Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Slickdrac
Oct 5, 2007

Not allowed to have nice things
According to snmp logging, we're randomly overclocking the hell out of our 5520s

Message: ASA 5520 Adaptive Security Appliance has exceeded threshold: (90%) currently (4294964%)

Anyone seen this before? They always start out 42949, just the last two digits change.

Adbot
ADBOT LOVES YOU

netmazk
Jun 15, 2003
Check out Cisco bug CSCto53782 for the ASA CPU usage - the misreporting is only cosmetic.

sudo rm -rf
Aug 2, 2011


$ mv fullcommunism.sh
/america
$ cd /america
$ ./fullcommunism.sh


What's the proper way to handle PIM rendezvous points in a vPC topology where my two N5Ks are also serving as gateways for my multicasting VLANs? Should I use BSR? What interfaces would I use for it? Here's what the SVIs look like:

code:
N5K-1

interface Vlan20
  no shutdown
  description Headend-VLAN
  vrf member ec-lab-1
  ip address 10.253.0.253/18
  ip pim sparse-mode
  hsrp version 2
  hsrp 20
    preempt
    priority 110
    ip 10.253.0.254

interface Vlan24
  no shutdown
  description BFS-Multicast-Interface
  vrf member ec-lab-1
  ip address 172.16.40.253/24
  ip pim sparse-mode
  hsrp version 2
  hsrp 24
    preempt
    priority 110
    ip 172.16.40.254
  ip dhcp relay address 10.253.0.1
  ip dhcp relay address 172.16.40.0


N5K-2

interface Vlan20
  no shutdown
  description Headend-VLAN
  vrf member ec-lab-1
  ip address 10.253.0.252/18
  ip pim sparse-mode
  hsrp version 2
  hsrp 20
    ip 10.253.0.254

interface Vlan24
  no shutdown
  description BFS-Multicast-Interface
  vrf member ec-lab-1
  ip address 172.16.40.252/24
  ip pim sparse-mode
  hsrp version 2
  hsrp 22
    ip 172.16.40.254
  ip dhcp relay address 10.253.0.1
  ip dhcp relay address 172.16.40.0

jwh
Jun 12, 2002

Auto RP would work just fine, I guess. I've never configured BSR, but that would work too (and works in combination with auto rp).

sudo rm -rf
Aug 2, 2011


$ mv fullcommunism.sh
/america
$ cd /america
$ ./fullcommunism.sh


Yeah I haven't done either, so I guess my question would be - what interface do you use? Other than my SVIs, I don't have any layer 3 interfaces for the N5Ks. Looking at a configuration guide led me to believe that you would use a loopback interface, but if the second N5K doesn't have a route to the first N5K's loopback I'm not sure how that would work.

1000101
May 14, 2003

BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY FRUITCAKE!

sudo rm -rf posted:

Yeah I haven't done either, so I guess my question would be - what interface do you use? Other than my SVIs, I don't have any layer 3 interfaces for the N5Ks. Looking at a configuration guide led me to believe that you would use a loopback interface, but if the second N5K doesn't have a route to the first N5K's loopback I'm not sure how that would work.

Add your loopbacks to your IGP or create a static route on each 5k. I prefer the first method myself.

As an aside I also use loopbacks for in-band management as well.

Edit: seeing your config, don't forget to put the loopbacks in the appropriate vrf.

sudo rm -rf
Aug 2, 2011


$ mv fullcommunism.sh
/america
$ cd /america
$ ./fullcommunism.sh


I don't have an IGP running. The only routing going on is between my VLANs. Would that break multicast in a vPC topology?

You can tell this is pretty new to me.

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Anyone else using an ASR9k?

The more we use them the worse the feeling I get about having them as our core.

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
Yep. 9010 and 9922's all over the place. I am still waiting for someone to forget about layer 2 loops. I've configured 4 9010's myself (from turboboot to routing) and two 9922's in the next month, hands down my favorite part of this contract.

