Just got done reading about nested QOS maps and one blurb I read indicated one should be careful not to define a catch all "IP Any Any" ACL for the default class. They sited that the reason was you would then exclude all your routing protocol traffic like BGP and EIGRP, etc.
They suggested if...
is there anything special I should do to get the 3925 to see the wic 1am installed in slot 0? I put it in there (system was turned off) but after boot, I can't grab that async interface to configure it. It doesn't show up.
with T1 wics you have to issue a card type but I've never had to do...
Sorry, got interupted for a more important 'crisis du jour' which ended up taking much longer than 'du jour'.
I should have included extended pings in the first note because I did in fact do them.
from the router, if I ping say 137.135.128.255 (yeah, they used that address with an appropriate...
say you have this in your route table:
Gateway of last resort is 10.8.1.1 to network 0.0.0.0
137.135.0.0/16 is variably subnetted, 2 subnets, 2 masks
S 137.135.128.0/24 [1/0] via 10.8.1.1
C 137.135.128.0/23 is directly connected, FastEthernet0/0
10.0.0.0/16 is subnetted...
agreed...if bugs don't prevent it from working, the transport command is a better choice. In my original post I only knew it didn't work (not why) and was searching for a work around out of necessity.
Part of this may be caused by the fact that so very often I embark on a project only to find...
Okay there's several things here.
Fact, the "transport input ssh" did not prohibit telnet however it did allow ssh at the same time as telnet. After much nashing of teeth I found that the problem is a bug in revision 12.2(44)SE5. If I backrev to 12.2(25r) then the command works as documented...
Basically I want all telnet shut out. If SSH is working there is no need of telnet.
This network wasn't laid out well in terms of IP addressing but it is what it is. You have to play with the cards you are dealt in some cases. I did not inherrit flexible enough addressing to summarily allow...
I found this post while trying to do a similar thing on my 3750s...
transport input ssh does indeed enable ssh to be used. It does not shut off telnet however. After issuing this command I can still use a DOS window and telnet x.x.x.x big as life...and get in!
I tried an ACL but that does...
want to set up the sla measuring feature of the cisco product line on my switches in each branch office.
Have a linux server set up just to be the counter part. has simple web server, dns, dhcp and allows ssh just for the switch SLAs to 'hit'. This gives me a unit that, because this is all it...
good call, man. forgot about those pesky things. they were tight but when I went back behind unit the power cord on one switch was barely hanging in there...probably got knocked about by the telco guy who was out last week and doing stuff on teh wall field.
thanks!
Anyone ever seen this with 3750 stack? I have 2 3750's in a stack, suddenly they appeared to reboot...traffic frozen, devices unable to respond to the ping tool that monitors them...looked at the stack..all amber lights as you see on a power up.
The show ver says the stack has been up over 5...
thanks for the show controller I forgot all about that...mostly I use it on serial ports for my wan links but forgot it could be useful in other situations.
It was the gbic, swapped it out problem solved. Not sure why that didn't translate to errors on the port but...stranger things have...
Thanks. The cable runs through a wall, there's no way to patch around. It's isolated so I can't just 'try a different run' as there are none to this area. I can't cut the ends off and re-terminate as it is fiber.
The symptoms for the device at the end is excessively long or slow data...
has anyone had cables that were bad but which did not produce physical (as in layer 1 or 2 type errors) on the switch?
I know a bad cable can cause retransmissions and such but wouldn't you expect to see errors recorded on the switch if you had a bad cable?
I'm about to replace a really hard...
If anyone follows this thread, I learned that the documentation is a bit of a misnomer. the TTY trap is not only from telnet session ended (in fact in this case it clearly was not) but can be generated by ssh sessions that are terminated. We don't have SSH set up on these units so I'm still at...
Dude anyone who logs in with the priviledged access can do that.
the commands I used in my lab to do this were:
rename flash:vlan.dat flash:vlan.dat.renamed
then when I created a set of new vlans, I got a new vlan.dat file.
I would guess maybe you are looking at a switch that has had other...
every now and again I get a cryptic snmp trap send from an old 4506 switch. I've run through Cisco's mib navigator and as near as I can tell, it's from the TTY trap set. But the trap contents don't tell me squat! When I read up on the TTY trap itself it said that the implication is a TCP...
I am not sure I understand what you are trying to do. But in general if you want to stop a type of traffic on a given vlan, you apply the ACL to the vlan interface like thus:
access-list 123 deny udp 10.32.8.8 0 0 0 0 eq snmp any
int vlan 11
ip access-group 123 out
this would stop snmp...
Keep in mind 1.5 MB isn't exactly lightening fast by today's standards. Most DSL lines these days would give minimum 5-6 and some upwards of 8. Also depending on how your provider set this up, they could be reserving portions of that T1 for phone even if you aren't actively using it at that...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.