VWIC3-1MFT-T1/E1 on Cisco 2811
Hello community,
VWIC3- 1MFT-T1/E1 is compatible with router Cisco 2811 (revision 53.51)?
Currently, I get the following error:
WIC Slot 0:
Daughter unknown WAN card
Module WIC unsupported / disabled this slot machine
Hardware revision: 1.0
Number of albums part together: 800-34657-01
Part number: 73-13419-01
Review on board: B0
Deviation number: 0
Version of fab: 05
Serial number of PCB: FOC1624628F
Version identifier: V01
Product number (FRU): VWIC3-1MFT-T1/E1
CLEI Code: COUIA7PCAA
History of the RMA tests: 00
RMA number: 0-0-0-0
RMA history: 00
EEPROM 4 format version
Table of contents EEPROM (hex):
0 X 00:04 FF 40 06 00 01 41 46 03 20 00 87 61 01 C0 ED
0 X 10: 82 49 34 6 B 01 42 42 30 88 00 00 00 00 02 05 C1
0 X 20: 8B 4F 46 43 31 36 32 34 36 32 38 46 89 56 30 31
0X20 30: 2D CB 90 56 57 49 43 33 31 4 46 54 54 31 2D
0X40: 2F 45 31 C6 8 A 43 55 49 41 37 50 43 41 41 03 4F
0 X 50: 00 81 00 00 00 00 04 00 03 40 C1 CB FF FF FF D9
0 X 60 : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
0 X 70 : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF #
Thank you very much in advance for your quick responses.
George
Hi George,.
Unfortunately not supported on any series 2800
The Cisco® third generation-1, 2 or 4-channel T1/E1 Multiflex Trunk voice/WAN (MFT VWIC3s) support voice and data applications Interface on the Cisco 1921, 1941 and 1941W (data only) and the Cisco 2901 2911 2921, 2951, 3925, 3945, routers to Services integrated 3925th and 3945TH.
Table 1. Supported Cisco MFT VWIC3 platforms and Cisco IOS Software Release requirements minimum
VWIC3-1MFT-T1/E1 |
VWIC3-2MFT-T1/E1 |
VWIC3-1MFT-G703 |
VWIC3-2MFT-G703 |
VWIC3-4MFT-T1/E1 |
|
Slot machines Cisco 1900 chassis EHWIC |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
N/A *. |
Slot machines Cisco 2900 chassis EHWIC |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
15.1 (3) T *. |
Slot machines Cisco 3900 chassis EHWIC |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T |
15.1 (3) T |
* VWIC3-4MFT-T1/E1is supported by Cisco 2911 2921 2951 and, routers Cisco 3900 Series
http://www.Cisco.com/en/us/prod/collateral/routers/ps5855/data_sheet_c36-609138.html
See you soon!
Rob
"Why don't the best things always go away."
-The band
Tags: Cisco Support
Similar Questions
-
Circuits group with cards VWIC2-1MFT-T1/E1 and VWIC3-1MFT-T1/E1
Hi all
I have a router 2821 with 2 cards to VWIC2-1MFT-T1/E1 x connections ppp in a bundle, we replace it by a 2951 but also add a new ppp link, we would like nevertheless to re-use the existing VWIC2 cards and just get a new card VWIC3-1MFT-T1/E1 to add this additional link from the same batch, my question here: would it be possible to have a job with vwic2 and vwic3 maps multiple links?
Thanks for your help.
Hello
I just checked one of my routers. I have the Panel multilink ppp on two different modules. WIC-1dsu-t1-v2 and VWIC2-1MFT-T1/E1. So it should work in your case too.
multiple links are working properly.
It will be useful,
Masoud
-
Problem Cisco 2811 with L2TP IPsec VPN
Hello. Sorry for my English. Help me please. I have problem with L2TP over IPsec VPN when I connect with Android phones. Even if I connect with laptop computers. I have Cisco 2811 - Cisco IOS software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4 (2) T2, (fc3) SOFTWARE VERSION. I configured on L2TP over IPsec VPN with Radius Authentication
My config:
!
AAA new-model
!
!
AAA authentication login default local
Ray of AAA for authentication ppp default local group
AAA authorization network default authenticated if
start-stop radius group AAA accounting network L2TP_RADIUS!
dhcp L2tp IP pool
network 192.168.100.0 255.255.255.0
default router 192.168.100.1
domain.local domain name
192.168.101.12 DNS server
18c0.a865.c0a8.6401 hexagonal option 121
18c0.a865.c0a8.6401 hexagonal option 249VPDN enable
!
VPDN-group sec_groupe
! Default L2TP VPDN group
accept-dialin
L2tp Protocol
virtual-model 1
no authentication of l2tp tunnelsession of crypto consignment
!
crypto ISAKMP policy 5
BA 3des
preshared authentication
Group 2
!
crypto ISAKMP policy 55
BA 3des
md5 hash
preshared authentication
Group 2ISAKMP crypto key... address 0.0.0.0 0.0.0.0
invalid-spi-recovery crypto ISAKMP
ISAKMP crypto keepalive 10 periodicals
!
life crypto ipsec security association seconds 28000
!
Crypto ipsec transform-set esp-3des esp-sha-hmac L2TP
transport mode
Crypto ipsec transform-set esp-3des esp-md5-hmac 3DESMD5
need transport mode
!!
!
crypto dynamic-map DYN - map 10
Set nat demux
game of transformation-L2TP
!
!
Crypto map 10 L2TP-VPN ipsec-isakmp dynamic DYN-mapinterface Loopback1
Description * L2TP GateWay *.
IP 192.168.100.1 address 255.255.255.255interface FastEthernet0/0
Description * Internet *.
address IP 95.6... 255.255.255.248
IP access-group allow-in-of-wan in
IP access-group allows-off-of-wan on
no ip redirection
no ip unreachable
no ip proxy-arp
NAT outside IP
IP virtual-reassembly
IP route cache policy
automatic duplex
automatic speed
L2TP-VPN crypto card
!interface virtual-Template1
Description * PPTP *.
IP unnumbered Loopback1
IP access-group L2TP_VPN_IN in
AutoDetect encapsulation ppp
default IP address dhcp-pool L2tp peer
No keepalive
PPP mtu Adaptive
PPP encryption mppe auto
PPP authentication ms-chap-v2 callin
PPP accounting L2TP_RADIUSL2TP_VPN_IN extended IP access list
permit any any icmp echo
IP 192.168.100.0 allow 0.0.0.255 192.168.101.0 0.0.0.255
IP 192.168.100.0 allow 0.0.0.255 192.168.3.0 0.0.0.255
allow udp any any eq bootps
allow udp any any eq bootpc
deny ip any any journal entryRADIUS-server host 192.168.101.15 auth-port 1812 acct-port 1813
RADIUS server retry method reorganize
RADIUS server retransmit 2
Server RADIUS 7 key...Debugging shows me
234195: * 3 Feb 18:53:38: ISAKMP (0:0): received 93.73.161.229 packet dport 500 sport 500 SA NEW Global (N)
234196: * 3 Feb 18:53:38: ISAKMP: created a struct peer 93.73.161.229, peer port 500
234197: * 3 Feb 18:53:38: ISAKMP: new position created post = 0x47D305BC peer_handle = 0x80007C5F
234198: * 3 Feb 18:53:38: ISAKMP: lock struct 0x47D305BC, refcount 1 to peer crypto_isakmp_process_block
234199: * 3 Feb 18:53:38: ISAKMP: 500 local port, remote port 500
234200: * 3 Feb 18:53:38: insert his with his 480CFF64 = success
234201: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
234202: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_READY = IKE_R_MM1
234203: * 3 Feb 18:53:38: ISAKMP: (0): treatment ITS payload. Message ID = 0
234204: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234205: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
234206: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234207: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 164
234208: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234209: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
234210: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is NAT - T v2
234211: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234212: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 221
234213: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234214: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
234215: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234216: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is DPD
234217: * 3 Feb 18:53:38: ISAKMP: (0): looking for a key corresponding to 93.73.161.229 in default
234218: * 3 Feb 18:53:38: ISAKMP: (0): success
234219: * 3 Feb 18:53:38: ISAKMP: (0): pair found pre-shared key matching 93.73.161.229
234220: * 3 Feb 18:53:38: ISAKMP: (0): pre-shared key local found
234221: * 3 Feb 18:53:38: ISAKMP: analysis of the profiles for xauth...
