Re: Managing your network devices via console

2009-05-15 Thread Bjørn Mork
Mehmet Akcin  writes:

> It's always cool to have console access to routers/switches and
> nowadays they are going from RS-232 to RJ-45 as a standart. I have got
> Avocent DSR 2035 which is a KVM+Serial console (all in one).. but
> while I was able to have it work against servers via KVM or/and Serial
> , I was unable to make it work properly against any network device. I
> am wondering if anyone had experience on DSR or similar boxes to
> configure them against network devices console ports.

I stumbled across these, which look like decent alternatives to getting
a 2511 from eBay: http://www.perle.com/products/Terminal-Server.shtml

The 48-port 1U terminal server with redundant power looks particularily
nice.

I've no experience with Perle, though.  Anyone else?



Bjørn



RE: Managing your network devices via console

2009-05-15 Thread Jake Vargas
> I stumbled across these, which look like decent alternatives to getting
> a 2511 from eBay: http://www.perle.com/products/Terminal-Server.shtml
> 
> The 48-port 1U terminal server with redundant power looks particularily
> nice.
> 
> I've no experience with Perle, though.  Anyone else?
> 

I use them in my datacenter. SCS 32 with the IOLAN Modem card. I have some 
basic advice for using it as a dialup source. It also does IPSec via our DSL 
line which also happens to be our POTs line. All kinds of nice stuff but a bit 
of a pain to initially configure if you do not know what you are doing (slight 
learning curve). I'm happy with it. 


Re: Managing your network devices via console

2009-05-15 Thread Elmar K. Bins
jvar...@crypticstudios.com (Jake Vargas) wrote:

> > I stumbled across these, which look like decent alternatives to getting
> > a 2511 from eBay: http://www.perle.com/products/Terminal-Server.shtml
> > 
> > The 48-port 1U terminal server with redundant power looks particularily
> > nice.
> > 
> > I've no experience with Perle, though.  Anyone else?
> > 
> 
> I use them in my datacenter. SCS 32 with the IOLAN Modem card. I have some 
> basic advice for using it as a dialup source. It also does IPSec via our DSL 
> line which also happens to be our POTs line. All kinds of nice stuff but a 
> bit of a pain to initially configure if you do not know what you are doing 
> (slight learning curve). I'm happy with it. 

We are still using the "ancient" Cyclades/Avocent ACS'es with a matching
modem card (getting rare, them). They work fine, a bit slow on sshV2,
but no problems in all the remote locations. I had one (pretty old)
fail in the lab, but this might have been due to it being quite warm
there...

I am concerned about remote power control, though. If you know your
datacenter, you can get all kinds of remote-controlled power strips.

With us, we don't always know beforehand what kind of power the DCs
will have, and I'd like the exact same equipment everywhere (except
the cables, of course).

In order to achieve this, I used Cyclades (now Avocent) ATP3120-001
(2...@100-240v input on IEC C320-20, 10A outputs on IEC C320-13).

They have three shortcomings:
  - sometimes they forget their configuration (not critical)
  - they can only be accessed by serial console (no SNMP etc.)
  - consequently there's no power meter remote readout

Is anyone here aware of such universally usable devices that can
be accessed over IP and give power readouts remotely?

Electrical specs are as above - 20 Amps input (for 120V countries),
usable anywhere from 100-240 Volts and IEC input and output plugs...

Any hints?
(No, APC fails in the 100-240V part)
(No, Perle fails in the 100-240V and the IEC part)
(No, even Avocent's other strips fail there...)

Yours,
Elmi.

-- 

"Hinken ist kein Mangel eines Vergleichs, sondern sollte als wesentliche
 Eigenschaft von Vergleichen angesehen werden."   (Marius Fränzel in desd)

--[ ELMI-RIPE ]---




Re: you're not interesting, was Re: another brick in the wall[ed garden]

2009-05-15 Thread John R. Levine

And what's the next protocol that is going to be stomped on?


Anything except http; at which point everything will move to http, and
the firewalls are again useless.


Um, if you think that http on consumer networks is transparent, I have 
some really bad news for you.


Regards,
John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor
"More Wiener schnitzel, please", said Tom, revealingly.



Re: you're not interesting, was Re: another brick in the wall[ed garden]

2009-05-15 Thread Martin Hannigan
Anything traversing the edge. They are all revenue targets.

Best,

Martin



On 5/14/09, Mark Andrews  wrote:
>
> In message <20090514223605.88104.qm...@simone.iecc.com>, John Levine writes:
>> >Dear Sprint EVDO people,
>> >
>> >Your man-in-the-middle hijacking of UDP/53 DNS queries against
>> >nameservers that I choose to query from my laptop on Sprint EVDO is
>> >not appreciated.  Even less appreciated is your complete blocking of
>> >TCP/53 DNS queries.
>>
>> If I were an ISP, and I knew that approximately 99.9% of customer
>> queries to random name servers was malware doing fake site phishing or
>> misconfigured PCs that will work OK and avoid a support call if they
>> answer the DNS query, with 0.1% being old weenies like us, I'd do what
>> Sprint's doing, too.
>
>   And what's the next protocol that is going to be stomped on?
>
>> If you're aware of a mechanical way for them to tell the difference,
>> we're all ears.
>
>   Well you can't answer a TSIG message without knowing the
>   shared secret so you might as well just let it go through
>   and avoid some percentage of support calls.  Intercepting
>   TSIG messages is guaranteed to generate a support call.
>
>   Similarly intercepting "rd=0" is also guaranteed to generate
>   a support call.  You almost certainly have a interative
>   resolver making the query which will not handle the "aa=0"
>   responses.
>
>   Similarly there is no sane reason to block DNS/TCP other than
>   they can do it.
>
>   Mark
>
>> Regards,
>> John Levine, jo...@iecc.com, Primary Perpetrator of "The Internet for
>> Dummies
>> ",
>> Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor
>> "More Wiener schnitzel, please", said Tom, revealingly.
>>
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE: +61 2 9871 4742 INTERNET: mark_andr...@isc.org
>
>


-- 
Martin Hannigan   mar...@theicelandguy.com
p: +16178216079
Power, Network, and Costs Consulting for Iceland Datacenters and Occupants





BGP Update Report

2009-05-15 Thread cidr-report
BGP Update Report
Interval: 13-Apr-09 -to- 14-May-09 (32 days)
Observation Point: BGP Peering with AS131072

TOP 20 Unstable Origin AS
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS3130   136562  2.3% 529.3 -- RGNET-3130 RGnet/PSGnet
 2 - AS845269624  1.2%  51.7 -- TEDATA TEDATA
 3 - AS21491   55630  0.9%1794.5 -- UTL-ON-LINE UTL On-line is RF 
broadband ISP in Uganda - Africa
 4 - AS638953858  0.9%  12.4 -- BELLSOUTH-NET-BLK - 
BellSouth.net Inc.
 5 - AS35805   52417  0.9% 151.9 -- UTG-AS United Telecom AS
 6 - AS432343501  0.7%  10.0 -- TWTC - tw telecom holdings, inc.
 7 - AS29049   42441  0.7% 131.4 -- DELTA-TELECOM-AS Delta Telecom 
LTD.
 8 - AS33776   42032  0.7% 359.2 -- STARCOMMS-ASN
 9 - AS12978   34819  0.6% 179.5 -- DOGAN-ONLINE Dogan Iletisim 
Elektronik Servis Hizmetleri AS
10 - AS815134764  0.6%  23.8 -- Uninet S.A. de C.V.
11 - AS10834   34577  0.6%  13.7 -- Telefonica Data Argentina S.A.
12 - AS17488   31858  0.5%  20.0 -- HATHWAY-NET-AP Hathway IP Over 
Cable Internet
13 - AS17974   31205  0.5%  30.0 -- TELKOMNET-AS2-AP PT 
Telekomunikasi Indonesia
14 - AS505630480  0.5% 258.3 -- INS-NET-2 - Iowa Network 
Services
15 - AS22773   28935  0.5%  26.9 -- ASN-CXA-ALL-CCI-22773-RDC - Cox 
Communications Inc.
16 - AS15045   28715  0.5%7178.8 -- KITTELSON - KITTELSON AND 
ASSOCIATES, INC.
17 - AS838627730  0.5% 229.2 -- KOCNET KOCNET-AS
18 - AS20115   27684  0.5%  16.4 -- CHARTER-NET-HKY-NC - Charter 
Communications
19 - AS424926475  0.5% 146.3 -- LILLY-AS - Eli Lilly and Company
20 - AS292026420  0.5% 322.2 -- LACOE - Los Angeles County 
Office of Education


TOP 20 Unstable Origin AS (Updates per announced prefix)
Rank ASNUpds %  Upds/PfxAS-Name
 1 - AS15045   28715  0.5%7178.8 -- KITTELSON - KITTELSON AND 
ASSOCIATES, INC.
 2 - AS409674218  0.1%4218.0 -- CSF-AS CSF Computersoftware 
fuer Fachanwendungen GmbH
 3 - AS32398   21155  0.4%3525.8 -- REALNET-ASN-1
 4 - AS13325   24488  0.4%3061.0 -- STOMI - State of Michigan, 
DMB-CNOC
 5 - AS466538276  0.1%2758.7 -- FREDRIKSON---BYRON - Fredrikson 
& Byron, P.A.
 6 - AS282562679  0.1%2679.0 -- 
 7 - AS131532546  0.0%2546.0 -- ONEWORLD OneWorld S.A.
 8 - AS292292449  0.0%2449.0 -- ASDA-AS Assotiation for the 
Development of West Athens
 9 - AS8499 2167  0.0%2167.0 -- Space Hellas Network Operation 
Center (NOC)
10 - AS304234070  0.1%2035.0 -- AMEDI-3-ASN1 - Amedisys, Inc.
11 - AS476405763  0.1%1921.0 -- TRICOMPAS Tricomp Sp. z. o. o.
12 - AS505025422  0.4%1815.9 -- PSC-EXT - Pittsburgh 
Supercomputing Center
13 - AS21491   55630  0.9%1794.5 -- UTL-ON-LINE UTL On-line is RF 
broadband ISP in Uganda - Africa
14 - AS46328   14241  0.2%1582.3 -- PTCNEBRASKA - PIERCE TELEPHONE 
COMPANY, INCORPORATED
15 - AS398032818  0.1%1409.0 -- UTI-AS SC UTI COMMUNICATIONS 
SYSTEMS SRL
16 - AS289532324  0.0%1162.0 -- PIRAEUSBANK Greek banking 
institution
17 - AS169313354  0.1%1118.0 -- GLOBAL-PAYMENTS-1 - Global 
Payments, Inc.
18 - AS249942216  0.0%1108.0 -- GENESYS-AS GENESYS Informatica 
AS for announcing own prefixes
19 - AS472991077  0.0%1077.0 -- DRSA-AS Dlugie Rozmowy S.A.
20 - AS354005382  0.1%1076.4 -- MFIST Interregoinal 
Organization Network Technologies


TOP 20 Unstable Prefixes
Rank Prefix Upds % Origin AS -- AS Name
 1 - 72.23.246.0/2424993  0.4%   AS5050  -- PSC-EXT - Pittsburgh 
Supercomputing Center
 2 - 41.204.2.0/24 21102  0.3%   AS32398 -- REALNET-ASN-1
 3 - 192.12.120.0/24   10327  0.2%   AS5691  -- MITRE-AS-5 - The MITRE 
Corporation
 4 - 63.103.104.0/229978  0.2%   AS15045 -- KITTELSON - KITTELSON AND 
ASSOCIATES, INC.
 5 - 63.103.108.0/239978  0.2%   AS15045 -- KITTELSON - KITTELSON AND 
ASSOCIATES, INC.
 6 - 63.103.110.0/248745  0.1%   AS15045 -- KITTELSON - KITTELSON AND 
ASSOCIATES, INC.
 7 - 199.45.13.0/24 8261  0.1%   AS46653 -- FREDRIKSON---BYRON - Fredrikson 
& Byron, P.A.
 8 - 123.49.152.0/247723  0.1%   AS18118 -- CITICNET-AP CITIC Networks 
Management Co.,Ltd.
 9 - 123.49.144.0/216918  0.1%   AS18118 -- CITICNET-AP CITIC Networks 
Management Co.,Ltd.
10 - 195.96.69.0/24 6749  0.1%   AS8225  -- ASTELIT-MSK-AS Astelit 
Autonomous System
11 - 81.199.18.0/24 5772  0.1%   AS21491 -- UTL-ON-LINE UTL On-line is RF 
broadband ISP in Uganda - Africa
12 - 193.201.184.0/21   5769  0.1%   AS25546 -- BROOKLANDCOMP-AS Brookland 
Computer Services
13 - 94.124.16.0/21 5697  0.1%   AS47640 --

The Cidr Report

2009-05-15 Thread cidr-report
This report has been generated at Fri May 15 21:17:19 2009 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.

Check http://www.cidr-report.org for a current version of this report.

Recent Table History
Date  PrefixesCIDR Agg
08-05-09294143  182447
09-05-09293901  181869
10-05-09294234  182075
11-05-09294208  183286
12-05-09294500  183655
13-05-09294535  183928
14-05-09294756  183893
15-05-09294616  184092


AS Summary
 31334  Number of ASes in routing system
 13335  Number of ASes announcing only one prefix
  4296  Largest number of prefixes announced by an AS
AS6389 : BELLSOUTH-NET-BLK - BellSouth.net Inc.
  89741824  Largest address span announced by an AS (/32s)
AS27064: DDN-ASNBLK1 - DoD Network Information Center


Aggregation Summary
The algorithm used in this report proposes aggregation only
when there is a precise match using the AS path, so as 
to preserve traffic transit policies. Aggregation is also
proposed across non-advertised address space ('holes').

 --- 15May09 ---
ASnumNetsNow NetsAggr  NetGain   % Gain   Description

Table 294546   184073   11047337.5%   All ASes

AS6389  4296  339 395792.1%   BELLSOUTH-NET-BLK -
   BellSouth.net Inc.
AS4323  4270 1765 250558.7%   TWTC - tw telecom holdings,
   inc.
AS209   2562 1150 141255.1%   ASN-QWEST - Qwest
   Communications Corporation
AS4766  1805  522 128371.1%   KIXS-AS-KR Korea Telecom
AS17488 1584  301 128381.0%   HATHWAY-NET-AP Hathway IP Over
   Cable Internet
AS4755  1247  150 109788.0%   TATACOMM-AS TATA
   Communications formerly VSNL
   is Leading ISP
AS22773 1063   68  99593.6%   ASN-CXA-ALL-CCI-22773-RDC -
   Cox Communications Inc.
AS1785  1759  796  96354.7%   AS-PAETEC-NET - PaeTec
   Communications, Inc.
AS8452  1200  303  89774.8%   TEDATA TEDATA
AS8151  1449  598  85158.7%   Uninet S.A. de C.V.
AS19262  996  236  76076.3%   VZGNI-TRANSIT - Verizon
   Internet Services Inc.
AS18566 1062  424  63860.1%   COVAD - Covad Communications
   Co.
AS6478  1404  811  59342.2%   ATT-INTERNET3 - AT&T WorldNet
   Services
AS18101  754  169  58577.6%   RIL-IDC Reliance Infocom Ltd
   Internet Data Centre,
AS11492 1099  549  55050.0%   CABLEONE - CABLE ONE, INC.
AS855621  101  52083.7%   CANET-ASN-4 - Bell Aliant
   Regional Communications, Inc.
AS22047  610   98  51283.9%   VTR BANDA ANCHA S.A.
AS2706   536   44  49291.8%   HKSUPER-HK-AP Pacific Internet
   (Hong Kong) Limited
AS17676  565   81  48485.7%   GIGAINFRA BB TECHNOLOGY Corp.
AS17908  616  141  47577.1%   TCISL Tata Communications
AS4804   574  105  46981.7%   MPX-AS Microplex PTY LTD
AS7018  1491 1026  46531.2%   ATT-INTERNET4 - AT&T WorldNet
   Services
AS4808   629  168  46173.3%   CHINA169-BJ CNCGROUP IP
   network China169 Beijing
   Province Network
AS24560  689  249  44063.9%   AIRTELBROADBAND-AS-AP Bharti
   Airtel Ltd., Telemedia
   Services
AS7545   787  363  42453.9%   TPG-INTERNET-AP TPG Internet
   Pty Ltd
AS9443   527  103  42480.5%   INTERNETPRIMUS-AS-AP Primus
   Telecommunications
AS6517   660  242  41863.3%   RELIANCEGLOBALCOM - Reliance
   Globalcom Services, Inc
AS7011   963  553  41042.6%   FRONTIER-AND-CITIZENS -
   Frontier Communications of
   America, Inc.
AS4668   688  282  4

Re: another brick in the wall[ed garden]

2009-05-15 Thread Robert E. Seastrom

Skywing  writes:

> You are brave indeed to trust your packets over the air without a VPN or 
> tunnel of some sort.

TSIG is like IPSEC's AH but for DNS.  Being untrusting is how I
managed to find out about these shenanigans in the first place.  I
don't care particularly about hiding the payload on a DNS query.

-r




Google News Down?

2009-05-15 Thread Nitin Sharma
I can reach Google News through icmp traceroutes, but the HTTP response says
"Server Error".Anyone seeing this too?


Re: Google News Down?

2009-05-15 Thread Joel Esler
On Fri, May 15, 2009 at 9:31 AM, Nitin Sharma  wrote:

> I can reach Google News through icmp traceroutes, but the HTTP response
> says
> "Server Error".Anyone seeing this too?
>


All fine here.


-- 
joel esler | Sourcefire | gtalk: jes...@sourcefire.com | 302-223-5974 |
http://twitter.com/joelesler


Re: Google News Down?

2009-05-15 Thread Nitin Sharma
It is working fine now. Seems like a temporary failure from Google .. for 2
consecutive days? errmm!

I can see many tweets to verify that it was indeed not working for many
people too.



On Fri, May 15, 2009 at 9:37 AM, Joel Esler  wrote:

> On Fri, May 15, 2009 at 9:31 AM, Nitin Sharma  wrote:
>
>> I can reach Google News through icmp traceroutes, but the HTTP response
>> says
>> "Server Error".Anyone seeing this too?
>>
>
>
> All fine here.
>
>
> --
> joel esler | Sourcefire | gtalk: jes...@sourcefire.com | 302-223-5974 |
> http://twitter.com/joelesler
>


Re: Managing your network devices via console

2009-05-15 Thread David Andersen

On May 15, 2009, at 4:45 AM, Elmar K. Bins wrote:

I am concerned about remote power control, though. If you know your
datacenter, you can get all kinds of remote-controlled power strips.

With us, we don't always know beforehand what kind of power the DCs
will have, and I'd like the exact same equipment everywhere (except
the cables, of course).

In order to achieve this, I used Cyclades (now Avocent) ATP3120-001
(2...@100-240v input on IEC C320-20, 10A outputs on IEC C320-13).

They have three shortcomings:
 - sometimes they forget their configuration (not critical)
 - they can only be accessed by serial console (no SNMP etc.)
 - consequently there's no power meter remote readout

Is anyone here aware of such universally usable devices that can
be accessed over IP and give power readouts remotely?

Electrical specs are as above - 20 Amps input (for 120V countries),
usable anywhere from 100-240 Volts and IEC input and output plugs...

Any hints?
(No, APC fails in the 100-240V part)
(No, Perle fails in the 100-240V and the IEC part)
(No, even Avocent's other strips fail there...)


Check out something like the BayTech RPC3 or RPC41 family?  I don't  
know if it's exactly what you're looking for, but that's what I just  
picked to have per-outlet monitoring and control for a research  
datacenter we're building.


  -Dave




PGP.sig
Description: This is a digitally signed message part


Re: you're not interesting, was Re: another brick in the wall[ed garden]

2009-05-15 Thread Mans Nilsson
Subject: Re: you're not interesting, was Re: another brick in the wall[ed 
garden] Date: Fri, May 15, 2009 at 10:10:26AM +0100 Quoting John R. Levine 
(jo...@iecc.com):
>>> And what's the next protocol that is going to be stomped on?
>>
>> Anything except http; at which point everything will move to http, and
>> the firewalls are again useless.
>
> Um, if you think that http on consumer networks is transparent, I have  
> some really bad news for you.

If you change my sentence thusly: 

s/http/ what can be communicated over http/1;s/http/said channel/2; 

..it all makes sense again, even "better" than before.  

-- 
Måns Nilsson





RE: Managing your network devices via console

2009-05-15 Thread Clay Haynes
Have you heard of or tried Cyberswitching for remote power management?  The 
DualCom series provide remote SNMP and a WebUI control of all the outlets and 
you can also query them for how many amps each outlet is pulling.  Their 
DualCom series does support 120-240 VAC as well as supporting IEC C13 and C19 
outlets.  I've used them for several installs and they work very well in that 
regard.

Take a look at them here: http://www.cyberswitching.com/products-dualcom.html


-Clay

-Original Message-
From: Elmar K. Bins [mailto:e...@4ever.de] 
Sent: Friday, May 15, 2009 4:45 AM
To: Jake Vargas
Cc: nanog@nanog.org
Subject: Re: Managing your network devices via console

jvar...@crypticstudios.com (Jake Vargas) wrote:

> > I stumbled across these, which look like decent alternatives to getting
> > a 2511 from eBay: http://www.perle.com/products/Terminal-Server.shtml
> > 
> > The 48-port 1U terminal server with redundant power looks particularily
> > nice.
> > 
> > I've no experience with Perle, though.  Anyone else?
> > 
> 
> I use them in my datacenter. SCS 32 with the IOLAN Modem card. I have some 
> basic advice for using it as a dialup source. It also does IPSec via our DSL 
> line which also happens to be our POTs line. All kinds of nice stuff but a 
> bit of a pain to initially configure if you do not know what you are doing 
> (slight learning curve). I'm happy with it. 

We are still using the "ancient" Cyclades/Avocent ACS'es with a matching
modem card (getting rare, them). They work fine, a bit slow on sshV2,
but no problems in all the remote locations. I had one (pretty old)
fail in the lab, but this might have been due to it being quite warm
there...

I am concerned about remote power control, though. If you know your
datacenter, you can get all kinds of remote-controlled power strips.

With us, we don't always know beforehand what kind of power the DCs
will have, and I'd like the exact same equipment everywhere (except
the cables, of course).

In order to achieve this, I used Cyclades (now Avocent) ATP3120-001
(2...@100-240v input on IEC C320-20, 10A outputs on IEC C320-13).

They have three shortcomings:
  - sometimes they forget their configuration (not critical)
  - they can only be accessed by serial console (no SNMP etc.)
  - consequently there's no power meter remote readout

Is anyone here aware of such universally usable devices that can
be accessed over IP and give power readouts remotely?

Electrical specs are as above - 20 Amps input (for 120V countries),
usable anywhere from 100-240 Volts and IEC input and output plugs...

Any hints?
(No, APC fails in the 100-240V part)
(No, Perle fails in the 100-240V and the IEC part)
(No, even Avocent's other strips fail there...)

Yours,
Elmi.

-- 

"Hinken ist kein Mangel eines Vergleichs, sondern sollte als wesentliche
 Eigenschaft von Vergleichen angesehen werden."   (Marius Fränzel in desd)

--[ ELMI-RIPE ]---





Check out my photos on Facebook

2009-05-15 Thread Martin Hepworth
Hi Nanog,

I invited you to join Facebook a while back and wanted to remind you that once 
you join, we'll be able to connect online, share photos, organize groups and 
events, and more.

Thanks,
Martin

To sign up for Facebook, follow the link below:
http://www.facebook.com/p.php?i=681923447&k=RVMZQ2U532WMYKMCYFX5P&r


nanog@nanog.org was invited to join Facebook by Martin Hepworth. If you do not 
wish to receive this type of email from Facebook in the future, please click on 
the link below to unsubscribe.
http://www.facebook.com/o.php?k=464bf3&u=699384721&mid=777bd0G29afc391G0G8
Facebook's offices are located at 156 University Ave., Palo Alto, CA 94301.



Re: Check out my photos on Facebook

2009-05-15 Thread Jared Mauch
At least if facebook is going to reach the list, please
RSVP here:

http://www.facebook.com/home.php#/event.php?eid=86529812115&ref=ts


-- 
Jared Mauch  | pgp key available via finger from ja...@puck.nether.net
clue++;  | http://puck.nether.net/~jared/  My statements are only mine.



NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread David Storandt
We're stuck in an engineering pickle, so some experience from this
crew would be useful in tie-breaking...

We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
Internet traffic, currently using 6509/Sup2s for core routing and port
aggregation. The MSFC2s are under stress from 3x full route feeds,
pared down to 85% to fit the TCAM tables. One system has a FlexWAN
with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
(stable IOS and esp. disabling SPD) helped a lot but still doesn't
have the power to pull through. Hardware upgrades are needed...

We need true full routes and more CPU horsepower for crunching BGP
(+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
one each at two locations. Oh yeah, we're still a larger startup
without endless pockets. Power, rack space, and SmartNet are not
concerns at any location (on-site cold spares). We may need an
upstream OC12 in the future but that's a ways out and not a concern
here.

Our engineering team has settled on three $20k/node options:
- Sup720-3BXLs with PS and fan upgrades
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to NPE-G2s across a 2-3Gbps port-channel
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to a 12008 with E3 engines across a 2-3Gbps port-channel.

Ideas and constructive opinions welcome, especially software and
stability-related.

Many thanks,
-Dave



Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Elmar K. Bins
dstora...@teljet.com (David Storandt) wrote:

> Our engineering team has settled on three $20k/node options:
> - Sup720-3BXLs with PS and fan upgrades

Still quite slow CPU wise. RSP's are supposed to be a lot faster
and actually usable.

> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to NPE-G2s across a 2-3Gbps port-channel

The NPE-G2 - even an NPE-G1 - will do all that BGP stuff easily;
the CPU is fast enough. But...you might be in for a bad surprise
concerning the Portchannel.

Remember - it's done in software. So, depending on your packet
sizes, you might experience a throughput _drop_ once you bundle.
My experiments were done with very small packets though (DNS
queries and responses, avg. packet size around 140 Byte).

The devices I tested were the 1RU models (7301 for NPE-G1 and
7201 for NPE-G2). In "unbundled mode" they pushed around 940 kpps
(G1) and 1320 kpps (G2) with CPU loads between 85% and 100%.

Channel bundling took a lot out of the boxes. 7301 keeled over
at 470, 7201 at 660 kpps.

If you're only pushing big packets, though...

Yours,
Elmar.



RE: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Paul Stewart
We've never pushed a NPE-G2 to 800Mb/s before but I would think they
would topple over... hopefully someone on here could confirm my
statement?

Moving the BGP to the 12008's would be my choice with PRP-2 processors
if the budget fits we're faced with a similar upgrade next year
possibly moving BGP from a pair of 7606's (Sup720-3BXL) over to a pair
of GSR's running PRP2 I think - the BGP processing etc. is pushing the
CPU's too high on the 7600's

Someone else might suggest the RSP720's but haven't had them in a
production environment yet...  we had PRP2's running on 12012 for a
while and found them rock solid even with older line cards etc...

Hope this helps a bit...;)

Paul


-Original Message-
From: David Storandt [mailto:dstora...@teljet.com]
Sent: Friday, May 15, 2009 11:08 AM
To: NANOG list
Subject: NPE-G2 vs. Sup720-3BXL

We're stuck in an engineering pickle, so some experience from this
crew would be useful in tie-breaking...

We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
Internet traffic, currently using 6509/Sup2s for core routing and port
aggregation. The MSFC2s are under stress from 3x full route feeds,
pared down to 85% to fit the TCAM tables. One system has a FlexWAN
with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
(stable IOS and esp. disabling SPD) helped a lot but still doesn't
have the power to pull through. Hardware upgrades are needed...

We need true full routes and more CPU horsepower for crunching BGP
(+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
one each at two locations. Oh yeah, we're still a larger startup
without endless pockets. Power, rack space, and SmartNet are not
concerns at any location (on-site cold spares). We may need an
upstream OC12 in the future but that's a ways out and not a concern
here.

Our engineering team has settled on three $20k/node options:
- Sup720-3BXLs with PS and fan upgrades
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to NPE-G2s across a 2-3Gbps port-channel
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to a 12008 with E3 engines across a 2-3Gbps port-channel.

Ideas and constructive opinions welcome, especially software and
stability-related.

Many thanks,
-Dave







"The information transmitted is intended only for the person or entity to which 
it is addressed and contains confidential and/or privileged material. If you 
received this in error, please contact the sender immediately and then destroy 
this transmission, including all attachments, without copying, distributing or 
disclosing same. Thank you."



RE: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Leland E. Vandervort

We're running several six 65xx Sup720-3BXL with 3 full transit views and
some 40-odd peers.  We use two NPE-G1s for reflectors and some policy
manipulation.  Also running MPLS in the core to allow for traffic
engineering and EoMPLS between certain services located in different
locations.

We're pushing up to between 800M and 1G at peak times (mostly outbound)
with this setup and peak CPU on the 3BXLs is running maybe 30% -- average
though of around 8 to 10%.

Hope this helps

side-note:

I'm actually more worried about the distribution layer at the moment as it
relies heavily on STP and HSRP/GLBP for the various vlans and access layer
gunk.  Currently these are 720-3B (non-XL), but looking eventually to
build a business case to upgrade these to VSS1440 to simplify the
architecture as well as providing better resilience and elimination of
STP/HSRP/GLBP limitations between the dist and access layers.  Problem is
the budget side of that... blargh!

Ideally I'd like to go more for the Nexus platform for this part of the
network, given that we're doing a lot of virtualisation etc., but the
downsides with that are primarily the COST of the bloody things, and
secondly the fact that they don't currently support MPLS (planned for
later this year, apparently).

Leland






On Fri, 15 May 2009, Paul Stewart wrote:

> We've never pushed a NPE-G2 to 800Mb/s before but I would think they
> would topple over... hopefully someone on here could confirm my
> statement?
>
> Moving the BGP to the 12008's would be my choice with PRP-2 processors
> if the budget fits we're faced with a similar upgrade next year
> possibly moving BGP from a pair of 7606's (Sup720-3BXL) over to a pair
> of GSR's running PRP2 I think - the BGP processing etc. is pushing the
> CPU's too high on the 7600's
>
> Someone else might suggest the RSP720's but haven't had them in a
> production environment yet...  we had PRP2's running on 12012 for a
> while and found them rock solid even with older line cards etc...
>
> Hope this helps a bit...;)
>
> Paul
>
>
> -Original Message-
> From: David Storandt [mailto:dstora...@teljet.com]
> Sent: Friday, May 15, 2009 11:08 AM
> To: NANOG list
> Subject: NPE-G2 vs. Sup720-3BXL
>
> We're stuck in an engineering pickle, so some experience from this
> crew would be useful in tie-breaking...
>
> We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
> Internet traffic, currently using 6509/Sup2s for core routing and port
> aggregation. The MSFC2s are under stress from 3x full route feeds,
> pared down to 85% to fit the TCAM tables. One system has a FlexWAN
> with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
> (stable IOS and esp. disabling SPD) helped a lot but still doesn't
> have the power to pull through. Hardware upgrades are needed...
>
> We need true full routes and more CPU horsepower for crunching BGP
> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
> one each at two locations. Oh yeah, we're still a larger startup
> without endless pockets. Power, rack space, and SmartNet are not
> concerns at any location (on-site cold spares). We may need an
> upstream OC12 in the future but that's a ways out and not a concern
> here.
>
> Our engineering team has settled on three $20k/node options:
> - Sup720-3BXLs with PS and fan upgrades
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to NPE-G2s across a 2-3Gbps port-channel
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to a 12008 with E3 engines across a 2-3Gbps port-channel.
>
> Ideas and constructive opinions welcome, especially software and
> stability-related.
>
> Many thanks,
> -Dave
>
>
>
>
>
> 
>
> "The information transmitted is intended only for the person or entity to 
> which it is addressed and contains confidential and/or privileged material. 
> If you received this in error, please contact the sender immediately and then 
> destroy this transmission, including all attachments, without copying, 
> distributing or disclosing same. Thank you."
>
>




Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Aaron Millisor
We ran into a similar quandary and have about the same amount of traffic as your 
network. When purchasing gear a year ago we decided against 7200's with an 
NPE-G2 as insufficient for the load.  Have you looked at the 7304?


The Cisco 7304 with an NSE-150 processing engine on it offloads a lot of the 
packet processing to dedicated hardware, and doesn't have TCAM limitations for 
routes. You can hold several full feeds and do the amount of traffic you're 
talking about without breaking a sweat.


http://www.cisco.com/en/US/prod/collateral/routers/ps352/prod_bulletin0900aecd8060aac5.html

It is capable of supporting both legacy port adapters (from your Flexwan or 7200 
routers) and SPA cards with the right add-in modules, which IIRC is only a few 
hundred dollars.


I'd be glad to answer any questions you have about our implementation.

--am

David Storandt wrote:

We're stuck in an engineering pickle, so some experience from this
crew would be useful in tie-breaking...

We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
Internet traffic, currently using 6509/Sup2s for core routing and port
aggregation. The MSFC2s are under stress from 3x full route feeds,
pared down to 85% to fit the TCAM tables. One system has a FlexWAN
with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
(stable IOS and esp. disabling SPD) helped a lot but still doesn't
have the power to pull through. Hardware upgrades are needed...

We need true full routes and more CPU horsepower for crunching BGP
(+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
one each at two locations. Oh yeah, we're still a larger startup
without endless pockets. Power, rack space, and SmartNet are not
concerns at any location (on-site cold spares). We may need an
upstream OC12 in the future but that's a ways out and not a concern
here.

Our engineering team has settled on three $20k/node options:
- Sup720-3BXLs with PS and fan upgrades
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to NPE-G2s across a 2-3Gbps port-channel
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to a 12008 with E3 engines across a 2-3Gbps port-channel.

Ideas and constructive opinions welcome, especially software and
stability-related.

Many thanks,
-Dave




Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Alex H. Ryu
Cisco 7304 may not adequate for service provider.
It's CPU/IO-controller is tied together, and doesn't provide much of
benefit.

Cisco 7200/7300 is enterprise solution pretty much, and doesn't support
distributed CEF.

If you are considering SUP720-3BXL, why not considering RSP720-3CXL ?

Alex


Aaron Millisor wrote:
> We ran into a similar quandary and have about the same amount of
> traffic as your network. When purchasing gear a year ago we decided
> against 7200's with an NPE-G2 as insufficient for the load. Have you
> looked at the 7304?
>
> The Cisco 7304 with an NSE-150 processing engine on it offloads a lot
> of the packet processing to dedicated hardware, and doesn't have TCAM
> limitations for routes. You can hold several full feeds and do the
> amount of traffic you're talking about without breaking a sweat.
>
> http://www.cisco.com/en/US/prod/collateral/routers/ps352/prod_bulletin0900aecd8060aac5.html
>
>
> It is capable of supporting both legacy port adapters (from your
> Flexwan or 7200 routers) and SPA cards with the right add-in modules,
> which IIRC is only a few hundred dollars.
>
> I'd be glad to answer any questions you have about our implementation.
>
> --am
>
> David Storandt wrote:
>> We're stuck in an engineering pickle, so some experience from this
>> crew would be useful in tie-breaking...
>>
>> We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
>> Internet traffic, currently using 6509/Sup2s for core routing and port
>> aggregation. The MSFC2s are under stress from 3x full route feeds,
>> pared down to 85% to fit the TCAM tables. One system has a FlexWAN
>> with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
>> (stable IOS and esp. disabling SPD) helped a lot but still doesn't
>> have the power to pull through. Hardware upgrades are needed...
>>
>> We need true full routes and more CPU horsepower for crunching BGP
>> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
>> one each at two locations. Oh yeah, we're still a larger startup
>> without endless pockets. Power, rack space, and SmartNet are not
>> concerns at any location (on-site cold spares). We may need an
>> upstream OC12 in the future but that's a ways out and not a concern
>> here.
>>
>> Our engineering team has settled on three $20k/node options:
>> - Sup720-3BXLs with PS and fan upgrades
>> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
>> off to NPE-G2s across a 2-3Gbps port-channel
>> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
>> off to a 12008 with E3 engines across a 2-3Gbps port-channel.
>>
>> Ideas and constructive opinions welcome, especially software and
>> stability-related.
>>
>> Many thanks,
>> -Dave
>
>
>




Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread David Storandt
I would love to use the RSP720-3CXL, but cost and the PA OC3 are the
difficulties.

If the RSP720s will run in a 6500 chassis, great! We wouldn't have to
purchase new chassis and the increased downtime for the swap-out.

RSP720 don't support the older bus-only FlexWAN either with the OC3 PA
we're using, so we'd have to figure out a solution for that - SIPs,
Enhanced FlexWAN, or external routers. Bah.

...the RSP720s + chassis + OC3 solution more than double our $20k/node
budget, so that's a much tougher sell internally.

-Dave


2009/5/15 Alex H. Ryu :
> Cisco 7304 may not adequate for service provider.
> It's CPU/IO-controller is tied together, and doesn't provide much of
> benefit.
>
> Cisco 7200/7300 is enterprise solution pretty much, and doesn't support
> distributed CEF.
>
> If you are considering SUP720-3BXL, why not considering RSP720-3CXL ?
>
> Alex
>
>
> Aaron Millisor wrote:
>> We ran into a similar quandary and have about the same amount of
>> traffic as your network. When purchasing gear a year ago we decided
>> against 7200's with an NPE-G2 as insufficient for the load. Have you
>> looked at the 7304?
>>
>> The Cisco 7304 with an NSE-150 processing engine on it offloads a lot
>> of the packet processing to dedicated hardware, and doesn't have TCAM
>> limitations for routes. You can hold several full feeds and do the
>> amount of traffic you're talking about without breaking a sweat.
>>
>> http://www.cisco.com/en/US/prod/collateral/routers/ps352/prod_bulletin0900aecd8060aac5.html
>>
>>
>> It is capable of supporting both legacy port adapters (from your
>> Flexwan or 7200 routers) and SPA cards with the right add-in modules,
>> which IIRC is only a few hundred dollars.
>>
>> I'd be glad to answer any questions you have about our implementation.
>>
>> --am
>>
>> David Storandt wrote:
>>> We're stuck in an engineering pickle, so some experience from this
>>> crew would be useful in tie-breaking...
>>>
>>> We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
>>> Internet traffic, currently using 6509/Sup2s for core routing and port
>>> aggregation. The MSFC2s are under stress from 3x full route feeds,
>>> pared down to 85% to fit the TCAM tables. One system has a FlexWAN
>>> with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
>>> (stable IOS and esp. disabling SPD) helped a lot but still doesn't
>>> have the power to pull through. Hardware upgrades are needed...
>>>
>>> We need true full routes and more CPU horsepower for crunching BGP
>>> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
>>> one each at two locations. Oh yeah, we're still a larger startup
>>> without endless pockets. Power, rack space, and SmartNet are not
>>> concerns at any location (on-site cold spares). We may need an
>>> upstream OC12 in the future but that's a ways out and not a concern
>>> here.
>>>
>>> Our engineering team has settled on three $20k/node options:
>>> - Sup720-3BXLs with PS and fan upgrades
>>> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
>>> off to NPE-G2s across a 2-3Gbps port-channel
>>> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
>>> off to a 12008 with E3 engines across a 2-3Gbps port-channel.
>>>
>>> Ideas and constructive opinions welcome, especially software and
>>> stability-related.
>>>
>>> Many thanks,
>>> -Dave
>>
>>
>>
>
>



Re: you're not interesting, was Re: another brick in the wall[ed garden]

2009-05-15 Thread Owen DeLong


On May 14, 2009, at 10:07 PM, Mans Nilsson wrote:

Subject: Re: you're not interesting, was Re: another brick in the  
wall[ed garden] Date: Fri, May 15, 2009 at 09:58:32AM +1000 Quoting  
Mark Andrews (mark_andr...@isc.org):

And what's the next protocol that is going to be stomped on?


Anything except http; at which point everything will move to http, and
the firewalls are again useless.


This is, indeed, already happening.  In fact, I'm running an SMTP server
with TLS on port 80 to get around SPRINT's existing braindamage.

(or at least the braindamage they had at one point).

Owen


--
Måns Nilsson







RE: Managing your network devices via console

2009-05-15 Thread Dylan Ebner
We use Cyclades (avocent) devices in our data center. They have worked
great for us. Very reliable. Modem dial-in gives us great remote
capabilities if we have a major outage. We had troubles initially
getting them to work because the cable adapters were never pinned
correctly for Cisco. We ended up making our own rolled rj45-rj45 cables.
IIRC, this was a ton of work as you need to do some funky 2 wires in one
position stuff. 

We also use Cisco 2500's with modem on the aux and an octo-cable for the
devices. This works well too, but not as nice of an interface as the
Cyclades. No special cables needed though.

For power we have been using APC Managed PDU's. These have been
fantastic. No compaints.

 
 

-Original Message-
From: Mehmet Akcin [mailto:meh...@akcin.net] 
Sent: Thursday, May 14, 2009 9:30 PM
To: nanog@nanog.org
Subject: Managing your network devices via console

Hello,

It's always cool to have console access to routers/switches and nowadays
they are going from RS-232 to RJ-45 as a standart. I have got Avocent
DSR 2035 which is a KVM+Serial console (all in one).. but while I was
able to have it work against servers via KVM or/and Serial , I was
unable to make it work properly against any network device. I am
wondering if anyone had experience on DSR or similar boxes to configure
them against network devices console ports.

Making suggestions for alternative ways of centralizing network device
console management is also more than welcome, I guess the old fashioned
server attached usb-serial console is one of the most preferred way, but
feel free to provide if  you have good ideas

cheers

--
Mehmet





Weekly Routing Table Report

2009-05-15 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to bgp-st...@lists.apnic.net

For historical data, please see http://thyme.apnic.net.

If you have any comments please contact Philip Smith .

Routing Table Report   04:00 +10GMT Sat 16 May, 2009

Report Website: http://thyme.apnic.net
Detailed Analysis:  http://thyme.apnic.net/current/

Analysis Summary


BGP routing table entries examined:  288509
Prefixes after maximum aggregation:  136412
Deaggregation factor:  2.11
Unique aggregates announced to Internet: 141329
Total ASes present in the Internet Routing Table: 31265
Prefixes per ASN:  9.23
Origin-only ASes present in the Internet Routing Table:   27181
Origin ASes announcing only one prefix:   13271
Transit ASes present in the Internet Routing Table:4084
Transit-only ASes present in the Internet Routing Table: 93
Average AS path length visible in the Internet Routing Table:   3.6
Max AS path length visible:  33
Max AS path prepend of ASN (43683)   31
Prefixes from unregistered ASNs in the Routing Table:   464
Unregistered ASNs in the Routing Table: 151
Number of 32-bit ASNs allocated by the RIRs:144
Prefixes from 32-bit ASNs in the Routing Table:  33
Special use prefixes present in the Routing Table:0
Prefixes being announced from unallocated address space:217
Number of addresses announced to Internet:   2045653328
Equivalent to 121 /8s, 238 /16s and 49 /24s
Percentage of available address space announced:   55.2
Percentage of allocated address space announced:   63.9
Percentage of available address space allocated:   86.4
Percentage of address space in use by end-sites:   77.0
Total number of prefixes smaller than registry allocations:  142688

APNIC Region Analysis Summary
-

Prefixes being announced by APNIC Region ASes:67654
Total APNIC prefixes after maximum aggregation:   24179
APNIC Deaggregation factor:2.80
Prefixes being announced from the APNIC address blocks:   64332
Unique aggregates announced from the APNIC address blocks:29021
APNIC Region origin ASes present in the Internet Routing Table:3628
APNIC Prefixes per ASN:   17.73
APNIC Region origin ASes announcing only one prefix:990
APNIC Region transit ASes present in the Internet Routing Table:559
Average APNIC Region AS path length visible:3.5
Max APNIC Region AS path length visible: 18
Number of APNIC addresses announced to Internet:  413775280
Equivalent to 24 /8s, 169 /16s and 181 /24s
Percentage of available APNIC address space announced: 77.1

APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431
(pre-ERX allocations)  23552-24575, 37888-38911, 45056-46079
APNIC Address Blocks58/8,  59/8,  60/8,  61/8, 110/8, 111/8, 112/8,
   113/8, 114/8, 115/8, 116/8, 117/8, 118/8, 119/8,
   120/8, 121/8, 122/8, 123/8, 124/8, 125/8, 126/8,
   180/8, 183/8, 202/8, 203/8, 210/8, 211/8, 218/8,
   219/8, 220/8, 221/8, 222/8,

ARIN Region Analysis Summary


Prefixes being announced by ARIN Region ASes:125540
Total ARIN prefixes after maximum aggregation:66187
ARIN Deaggregation factor: 1.90
Prefixes being announced from the ARIN address blocks:94652
Unique aggregates announced from the ARIN address blocks: 36596
ARIN Region origin ASes present in the Internet Routing Table:12997
ARIN Prefixes per ASN: 7.28
ARIN Region origin ASes announcing only one prefix:5002
ARIN Region transit ASes present in the Internet Routing Table:1272
Average ARIN Region AS path length visible: 3.3
Max ARIN Region AS path length visible:  24
Number of ARIN addresses announced to Internet:   428644608
Equivalent to 25 /8s, 140 /16s and 153 /24s
Percentage of available ARIN address space announced:  82.4

ARIN AS Blocks 1-1876, 1902-2042, 2044-2046, 2048-2106
(pre-ERX allocations)  2138-2584, 2615-2772, 2823-

Re: Managing your network devices via console

2009-05-15 Thread Michael Smiley
I am yet another that uses and loves Cyclades in my data center. The new ACS
6000 series is what I have now, which is quite nice due to the software pin
switching they have on that unit, this means no more special cisco dongles.
Also part of the reason for my use of the ACS is for the integration of the
Cyclades power strips, very seemless very nice. I have also used the Cisco
terminal server mods in the past and they worked just fine as well, though I
have no modern experience there.

-smiley

On Fri, May 15, 2009 at 11:04 AM, Dylan Ebner wrote:

> We use Cyclades (avocent) devices in our data center. They have worked
> great for us. Very reliable. Modem dial-in gives us great remote
> capabilities if we have a major outage. We had troubles initially
> getting them to work because the cable adapters were never pinned
> correctly for Cisco. We ended up making our own rolled rj45-rj45 cables.
> IIRC, this was a ton of work as you need to do some funky 2 wires in one
> position stuff.
>
> We also use Cisco 2500's with modem on the aux and an octo-cable for the
> devices. This works well too, but not as nice of an interface as the
> Cyclades. No special cables needed though.
>
> For power we have been using APC Managed PDU's. These have been
> fantastic. No compaints.
>
>
>
>
> -Original Message-
> From: Mehmet Akcin [mailto:meh...@akcin.net]
> Sent: Thursday, May 14, 2009 9:30 PM
> To: nanog@nanog.org
> Subject: Managing your network devices via console
>
> Hello,
>
> It's always cool to have console access to routers/switches and nowadays
> they are going from RS-232 to RJ-45 as a standart. I have got Avocent
> DSR 2035 which is a KVM+Serial console (all in one).. but while I was
> able to have it work against servers via KVM or/and Serial , I was
> unable to make it work properly against any network device. I am
> wondering if anyone had experience on DSR or similar boxes to configure
> them against network devices console ports.
>
> Making suggestions for alternative ways of centralizing network device
> console management is also more than welcome, I guess the old fashioned
> server attached usb-serial console is one of the most preferred way, but
> feel free to provide if  you have good ideas
>
> cheers
>
> --
> Mehmet
>
>
>
>


Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Brian Feeny


I have used the 7304 in the past and was happy with it.  In fact I  
still have a 6-port DS3 module for a 7304 which I need to find a home  
for if anyone has the need.


The 7304 originally had its own specific modules that went into it.   
But they also sell carrier card for it so you can use standard PA's,  
as well as the SPA's which is nice.  Overall footprint is rather nice,  
and I use to use those 6-port DS3 cards which allowed for hefty DS3  
termination.


Brian

On May 15, 2009, at 12:44 PM, Aaron Millisor wrote:

We ran into a similar quandary and have about the same amount of  
traffic as your network. When purchasing gear a year ago we decided  
against 7200's with an NPE-G2 as insufficient for the load.  Have  
you looked at the 7304?


The Cisco 7304 with an NSE-150 processing engine on it offloads a  
lot of the packet processing to dedicated hardware, and doesn't have  
TCAM limitations for routes. You can hold several full feeds and do  
the amount of traffic you're talking about without breaking a sweat.


http://www.cisco.com/en/US/prod/collateral/routers/ps352/prod_bulletin0900aecd8060aac5.html

It is capable of supporting both legacy port adapters (from your  
Flexwan or 7200 routers) and SPA cards with the right add-in  
modules, which IIRC is only a few hundred dollars.


I'd be glad to answer any questions you have about our implementation.

--am

David Storandt wrote:

We're stuck in an engineering pickle, so some experience from this
crew would be useful in tie-breaking...
We operate a business-grade FTTx ISP with ~75 customers and 800Mbps  
of
Internet traffic, currently using 6509/Sup2s for core routing and  
port

aggregation. The MSFC2s are under stress from 3x full route feeds,
pared down to 85% to fit the TCAM tables. One system has a FlexWAN
with an OC3 card and it's crushing the CPU on the MSFC2. System  
tuning

(stable IOS and esp. disabling SPD) helped a lot but still doesn't
have the power to pull through. Hardware upgrades are needed...
We need true full routes and more CPU horsepower for crunching BGP
(+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
one each at two locations. Oh yeah, we're still a larger startup
without endless pockets. Power, rack space, and SmartNet are not
concerns at any location (on-site cold spares). We may need an
upstream OC12 in the future but that's a ways out and not a concern
here.
Our engineering team has settled on three $20k/node options:
- Sup720-3BXLs with PS and fan upgrades
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge  
routing

off to NPE-G2s across a 2-3Gbps port-channel
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge  
routing

off to a 12008 with E3 engines across a 2-3Gbps port-channel.
Ideas and constructive opinions welcome, especially software and
stability-related.
Many thanks,
-Dave







Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Arie Vayner
David,

My 1st advice would be to look also at the other features/capabilities you
require, and not just at "feeds and speeds".

Some examples for functionality could be:
- QOS
- NetFlow
- DDoS resistance

In general the 6500 and the 12000 are hardware based platforms, with the
12000 being more distributed in nature, using linecard resources for data
plane (6500 does it too if you have DFC installed). 7200 is a CPU/software
based platform, so the same processor does packet forwarding and control
plane processing.

The 6500 (depends on specific module selection) is more restricted with QOS
and NetFlow functionality as it is designed to do very fast forwarding at a
relativly cheaper price.
The 12000 has everything implemented in hardware, and depends on the engine
types (don't use anything other than Eng 3 or 5) has all the support you may
dream of for things like QOS and other features.
The 7200 is a software based router, which means that it support any feature
you may ever dream of, but the scalability decreases as you turn them on.

Another option you should consider seriously should be the ASR1000 router,
which is a newer platform and has a new architecture. All its features are
based on hardware support, and it could actually prove the best choice for
what you need.
The ASR1002 comes with 4 integrated 1GE ports, which could be all that you
would ever need (but it has quite a few extension slots left).

Arie

On Fri, May 15, 2009 at 6:07 PM, David Storandt wrote:

> We're stuck in an engineering pickle, so some experience from this
> crew would be useful in tie-breaking...
>
> We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
> Internet traffic, currently using 6509/Sup2s for core routing and port
> aggregation. The MSFC2s are under stress from 3x full route feeds,
> pared down to 85% to fit the TCAM tables. One system has a FlexWAN
> with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
> (stable IOS and esp. disabling SPD) helped a lot but still doesn't
> have the power to pull through. Hardware upgrades are needed...
>
> We need true full routes and more CPU horsepower for crunching BGP
> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
> one each at two locations. Oh yeah, we're still a larger startup
> without endless pockets. Power, rack space, and SmartNet are not
> concerns at any location (on-site cold spares). We may need an
> upstream OC12 in the future but that's a ways out and not a concern
> here.
>
> Our engineering team has settled on three $20k/node options:
> - Sup720-3BXLs with PS and fan upgrades
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to NPE-G2s across a 2-3Gbps port-channel
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to a 12008 with E3 engines across a 2-3Gbps port-channel.
>
> Ideas and constructive opinions welcome, especially software and
> stability-related.
>
> Many thanks,
> -Dave
>
>


RE: NANOG Digest, Vol 16, Issue 60

2009-05-15 Thread Kesva Naidoo
I would not like to punt another vendor's equipment but have you looked
at the MX-480 or MX-960. You would not have to worry about CPU
limitations and it is an Internet core box capable of handling all the
protocols.

Kesva


-Original Message-
From: nanog-requ...@nanog.org [mailto:nanog-requ...@nanog.org] 
Sent: Friday, May 15, 2009 2:16 PM
To: nanog@nanog.org
Subject: NANOG Digest, Vol 16, Issue 60

Send NANOG mailing list submissions to
nanog@nanog.org

To subscribe or unsubscribe via the World Wide Web, visit
http://mailman.nanog.org/mailman/listinfo/nanog
or, via email, send a message with subject or body 'help' to
nanog-requ...@nanog.org

You can reach the person managing the list at
nanog-ow...@nanog.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of NANOG digest..."


Today's Topics:

   1. RE: NPE-G2 vs. Sup720-3BXL (Leland E. Vandervort)
   2. Re: NPE-G2 vs. Sup720-3BXL (Aaron Millisor)
   3. Re: NPE-G2 vs. Sup720-3BXL (Alex H. Ryu)
   4. Re: NPE-G2 vs. Sup720-3BXL (David Storandt)
   5. Re: you're not interesting,   was Re: another brick in the
  wall[ed garden] (Owen DeLong)
   6. RE: Managing your network devices via console (Dylan Ebner)
   7. Weekly Routing Table Report (Routing Analysis Role Account)


--

Message: 1
Date: Fri, 15 May 2009 16:21:23 + (GMT)
From: "Leland E. Vandervort" 
Subject: RE: NPE-G2 vs. Sup720-3BXL
To: Paul Stewart 
Cc: NANOG list 
Message-ID:

Content-Type: TEXT/PLAIN; charset=US-ASCII


We're running several six 65xx Sup720-3BXL with 3 full transit views and
some 40-odd peers.  We use two NPE-G1s for reflectors and some policy
manipulation.  Also running MPLS in the core to allow for traffic
engineering and EoMPLS between certain services located in different
locations.

We're pushing up to between 800M and 1G at peak times (mostly outbound)
with this setup and peak CPU on the 3BXLs is running maybe 30% --
average
though of around 8 to 10%.

Hope this helps

side-note:

I'm actually more worried about the distribution layer at the moment as
it
relies heavily on STP and HSRP/GLBP for the various vlans and access
layer
gunk.  Currently these are 720-3B (non-XL), but looking eventually to
build a business case to upgrade these to VSS1440 to simplify the
architecture as well as providing better resilience and elimination of
STP/HSRP/GLBP limitations between the dist and access layers.  Problem
is
the budget side of that... blargh!

Ideally I'd like to go more for the Nexus platform for this part of the
network, given that we're doing a lot of virtualisation etc., but the
downsides with that are primarily the COST of the bloody things, and
secondly the fact that they don't currently support MPLS (planned for
later this year, apparently).

Leland






On Fri, 15 May 2009, Paul Stewart wrote:

> We've never pushed a NPE-G2 to 800Mb/s before but I would think they
> would topple over... hopefully someone on here could confirm my
> statement?
>
> Moving the BGP to the 12008's would be my choice with PRP-2 processors
> if the budget fits we're faced with a similar upgrade next year
> possibly moving BGP from a pair of 7606's (Sup720-3BXL) over to a pair
> of GSR's running PRP2 I think - the BGP processing etc. is pushing the
> CPU's too high on the 7600's
>
> Someone else might suggest the RSP720's but haven't had them in a
> production environment yet...  we had PRP2's running on 12012 for a
> while and found them rock solid even with older line cards etc...
>
> Hope this helps a bit...;)
>
> Paul
>
>
> -Original Message-
> From: David Storandt [mailto:dstora...@teljet.com]
> Sent: Friday, May 15, 2009 11:08 AM
> To: NANOG list
> Subject: NPE-G2 vs. Sup720-3BXL
>
> We're stuck in an engineering pickle, so some experience from this
> crew would be useful in tie-breaking...
>
> We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
> Internet traffic, currently using 6509/Sup2s for core routing and port
> aggregation. The MSFC2s are under stress from 3x full route feeds,
> pared down to 85% to fit the TCAM tables. One system has a FlexWAN
> with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
> (stable IOS and esp. disabling SPD) helped a lot but still doesn't
> have the power to pull through. Hardware upgrades are needed...
>
> We need true full routes and more CPU horsepower for crunching BGP
> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
> one each at two locations. Oh yeah, we're still a larger startup
> without endless pockets. Power, rack space, and SmartNet are not
> concerns at any location (on-site cold spares). We may need an
> upstream OC12 in the future but that's a ways out and not a concern
> here.
>
> Our engineering team has settled on three $20k/node options:
> - Sup720-3BXLs with PS and fan upgrades
> - Sup2s as

RE: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Crooks, Sam
You may also take a look at the Cisco ASR1000 line... Supposedly a
middle step between 7200 and 7600 router sizing..

 

> -Original Message-
> From: Arie Vayner [mailto:arievay...@gmail.com] 
> Sent: Friday, May 15, 2009 1:34 PM
> To: David Storandt
> Cc: NANOG list
> Subject: Re: NPE-G2 vs. Sup720-3BXL
> 
> David,
> 
> My 1st advice would be to look also at the other 
> features/capabilities you require, and not just at "feeds and speeds".
> 
> Some examples for functionality could be:
> - QOS
> - NetFlow
> - DDoS resistance
> 
> In general the 6500 and the 12000 are hardware based 
> platforms, with the 12000 being more distributed in nature, 
> using linecard resources for data plane (6500 does it too if 
> you have DFC installed). 7200 is a CPU/software based 
> platform, so the same processor does packet forwarding and 
> control plane processing.
> 
> The 6500 (depends on specific module selection) is more 
> restricted with QOS and NetFlow functionality as it is 
> designed to do very fast forwarding at a relativly cheaper price.
> The 12000 has everything implemented in hardware, and depends 
> on the engine types (don't use anything other than Eng 3 or 
> 5) has all the support you may dream of for things like QOS 
> and other features.
> The 7200 is a software based router, which means that it 
> support any feature you may ever dream of, but the 
> scalability decreases as you turn them on.
> 
> Another option you should consider seriously should be the 
> ASR1000 router, which is a newer platform and has a new 
> architecture. All its features are based on hardware support, 
> and it could actually prove the best choice for what you need.
> The ASR1002 comes with 4 integrated 1GE ports, which could be 
> all that you would ever need (but it has quite a few 
> extension slots left).
> 
> Arie
> 
> On Fri, May 15, 2009 at 6:07 PM, David Storandt 
> wrote:
> 
> > We're stuck in an engineering pickle, so some experience from this 
> > crew would be useful in tie-breaking...
> >
> > We operate a business-grade FTTx ISP with ~75 customers and 
> 800Mbps of 
> > Internet traffic, currently using 6509/Sup2s for core 
> routing and port 
> > aggregation. The MSFC2s are under stress from 3x full route feeds, 
> > pared down to 85% to fit the TCAM tables. One system has a FlexWAN 
> > with an OC3 card and it's crushing the CPU on the MSFC2. 
> System tuning 
> > (stable IOS and esp. disabling SPD) helped a lot but still doesn't 
> > have the power to pull through. Hardware upgrades are needed...
> >
> > We need true full routes and more CPU horsepower for crunching BGP
> > (+12 smaller peers + ISIS). OC3 interfaces are going to be 
> mandatory, 
> > one each at two locations. Oh yeah, we're still a larger startup 
> > without endless pockets. Power, rack space, and SmartNet are not 
> > concerns at any location (on-site cold spares). We may need an 
> > upstream OC12 in the future but that's a ways out and not a concern 
> > here.
> >
> > Our engineering team has settled on three $20k/node options:
> > - Sup720-3BXLs with PS and fan upgrades
> > - Sup2s as switches + ISIS + statics and no BGP, push BGP 
> edge routing 
> > off to NPE-G2s across a 2-3Gbps port-channel
> > - Sup2s as switches + ISIS + statics and no BGP, push BGP 
> edge routing 
> > off to a 12008 with E3 engines across a 2-3Gbps port-channel.
> >
> > Ideas and constructive opinions welcome, especially software and 
> > stability-related.
> >
> > Many thanks,
> > -Dave
> >
> >
> 



Re: Managing your network devices via console

2009-05-15 Thread Mehmet Akcin
Thanks everyone for the answers...

It came down to a point where, just sticking a male-to-male null modem
in between made this work at 9600 =)

I guess sometimes solutions are way easier than we may think, heh.

Mehmet

On Fri, May 15, 2009 at 11:04 AM, Dylan Ebner  wrote:
> We use Cyclades (avocent) devices in our data center. They have worked
> great for us. Very reliable. Modem dial-in gives us great remote
> capabilities if we have a major outage. We had troubles initially
> getting them to work because the cable adapters were never pinned
> correctly for Cisco. We ended up making our own rolled rj45-rj45 cables.
> IIRC, this was a ton of work as you need to do some funky 2 wires in one
> position stuff.
>
> We also use Cisco 2500's with modem on the aux and an octo-cable for the
> devices. This works well too, but not as nice of an interface as the
> Cyclades. No special cables needed though.
>
> For power we have been using APC Managed PDU's. These have been
> fantastic. No compaints.
>
>
>
>
> -Original Message-
> From: Mehmet Akcin [mailto:meh...@akcin.net]
> Sent: Thursday, May 14, 2009 9:30 PM
> To: nanog@nanog.org
> Subject: Managing your network devices via console
>
> Hello,
>
> It's always cool to have console access to routers/switches and nowadays
> they are going from RS-232 to RJ-45 as a standart. I have got Avocent
> DSR 2035 which is a KVM+Serial console (all in one).. but while I was
> able to have it work against servers via KVM or/and Serial , I was
> unable to make it work properly against any network device. I am
> wondering if anyone had experience on DSR or similar boxes to configure
> them against network devices console ports.
>
> Making suggestions for alternative ways of centralizing network device
> console management is also more than welcome, I guess the old fashioned
> server attached usb-serial console is one of the most preferred way, but
> feel free to provide if  you have good ideas
>
> cheers
>
> --
> Mehmet
>
>
>



-- 
Mehmet Akcin
Blog: http:///akcin.net
E-mail: meh...@akcin.net



Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Adam LaFountain
> We need true full routes and more CPU horsepower for crunching BGP
> (+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
> one each at two locations. Oh yeah, we're still a larger startup
> without endless pockets. Power, rack space, and SmartNet are not
> concerns at any location (on-site cold spares). We may need an
> upstream OC12 in the future but that's a ways out and not a concern
> here.
>
> Our engineering team has settled on three $20k/node options:
> - Sup720-3BXLs with PS and fan upgrades
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to NPE-G2s across a 2-3Gbps port-channel
> - Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
> off to a 12008 with E3 engines across a 2-3Gbps port-channel.
>
> Ideas and constructive opinions welcome, especially software and
> stability-related.
>




For about $6k all in, you could pickup a monster dual Xeon server with a few
10GE PCI line cards and run a subscription service of the Vyatta open source
router.  With high end machine specs, we've been able to run 5 full tables
and a solid amount of peers with about 6.5Gbps sustained to the net without
any stress.  For  access, we just trunk one of the PCI cards down to a 6506
or a 3750 and it runs nice and clean.  The only downside to this setup is
the lack of cisco proprietary software features which it sounds like you
might need.  If anything you might be able to keep your existing setup and
uplink everything to one of these routers as an edge device.

Adam


___
Adam LaFountain


Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Aaron Millisor
Yeah, as long as you're using the NSE-150 and are using features supported by 
the PXF such that it's not punting to the RP, the performance is really good.


--am

Brian Feeny wrote:


I have used the 7304 in the past and was happy with it.  In fact I still 
have a 6-port DS3 module for a 7304 which I need to find a home for if 
anyone has the need.


The 7304 originally had its own specific modules that went into it.  But 
they also sell carrier card for it so you can use standard PA's, as well 
as the SPA's which is nice.  Overall footprint is rather nice, and I use 
to use those 6-port DS3 cards which allowed for hefty DS3 termination.


Brian

On May 15, 2009, at 12:44 PM, Aaron Millisor wrote:

We ran into a similar quandary and have about the same amount of 
traffic as your network. When purchasing gear a year ago we decided 
against 7200's with an NPE-G2 as insufficient for the load.  Have you 
looked at the 7304?


The Cisco 7304 with an NSE-150 processing engine on it offloads a lot 
of the packet processing to dedicated hardware, and doesn't have TCAM 
limitations for routes. You can hold several full feeds and do the 
amount of traffic you're talking about without breaking a sweat.


http://www.cisco.com/en/US/prod/collateral/routers/ps352/prod_bulletin0900aecd8060aac5.html 



It is capable of supporting both legacy port adapters (from your 
Flexwan or 7200 routers) and SPA cards with the right add-in modules, 
which IIRC is only a few hundred dollars.


I'd be glad to answer any questions you have about our implementation.

--am

David Storandt wrote:

We're stuck in an engineering pickle, so some experience from this
crew would be useful in tie-breaking...
We operate a business-grade FTTx ISP with ~75 customers and 800Mbps of
Internet traffic, currently using 6509/Sup2s for core routing and port
aggregation. The MSFC2s are under stress from 3x full route feeds,
pared down to 85% to fit the TCAM tables. One system has a FlexWAN
with an OC3 card and it's crushing the CPU on the MSFC2. System tuning
(stable IOS and esp. disabling SPD) helped a lot but still doesn't
have the power to pull through. Hardware upgrades are needed...
We need true full routes and more CPU horsepower for crunching BGP
(+12 smaller peers + ISIS). OC3 interfaces are going to be mandatory,
one each at two locations. Oh yeah, we're still a larger startup
without endless pockets. Power, rack space, and SmartNet are not
concerns at any location (on-site cold spares). We may need an
upstream OC12 in the future but that's a ways out and not a concern
here.
Our engineering team has settled on three $20k/node options:
- Sup720-3BXLs with PS and fan upgrades
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to NPE-G2s across a 2-3Gbps port-channel
- Sup2s as switches + ISIS + statics and no BGP, push BGP edge routing
off to a 12008 with E3 engines across a 2-3Gbps port-channel.
Ideas and constructive opinions welcome, especially software and
stability-related.
Many thanks,
-Dave






Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Azher Mughal
New architectures might be helpful to achieve such throughput e.g.
Myricom pci-e Gen2 10GE cards on new Intel Nehalem based servers.

-Azher

Leo Bicknell wrote:
> In a message written on Fri, May 15, 2009 at 10:25:12PM -0400, 
> valdis.kletni...@vt.edu wrote:
>> Did you check PCI bus bandwidth?  That's probably going to be the biggest
>> constraint on "a few 10GBE interfaces" if they all get going full blast.
>> Remember that each packet is going to burn bandwidth twice - once in and
>> once out...
> 
> PCIe, x8 or x16, which is serial point to point.
> 
> http://www.csc.kth.se/~olofh/10G_OSR/10Gbps.pdf 
> 
> 25 Gb/sec across 4x10G ports on higher end but far from topped out
> hardware.
> 



Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread David Storandt
So I figure a summary is an order, with a whole array of choices
pitched so far...

- Sup720-3BXL works for light-duty premium ISP services, decent CPU
for BGP and an Ethernet hardware throughput monster. Decent enough for
our deployment scenario at least. No obvious solution for the
FlexWAN/OC3 but could easily be re-integrated with a stronger MSFC CPU
to back it up, assuming the IOS-of-the-week doesn't have issues. The
pesky OC3 could be pawned off to a dedicated G1/G2 router too along
with any oddball <=OC3 stuff our sales guys dream up.
- RSP720-3CXL is the best of all worlds option, if we had double the
budget to work with. Meh.
- ASR1002 is a hardware-assisted overhaul to the 7200/G2. Telco
interface options are much better than 7200s, good for OC12s and
OC48s. Using GoogleFu product pricing... a ASR1002 router with a SPA
OC3, 5Gbps ESP, and base software runs in the $28-30k range +
SmartNet. Beware the modular licensing model in addition to IOS
editions. Maybe a bit early yet as a core router as some of the
software is still getting bugs ironed out.
- Vyatta was proposed as an alternative system, probably best
architected out of the mainstream traffic flows (no hardware
forwarding), say a BGP route reflector or GBE edge router, similar
argument to a 7200/G[1|2]. I can't say I'm familiar with the software,
but the cost savings of premium x86/x64 hardware and 8x PCI-x serving
a few 10GBE interfaces + built-in GBEs is intriguing, especially
paired against our budget and relative Cisco costs. A spec'd out 1U
Dell box with dual power, 8x cores, 4GB, RAID1 SATA, and 2x 10GBE
XFP+2x GBE built-in came in under $7k with CPU headroom to burn.
Vyatta doesn't support ISIS though, best I can tell, but may not have
to... Maybe yet-another Linux router distro doomed to fail? Worth a
lab test internally on some demo hardware.
- Mixed thoughts about 7304 hardware. Hardware forwarding quality vs.
software and interface selection.
- Lots of fans for the 12000 series. Stick with the E3 (~2.5Gbps) and
E5 (~10Gbps) line cards for compatibility with XR software and best
line card performance. Our team liked the variety of SONET options
available too for our central office deployments, even though the
systems are power and space hungry. ...and if you can afford them (the
12008/GRP-B being the relative exception).
- 7200/G2s are great for <1Gbps throughput. Premium services cut into
the performance dramatically, being a fully software-based forwarding
platform. Don't bond interfaces looking for more throughput,
architecture limitations actually decrease throughput.
- Juniper MX series? A budget wildcard but indeed a worthy platform
engineering-wise.

