Network technologies and trends


July 6, 2011  10:07 AM

The layer 3 link between Nexus 7010 and Cisco 6506 E Switches is frequently going down part 2



Posted by: Yasir Irfan
62.5/125 microns, Cisco Catalyst 6506 E Switches, Cisco Nexus 7010 Series Switch, Cisco Switches, Cisco Tips, Cisco X2-10GB-LX4, Cisco X2-10GB-SR Module, Fiber optic cable, fiber patch cord, multimode fiber optic cable, Network Technologies and Trends, Nexus 7000 troubleshooting, Nexus 7010, operational Receive Flow Contol state changed to off, operational speed changed to 10 Gbps 2011 Jun 12 09:05:49 VDC-Admin-CO01-, operational Transmit Flow Contol state changed to off, physical media, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure), VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/17, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/17, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17, wavelength

In my previous post I was talking about the problem we were facing with connectivity between Cisco 6500 Series switch and Cisco Nexus 7010 Switch. While troubleshooting we figured out there were no issues either with configuration of physical media (Fiber optic cable), the problem turned out to with 10GBASE X2 modules. Though the distance between these two locations is hardly 250 meters and there was a multimode fiber optic cable (supports 10G) running between these two locations. Initially a Cisco X2-10 GB-LX4 module was installed at Cisco 6500 Series Switch and at the Nexus 7010 we had a SFP SR Module.

Table 1. X2 Port Cabling Specifications

Cisco X2 Wavelength (nm) Cable Type Core Size (microns) Modal Bandwidth (MHz*km) Cable Distance*
Cisco X2-10GB-CX4 - CX4 (copper) - - 15m
Cisco X2-10GB-SR 850 MMF 62.5

62.5

50.0

50.0

50.0

160

200

400

500

2000

26m

33m

66m

82m

300m

Cisco X2-10GB-LRM 1310 MMF 62.5

50.0

50.0

500

400

500

220m

100m

220m

SMF G.652 - 300m
Cisco X2-10GB-LX4 1310 MMF 62.5

50.0

50.0

500

400

500

300m

240m

300m

Cisco X2-10GB-LR 1310 SMF G.652 - 10 km
Cisco X2-10GB-ER** 1550 SMF G.652 - 40 km***

Intially everything looked good but after three months the problems aroused and the link start disconnecting, with the following errors

2011 Jun 12 09:05:03 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3

2011 Jun 12 09:05:04 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure)

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17, operational speed changed to 10 Gbps

We figured out the multimode fiber optic cable used is of 62.5/125 microns. As per the Cisco X2 port cabling specifications we were supposed to use either Cisco X2-10GB-SR or Cisco X2-10GB-LX4 module at Cisco 6500 Series Switch and a SFP SR Module at Nexus 7010 Switch.

Seems like the problem occurred with the wavelength of fiber, once we replaced the Cisco X2-10GB-LX4 module with the Cisco X2-10GB-SR Module the problem was solved.

June 13, 2011  5:12 AM

The layer 3 link between Nexus 7010 and Cisco 6506 E Switches is frequently going down.



Posted by: Yasir Irfan
Cisco Catalyst 6506 E Switches, Cisco Nexus 7010 Series Switch, Cisco Switches, Cisco Tips, fiber patch cord, Network Technologies and Trends, Nexus 7000 troubleshooting, Nexus 7010, operational Receive Flow Contol state changed to off, operational speed changed to 10 Gbps 2011 Jun 12 09:05:49 VDC-Admin-CO01-, operational Transmit Flow Contol state changed to off, The layer 3 link between Nexus 7010 and Cisco 6506 E Switches is frequently going down., VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure), VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/17, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/17, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3, VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17

We have Cisco Nexus 7010 working as a Core and Aggregation Switch. We have created two VDC one for Core and other one for Aggregation. One of Cisco 6506 E Switches connected as a distribution switch from Nexus 7010 Core Switch. Things were normal since its installation, suddenly one night we figured the layer 3 links between Nexus 7010 and Cisco Catalyst 6506 E Switch went down.

Upon looking at the log in Nexus 7010 Core Switch we found the following entries.