234222: * 3 Feb 18:53:38: ISAKMP: (0): audit ISAKMP transform 1 against policy priority 5
234223: * 3 Feb 18:53:38: ISAKMP: type of life in seconds
234224: * 3 Feb 18:53:38: ISAKMP: life (basic) of 28800
234225: * 3 Feb 18:53:38: ISAKMP: 3DES-CBC encryption
234226: * 3 Feb 18:53:38: ISAKMP: pre-shared key auth
234227: * 3 Feb 18:53:38: ISAKMP: SHA hash
234228: * 3 Feb 18:53:38: ISAKMP: group by default 2
234229: * 3 Feb 18:53:38: ISAKMP: (0): atts are acceptable. Next payload is 3
234230: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234231: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
234232: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234233: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 164
234234: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234235: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
234236: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is NAT - T v2
234237: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234238: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 221
234239: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234240: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
234241: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
234242: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is DPD
234243: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
234244: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM1234245: * 3 Feb 18:53:38: ISAKMP: (0): built the seller-02 ID NAT - t
234246: * 3 Feb 18:53:38: ISAKMP: (0): lot of 93.73.161.229 sending my_port 500 peer_port 500 (R) MM_SA_SETUP
234247: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
234248: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM2234249: * 3 Feb 18:53:38: ISAKMP (0:0): received 93.73.161.229 packet 500 Global 500 (R) sport dport MM_SA_SETUP
234250: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
234251: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM2 = IKE_R_MM3234252: * 3 Feb 18:53:38: ISAKMP: (0): processing KE payload. Message ID = 0
234253: * 3 Feb 18:53:38: crypto_engine: create DH shared secret
234254: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_DH_SHARE_SECRET (hw) (ipsec)
234255: * 3 Feb 18:53:38: ISAKMP: (0): processing NONCE payload. Message ID = 0
234256: * 3 Feb 18:53:38: ISAKMP: (0): looking for a key corresponding to 93.73.161.229 in default
234257: * 3 Feb 18:53:38: ISAKMP: (0): success
234258: * 3 Feb 18:53:38: ISAKMP: (0): pair found pre-shared key matching 93.73.161.229
234259: * 3 Feb 18:53:38: crypto_engine: create IKE SA
234260: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_SA_CREATE (hw) (ipsec)
234261: * 3 Feb 18:53:38: ISAKMP: receives the payload type 20
234262: * 3 Feb 18:53:38: ISAKMP: receives the payload type 20
234263: * 3 Feb 18:53:38: ISAKMP (0:5912): NAT found, the node outside NAT
234264: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
234265: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM3 = IKE_R_MM3234266: * 3 Feb 18:53:38: ISAKMP: (5912): lot of 93.73.161.229 sending my_port 500 peer_port 500 (R) MM_KEY_EXCH
234267: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
234268: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM3 = IKE_R_MM4234269: * 3 Feb 18:53:38: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) MM_KEY_EXCH sport
234270: * 3 Feb 18:53:38: crypto_engine: package to decipher IKE
234271: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
234272: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
234273: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM4 = IKE_R_MM5234274: * 3 Feb 18:53:38: ISAKMP: (5912): payload ID for treatment. Message ID = 0
234275: * 3 Feb 18:53:38: ISAKMP (0:5912): payload ID
next payload: 8
type: 1
address: 192.168.1.218
Protocol: 17
Port: 500
Length: 12
234276: * 3 Feb 18:53:38: ISAKMP: (5912): peer games * no * profiles
234277: * 3 Feb 18:53:38: ISAKMP: (5912): HASH payload processing. Message ID = 0
234278: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
234279: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
234280: * 3 Feb 18:53:38: ISAKMP: (5912): SA authentication status:
authenticated
234281: * 3 Feb 18:53:38: ISAKMP: (5912): SA has been authenticated with 93.73.161.229
234282: * 3 Feb 18:53:38: ISAKMP: (5912): port detected floating port = 4500
234283: * 3 Feb 18:53:38: ISAKMP: attempts to insert a peer and inserted 95.6.../93.73.161.229/4500/ 47D305BC successfully.
234284: * 3 Feb 18:53:38: ISAKMP: (5912): IKE_DPD is enabled, the initialization of timers
234285: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
234286: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM5 = IKE_R_MM5234287: * 3 Feb 18:53:38: ISAKMP: (5912): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
234288: * 3 Feb 18:53:38: ISAKMP (0:5912): payload ID
next payload: 8
type: 1
address: 95.6...
Protocol: 17
Port: 0
Length: 12
234289: * 3 Feb 18:53:38: ISAKMP: (5912): the total payload length: 12
234290: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
234291: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
234292: * 3 Feb 18:53:38: crypto_engine: package to encrypt IKE
routerindc #.
234293: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_ENCRYPT (hw) (ipsec)
234294: * 3 Feb 18:53:38: ISAKMP: (5912): lot of 93.73.161.229 sending peer_port my_port 4500 4500 (R) MM_KEY_EXCH
234295: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
234296: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM5 = IKE_P1_COMPLETE234297: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
234298: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE234299: * 3 Feb 18:53:38: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
234300: * 3 Feb 18:53:38: ISAKMP: node set-893966165 to QM_IDLE
234301: * 3 Feb 18:53:38: crypto_engine: package to decipher IKE
234302: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
234303: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
234304: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
234305: * 3 Feb 18:53:38: ISAKMP: (5912): HASH payload processing. Message ID =-893966165
234306: * 3 Feb 18:53:38: ISAKMP: (5912): treatment protocol NOTIFIER INITIAL_CONTACT 1
SPI 0, message ID =-893966165, his 480CFF64 =
234307: * 3 Feb 18:53:38: ISAKMP: (5912): SA authentication status:
authenticated
234308: * 3 Feb 18:53:38: ISAKMP: (5912): process of first contact.
dropping existing phase 1 and 2 with 95.6 local... 93.73.161.229 remote remote port 4500
234309: * 3 Feb 18:53:38: ISAKMP: (5912): node-893966165 error suppression FALSE reason 'informational (en) State 1.
234310: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
234311: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE234312: * 3 Feb 18:53:38: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
234313: * 3 Feb 18:53:39: % s-6-IPACCESSLOGRL: registration of limited or missed rates 150 packages of access list
234314: * 3 Feb 18:53:39: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
234315: * 3 Feb 18:53:39: ISAKMP: node set-1224389198 to QM_IDLE
234316: * 3 Feb 18:53:39: crypto_engine: package to decipher IKE
234317: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
234318: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
234319: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
234320: * 3 Feb 18:53:39: ISAKMP: (5912): HASH payload processing. Message ID =-1224389198
234321: * 3 Feb 18:53:39: ISAKMP: (5912): treatment ITS payload. Message ID =-1224389198
234322: * 3 Feb 18:53:39: ISAKMP: (5912): proposal of IPSec checking 1
234323: * 3 Feb 18:53:39: ISAKMP: turn 1, ESP_3DES
234324: * 3 Feb 18:53:39: ISAKMP: attributes of transformation:
234325: * 3 Feb 18:53:39: ISAKMP: type of life in seconds
234326: * 3 Feb 18:53:39: ISAKMP: life of HIS (basic) of 28800
234327: * 3 Feb 18:53:39: ISAKMP: program is 61444 (Transport-UDP)
234328: * 3 Feb 18:53:39: ISAKMP: authenticator is HMAC-SHA
234329: * 3 Feb 18:53:39: CryptoEngine0: validate the proposal
234330: * 3 Feb 18:53:39: ISAKMP: (5912): atts are acceptable.
234331: * 3 Feb 18:53:39: IPSEC (validate_proposal_request): part #1 of the proposal
(Eng. msg key.) Local INCOMING = 95.6..., distance = 93.73.161.229,.
local_proxy = 95.6.../255.255.255.255/17/1701 (type = 1),
remote_proxy = 93.73.161.229/255.255.255.255/17/0 (type = 1),
Protocol = ESP, transform = esp-3des esp-sha-hmac (UDP Transport),
lifedur = 0 and 0kb in
SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0
234332: * 3 Feb 18:53:39: map_db_find_best found no corresponding card
234333: * 3 Feb 18:53:39: ISAKMP: (5912): processing NONCE payload. Message ID =-1224389198
234334: * 3 Feb 18:53:39: ISAKMP: (5912): payload ID for treatment. Message ID =-1224389198
234335: * 3 Feb 18:53:39: ISAKMP: (5912): payload ID for treatment. Message ID =-1224389198
234336: * 3 Feb 18:53:39: ISAKMP: (5912): ask 1 spis of ipsec
234337: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_PEER, IKE_QM_EXCH
234338: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_READY = IKE_QM_SPI_STARVE
234339: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
234340: * 3 Feb 18:53:39: IPSEC (spi_response): spi getting 834762579 for SA
of 95.6... to 93.73.161.229 for prot 3
234341: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
234342: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
234343: * 3 Feb 18:53:39: crypto_engine: create Security Association IPSec (by QM)
routerindc #.
234344: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IPSEC_KEY_CREATE (hw) (ipsec)
234345: * 3 Feb 18:53:39: crypto_engine: create Security Association IPSec (by QM)
234346: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IPSEC_KEY_CREATE (hw) (ipsec)
234347: * 3 Feb 18:53:39: ISAKMP: (5912): establishing IPSec security associations
234348: * 3 Feb 18:53:39: from 93.73.161.229 to 95.6 SA... (f / i) 0 / 0
(93.73.161.229 to 95.6 proxy...)
234349: * 3 Feb 18:53:39: spi 0x31C17753 and id_conn a 0
234350: * 3 Feb 18:53:39: life of 28800 seconds
234351: * 3 Feb 18:53:39: ITS 95.6 outgoing... to 93.73.161.229 (f / i) 0/0
(proxy 95.6... to 93.73.161.229)
234352: * 3 Feb 18:53:39: spi 0x495A4BD and id_conn a 0
234353: * 3 Feb 18:53:39: life of 28800 seconds
234354: * 3 Feb 18:53:39: crypto_engine: package to encrypt IKE
234355: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_ENCRYPT (hw) (ipsec)
234356: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
234357: * 3 Feb 18:53:39: map_db_find_best found no corresponding card
234358: * 3 Feb 18:53:39: IPSec: rate allocated for brother 80000273 Flow_switching
234359: * 3 Feb 18:53:39: IPSEC (policy_db_add_ident): 95.6..., src dest 93.73.161.229, dest_port 4500234360: * 3 Feb 18:53:39: IPSEC (create_sa): its created.
(his) sa_dest = 95.6..., sa_proto = 50.
sa_spi = 0x31C17753 (834762579).
sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 1165
234361: * 3 Feb 18:53:39: IPSEC (create_sa): its created.
(his) sa_dest = 93.73.161.229, sa_proto = 50,.
sa_spi = 0x495A4BD (76915901).
sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 1166
234362: * 3 Feb 18:53:39: ISAKMP: (5912): lot of 93.73.161.229 sending peer_port my_port 4500 4500 (R) QM_IDLE
234363: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
234364: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_SPI_STARVE = IKE_QM_R_QM2
234365: * 3 Feb 18:53:39: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
234366: * 3 Feb 18:53:39: crypto_engine: package to decipher IKE
234367: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
234368: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
234369: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
routerindc #.
234370: * 3 Feb 18:53:39: ISAKMP: (5912): node-1224389198 error suppression FALSE reason 'QM (wait).
234371: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_PEER, IKE_QM_EXCH
234372: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_R_QM2 = IKE_QM_PHASE2_COMPLETE
234373: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
234374: * 3 Feb 18:53:39: IPSEC (key_engine_enable_outbound): rec would notify of ISAKMP
234375: * 3 Feb 18:53:39: IPSEC (key_engine_enable_outbound): select SA with spinnaker 76915901/50
234376: * 3 Feb 18:53:40: IPSEC (epa_des_crypt): decrypted packet has no control of her identity
routerindc #.
234377: * 3 Feb 18:53:42: IPSEC (epa_des_crypt): decrypted packet has no control of her identity
routerindc #.
234378: * 3 Feb 18:53:44: IPSEC (epa_des_crypt): decrypted packet has no control of her identityAlso when I connect with the phone, I see HIS Active and IPsec tunnel is mounted, but the wire of time tunnel is down and phone connects.
I hope that you will help me. Thank you.
Hi dvecherkin1,
Who IOS you're running, you could hit the next default.
https://Tools.Cisco.com/bugsearch/bug/CSCsg34166/?reffering_site=dumpcr
It may be useful
-Randy-
Evaluate the ticket to help others find the answer quickly.
-
What clients VPN Cisco 2811 supports?
Is the solution of VPN Cisco 2811 locked customers cisco or that market with other brands too?
Best regards Tommy Svensson
Hello
With the correct IOS feature set, it will support IPsec VPN clients. This includes not only the Cisco VPN client but almost any standard IPsec client.
In addition, if on the 2811 can accept any browser SSL VPN connections, or even use the AnyConnect SSL client.
It will be useful.
Federico.
-
Access gui Cisco 2811 v7.0.4 w/AIM-CUE
Hello
We are running an older router which works fine for our needs, as indicated in the subject. I am trying to access the graphical interface for the AIM - CUE and am unable to. I can access the ccme.html to the router, but that is not integrated with the function of automatic monitoring, nor there of our current configuration info. I added a route to the QUEUE of the command prompt and I am able to ping and the ip address of the QUEUE to access from a browser, but it points to builtin of the 2811 CCME or CCP. Any help anyone could offer would be greatly appreciated. Thanks in advance for your help. Please find the config for the router and the GUIDE below.
Router:
Router#sh running-config
Building configuration...
Current configuration : 12555 bytes
!
! Last configuration change at 20:19:49 CDT Sat Oct 26 2013 by GlennP
! NVRAM config last updated at 20:06:24 CDT Sat Oct 26 2013 by cmeadmin
!
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
logging discriminator ENV severity drops 4 facility drops ENVMON mnemonics drops
FAN_LOW_RPM
logging buffered discriminator ENV 4096
logging console discriminator ENV
logging monitor discriminator ENV
enable secret 5 $1$nCKH$KBDP9dCX10xvqP98Ucm5u/
!
no aaa new-model
clock timezone CST -6
clock summer-time CDT recurring
!
dot11 syslog
ip source-route
!
!
ip cef
ip dhcp excluded-address 172.22.1.154
ip dhcp excluded-address 172.22.1.200
!
ip dhcp pool Voice
network 172.22.1.0 255.255.255.0
default-router 172.22.1.154
option 150 ip 172.22.1.154
!
!
ip name-server 4.2.2.2
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
!
!
trunk group FXO
!
!
!
!
voice hunt-group 1 parallel
list 101,102,103,104,105,106,107
timeout 60
pilot 200
!
!
!
!
!
voice-card 0
!
!
crypto pki trustpoint TP-self-signed-4121280238
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4121280238
revocation-check none
rsakeypair TP-self-signed-4121280238
!
!
crypto pki certificate chain TP-self-signed-4121280238
certificate self-signed 02
3082023E 308201A7 A0030201 02020102 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34313231 32383032 3338301E 170D3133 31303237 30313035
34375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31323132
38303233 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100C0A7 8EB7F49F C57776E1 9CD28DF9 F3EDF876 BB02405F 1DF7B345 319C419A
23C7D891 28F496B4 675D290C 60FAE2F4 6730D680 655DD0B5 61E64C72 2B73599A
A5567091 499FD933 646168FD 4E730B8C C1079AC5 7327B695 10ED4D76 2D931584
DDA2B93B 6681E10D C82F2ABB 9DB055C8 D157EACE AB19335C B172C3E3 D8EF8452
34E90203 010001A3 66306430 0F060355 1D130101 FF040530 030101FF 30110603
551D1104 0A300882 06526F75 74657230 1F060355 1D230418 30168014 ADD5749E
6A87B4CF 22F924BE 400851F6 B9F8412A 301D0603 551D0E04 160414AD D5749E6A
87B4CF22 F924BE40 0851F6B9 F8412A30 0D06092A 864886F7 0D010104 05000381
81004F81 D08AC0B6 41AAEA8B 35CAC6AF BC07DBF9 9CA42AF1 782BBCE9 1CBB68B6
0AD5A177 664FDFA0 079A5C76 29FB06B2 5760445F 8468F04B B6A37A39 32F8F079
DB6302FE 1792547D 199922B0 907C0CCA 1FD3C322 F7B70E7C 594E96F1 DE283C2A
B7313614 A028D7FF 96E9F047 79162805 4C1CA86F 0232BF0E 0A0659F5 24B7EEDA D5AE
quit
!
!
license udi pid CISCO2811 sn FTX1030A49Q
username cmeadmin privilege 15 password 7 08721D1D5C4854424A
username GlennP privilege 15 password 7 115A485642435A595C
!
!
no ip ftp passive
ip ftp source-interface FastEthernet0/0
ip ftp username cmeadmin
ip ftp password 7 091F1F5A4C54464753
!
!
!
!
!
interface FastEthernet0/0
ip address 10.1.1.146 255.255.255.0
duplex auto
speed auto
!
interface Service-Engine0/0
ip unnumbered FastEthernet0/1.1
service-module ip address 172.22.1.155 255.255.255.0
service-module ip default-gateway 172.22.1.154
!
interface FastEthernet0/1
ip address dhcp
duplex auto
speed auto
!
interface FastEthernet0/1.1
encapsulation dot1Q 1 native
ip address 172.22.1.154 255.255.255.0
!
ip forward-protocol nd
!
ip http server
ip http authentication local
ip http secure-server
ip http path flash:/gui
!
ip route 0.0.0.0 0.0.0.0 10.1.1.30
ip route 172.22.1.155 255.255.255.255 Service-Engine0/0
!
!
!
tftp-server flash:phone/7940-7960/P00308000500.bin alias P00308000500.bin
tftp-server flash:Desktops/320x212x12/CampusNight.png
tftp-server flash:Desktops/320x212x12/CiscoFountain.png
tftp-server flash:Desktops/320x212x12/MorroRock.png
tftp-server flash:Desktops/320x212x12/NantucketFlowers.png
tftp-server flash:Desktops/320x212x12/TN-CampusNight.png
tftp-server flash:Desktops/320x212x12/TN-CiscoFountain.png
tftp-server flash:Desktops/320x212x12/TN-Fountain.png
tftp-server flash:Desktops/320x212x12/TN-MorroRock.png
tftp-server flash:Desktops/320x212x12/TN-NantucketFlowers.png
tftp-server flash:Desktops/320x212x12/Fountain.png
tftp-server flash:Desktops/320x212x12/CiscoLogo.png
tftp-server flash:Desktops/320x212x12/TN-CiscoLogo.png
tftp-server flash:Desktops/320x212x12/List.xml
tftp-server flash:gui/admin_user.html alias admin_user.html
tftp-server flash:gui/admin_user.js alias admin_user.js
tftp-server flash:gui/CiscoLogo.gif alias CiscoLogo.gif
tftp-server flash:gui/Delete.gif alias Delete.gif
tftp-server flash:gui/dom.js alias dom.js
tftp-server flash:gui/downarrow.gif alias downarrow.gif
tftp-server flash:gui/ephone_admin.html alias ephone_admin.html
tftp-server flash:gui/logohome.gif alias logohome.gif
tftp-server flash:gui/normal_user.html alias normal_user.html
tftp-server flash:gui/normal_user.js alias normal_user.js
tftp-server flash:gui/Plus.gif alias Plus.gif
tftp-server flash:gui/sxiconad.gif alias sxiconad.gif
tftp-server flash:gui/Tab.gif alias Tab.gif
tftp-server flash:gui/telephony_service.html alias telephony_service.html
tftp-server flash:gui/uparrow.gif alias uparrow.gif
tftp-server flash:gui/xml-test.html alias xml-test.html
tftp-server flash:gui/xml.template alias xml.template
tftp-server flash:ringtones/Analog1.raw alias Analog1.raw
tftp-server flash:ringtones/Analog2.raw alias Analog2.raw
tftp-server flash:ringtones/AreYouThere.raw alias AreYouThere.raw
tftp-server flash:ringtones/AreYouThereF.raw alias AreYouThereF.raw
tftp-server flash:ringtones/Bass.raw alias Bass.raw
tftp-server flash:ringtones/CallBack.raw alias CallBack.raw
tftp-server flash:ringtones/Chime.raw alias Chime.raw
tftp-server flash:ringtones/Classic1.raw alias Classic1.raw
tftp-server flash:ringtones/Classic2.raw alias Classic2.raw
tftp-server flash:ringtones/ClockShop.raw alias ClockShop.raw
tftp-server flash:ringtones/DistinctiveRingList.xml alias DistinctiveRingList.xm
l
tftp-server flash:ringtones/Drums1.raw alias Drums1.raw
tftp-server flash:ringtones/Drums2.raw alias Drums2.raw
tftp-server flash:ringtones/FilmScore.raw alias FilmScore.raw
tftp-server flash:ringtones/HarpSynth.raw alias HarpSynth.raw
tftp-server flash:ringtones/Jamaica.raw alias Jamaica.raw
tftp-server flash:ringtones/KotoEffect.raw alias KotoEffect.raw
tftp-server flash:ringtones/MusicBox.raw alias MusicBox.raw
tftp-server flash:ringtones/Piano1.raw alias Piano1.raw
tftp-server flash:ringtones/Piano2.raw alias Piano2.raw
tftp-server flash:ringtones/Pop.raw alias Pop.raw
tftp-server flash:ringtones/Pulse1.raw alias Pulse1.raw
tftp-server flash:ringtones/Ring1.raw alias Ring1.raw
tftp-server flash:ringtones/Ring2.raw alias Ring2.raw
tftp-server flash:ringtones/Ring3.raw alias Ring3.raw
tftp-server flash:ringtones/Ring4.raw alias Ring4.raw
tftp-server flash:ringtones/Ring5.raw alias Ring5.raw
tftp-server flash:ringtones/Ring6.raw alias Ring6.raw
tftp-server flash:ringtones/Ring7.raw alias Ring7.raw
tftp-server flash:ringtones/RingList.xml alias RingList.xml
tftp-server flash:ringtones/Sax1.raw alias Sax1.raw
tftp-server flash:ringtones/Sax2.raw alias Sax2.raw
tftp-server flash:ringtones/Vibe.raw alias Vibe.raw
tftp-server flash:phone/7940-7960/P00308000500.loads alias P00308000500.loads
tftp-server flash:phone/7940-7960/P00308000500.sb2 alias P00308000500.sb2
tftp-server flash:phone/7940-7960/P00308000500.sbn alias P00308000500.sbn
tftp-server flash:phone/7941-7961/apps41.8-4-1-23.sbn alias apps41.8-4-1-23.sbn
tftp-server flash:phone/7941-7961/cnu41.8-4-1-23.sbn alias cnu41.8-4-1-23.sbn
tftp-server flash:phone/7941-7961/cvm41sccp.8-4-1-23.sbn alias cvm41sccp.8-4-1-2
3.sbn
tftp-server flash:phone/7941-7961/dsp41.8-4-1-23.sbn alias dsp41.8-4-1-23.sbn
tftp-server flash:phone/7941-7961/jar41sccp.8-4-1-23.sbn alias jar41sccp.8-4-1-2
3.sbn
tftp-server flash:phone/7941-7961/SCCP41.8-4-2S.loads alias SCCP41.8-4-2S.loads
tftp-server flash:phone/7941-7961/term41.default.loads alias term41.default.load
s
tftp-server flash:phone/7941-7961/term61.default.loads alias term61.default.load
s
tftp-server flash:CP7905080002SCCP060817A.zup
tftp-server flash:CP7912080003SCCP070409A.sbin
tftp-server flash:ATA030204SCCP090202A.zup
tftp-server exit
tftp-server music-on-hold.au
tftp-server enable
!
control-plane
!
!
voice-port 0/3/0
trunk-group FXO
no battery-reversal
no comfort-noise
connection plar 300
description 715833XXXX
caller-id enable
!
voice-port 0/3/1
trunk-group FXO
no battery-reversal
no comfort-noise
connection plar 300
description 715833YYYY
caller-id enable
!
voice-port 0/3/2
trunk-group FXO
no battery-reversal
no comfort-noise
connection plar 300
description 715833AAAA
caller-id enable
!
voice-port 0/3/3
!
!
!
!
dial-peer voice 100 pots
trunkgroup FXO
destination-pattern 9.T
!
dial-peer voice 800 voip
description VM
destination-pattern 800
session protocol sipv2
session target ipv4:172.22.1.155
dtmf-relay rtp-nte
codec g711ulaw
no vad
!
dial-peer voice 300 voip
description Sterling AA
destination-pattern 300
session protocol sipv2
session target ipv4:172.22.1.155
dtmf-relay rtp-nte
codec g711ulaw
no vad
!
!
sip-ua
mwi-server ipv4:172.22.1.155 expires 86400 port 5060 transport u
!
!
telephony-service
no auto-reg-ephone
max-ephones 40
max-dn 100
ip source-address 172.22.1.154 port 2000
timeouts interdigit 3
system message Sterling Optical #258
load 7960-7940 P00308000500
dialplan-pattern 1 . extension-length 3
voicemail 800
max-conferences 8 gain -6
call-park system application
moh flash:/music-on-hold.au
multicast moh 239.10.16.1 port 2000
web admin system name admin password cisco
dn-webedit
time-webedit
transfer-system full-consult
secondary-dialtone 9
fac custom dpark-retrieval *00
create cnf-files version-stamp 7960 Apr 15 2013 22:15:20
!
!
ephone-dn 1
!
!
ephone-dn 11 dual-line
number 101
name Front 1
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 12 dual-line
number 102
name Front 2
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 13
number 103
name Front 3
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 14
number 104
name Exam Room
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 15
number 105
name Screening Area
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 16
number 106
name Lab
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 17
number 107
name Insurance Office
call-forward busy 800
call-forward noan 800 timeout 10
mwi sip
!
!
ephone-dn 18
number 108
name 7940
!
!
ephone-dn 19
number 109
name Spare1
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 20
number 110
name spare2
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 21
number 111
name Spare1
call-forward busy 800
call-forward noan 800 timeout 70
!
!
ephone-dn 30
number 201
label General VM
description General VM
call-forward all 800
hold-alert 30 originator
!
!
ephone-dn 77
number 777
park-slot timeout 300 limit 2 recall
description Call Park Slot
!
!
ephone-dn 88
number 888
park-slot timeout 300 limit 2 recall
description Call Park Slot
!
!
ephone-dn 99
number 000
mwi off
!
!
ephone-dn 100
number 001
mwi on
!
!
ephone 1
mac-address 0015.62EA.5C58
username "frontdesk1" password cisco
type 7960
button 1:11
!
!
!
ephone 2
mac-address 0015.62B5.DBF6
username "frontdesk2" password cjp44206
type 7960
button 1:12
!
!
!
ephone 3
mac-address 0007.855C.853F
type 7940
button 1:13
!
!
!
ephone 4
mac-address 0017.E001.0940
type 7940
button 1:14
!
!
!
ephone 5
mac-address 0007.8553.2B3C
type 7940
button 1:15
!
!
!
ephone 6
mac-address 0015.C614.A1D1
type 7940
button 1:16
!
!
!
ephone 7
mac-address 0015.F9EC.1EED
username "insurance" password 1234
type 7940
button 1:17
!
!
!
ephone 9
!
!
!
ephone 10
mac-address 0007.8553.2E74
type 7940
button 1:20
!
!
!
ephone 11
mac-address 0019.E855.7616
type 7940
button 1:21
!
!
!
line con 0
line aux 0
line 194
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
line vty 0 4
login local
transport input telnet ssh
transport output telnet ssh
!
scheduler allocate 20000 1000
ntp master 6
ntp peer 69.164.217.193
ntp peer 204.9.136.253
end
CUE:
Router#service-module service-Engine 0/0 sess
Trying 172.22.1.154, 2194 ... Open
AIM-CUE#
AIM-CUE# sh running-config
Generating configuration:
clock timezone America/Chicago
hostname AIM-CUE
line console
exit
system language preferred "en_US"
ip name-server 4.2.2.2 4.2.2.3
ntp server 172.22.1.154 prefer
software download server url "ftp://127.0.0.1/ftp" credentials hidden "6u/dKTN/h
sEuSAEfw40XlF2eFHnZfyUTSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfG
WTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmP"
site name local
site-hostname 172.22.1.154
web credentials hidden "c9yem6kD1vJqrOHVxftjAknfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0n
fGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmP"
end site
privilege ViewHistoricalReports create
privilege manage-users create
privilege manage-passwords create
privilege ViewRealTimeReports create
privilege local-broadcast create
privilege broadcast create
privilege vm-imap create
privilege ManagePublicList create
privilege ViewPrivateList create
privilege ManagePrompts create
groupname staff create
groupname Broadcasters create
username GlennP create
username insurance create
username admin create
username cisco create
privilege ViewHistoricalReports description "Privilege to view historical report
s"
privilege manage-users description "Privilege to create, modify, and delete user
s and groups"
privilege manage-passwords description "Privilege to reset user passwords"
privilege ViewRealTimeReports description "Privilege to view realtime reports"
privilege local-broadcast description "Privilege to send local broadcast message
s"
privilege broadcast description "Privilege to send local or remote broadcast mes
sages"
privilege vm-imap description "Privilege to manage personal voicemail via IMAP c
lient"
privilege ManagePublicList description "Privilege to manage public lists"
privilege ViewPrivateList description "Privilege to view private list"
privilege ManagePrompts description "Privilege to create, modify, or delete syst
em prompts"
privilege ViewHistoricalReports operation report.historical.view
privilege manage-users operation user.configuration
privilege manage-users operation user.mailbox
privilege manage-users operation user.password
privilege manage-users operation user.remote
privilege manage-users operation user.pin
privilege manage-users operation system.debug
privilege manage-users operation user.notification
privilege manage-users operation group.configuration
privilege manage-passwords operation user.password
privilege manage-passwords operation user.pin
privilege manage-passwords operation system.debug
privilege ViewRealTimeReports operation report.realtime
privilege local-broadcast operation broadcast.local
privilege local-broadcast operation system.debug
privilege broadcast operation broadcast.local
privilege broadcast operation system.debug
privilege broadcast operation broadcast.remote
privilege vm-imap operation voicemail.imap.user
privilege ManagePublicList operation voicemail.lists.public
privilege ManagePublicList operation system.debug
privilege ViewPrivateList operation voicemail.lists.private.view
privilege ManagePrompts operation prompt.modify
privilege ManagePrompts operation system.debug
groupname Administrators member admin
groupname Administrators member cisco
groupname Broadcasters member admin
groupname staff privilege broadcast
groupname staff privilege local-broadcast
groupname Broadcasters privilege broadcast
groupname staff phonenumber "201"
username insurance phonenumber "107"
username GlennP supervisor designate
restriction msg-notification create
restriction msg-notification min-digits 1
restriction msg-notification max-digits 30
restriction msg-notification dial-string preference 1 pattern * allowed
backup server url "ftp://127.0.0.1/ftp" credentials hidden "EWlTygcMhYmjazXhE/VN
XHCkplVV4KjescbDaLa4fl4WLSPFvv1rWUnfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8Z
ZNgd+Y9J3xlk2B35j0nfGWTYHfmP"
calendar biz-schedule sterling_open
closed day 1 from 00:00 to 24:00
open day 2 from 10:00 to 18:00
open day 3 from 10:00 to 20:00
open day 4 from 10:00 to 18:00
open day 5 from 10:00 to 20:00
open day 6 from 10:00 to 18:00
open day 7 from 09:00 to 17:00
end schedule
calendar biz-schedule systemschedule
open day 1 from 00:00 to 24:00
open day 2 from 00:00 to 24:00
open day 3 from 00:00 to 24:00
open day 4 from 00:00 to 21:00
open day 4 from 22:00 to 24:00
open day 5 from 00:00 to 24:00
open day 6 from 00:00 to 24:00
open day 7 from 00:00 to 24:00
end schedule
ccn application autoattendant aa
description "Sterling Auto-Attendant"
enabled
maxsessions 4
script "aa.aef"
parameter "busClosedPrompt" "AABusinessClosed.wav"
parameter "holidayPrompt" "AAHolidayPrompt.wav"
parameter "welcomePrompt" "AAWelcome.wav"
parameter "disconnectAfterMenu" "false"
parameter "dialByFirstName" "false"
parameter "allowExternalTransfers" "false"
parameter "MaxRetry" "3"
parameter "dialByExtnAnytime" "false"
parameter "busOpenPrompt" "AABusinessOpen.wav"
parameter "businessSchedule" "systemschedule"
parameter "dialByExtnAnytimeInputLength" "4"
parameter "operExtn" "1001"
end application
ccn application ciscomwiapplication aa
description "ciscomwiapplication"
enabled
maxsessions 6
script "setmwi.aef"
parameter "CallControlGroupID" "0"
parameter "strMWI_OFF_DN" "8001"
parameter "strMWI_ON_DN" "8000"
end application
ccn application msgnotification aa
description "msgnotification"
enabled
maxsessions 6
script "msgnotify.aef"
parameter "logoutUri" "http://localhost/voicemail/vxmlscripts/mbxLogout.jsp"
parameter "DelayBeforeSendDTMF" "1"
end application
ccn application promptmgmt aa
description "promptmgmt"
enabled
maxsessions 1
script "promptmgmt.aef"
end application
ccn application sterlingaa aa
description "sterlingaa"
enabled
maxsessions 6
script "sterlingaa.aef"
parameter "Sterling_Sched" "sterling_open"
parameter "Sterling_Hunt" "200"
end application
ccn application voicemail aa
description "Sterling Voicemail by RhinoIT"
enabled
maxsessions 4
script "voicebrowser.aef"
parameter "logoutUri" "http://localhost/voicemail/vxmlscripts/mbxLogout.jsp"
parameter "uri" "http://localhost/voicemail/vxmlscripts/login.vxml"
end application
ccn engine
end engine
ccn reporting historical
database local
description "se-10-1-1-6"
end reporting
ccn subsystem sip
gateway address "172.22.1.154"
mwi envelope-info
mwi sip sub-notify
end subsystem
ccn trigger http urlname msgnotifytrg
application "msgnotification"
enabled
maxsessions 2
end trigger
ccn trigger http urlname mwiapp
application "ciscomwiapplication"
enabled
maxsessions 1
end trigger
ccn trigger sip phonenumber 2000
application "voicemail"
enabled
maxsessions 4
end trigger
ccn trigger sip phonenumber 300
application "sterlingaa"
enabled
maxsessions 6
end trigger
ccn trigger sip phonenumber 800
application "voicemail"
enabled
maxsessions 6
end trigger
service phone-authentication
end phone-authentication
service voiceview
enable
end voiceview
voicemail callerid
voicemail broadcast recording time 300
voicemail default messagesize 240
voicemail notification restriction msg-notification
voicemail mailbox owner "admin" size 775
description "admin mailbox"
end mailbox
voicemail mailbox owner "insurance" size 775
description "insurance mailbox"
end mailbox
end
-Pat
Is not clear what you mean. IP of CUe should put CUE GUI.
-
What IOS supports LLDP for router cisco 2811
Hi, we run 12.4 T11 (13r) and we are not able to activate LLDP because it is not supported, could you please help in what IOS it is supported.
model of router is 2811
Thank you
Anas,
Your best friend looking for the feature that is supported on the platform and IOS would be:
http://Tools.Cisco.com/ITDIT/CFN/
And this IOS you have does not support LLDP.
HTH
Concerning
Reem
* Please note all useful messages.
-
VWIC3-1MFT-T1/E1, showing no recorded in CUCM 10.5
Hello
I am trying to record E1 and FXO 8 with CUCM 10.5 using mgcp. FXOs are recorded in CUCM but not E1, it shows not registered. I have attached the configuration of the gateway and the CUCM screenshot. I use the software REL C2900, Cisco IOS Software (C2900-UNIVERSALK9-M), T3 Version 15.4 (1)
EASY SOFTWARE. Please let me if there is no error in my configuration.AD_Voice_GW #show ccm-Manager
MGCP domain name: AD_Voice_GW
Host of priority status
============================================================
Registered primary 10.20.13.9
First backup ready 10.20.13.8
Second backup noneCurrent active call manager: 10.20.13.9
Backhaul/redundant link port: 2428
Failover interval: 30 seconds
KeepAlive interval: 15 seconds
Last keepalive sent: 14:39:48 GMT April 10, 2015 (duration: 00:00:12)
)
MGCP traffic last time: 14:39:48 GMT April 10, 2015 (duration: 00:00:12)
)
Last failover time: None
Last hour switchback: None
Switchback lifestyle: graceful
MGCP rescue mode: unchecked
Start time of last backup MGCP: None
Last backup MGCP end time: None
MGCP download ringtones: disabled
TFTP retry count to close Ports: 2Backhaul link info:
The link protocol: TCP
Remote Port number: 2428
Remote IP address: 10.20.13.9
Current link status: OPEN
Statistics:
Recvd packages: 1
Recv failures: 0
Xmitted of packets: 2
Xmit failures: 0
PRI ports in return:
Slot 0, VIC 0, port 0
Automatic download of configuration information
=======================================
The current version id: 1428657466-23cb555c-fb36-457e-81fa-58438df308d4
Last downloaded-config: 00:00:00
Current situation: waiting for orders
Configuration of download statistics:
Download tried: 1
Successful upload: 1
Download failed: 0
TFTP download failed: 0
Configuration has attempted: 1
Successful configuration: 1
Setup Failed (Parsing): 0
Configuration (config) Failed: 0
Last command upload config: new registration
FAX mode: disable
History of configuration error:
AD_Voice_GW #.==============================================================================
D_Voice_GW #show ISDN status
Global ISDN Switchtype = primary-net5%Q.931 is back at CCM MANAGER 0 x 0003 lis 0. Out of layer 3 can not appl
ThereISDN Serial0/0/0: interface 15
DSL 0, the interface ISDN Switchtype = primary-net5
L2 Protocol = 0x0000 L3 = MANAGER of CCM protocols Q.921 0 x 0003
Layer 1 status:
SHUTDOWN
Status of layer 2:
TEI = 0, CES = 1, SAPI = 0, status = TEI_ASSIGNED
Status of layer 3:
0 active Layer 3 call (s)
CCBs active dsl 0 = 0
The free channel mask: 0x00000000
Number of L2 ignores = 0, ID of Session L2 = 0
Total allocated ISDN TSC = 0
AD_Voice_GW #.=====================================================================================
AD_Voice_GW #show mgcp endpoint
E1 0/0/0 interface
GIS-TYPE V-PORT ADMIN ENDPOINT NAME
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_G: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place
[email protected]/ * / 0/0/0 _Voice_: 15 place[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GW
[email protected]/ * / _Voice_GWAD_Voice_GW #.
Since ISDN layer 1 was showing as Deactivated/Shutdown, crc4 framing so could cause.
regds,
Aman
-
Radio card of Cisco 2811 router wireless
Hello
Is it possible to configure the card wireless in a router as a customer to use another radio as gateway?
The situation is that I need to set up Internet access temporary to query users on a local network cable but have no Internet connectivity. I have a Novatel MiFi, which allows Internet connectivity which I want the radio on the router to connect to. In this case, the radio will be more than one client or a bridge.
Thanks for any input.
Vincent
The answer is no. Cisco access points using the Protocol IAPP talk to each other... Cisco with Non-cisco, we cannot communicate...
Let me know if that answers your question...
Concerning
Surendra
====
Please do not forget to note positions that answered your question and mark as answer or was useful -
Cisco 2811 with NME-AIR-WLC6-K9 wireless module?
Hello.
I'm setting up a WLAN and wanted som to comment on certain things. I understand that NME-AIR-WLC6-K9 standard 802.11n support, I was hoping someone could confirm. Is that also to the NME-AIR-WLC6-K9 kan module be configured such that all the accesspoints can broadcast multiple SSID, say 10-15 SSID and each access point that I put in place allows to broadcast the same.
Best regards Tommy Svensson
Hello
T1 > I understand that NME-AIR-WLC6-K9 standard 802.11n support, I was hoping someone could confirm
1 YEARS > Yes it supports N, unless you have a N speeds taken APs supported as 1142, 1252, 3500, 1040, 1260.
Q2 > is it also for the NME-AIR-WLC6-K9 kan module be configured such that all the accesspoints can broadcast multiple SSID, say 10-15 SSID and that each access point I put in place allows to broadcast the same.
ANS2 > Yes we can broadcast multiple SSID with... However each counter can broadcast only 16 SSID, so if you have more than 16 SSID then you must configure the grouping AP or override Wlan function to achieve.
Let me know if that answers your question...
Concerning
Surendra
====
Please do not forget to note positions that answered your question and mark as answer or was useful -
Hi guys,.
Can someone please advise what I'm doing wrong? I'm currently testing one of our routers to use the pptp VPN Protocol.
Please find below the config:
VPDN enable
!
VPDN-Group 1
! PPTP by default VPDN group
accept-dialin
Pptp Protocol
virtual-model 1
tunnel L2TP non-session timeout 15interface virtual-Template1
IP nat inside
IP virtual-reassembly
POOL_IP of the peer default ip address pool
No keepalive
PPP encryption mppe auto
PPP authentication ms-chap-v2, ms-chap
!
!
local IP POOL_IP 192.168.42.50 pool 192.168.42.100debugging running I get this:
NTCSYD2 #sh debugging
PPP:
Debugging PPP authentication is on
PPP protocol errors debug is on
Negotiation of Protocol PPP debug is onNTCSYD2 #.
* 23:43:21.855 Jan 18: PPP: Alloc context [4670 550]
* 23:43:21.859 Jan 18: ppp8 PPP: Phase is
* 23:43:21.859 Jan 18: ppp8 PPP: via vpn, set the direction of the call
* 23:43:21.859 Jan 18: ppp8 PPP: treatment of connection as a callin
* 23:43:21.859 Jan 18: ppp8 PPP: Session Session handle [8] id [8]
* Jan 18 23:43:21.859: ppp8 TPIF: State of the event [OPEN] [initial check]
* 23:43:21.859 Jan 18: ppp8 PPP LCP: switch to passive mode, State [stopped]
* Jan 18 23:43:22.203: ppp8 TPIF: I CONFREQ [order] id 0 len 21
* Jan 18 23:43:22.207: ppp8 TPIF: MRU 1400 (0 x 01040578)
* Jan 18 23:43:22.207: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
* Jan 18 23:43:22.207: ppp8 TPIF: PFC (0 x 0702)
* Jan 18 23:43:22.207: ppp8 TPIF: RAC (0 x 0802)
* Jan 18 23:43:22.207: ppp8 TPIF: reminder 6 (0x0D0306)
* Jan 18 23:43:22.207: ppp8 TPIF: O CONFREQ [order] id 1 len 15
* Jan 18 23:43:22.207: ppp8 TPIF: AuthProto MS-CHAP-V2 (0x0305C22381)
* Jan 18 23:43:22.207: ppp8 TPIF: MagicNumber 0x3710B12D (0x05063710B12D)
* Jan 18 23:43:22.207: ppp8 TPIF: O [order] CONFREJ id 0 len 7
* Jan 18 23:43:22.207: ppp8 TPIF: reminder 6 (0x0D0306)
* Jan 18 23:43:22.207: ppp8 TPIF: State of the event [receive ConfReq-] [arrested at REQsent
]
* Jan 18 23:43:22.211: ppp8 TPIF: I CONFACK [REQsent] id 1 len 15
* Jan 18 23:43:22.211: ppp8 TPIF: AuthProto MS-CHAP-V2 (0x0305C22381)
* Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x3710B12D (0x05063710B12D)
* Jan 18 23:43:22.211: ppp8 TPIF: State of the event [receive ConfAck] [REQsent to ACKrcvd]
* Jan 18 23:43:22.211: ppp8 TPIF: I CONFREQ [ACKrcvd] id 1 len 18
* Jan 18 23:43:22.211: ppp8 TPIF: MRU 1400 (0 x 01040578)
* Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
* Jan 18 23:43:22.211: ppp8 TPIF: PFC (0 x 0702)
* Jan 18 23:43:22.211: ppp8 TPIF: RAC (0 x 0802)
* Jan 18 23:43:22.211: ppp8 TPIF: O CONFNAK [ACKrcvd] id 1 len 8
* Jan 18 23:43:22.211: ppp8 TPIF: MRU 1500 (0x010405DC)
* Jan 18 23:43:22.211: ppp8 TPIF: State of the event [receive ConfReq-] [ACKrcvd to ACKrcvd
]
* Jan 18 23:43:22.211: ppp8 TPIF: I CONFREQ [ACKrcvd] id 2 len 18
* Jan 18 23:43:22.211: ppp8 TPIF: MRU 1400 (0 x 01040578)
* Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
* Jan 18 23:43:22.211: ppp8 TPIF: PFC (0 x 0702)
* Jan 18 23:43:22.211: ppp8 TPIF: RAC (0 x 0802)
* Jan 18 23:43:22.215: ppp8 TPIF: O CONFNAK [ACKrcvd] id 2 len 8
* Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
* Jan 18 23:43:22.215: ppp8 TPIF: State of the event [receive ConfReq-] [ACKrcvd to ACKrcvd
]
* Jan 18 23:43:22.215: ppp8 TPIF: I CONFREQ [ACKrcvd] id 3 len 18
* Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
* Jan 18 23:43:22.215: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
* Jan 18 23:43:22.215: ppp8 TPIF: PFC (0 x 0702)
* Jan 18 23:43:22.215: ppp8 TPIF: RAC (0 x 0802)
* Jan 18 23:43:22.215: ppp8 TPIF: O CONFACK [ACKrcvd] id 3 len 18
* Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
* Jan 18 23:43:22.215: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
* Jan 18 23:43:22.215: ppp8 TPIF: PFC (0 x 0702)
* Jan 18 23:43:22.215: ppp8 TPIF: RAC (0 x 0802)
* Jan 18 23:43:22.219: ppp8 TPIF: State of the event [receive ConfReq +] [ACKrcvd to open]
* Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 4 len 18 magic 0x48C56584MS
RASV5.20
* Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 5 len 20 magic 0x48C56584MS
RAS-0-MIS4
* Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 6 len 24 magic 0x48C56584qY
GSQK'IGC 'xKt6e '.
* 23:43:22.239 Jan 18: ppp8 PPP: Phase is AUTHENTICATING,
* 23:43:22.239 Jan 18: ppp8 MS-CHAP-V2: O CHALLENGE id 1 len 28 of 'NTCSYD2 '.
* Jan 18 23:43:22.239: ppp8 TPIF: State is open
* 23:43:22.243 Jan 18: ppp8 MS-CHAP-V2: I ANSWER id 1 len 67 of "administrateu".
r '.
* 23:43:22.243 Jan 18: ppp8 PPP: Phase TRANSFER, tempting with impatience
* 23:43:22.247 Jan 18: ppp8 PPP: Phase is AUTHENTICATING, unauthenticated user
* 23:43:22.247 Jan 18: ppp8 PPP: request sent MSCHAP_V2 LOGIN
* 23:43:22.251 Jan 18: ppp8 PPP: received LOGIN response FAIL
* 23:43:22.255 Jan 18: ppp8 MS-CHAP-V2: FAILURE O id 1 len 13 msg's 'E = 691 R = 0 '.
* 23:43:22.255 Jan 18: ppp8 PPP DISC: the user has no MSCHAP V2 authentication
* 23:43:22.255 Jan 18: ppp8 PPP: sending Acct event [low] id [2a]
* Jan 18 23:43:22.255: ppp8 TPIF: O TERMREQ [open] id 2 len 4
* Jan 18 23:43:22.255: ppp8 TPIF: event [CLOSE] State [Open for closure]
* 23:43:22.255 Jan 18: ppp8 PPP: Phase ENDS
* Jan 18 23:43:22.259: ppp8 TPIF: I TERMACK [closing] id 2 len 4
* Jan 18 23:43:22.259: ppp8 TPIF: State of the event [TermAck receive] [closing closed]
* Jan 18 23:43:22.259: ppp8 TPIF: event [DOWN] [closed on Initial]
* 23:43:22.259 Jan 18: ppp8 PPP: Phase is BROKENAny help would be appreciated extremelly.
See you soon,.
Fabio
It seems that users are unable to authenticate. What do you use to authenticate users? You have a pool of default aaa authentication which checks the ms-chap-v2 user names against RADIUS via AD?
-
Cisco 2811 compatibility for VPN
Hello
I have an existing direct router which is at present not manage the VPN.
It is necessary to add VPN service to it and I'm trying to find the match for her.
The router is
PID: CISCO2811
and the IOS operating system on it
c2800nm-spservicesk9 - mz.124 - 24.T3.bin
There not all DRY beams inside.
Can you please let me know if I need to Exchange on the router with one of those with the beams of SEC to establish a VPN on it?
Thank you very much
Kone
Hi, you will need to upgrade image to
c2800nm-adventerprisek9 or c2800nm-adsecurityk9
* Do note of useful messages *.
-
UC540 compatibility with card VWIC3?
Hi all
We have a customer using a UC540W-BIS-K9. They move from their office and improve their current ranges from 2xBRI to 1xE1 in order to have 30 channels.
as you all know, the VWIC2-1MFT-T1/E1 = is now EoL/EoS. Will be the new model VWIC3-1MFT-T1/E1 = be completely cared for and compatible with our
UC540W-BIS-K9? It is running
Version of the software is a bit old but...
!!!!!
Cisco IOS software, software UC500 (UC500-ADVIPSERVICESK9-M), Version 15.1 (2) T4, RELEASE SOFTWARE (fc1)
Technical support: http://www.cisco.com/techsupport
Copyright (c) 1986-2011 by Cisco Systems, Inc.
Updated Wednesday, July 12, 11 22:01 by prod_rel_team
ROM: System Bootstrap, Version 12.4 SB (24r), RELEASE SOFTWARE (fc1)
The availability of KFL-UC-01 is 26 weeks, 4 days, 14 hours, 11 minutes
System to regain the power ROM
System restarted at 22:33:37 THIS Thursday, July 12, 2012
System image file is "flash: uc500-advipservicesk9 - mz.151 - 2.T4.
!!!!!
Thanks for your advice.
Hi Hiromichi,
As per UC540 platform reference guide, VWIC3-1MFT-T1/E1is not supported. VWIC2-1MFT-T1/E1 is the only supported card.
Rate to the post accordinly.
Kind regards
Kevin
-
Cisco router some computers were able to access the internet.
I'm having a weird problem recently that some computers were unable to browse some site. I even try to put in place a different router from cisco (cisco 2811) with IOS version 15.0 and the same configuration but still no luck. Tried to reboot all devices and I also try to use the computer that is having problem to access the web connect directly to the router, but the result is the same. FYI the router being works well for a month a few without this problem. I try to use the inexpensive router like the dlink / tplink and there is no problem. Another piece of information, it's the computer that could not browse some site were able to ping the website, but fail to load in the web browser. 10 computer there are 3 unit have this problem and new features such as my customer/guest computer also were unable to browse some site. There are no firewall or any security in our regard. It makes me crazy!
My circuit diagram as below;
WAN-> router (Cisco 2821)-> switch-> computer
-See the version-
Cisco IOS software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 12.4 (24) T6, VERSION of the SOFTWARE (fc2)
Technical support: http://www.cisco.com/techsupport
Copyright (c) 1986-2011 by Cisco Systems, Inc.
Updated Wednesday, Aug 23, 11 01:30 by prod_rel_teamROM: System Bootstrap, Version 12.4 (13r) T, RELEASE SOFTWARE (fc1)
Linear_Router uptime is 2 weeks, 3 days, 21 hours, 56 minutes
System return to the ROM to reload at 12:49:51 MAS Thu Sep 1 2016
System image file is "flash: c2800nm-adventerprisek9 - mz.124 - 24.T6.bin".This product contains cryptographic features and is under the United States
States and local laws governing the import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third party approval to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. laws and local countries. By using this product you
agree to comply with the regulations and laws in force. If you are unable
to satisfy the United States and local laws, return the product.A summary of U.S. laws governing Cisco cryptographic products to:
http://www.Cisco.com/WWL/export/crypto/tool/stqrg.htmlIf you need assistance please contact us by mail at
[email protected] / * /.Cisco 2821 (revision 53.51) with 249856K / 12288K bytes of memory.
Card processor ID FHK1235F3T0
2 gigabit Ethernet interfaces
2 interfaces Serial (sync/async)
1 ATM interface
1 module of virtual private network (VPN)
Configuration of DRAM is wide with parity 64-bit capable.
239K bytes of non-volatile configuration memory.
1000944K bytes of ATA CompactFlash (read/write)Configuration register is 0 x 2102
-show running-config-
Building configuration...
Current configuration: 8378 bytes
!
version 12.4
horodateurs service debug datetime msec
Log service timestamps datetime localtime
encryption password service
!
hostname Linear_Router
!
boot-start-marker
start the flash system: c2800nm-adventerprisek9 - mz.124 - 24.T6.bin
boot-end-marker
!
forest-meter operation of syslog messages
logging buffered 16000
enable password 7
!
AAA new-model
!
!
AAA authentication login sdm_vpn_xauth_ml_1 local
AAA authorization sdm_vpn_group_ml_1 LAN
!
!
AAA - the id of the joint session
clock timezone 8 MAS
!
dot11 syslog
IP source-route
!
!
IP cef
No dhcp use connected vrf ip
dhcp IP 30 binding cleanup interval
DHCP excluded-address IP 192.168.88.1 192.168.88.141
DHCP excluded-address IP 192.168.88.180 192.168.88.254
!
pool of dhcp IP LAN
network 192.168.88.0 255.255.255.0
router by default - 192.168.88.254
domain losb.local
Server DNS 8.8.8.8 8.8.4.4
0 0 15 rental
!
!
IP domain name losb.local
8.8.8.8 IP name-server
IP-server names 8.8.4.4
!
No ipv6 cef
!
Authenticated MultiLink bundle-name Panel
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
voice-card 0
!
!
Crypto pki trustpoint test_trustpoint_config_created_for_sdm
e subject name =[email protected] / * /
crl revocation checking
!
Crypto pki trustpoint TP-self-signed-3132623275
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 3132623275
revocation checking no
rsakeypair TP-self-signed-3132623275
!
!
for the crypto pki certificate chain test_trustpoint_config_created_for_sdm
TP-self-signed-3132623275 crypto pki certificate chain
certificate self-signed 01
30820250 308201B 9 A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
69666963 33313332 36323332 6174652D 3735301E 170 3134 31323032 31393436
35385A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
4F532D53 5369676E 656C662D 43 65727469 66696361 74652 33 31333236 65642D
32333237 3530819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
8569B 674 5F07B434 8E5F9D59 D298DB7E 51FBB58A B 460084 9 34AE8461 8100D01A
471637 C F6CFC65F 9639C1C6 2 50CF9117 D459482F 1EF22E29 322F39AA 88 42306
F4B6686A 161FDD3D 69B0647B 46FC7CD0 966C03E8 D6CF9181 8E2B3514 300D980B
EE9225A6 173F7673 655A1DE8 FB720F13 0FD8E550 A7DDB314 50461510 A72C5DBE
010001A 3 78307630 1 130101 FF040530 030101FF 30230603 0F060355 A1CF0203
551D 1104 1C301A82 184C696E 6561725F 526F7574 65722E6C 6F73622E 6C6F6361
23 04183016 8014FA7F D98E6D69 462EEAED 41BEC8D3 7042F812 03551D 6C301F06
95B3301D 0603551D 0E041604 14FA7FD9 8E6D6946 2EEAED41 BEC8D370 42F81295
B3300D06 092 HAS 8648 01040500 03818100 043EC1A4 7363A7FD 3AED777D 86F70D01
CAAEC570 99 HAS 02166 A3958A66 0E5A5DD2 368C2F8B D9A96E69 9F57852C ACE0C67F
73 D 17753 53BE14C4 824BE043 B8A52822 E38DBC3C C3F33787 813FD207 0AB04004
E0303A2F 2A3BF5AA 81481429 F53C1EDD 8AC2EC48 D64DF89A 4D047B7C 6B 516970
55EAFF10 B1453DBD ABC96845 FDF7AAF9 77B8C381
quit smoking
!
!
password username privilege 15 7 kent
Archives
The config log
hidekeys
!
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
!
Configuration group customer crypto isakmp 11
11 key
DNS 8.8.8.8 8.8.4.4
losb.local field
pool SDM_POOL_1
ACL 100
Max-users 11
ISAKMP crypto sdm-ike-profile-1 profile
identity group game 11
client authentication list sdm_vpn_xauth_ml_1
ISAKMP authorization list sdm_vpn_group_ml_1
client configuration address respond
virtual-model 1
!
!
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
!
Profile of crypto ipsec SDM_Profile1
game of transformation-ESP-3DES-SHA
isakmp-profile sdm-ike-profile-1 game
!
!
Crypto ctcp port 10000
!
!
!
!
!
!
interface GigabitEthernet0/0
Description of connection WAN to Unifi BTU
no ip address
no ip-cache cef route
no ip route cache
automatic duplex
automatic speed
No mop enabled
!
interface GigabitEthernet0/0.500
encapsulation dot1Q 500
no ip route cache
PPPoE enable global group
PPPoE-client dial-pool-number 1
!
interface GigabitEthernet0/1
internal network LAN Description
IP 192.168.88.254 255.255.255.0
IP access-group UDP/TCP in
IP nat inside
IP virtual-reassembly
no ip-cache cef route
no ip route cache
automatic duplex
automatic speed
!
ATM0/0/0 interface
no ip address
Shutdown
ATM 300 restart timer
No atm ilmi-keepalive
!
interface Serial0/1/0
no ip address
Shutdown
2000000 clock frequency
!
interface Serial0/1/1
no ip address
Shutdown
2000000 clock frequency
!
type of interface virtual-Template1 tunnel
11 description
Dialer1 IP unnumbered
ipv4 ipsec tunnel mode
Tunnel SDM_Profile1 ipsec protection profile
!
interface Dialer1
the negotiated IP address
IP mtu 1480
NAT outside IP
IP virtual-reassembly
encapsulation ppp
Dialer pool 1
Dialer idle-timeout 0
persistent Dialer
Dialer-Group 1
PPP authentication chap callin pap
PPP chap hostname [email protected] / * /
password PPP chap 7 15381
PPP pap sent-username [email protected] / * / 132F0 password 7
!
local IP SDM_POOL_1 192.168.88.130 pool 192.168.88.141
default IP gateway - 192.168.88.254
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 Dialer1
IP http server
local IP http authentication
IP http secure server
!
!
overload of IP nat inside source list Internet_List interface Dialer1
IP nat inside source static tcp 192.168.88.89 8001 interface 3389 Dialer1
IP nat inside source static udp 192.168.88.89 8001 interface 3389 Dialer1
IP nat inside interface 80 static udp 192.168.88.102 source Dialer1 5555
IP nat inside source static tcp 192.168.88.102 80 5555 Dialer1 interface
IP nat inside source static tcp 192.168.88.90 80 Dialer1 8080 interface
IP nat inside interface 80 static udp 192.168.88.90 source Dialer1 8080
IP nat inside source static tcp 192.168.88.101 interface 8888-8888 Dialer1
IP nat inside source static udp 192.168.88.101 interface 8888-8888 Dialer1
IP nat inside source static tcp 192.168.88.101 80 Dialer1 7777 interface
IP nat inside interface 80 static udp 192.168.88.101 7777 Dialer1 source
!
Internet_List extended IP access list
IP 192.168.88.0 allow 0.0.0.255 any
!
Access-list 100 = 4 SDM_ACL category note
access-list 100 permit ip 192.168.88.0 0.0.0.255 any
Dialer-list 1 ip protocol allow
!
!
!
!
!
!
control plan
!
!
!
!
!
!
!
!
!
Banner motd ^ CC
#####################################################################
# WARNING!!! #
# This system is for the use of only authorized customers. #
# Who is using the computer network system without #.
authorization of #, or their permission, are #.
# subject to having their activities on this computer.
# Network monitored and recorded by system #.
staff of #. To protect the computer network system of #.
# unauthorized use and to ensure that computer network systems #.
# does not work properly, system administrators monitor this #.
system of #. Anyone using this computer system #.
# consents to such monitoring and is expressly informed that #.
# If this control reveals possible criminal conduct.
activity #, the system can provide evidence of #.
# This activity to police officers. #
# #
# Access is limited to authorized users only. #
# Unauthorized access is a violation of # State and federal.
# civil and criminal. #
#####################################################################^C
!
Line con 0
line to 0
line vty 0 4
privilege level 15
password 7
transport input telnet ssh
exit telnet ssh transport
!
Scheduler allocate 20000 1000
NTP-Calendar Update
endHello
try changing the size of the "ip mtu" on your Dialer interface to 1492, and/or the 'ip tcp adjust-mss' on your GigabitEthernet interfaces to 1452 and see if that makes a difference.
-
Major question Dhcp on cisco switch please help!
Hi Experts,One of our remote sites has Cisco 2811 router and switch 3650. The switch provides switching and DHCP PC to all customers.Please see attachment for more details files.Problem:After the expiry of the term of the DHCP lease (10 hours), some of the PC (Windows 7) on the remote site received Windows popup says that duplicate IP. Then, the network connectivity of the computer has been disconnected. After you restart the PC, then its network connectivity was back to active state.If all the computers have been placed in static mode, there is no problem.Please see the attached configuration of the router and Switch.Thank you very muchIt's strange this generally solves the problem of IP duplicate
How to put the DHCP server on the router instead of this?
what you get when you place an order 'show ip dhcp conflict '.
also can you share the command 'show ip dhcp pool '.
Richard
-
iPhone 2.0 &; 2811 IOS VPN
Hello
My iPhone can establish a session isakmp and get an address IP etc with my IOS 12.4 VPN on a cisco 2811.
However, when I try and pass traffic, the connection of 2 ipsec phase ends the tunnel.
I get the error as
IPSec invalidated policy proposal
Jul 31 13:13:32.590: ISAKMP:(0:791:HW:2): politics of ITS phase 2 is not acceptable!
and also
CRYPTO-6-IKMP_MODE_FAILURE: fast mode processing failed with the peer to
Someone at - it an iPhone 2.0 to work with a 2811?
It works with an ASA (not sure which model however)
Thank you
Take a look at this:
http://discussions.Apple.com/thread.jspa?MessageID=7221787
"What Cisco platforms work with Cisco VPN Client on the iPhone?
PIX firewall and Cisco ASA 5500 security equipment. We recommend the latest version of the software 8.0.x (or), but you can also use software 7.2.x.
Routers of Cisco IOS nor series VPN 3000 Concentrators VPN supports iPhone VPN features. "
Concerning
Farrukh
Maybe you are looking for
-
A way to remove the photo album of "places"?
I really don't like the new photo albums that set off with iOS 10 (places and people) is it possible to completely delete these albums? Or at least delete items already in these records? Also while I'm here... I used to have my history of safari, the
-
KB2656352, KB2656369 and KB2604092 redetecting updates and reinstall.
Updates Microsoft, KB2656352, KB2656369 and KB2604092 redetecting and reinstall. I get no error. He says that the installation was successful each time. But these same 3 updates keep reports as needed. I'm having this problem on 3 PCs (XP sp3) and
-
Updates to security KB2518864, KB2572073 & KB2133880, try reinstall repeatly
WinXP-home, updates Windows SP3 repeatedly reinstalls Net Frameworks security updates: KB2518864, KB2572073, KB2133880.Site updates Windows indicates that these hotfixes have been installed successfully. No error was published for the updates of Win
-
Security update for Windows XP (SP3), KB977914, install, error Code: 0xD0000135. Can someone provide a fix for the error Code: 0xD0000135? I tried to update 5 times since 09/15/11. Thank you very much. Cynthia
-
Vista Pack 2 will not update stays at 0
I have problems with Windows update. WINDOWS VISTA HOME BASIC SERVICE PACK 2. When I click to download, the download of updates window opens but it stays on 0 and the little green line moves very slowly. Nothing it downloads just rest to 0. I tried