Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
single-mode fiber
Dec 30, 2012


Met this dude while hiking one time. Super chill, even put up with some of my questions.

Adbot
ADBOT LOVES YOU

single-mode fiber
Dec 30, 2012

tortilla_chip posted:

Anyone attending Cisco Live in Orlando?

e: And like beer?

Ixia unleashed a horrible blight on the conference with their fedora giveaways. The shortest blue haired girl at the VSS Monitoring booth was super cute, though; I definitely feigned a lot of interest in their product.

single-mode fiber
Dec 30, 2012

veedubfreak posted:

This isn't really a short question because it requires a little bit of background, but I'm guessing it's something simple I'm overlooking and it's getting on my last god damned nerve.

With UCM 9.0 you can add a calling queue to hunt groups. Ok so I have a hunt group that does what it is supposed to do. But, when you call it, you just get the lovely Cisco hold music and that was apparently confusing the people calling it. So I was asked to add a message telling people they are going into queue. So I created a call handler. This call handler plays a message and the is supposed to transfer to the hunt group. Here's where the issue happens. I have a transfer rule in place but I can't get the fucker to work. It always dumps them back into the "after message action" and I can't seem to get it to do the transfer. Anyone know what I'm possibly missing?

TL:DR version. How do I make this call handler actually transfer to the huntgroup?

Ah, I was finally able to figure out what was missing. Apparently you have to forward the drat call handler back to itself to make the transfer rules do their job.

I'm pretty sure the whole point of including this feature is to just make you wish you bought UCCX, too.

single-mode fiber
Dec 30, 2012

So I've got the following output of a CBWFQ QoS policy, applied in the outbound direction on an interface:

code:
Class-map: Q4 (match-any)
          6891549 packets, 4649188330 bytes
          5 minute offered rate 5000 bps, drop rate 0 bps
          Match:  precedence 0
            6891549 packets, 4649188330 bytes
            5 minute rate 5000 bps
          Match:  precedence 1
            0 packets, 0 bytes
            5 minute rate 0 bps
          Match:  dscp default (0) 1  2  3  4  5  6  7
            0 packets, 0 bytes
            5 minute rate 0 bps
          Match:  dscp cs1 (8) 9  af11 (10) 11  af12 (12) 13  af13 (14) 15
            0 packets, 0 bytes
            5 minute rate 0 bps
          Queueing
          queue limit 64000 bytes
          (queue depth/total drops/no-buffer drops) 0/30910/0
          (pkts output/bytes output) 6860639/4650812932
          bandwidth 750 kbps
            Exp-weight-constant: 9 (1/512)
            Mean queue depth: 6 bytes
            class     Transmitted       Random drop      Tail drop          Minimum        Maximum     Mark
                      pkts/bytes     pkts/bytes       pkts/bytes          thresh         thresh     prob
                                                                              bytes         bytes
            0         6148954/4570143783  11039/16127605    1791/2586366        58000         64000  1/10
            1               0/0               0/0              0/0              58000         64000  1/10
            2               0/0               0/0              0/0               5000          8000  1/10
            3               0/0               0/0              0/0               5500          8000  1/10
            4               0/0               0/0              0/0               6000          8000  1/10
            5               0/0               0/0              0/0               6500          8000  1/10
            6          711685/80669149        4/1352       18076/2267676         7000          8000  1/10
            7               0/0               0/0              0/0               7500          8000  1/10

        Class-map: class-default (match-any)
          0 packets, 0 bytes
          5 minute offered rate 0 bps, drop rate 0 bps
          Match: any

          queue limit 64 packets
          (queue depth/total drops/no-buffer drops) 0/0/0
          (pkts output/bytes output) 0/0
Am I going bananas over here? Where it breaks out the transmit/random/tail drop by classes 0 through 7, aren't those 0 through 7 values the IP precedence values of the packets?

single-mode fiber fucked around with this message at 23:50 on Dec 19, 2013

single-mode fiber
Dec 30, 2012

I ended up biting the bullet and calling TAC. Originally the problem was that BGP to the RRs on the far end was flapping like wild whenever the site started hitting like 10% of their circuit capacity. So, I was expecting to find tail drops in the P2 queue (presumably the keepalives), since that was explicitly just for CS6 kind of stuff, not the P4 queue. But, after looking over some other sites, they're having a lot of weird QoS poo poo go on, they just haven't noticed yet (or don't care).

single-mode fiber
Dec 30, 2012

The overall setup looked like this. Curious part is that the P2 queue does get an awful lot of matches (far more transmitted packets than what showed up as class 6 transmit packets in the P4 queue), and 0 drops of any kind.

