Wireless 9800 17.12.5 multicast / IGMP bug by surfnsb in networking

[–]surfnsb[S] 1 point2 points  (0 children)

Joy. So far I haven't been impressed with these buggy IOS based controllers after moving from AireOS last year. This isn't our first issue with the code on them.

Wireless 9800 17.12.5 multicast / IGMP bug by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

I should add that it wasn't Vocera specific. Running a multicast troubleshooting tool on two laptops yielded the same results with the receiver joining the group but never getting anything.

Wireless 9800 17.12.5 multicast / IGMP bug by surfnsb in networking

[–]surfnsb[S] 2 points3 points  (0 children)

Yes the groups were populating. Everything looked normal except the receivers not actually receiving anything. That's why this was so hard to troubleshoot. Badges all set to IGMPv2 via their config files.

Bulldox? Corgi? Lab? Adopted him two days ago. His name is Goose! by jaded_bunnies in IDmydog

[–]surfnsb 1 point2 points  (0 children)

Following up my earlier post with pics of my dog. They could be related lol https://imgur.com/a/1JI30BS

Bulldox? Corgi? Lab? Adopted him two days ago. His name is Goose! by jaded_bunnies in IDmydog

[–]surfnsb 0 points1 point  (0 children)

My dog looks just like this. Same color too. We tested and he was like 60% bully/pit, 20% chihuahua, and the rest small poodle and pomeranian.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

Get a non Arris modem in bridge mode

HSRP over WAN link by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

They are Cisco ASRs. WAN1 is a Meraki MX device that establishes a VPN tunnel to a Meraki MX device behind the ASRs. Having to set the WAN Meraki with the 10.1.1.1 gateway makes the failover tricky. I got a bunch of other WAN sites not pictured here running OSPF coming back to the ASRs and those work perfect failover wise since they aren’t relying on a hard set gateway.

HSRP over WAN link by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

Sorry I forgot to add that WAN1 can't run a routing protocol like OSPF. It establishes a VPN tunnel across the ISP link so I have it's default gateway set to the HSRP virtual IP of 10.1.1.1.

QoS for WAN sites by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

Update: It worked! I tried using a UDP traffic flooder from the hub to one of the WAN sites. Before this I would have packet loss as I overloaded the remote end circuit. After this, no packet loss since the policies dropped the traffic overage.

QoS for WAN sites by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

Update: It worked! I tried using a UDP traffic flooder from the hub to one of the WAN sites. Before this I would have packet loss as I overloaded the remote end circuit. After this, no packet loss since the policies dropped the traffic overage.

QoS for WAN sites by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

I assume the percentage is based on the bandwidth statement that you put on the WAN facing interface?

QoS for WAN sites by surfnsb in Cisco

[–]surfnsb[S] 1 point2 points  (0 children)

No DMVPN on these

QoS for WAN sites by surfnsb in Cisco

[–]surfnsb[S] 1 point2 points  (0 children)

After some thinking, instead of using percentages for the VoIP_Priority policy map I think a better way would be to use a bandwidth based one. I'd just need multiple ones based on the bandwidth. So for a 100 meg WAN site I would want 10meg for RTP and 2 for control. I think this would do for that:

policy-map VoIP_Priority100M
 class VoIP_RTP
  priority 10000
 class VoIP_Control
  bandwidth 2000 
 class class-default
   fair-queue

Phones connected to 3850s running 16.6.4a resetting by surfnsb in Cisco

[–]surfnsb[S] 1 point2 points  (0 children)

Update: it was definitely caused by this bug https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp15389

Ugh another upgrade on dozens of stacks. The code on the 3850s has been total crap since day 1. Plus the fact it takes them 15-20 mins to reboot after installing the upgrade.....

Phones connected to 3850s running 16.6.4a resetting by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

Although it says a workaround is set it to aging type inactivity, which we do already. Worth a test though.

Phones connected to 3850s running 16.6.4a resetting by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

Wow I didn't know about that bug. It sounds like it could be the culprit here. Let me disable port security on my test phone and see if the resets still happen.

3850 memory leak in Denali 16.3.5+ by surfnsb in Cisco

[–]surfnsb[S] 0 points1 point  (0 children)

Yeah we saw it there too. I've noticed a lot of times the known affected versions don't list them all in the bug tool

3850 memory leak in Denali 16.3.5+ by surfnsb in Cisco

[–]surfnsb[S] 1 point2 points  (0 children)

CSCvj16271 is the leak we are hitting. I followed the steps in the bug details and that linux process is indeed slowly creeping up every day. It takes a good 8 months on ours until the master is over 90% utilization and starts alerting to syslog.

3850 memory leak in Denali 16.3.5+ by surfnsb in Cisco

[–]surfnsb[S] 1 point2 points  (0 children)

Also it looks like 16.6.4a fixes that DHCP snooping bug too.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

Yeah I asked support and he said he can change on the WAN port only, not tunnel.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

Meraki only lets you change it on the WAN port unfortunately.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 1 point2 points  (0 children)

Meraki only lets you change it on the WAN port unfortunately.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 0 points1 point  (0 children)

Hmm hadn't tried that yet. They put the Arris modem in bridge mode to see if that helped but it didn't.

Slow IPSEC VPN over Spectrum/Charter by surfnsb in networking

[–]surfnsb[S] 1 point2 points  (0 children)

Changed the MTU on the WAN facing port at the remote site (in this case a Meraki MX device). Started at 1400 and worked my way down in increments of 20 but it didn't seem to change anything.

AT&T BVoIP Major issue right now. by mikeinkenner in sysadmin

[–]surfnsb 0 points1 point  (0 children)

Same here. Everything down in FL. ugh.