Zuhzuhzombie!!
Apr 17, 2008
FACTS ARE A CONSPIRACY BY THE CAPITALIST OPRESSOR
Having weird problems with it. IPv6 funkiness, SNMP processes crashing, eigrp issues...

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k
What version of code? TAC involved?

ragzilla
Sep 9, 2005
don't ask me, i only work here


Zuhzuhzombie!! posted:

Having weird problems with it. IPv6 funkiness, SNMP processes crashing, eigrp issues...
Only ipv6 funkiness I've noticed is in 4.1.0 it doesn't honor advertise-passive-only in ISIS. Are you up to date on SMUs?

Sepist posted:

Yep. 9010 and 9922's all over the place. I am still waiting for someone to forget about layer 2 loops. I've configured 4 9010's myself (from turboboot to routing) and two 9922's in the next month, hands down my favorite part of this contract.
I think they have some pvst/mst interop modes in 5.0 or 5.1, or there's always l2protocol-tunnel and rely on the switches to block the loop. In our DC edge app I'm looking at moving to NV edge to get rid of STP on my aggregation-access tier (do 2x10G NV Edge LAG down to access).

ragzilla fucked around with this message at 22:52 on Jun 19, 2014

1000101
May 14, 2003

BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY BIRTHDAY FRUITCAKE!

sudo rm -rf posted:

I don't have an IGP running. The only routing going on is between my VLANs. Would that break multicast in a vPC topology?

You can tell this is pretty new to me.

It won't;

Worse come to worse if you just have the 2 switches in your environment you could create a static route pointing towards the loopbacks. OSPF/EIGRP won't screw up multicast.

How many switches/routers do you have in your whole environment that'd need to reach your RPs?

bad boys for life
Jun 6, 2003

by sebmojo

Zuhzuhzombie!! posted:

Anyone else using an ASR9k?

The more we use them the worse the feeling I get about having them as our core.

I work at a large MSO and we have them as our edge routers, CRSs as the core (but were moving to the new version of the CRS, been labbing it).

Make sure youre on newer code, at least 4.2.3, or youre going to run into lots of odd issues.

Ive configured dozens of 9001s, 9006s and 9010s, and we havent had any issues since upgrading the code. We have probably 400 in the network now.

jwh
Jun 12, 2002

3850 trip report: things went very well, had no trouble with the three I brought up in Boston this past Monday.

It's nice to see that Cisco finally managed to make IOS ugprades a 'one-touch' affair, because that sure as anything never worked all that great on the 3750s.

Nice switches, I guess. The buffers aren't exactly huge, but they're 2x the 3750s.

Count Thrashula
Jun 1, 2003

Death is nothing compared to vindication.
Buglord
I have an ASA issue that has me about to pull my hair out.

Here's the setup:

[me] ---> [10.7.6.0/23] ---> [10.24.0.0/23] ---> [ASA1] --->crosscountry<--- [ASA2] <--- [10.8.8.0/24]

The problem I have is with the two ASAs. I have an IPSEC tunnel set up that's currently working, active, and all good. I can ping the address of ASA2 just fine (10.8.8.1) from me (10.7.6.182), but can't ping anything past it, on the 10.8.8.0/24 network.

However, PCs on the 10.8.8.0/24 network can ping me just fine! I've checked my NAT 0 stuff, I've checked my ACLs against each other. I'm not sure what's going on. If I run (from ASA2) "packet-tracer input outside icmp 10.7.6.182 0 0 10.8.8.1" it passes, but if I run the same with "10.8.8.81" at the end, for example, it gets "dropped by acl rule".

Here are the two configs if anyone has a moment to look at them:

ASA1 - http://pastebin.com/X5BrA2Xr
ASA2 - http://pastebin.com/Eac0jfAj

Sepist
Dec 26, 2005

FUCK BITCHES, ROUTE PACKETS

Gravy Boat 2k

bad boys for life posted:

Make sure youre on newer code, at least 4.2.3, or youre going to run into lots of odd issues.

