IOS Cisco 2951 15.4 (2) T 4 GB of RAM
Hello!
I am in need of help on strange problem.
We buy 2951 router Cisco + MEM-2951-512U4GB bundle and we installed modules DIMM 2 x 2048.
See the platform of command show me:
Data DIMM0 SPD:
Dimm size = 2048 MB
...
The DIMM1 SPD data:
Dimm size = 2048 MB
Ok!
But show version output shows only 2 GB:
Cisco CISCO2951/K9 (revision 1.1) with 1835264K / 261888K bytes of memory.
I am very confused. Appreciated for all the advice!
Thanks for the newspapers and based on your PID and the type of model, it seems that you have your RAM extra is a disappointment, it can not be integrated
Based on this link: CLICK HERE you can not add more Rams
I've attached a screenshot of the page, indicating the 2 GB max
You remove better than RAM, so it can be used to upgrade other :D
Rate or mark as Correct useful post :)
Tags: Cisco Support
Similar Questions
-
AnyConnect on Cisco 2951 router
Hello
Anyone know if I can configure my router Cisco 2951 (has a valid security license) as an AnyConnect server to accept connections customer of Cisco AnyConnect VPN to a PC users - just like the Cisco ASA firewall?
Thank you
Frank
Hello
If you have this module 'Internal VPN and Module of Service (VPN ISM)' then yes it supports anyconnect. Take a look below:
http://www.Cisco.com/c/en/us/products/collateral/interfaces-modules/VPN-...
Kind regards
Kanwal
Note: Please check if they are useful.
-
Update IOS Cisco Aironet 1200 series
I'm currently running;
C1200-k9w7 - mx.123 - 7.JA2
JA version 12.2 (8)
The search for certain documents or a list on the cisco site that shows the latest versions of IOS and if there is a newer version, I should look to use on them. Any advice would be appreciated.
Well, it seems that v12.3.8 is later if you have 1200
http://software.Cisco.com/download/release.html?mdfid=277026213&flowid=7...
Sent by Cisco Support technique iPhone App
-
Issue of Logging IOS Cisco features
-Want to know if the logging of Cisco IOS is substantially the same as logging on firewalls?
-For example, we have a few VPN concentrators and want to turn on logging in such a way so that we can see that attributed to the users IP address and username, MAC, computer name if possible, when users connect remotely. Is it possible on Cisco VPN concentrators as 7301, 3640, no. 2851
-Also would like to be able to connect the ACL logs.
Hello
Yes. For more information about what's going to get connected, take a look at:
Thank you
Wen
-
Hello, I've been buying cisco 7206 and I smartnet for 7206
IOS for 7206 have bug howe can I download deployment general ios gor 7206
Hello
With smartnet, you should be able to have a cco login account and go directly to the download software area
Select the IOS software on the left side
http://www.Cisco.com/Kobayashi/SW-Center/index.shtml
Also on the same link above, if you do not have the ID of the bug you can go bug toolkit database and quary the ID of the bug to know exactly the code version it was fixed.
If you have smarnet but don't have a cco login to access the download area, contact the Cisco TAC services
http://www.Cisco.com/en/us/support/tsd_cisco_worldwide_contacts.html
Rgds
Jorge
-
Dear all
I have updated IOS based cisco 3850, he came to Flash, but still is not in "sh version" command and also I can't boot from this new IOS, to mention the steps start the new IOS.
Thanks and greetings
Jean Luc
3850 normaly use command: software install file flash:cat3k_caa-universalk9.SPA.03.06.01.SE.150-1.EZ1.bin
-
Hello
I just bought new cisco 1141N standalone AP. But it came with ios Version 12.4 JA1 (21a). When I checked the cisco download website, there are a few updates available with this product. Why cisco does not send to it is produced with the latest ios? Is it possible to free of charge upgrade to the latest version?
We ship ever produced with the last IOS... Sound your network to select the IOS and use... If you encounter a problem, then we're here to help out!
Yes if the unit is under warranty or under contract, please do not hesitate to contact the toll-free TAC tol and right now, you will get the last picture!
Let me know if that answers your question and please do not forget to note the useful messages!
Concerning
Surendra
-
AnyConnect vpn client gives error of certificate on ios cisco 2800 series
Dear all,
I set up a vpn on cisco router ios simple anyconnect 2811
I also configured natting on the inorder of router to access the internet for local users
My problem
I can not connect same vpn if I use the method of the anyconnect vpn client
Also please tell me how to access internal resources by configuring split tunneling
the error I get is as below
* 08:16:35.947 Feb 8: 252:error:14094416:SSL routines: SSL3_READ_BYTES:sslv3 certificate alert unknown:../../../../cisco.comp/pki_ssl/src/openssl/dist/ssl/s3_pkt
.c:1062:SSL alert number 46Here is my configuration
ABC host name
!start the flash system: c2800nm-advsecurityk9 - mz.124 - 24.T1.bin
!
AAA new-model
!
!
AAA authentication login default local
local connection SSL-VPN-AUTH authentication AAA
!
!
AAA - the id of the joint session
!
dot11 syslog
IP source-route
!
!
IP cef
!
!
IP-server names 4.2.2.2
!
Authenticated MultiLink bundle-name Panel
!
!
!
Crypto pki trustpoint ABC
enrollment selfsigned
crl revocation checking
rsakeypair ABC 1024
!
!
ABC crypto pki certificate chain
self-signed certificate 04
3082023 HAS 308201 3 A0030201 02020104 300 D 0609 2A 864886 F70D0101 04050030
27312530 2306092A 864886F7 0D 010902 73 732 6569 6173742D 6B 686177 16166D
616E6565 6A2D7261 31313032 30383038 32333036 5A170D32 30303130 301E170D
3030305A 31303030 30273125 30230609 2 A 864886 F70D0109 0216166D 65 73732
2D6B6861 69617374 77616E65 656A2D72 6130819F 300 D 0609 2A 864886 F70D0101
01050003 818 0030 81890281 8100C16D 1007E434 AFAEE3C1 90141205 E7785754
FA3C4589 3D6B3D47 57BC54A5 7237E7FE 9B7CA69C 999B4DAF 835B98E9 972CFD03
5A43488C 05E82E10 9B540AB9 5A54AB0C 525FED0E 05B6F2FF 6703F0BD F28AE6F2
9E98298D E184CCDC 2D54741D 589 9731 C2BA5191 59DC7DC8 1F03C116 DDCF21EB D
0BB4E931 02F61F64 D64A6F36 92F70203 010001A 3 76307430 0F060355 1 130101
FF040530 030101FF 30210603 551D 1104 1A 301882 7373 656961 2 73742D6B 166D
68617761 2 726130 1 230418 30168014 2FA1E05E 1BD981A0 1F060355 6E65656A
A3485444 0B151D9E 44A3F6F6 301D 0603 551D0E04 1604142F A1E05E1B D981A0A3
4854440B 151D9E44 A3F6F630 0D06092A 864886F7 010104 05000381 810096EF 0D
39D4EEED E3CA162B E6BC1B61 0C3C66ED 02884209 0F4B54F1 BA7BEFF4 CAA206CE
44 C 99817 134363 2 F29A9E6A 945AA1B4 E4B85ED7 1800DAA1 30BE25C3 8340AE80
714F8FBD 9A433C4B 3EE2204D 88F7AB6D 929B5C88 5E7BC2B9 25754390 1622DB7B
EEB11694 F381E995 59C825BE 52EA5923 F87C43A3 98744BE8 BB27C381 BE14
quit smoking
!
!
privilege of username XXXX XXXX 15
username password ABC ABC
Archives
The config log
hidekeys
!
!
!
!
!
!
!
!
interface FastEthernet0/0
IP address | public IP address. 255.255.255.252
NAT outside IP
IP virtual-reassembly
automatic duplex
automatic speed
!
interface FastEthernet0/1
IP 192.168.0.7 255.255.255.0
IP nat inside
IP virtual-reassembly
automatic duplex
automatic speed
!
interface FastEthernet0/2/0
no ip address
Shutdown
automatic duplex
automatic speed
!
local pool IP 10.10.10.1 intranet 10.10.10.254
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 GATEWAY
no ip address of the http server
IP http secure server
!
!
IP nat inside source map route sheep interface FastEthernet0/0 overload
!
extended IP access allow-traffic-to-lan list
deny ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
Licensing ip 192.168.0.0 0.0.0.255 any
!
access-list 101 permit ip 192.168.0.0 0.0.0.255 10.10.10.0 0.0.0.255
!
!
!
sheep allowed 10 route map
match ip address allow-traffic-to-lan
!
!
!
WebVPN EIAST gateway
IP address | public-ip | port 443
redirect http port 80
SSL trustpoint ABC
development
!
WebVPN install svc flash:/webvpn/anyconnect-win-2.5.2018-k9.pkg sequence 1
!
WebVPN context XYZ
SSL authentication check all
!
!
political group XYZ
functions compatible svc
SVC-pool of addresses "intranet".
SVC split include 10.10.10.0 255.255.255.0
SVC-Server primary dns 213.42.20.20
Group Policy - by default-XYZ
list of authentication SSL-VPN-AUTH of AAA.
area of bridge XYZ XYZ
10 Max-users
development
!
endThank you
Jvalin
You could hit the next bug
CSCtb73337 AnyConnect does not work with IOS if cert not trust/name of offset
which is set at 12.4 (24) T02.Please update the code and give it a try.
-
Router IOS Cisco Anyconnect ASA configuration
Hello
Could someone give me some advice if I can use a Cisco 1812 to connect to a Cisco ASA5512X using Anyconnect. The question we have is that some remote offices may be given fixed IP addresses...
Thank you.
AnyConnect cannot be used because there is only one solution-client-software and non-integrated IOS as the EzVPN client.
You can use dynamic cryptographic cards already offered on the ASA with a card standard encryption on the router, or you configure remote EzVPN on the router and on the SAA EzVPN server:
http://www.Cisco.com/en/us/docs/security/ASA/asa84/configuration/guide/vpn_remote_access.html
--
Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
http://www.Kiva.org/invitedBy/karsteni -
Here are the ordered product
2951 router CISCO2951/K9 Cisco 2951 w/3 GE, 4 EHWIC, 3 DSP, 2 SM, CF 256 MB, 512 MB DRAM, IPB 2 S2951UK9 - 15201T UNIVERSAL IOS Cisco 2951 2 WIC-02:00-V2 2-port Analog Modem Interface Card 8 CAB - ACE Power cord AC (Europe), C13, FEC 7, 1.5 M 2 CAB-CONSOLE-USB Cable from the console 6 ft with Type USB A and mini-B 2 SRI-CCP-CD Cisco Config Professional on CD, CCP-Express on router Flash 2 PWR-2921-51-AC Power supply Cisco 2921/2951 2 MEM-2951-512 MB - DEF 512 MB DRAM (1 DIMM 512 MB) for Cisco 2951 SRI (default) 2 MEM - CF - 256 MB Compact Flash 256 MB for Cisco 1900, 2900, 3900 SRI 2 SL-29-IPB-K9 Basic IP for Cisco 2901-2951 license 2 CON-SNT-2951 SMARTNET Cisco 2951 w/3 GE 8X5XNBD 2 I'm confused if this will support IPSec or not because at one point, he said C2951UK9-1520IT that supports IPSec and on the other side he said SL-29-IBP-K9 which only supports basic configs.
A normal case would be something like
SL-19-IPB-K9 Basic IP for Cisco license 1900 SL-19-SEC-K9 License security for Cisco 1900 which means a base license and then added a license of security so that the work of crypto.
Hello Boy Communication
On older hardware (1800/2800 etc. and more) you need to select the software image containing the features that you need (e.g., advanced ip services) and you didn't need a license.
On the ISR G2 (1900/2900/3900), there is only a single ('universal') image that contains all the features, but some features (such as IPsec) are 'locked' and you need a permit to 'unlock'
So in your case the universal image (C2951UK9-1520IT) "supports" IPsec in the sense that the function is in the software, you don't need to order/download any other software image, however the IPsec have only be available if you enable a security licence (SL-29-SEC-K9 or SL-29-SEC-K9 = or L-SL-29-SEC-K9 =)
(Note that at the end you have cited references for 1900 licenses, not the 2900).
CFR.
http://www.Cisco.com/en/us/prod/collateral/routers/ps10616/white_paper_c11_556985.html
HTH
Herbert
-
Team,
I use software Cisco IOS XE, Version 03.15.00.S - Standard Support version Cisco IOS software, software of CSR1000V (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5 (2) S, (fc3) SOFTWARE VERSION to support my Cisco IOS CA.
In short, I am trying to support a FlexVPN - client VPN Win7 according to document tac 115907 id
In this document, he says that OpenSSL CA is used but a Cisco IOS CA can also be used. In tests I am at a point where my certificates do not match the example:
The example document TAC:
X509v3 extensions:
X509v3 Key use: F0000000
Digital signatureNon-repudiation
Encryption keyData encryption
My version of laboratory:
X509v3 extensions:
X509v3 Key use: A0000000
Digital signature
Encryption keyHow can question - I get these replacement using the IOS Cisco CA extensions?
Chris
Chris,
(Shameless Plug) take a look at IOS CA config I used:
http://www.Cisco.com/c/en/us/support/docs/security/flexvpn/115014-flexvp...
M.
-
Hello!!!
I have question for CISCO IOS. How will I know? What CISCO IOS support SSH version 1 $2? and it is possible to update CISCO IOS Cisco 7200 routers series for supporting SSH
In General, you know quickly if a version of the IOS support SSH if the name of the image has K9.
Example: c1700-adventerprise -k9 -12.4.bin
Otherwise, you can use Cisco IOS Feature Navigator and check taken IOS supported by name of the image featured.
-
ASA version 8.4 for GNS3 IOS
Hi all
I test new IOS Cisco ASA version 8.4 in my LAB GNS3. Please help me and provide the link to download the same.
I do not have access to direct download from cisco.com.
Kind regards
SaurabhHello Slim,
Please do some research on the subject,
Here is a guide that you can use for GNS3,
This will do for you
http://www.xerunetworks.com/2012/02/Cisco-ASA-84-on-GNS3/
Kind regards
-
I have problems to access the resources within the network when connecting with the Cisco VPN client for a version of 8.4 (3) operation of the IOS Cisco ASA 5510. I tried all new NAT 8.4 orders but cannot access the network interior. I can see traffic in newspapers when ping. I can only assume I have NAT evil or it's because the inside interface of the ASA is on the 24th of the same subnet as the network interior? Please see config below, any suggestion would be appreciated. I configured a VPN site to another in this same 5510 and it works well
Thank you
interface Ethernet0/0
Speed 100
full duplex
nameif outside
security-level 0
IP x.x.x.x 255.255.255.240
!
interface Ethernet0/1
Speed 100
full duplex
nameif inside
security-level 100
IP 10.88.10.254 255.255.255.0
!
interface Management0/0
Shutdown
nameif management
security-level 0
no ip address
!
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
network of the PAT_to_Outside_ClassA object
10.88.0.0 subnet 255.255.0.0
network of the PAT_to_Outside_ClassB object
subnet 172.16.0.0 255.240.0.0
network of the PAT_to_Outside_ClassC object
Subnet 192.168.0.0 255.255.240.0
network of the LocalNetwork object
10.88.0.0 subnet 255.255.0.0
network of the RemoteNetwork1 object
Subnet 192.168.0.0 255.255.0.0
network of the RemoteNetwork2 object
172.16.10.0 subnet 255.255.255.0
network of the RemoteNetwork3 object
10.86.0.0 subnet 255.255.0.0
network of the RemoteNetwork4 object
10.250.1.0 subnet 255.255.255.0
network of the NatExempt object
10.88.10.0 subnet 255.255.255.0
the Site_to_SiteVPN1 object-group network
object-network 192.168.4.0 255.255.254.0
object-network 172.16.10.0 255.255.255.0
object-network 10.0.0.0 255.0.0.0
outside_access_in deny ip extended access list a whole
inside_access_in of access allowed any ip an extended list
11 extended access-list allow ip 10.250.1.0 255.255.255.0 any
outside_1_cryptomap to access extended list ip 10.88.0.0 255.255.0.0 allow object-group Site_to_SiteVPN1
mask 10.250.1.1 - 10.250.1.254 255.255.255.0 IP local pool Admin_Pool
NAT static NatExempt NatExempt of the source (indoor, outdoor)
NAT (inside, outside) static source any any static destination RemoteNetwork4 RemoteNetwork4-route search
NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork1 RemoteNetwork1
NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork2 RemoteNetwork2
NAT static LocalNetwork LocalNetwork destination (indoor, outdoor) static source RemoteNetwork3 RemoteNetwork3
NAT (inside, outside) static source LocalNetwork LocalNetwork static destination RemoteNetwork4 RemoteNetwork4-route search
!
network of the PAT_to_Outside_ClassA object
NAT dynamic interface (indoor, outdoor)
network of the PAT_to_Outside_ClassB object
NAT dynamic interface (indoor, outdoor)
network of the PAT_to_Outside_ClassC object
NAT dynamic interface (indoor, outdoor)
Access-group outside_access_in in interface outside
inside_access_in access to the interface inside group
Route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
dynamic-access-policy-registration DfltAccessPolicy
Sysopt connection timewait
Service resetoutside
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set esp-ikev1 esp-md5-hmac bh-series
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto-map dynamic dynmap 10 set pfs
Crypto-map dynamic dynmap 10 set transform-set bh - set ikev1
life together - the association of security crypto dynamic-map dynmap 10 28800 seconds
Crypto-map dynamic dynmap 10 kilobytes of life together - the association of safety 4608000
Crypto-map dynamic dynmap 10 the value reverse-road
card crypto mymap 1 match address outside_1_cryptomap
card crypto mymap 1 set counterpart x.x.x.x
card crypto mymap 1 set transform-set ESP-AES-256-SHA ikev1
card crypto mymap 86400 seconds, 1 lifetime of security association set
map mymap 1 set security-association life crypto kilobytes 4608000
map mymap 100-isakmp ipsec crypto dynamic dynmap
mymap outside crypto map interface
crypto isakmp identity address
Crypto isakmp nat-traversal 30
Crypto ikev1 allow outside
IKEv1 crypto ipsec-over-tcp port 10000
IKEv1 crypto policy 5
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 1
life 86400
IKEv1 crypto policy 50
preshared authentication
the Encryption
md5 hash
Group 2
life 86400
IKEv1 crypto policy 60
preshared authentication
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 70
preshared authentication
aes-256 encryption
sha hash
Group 1
life 86400
IKEv1 crypto policy 90
preshared authentication
aes encryption
sha hash
Group 2
life 86400
Telnet timeout 5
Console timeout 0
management-access inside
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal BACKDOORVPN group policy
BACKDOORVPN group policy attributes
value of VPN-filter 11
Ikev1 VPN-tunnel-Protocol
Split-tunnel-policy tunnelall
BH.UK value by default-field
type tunnel-group BACKDOORVPN remote access
attributes global-tunnel-group BACKDOORVPN
address pool Admin_Pool
Group Policy - by default-BACKDOORVPN
IPSec-attributes tunnel-group BACKDOORVPN
IKEv1 pre-shared-key *.
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group ipsec-attributes x.x.x.x
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
Excellent.
Evaluate the useful ticket.
Thank you
Rizwan James
-
-VPN - PROBLEM IOS CLIENT!
-Start ciscomoderator note - the following message has been changed to remove potentially sensitive information. Please refrain from publishing confidential information about the site to reduce the risk to the security of your network. -end of the note ciscomoderator-
Hello
I have IOS Cisco 2650XM running IPSEC. I configured for authentication local customer vpn. I create ipsec tunnel more Don t ping from router to my client vpn (windows 2 k with vpn client 4.0). If anyone can help me, my express recognition.
Better compliance
Joao Medeiros
SH RUN
Current configuration: 8092 bytes
!
! Last configuration change at 09:09:04 GMT Tuesday, March 2, 1993 by lordz
!
version 12.2
horodateurs service debug uptime
Log service timestamps uptime
encryption password service
!
hostname router_vpn_fns
!
start the system flash c2600-ik9o3s - mz.122 - 11.T.bin
AAA new-model
!
!
AAA authentication login default local
AAA authorization network default local
AAA - the id of the joint session
!
clock timezone GMT - 3
voice-card 0
dspfarm
!
IP subnet zero
no ip source route
IP cef
!
!
no ip domain search
agm IP domain name - tele.com
name-server IP 192.168.10.1
!
no ip bootp Server
audit of IP notify Journal
Max-events of po verification IP 100
property intellectual ssh time 60
IP port ssh 2000 rotary 1
!
crypto ISAKMP policy 3
BA 3des
preshared authentication
Group 2
!
crypto ISAKMP policy 110
preshared authentication
lifetime 10000
!
crypto ISAKMP policy 130
preshared authentication
lifetime 10000
ISAKMP crypto key xxx address xxx.xxx.76.22
ISAKMP crypto key xxx address yyy.yyy.149.190
!
ISAKMP crypto client configuration group xlordz
key cisco123
DNS 192.168.10.1
area agm - tele.com
LDz-pool
ACL 108
!
86400 seconds, duration of life crypto ipsec security association
!
Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_gyn
Crypto ipsec transform-set esp-3des esp-sha-hmac agmipsec_poa
Crypto ipsec transform-set esp-3des esp-sha-hmac ldz-series
!
Crypto-map dynamic ldz_dynmap 10
ldz - Set transform-set
!
!
by default the card crypto client ldz_map of authentication list
default value of card crypto ldz_map isakmp authorization list
client configuration address card crypto ldz_map answer
ldz_map 10 card crypto ipsec-isakmp dynamic ldz_dynmap
!
agmmap_gyn crypto-address on Serial0/0
agmmap_gyn 1 ipsec-isakmp crypto map
the value of xxx.xxx.76.22 peer
Set transform-set agmipsec_gyn
PFS group2 Set
match address 120
QoS before filing
agmmap_gyn 2 ipsec-isakmp crypto map
the value of yyy.yyy.149.190 peer
Set transform-set agmipsec_poa
PFS group2 Set
match address 130
!
!
!
call active voice carrier's ability
!
voice class codec 1
codec preference 1 60 g729r8 bytes
g711alaw preferably 2 codec
!
!
Fax fax-mail interface type
MTA receive maximum-recipients 0
!
controller E1 0/1
case mode
No.-CRC4 framing
termination 75 Ohm
time intervals DS0-Group 1-15, 17 0 type digital r2 r2-compelled ani
Digital-r2 r2-compelled ani type 1 time intervals DS0-group 18-31
0 cases-custom
country Brazil
counting
signal response Group-b 1
case-personal 1
country Brazil
counting
signal response Group-b 1
!
!
!
!
interface FastEthernet0/0
192.168.15.1 IP address 255.255.255.0 secondary
192.168.7.1 IP address 255.255.255.0 secondary
IP 192.168.10.10 255.255.255.0
NBAR IP protocol discovery
load-interval 30
automatic speed
full-duplex
priority-group 1
No cdp enable
!
interface Serial0/0
bandwidth of 512
IP 200.193.103.154 255.255.255.252
NBAR IP protocol discovery
frame relay IETF encapsulation
load-interval 30
priority-group 1
dlci 507 frame relay interface
frame-relay lmi-type ansi
ldz_map card crypto
!
interface FastEthernet0/1
no ip address
NBAR IP protocol discovery
load-interval 30
Shutdown
automatic duplex
automatic speed
No cdp enable
!
LDz-pool IP local pool 192.168.10.3 192.168.10.5
IP classless
IP route 0.0.0.0 0.0.0.0 200.193.103.153
IP route 192.168.20.0 255.255.255.0 xxx.xxx.76.22
IP route 192.168.25.0 255.255.255.0 xxx.xxx.76.22
IP route 192.168.30.0 255.255.255.0 yyy.yyy.149.190
IP route 192.168.35.0 255.255.255.0 yyy.yyy.149.190
IP route vvv.vvv.17.152 255.255.255.248 192.168.10.1
IP http server
enable IP pim Bennett
!
!
dns-servers extended IP access list
extended IP access to key exchange list
!
Journal of access list 1 permit 192.168.10.44
Journal of access list 1 permit 192.168.10.2
Journal of access list 1 permit 192.168.10.1
access-list 1 permit vvv.vvv.17.154 Journal
IP access-list 108 allow any 192.168.10.0 0.0.0.255 connect
access-list 108 permit ip any any newspaper
IP access-list 120 allow any 192.168.20.0 0.0.0.255 connect
IP access-list 120 allow any 192.168.25.0 0.0.0.255 connect
access-list allow 120 ip host xxx.xxx.76.22 any log
access-list 120 deny ip any any newspaper
IP access-list 130 allow any 192.168.30.0 0.0.0.255 connect
IP access-list 130 allow any 192.168.35.0 0.0.0.255 connect
access-list allow 130 ip host yyy.yyy.149.190 any log
access-list 130 deny ip any any newspaper
access-list 140 deny udp 192.168.20.0 0.0.0.255 any netbios-ns range
NetBIOS-ss log
access-list 140 deny udp 192.168.25.0 0.0.0.255 any netbios-ns range
NetBIOS-ss log
access-list 140 deny udp 192.168.30.0 0.0.0.255 any netbios-ns range
NetBIOS-ss log
access-list 140 deny udp 192.168.35.0 0.0.0.255 any netbios-ns range
NetBIOS-ss log
access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any beach 137 139 connect
access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any beach 137 139 connect
access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any beach 137 139 connect
access-list 140 deny tcp 192.168.35.0 0.0.0.255 any beach 137 139 connect
access-list 140 refuse tcp 192.168.20.0 0.0.0.255 any eq connect 5900
access-list 140 refuse tcp 192.168.25.0 0.0.0.255 any eq connect 5900
access-list 140 refuse tcp 192.168.30.0 0.0.0.255 any eq connect 5900
access-list 140 deny tcp 192.168.35.0 0.0.0.255 any eq connect 5900
access-list 140 permit ip any any newspaper
Dialer-list 1 ip protocol allow
not run cdp
!
Server SNMP community xxxxxxxxxx
Enable SNMP-Server intercepts ATS
call the rsvp-sync
!
voice-port 0/1:0
!
voice-port 0/1:1
!
No mgcp timer receive-rtcp
!
profile MGCP default
!
Dial-peer cor custom
!
!
!
!
Line con 0
exec-timeout 2 0
Synchronous recording
length 50
line to 0
exec-timeout 0 10
No exec
line vty 0 4
access-class 1
transport input telnet ssh
!
Master of NTP
!
end
Hello
If you are not disturbing the production network much, just try to reload 2650.
This works sometimes!
Kind regards
Walked.
Maybe you are looking for
-
iPod touch 5 battery drains very quickly on iOS 9.1
Hi, I've been on iOS9.1 for a whilewhile now and today that my iPod was dead. I put in charge and when I looked it was almost full, so I have it for two seconds and back on. When the screen came and said that he was in charge he said he had less than
-
Can I downgrade Windows 8 64-bit for Windows 7 64-bit?
Can I downgrade Windows 8 64-bit for Windows 7 64-bit? And also my drivers continue to operate? I have only one installation of Windows 7 disk and want to make sure that I could use it incase if my computer goes down / gets corrupted / ect. Since I f
-
Stop windows update to install Nvidia driver version 52.16
Hello Recently, I upgraded the PC of my father to WinXP SP3. It is an old DELL Dimension of 11 years. After installation there is a nagging question that won't stop. Windows Update keeps trying to install the following: MICROSOFT VIDEO NVIDIA GEFORCE
-
Should I re install windows from disk? I certainly don't want dammage existing and images files. Help me!
-
How can I findon-screen keyboard
I can't found the on-screen keyboard