code:
class-map match-any Q2
 match  precedence 4
 match  precedence 6
 match  precedence 7
 match  dscp cs4  33  af41  35  af42  37  af43  39
 match  dscp cs6  49  50  51  52  53  54  55
 match  dscp cs7  57  58  59  60  61  62  63
class-map match-any Q3
 match  precedence 2
 match  precedence 3
 match  dscp cs2  17  af21  19  af22  21  af23  23
 match  dscp cs3  25  af31  27  af32  29  af33  31
class-map match-any Q1
 match  precedence 5
 match  dscp cs5  41  42  43  44  45  ef  47
class-map match-any Q4
 match  precedence 0
 match  precedence 1
 match  dscp default  1  2  3  4  5  6  7
 match  dscp cs1  9  af11  11  af12  13  af13  15
!
!
policy-map All_Agency_CBWFQ
 class Q1
  police 995000 conform-action transmit  exceed-action drop
  priority
  queue-limit 32000 bytes
 class Q2
  bandwidth 550
  queue-limit 32000 bytes
  random-detect
  random-detect precedence 4 28000 bytes 32000 bytes
  random-detect precedence 6 28000 bytes 32000 bytes
  random-detect precedence 7 28000 bytes 32000 bytes
 class Q3
  bandwidth 550
  queue-limit 32000 bytes
  random-detect
  random-detect precedence 2 28000 bytes 32000 bytes
  random-detect precedence 3 28000 bytes 32000 bytes
 class Q4
  bandwidth 750
  queue-limit 64000 bytes
  random-detect
  random-detect precedence 0 58000 bytes 64000 bytes
  random-detect precedence 1 58000 bytes 64000 bytes
policy-map OUT
 class class-default
  shape average 3000000
  service-policy All_Agency_CBWFQ

single-mode fiber fucked around with this message at 23:51 on Dec 19, 2013

single-mode fiber
Dec 30, 2012

The bug is on some NICs with Intel chipsets, that causes flooding of IPv6 MLD packets, when the machine hosting the NIC is put to sleep, but also has wake on LAN. There is a bug on 2960s, prior to the X model, which may not be published yet, but, if the router alert flag is set in those bogus MLD packets, it will kick each one to the processor path (in addition to flooding it everywhere throughout the ingress VLAN, if you don't have MLD snooping enabled), even if you have no IPv6 routing going on.

single-mode fiber
Dec 30, 2012

Yeah, updating the NIC drivers is the best way to go, but, depending on the requirements of your environment, MLD snooping should work, IPv6 ACL that drops inbound v6 traffic (may require changing the SDM template depending on which switches you have), storm control, control plane policing, all of those will work and keep your switch CPUs from melting down. When I encountered this in the wild, it was for an org where they insisted on having thousands of users concentrated on just a couple VLANs, so, whenever the NIC bug would occur, it would be slam job dot com.

single-mode fiber
Dec 30, 2012

Is it CUCM or CME? If it's the former, we used to have the best luck just putting it on the CUCM node serving TFTP (don't even need to do the cop.sgn install, you can just download the raw .loads file and friends if you poke around on Cisco's site) and changing the phone's load name on the phone configuration page (or on the device pool, or on the phone default settings page, depending on how widespread the upgrade was supposed to be).

single-mode fiber
Dec 30, 2012

Docjowles posted:

One due to "vandalism" (we never found out what this meant)

Lots of fiber in that area is aerial because it's too expensive to bury in the mountain, it's not uncommon for people to try to break the fiber or hit repeaters with buckshot

single-mode fiber
Dec 30, 2012

If call quality is exceedingly important to you, for calls from one office to another, then I would stick with your MPLS VPN for take the sake of getting to maintain your DSCP/CoS tags. However, I'll also say that, even in an MPLS VPN, where troubleshooting call quality can theoretically be done end to end, it can quickly become a total nightmare to try to pull this off, especially if you have centralized border controllers in an offsite data center. If the cost differential between commercial broadband and MPLS is pretty large, then I'd say go for it, especially if you can dump the trouble of maintaining and troubleshooting all those different telco circuits onto a chump-rear end MSP like the one funk_mata is describing. Cell phones, and their attendant call quality, are so ubiquitous now that, as long as your VoIP calls don't sound any worse than a cell phone, users aren't really going to complain.

single-mode fiber
Dec 30, 2012

Hate to be that guy but is it Unity or Unity Connection?

single-mode fiber
Dec 30, 2012

I read it as the bolded part was not in the command, and with disaster in hindsight, the emphasis on the crucial word to prevent future similar mistakes.

single-mode fiber
Dec 30, 2012

We have it on 7Ks acting as collapsed core and did not have any trouble with failover. I think one or two pings from workstations to Level 3 were lost, but phones certainly never lost enough heartbeats to go into SRST.

single-mode fiber
Dec 30, 2012

Sepist posted:

Are you using FEX's on your 7k's? Apparently it was a 4-minute full outage but the onsite guy failed to tell me that. They have tested this successfully in the past but they have added FEX since that test. I know the 7k locks up during dual-homed FEX sync, not sure if the 5k does. I hope not.

Edit: Turns out they forgot to run a second trunk cable so they lost all access when the one carrying all the traffic was powered off. Finally, not a cisco bug :toot:

Looks like your problem is resolved but our FEXs are not dual homed, we did the topology where dual uplinks go to different line cards on one 7K chassis, and there's 2 FEXs in top of rack.

single-mode fiber
Dec 30, 2012

mythicknight posted:

Sanity check since I haven't dealt with switch stacks in a long while. I have a 2960 that I want to add another 2960 to to make a stack. The current switch has priority 10 and is already operating and the one being prepped is wiped/at default (1). Am I wrong in thinking I just rack the second switch, hook up the stack cables, and power the switch up?

Software versions need to match or it won't join the stack. Newer switches support automatic software upgrade but I don't think 2960 line does. You can save yourself a little bit of time by doing a switch 2 provision (model) on the one to be your new stack master, so you can configure interfaces ahead of time.

single-mode fiber
Dec 30, 2012

Apparently the part in question is the Intel Atom C2000 series, so there may be quite a few things that'll be toast if there's no way to do a firmware patch.

single-mode fiber
Dec 30, 2012

Heard the same from a rep in the federal space a few months ago. Told us that 6500 and 6800 was getting abandoned sooner rather than later.

single-mode fiber
Dec 30, 2012

If it's one or two specific numbers harassing you, you might just drop them via inbound dial peer

single-mode fiber
Dec 30, 2012

This happened to us on Monday back before they made the bug public. It was pretty concerning watching them all fail not instantly, but in succession in the span of a couple of hours. I'm glad I thought to sanity check the network aspect from console because I was afraid it would end in a call to US-CERT.

single-mode fiber
Dec 30, 2012

Judge Schnoopy posted:

Is ISE a worthwhile product to look in to? I'm a sole admin, 25ish cisco network devices spread over 6 locations. Network administration is typically outsourced per hour and I'm trying to cut costs by doing more management myself, allowing for critical hardware upgrades to be purchased. Roughly 120 end points.

Is ISE crazy overpriced, is it as lovely as Prime Infrastructure, or is this a good way to go?

I love ISE, but for only 120 endpoints it's probably massive overkill. I wouldn't recommend it until you have a few thousand endpoints or you absolutely need some functionality in it that nothing else can provide. The common things like using it as your RADIUS server for 802.1x and the subsequent dynamic VLAN assignment can be done even by a Windows server running NPS.

Also the ASA bug ID calls out the 5500-X but it definitely can affect the previous platform too.

single-mode fiber
Dec 30, 2012

Sepist posted:

I've dealt with something similar. I can't remember if it was NX-OS or IOS-XR but after an update some of the config was correct but wouldn't apply. TAC had me run "configure reload ascii" to reload the box with a ascii converted config, as the normal file is apparently binary.

This was probably NX-OS, just had to do this recently at TAC's suggestion for a totally different bug on the 7K platform. When we did that reload, it destroyed all config in the VDC below a certain point, which conveniently included all the routing config.

single-mode fiber
Dec 30, 2012

BaseballPCHiker posted:

Does anyone have any experience with any ASA to Firepower migration tools?

I just tried the Cisco one and got 400+ errors from my uploaded config. I really, really, dont want to have to go through this line by line...

Done it several times with the vFMC and haven’t really had any problems.

single-mode fiber
Dec 30, 2012

You do have to be careful with deployment, even making changes that only affect LINA and not Snort can cause an outage if something fails during deployment for any number of reasons. Not much, less than 1% for sure, but I’ve seen a deployment fail, redeploy with no changes (like just click into the name or description of a policy, save, redeploy), and it works the 2nd time, but you did cause a small outage while the rollback takes place. For this reason you may want to only do deployments after hours for stuff that wasn’t exempted through change control process.

single-mode fiber
Dec 30, 2012

BaseballPCHiker posted:


From what I was told by our var you can buy the current generation of Firepower firewall's and still run the old ASDM code on them for another 3-4 years until they're unsupported. If it really is as awful as it sounds we may go that route and hope for improvements in a couple of years.