2011 Jun 12 09:05:03 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3

2011 Jun 12 09:05:04 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure)

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17, operational speed changed to 10 Gbps

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DUPLEX: Interface Ethernet1/17, operational duplex mode changed to Full

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/17, operational Receive Flow Contol state changed to off

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/17, operational Transmit Flow Contol state changed to off

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3

2011 Jun 12 09:05:49 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure)

2011 Jun 12 09:07:37 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17, operational speed changed to 10 Gbps

2011 Jun 12 09:07:37 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DUPLEX: Interface Ethernet1/17, operational duplex mode changed to Full

2011 Jun 12 09:07:37 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/17, operational Receive Flow Contol state changed to off

2011 Jun 12 09:07:37 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/17, operational Transmit Flow Contol state changed to off

2011 Jun 12 09:07:37 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_UP: Interface Ethernet1/17 is up in Layer3

2011 Jun 12 09:07:38 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DOWN_LINK_FAILURE: Interface Ethernet1/17 is down (Link failure)

2011 Jun 12 09:16:40 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_HARDWARE: Interface Ethernet1/17, hardware type changed to No-Transceiver

2011 Jun 12 09:16:54 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_HARDWARE: Interface Ethernet1/17, hardware type changed to 10G

2011 Jun 12 09:17:00 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-SPEED: Interface Ethernet1/17, operational speed changed to 10 Gbps

2011 Jun 12 09:17:00 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_DUPLEX: Interface Ethernet1/17, operational duplex mode changed to Full

2011 Jun 12 09:17:00 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/17, operational Receive Flow Contol state changed to off

2011 Jun 12 09:17:00 VDC-Admin-CO01-MB-1256-001 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/17, operational Transmit Flow Contol state changed to off.

We tried to reset the Ethernet Interface in the Nexus 7010 Switch by using Cisco IOS command “shutdown” and “no shutdown”  but it’s of no use. The only way to solve this problem is to manually remove and reconnect the fiber patch cord connected to the Ethernet port in the Nexus 7010 Switch. Currently we are looking for the solution, the moment we find I will update you. Meanwhile if any solutions available make use of comments to help me.


May 31, 2011  5:46 AM

Cisco Press announces the release of CCDA 640-864 Official Cert Guide,4th Edition



Posted by: Yasir Irfan
4th Edition, 802.11n, Amazon, auditing tools, borderless Networks, CAPWAP, CCDA, CCDA 640-864 Official Cert Guide, CCDA certification, CCDP, Cisco 500 Series Mobility Express, Cisco Certifications, Cisco Press, Cisco Systems, Designing enterprise campuses, eBook edition, Enterprise Campus 3.0, enterprise data centers, enterprise route redistribution, Ironport, Network design methodology, new DESGN exam, risk calculation, scalability, VPN using public networks, WebEx, wireless LANs

For those who are working on CCDA (640-864 ) there is good news, Cisco Press announced the release of CCDA 640-864 Official Cert Guide, 4th Edition. Currently this title is available in eBook edition the printed edition is expected by first of June. Currently the printed edition can be preordered from Amazon.  Cisco Press is offering the eBook edition.

Once the printed edition is released I will try to review it. The CCDA 640-864 Official Cert Guide, 4th Edition is helpful to CCDA, CCDP aspirer which is a comprehensive self-study resource for the new DESGN exam, required for CCDA certification. This title coverage includes: ” Network design methodology and models ” Designing enterprise campuses, enterprise data centers, and wireless LANs ” IPv4, IPv6, Interior Routing Protocols, BGP, and route manipulation ” Network security technology and design This edition’s 40% new coverage includes all-new chapters on designing the enterprise data center, and on final exam preparation. New topics include: Webex, auditing tools, borderless networks, Enterprise Campus 3.0, CAPWAP, 802.11n, scalability, Cisco 500 Series Mobility Express, VPN using public networks, enterprise route redistribution, risk calculation, Ironport, and more.

I believe a good Cisco Press title to own.


May 31, 2011  5:29 AM

Thanks to Cisco Press User Group



Posted by: Yasir Irfan
CCNA, CCNA Security, CCNP, CCNP Switch, Cisco Certifications, Cisco networking technologies, Cisco News, Cisco Press, Cisco Press materials, Cisco Press User Group, Cisco Systems, leadership skills, Network Technologies and Trends, The Cisco Press Cisco User Group Program

Cisco Press continues to carry the motto of “Customer Satisfaction & support” of Cisco Systems, yeah you might be thinking being a publishing company how are they taking care of thousands of Certification aspirer.

Cisco Press are helping hands by having a program called The Cisco Press Cisco User Group Program. Anyone who wants to set up a user group can create their Cisco Press User Group. In order to qualify your group should have

  • Active membership of 10 or more people
  • Valid and active website for shared information
  • Regular online or face-to-face meetings

Cisco Press supports typically volunteers, not-for-profit organizations, or special interest groups focused on Cisco networking technologies or Cisco certifications by providing product news, discounted prices on products, and free review copies in exchange for reviews, marketing materials, and promotional giveaways.

The biggest use of creating the Cisco Press User Group is exchange of knowledge and ideas. Frequently we used to have small presentations for our members in our auditorium. Currently our group members are working on perusing Cisco certifications. Two of our group members Alamgir Khan passed CCNA and CCNP; Syed Zubair passed CCNA Security and CCNP Switch Exam, and using the Cisco Press materials provided by Cisco Press for group review and support.

I will encourage you all Cisco lovers to establish a user group they are many benefits apart from gaining technical skills for sure you will develop leadership skills. Check Cisco Press User Group home page for more details.


May 30, 2011  5:06 AM

Cisco Application Networking Services Enable Network Intelligence – live interactive workshop



Posted by: Yasir Irfan
ACE, ACE Demo, ACE in the Virtual Data Center AVDC, application delivery solution, application optimization, Applications Challenges in the Data Center, Cisco Application Control Engine, Cisco Application Networking Services Enable Network Intelligence, Cisco Data Center experts, Cisco Events, Cisco Systems, content switching, Data Center, live interactive workshop, server load balancing, server offloading

Recently we got the Cisco Application Control Engine (ACE) in our Data Centre. The Cisco Application Control Engine (ACE) is a comprehensive application delivery solution that helps ensure application availability, accelerate application performance, and protect applications while simultaneously reducing data center costs.

The Cisco Application Control Engine (ACE) is a load balancer and an application delivery solution that includes server load balancing, content switching, server offloading, and application optimization.

As I am looking for some resources on the Cisco Application Control Engine (ACE) I figured out Cisco Systems is conducting a live interactive workshop “Cisco Application Networking Services Enable Network Intelligence” on May 31, 2011 at 11:30 am CET. So register now.

Agenda http://cisco-apps.cisco.com/web/fw/apps/i/s.gif May 31, 2011 – 11:30 am CET

Topics include:

  • Applications Challenges in the Data Center
  • Application Control Engine products family
  • ACE in the Virtual Data Center AVDC
  • Demo (ACE in the Virtual Data Center)
  • Q& A

Register now

Don’t miss this opportunity to engage live with Cisco Data Center experts and have your questions answered during the event.


May 28, 2011  8:52 AM

Mango is the code-name for the Windows Phone 7 update



Posted by: Yasir Irfan
Android, Burj Al Arab, Dubai, face-recognition, Facebook, Gmail, Gustavo Fuchs, Mango, Mango is the code-name for the Windows Phone 7 update, Microsoft Middle East, multi-task, Photo tagging, smartphone race, Windows 7 Phone, Windows Live Messenger

Starting September 2011 all Windows Phone 7 customers can avail more than 500 new features which were revealed by Microsoft at the launch event held at the Burj Al Arab in Dubai. All new Windows Phone 7 will also have the Mango update.

Gustavo Fuchs, director Mobility, Microsoft Middle East and Africa says the Windows Phone operating system has so far received great feedback from customers in the seven months since it has been released.

“Ninety percent of people are extremely pleased with the product, 93% of people recommend the product to colleagues and family and the return rates on the smartphones are very, very low, which we know is not a common practice in the market,” he said.

One of the promising feature I liked in this update is users can group together contacts from multiple sources, such as Facebook and Gmail and a user can text all these contacts at the same time.

The phones allow users to switch between text, Windows Live Messenger and Facebook chat in the same conversation. Photo tagging and face-recognition is also enabled on the Mango update, allowing users to communicate on the go.

The new update allows users to multi-task and the enterprise clients can enjoy corporate messenger. Currently Windows Phone application market has over 17,000. Let’s see how Microsoft fights the smartphone race. Currently Android is heading for a major breakthrough as day by day its market share is increasing.


May 28, 2011  6:01 AM

Cisco has become the #3 player worldwide in x86 blade server factory revenue



Posted by: Yasir Irfan
blade server market, Cisco, Cisco has become the #3 player worldwide in x86 blade server factory revenue, Cisco Systems, converged infrastructure, Dell IDC, HP, IBM, IDC press release, Unified Computing System, Virtualization, x86 blades, x86 server market

Almost two years back Cisco Systems delivered a new system that unite compute, network, storage access and virtualization into one cohesive system. Yeah Cisco Systems created history by entering into the blade server market.

I thought Blade servers that Cisco Systems, they must be joking; honestly I thought it was a crazy move from Cisco Systems. But they outperformed many of their competitors. In just two years, sales of the Unified Computing System are outpacing market growth for x86 blades, and Cisco has become the #3 player worldwide in x86 blade server factory revenue

Blades are forecast to be the fastest growing segment of the x86 server market and market data illustrates the impact of UCS innovation: businesses worldwide shifted over 10% of the x86 blade market to UCS, and in the U.S. nearly 20%. Cisco’s rapid growth underscores their leadership in the industry transition to fabric computing and converged infrastructure. Cisco reported 5,400 UCS customers and an annualized order run rate of $900M for UCS product orders.

According to IDC press release HP maintained the number 1 spot in the server blade market in 1Q11 with 50.0% revenue share, while IBM finished with 20.2% revenue share. Cisco and Dell rounded out the top 4 with 9.4% and 8.4% factory revenue share, respectively.


May 28, 2011  5:12 AM

Cisco Catalyst 6500 Series Switches supports next-generation medianet, Cisco EnergyWise, TrustSec, and Borderless Mobility.



Posted by: Yasir Irfan
12.2(33)SXI4, A-VPLS, Advanced Virtual Private LAN Services, Borderless Mobility, Cisco Catalyst 6500 Series Switches, Cisco Catalyst Switches, Cisco EnergyWise, Cisco IOS, Cisco IOS Software Release 12.2(33)SXI4, Cisco News, Cisco Tips, Data Center Interconnect, medianet, MSR, Multicast Service Reflection, Network technologies & trends, SAF, Service Advertisement Framework, TrustSec, VSS Quad-Sup

The newly released Cisco IOS Software Release 12.2(33) SXI4 brings groundbreaking Borderless Networks innovations to Cisco Catalyst 6500 Series Switches. With more than 50 improvements the Cisco IOS Software Release 12.2(33)SXI4 helps deliver next-generation medianet, Cisco EnergyWise, TrustSec, and Borderless Mobility.

Some of the important features of Cisco IOS Software Release 12.2(33)SXI4 are

  • VSS Quad-Sup Uplink Forwarding help enable VSS customers to put four supervisors in the dual-chassis system to increase their uplink bandwidth.
  • Cisco EnergyWise allows IT and building facilities operations to optimize and control power across a corporate infrastructure.
  • Advanced Virtual Private LAN Services (A-VPLS) simplifies Data Center Interconnect deployments with rapid service provisioning.
  • Multicast Service Reflection (MSR) resolves overlapping IP addresses with multicast transmission of video or other feeds.
  • Service Advertisement Framework (SAF) helps you deploy and manage services across the network with greater scalability and flexibility.


May 25, 2011  5:17 AM

SUP 720 -3B Supervisor Engine Crashed



Posted by: Yasir Irfan
%DIAG-SP-6-RUN_MINIMUM: Module 7: Running Minimal Diagnostics..., %Software-forced reload, bootflash:, Breakpoint exception, Cat6k-Sup720/SP processor, Cisco Catalyst 6500, Cisco Catalyst 6513 Switch, Cisco Systems, Cisco TAC Support, Cisco TAC team, Cisco Troubleshooting, Core Switch, CPU signal 23, faulty SUP, Networking, PC = 0x41D8BE6C, rommom mode, SUP 720- 3B failing to boot, SUP 720-3B is crashed, SUP 720-3B supervisor engine, Supervisor Engine failed, System Bootstrap, TAC Case, TAC Engineer, Version 8.1(3), Writing crashinfo to bootflash:crashinfo_20110523-131601

In my previous post I talked about the crashed Sup 720- 3B supervisor Engine for a Cisco Catalyst 6513 Switch. Since there was no ray of hope for the SUP 720-3B Supervisor Engine and I couldn’t make use of “show tech” IOS command. I decided to open a TAC case with Cisco.

The TAC Engineer after studying the logs generated by the crashed Sup 720- 3B supervisor Engine came up with the following reply

“Hello Yasir

It seems we have faulty SUP and need to be replaced since it is keep crashing and not coming up.”

After looking at the log’s I predict there might be problem with flash memory of SUP 720 -3B Supervisor Engine.

System Bootstrap, Version 8.1(3)

Copyright (c) 19 94-20 04 by cisco Systems, Inc.

Cat6k-Sup720/SP processor with 524288 Kbytes of main memory

rommon 1 >

I tried to boot the SUP 720-3B using the boot command from rommon mode but that too failed and I am getting the following error.

%DIAG-SP-6-RUN_MINIMUM: Module 7: Running Minimal Diagnostics…

Also I tried to boot the SUP 720-3B from the flash memory using the “bootflash:”command that too failed again I am getting the same error

%DIAG-SP-6-RUN_MINIMUM: Module 7: Running Minimal Diagnostics…


%Software-forced reload

Breakpoint exception, CPU signal 23, PC = 0×41D8BE6C

-Traceback= 41D8BE6C 41D89DB8 41B370D8 41B37104 41A09A1C 41A4ACCC 41A41000 41A41058 4075B9FC 4075C6E4 419168D8 419166F4 41AD8610 41AD5530 41AD574C 41D7E35C

$0 : 00000000, AT : 43100000, v0 : 44AF0000, v1 : 43640000

a0 : 50E46E18, a1 : 0000F100, a2 : 00000000, a3 : 42E30000

t0 : 41D7E978, t1 : 3400F101, t2 : 41D7E988, t3 : FFFF00FF

t4 : 41D7E978, t5 : 00000000, t6 : 00000000, t7 : 00000000

s0 : 00000000, s1 : 430B0000, s2 : 5033A36C, s3 : 087365C8

s4 : 50D740D0, s5 : 50D1AC48, s6 : 00000040, s7 : 43890000

t8 : 5000BA74, t9 : 00000009, k0 : 00000000, k1 : 00000000

gp : 431011F0, sp : 5000BB28, s8 : 00000000, ra : 41D89DB8

EPC : 41D8BE6C, ErrorEPC : 65DFF3A3, SREG : 3400F103

MDLO : 00000000, MDHI : 00000000, BadVaddr : 00000000

DATA_START : 0×42DDFAF0

Cause 00000024 (Code 0×9): Breakpoint exception

Writing crashinfo to bootflash:crashinfo_20110523-131601

=== Flushing messages (16:16:01 KSA Mon May 23 2011) ===

Buffered messages:

00:01:01: curr is 0×0

This is why Cisco is a leader among its competitor and they are exceling because they are pioneers of Networking. I love Cisco for two reasons strong technical support and commitment they show to the customer.


May 24, 2011  5:34 AM

Vulnerabilities reported in Cisco Unified Operations Manager and CiscoWorks Common Services



Posted by: Yasir Irfan
Adobe, Cisco News, Cisco Security, Cisco Security Intelligence Operations, Cisco Systems, Cisco Unified Operations Manager, CiscoWorks Common Services, Citrix, Cyber Risk Report, Cyber Risk report (CRR), mitigation recommendations, Network technologies & trends, Perl, Python, Red Hat, security advisories, Security Experts, spam activity, spam message authors, vulnerabilities

According Cyber Risk Report for this week lot of vulnerabilities, including Perl, Red Hat, Python and features updates from multiple vendors including Adobe, Citrix and Cisco Systems. For all those you are unaware of Cyber Risk report (CRR) is published by Cisco Security Intelligence Operations (SIO).

Cisco released two security advisories addressing five vulnerabilities in the Cisco Unified Operations Manager and CiscoWorks Common Services. These advisories and the latest vulnerability, threat, and mitigation recommendations are available on the Cisco Security Intelligence Operations website.

So security experts beware of these latest developments and make sure you are ready to face challenges as the spam activity has increased a lot and the spam message authors continue to create variations in their attempts to bypass ant spam protection and trick users into acting on the messages.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: