent out of shape and won't work at anything other than that one interface. An damage will be extremely difficult to detect with just casual observation. Alternatively the socket has been plugged in for so long that the copper pings have oxidized in a specific configuration that won't make contact to any other interface.

The short answer is metal fatigue.

Count Thrashula
Jun 1, 2003

Death is nothing compared to vindication.
Buglord
Now that Cisco owns them, what's everyone's opinion on Meraki?

My boss seems to think they're going to be a really awesome solution because ~*the cloud*~, and I have to say that having cloud-based config backups is a really alluring idea.

less than three
Aug 9, 2007



Fallen Rib

QPZIL posted:

Now that Cisco owns them, what's everyone's opinion on Meraki?

My boss seems to think they're going to be a really awesome solution because ~*my butt*~, and I have to say that having butt-based config backups is a really alluring idea.

It's a fantastic product. If you take one of their webinars they'll send you a free AP to keep. The idea is if you get to use it hands on and see how awesome it is you'll love it, and it works.

Langolas
Feb 12, 2011

My mustache makes me sexy, not the hat

less than three posted:

It's a fantastic product. If you take one of their webinars they'll send you a free AP to keep. The idea is if you get to use it hands on and see how awesome it is you'll love it, and it works.

Do we have a link to one of these webinars? I'm definitely interested in checking out the product

Biggz
Dec 27, 2005

Langolas posted:

Do we have a link to one of these webinars?

https://meraki.cisco.com/freeap

They sent the AP amazingly quick as well, I was expecting to wait weeks for it.

I'm from the UK and I needed to provide them with my company's VAT number, and someone called me almost immediately after signing up to talk to me about the webinar. He wasn't pushy or anything, I just explained that we currently sold a competitors product and I'd like to check out the Meraki equipment, he was fine with that and signed me up to a webinar.

I've not have chance to set it up properly but the webinar was worth watching.

ate shit on live tv
Feb 15, 2004

by Azathoth
What do people use for out of band remote access to remote sites? Right now we have another router that we are using as a terminal server with Dial-In access. Obviously this is less than ideal from a security standpoint, not to mention ease of management (have to have a modem).

jwh
Jun 12, 2002

Powercrazy posted:

What do people use for out of band remote access to remote sites? Right now we have another router that we are using as a terminal server with Dial-In access. Obviously this is less than ideal from a security standpoint, not to mention ease of management (have to have a modem).

I like the Lantronix SLC boxes

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Possibly dumb question about fiber. I have this media converter on one end of a link:



And then on the other end of the link I have a full-sized switch and the fiber goes into that, the connectors look the same on this end, then I use one whole RJ45 cable to connect it to a router.

In a quest to remove some poo poo from my rack, I planned on making a VLAN and using one of the fiber ports another switch but it requires a cable that looks like this:



I connected the fiber to the switch, but I don't get a link light. What gives? There's a pretty standard looking (to me) fiber patch panel that both cables go to.

jwh
Jun 12, 2002

Is it multimode? Did you try flipping the tx/rx on one end?

ate shit on live tv
Feb 15, 2004

by Azathoth

jwh posted:

I like the Lantronix SLC boxes

Do those have built in internet connectivity or what? I'm looking to address the actually out-of-band access part. Assuming the wan circuits are down and I need to access the remote office.

chestnut santabag
Jul 3, 2006

Bob Morales posted:

Possibly dumb question about fiber. I have this media converter on one end of a link:



And then on the other end of the link I have a full-sized switch and the fiber goes into that, the connectors look the same on this end, then I use one whole RJ45 cable to connect it to a router.

In a quest to remove some poo poo from my rack, I planned on making a VLAN and using one of the fiber ports another switch but it requires a cable that looks like this:



I connected the fiber to the switch, but I don't get a link light. What gives? There's a pretty standard looking (to me) fiber patch panel that both cables go to.

That's a 100Meg media converter - if you're attempting to plug it into a gigabit SFP then the link won't come up.

jwh
Jun 12, 2002

Powercrazy posted:

Do those have built in internet connectivity or what? I'm looking to address the actually out-of-band access part. Assuming the wan circuits are down and I need to access the remote office.

You can either slap a modem onto it or use a cellular modem. Or both, I think.

They're nice boxes, and they're not that expensive.

CrazyLittle
Sep 11, 2001





Clapping Larry

chestnut santabag posted:

That's a 100Meg media converter - if you're attempting to plug it into a gigabit SFP then the link won't come up.

