Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Partycat
Oct 25, 2004

GreenNight posted:

Yeah I've spent the last few weeks migrating users to using Jabber as a softphone. You need the server software to be v12+ and then setup a phone on CallManager that uses Jabber instead of a hard phone.

Jabber does not require 12+

Adbot
ADBOT LOVES YOU

Thanks Ants
May 21, 2004

#essereFerrari


If I have APs in two offices that are across the road from each other which are connected via a VPN tunnel but otherwise don't share any infrastructure, am I better off putting all the APs into the same logical group and enabling L3 roaming, or trying to turn the Tx power on the APs down to such a low value that you drop off the network before you reach the other building?

There's no requirement for a connection to be maintained, and I'm 90% sure that trying to make sure the networks aren't visible outside the walls is the way to go.

Methanar
Sep 26, 2013

by the sex ghost

Thanks Ants posted:

If I have APs in two offices that are across the road from each other which are connected via a VPN tunnel but otherwise don't share any infrastructure, am I better off putting all the APs into the same logical group and enabling L3 roaming, or trying to turn the Tx power on the APs down to such a low value that you drop off the network before you reach the other building?

There's no requirement for a connection to be maintained, and I'm 90% sure that trying to make sure the networks aren't visible outside the walls is the way to go.

Build a faraday cage

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Partycat posted:

Jabber does not require 12+

No it doesn’t. But for our call center we needed jabber with multi line capability so apparently we had to go to 12. Earlier versions didn’t support it.

Partycat
Oct 25, 2004

Jabber 12.0 introduced multi line. There is a COP I think good down to UCM 10.5(2) to enable multi line - I think. 12.1 for multiline over MRA. Some limitations on functionality which can put him back on VPN which would be a problem if it disconnects every 2 hours, but it’s mostly usable for call center. Def don’t need UCM 12 for that .

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Yeah we have an MRA so we can use jabber outside but we’ve never tested voice via jabber via mra.

Tetramin
Apr 1, 2006

I'ma buck you up.

GreenNight posted:

Yeah I've spent the last few weeks migrating users to using Jabber as a softphone. You need the server software to be v12+ and then setup a phone on CallManager that uses Jabber instead of a hard phone.

Cucm doesn’t need to be 12+ for jabber. We run soft phones on 11.5 just fine.

E: err did not see the whole new page. Beaten.

Thanks Ants
May 21, 2004

#essereFerrari


Has anybody had any success getting Sonos gear to play nice on a network where people aren't all shoved onto the same broadcast domain? I have IoT stuff segregated from our wired PCs and our staff Wi-Fi and mDNS forwarding on our Aruba switches means that both sets of clients can print fine to AirPrint-enabled printers, send content to Apple TVs, discover Chromecasts etc. but I have no idea where to start with Sonos. Really trying to avoid dumping it all onto a user VLAN.

Partycat
Oct 25, 2004

For Sonos we said it would not work and is not supported.

They bought it anyways and we ended up shoving it onto a small VLAN with the people who needed to use it.

Airgroup doesn’t support it yet I don’t think but the last I looked there was some poo poo you could run on a rasp pi as a forwarder for it - that’s not enterprise either though.

Dalrain
Nov 13, 2008

Experience joy,
Experience waffle,
Today.
Same with us, not supported, they got it anyway. Same solution as well, you had to use a dedicated PC on a small VLAN to stream to it. It's very consumer oriented, no unicast option I could discern.

Kazinsal
Dec 13, 2011
Dealing with random crashes on small business switches where multiple stacks of them reboot several times a week. Find a bug where someone else is having the same issue.



"Terminated - A decision was made not to fix this bug."

Motherfucker.

Partycat
Oct 25, 2004

The SB has a number of terminated bugs that seem to be limitations - this sounds like a traffic thing that maybe can be filtered to save your bacon at least

Partycat
Oct 25, 2004

Dalrain posted:

Same with us, not supported, they got it anyway. Same solution as well, you had to use a dedicated PC on a small VLAN to stream to it. It's very consumer oriented, no unicast option I could discern.

We got an iPod setup on the same VLAN via a SSID for the ~executive space~ .

They had their own poo poo router which was less secure but otherwise less of my problem and I’d rather have left that.

Wireless speakers (I use older Korus SKAA myself) I can leave a laptop with the dongle and Spotify open and just play there. Many better options but people don’t like hearing no.

Kazinsal
Dec 13, 2011

Partycat posted:

The SB has a number of terminated bugs that seem to be limitations - this sounds like a traffic thing that maybe can be filtered to save your bacon at least

Current theory is that it's a problem with having more than two active etherchannels per switch on a stack. The stack with 3-4 etherchannels on some switches reboots. The stack with 1-2 per switch does not. They are all the same production run.

If there's seriously a limitation of two active etherchannels per stack I am going have lots of short angry words with someone

Farking Bastage
Sep 22, 2007

Who dey think gonna beat dem Bengos!
Obligatory I didn't initially set this up disclaimer.

My public garbage wifi traffic network has a 3850 MDF and a single ASA5525x . This obviously isn't a huge deal if it goes out for a few minutes, which I why I did it today. Plain old router on a stick setup. However, the circuit was bumped from 500 to 1g recently, and as I suspected, it's not going to see all that throughput because the trunk is a single 1g copper. There's vlan interfaces for the clients traffic, management, wifi controller backhauls, pretty standard stuff. Pointing out the obvious here that it's not optimal since all that intervlan traffic is being routed through that same port. I can operate Cisco, but I'm not an expert by any means.

I run over to the DC today to cure that bottleneck. As I feared there aren't any SFP+ cages on the ASA, so instead I decide to build a LAG between the 3850 and the ASA. Backed up both configs to tftp and I also like to paste them plaintext into a notepad++ additionally just in case. I set up the "port-channels"(hate that marketing bullshit term) carve out two unused ports on each device, and get ready to move the vlans from one interface to the LAG. Problem one: The ASA didn't seem capable of moving the vlans to another interface that I could find. I can accomplish this in two clicks on a Mikrotik, so that threw me. I was already in my window, so I copied all the subinterface code out of my handy little notepad++, make no int ge0/1.x commands, ctrl+H the existing commands to say port-channel 1.x, nuke the vlans off the old port Name the LAG "inside" and set security level to 1 and voila!

Problem 2: When I did that, the ASA decided to delete all the inside/outside NAT rules on the box. I pasted them back in from my notepad, but it did cause a brief loss of connectivity and dropped a couple of lan to lan tunnels temporarily. This is garbage traffic so no real harm done, but I want to learn from this. Is there a way to complete a task like this more cleanly on an ASA?

Tetramin
Apr 1, 2006

I'ma buck you up.
I’ve accidentally blown away NATs doing the exact same thing, I have not found a way around it but I hope somebody else has an answer. It seems ASAs like to delete config statements that have dependencies without telling you before. Same thing with removing an ACL(iirc) will delete your matching cryptomap match statement

Farking Bastage
Sep 22, 2007

Who dey think gonna beat dem Bengos!
I got a really good answer elsewhere. Posting for educational purposes.

quote:

With ASA firewalls I save the configuration to a TFTP server, edit it, copy it back as startup-config, and reboot when I have to re-arrange interfaces.

This avoids the unit forgetting most everything. It does cause an outage, but it can be scheduled.

Thanks Ants
May 21, 2004

#essereFerrari


That’s a good workaround but AFAIK there’s no way to pre-validate the config so you’ve just got to hope that you’ve made no mistakes and that it loads it properly on the reboot.

Contingency
Jun 2, 2007

MURDERER
I tried "copy start run" once to avoid a reboot, and it ends up merging configs.

ragzilla
Sep 9, 2005
don't ask me, i only work here


Contingency posted:

I tried "copy start run" once to avoid a reboot, and it ends up merging configs.

ASA doesn’t have “configure replace” sadly.

abigserve
Sep 13, 2009

this is a better avatar than what I had before
Build a delta (all the commands you want to run) and copy it to run is the best method. There is no way to get around the "deleting this will delete all its dependencies" so you just have to assume it will all the time

BaseballPCHiker
Jan 16, 2006

Anyone ever work much with CWDM fiber?

We're having a really strange issue, and I am not a fiber expert at all, with one of our fiber channels. Its the same dark fiber between multiple sites, all of the sudden its like we were bleeding trunks and looped the network, storm control kicked in shut off interfaces and then everything came back up except for one specific 1390 wavelength.

My understanding is that those muxes are passive devices, there isnt much to them. Is it possible for them to go bad and like combine wavelengths somehow? Maybe just the optics got messed with, like they put on an OTDR to do testing somewhere and burned an optic? Im at a complete loss.

ragzilla
Sep 9, 2005
don't ask me, i only work here


BaseballPCHiker posted:

Anyone ever work much with CWDM fiber?

We're having a really strange issue, and I am not a fiber expert at all, with one of our fiber channels. Its the same dark fiber between multiple sites, all of the sudden its like we were bleeding trunks and looped the network, storm control kicked in shut off interfaces and then everything came back up except for one specific 1390 wavelength.

My understanding is that those muxes are passive devices, there isnt much to them. Is it possible for them to go bad and like combine wavelengths somehow? Maybe just the optics got messed with, like they put on an OTDR to do testing somewhere and burned an optic? Im at a complete loss.

Muxes are passive, transceivers can drift but it really depends on how your mux is constructed what happens when they do (good muxes will have input filters, bad muxes don't). If you don't have an OSA I'd swap transceivers on 1390 and 1410 (and 1370 if using an extended channel system) on the affected span and see if that resolves your issue (and while you're at it, double check light levels/clean end faces/check that nobody miswired anything if OTDR testing was done).

ate shit on live tv
Feb 15, 2004

by Azathoth
Also check your light levels on both sides
pre:
show interface transciever
or use a light meter.

Tetramin
Apr 1, 2006

I'ma buck you up.
Been getting flooded reports from nearly all of our locations of wireless phones dropping calls. Checked the AP settings in the controller and the flexconnect tagging for or voice subnet was set back to 1 on about HALF of our APs so phones were reregistering with a VLAN 1 ip when they roamed.

How the gently caress could this happen? They were absolutely all set correctly before. At least the web UI for the wireless controller is a piece of poo poo and loses your search after you go into an AP and fix it.. its great.

e: it looks like the tagging settings for the affected APs got set to 'wlan specific' which isnt configured, the ones that remain correct are all AP-specific, hmm.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

So uh, what's the hottest a Cisco switch can be before failure? Getting some alerts from Solarwinds that a switch hit 120F in one of our manufacturing facilities.

Kazinsal
Dec 13, 2011
That's probably pushing it. Cat9200s are rated for an environmental temperature of 45 C. 3850s as well. Wouldn't be surprised if the rest of the lineup is similar.

You might want to look into proper industrial switches. The Catalyst IE4010 is good up to 75 C.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Yeah these are 3560x's. That's a good idea, for refresh time. The issue is we tend to put brand new switches in the main closet and these are edge switches with a few timeclocks and AP's running off them. Very low use.

Kazinsal
Dec 13, 2011
There's some smaller industrial switches that you can get with 8-12 ports (modular, too) but they're DIN rail instead of half width 1 RU or desktop. Pretty sure they're all PoE. I don't know what the cost difference is between them and the 1RU ones is though. Only problem with the IE series is you need to wire a power lead into them yourself, but IIRC there's a kit included.

Thanks Ants
May 21, 2004

#essereFerrari


The other option is to run the cables back to a location that doesn't require a switch that can cope with extreme temperatures, and if the distances are too long for copper then maybe drop fibre to each one. Even if it works out costing the same it will make maintenance a lot more pleasant in future.

wolrah
May 8, 2006
what?

