NAT, BGP, dirty traceroutes only to certain websites.
Basically, I have 2 ds3s. rtr1 on ds31, and rtr2 on ds32. I have BGP on both, same ISP, same AN with my ARIN block. I have half my block advertised on rtr1, the other half on rtr2. I have rtr3 hanging off rtr2, which handles a large PAT network. I route a small subnet of live IPs from rtr2 into rtr3, for a NAT pool...
The rtr2->rtr3 connection is a live ip /30.
I'm seeing this anomaly where, on the PAT inside network from rtr3, some random website will not load. I'll traceroute from the end machine, and get a VERY dirty traceroute. I'll then traceroute from the inside interface of router 3, and get a clean trace. After I do this, the end user then gets a clear trace, and can get to the site. Seems like the trace i'm doing from the router interface clears it up.... anyone have this experience?
hope it makes sense... i'll be happy to provide any more info.
Cisco 7204VXR (NPE-G1) processor (revision B) with 983040K/65536K bytes of memory.
Processor board ID 26787189
SB-1 CPU at 700MHz, Implementation 1025, Rev 0.2, 512KB L2 Cache
4 slot VXR midplane, Version 2.6
funny you mention CEF... the CEF Process was shooting the CPU util up to a constant 30%, which, in my experience is very high for this router... i've loaded these routers up a lot more, with minimal cpu use.
I'm using a pool of 10 live IPs for NAT overloading.
do i need to disable CEF? would that effect random time outs and such?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...