Billions of slip seconds in only 3 days on 1DSU-T1-V2
Take a gander:
Interface Serial0/0/0 Module type is T1/fractional Hardware revision is 1.2, Software revision is 20100323, Image checksum is 0x44F2D8, Protocol revision is 0.1 Receiver has no alarms. Framing is ESF, Line Code is B8ZS, Current clock source is line, Fraction has 24 timeslots (64 Kbits/sec each), Net bandwidth is 1536 Kbits/sec. Last module self-test (done at startup): Passed Last clearing of alarm counters 3d23h loss of signal : 0, loss of frame : 0, AIS alarm : 0, Remote alarm : 0, Module access errors : 0, Total Data (last 96 15 minute intervals): 0 Line Code Violations, 0 Path Code Violations 2147481373 Slip Secs, 0 Fr Loss Secs, 0 Line Err Secs, 0 Degraded Mins 0 Errored Secs, 2147389168 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs Data in current interval (30 seconds elapsed): 0 Line Code Violations, 0 Path Code Violations 0 Slip Secs, 0 Fr Loss Secs, 0 Line Err Secs, 0 Degraded Mins 0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs
The last clearing was a reboot. Any idea what is causing this? I am going to replace the WIC, but before I do I thought I would ask around.
EDIT: I also ran the following ping tests from my hub router to this spoke router, all passed 100%
ping x.x.x.x size 1400 repeat 1000 data 8080 ping x.x.x.x size 1400 repeat 1000 data 5555 ping x.x.x.x size 1400 repeat 1000 data FFFF ping x.x.x.x size 1400 repeat 1000 data 1000 ping x.x.x.x size 1400 repeat 1000 data 0000
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...