Thanks Ants posted:

Even if it works out costing the same it will make maintenance a lot more pleasant in future.

There's a lot to be said for this. I have quite a few phone systems that are located in mechanical rooms, so it's hot and often noisy. Not fun.

Partycat
Oct 25, 2004

Proper env is a thing - even if it’s a small cabinet with fans.

In my experience they will get up to “RED” thermal and cry about shutdown - I have never had the switch shut itself down since I don’t know that it is capable. The power supply will eventually turn off due to thermal somewhere around there .

It may decrease the mTBF but if you are on 5 - 7 year replacement cycle then it should be okay .

Moey
Oct 22, 2010

I LIKE TO MOVE IT
I've had transceivers seemingly die during an AC failure. Reseated the dead ones, they came back to life.

Partycat
Oct 25, 2004

We had glitches way back on the 12.2 IOS where negotiation would fail or it would come up “auto” speed and break bundling until cycled. Maybe it’s that ?

klosterdev
Oct 10, 2006

Na na na na na na na na Batman!
How well does OSI troubleshooting work vertically? Eg because I know layer 3 works fine (no dropped packets to destination), I can rule out layer 1 as the reason for connectivity issues to that device, but would that also allow me to rule out layer 2?

Methanar
Sep 26, 2013

by the sex ghost

klosterdev posted:

How well does OSI troubleshooting work vertically? Eg because I know layer 3 works fine (no dropped packets to destination), I can rule out layer 1 as the reason for connectivity issues to that device, but would that also allow me to rule out layer 2?

Its possible to have flapping vlans/vxlans, or maybe some kind of l2 qos problems (ASK ME ABOUT ESXI STANDARD VSWITCHES) that cause intermittent issues. Or maybe IP address conflicts and your arp tables are getting confused periodically.

Docjowles
Apr 9, 2009

I think that reasoning breaks down pretty quickly. MTU mismatches are a good example. Pings work, TCP sessions get established, etc, basic tests look fine. But when you start to put load on the link, it becomes very erratic, dropping packets left and right. So in that case, layer 3 and up were actually fine, but the MTU at layer 2 was wrong. So your "I can ping, gotta be higher up the stack" premise falls apart. Wrong speed/duplex settings on an interface causing it to be at 10/Half or some poo poo are another one off the top of my head. That would probably look OK during cursory testing, but perform like utter rear end under load.

e: wtf I have to get used to a new Methanar avatar?

Methanar
Sep 26, 2013

by the sex ghost

Docjowles posted:

I think that reasoning breaks down pretty quickly. MTU mismatches are a good example. Pings work, TCP sessions get established, etc, basic tests look fine. But when you start to put load on the link, it becomes very erratic, dropping packets left and right. So in that case, layer 3 and up were actually fine, but the MTU at layer 2 was wrong. So your "I can ping, gotta be higher up the stack" premise falls apart. Wrong speed/duplex settings on an interface causing it to be at 10/Half or some poo poo are another one off the top of my head. That would probably look OK during cursory testing, but perform like utter rear end under load.

e: wtf I have to get used to a new Methanar avatar?

I got red titled. I should probably change it back.

Partycat
Oct 25, 2004

If he’s saying no dropped packets - assuming you’re looking at the right data like application data instead of ICMP then that should rule out some of those problems . If we’re also saying we’ve examined window sizing and retransmission rates then it can go a bit further.

OSI is not always a good way to approach an issue as things are interrelated between the “layers” making not everything as easy to compartmentalize as it would seem.

Adbot
ADBOT LOVES YOU

Moey
Oct 22, 2010

I LIKE TO MOVE IT
Anyone here working with Fortinet firewalls? What are your opinions on them?

Looking to replace a half dozen SRX240H2 firewalls. My kneejerk reaction was just 2x SRX1500 clustered at each site, but at a similar price point, the FortiGate 500E seems to exceed the performance and are pretty highly reviewed.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply