Cisco Systems
Staging Document
• What it contains:– Staging Network Logical Topology– Physical Staging Rack-Stacking Plan– Addressing Plan– Staging Test Descriptions and results– Serial numbers of All Cisco equipment
Loads and Loads of Documentation!!
Cisco Systems
6 N E T - IP A d d re s s ing & H o s tna m e c o nve ntio n V 1 .0
N R N - S TM1 6 / O C 4 8 S in g le Mo d e P O S
C o r e - S TM1 / O C 3 S in g le Mo d e P O S
1/0 1/1
3/1
it 6 . it . 6 n e t . o rg
3/03/1
3/2
3/0
3/1
3/0
3/2
3/1
3/0
3/1
3/0
3/23/3
2/0
3/1
3/0
3/03/1
3/1
3/0
c h 6 . c h . 6 n e t . o rg a t 6 . a t . 6 n e t . o rg d e 6 . d e . 6 n e t . o rg
g r6 . g r . 6 n e t . o rg3/0
f r6 . f r . 6 n e t . o rg n l6 . n l. 6 n e t . o rg
s e . 6 n e t . o rg
u k 6 . u k . 6 n e t . o rg
6 N E TC o re
12404 12404
12404
12404
12404
12404 12404
12404
12404
12404
12404
12404
7204
7206
3/2
1/0
7206
12404
1/0
4/0
3/0 2/0
3/34/0
3/0 3/3
1/11/0
12404
12404
12404
1/0
1/0
3/0 3/03/1
3/0
3/2
6 n e t -g w . n o rd u . n e tn l. n rn . n e t
6 n e t -g w . u n in e t t . n o
6 n e t - r t r . f u n e t . f i
6 n e t - r t r . d k n e t . d k
g r. n rn . n e ta t . n rn . n e t
it . n rn . n e t
c h . n rn . n e t
u k . n rn . n e t
N R N - S TM1 / O C 3 S in g le Mo d e P O S
N R N - S TM1 / O C 3 S in g le Mo d e A TMN R N - G ig a b it E th e r n e t L HN R N - G ig a b it E th e r n e t Z X
: : 1
2001: 0798: 0: 8 : : / 64
LB 2001: 0798: 28: : 1 / 128
LB 2001: 0798: 25: : 1 / 128
LB 2001: 0798: 16: : 1 / 128 LB 2001: 0798: 22: : 1 / 128
LB 2001: 0798: 12: : 1 / 128 LB 2001: 0798: 10: : 1 / 128 LB 2001: 0798: 14: : 1 / 128
LB 2001: 0798: 20: : 1/ 128LB 2001: 0798: 17: : 1 / 128
LB 2002: 0900: 30: : 1 / 128LB 2002: 0900: 31: : 1 / 128
LB 2002: 0900: 32: : 1 / 128
LB 2002: 0900: 33: : 1 / 128
LB 2002: 0900: 34: : 1 / 128
LB 2002: 0900: 35: : 1 / 128LB 2001: 06B 0: 0004: : 1 /128 LB 2001: 0709: : 2 / 128
2001: 0798: 0 : 7: : / 64
2001: 0798: 0 : 1 : : / 64
2001: 0798: 0 : 5: : / 64
2001: 0798: 0 : 6 : : / 64
2001: 0798: 0 : a : : / 64 2001: 0798: 0 : 9 : : / 64
2001: 0798: 0 : 4 : : / 64
2001: 0798: 0 : b : : / 642001: 0798: 0 : 3 : : / 64
2001: 0798: 28: 0200: : / 64
2001: 0798: 12: 0200: : / 64
2001: 0798: 20: 0200: : / 64
2001: 0798: 10: 0200: : / 64 2001: 0798: 17: 0200: : / 64
2001: 0798: 25: 0200: : / 64
2001: 06B 0: 0004: F 001: : /64
2001: 06B 0: 0004: F 000: : /64
2001: 06B 0: 0004: F 002: : /64
2001: 0798: 22: 0200: : / 64
: : 2: : 1
: : 1
: : 2
: : 1
: : 2
: : 1
: : 2
: : 1
: : 2 : : 1
: : 2 : : 1
: : 2
: : 2
: : 1
: : 2
: : 1
: : 1 : : 1
: : 2
: : 2
: : 1
: : 1 : : 1
: : 2 : : 2 : : 2
: : 1
: : 2: : 1
: : 1
: : 2
: : 1
: : 2
: : 2
: : 1
: : 2
: : 1
: : 2: : 1: : 2
: : 2
2001: 0798: 0: 2 : : / 64
2001: 0798: 22: 02001 / 64
3/0LB 2001: 0700: 0: F F F F : : 4 / 128 LB 2001: 0708: : 2 / 128
Cisco Systems
Found Issues
• CEF Inconsistency on 12404
The DDTS Logged:CSCdw72626
Release Note:When there are multiple paths available in IPv6 and the
packets are CEF switched. If in this case one of the prefixes disapears (by a shutdown of an interface for example).
Then the redundant route disapears but the CEF entry still exists with result that some traffic will beblackholed towards an invalid next-hop
Cisco Systems
Found Issues
• CEF Inconsistency on 12404
Description:The CEF entries in the 12404 are not dynamically updated
correctly when the CORE topology changes. When for example a link goes down, then this info is propagated correctly with the means of ISIS. This happens pretty quickly. However the change of the routing table does not have a trigger effect on the CEF FIB when there are multiple paths in the CEF FIB, and the routing table change gets not reflected correctly because the bad path/route gets not deleted.
Result: the routing table is correctly updated, while for CEF the link that went down still exists.
Cisco Systems
Found Issues
• CEF Inconsistency on 12404
Workaround:Clear the routing table to trigger an CEF update
Wait for new IOS with DDTS Fix
Cisco Systems
Found Issues
• BGP Password Authentication
The DDTS Logged:CSCdw95214: ALIGN-3-SPURIOUS: Spurious memory
access in bgp_password_parseCSCdx13342: Spurious memory access and Traceback
when config BGP peer-group (Duplicate of CSCdw95214)
CSCdw92204: FLO_ISP: Spurious memory access made at bgp_password_parse
Cisco Systems
Found Issues
• BGP Password Authentication
Description:For the sake of security md5 Password authentication wil be
enabled between the BGP speaking routers. There is no issue when configuring a Password between the iBGPspeakers in the 6NET cloud. There is an inconsistency when we try to do a Authentication on eBGP between a 6NET Core router (12404) and a NRN 7206 router. The authentication between two 12404’s seems to go OK as theeBGP session comes up.
Workaround:Disable BGP Password Authentication between 12404 and
7206 routers. All other peerings between 12404 on BGP level are performing as expected
Cisco Systems
Found Issues
• ATM ptp IPv6 address issue
The DDTS Logged:CSCdx10517
Release Note:When a TAZ line card is running IPv6 under sub-
interfaces, reloading RP willcause all v6 addresses lost under configured under TAZ.
IPv4 is working correctly.
Cisco Systems
Found Issues
• ATM ptp IPv6 address issue
Workaround:This problem happens when encasulation configuration
uses the following style:
pvc 0/1 encapsulation aal5snap
when it uses:
atm pvc 1 0 1 aal5snap
The problem does not happen.
Cisco Systems
Found Issues
• ISIS Tuning
Description:When trying to implement the ISIS tuning parameters the
IOS code put restriction that secondary timer should be larger as initial wait.
After discussing with the ISIS IOS Development engineer the following values were entered in the 6NET core environment:
spf-interval 1 1 10prc-interval 1 1 10lsp-gen-interval 5 1 50