MystaJoneS

If you're not making mistakes, then you're not doing anything.

  • A quick guide to setting up a GSM on a ISR using EHWIC-3G-HSPA+7.  You must get the data service account from you service provider, in turn you will receive a SIM card that you can install on to the EHWIC and an APN (Access Point Name) required to create a profile.

    Insert the SIM card into the EHWIC, insert in the router and power up the device.

    Chat scripts are strings fo text used to send commands for modems dialing to log in to remote systems, and to initialise asynchronous devices connected to an asynchronous line. 3G Wan interface should be treated just like any other async interface and the following chat script show the required information to connect to the GSM network, using a carrier-specific dial string and timeout value of 30 seconds.

    Step 1: Create a chat script

    chat-script [script-name] [script]

    Example

    chat-script GSM “” “AT!SCACT=1,1” TIMEOUT 30 “OK”

    Step 2: Apply the chat script to the asynchronous line

    line [Cellular-Interface-Number]

    script dialer [Script-Name]

    Example

    line 0/1/0

    script dialer GSM

    Next, we create a GSM profile.

    Step 3: From enable mode, use the profile to identify the username and password provided to you by your service provider. Use the cellular interface identifier and keyword GSM.

    cellular [Cellular-Interface] gsm profile create [Sequence-Number] [AP-Name]

    Tech Tip – This step should be created from enable mode and not conf mode.

    Example

    cellular 0/1/0 gsm profile create 1 telstra.corp

    + ,
  • A really useful command for unlocking the SIM while in the router.

    router#sh cell 0/1/0 security
    Card Holder Verification (CHV1) = Enabled
    SIM Status = Locked
    SIM User Operation Required = Enter CHV1
    Number of Retries remaining = 3

    router#cellular 0/1/0 gsm sim unlock NNNN
    !!!WARNING: SIM will be unlocked with pin=NNNN(4), call will be disconnected!!!
    Are you sure you want to proceed?[confirm]

    + ,
  • Switched Port Analyzer (SPAN) allows traffic to be replicated to a port from a specified source.  The traffic to be replicated can be from physical ports, virtual ports, or VLANs, but you cannot mix source types within a single SPAN session.  The most common reason for SPAN to be employed is for packet capture.  If you need to capture the traffic on VLAN 10, for example, you can’t just plug a sniffer on a port in that VLAN, as the switch will only forward packets destined for the sniffer.  However, enabling SPAN with the VLAN as the source, and the sniffer’s port as the destination, will cause all traffic on the VLAN to be sent to the sniffer. SPAN is also commonly deployed when Intrusion Detection Systems (IDSs) are added to a network.  IDS devices need to read all packets in one or more VLANs, and SPAN can get the packets to the IDS devices.

    Using Remote Switched Port Analyzer (RSPAN), you can even send packets to another switch. RSPAN can be useful in data centers where a packet-capture device is permanently installed on one of many interconnected switches. With RSPAN, you can capture packets on switches other than the one with the sniffer attached (RSPAN configuration details are provided later in this section).

    Configure SPAN with the monitor command.

    switch(config)#monitor session 1 ?

    destination  SPAN destination interface or VLAN
    filter             SPAN filter
    source          SPAN source interface, VLAN

    Having more than one SPAN session is useful when you have an IDS device on your network and you need to do a packet capture. The IDS device will require one SPAN session, while the packet capture will use another.

    For a monitor session to be active, you must configure a source port or VLAN, and a destination port. Usually, I configure the destination port first because the packetcapture device is already attached. If you have port security set, you must disable it before you can use the port as a SPAN destination:

    switch(config)#monitor session 1 destination interface g1/0/20
    %Secure port can not be dst span port

    Sessions can be numbered from 1 to 66, but you can only have two sessions configured at any given time on a 3750 switch. Here, I have two sessions configured (session 1 and session 10):

     monitor session 1 source vlan 20 rx
     monitor session 1 destination interface Gi1/0/10
     !
     monitor session 10 source vlan 10 rx
     monitor session 10 destination interface Gi1/0/20

    If you try to configure more than two SPAN sessions on a 3750 switch, you will get the following error:

    switch(config)#monitor session 20 source int g1/0/10
    % Platform can support a maximum of 2 source sessions

    In this example, I’ve configured two VLANs to be the sources, both of which will have their packets reflected to interface Gi1/0/20:
     monitor session 10 source vlan 20 rx
     monitor session 10 source vlan 10
     monitor session 10 destination interface Gi1/0/20

    You can also monitor one or more interfaces. Multiple interfaces can be configured separately or on a single configuration line:

    switch(config)#monitor session 11 source interface g1/0/11
    switch(config)#monitor session 11 source interface g1/0/12

    Entering the two preceding commands adds the following line to the configuration:
     monitor session 11 source interface Gi1/0/11 – 12

    The sources in a monitor session can be configured as either receive (rx), transmit (tx), or both. The default is both:

    switch(config)#monitor session 1 source int g1/0/12 ?

     , Specify another range of interfaces
     – Specify a range of interfaces
    both Monitor received and transmitted traffic
     rx Monitor received traffic only
     tx Monitor transmitted traffic only
    <cr>
    Interfaces should usually be monitored in both directions, while VLANs should be monitored in only one direction.

    To see which SPAN sessions are configured or active, use the show monitor command:

    swtich#show monitor

    Displays the session info.

    To disable monitoring on a specific SPAN, you can delete the entire monitor session, remove all the sources, or remove the destination. All monitor commands can be negated:

    switch(config)#no monitor session 11 source interface Gi1/0/11 – 12

    You can remove all local SPAN, all RSPAN, or all SPAN sessions as a group by adding the local, remote, or all keywords:

    switch(config)#no monitor session ?
     <1-66>   SPAN session number
     all            Remove all SPAN sessions in the box
     local        Remove Local SPAN sessions in the box
     remote    Remove Remote SPAN sessions in the box

    You should always remove your SPAN sessions when you no longer need them. SPAN takes up system resources, and there can be confusion if someone plugs a device into the SPAN destination port.
    RSPAN works the same way that SPAN does, with the exception that the destination interface is on another switch. The switches must be connected with an RSPAN VLAN. To create an RSPAN VLAN, configure a VLAN and add the remote-span command:

    switch-1(config)#vlan 777
    switch-1(config-vlan)# remote-span

    If you’re running VTP, you may not need to create the VLAN, but you will still need to configure it for RSPAN. In either case, the steps are the same. On the source switch, specify the destination as the RSPAN VLAN:

    switch-1(config)#monitor session 11 destination remote vlan 777

    You can enter a destination VLAN that has not been configured as an RSPAN VLAN, but, alas, it won’t work.
    Now, on the destination switch, configure the same VLAN as an RSPAN VLAN. Once you’ve done that, configure a monitor session to receive the RSPAN being sent from the source switch:

    switch-2(config)#vlan 777
    switch-2(config-vlan)#remote-span
    switch-2(config)#monitor session 11 source remote vlan 777

    There is no requirement for the monitor session numbers to be the same, but as I like to say, simple is good. If you have not configured the source switch to be the RSPAN source, you will get an error:

    switch-2(config)#monitor session 11 source remote vlan 777
    % Cannot add RSPAN VLAN as source for SPAN session 11 as it is not a RSPAN Destination session

    When using RSPAN, don’t use an existing trunk for your RSPAN VLAN. SPAN can create a large amount of traffic. When you’re monitoring VLANs composed of multiple gigabit interfaces, the SPAN traffic can easily overwhelm a single gigabit RSPAN link. Whenever possible, set up a dedicated RSPAN VLAN link between the switches.

    + ,
  • Prec-DSCP

    +
  • After many hours trying to sort this one out it would appear that a Riverbed Steelhead can’t easily optimise VC Traffic, as this traffic is already optimised by the Polycom device itself.  Sorry, that’s not to say I can’t, but i’d rather not enable the QoS on the Steelhead to solve this problem.

    The environment:

    H.323 protocol matched in the VC Class of traffic, in this case af41 (34). Packets tagged, no packets being dropped

    Running 6CoS on Telstra Links (GWIP) which is really just IPMAN.

    Host specific (/32) in-path optimisation rules on the Steelheads to ensure traffic to and from the VC units is bypassed.

    Under normal circumstances traffic is passed through the Steelhead and the the size of packet increases, as riverbed encapsulates video packets, so i have decided to bypass video traffic on the steelhead, so that the encapsulation and other overheads can be avoided.

    Fingers crossed….but i’m pretty happy it will work!

    + , , ,
  • Cisco NX-OS Software Virtual PortChannel: Fundamental Concepts 

    + ,
  • A short listing of handy commands used on a regular basis:

    #show ip interface brief

    Shows status of the interfaces on the device, including up/down and ip information.

    #show ip protocol summary

    Will show you all the routing protocols running on the router

    #show log

    Will display the configured log settings and buffered log messages

    #show interfaces status

    Shows Port, Status, VLAN, Duplex, Speed and Type for all interfaces.

    #show interfaces summary

    Live traffic stats on the interfaces.

    #show ip arp

    Displays the IP to MAC Address resolution for all the IP’s on the device, and from the interfaces it was learned.

    #show mac address-table

    Shows the MAC  table entry and interface it is being seen on.

    #show policy-map [interface]

    Displays the QoS Policy information

    #show interfaces link

    Will display how long the interface has been disconnected

    #show version

    Displays information about the device. It gives you details such as; IOS version, System Uptime, Image filename, Type of Processor, Amount of RAM, Number of Ports, Flash Memory, MAC Address and Serial Number

    #show clock

    Displays the clock status

    #show version | include uptime

    Shows the uptime of the device

    #show processes cpu

    Displays the CPU utilisation stats

    #show processes cpu history

    Displays a one minute output, and so on……

    #show history

    Lists the commands the user has entered in the session

    #show inventory

    Displays all the inventory information about the device

    #show line

    Lines connected on the router’s physical ports, such as serial connected.

    #show cdp neighbour

    Shows the directly connected devices with local and remote interfaces, via Cisco’s Discovery Protocol

    +
  • A short and simple explanation of VXLAN

    VXLAN Overview: Cisco Nexus 9000 Series Switches

    +