This is true but you will still have to keep track of FXOS code underneath even if running ASA on top

single-mode fiber
Dec 30, 2012

IPv6 multicast is definitely a CPU punt on 2960-X platform so, sight unseen, it seems likely to also be true for a 3560

single-mode fiber
Dec 30, 2012

Kazinsal posted:

FTDs? No issues.

That's a first

single-mode fiber
Dec 30, 2012

Bob Morales posted:

We have a Fortinet, but I guess this is a generic networking/failover question:

Two internet connections, and the firewall is configured for failover, basically checking if 8.8.8.8 is reachable.

Our ISP had an issue last weekend where one of the cards in their core router went down, so certain other networks were not reachable. So maybe 80% of stuff worked still, but we got a few emails about things being down etc. One of them being a cloud-based piece of software that is pretty important to the daily operations (Matrixcare EHR)

An order came in from above to have the failover operate on whether we can reach that website. I'm not going to change anything because that's ridiculous and every time that website has a hiccup we're going to switch connections...

So just as a brainstorming session, what are some other suggestions? In all honesty, this is something that should have been investigated by the on-call person, and once identified, manually failed over. It's such a rare thing to happen. One time last year we had something similar where a bug or something screwed up a routing table and we had all kinds of goofy poo poo happen, so we just used the other connection until they got it cleared up.

If you were learning the full DFZ from each ISP that probably would've fixed the problem you described naturally (maybe add some dampening if the card is flapping or something like that) without the use of a track object. If you're just learning a default from each one then I don't think the Fortinet has enough knobs to turn where you could use only SLA track objects, you'd have to do like tortilla_chip said and make this logic run elsewhere. E.g., instead of targeting 8.8.8.8 you target the IP(s) of your most important off-net service, but what if the service itself is totally unreachable and you, at best, failed over for nothing (at worst, keeping failing over in a cycle). Depending on how well your NMS tool is integrated with your ticketing system maybe the best short term solution is to just set up multiple tracks to external business-critical services, plus a couple other barometers like 8.8.8.8 or 1.1.1.1, and configure the failure of any of those track objects to create a high-priority alarm+ticket for someone to review and make a judgement call as to whether or not to fail over. Automating the logic of when a failover should occur can be dicey in corner cases, like what if you have an external accounting service that's absolutely critical some days but not others, or if you have external services ABCDE but somehow services ABDE are up on 1, and services BCDE are up on the other, stuff like that.

single-mode fiber
Dec 30, 2012

GreatGreen posted:

If I rename a Cisco switch, will that require a switch reboot or can I just enter:

oldname# config terminal
oldname (config)# switchname newname


...and then save the config and be fine?

Also, same question but for a 4-stack of switches.

You should regenerate your crypto key after changing the hostname as well, to avoid risk of breaking SSH.

single-mode fiber
Dec 30, 2012

Maybe they're better now, but the last time I dealt heavily with FTD, 4 or 5 years ago, they were extremely bad. I've never encountered more critical, enterprise-breaking bugs on a single platform than I did with FTD. These days the only thing I can recommend buying a Firepower is if you're running the ASA code on it, and you're doing this because you have to use AnyConnect instead of some other VPN client because of whatever reason.

Adbot
ADBOT LOVES YOU

single-mode fiber
Dec 30, 2012

I think VXLAN EVPN can be a good fit if your environment is 1 or more of the following:

-Very dynamic (groups of servers are constantly being deployed or torn down)
-Expected to grow aggressively
-Needs a high degree of segmentation between different applications and their components
-Applications need very consistent latency between their components

Another point of consideration is what's the labor pool look like for network people at your company, do they hire all highly-skilled people with lots of prior experience? Or are most of the new hires more on the junior side, and the expectation is that they're develop internally and promote from within? If it's the latter, a complex environment will naturally have a higher learning curve for them. If you don't have a technical or business use case for a certain technology or design, you may want to consider that it's often easier to change a network design than it is to change your company's hiring practices.

One of my little personal soapboxes when it comes to technologies that provide an increasingly high level of abstraction (often through some level of automation) from what's happening underneath, it makes your distribution of failure outcomes more leptokurtic. You very tightly control and eliminate a lot of simple errors (typed the wrong VLAN tag type of stuff), but, when you do have some kind of serious fault, it ends up being a very complex, Byzantine kind of failure. It typically ends up requiring a much higher level of technical expertise to resolve, and that troubleshooting process can take much longer. It's a little bit like the thing of "would you rather fight 50 duck-sized horses, or 1 horse-sized duck?"

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply