Most Popular

1500 questions
11
votes
2 answers

Trying to find out exact TCP overhead cost

Corresponding this topic: https://stackoverflow.com/questions/3613989/what-of-traffic-is-network-overhead-on-top-of-http-s-requests The maximum segment size (which does not include the TCP or IP headers) is typically negotiated between the layers…
agrrh
  • 113
  • 1
  • 1
  • 8
11
votes
1 answer

Can adding VLANs to a VPC be done hot?

In this scenario, we have a VPC '17', consisting of two single port port-channels 'po17'. There are 2 x N5K's (5548s) - so po17 from both sides combine to create the VPC. The downstream devices are blade switches (Cisco 3020s). We want to add a…
A L
  • 3,310
  • 9
  • 33
  • 56
11
votes
1 answer

How can I make a PVST+ switch root towards MST network?

In a network where the majority of the switches are running MST but a select few are still running PVST+, how can the PVST+ switch be configured to be the root of the spanning tree? Topology below: +--------+ +---------+ | …
Daniel Dib
  • 7,498
  • 34
  • 59
11
votes
1 answer

How to understand "normal burst" and "maximum burst" in Cisco CAR?

As I understand, Cisco IOS CAR(Committed Access Rate) is based on leaky bucket algorithm(idea is exactly the same as token bucket algorithm) and the amount of bits I configure as average rate, is the amount of "water constantly leaking the bucket".…
Martin
  • 1,233
  • 6
  • 26
  • 51
11
votes
2 answers

How do wifi clients detect SSIDs from APs?

How can my wifi board detect wireless networks that are in range? What protocol is used to communicate with the devices in the area to announce a wifi AP? Does every router transmit on its own frequency and my wifi board scans "every" frequency to…
zer0uno
  • 213
  • 1
  • 2
  • 6
11
votes
7 answers

Only One Path in the Looking Glass

I understand that only the best path is advertised to eBGP neighbors, but is this true of iBGP? If I peer with two providers, I was under the impression that anyone else peering with both of my providers would have two paths to me. After inspecting…
Dennis Olvany
  • 2,435
  • 1
  • 17
  • 34
11
votes
11 answers

Locate a host on Network

What is the best method of locating a particular workstation on a VLAN ? I sometimes need to do this, if a workstation IP address, shows up on an ACL Deny torrent use High bandwidth usage (Top Talkers) Snort alert The way I do it now, Logon to a…
hyussuf
  • 467
  • 3
  • 11
11
votes
1 answer

How can I check to see if I am receiving MED's?

I have a BGP session with a transit provider in two different cities. We are both using the same AS at both locations. I am expecting them to be sending me MED's for me to use for routing decisions of outbound traffic. (ie. so I can send traffic…
zevlag
  • 622
  • 7
  • 15
11
votes
1 answer

Cisco IOS built-in SSH client default version

You issue the command ssh 192.168.97.97 from a IOS device and the destination IOS router/switch SSH server is accepting both SSH versions. Being that you did not specify a version to use on the SSH client, which version of SSH will be used to…
Adam Loveless
  • 3,129
  • 7
  • 30
  • 51
11
votes
2 answers

RIP routing is broken between two routers

There are 2 routers connected something like this: Network1 ----- (172.16.1.1/24) Router 1 (172.16.3.1/30) ------ (172.16.3.2/30) Router 2 ------ (172.16.2.1/24) Network 2 I try to add addresses for dynamic routing using the RIP protocol, for…
Random42
  • 213
  • 1
  • 6
11
votes
3 answers

Circular BGP propagation

This one is a difficult to describe, it's hypothetical because I'm learning about routing and right now I'm focused on BGP. Let's say my ASN is 65000, and I announce 192.0.2.0/24. My peer, AS 65001 updates its routing table with its routes to the…
Libbux
  • 515
  • 3
  • 14
11
votes
2 answers

Preventing STP loops in etherchannels configurations

What is the best practice when configuring etherchannel on Cisco switches to prevent a STP loop/broadcast storm when etherchannel is mis-configured? I had an instance where 2 ports on a switch were configured with via trunk ports properly however…
knotseh
  • 2,535
  • 4
  • 24
  • 35
11
votes
2 answers

In IPsec VPN, how is the pre-shared key encrypted?

I was doing IPsec VPN on ASA 8.0, and I understand a little about that. The initiator starts by sending its ISAKMP policy to the responder, and the responder sends back the matched policy. After that, the Diffie-Hellman key gets exchange, and then…
user3347934
  • 153
  • 1
  • 1
  • 6
11
votes
2 answers

OSI model and physical location of the layers

Hi Cisco student/newbie here! I understand that data passes down through the OSI model and then at the physical layer is transported as bits across the networkcables. But I'm confused at exactly where the layers are happening (in the PC, in the…
Fibie
  • 121
  • 1
  • 4
11
votes
2 answers

Interpreting TTL in ping results

I work for a VoIP service provider and I am working an issue with a customer who has a cable internet connection that's throwing me for a loop. He has a single block, which we'll pretend is 70.141.15.0/29, with the gateway at .1 and routers at .2…
DTD
  • 305
  • 2
  • 3
  • 6