But not 4.3.2, which is a pile of poo poo

QPZIL posted:

I have an ASA issue that has me about to pull my hair out.

Here's the setup:

[me] ---> [10.7.6.0/23] ---> [10.24.0.0/23] ---> [ASA1] --->crosscountry<--- [ASA2] <--- [10.8.8.0/24]

The problem I have is with the two ASAs. I have an IPSEC tunnel set up that's currently working, active, and all good. I can ping the address of ASA2 just fine (10.8.8.1) from me (10.7.6.182), but can't ping anything past it, on the 10.8.8.0/24 network.

However, PCs on the 10.8.8.0/24 network can ping me just fine! I've checked my NAT 0 stuff, I've checked my ACLs against each other. I'm not sure what's going on. If I run (from ASA2) "packet-tracer input outside icmp 10.7.6.182 0 0 10.8.8.1" it passes, but if I run the same with "10.8.8.81" at the end, for example, it gets "dropped by acl rule".

Here are the two configs if anyone has a moment to look at them:

ASA1 - http://pastebin.com/X5BrA2Xr
ASA2 - http://pastebin.com/Eac0jfAj


show run all | i sysopt - are your vpn tunnels configured to bypass acl check? If not are you explicitly allowing echo AND echo reply in your interface acl?

Sepist fucked around with this message at 22:31 on Jun 26, 2014

GOOCHY
Sep 17, 2003

In an interstellar burst I'm back to save the universe!
Those ACLs and NAT exemption statements look proper to me. This isn't something goofy with the far end network hosts and Windows firewall is it?

FatCow
Apr 22, 2002
I MAP THE FUCK OUT OF PEOPLE


Anyone have very obvious traffic deviations because of the World Cup game? This is from a major US telephone network.

Count Thrashula
Jun 1, 2003

Death is nothing compared to vindication.
Buglord

GOOCHY posted:

Those ACLs and NAT exemption statements look proper to me. This isn't something goofy with the far end network hosts and Windows firewall is it?

GOOCHY posted:

This isn't something goofy with the far end network hosts and Windows firewall is it?

GOOCHY posted:

Windows firewall is it?

:stare: God drat it. I need a stiff drink now. Ugh. loving Windows firewall.

ragzilla
Sep 9, 2005
don't ask me, i only work here


FatCow posted:



Anyone have very obvious traffic deviations because of the World Cup game? This is from a major US telephone network.

We just turned up a new transit, and cacti (loving cacti) was polling the 32bit counter, so I lost any decent statistics I might have gathered.

GOOCHY
Sep 17, 2003

In an interstellar burst I'm back to save the universe!

QPZIL posted:

:stare: God drat it. I need a stiff drink now. Ugh. loving Windows firewall.

Glad to hear it's just that - coming from a grizzled veteran who is four Deschutes Fresh Squeezed in after a day of IT soul crushing.

CrazyLittle
Sep 11, 2001





Clapping Larry

FatCow posted:



Anyone have very obvious traffic deviations because of the World Cup game? This is from a major US telephone network.

hahahah yeah. Got a few unhappy campers this morning who were even less happy when I showed them they were basically DDoS'ing themselves with world cup streams.

Contingency
Jun 2, 2007

MURDERER
Catalyst 2960XR w/ IP Lite: poor man's layer 3 switch, or is a C3650 the minimum for intervlan routing?

Contingency fucked around with this message at 20:04 on Jul 1, 2014

jwh
Jun 12, 2002

I believe the Cat 2960s (all of them?) will allow you to make a single SVI, but that's it.

Fatal
Jul 29, 2004

I'm gunna kill you BITCH!!!

Contingency posted:

Catalyst 2960XR w/ IP Lite: poor man's layer 3 switch, or is a C3650 the minimum for intervlan routing?

We don't have anything in the field yet but should be deploying some thing summer. Yet to be seen, pim performance. Also no EIGRP if that's your thing (it is for us).

Basically I would be wary of the whole thing, it seems like it encroaches on the 3560/3750X space a bit too much so I'm waiting for the other shoe to drop on where Cisco cut corners.

Edit: As mentioned below you get EIGRP stub which is somewhat useful I guess...

Fatal fucked around with this message at 22:19 on Jul 1, 2014

Richard Noggin
Jun 6, 2005
Redneck By Default

jwh posted:

I believe the Cat 2960s (all of them?) will allow you to make a single SVI, but that's it.

You can create multiple SVIs (8?) on a 2960, at least with LAN Base. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swipstatrout.html and http://blog.alwaysthenetwork.com/tutorials/2960s-can-route/

Note that this doesn't work on 3750s with the LAN Base - just the 2960 series.

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

I believe the Cat 2960s (all of them?) will allow you to make a single SVI, but that's it.

-XR adds 'IP Lite' (even lower than IP Base) level of L3 features:

quote:

What features does IP Lite bring to the 2960-XR switch models?
A. IP Lite introduced enterprise access Layer 3 features to the 2960-XR switch models. IP Lite is subset of IP
Base features. Some of the IP Lite features are:
● Routing Information Protocol (RIP) v1
● Routing Information Protocol (RIP) v2
● Open Shortest Path First (OSPF) v2 stub
● Open Shortest Path First (OSPF) v3 stub
● Enhanced Interior Gateway Routing Protocol (EIGRP) stub
● Equal-cost routing
● Hot Standby Router Protocol (HSRP)
● Protocol Independent Multicast PIM (Sparse Mode, Dense Mode, Sparse Dense Mode, Source Specific
Multicast) stub
● Virtual Router Redundancy Protocol (VRRP) for IPv4
● Private VLAN
● IPv6 First Hop Security source guard
● Per-VLAN and per-port policers

Very poor man's L3 switch, but if you can live with that featureset you should be fine. Supports ~4k adjacent hosts (http://www.cisco.com/c/en/us/td/doc...8DB28FB6755DA38).

jwh
Jun 12, 2002

Well that's interesting! I didn't know that.

Bob Morales
Aug 18, 2006


Just wear the fucking mask, Bob

I don't care how many people I probably infected with COVID-19 while refusing to wear a mask, my comfort is far more important than the health and safety of everyone around me!

I guess this is an Adtran question but it's similar to IOS so I'll ask anyway:

We have our Adtran Netvanta 3348 doing our routing/firewall duties. We also have a Linksys E1200 wireless AP deal that we want to use as a 'guest' wifi network, as we have another AP that allows access to our internal network. Actually, they both do, one is just using NAT the other is just an AP but that's what I'm trying to fix. In theory nothing prevents a guest user from accessing our internal network.

My first thought was to make an ACL that only allows traffic from the guest AP to our router (and to no other IP addresses, such as our servers), but apparently you can't use an ACL to split up traffic on the same subnet.

Any suggestions? Buying 'real' wireless hardware isn't really in the budget right now (but will be in the future). Should I just plug the guest AP into our internet connection on a free IP address (I think we have 10)?

wolrah
May 8, 2006
what?
If the second Ethernet is available I'd create the guest subnet there and attach any APs in a bridged mode to that.

If its in use or if I'm misunderstanding that model (assuming the switch ports are internally seen as eth3 or such) then you could do the same with VLANs.

Basically the Adtran sees two different LANs and can firewall them as you want. Since you say you have multiple IPs I think it's even possible to have them NAT through different ones so youll know if any complaints are about trusted or guest users.

some kinda jackal
Feb 25, 2003

 
 
Not to turn this into my own personal livejournal about Fortigate, but I had another 200B die on me today. I swear to god I'd switch to another brand if we weren't a reseller for these pieces of poo poo.

I'm going to feel guilty every time I install these at clients' now.

https://www.youtube.com/watch?v=WsBB93IqJkE

some kinda jackal fucked around with this message at 01:10 on Jul 3, 2014

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS

Martytoof posted:

Not to turn this into my own personal livejournal about Fortigate, but I had another 200B die on me today. I swear to god I'd switch to another brand if we weren't a reseller for these pieces of poo poo.

I'm going to feel guilty every time I install these at clients' now.

https://www.youtube.com/watch?v=WsBB93IqJkE

I think they're finally using SSDs in the 100+ model range in newer revs, but I've had about 4 60Cs fail out of probably 50 or so which is higher than we'd like when these things are in the middle of the ocean. Fortunately they're cheap and HA is great so our bigger customers always have two running together.

Contingency
Jun 2, 2007

MURDERER

Richard Noggin posted:

You can create multiple SVIs (8?) on a 2960, at least with LAN Base. http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swipstatrout.html and http://blog.alwaysthenetwork.com/tutorials/2960s-can-route/

Note that this doesn't work on 3750s with the LAN Base - just the 2960 series.

Ah...SVI. I've seen that term, but never picked up on it until now. In Dell land, a routable VLAN is just that.

I get the impression that there's some potential gotchas lurking. The config guide for the XR says the SVI limit is 128 (page 21), so it appears adequate from an interface standpoint. Are Cisco switches underpowered CPU-wise? It just seems unlikely that Cisco would have a stripped down Layer 3 switch undercutting its competition on price.

BurgerQuest
Mar 17, 2009

by Jeffrey of YOSPOS
I don't think anyone markets the 2960 series switch as a layer 3 switch. Yes, it has some basic layer 3 capabilities, but calling them 'stripped down' doesn't really go far enough. I guess if you're super budget conscious they might get you by. We use heaps of them, but with a router.

jwh
Jun 12, 2002

Contingency posted:

Are Cisco switches underpowered CPU-wise?

It really depends on how you look at it, and what you're asking the processor to do.

jwh
Jun 12, 2002

Contingency posted:

It just seems unlikely that Cisco would have a stripped down Layer 3 switch undercutting its competition on price.

Cisco does crazy things. Even inside Cisco, business units compete with each other, often for no good reason.

Fatal
Jul 29, 2004

I'm gunna kill you BITCH!!!

Martytoof posted:

Not to turn this into my own personal livejournal about Fortigate, but I had another 200B die on me today. I swear to god I'd switch to another brand if we weren't a reseller for these pieces of poo poo.

I'm going to feel guilty every time I install these at clients' now.

https://www.youtube.com/watch?v=WsBB93IqJkE

Oh yes, in my limited experience with Fortigate, gently caress them. Yes, I would like a HA pair to have the primary fail in a way that the secondary can't detect (it hard locked btw, no console/ping response), causing a complete edge failure.

jwh posted:

Cisco does crazy things. Even inside Cisco, business units compete with each other, often for no good reason.

Which is exactly what the XR line is doing. It's such a weird place for a switch but I guess it gets distributed routing going further away from the "core" into some weird collapsed distribution/access model. The more I think about it, the more I like it though.

Fatal fucked around with this message at 18:49 on Jul 3, 2014

ragzilla
Sep 9, 2005
don't ask me, i only work here


jwh posted:

Cisco does crazy things. Even inside Cisco, business units compete with each other, often for no good reason.

Each BU has it's own internal P&L, that's their reason to compete.

Adbot
ADBOT LOVES YOU

some kinda jackal
Feb 25, 2003

 
 

Fatal posted:

Oh yes, in my limited experience with Fortigate, gently caress them. Yes, I would like a HA pair to have the primary fail in a way that the secondary can't detect (it hard locked btw, no console/ping response), causing a complete edge failure.

That's really weird that the HA slave didn't pick it up though. Seems like a non-response like that would have explicitly triggered the heartbeat fail detector. Anyway, gently caress Fortigate v:q:v

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply