del flash:vlan.dat

frame-relay route 513 interface serial0/3 315

Well I got through the last workbook I wanted to get through sometime last week before moving back to the Internetwork Experts workbook 2. I started lab 2 today with a few dumb issues. First off I forgot to delete the vlan.dat file from flash before configuring the switching section. This didn’t play nice when it came time to prune vlans. It is always a real pain in the rear when you spend countless minutes troubleshooting only to remember you forgot to delete the file. Those are the mistakes that I can’t stand making, such a complete waste of time.

The other command was missing from my frame-relay switch when it came time to enable EIGRP. I spent another hour trying to figure out why the interfaces were not coming up and why EIGRP was not forming a neighbor relationship. I must have forgotten to check the up state of the serial interfaces on both R3 and R5 before moving passed frame relay. I must have just been overly excited to move and configure HDLC! I found the missing route when I was out of ideas on why the interfaces were not coming up. Sure enough it is always one of the first items I should be checking.

At this rate I will be buying a cold Cisco lunch for $1400 and the cost of the trip to eat that lunch :). At least I am learning as I continue to torture myself. I am coming to the realization that I am going to just need to break my labs up between two to three days. Too much to do at night when I get home.

Either way I am not feeling all that comfortable about my mock lab on April 14th, or the real lab for that matter.

Just tell me that the IOS is more secure than Windows 🙂

Cisco Wednesday ‘celebrated’ its first six-monthly patch schedule for IOS by delivering five separate security alerts. The alerts affect Cisco IOS Multicast VPN (MPVN); IOS with OSPF, MPLS VPN, and Supervisor 32, Supervisor 720, or Router Switch Processor 720; IOS user datagram protocol delivery; and IOS’ Data-link Switching feature.

Cisco warned that its MVPN could be exploited to allow a malicious user to create extra multicast states on the core routers or receive multicast traffic from other MPLS-based VPNs by sending specially crafted messages. Patches and workarounds are available for this vulnerability.

Certain Cisco Catalyst 6500 Series and Cisco 7600 Router devices that run branches of Cisco IOS based on version 12.2 could be open to a denial-of-service attack, preventing any traffic from entering an affected interface,according to Cisco. Devices are vulnerable if they are configured for Open Shortest Path First (OSPF) Sham-Link and MPLS VPN. Workaround and fixes are available for this problem.”

Full article here