SDN and NFV is the next phase of technology change which will help service provider to launch the services in single click. This is all about the programmability of the networks by using open source software defined network controller.
Tuesday, June 30, 2009
7600 Sub-interface Creation Problem
While configuring sub-interface on 7600 a weird issue was observed. It was not allowing us to create vlan 1010 and throws a "errors % Configuring IP routing on a LAN subinterface is only allowed if that subinterface is already configured as part of an IEEE 802.10, IEEE 802.1Q,or ISL vLAN. To solve this issue we need to run the command "show vlan internal usuage" which tells about the status of vlan used by the module. If the vlan used for sub-interface is used here in that case need to check the vlan allocation policy. In our case the it is in ascending order and when we shifted it to decending order and a after soft reboot, the module takes the vlans from the higher series and freed the vlans like 1010.
Command for changing the vlan internal allocation policy is given below
vlan internal allocation policy descending
And here is the rest of it.
Click Here To Read Rest Of The Post...
Monday, June 29, 2009
Could IPSec Stop Viruses
Whenever I go to any customer call for MPLSVPN solution, the first question raises by customer is that how secure the MPLSVPN network is? I am weak in security and know little which is required for selling. The security doesn't mean that you are 100% secure and safe. In my last meet with the customer, he raised a option to go with ipsec vpn. I asked him why you are looking for IPSec vpn because already you are having a good security setup. The customer answered, "I want ot make my network secure from the virsues". He told me that you seem to be buzzing with lot of solutions. IS this IPSec work for me or not?
The answer given to me was so pitty and really I don't have any words to comment. I tried my level best to make him understand that IPSec couldn't save your network from the virsues,worms,spywares and not from the intruders. The main advantage of using IPSec is that if some one intrude the data by any means he couldn't reveal the information from it.
So the next time if you go for any custimer meet try to prepare youself how IPSec can help from Viruses.
Click Here To Read Rest Of The Post...
Thursday, June 25, 2009
How To Calculate Memory Of Processes
We know that every process in cisco router requires memory to store its attributes ot data and we always excite to see the memory used by the process. Given is the command which helps to know about the process id of the process.
show processes memory sorted
PID TTY Allocated Freed Holding Getbufs Retbufs Process
0 0 64551468 7466932 49502136 0 0 *Init*
226 0 1263113088 1362187140 44258324 136024 0 BGP Router
The above mentioned output states that process id used by bgp is 226. Now run the given command to see the memory occupied by bgp process.
show processes memory 226Process ID: 226
Process Name: BGP Router
Total Memory Held: 44310980 bytes (48 Mb)
These commands help to troubleshoot memory related issues very fastly.
Click Here To Read Rest Of The Post...
Tuesday, June 23, 2009
Grooming The Blog Or Website
The growth of internet is drastically increasing and everyone is getting addict of it. The person who is regular surfer of internet seems to build his/her identity in it. The best way to start a blog or publish a website. With the help of these electronic media one can injetcs his/her thoughts in terms of words. Once it is done, then the next step is to attract the tarrif. Do you think the traffic will come only with the help of words or thought process? The answer could be partially yes. The best way to attract the traffic is to groom the blog or website, it will help to attract more traffic and adsense business. How to groom the blog or website, it requires money to fulfil this job but if you are having little knowledge of programming and database then it can build free of cost. The best seen tool for creating website or blog is Joomla. It is under GNU licence and anyone can use it free. Try this and grab more traffic.
Click Here To Read Rest Of The Post...
Saturday, June 20, 2009
Aruba Launced Wireless Products
I got a chance to attend two day a wireless training on aruba products. Before training, my perception of cisco products was very strong but after training I came to know aruba is the one who is best competitor of cisco products mainly in wireless security. Aruba has launced a concept of thin ap client and the main focus is to save the capex as well as opex cost of the SMB industry. I was astonished to see the RAP-2WG which weighs less a mobile phone and is available at unbelievable price of $99. Any SMB who is having a branch which is less than 5 users could deply the product with zero IT expenditure. The provisioing of product is just a click and aruba named it zero-through provisioning.
List of new products launched
a) RAP-2WG (Remote Access Point)
b) RAP-5WN
c) RAP-5
The whole solution is called Virtual Branch Networking which replaces the legacy Virtual Private Network concept. Older controllers 200,800,2400,SC-1 & SC-2 doesn't support certificates but these new range of products support.
Click Here To Read Rest Of The Post...
Thursday, June 18, 2009
L2TPv3 Not Coming Down
The team stuck up in imbroglio where the l2tpv3 tunnel never torn down even after shutting down of physical sub-interface. There after lot of test were made but all in vein. The problem came with the SB13 ios but the opposite side was using different vendor equipment. The problem states that when the interface was shut down, no stop ack was sent to the remote peer, it is same as keepalives used in gre tunnel to get it torn. Still we are not able to find exact RCA except the IOS bug.
Click Here To Read Rest Of The Post...
Wednesday, June 17, 2009
Copying Webpages Crime
Copyrights of websites play vital role of being data copied. One could check teh website with the copyscape. This site helps to tell from where the data is copied and whether it's breaching copyrights acts or not. Basically site helps to search the copies of web pages over internet.
Please click here to access it.
Click Here To Read Rest Of The Post...
Tuesday, June 16, 2009
Analog Televison Halted
United States has come up with the plan to shut down the analog televsion and has started with digital one.Click here to read the full story.
Click Here To Read Rest Of The Post...
Thursday, June 11, 2009
Bootable GNS Is Boom
Everyone who is preparing for CCIE labs requires full fledge set up of routers & switches. Its a dicey situation where you scare to invest because its not sure whether the lab will going to be cleared or not and looking for return on investment also. The cheap and best solution for the problem is to use dynamips or gns3. But most of the time, the processes used by the computers not bearable and after working some time you would like to get rid from dynamips or gns. The awesome solution provided by in2dwok.Here the administrator has develped a bootable dynamips which is nont resource hungry and will help you to acehive the best results. Its free version and could be used with full swings.
Click Here To Read Rest Of The Post...
L2TPv3 Forces PIM Not Coming Up
The next time if you find that pim neighbourship is not coming up for a customer which is coming through l2tpv3 to MPLS enabled PE, might hit with the bug which is not listed in cisco bug tool kit. During the lab, we find the issue and look for the cisco site for bug but do not find any information. IOS used for l2tpv3 is entservices9 12.3(14)T5.The weird behavior which was seen is that PIM neighborship is coming up at CE end but not at PE end. If migrate the customer over GRE then it works fine because we were bypassing l2tpv3.
Click Here To Read Rest Of The Post...
Tuesday, June 9, 2009
Eradicate OSPF External Routes
Customers static routes appear as external route in service provider cloud during redistribution. This create lot of problems in terms of memory and ospf calculations. To over come this problem a solution is proposed with route map and tags which will defeat the issue.
Download the full document
Click Here To Read Rest Of The Post...
Saturday, June 6, 2009
Explicit Route Object
Signaling of MPLS is covered in my previous post. In this post I will be covering the functionality of Explicit Route Object aka ERO. MPLS TE builds in two ways one is with the help of dynamic process and another way is to establish is statically. In latter case ERO is used. ERO is having two parts one is Loose and another is Strict. Loose means from headend to tailend which is not directly connected and Strict means a directly connetced. Most of cases we use ERO and specifiy the next hop address but the problem occurs when multiple paths are available. For multiple path selction we require CSPF which will be explained in next post.
Click Here To Read Rest Of The Post...
Friday, June 5, 2009
Path Resv Messages
I wrote in the previous post about traffic engineering, how it could help to utilize the secondary link in case when primary link is congested. MPLS TE is used set up the tunnels from headend to tailend routers. Intermediate routers are only responsible to forward the tarffic. MPLS TE uses RSVP signalling which is aka Resource Reservation Protocol. It uses two messages to acomplaish this signaling: Path Messages & Resv Messages.
R1--R2---R3
According to the picture, R1 wants to set up the an MPLS TE with R3. R1 sends the path messages along the path to reserve the resources. If the requested resources are not available than router sends a message back to the requested router which is ingress router and it look for the another path. If another path is not available then in that case it would fail to establish the MPLE TE. MPLS TE signaling always flow from ingress router to egress router with path messages and labels distribution occured from egress to ingress with resv messages.
Click Here To Read Rest Of The Post...
Thursday, June 4, 2009
Traffic Engineering - Wonderful Gift
A general problem of empty secondary link is faced in service provider cloud. The primary link is runnnig out of bandwidth and secondary link is running as empty. If the tarffic works on load share or load balance form, customers might face the application issues. This situation is only overcome by traffic engineering.
Cisco provides the RSVP to implement traffic engineering tunnels but an another method is also there which is CRLDP which is not supported by cisco.
So next time when crunch of bandwidth is faced, implement traffic engineering in cloud.
Click Here To Read Rest Of The Post...
Tuesday, June 2, 2009
QOS amenity of network
QOS is the basic amenity of network. With its implementation various attacks could be halted. Below is the varios steps which are required to implement QOS in network.Steps of implementing QOS
Step 1:- Classification
Tools used for classification
Access Control List (ACL)
COS
Differentiated Services Code Point
Input-interface
Media Access Control (MAC) address
Packet length
Precedence
Protocol
VLAN
Step 2:- Queuing
Marking
Policing
Drop
Steps 3:- Congestion Management
Queue-limit
Random-dete
Bandwidth
Fair-queue
Priority
Shape
Click Here To Read Rest Of The Post...
Monday, June 1, 2009
Microsoft Launched New Search Engine
Microsoft has launched a new search engine named bing. For new visit the link. To visit bing click on http://www.bing.com.
regards
shivlu jain
Click Here To Read Rest Of The Post...
Subscribe to:
Posts (Atom)