You could break this list into "routers" and "switches", which in
itself spurs the philosophical/pragmatic architecture discussion that
got us the impasse to start with. Many thanks to all who've responded
with real-life successes, battle wounds, and horror stories. All very
helpful.

-Dave



ADMIN: List FAQ/Monthly Post.

2009-05-15 Thread NANOG Mail List Committee
This 100-line document contains 62% of what you need to know to avoid
annoying 10,000 people in your email to the NANOG list. It also contains
pointers to another 23%. Please take 5 minutes to read it before
you post [again].

General Information
===

About NANOG:http://www.nanog.org/about/
NANOG News: http://www.nanog.org/
NANOG lists and AUP:http://www.nanog.org/mailinglist/
NANOG List FAQ: http://www.nanog.org/mailinglist/listfaqs/

To Subscribe or Unsubscribe from the list:
http://mailman.nanog.org/mailman/listinfo/nanog

To contact the list's admins:   adm...@nanog.org


Posting Policy
==

The NANOG list has over 10,000 subscribers so it is very easy for a 
thread to have scores of posts while being off-topic and only of 
interest to only a small proportion of subscribers. Please consider 
before each post if your email will be of interest to the majority of 
members or might alternatively be emailed directly the people of 
interest or posted to another forum.

Please read the FAQ and AUP policy before posting for more details.


Especially the following are discouraged:

* Is a certain site down? Other Outages not affecting half the Internet.

  Please use http://downforeveryoneorjustme.com/ or a similar site.
  Please post to the Outages mailing list: http://wiki.outages.org

* Spam 

  Please use SPAM-L - http://www.claws-and-paws.com/spam-l

* Contacting People

  * http://puck.nether.net/netops/
  * http://www.peeringdb.com
  * Please try other methods of contacting sites before you post to 
NANOG. Saying something like "I tried calling 213-555- but no 
answer" shows you _have_ tried alternative methods first.

* Political Issues

  * Topics such as ICANN policy, Government Policy or Law changes that 
do not have short term Operational impact should be avoided.

* Operation topics with more specific lists

  * DNS - http://lists.oarci.net/mailman/listinfo/dns-operations
  * Email - http://www.mailop.org/

* NANOG Mailing list policy 

  Please use the nanog-futures list or contact adm...@nanog.org
  

Please also avoid
=

* Sending posts to the list relevant to only one or two people on this list,
  such as tests or traceroutes in response to another post for comparison
  to those originally posted.

* Jokes, Puns, amusing observations, spelling corrections.

Other NANOG related lists
=

* NANOG-futures - for discussion of the evolution of NANOG, including
  organizational structure, policies and procedures, and agendas for
  NANOG meetings. Such topics aren't appropriate for the main NANOG
  mailing list. 

  http://mailman.nanog.org/mailman/listinfo/nanog-futures

* nanog-attendee - For discussion of venue-specific issues relevant
  to attendees of the current NANOG physical meeting.

  http://mailman.nanog.org/mailman/listinfo/nanog-attendee

* nanog-announce - For announcements of NANOG meetings an other 
  Important NANOG related announcements. Low traffic and all posts are 
  also sent to main list.

  http://mailman.nanog.org/mailman/listinfo/nanog-announce


Other Mailing Lists
===

Information about related lists:

http://www.nanog.org/mailinglist/listfaqs/otherlists.php




Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Leo Bicknell
In a message written on Fri, May 15, 2009 at 10:25:12PM -0400, 
valdis.kletni...@vt.edu wrote:
> Did you check PCI bus bandwidth?  That's probably going to be the biggest
> constraint on "a few 10GBE interfaces" if they all get going full blast.
> Remember that each packet is going to burn bandwidth twice - once in and
> once out...

PCIe, x8 or x16, which is serial point to point.

http://www.csc.kth.se/~olofh/10G_OSR/10Gbps.pdf 

25 Gb/sec across 4x10G ports on higher end but far from topped out
hardware.

-- 
   Leo Bicknell - bickn...@ufp.org - CCIE 3440
PGP keys at http://www.ufp.org/~bicknell/


pgpaijuZ49CIE.pgp
Description: PGP signature


Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Alex H. Ryu

ASR is embedded linux solution with Quantum Processor architect if I
remember correctly.
So it uses IOS-XE, which is a little bit different from standard IOS.


If you have some room for budget, you can check Foundry MLX/XMR series
router.
It is more geared toward Ethernet Service Router.
But if you need OC3/12/48, you can have those with additional license fee.
Foundry router price is a lot lower than Juniper MX series router.

Alex


David Storandt wrote:
> So I figure a summary is an order, with a whole array of choices
> pitched so far...
>
> - Sup720-3BXL works for light-duty premium ISP services, decent CPU
> for BGP and an Ethernet hardware throughput monster. Decent enough for
> our deployment scenario at least. No obvious solution for the
> FlexWAN/OC3 but could easily be re-integrated with a stronger MSFC CPU
> to back it up, assuming the IOS-of-the-week doesn't have issues. The
> pesky OC3 could be pawned off to a dedicated G1/G2 router too along
> with any oddball <=OC3 stuff our sales guys dream up.
> - RSP720-3CXL is the best of all worlds option, if we had double the
> budget to work with. Meh.
> - ASR1002 is a hardware-assisted overhaul to the 7200/G2. Telco
> interface options are much better than 7200s, good for OC12s and
> OC48s. Using GoogleFu product pricing... a ASR1002 router with a SPA
> OC3, 5Gbps ESP, and base software runs in the $28-30k range +
> SmartNet. Beware the modular licensing model in addition to IOS
> editions. Maybe a bit early yet as a core router as some of the
> software is still getting bugs ironed out.
> - Vyatta was proposed as an alternative system, probably best
> architected out of the mainstream traffic flows (no hardware
> forwarding), say a BGP route reflector or GBE edge router, similar
> argument to a 7200/G[1|2]. I can't say I'm familiar with the software,
> but the cost savings of premium x86/x64 hardware and 8x PCI-x serving
> a few 10GBE interfaces + built-in GBEs is intriguing, especially
> paired against our budget and relative Cisco costs. A spec'd out 1U
> Dell box with dual power, 8x cores, 4GB, RAID1 SATA, and 2x 10GBE
> XFP+2x GBE built-in came in under $7k with CPU headroom to burn.
> Vyatta doesn't support ISIS though, best I can tell, but may not have
> to... Maybe yet-another Linux router distro doomed to fail? Worth a
> lab test internally on some demo hardware.
> - Mixed thoughts about 7304 hardware. Hardware forwarding quality vs.
> software and interface selection.
> - Lots of fans for the 12000 series. Stick with the E3 (~2.5Gbps) and
> E5 (~10Gbps) line cards for compatibility with XR software and best
> line card performance. Our team liked the variety of SONET options
> available too for our central office deployments, even though the
> systems are power and space hungry. ...and if you can afford them (the
> 12008/GRP-B being the relative exception).
> - 7200/G2s are great for <1Gbps throughput. Premium services cut into
> the performance dramatically, being a fully software-based forwarding
> platform. Don't bond interfaces looking for more throughput,
> architecture limitations actually decrease throughput.
> - Juniper MX series? A budget wildcard but indeed a worthy platform
> engineering-wise.
>
> You could break this list into "routers" and "switches", which in
> itself spurs the philosophical/pragmatic architecture discussion that
> got us the impasse to start with. Many thanks to all who've responded
> with real-life successes, battle wounds, and horror stories. All very
> helpful.
>
> -Dave
>
>
>
>   




Implementing MPLS L2 VPN with Cisco C3750ME

2009-05-15 Thread ty chan
Hi community, 

I am planning to implement MPLS with C3750ME. As i know C3750ME is full support 
MPLS viaES port, is it?
the IOS is c3750me-i5k91-mz.122-40.SE.bin. The application will be AToM(L2 VPN).

Prior to configure MPLS or OSPF, i need to make the link up first.  My problem 
is IP point-to-point link between 2 C3750ME with ES port doesn't work at all 
while L2 Point-to-Point works well. I had performed all troubleshoot technique 
that i know but still not work.

Does anyone used to have same problem as mine? How did you do to fix it?


Re: NPE-G2 vs. Sup720-3BXL

2009-05-15 Thread Valdis . Kletnieks
On Fri, 15 May 2009 22:20:28 EDT, David Storandt said:

> - Vyatta was proposed as an alternative system, probably best
> architected out of the mainstream traffic flows (no hardware
> forwarding), say a BGP route reflector or GBE edge router, similar
> argument to a 7200/G[1|2]. I can't say I'm familiar with the software,
> but the cost savings of premium x86/x64 hardware and 8x PCI-x serving
> a few 10GBE interfaces + built-in GBEs is intriguing, especially
> paired against our budget and relative Cisco costs. A spec'd out 1U
> Dell box with dual power, 8x cores, 4GB, RAID1 SATA, and 2x 10GBE
> XFP+2x GBE built-in came in under $7k with CPU headroom to burn.

Did you check PCI bus bandwidth?  That's probably going to be the biggest
constraint on "a few 10GBE interfaces" if they all get going full blast.
Remember that each packet is going to burn bandwidth twice - once in and
once out...


pgpiR8rR40QUe.pgp
Description: PGP signature