Yep. That's it - you probably used a 1000-base SX fiber SFP in your switch. You probably need one of these for the switch instead:

Cisco Linksys MFEFX1 mini-GBIC SFP Transceiver Module - 1 x 100Base-FX - SFP (mini-GBIC)

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

Thanks for the help. I have switch that I just replaced with a pair of 1gb fiber ports that I can use to replace the old 100mb switch on the other end and that should work.

chestnut santabag
Jul 3, 2006

CrazyLittle posted:

Yep. That's it - you probably used a 1000-base SX fiber SFP in your switch. You probably need one of these for the switch instead:

Cisco Linksys MFEFX1 mini-GBIC SFP Transceiver Module - 1 x 100Base-FX - SFP (mini-GBIC)



Of note is that Linksys SFPs (even the Cisco SMB branded ones) don't work in Catalyst switches without doing that one hidden command that voids all your warranties.
I don't know of any regular Cisco branded 100Meg SFPs - would these work in Gig interfaces?

Turns out there are and they do work in Gig interfaces:
http://www.cisco.com/en/US/prod/collateral/modules/ps5455/ps6578/product_data_sheet0900aecd801f931c.html

chestnut santabag fucked around with this message at 17:39 on Dec 11, 2013

dotster
Aug 28, 2013

chestnut santabag posted:

Of note is that Linksys SFPs (even the Cisco SMB branded ones) don't work in Catalyst switches without doing that one hidden command that voids all your warranties.
I don't know of any regular Cisco branded 100Meg SFPs - would these work in Gig interfaces?

Using third party optics and the hidden command to enable them does not void your warranty, it just means that when you talk to TAC they will not support that setup if they think the problem is related to the optics. If you have a Cisco optic and you swap it and the problem persists you will get help, so it is a good idea to have enough supported optics around for this kind of situation. Warranties don't really get voided in most cases, the vendor can deny a claim based on something you did that that you did that is not supported.

H.R. Paperstacks
May 1, 2006

This is America
My president is black
and my Lambo is blue
Anyone planning on attending NANOG60 in Atlanta come February? Looking at possibly attending depending on the presentation list is released next week.

single-mode fiber
Dec 30, 2012

So I've got the following output of a CBWFQ QoS policy, applied in the outbound direction on an interface:

code:
Class-map: Q4 (match-any)
          6891549 packets, 4649188330 bytes
          5 minute offered rate 5000 bps, drop rate 0 bps
          Match:  precedence 0
            6891549 packets, 4649188330 bytes
            5 minute rate 5000 bps
          Match:  precedence 1
            0 packets, 0 bytes
            5 minute rate 0 bps
          Match:  dscp default (0) 1  2  3  4  5  6  7
            0 packets, 0 bytes
            5 minute rate 0 bps
          Match:  dscp cs1 (8) 9  af11 (10) 11  af12 (12) 13  af13 (14) 15
            0 packets, 0 bytes
            5 minute rate 0 bps
          Queueing
          queue limit 64000 bytes
          (queue depth/total drops/no-buffer drops) 0/30910/0
          (pkts output/bytes output) 6860639/4650812932
          bandwidth 750 kbps
            Exp-weight-constant: 9 (1/512)
            Mean queue depth: 6 bytes
            class     Transmitted       Random drop      Tail drop          Minimum        Maximum     Mark
                      pkts/bytes     pkts/bytes       pkts/bytes          thresh         thresh     prob
                                                                              bytes         bytes
            0         6148954/4570143783  11039/16127605    1791/2586366        58000         64000  1/10
            1               0/0               0/0              0/0              58000         64000  1/10
            2               0/0               0/0              0/0               5000          8000  1/10
            3               0/0               0/0              0/0               5500          8000  1/10
            4               0/0               0/0              0/0               6000          8000  1/10
            5               0/0               0/0              0/0               6500          8000  1/10
            6          711685/80669149        4/1352       18076/2267676         7000          8000  1/10
            7               0/0               0/0              0/0               7500          8000  1/10

        Class-map: class-default (match-any)
          0 packets, 0 bytes
          5 minute offered rate 0 bps, drop rate 0 bps
          Match: any

          queue limit 64 packets
          (queue depth/total drops/no-buffer drops) 0/0/0
          (pkts output/bytes output) 0/0
Am I going bananas over here? Where it breaks out the transmit/random/tail drop by classes 0 through 7, aren't those 0 through 7 values the IP precedence values of the packets?

single-mode fiber fucked around with this message at 23:50 on Dec 19, 2013

jwh
Jun 12, 2002

Have you seen this? This might shed some light on what's going on. http://www.cisco.com/en/US/tech/tk543/tk544/technologies_tech_note09186a0080094612.shtml

AtmaHorizon
Apr 3, 2012

single-mode fiber posted:

So I've got the following output of a CBWFQ QoS policy, applied in the outbound direction on an interface:

Am I going bananas over here? Where it breaks out the transmit/random/tail drop by classes 0 through 7, aren't those 0 through 7 values the IP precedence values of the packets?

It depends on IOS version. One will show only actually seen precedence matches and another will show the output you got.
Try changing config to "random-detect dscp-based" for even more awesome output.

falz
Jan 29, 2005

01100110 01100001 01101100 01111010

H.R. Paperstacks posted:

Anyone planning on attending NANOG60 in Atlanta come February? Looking at possibly attending depending on the presentation list is released next week.
I had planned on it but another thing came up the same week. Fortunately that other thing included warm weather and beaches, so I'm not that upset. I've been meaning to go to at least one per year, but so far it's only been one total (Dallas last year).

single-mode fiber
Dec 30, 2012

I ended up biting the bullet and calling TAC. Originally the problem was that BGP to the RRs on the far end was flapping like wild whenever the site started hitting like 10% of their circuit capacity. So, I was expecting to find tail drops in the P2 queue (presumably the keepalives), since that was explicitly just for CS6 kind of stuff, not the P4 queue. But, after looking over some other sites, they're having a lot of weird QoS poo poo go on, they just haven't noticed yet (or don't care).

ruro
Apr 30, 2003

single-mode fiber posted:

I ended up biting the bullet and calling TAC. Originally the problem was that BGP to the RRs on the far end was flapping like wild whenever the site started hitting like 10% of their circuit capacity. So, I was expecting to find tail drops in the P2 queue (presumably the keepalives), since that was explicitly just for CS6 kind of stuff, not the P4 queue. But, after looking over some other sites, they're having a lot of weird QoS poo poo go on, they just haven't noticed yet (or don't care).
The min/max threshold for cs6 should definitely be higher than the min/max for default traffic in my opinion. Once the queue length is higher than 8k it's all going to get tail dropped while the default traffic can merrily queue up to 64k :(. Heck, I stick routing traffic in its own dedicated class with a pool of bandwidth all to itself usually.

single-mode fiber
Dec 30, 2012

The overall setup looked like this. Curious part is that the P2 queue does get an awful lot of matches (far more transmitted packets than what showed up as class 6 transmit packets in the P4 queue), and 0 drops of any kind.

code:
class-map match-any Q2
 match  precedence 4
 match  precedence 6
 match  precedence 7
 match  dscp cs4  33  af41  35  af42  37  af43  39
 match  dscp cs6  49  50  51  52  53  54  55
 match  dscp cs7  57  58  59  60  61  62  63
class-map match-any Q3
 match  precedence 2
 match  precedence 3
 match  dscp cs2  17  af21  19  af22  21  af23  23
 match  dscp cs3  25  af31  27  af32  29  af33  31
class-map match-any Q1
 match  precedence 5
 match  dscp cs5  41  42  43  44  45  ef  47
class-map match-any Q4
 match  precedence 0
 match  precedence 1
 match  dscp default  1  2  3  4  5  6  7
 match  dscp cs1  9  af11  11  af12  13  af13  15
!
!
policy-map All_Agency_CBWFQ
 class Q1
  police 995000 conform-action transmit  exceed-action drop
  priority
  queue-limit 32000 bytes
 class Q2
  bandwidth 550
  queue-limit 32000 bytes
  random-detect
  random-detect precedence 4 28000 bytes 32000 bytes
  random-detect precedence 6 28000 bytes 32000 bytes
  random-detect precedence 7 28000 bytes 32000 bytes
 class Q3
  bandwidth 550
  queue-limit 32000 bytes
  random-detect
  random-detect precedence 2 28000 bytes 32000 bytes
  random-detect precedence 3 28000 bytes 32000 bytes
 class Q4
  bandwidth 750
  queue-limit 64000 bytes
  random-detect
  random-detect precedence 0 58000 bytes 64000 bytes
  random-detect precedence 1 58000 bytes 64000 bytes
policy-map OUT
 class class-default
  shape average 3000000
  service-policy All_Agency_CBWFQ

single-mode fiber fucked around with this message at 23:51 on Dec 19, 2013

z0rlandi viSSer
Nov 5, 2013

Powercrazy posted:

What do people use for out of band remote access to remote sites? Right now we have another router that we are using as a terminal server with Dial-In access. Obviously this is less than ideal from a security standpoint, not to mention ease of management (have to have a modem).

Adbot
ADBOT LOVES YOU

KS
Jun 10, 2003
Outrageous Lumpwad
I’m having a problem with ASDM I’m really hoping someone here can shed some light on. The device is a FWSM in a 6513. It’s running in transparent mode and there are 8 bridge groups in one context (doubt this matters).

I’m trying to do cleanup of a bunch of rules that are no longer used. I’m finding that as I delete them, I can’t delete the associated objects. If I use the “where used” tool, I get this:


That’s ACL as opposed to Access Rules, which is what’s visible from the GUI. Here’s an example of one that shows both:


Note that it is ACL 17, but that distribute_inside list is only 10 rules long according to ASDM:


From the CLI, these mystery ACLs show up when I show access-list, but they don’t appear in show running-config. They all appear to be rules that have existed in the past and were deleted.

I can back these rules out one by one from the CLI, but there are hundreds, and I don’t want to run into this again. Can anyone tell me what’s going on here?

e: Even if I never touch ASDM again (and I'm considering it) about 5 other people will.

KS fucked around with this message at 05:56 on Dec 13, 2013

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply