IOS Cisco 2951 15.4 (2) T 4 GB of RAM

Hello!

I am in need of help on strange problem.

We buy 2951 router Cisco + MEM-2951-512U4GB bundle and we installed modules DIMM 2 x 2048.

See the platform of command show me:

Data DIMM0 SPD:
Dimm size = 2048 MB

...

The DIMM1 SPD data:
Dimm size = 2048 MB

Ok!

But show version output shows only 2 GB:

Cisco CISCO2951/K9 (revision 1.1) with 1835264K / 261888K bytes of memory.

I am very confused. Appreciated for all the advice!

Thanks for the newspapers and based on your PID and the type of model, it seems that you have your RAM extra is a disappointment, it can not be integrated

Based on this link: CLICK HERE you can not add more Rams

I've attached a screenshot of the page, indicating the 2 GB max
You remove better than RAM, so it can be used to upgrade other :D

Rate or mark as Correct useful post :)

Tags: Cisco Support

Similar Questions

  • AnyConnect on Cisco 2951 router

    Hello

    Anyone know if I can configure my router Cisco 2951 (has a valid security license) as an AnyConnect server to accept connections customer of Cisco AnyConnect VPN to a PC users - just like the Cisco ASA firewall?

    Thank you

    Frank

    Hello

    If you have this module 'Internal VPN and Module of Service (VPN ISM)' then yes it supports anyconnect. Take a look below:

    http://www.Cisco.com/c/en/us/products/collateral/interfaces-modules/VPN-...

    Kind regards

    Kanwal

    Note: Please check if they are useful.

  • Update IOS Cisco Aironet 1200 series

    I'm currently running;

    C1200-k9w7 - mx.123 - 7.JA2

    JA version 12.2 (8)

    The search for certain documents or a list on the cisco site that shows the latest versions of IOS and if there is a newer version, I should look to use on them. Any advice would be appreciated.

    Well, it seems that v12.3.8 is later if you have 1200

    http://software.Cisco.com/download/release.html?mdfid=277026213&flowid=7...

    Sent by Cisco Support technique iPhone App

  • Issue of Logging IOS Cisco features

    -Want to know if the logging of Cisco IOS is substantially the same as logging on firewalls?

    -For example, we have a few VPN concentrators and want to turn on logging in such a way so that we can see that attributed to the users IP address and username, MAC, computer name if possible, when users connect remotely.  Is it possible on Cisco VPN concentrators as 7301, 3640, no. 2851

    -Also would like to be able to connect the ACL logs.

    Hello

    Yes. For more information about what's going to get connected, take a look at:

    http://www.Cisco.com/en/us/partner/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps6659/prod_white_paper0900aecd803fc77b.html

    Thank you

    Wen

  • IOS Cisco 7206

    Hello, I've been buying cisco 7206 and I smartnet for 7206

    IOS for 7206 have bug howe can I download deployment general ios gor 7206

    Hello

    With smartnet, you should be able to have a cco login account and go directly to the download software area

    Select the IOS software on the left side

    http://www.Cisco.com/Kobayashi/SW-Center/index.shtml

    Also on the same link above, if you do not have the ID of the bug you can go bug toolkit database and quary the ID of the bug to know exactly the code version it was fixed.

    If you have smarnet but don't have a cco login to access the download area, contact the Cisco TAC services

    http://www.Cisco.com/en/us/support/tsd_cisco_worldwide_contacts.html

    Rgds

    Jorge

  • Updgrage IOS Cisco 3850

    Dear all

    I have updated IOS based cisco 3850, he came to Flash, but still is not in "sh version" command and also I can't boot from this new IOS, to mention the steps start the new IOS.

    Thanks and greetings

    Jean Luc

    3850 normaly use command:
    
    software install file flash:cat3k_caa-universalk9.SPA.03.06.01.SE.150-1.EZ1.bin
    
    
  • On the latest ios Cisco AP

    Hello

    I just bought new cisco 1141N standalone AP. But it came with ios Version 12.4 JA1 (21a). When I checked the cisco download website, there are a few updates available with this product. Why cisco does not send to it is produced with the latest ios? Is it possible to free of charge upgrade to the latest version?

    We ship ever produced with the last IOS... Sound your network to select the IOS and use... If you encounter a problem, then we're here to help out!

    Yes if the unit is under warranty or under contract, please do not hesitate to contact the toll-free TAC tol and right now, you will get the last picture!

    Let me know if that answers your question and please do not forget to note the useful messages!

    Concerning

    Surendra

  • AnyConnect vpn client gives error of certificate on ios cisco 2800 series

    Dear all,

    I set up a vpn on cisco router ios simple anyconnect 2811

    I also configured natting on the inorder of router to access the internet for local users

    My problem

    I can not connect same vpn if I use the method of the anyconnect vpn client

    Also please tell me how to access internal resources by configuring split tunneling

    the error I get is as below


    * 08:16:35.947 Feb 8: 252:error:14094416:SSL routines: SSL3_READ_BYTES:sslv3 certificate alert unknown:../../../../cisco.comp/pki_ssl/src/openssl/dist/ssl/s3_pkt
    .c:1062:SSL alert number 46

    Here is my configuration

    ABC host name
    !

    start the flash system: c2800nm-advsecurityk9 - mz.124 - 24.T1.bin

    !
    AAA new-model
    !
    !
    AAA authentication login default local
    local connection SSL-VPN-AUTH authentication AAA
    !
    !
    AAA - the id of the joint session
    !
    dot11 syslog
    IP source-route
    !
    !
    IP cef
    !
    !
    IP-server names 4.2.2.2
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    Crypto pki trustpoint ABC
    enrollment selfsigned
    crl revocation checking
    rsakeypair ABC 1024
    !
    !
    ABC crypto pki certificate chain
    self-signed certificate 04
    3082023 HAS 308201 3 A0030201 02020104 300 D 0609 2A 864886 F70D0101 04050030
    27312530 2306092A 864886F7 0D 010902 73 732 6569 6173742D 6B 686177 16166D
    616E6565 6A2D7261 31313032 30383038 32333036 5A170D32 30303130 301E170D
    3030305A 31303030 30273125 30230609 2 A 864886 F70D0109 0216166D 65 73732
    2D6B6861 69617374 77616E65 656A2D72 6130819F 300 D 0609 2A 864886 F70D0101
    01050003 818 0030 81890281 8100C16D 1007E434 AFAEE3C1 90141205 E7785754
    FA3C4589 3D6B3D47 57BC54A5 7237E7FE 9B7CA69C 999B4DAF 835B98E9 972CFD03
    5A43488C 05E82E10 9B540AB9 5A54AB0C 525FED0E 05B6F2FF 6703F0BD F28AE6F2
    9E98298D E184CCDC 2D54741D 589 9731 C2BA5191 59DC7DC8 1F03C116 DDCF21EB D
    0BB4E931 02F61F64 D64A6F36 92F70203 010001A 3 76307430 0F060355 1 130101
    FF040530 030101FF 30210603 551D 1104 1A 301882 7373 656961 2 73742D6B 166D
    68617761 2 726130 1 230418 30168014 2FA1E05E 1BD981A0 1F060355 6E65656A
    A3485444 0B151D9E 44A3F6F6 301D 0603 551D0E04 1604142F A1E05E1B D981A0A3
    4854440B 151D9E44 A3F6F630 0D06092A 864886F7 010104 05000381 810096EF 0D
    39D4EEED E3CA162B E6BC1B61 0C3C66ED 02884209 0F4B54F1 BA7BEFF4 CAA206CE
    44 C 99817 134363 2 F29A9E6A 945AA1B4 E4B85ED7 1800DAA1 30BE25C3 8340AE80
    714F8FBD 9A433C4B 3EE2204D 88F7AB6D 929B5C88 5E7BC2B9 25754390 1622DB7B
    EEB11694 F381E995 59C825BE 52EA5923 F87C43A3 98744BE8 BB27C381 BE14
    quit smoking
    !
    !
    privilege of username XXXX XXXX 15
    username password ABC ABC
    Archives
    The config log
    hidekeys
    !
    !
    !
    !
    !
    !
    !
    !
    interface FastEthernet0/0
    IP address | public IP address. 255.255.255.252
    NAT outside IP
    IP virtual-reassembly
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/1
    IP 192.168.0.7 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    automatic duplex
    automatic speed
    !
    interface FastEthernet0/2/0
    no ip address
    Shutdown
    automatic duplex
    automatic speed
    !
    local pool IP 10.10.10.1 intranet 10.10.10.254
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 GATEWAY
    no ip address of the http server
    IP http secure server
    !
    !
    IP nat inside source map route sheep interface FastEthernet0/0 overload
    !
    extended IP access allow-traffic-to-lan list
    deny ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
    Licensing ip 192.168.0.0 0.0.0.255 any
    !
    access-list 101 permit ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
    !
    !
    !
    sheep allowed 10 route map
    match ip address allow-traffic-to-lan
    !
    !
    !
    WebVPN EIAST gateway
    IP address | public-ip | port 443
    redirect http port 80
    SSL trustpoint ABC
    development
    !
    WebVPN install svc flash:/webvpn/anyconnect-win-2.5.2018-k9.pkg sequence 1
    !
    WebVPN context XYZ
    SSL authentication check all
    !
    !
    political group XYZ
    functions compatible svc
    SVC-pool of addresses "intranet".
    SVC split include 10.10.10.0 255.255.255.0
    SVC-Server primary dns 213.42.20.20
    Group Policy - by default-XYZ
    list of authentication SSL-VPN-AUTH of AAA.
    area of bridge XYZ XYZ
    10 Max-users
    development
    !
    end

    Thank you

    Jvalin

    You could hit the next bug

    CSCtb73337    AnyConnect does not work with IOS if cert not trust/name of offset
    which is set at 12.4 (24) T02.

    Please update the code and give it a try.

  • Router IOS Cisco Anyconnect ASA configuration

    Hello

    Could someone give me some advice if I can use a Cisco 1812 to connect to a Cisco ASA5512X using Anyconnect. The question we have is that some remote offices may be given fixed IP addresses...

    Thank you.

    AnyConnect cannot be used because there is only one solution-client-software and non-integrated IOS as the EzVPN client.

    You can use dynamic cryptographic cards already offered on the ASA with a card standard encryption on the router, or you configure remote EzVPN on the router and on the SAA EzVPN server:

    http://www.Cisco.com/en/us/docs/iOS-XML/iOS/sec_conn_esyvpn/configuration/15-Mt/sec-easy-VPN-rem.html

    http://www.Cisco.com/en/us/docs/security/ASA/asa84/configuration/guide/vpn_remote_access.html

    --
    Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
    http://www.Kiva.org/invitedBy/karsteni

  • IPSec support

    Here are the ordered product

    2951 router
    CISCO2951/K9 Cisco 2951 w/3 GE, 4 EHWIC, 3 DSP, 2 SM, CF 256 MB, 512 MB DRAM, IPB 2
    S2951UK9 - 15201T UNIVERSAL IOS Cisco 2951 2
    WIC-02:00-V2 2-port Analog Modem Interface Card 8
    CAB - ACE Power cord AC (Europe), C13, FEC 7, 1.5 M 2
    CAB-CONSOLE-USB Cable from the console 6 ft with Type USB A and mini-B 2
    SRI-CCP-CD Cisco Config Professional on CD, CCP-Express on router Flash 2
    PWR-2921-51-AC Power supply Cisco 2921/2951 2
    MEM-2951-512 MB - DEF 512 MB DRAM (1 DIMM 512 MB) for Cisco 2951 SRI (default) 2
    MEM - CF - 256 MB Compact Flash 256 MB for Cisco 1900, 2900, 3900 SRI 2
    SL-29-IPB-K9 Basic IP for Cisco 2901-2951 license 2
    CON-SNT-2951 SMARTNET Cisco 2951 w/3 GE 8X5XNBD 2

    I'm confused if this will support IPSec or not because at one point, he said C2951UK9-1520IT that supports IPSec and on the other side he said SL-29-IBP-K9 which only supports basic configs.

    A normal case would be something like

    SL-19-IPB-K9 Basic IP for Cisco license 1900
    SL-19-SEC-K9 License security for Cisco 1900

    which means a base license and then added a license of security so that the work of crypto.

    Hello Boy Communication

    On older hardware (1800/2800 etc. and more) you need to select the software image containing the features that you need (e.g., advanced ip services) and you didn't need a license.

    On the ISR G2 (1900/2900/3900), there is only a single ('universal') image that contains all the features, but some features (such as IPsec) are 'locked' and you need a permit to 'unlock'

    So in your case the universal image (C2951UK9-1520IT) "supports" IPsec in the sense that the function is in the software, you don't need to order/download any other software image, however the IPsec have only be available if you enable a security licence (SL-29-SEC-K9 or SL-29-SEC-K9 = or L-SL-29-SEC-K9 =)

    (Note that at the end you have cited references for 1900 licenses, not the 2900).

    CFR.

    http://www.Cisco.com/en/us/prod/collateral/routers/ps10616/white_paper_c11_556985.html

    HTH

    Herbert

  • Cisco IOS CA

    Team,

    I use software Cisco IOS XE, Version 03.15.00.S - Standard Support version Cisco IOS software, software of CSR1000V (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5 (2) S, (fc3) SOFTWARE VERSION to support my Cisco IOS CA.

    In short, I am trying to support a FlexVPN - client VPN Win7 according to document tac 115907 id

    In this document, he says that OpenSSL CA is used but a Cisco IOS CA can also be used. In tests I am at a point where my certificates do not match the example:

    The example document TAC:

    X509v3 extensions:
    X509v3 Key use: F0000000
    Digital signature

    Non-repudiation
    Encryption key

    Data encryption

    My version of laboratory:

    X509v3 extensions:
    X509v3 Key use: A0000000
    Digital signature
    Encryption key

    How can question - I get these replacement using the IOS Cisco CA extensions?

    Chris

    Chris,

    (Shameless Plug) take a look at IOS CA config I used:

    http://www.Cisco.com/c/en/us/support/docs/security/flexvpn/115014-flexvp...

    M.

  • CISCO IOS

    Hello!!!

    I have question for CISCO IOS.  How will I know? What CISCO IOS support SSH version 1 $2? and it is possible to update CISCO IOS Cisco 7200 routers series for supporting SSH

    In General, you know quickly if a version of the IOS support SSH if the name of the image has K9.

    Example: c1700-adventerprise -k9 -12.4.bin

    Otherwise, you can use Cisco IOS Feature Navigator and check taken IOS supported by name of the image featured.

  • ASA version 8.4 for GNS3 IOS

    Hi all

    I test new IOS Cisco ASA version 8.4 in my LAB GNS3. Please help me and provide the link to download the same.

    I do not have access to direct download from cisco.com.

    Kind regards
    Saurabh

    Hello Slim,

    Please do some research on the subject,

    Here is a guide that you can use for GNS3,

    This will do for you

    http://www.xerunetworks.com/2012/02/Cisco-ASA-84-on-GNS3/

    Kind regards

  • Cisco ASA 8.4 (3) remote access VPN - client connects but cannot access inside the network

    I have problems to access the resources within the network when connecting with the Cisco VPN client for a version of 8.4 (3) operation of the IOS Cisco ASA 5510. I tried all new NAT 8.4 orders but cannot access the network interior. I can see traffic in newspapers when ping. I can only assume I have NAT evil or it's because the inside interface of the ASA is on the 24th of the same subnet as the network interior? Please see config below, any suggestion would be appreciated. I configured a VPN site to another in this same 5510 and it works well

    Thank you

    interface Ethernet0/0

    Speed 100

    full duplex

    nameif outside

    security-level 0

    IP x.x.x.x 255.255.255.240

    !

    interface Ethernet0/1

    Speed 100

    full duplex

    nameif inside

    security-level 100

    IP 10.88.10.254 255.255.255.0

    !

    interface Management0/0

    Shutdown

    nameif management

    security-level 0

    no ip address

    !

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    network of the PAT_to_Outside_ClassA object

    10.88.0.0 subnet 255.255.0.0

    network of the PAT_to_Outside_ClassB object

    subnet 172.16.0.0 255.240.0.0

    network of the PAT_to_Outside_ClassC object

    Subnet 192.168.0.0 255.255.240.0

    network of the LocalNetwork object

    10.88.0.0 subnet 255.255.0.0

    network of the RemoteNetwork1 object

    Subnet 192.168.0.0 255.255.0.0

    network of the RemoteNetwork2 object

    172.16.10.0 subnet 255.255.255.0

    network of the RemoteNetwork3 object

    10.86.0.0 subnet 255.255.0.0

    network of the RemoteNetwork4 object

    10.250.1.0 subnet 255.255.255.0

    network of the NatExempt object

    10.88.10.0 subnet 255.255.255.0

    the Site_to_SiteVPN1 object-group network

    object-network 192.168.4.0 255.255.254.0

    object-network 172.16.10.0 255.255.255.0

    object-network 10.0.0.0 255.0.0.0

    outside_access_in deny ip extended access list a whole

    inside_access_in of access allowed any ip an extended list

    11 extended access-list allow ip 10.250.1.0 255.255.255.0 any

    outside_1_cryptomap to access extended list ip 10.88.0.0 255.255.0.0 allow object-group Site_to_SiteVPN1

    mask 10.250.1.1 - 10.250.1.254 255.255.255.0 IP local pool Admin_Pool

    NAT static NatExempt NatExempt of the source (indoor, outdoor)

    NAT (inside, outside) static source any any static destination RemoteNetwork4 RemoteNetwork4-route search

    NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork1 RemoteNetwork1

    NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork2 RemoteNetwork2

    NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork3 RemoteNetwork3

    NAT (inside, outside) static source LocalNetwork LocalNetwork static destination RemoteNetwork4 RemoteNetwork4-route search

    !

    network of the PAT_to_Outside_ClassA object

    NAT dynamic interface (indoor, outdoor)

    network of the PAT_to_Outside_ClassB object

    NAT dynamic interface (indoor, outdoor)

    network of the PAT_to_Outside_ClassC object

    NAT dynamic interface (indoor, outdoor)

    Access-group outside_access_in in interface outside

    inside_access_in access to the interface inside group

    Route outside 0.0.0.0 0.0.0.0 x.x.x.x 1

    dynamic-access-policy-registration DfltAccessPolicy

    Sysopt connection timewait

    Service resetoutside

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set esp-ikev1 esp-md5-hmac bh-series

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto-map dynamic dynmap 10 set pfs

    Crypto-map dynamic dynmap 10 set transform-set bh - set ikev1

    life together - the association of security crypto dynamic-map dynmap 10 28800 seconds

    Crypto-map dynamic dynmap 10 kilobytes of life together - the association of safety 4608000

    Crypto-map dynamic dynmap 10 the value reverse-road

    card crypto mymap 1 match address outside_1_cryptomap

    card crypto mymap 1 set counterpart x.x.x.x

    card crypto mymap 1 set transform-set ESP-AES-256-SHA ikev1

    card crypto mymap 86400 seconds, 1 lifetime of security association set

    map mymap 1 set security-association life crypto kilobytes 4608000

    map mymap 100-isakmp ipsec crypto dynamic dynmap

    mymap outside crypto map interface

    crypto isakmp identity address

    Crypto isakmp nat-traversal 30

    Crypto ikev1 allow outside

    IKEv1 crypto ipsec-over-tcp port 10000

    IKEv1 crypto policy 5

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 1

    life 86400

    IKEv1 crypto policy 50

    preshared authentication

    the Encryption

    md5 hash

    Group 2

    life 86400

    IKEv1 crypto policy 60

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 70

    preshared authentication

    aes-256 encryption

    sha hash

    Group 1

    life 86400

    IKEv1 crypto policy 90

    preshared authentication

    aes encryption

    sha hash

    Group 2

    life 86400

    Telnet timeout 5

    Console timeout 0

    management-access inside

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal BACKDOORVPN group policy

    BACKDOORVPN group policy attributes

    value of VPN-filter 11

    Ikev1 VPN-tunnel-Protocol

    Split-tunnel-policy tunnelall

    BH.UK value by default-field

    type tunnel-group BACKDOORVPN remote access

    attributes global-tunnel-group BACKDOORVPN

    address pool Admin_Pool

    Group Policy - by default-BACKDOORVPN

    IPSec-attributes tunnel-group BACKDOORVPN

    IKEv1 pre-shared-key *.

    tunnel-group x.x.x.x type ipsec-l2l

    tunnel-group ipsec-attributes x.x.x.x

    IKEv1 pre-shared-key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    Excellent.

    Evaluate the useful ticket.

    Thank you

    Rizwan James

  • -VPN - PROBLEM IOS CLIENT!

    -Start ciscomoderator note - the following message has been changed to remove potentially sensitive information. Please refrain from publishing confidential information about the site to reduce the risk to the security of your network. -end of the note ciscomoderator-

    Hello

    I have IOS Cisco 2650XM running IPSEC. I configured for authentication local customer vpn. I create ipsec tunnel more Don t ping from router to my client vpn (windows 2 k with vpn client 4.0). If anyone can help me, my express recognition.

    Better compliance

    Joao Medeiros

    SH RUN

    Current configuration: 8092 bytes

    !

    ! Last configuration change at 09:09:04 GMT Tuesday, March 2, 1993 by lordz

    !

    version 12.2

    horodateurs service debug uptime

    Log service timestamps uptime

    encryption password service

    !

    hostname router_vpn_fns

    !

    start the system flash c2600-ik9o3s - mz.122 - 11.T.bin

    AAA new-model

    !

    !

    AAA authentication login default local

    AAA authorization network default local

    AAA - the id of the joint session

    !

    clock timezone GMT - 3

    voice-card 0

    dspfarm

    !

    IP subnet zero

    no ip source route

    IP cef

    !

    !

    no ip domain search

    agm IP domain name - tele.com

    name-server IP 192.168.10.1

    !

    no ip bootp Server

    audit of IP notify Journal

    Max-events of po verification IP 100

    property intellectual ssh time 60

    IP port ssh 2000 rotary 1

    !

    crypto ISAKMP policy 3

    BA 3des

    preshared authentication

    Group 2

    !

    crypto ISAKMP policy 110

    preshared authentication

    lifetime 10000

    !

    crypto ISAKMP policy 130

    preshared authentication

    lifetime 10000

    ISAKMP crypto key xxx address xxx.xxx.76.22

    ISAKMP crypto key xxx address yyy.yyy.149.190

    !

    ISAKMP crypto client configuration group xlordz

    key cisco123

    DNS 192.168.10.1

    area agm - tele.com

    LDz-pool

    ACL 108

    !

    86400 seconds, duration of life crypto ipsec security association

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_gyn

    Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_poa

    Crypto ipsec transform-set esp-3des esp-sha-hmac ldz-series

    !

    Crypto-map dynamic ldz_dynmap 10

    ldz - Set transform-set

    !

    !

    by default the card crypto client ldz_map of authentication list

    default value of card crypto ldz_map isakmp authorization list

    client configuration address card crypto ldz_map answer

    ldz_map 10 card crypto ipsec-isakmp dynamic ldz_dynmap

    !

    agmmap_gyn crypto-address on Serial0/0

    agmmap_gyn 1 ipsec-isakmp crypto map

    the value of xxx.xxx.76.22 peer

    Set transform-set agmipsec_gyn

    PFS group2 Set

    match address 120

    QoS before filing

    agmmap_gyn 2 ipsec-isakmp crypto map

    the value of yyy.yyy.149.190 peer

    Set transform-set agmipsec_poa

    PFS group2 Set

    match address 130

    !

    !

    !

    call active voice carrier's ability

    !

    voice class codec 1

    codec preference 1 60 g729r8 bytes

    g711alaw preferably 2 codec

    !

    !

    Fax fax-mail interface type

    MTA receive maximum-recipients 0

    !

    controller E1 0/1

    case mode

    No.-CRC4 framing

    termination 75 Ohm

    time intervals DS0-Group 1-15, 17 0 type digital r2 r2-compelled ani

    Digital-r2 r2-compelled ani type 1 time intervals DS0-group 18-31

    0 cases-custom

    country Brazil

    counting

    signal response Group-b 1

    case-personal 1

    country Brazil

    counting

    signal response Group-b 1

    !

    !

    !

    !

    interface FastEthernet0/0

    192.168.15.1 IP address 255.255.255.0 secondary

    192.168.7.1 IP address 255.255.255.0 secondary

    IP 192.168.10.10 255.255.255.0

    NBAR IP protocol discovery

    load-interval 30

    automatic speed

    full-duplex

    priority-group 1

    No cdp enable

    !

    interface Serial0/0

    bandwidth of 512

    IP 200.193.103.154 255.255.255.252

    NBAR IP protocol discovery

    frame relay IETF encapsulation

    load-interval 30

    priority-group 1

    dlci 507 frame relay interface

    frame-relay lmi-type ansi

    ldz_map card crypto

    !

    interface FastEthernet0/1

    no ip address

    NBAR IP protocol discovery

    load-interval 30

    Shutdown

    automatic duplex

    automatic speed

    No cdp enable

    !

    LDz-pool IP local pool 192.168.10.3 192.168.10.5

    IP classless

    IP route 0.0.0.0 0.0.0.0 200.193.103.153

    IP route 192.168.20.0 255.255.255.0 xxx.xxx.76.22

    IP route 192.168.25.0 255.255.255.0 xxx.xxx.76.22

    IP route 192.168.30.0 255.255.255.0 yyy.yyy.149.190

    IP route 192.168.35.0 255.255.255.0 yyy.yyy.149.190

    IP route vvv.vvv.17.152 255.255.255.248 192.168.10.1

    IP http server

    enable IP pim Bennett

    !

    !

    dns-servers extended IP access list

    extended IP access to key exchange list

    !

    Journal of access list 1 permit 192.168.10.44

    Journal of access list 1 permit 192.168.10.2

    Journal of access list 1 permit 192.168.10.1

    access-list 1 permit vvv.vvv.17.154 Journal

    IP access-list 108 allow any 192.168.10.0 0.0.0.255 connect

    access-list 108 permit ip any any newspaper

    IP access-list 120 allow any 192.168.20.0 0.0.0.255 connect

    IP access-list 120 allow any 192.168.25.0 0.0.0.255 connect

    access-list allow 120 ip host xxx.xxx.76.22 any log

    access-list 120 deny ip any any newspaper

    IP access-list 130 allow any 192.168.30.0 0.0.0.255 connect

    IP access-list 130 allow any 192.168.35.0 0.0.0.255 connect

    access-list allow 130 ip host yyy.yyy.149.190 any log

    access-list 130 deny ip any any newspaper

    access-list 140 deny udp 192.168.20.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.25.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.30.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 deny udp 192.168.35.0 0.0.0.255 any netbios-ns range

    NetBIOS-ss log

    access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any beach 137 139 connect

    access-list 140 deny tcp 192.168.35.0 0.0.0.255 any beach 137 139 connect

    access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any eq connect 5900

    access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any eq connect 5900

    access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any eq connect 5900

    access-list 140 deny tcp 192.168.35.0 0.0.0.255 any eq connect 5900

    access-list 140 permit ip any any newspaper

    Dialer-list 1 ip protocol allow

    not run cdp

    !

    Server SNMP community xxxxxxxxxx

    Enable SNMP-Server intercepts ATS

    call the rsvp-sync

    !

    voice-port 0/1:0

    !

    voice-port 0/1:1

    !

    No mgcp timer receive-rtcp

    !

    profile MGCP default

    !

    Dial-peer cor custom

    !

    !

    !

    !

    Line con 0

    exec-timeout 2 0

    Synchronous recording

    length 50

    line to 0

    exec-timeout 0 10

    No exec

    line vty 0 4

    access-class 1

    transport input telnet ssh

    !

    Master of NTP

    !

    end

    Hello

    If you are not disturbing the production network much, just try to reload 2650.

    This works sometimes!

    Kind regards

    Walked.

Maybe you are looking for