Re: Fragment basic ques

From: karim jamali <karim.jamali_at_gmail.com>
Date: Tue, 21 Sep 2010 16:18:58 +0300

Dears,

I have generated a ping with a size of 5000 bytes and I have
virtual-reassembly turned on under a router interface. Check the debugs
output. To sum up:
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:0, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:1480, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:2960, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:4440, len:540)

I guess cpak offset: is referencing the current offset and npack offset is
the next packet offset.
Please correct me if I am wrong.

We see that it was broken to 4 packets (first 3 1480 and the final one was
the 540 as per the length). Notice also the offset.

*Sep 21 13:27:09.407: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1122,
offset:0, len:1480) in fast path...
*Sep 21 13:27:09.407: IP_VFR: created frag state for sa:10.4.1.10,
da:10.4.6.2, id:1122...
*Sep 21 13:27:09.407: IP_VFR: pak incomplete cpak-offset:0, cpak-len:1480,
flag: 1
*Sep 21 13:27:09.407: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.407: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1122,
offset:1480, len:1480) in fast path...
*Sep 21 13:27:09.407: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.407: IP_VFR: pak incomplete cpak-offset:1480,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.407: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.407: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1122,
offset:2960, len:1480) in fast path...
*Sep 21 13:27:09.411: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.411: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.411: IP_VFR: pak incomplete cpak-offset:2960,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.411: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.411: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1122,
offset:4440, len:540) in fast path...
*Sep 21 13:27:09.411: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.411: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.411: IP_VFR: cpak-offset:2960, cpak-len:1480,
npak-offset:4440
*Sep 21 13:27:09.411: IP_VFR: dgrm complete, switching the frags.
*Sep 21 13:27:09.411: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1122, offset:0, len:1480)
*Sep 21 13:27:09.411: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.411: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1122, offset:1480, len:1480)
*Sep 21 13:27:09.411: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.411: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1122, offset:2960, len:1480)
*Sep 21 13:27:09.411: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.411: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1122, offset:4440, len:540)
*Sep 21 13:27:09.411: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.411: IP_VFR: all fragments have been switched.
*Sep 21 13:27:09.411: IP_VFR: pak_subblock_copy - new 0x66CBC6F8, old
0x6566C1F4
*Sep 21 13:27:09.411: IP_VFR: pak_subblock_free - pak 0x6566CD70
*Sep 21 13:27:09.411: IP_VFR: pak_subblock_free - pak 0x6566AED0
*Sep 21 13:27:09.411: IP_VFR: pak_subblock_free - pak 0x656643A0
*Sep 21 13:27:09.415: IP_VFR: pak_subblock_copy - new 0x6566D144, old
0x66CBC6F8
*Sep 21 13:27:09.415: IP_VFR: deleted frag state for sa:10.4.1.10,
da:10.4.6.2, id:1122
*Sep 21 13:27:09.415: IP_VFR: pak_subblock_free - pak 0x6566D144
*Sep 21 13:27:09.419: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1123,
offset:0, len:1480) in fast path...
*Sep 21 13:27:09.419: IP_VFR: created frag state for sa:10.4.1.10,
da:10.4.6.2, id:1123...
*Sep 21 13:27:09.419: IP_VFR: pak incomplete cpak-offset:0, cpak-len:1480,
flag: 1
*Sep 21 13:27:09.419: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.419: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:112
BMB-KSA-DMVPN-SPOKE(config)#3, offset:1480, len:1480) in fast path...
*Sep 21 13:27:09.419: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.419: IP_VFR: pak incomplete cpak-offset:1480,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.419: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.423: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1123,
offset:2960, len:1480) in fast path...
*Sep 21 13:27:09.423: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.423: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.423: IP_VFR: pak incomplete cpak-offset:2960,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.423: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.423: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1123,
offset:4440, len:540) in fast path...
*Sep 21 13:27:09.423: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.423: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.423: IP_VFR: cpak-offset:2960, cpak-len:1480,
npak-offset:4440
*Sep 21 13:27:09.423: IP_VFR: dgrm complete, switching the frags.
*Sep 21 13:27:09.423: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1123, offset:0, len:1480)
*Sep 21 13:27:09.423: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.423: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1123, offset:1480, len:1480)
*Sep 21 13:27:09.423: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.423: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1123, offset:2960, len:1480)
*Sep 21 13:27:09.423: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.423: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1123, offset:4440, len:540)
*Sep 21 13:27:09.423: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.423: IP_VFR: all fragments have been switched.
*Sep 21 13:27:09.423: IP_VFR: pak_subblock_copy - new 0x66C968CC, old
0x6566E83C
*Sep 21 13:27:09.423: IP_VFR: pak_subblock_free - pak 0x6566D8EC
*Sep 21 13:27:09.427: IP_VFR: pak_subblock_free - pak 0x6566C5C8
*Sep 21 13:27:09.427: IP_VFR: pak_subblock_free - pak 0x6502482C
*Sep 21 13:27:09.427: IP_VFR: pak_subblock_copy - new 0x6566C99C, old
0x66C968CC
*Sep 21 13:27:09.427: IP_VFR: deleted frag state for sa:10.4.1.10,
da:10.4.6.2, id:1123
*Sep 21 13:27:09.427: IP_VFR: pak_subblock_free - pak 0x6566C99C
*Sep 21 13:27:09.431: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1124,
offset:0, len:1480) in fast path...
*Sep 21 13:27:09.431: IP_VFR: created frag state for sa:10.4.1.10,
da:10.4.6.2, id:1124...
*Sep 21 13:27:09.431: IP_VFR: pak incomplete cpak-offset:0, cpak-len:1480,
flag: 1
*Sep 21 13:27:09.431: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.431: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1124,
offset:1480, len:1480) in fast path...
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.435: IP_VFR: pak incomplete cpak-offset:1480,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.435: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.435: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1124,
offset:2960, len:1480) in fast path...
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.435: IP_VFR: pak incomplete cpak-offset:2960,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.435: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.435: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1124,
offset:4440, len:540) in fast path...
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.435: IP_VFR: cpak-offset:2960, cpak-len:1480,
npak-offset:4440
*Sep 21 13:27:09.435: IP_VFR: dgrm complete, switching the frags.
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:0, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:1480, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:2960, len:1480)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1124, offset:4440, len:540)
*Sep 21 13:27:09.435: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.435: IP_VFR: all fragments have been switched.
*Sep 21 13:27:09.435: IP_VFR: pak_subblock_copy - new 0x66CBC6F8, old
0x6566E468
*Sep 21 13:27:09.435: IP_VFR: pak_subblock_free - pak 0x6566EFE4
*Sep 21 13:27:09.435: IP_VFR: pak_subblock_free - pak 0x6566EC10
*Sep 21 13:27:09.435: IP_VFR: pak_subblock_free - pak 0x65663FCC
*Sep 21 13:27:09.439: IP_VFR: pak_subblock_copy - new 0x6566F3B8, old
0x66CBC6F8
*Sep 21 13:27:09.439: IP_VFR: deleted frag state for sa:10.4.1.10,
da:10.4.6.2, id:1124
*Sep 21 13:27:09.439: IP_VFR: pak_subblock_free - pak 0x6566F3B8
*Sep 21 13:27:09.443: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1125,
offset:0, len:1480) in fast path...
*Sep 21 13:27:09.443: IP_VFR: created frag state for sa:10.4.1.10,
da:10.4.6.2, id:1125...
*Sep 21 13:27:09.447: IP_VFR: pak incomplete cpak-offset:0, cpak-len:1480,
flag: 1
*Sep 21 13:27:09.447: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.447: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1125,
offset:1480, len:1480) in fast path...
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.447: IP_VFR: pak incomplete cpak-offset:1480,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.447: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.447: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1125,
offset:2960, len:1480) in fast path...
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.447: IP_VFR: pak incomplete cpak-offset:2960,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.447: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.447: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1125,
offset:4440, len:540) in fast path...
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.447: IP_VFR: cpak-offset:2960, cpak-len:1480,
npak-offset:4440
*Sep 21 13:27:09.447: IP_VFR: dgrm complete, switching the frags.
*Sep 21 13:27:09.447: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1125, offset:0, len:1480)
*Sep 21 13:27:09.447: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.447: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1125, offset:1480, len:1480)
*Sep 21 13:27:09.447: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.447: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1125, offset:2960, len:1480)
*Sep 21 13:27:09.447: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.447: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1125, offset:4440, len:540)
*Sep 21 13:27:09.447: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.447: IP_VFR: all fragments have been switched.
*Sep 21 13:27:09.447: IP_VFR: pak_subblock_copy - new 0x66C968CC, old
0x65026AA0
*Sep 21 13:27:09.447: IP_VFR: pak_subblock_free - pak 0x650262F8
*Sep 21 13:27:09.451: IP_VFR: pak_subblock_free - pak 0x65670308
*Sep 21 13:27:09.451: IP_VFR: pak_subblock_free - pak 0x65023508
*Sep 21 13:27:09.451: IP_VFR: pak_subblock_copy - new 0x65027248, old
0x66C968CC
*Sep 21 13:27:09.451: IP_VFR: deleted frag state for sa:10.4.1.10,
da:10.4.6.2, id:1125
*Sep 21 13:27:09.451: IP_VFR: pak_subblock_free - pak 0x65027248
*Sep 21 13:27:09.455: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1126,
offset:0, len:1480) in fast path...
*Sep 21 13:27:09.455: IP_VFR: created frag state for sa:10.4.1.10,
da:10.4.6.2, id:1126...
*Sep 21 13:27:09.455: IP_VFR: pak incomplete cpak-offset:0, cpak-len:1480,
flag: 1
*Sep 21 13:27:09.455: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.459: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1126,
offset:1480, len:1480) in fast path...
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.459: IP_VFR: pak incomplete cpak-offset:1480,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.459: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.459: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1126,
offset:2960, len:1480) in fast path...
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.459: IP_VFR: pak incomplete cpak-offset:2960,
cpak-len:1480, flag: 1
*Sep 21 13:27:09.459: IP_VFR: dgrm incomplete, returning...
*Sep 21 13:27:09.459: IP_VFR: fragment (sa:10.4.1.10, da:10.4.6.2, id:1126,
offset:4440, len:540) in fast path...
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:0, cpak-len:1480, npak-offset:1480
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:1480, cpak-len:1480,
npak-offset:2960
*Sep 21 13:27:09.459: IP_VFR: cpak-offset:2960, cpak-len:1480,
npak-offset:4440
*Sep 21 13:27:09.459: IP_VFR: dgrm complete, switching the frags.
*Sep 21 13:27:09.459: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1126, offset:0, len:1480)
*Sep 21 13:27:09.459: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.459: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1126, offset:1480, len:1480)
*Sep 21 13:27:09.459: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.459: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1126, offset:2960, len:1480)
*Sep 21 13:27:09.459: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.459: IP_VFR: switching fragment (sa:10.4.1.10, da:10.4.6.2,
id:1126, offset:4440, len:540)
*Sep 21 13:27:09.459: IP VFR:Enqueing packet to IP queue
*Sep 21 13:27:09.459: IP_VFR: all fragments have been switched.
*Sep 21 13:27:09.459: IP_VFR: pak_subblock_copy - new 0x66CBC6F8, old
0x65667938
*Sep 21 13:27:09.463: IP_VFR: pak_subblock_free - pak 0x656669E8
*Sep 21 13:27:09.463: IP_VFR: pak_subblock_free - pak 0x65026E74
*Sep 21 13:27:09.463: IP_VFR: pak_subblock_free - pak 0x65023CB0
*Sep 21 13:27:09.463: IP_VFR: pak_subblock_copy - new 0x65666614, old
0x66CBC6F8
*Sep 21 13:27:09.463: IP_VFR: deleted frag state for sa:10.4.1.10,
da:10.4.6.2, id:1126
*Sep 21 13:27:09.463: IP_VFR: pak_subblock_free - pak 0x65666614

HTH,

On Tue, Sep 21, 2010 at 3:48 PM, Abraham, Tharak <tharakabraham_at_gmail.com>wrote:

> Happy..-:)
>
> In your outputs, the last fragments from all the routers would have the MF
> flag unset or 0.(indicating its the last fragment in the series)
> The sending router performs the fragmentation for the MTU for the
> underlying
> link.
>
> MF flag would be always set for the first fragment and unset for the last
> fragment.
>
> This is an eg between two links
>
> 2000 byte packet traversing R1 - R2 (excludes Ip header)
> ===================================
> At R1 it gets fragmented into:-
>
> First fragment
> ==============
> 1500 bytes (1480 byte Data + 20 byte Ip header)
> The MF flag is set and the offset is 0
>
> Second fragment
> ===============
> 540 bytes (520 byte Data and 20 byte Ip header)
> The MF flag is unset and offset is 185
> The offset is calculated simply by dividing the data by 8 byte blocks.
> (1480/8=185)
>
> At the reciever, its calculated like
> 185*8 + 520 should give you the reassembled data size = 2000 bytes which we
> sent initially.
>
>
> Best Regards,
> Tharak Abraham Luke
>
>
> On Tue, Sep 21, 2010 at 9:12 AM, Happy Singh <
> happynetworkingsingh_at_gmail.com
> > wrote:
>
> > Hi
> >
> > I have some very basic doubt in fragmentation .
> > Lets say we have following scenario :
> >
> >
> > R1 ---------- R2 ------------R3------------R4
> >
> > R1-R2 MTU 1500
> > R2-R3 MTU 800
> > R3-R4 MTU 400
> >
> > Lets say pkt of 2000 bytes arrives at R1 . It splits in 1500 and 500 .
> Let
> > MF means "more fragments"
> >
> > MF = 1 Fragment offset = 0
> > MF =1 Fragment offset = 1501 <<<<<<<<<<<<< MF will be unset since this
> is
> > the last fragment R1 is gonna sent
> >
> > These are fields written in IP header
> >
> > Now next link R2 -- R3
> >
> > MF = 1 Fragment offset = 0 ( 0 to 800)
> > MF = 1 Fragment offset = 801 ( 801 to 1500)
> > MF = 1 Fragment offset 1501 ( 1501 to 2000)
> >
> > Next link R3 - R4
> >
> > MF = 1 Fragment offset =0 ( 0 to 400)
> > MF = 1 Fragment offset = 401 ( 401 to 800)
> > MF = 1 Fragment offset = 801 ( 801 to 1200 )
> > MF = 1 Fragment offset = 1201 ( 1201 to 1500 )
> > MF = 1 Fragment offset = 1501 ( 1501 to 1900 )
> > MF = 0 Fragment offset = 1901 ( 1901 to 2000 )
> >
> >
> > Please let me know if these calculation is correct ? Please guide where
> MF
> > will be 0 and 1 ..(which router)
> >
> > Thnx
> > Happy
> >
> >
> > Blogs and organic groups at http://www.ccie.net
> >
> > _______________________________________________________________________
> > Subscription information may be found at:
> > http://www.groupstudy.com/list/CCIELab.html
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
>
>
>
>
>
>
>
>

-- 
KJ
Blogs and organic groups at http://www.ccie.net
Received on Tue Sep 21 2010 - 16:18:58 ART

This archive was generated by hypermail 2.2.0 : Fri Oct 01 2010 - 05:58:05 ART