VWIC3-1MFT-T1/E1 on Cisco 2811

Hello community,

VWIC3- 1MFT-T1/E1 is compatible with router Cisco 2811 (revision 53.51)?

Currently, I get the following error:

WIC Slot 0:

Daughter unknown WAN card

Module WIC unsupported / disabled this slot machine

Hardware revision: 1.0

Number of albums part together: 800-34657-01

Part number: 73-13419-01

Review on board: B0

Deviation number: 0

Version of fab: 05

Serial number of PCB: FOC1624628F

Version identifier: V01

Product number (FRU): VWIC3-1MFT-T1/E1

CLEI Code: COUIA7PCAA

History of the RMA tests: 00

RMA number: 0-0-0-0

RMA history: 00

EEPROM 4 format version

Table of contents EEPROM (hex):

0 X 00:04 FF 40 06 00 01 41 46 03 20 00 87 61 01 C0 ED

0 X 10: 82 49 34 6 B 01 42 42 30 88 00 00 00 00 02 05 C1

0 X 20: 8B 4F 46 43 31 36 32 34 36 32 38 46 89 56 30 31

0X20 30: 2D CB 90 56 57 49 43 33 31 4 46 54 54 31 2D

0X40: 2F 45 31 C6 8 A 43 55 49 41 37 50 43 41 41 03 4F

0 X 50: 00 81 00 00 00 00 04 00 03 40 C1 CB FF FF FF D9

0 X 60 : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF

0 X 70 : FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF #

Thank you very much in advance for your quick responses.

George

Hi George,.

Unfortunately not supported on any series 2800

The Cisco® third generation-1, 2 or 4-channel T1/E1 Multiflex Trunk voice/WAN (MFT VWIC3s) support voice and data applications Interface on the Cisco 1921, 1941 and 1941W (data only) and the Cisco 2901 2911 2921, 2951, 3925, 3945, routers to Services integrated 3925th and 3945TH.

Table 1. Supported Cisco MFT VWIC3 platforms and Cisco IOS Software Release requirements minimum

VWIC3-1MFT-T1/E1

VWIC3-2MFT-T1/E1

VWIC3-1MFT-G703

VWIC3-2MFT-G703

VWIC3-4MFT-T1/E1

Slot machines Cisco 1900 chassis EHWIC

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

N/A *.

Slot machines Cisco 2900 chassis EHWIC

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

15.1 (3) T *.

Slot machines Cisco 3900 chassis EHWIC

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

(1) M3 15.0, 15.1 (1) T1, 15.1 (2) T

15.1 (3) T

* VWIC3-4MFT-T1/E1is supported by Cisco 2911 2921 2951 and, routers Cisco 3900 Series

http://www.Cisco.com/en/us/prod/collateral/routers/ps5855/data_sheet_c36-609138.html

See you soon!

Rob

"Why don't the best things always go away."

-The band

Tags: Cisco Support

Similar Questions

  • Circuits group with cards VWIC2-1MFT-T1/E1 and VWIC3-1MFT-T1/E1

    Hi all

    I have a router 2821 with 2 cards to VWIC2-1MFT-T1/E1 x connections ppp in a bundle, we replace it by a 2951 but also add a new ppp link, we would like nevertheless to re-use the existing VWIC2 cards and just get a new card VWIC3-1MFT-T1/E1 to add this additional link from the same batch, my question here: would it be possible to have a job with vwic2 and vwic3 maps multiple links?

    Thanks for your help.

    Hello

    I just checked one of my routers. I have the Panel multilink ppp on two different modules. WIC-1dsu-t1-v2 and VWIC2-1MFT-T1/E1. So it should work in your case too.

    multiple links are working properly.

    It will be useful,

    Masoud

  • Problem Cisco 2811 with L2TP IPsec VPN

    Hello. Sorry for my English. Help me please. I have problem with L2TP over IPsec VPN when I connect with Android phones. Even if I connect with laptop computers. I have Cisco 2811 - Cisco IOS software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4 (2) T2, (fc3) SOFTWARE VERSION. I configured on L2TP over IPsec VPN with Radius Authentication

    My config:

    !
    AAA new-model
    !
    !
    AAA authentication login default local
    Ray of AAA for authentication ppp default local group
    AAA authorization network default authenticated if
    start-stop radius group AAA accounting network L2TP_RADIUS

    !
    dhcp L2tp IP pool
    network 192.168.100.0 255.255.255.0
    default router 192.168.100.1
    domain.local domain name
    192.168.101.12 DNS server
    18c0.a865.c0a8.6401 hexagonal option 121
    18c0.a865.c0a8.6401 hexagonal option 249

    VPDN enable
    !
    VPDN-group sec_groupe
    ! Default L2TP VPDN group
    accept-dialin
    L2tp Protocol
    virtual-model 1
    no authentication of l2tp tunnel

    session of crypto consignment
    !
    crypto ISAKMP policy 5
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 55
    BA 3des
    md5 hash
    preshared authentication
    Group 2

    ISAKMP crypto key... address 0.0.0.0 0.0.0.0
    invalid-spi-recovery crypto ISAKMP
    ISAKMP crypto keepalive 10 periodicals
    !
    life crypto ipsec security association seconds 28000
    !
    Crypto ipsec transform-set esp-3des esp-sha-hmac L2TP
    transport mode
    Crypto ipsec transform-set esp-3des esp-md5-hmac 3DESMD5
    need transport mode
    !

    !
    !
    crypto dynamic-map DYN - map 10
    Set nat demux
    game of transformation-L2TP
    !
    !
    Crypto map 10 L2TP-VPN ipsec-isakmp dynamic DYN-map

    interface Loopback1
    Description * L2TP GateWay *.
    IP 192.168.100.1 address 255.255.255.255

    interface FastEthernet0/0
    Description * Internet *.
    address IP 95.6... 255.255.255.248
    IP access-group allow-in-of-wan in
    IP access-group allows-off-of-wan on
    no ip redirection
    no ip unreachable
    no ip proxy-arp
    NAT outside IP
    IP virtual-reassembly
    IP route cache policy
    automatic duplex
    automatic speed
    L2TP-VPN crypto card
    !

    interface virtual-Template1
    Description * PPTP *.
    IP unnumbered Loopback1
    IP access-group L2TP_VPN_IN in
    AutoDetect encapsulation ppp
    default IP address dhcp-pool L2tp peer
    No keepalive
    PPP mtu Adaptive
    PPP encryption mppe auto
    PPP authentication ms-chap-v2 callin
    PPP accounting L2TP_RADIUS

    L2TP_VPN_IN extended IP access list
    permit any any icmp echo
    IP 192.168.100.0 allow 0.0.0.255 192.168.101.0 0.0.0.255
    IP 192.168.100.0 allow 0.0.0.255 192.168.3.0 0.0.0.255
    allow udp any any eq bootps
    allow udp any any eq bootpc
    deny ip any any journal entry

    RADIUS-server host 192.168.101.15 auth-port 1812 acct-port 1813
    RADIUS server retry method reorganize
    RADIUS server retransmit 2
    Server RADIUS 7 key...

    Debugging shows me

    234195: * 3 Feb 18:53:38: ISAKMP (0:0): received 93.73.161.229 packet dport 500 sport 500 SA NEW Global (N)
    234196: * 3 Feb 18:53:38: ISAKMP: created a struct peer 93.73.161.229, peer port 500
    234197: * 3 Feb 18:53:38: ISAKMP: new position created post = 0x47D305BC peer_handle = 0x80007C5F
    234198: * 3 Feb 18:53:38: ISAKMP: lock struct 0x47D305BC, refcount 1 to peer crypto_isakmp_process_block
    234199: * 3 Feb 18:53:38: ISAKMP: 500 local port, remote port 500
    234200: * 3 Feb 18:53:38: insert his with his 480CFF64 = success
    234201: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    234202: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_READY = IKE_R_MM1
    234203: * 3 Feb 18:53:38: ISAKMP: (0): treatment ITS payload. Message ID = 0
    234204: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234205: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
    234206: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234207: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 164
    234208: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234209: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
    234210: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is NAT - T v2
    234211: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234212: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 221
    234213: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234214: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
    234215: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234216: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is DPD
    234217: * 3 Feb 18:53:38: ISAKMP: (0): looking for a key corresponding to 93.73.161.229 in default
    234218: * 3 Feb 18:53:38: ISAKMP: (0): success
    234219: * 3 Feb 18:53:38: ISAKMP: (0): pair found pre-shared key matching 93.73.161.229
    234220: * 3 Feb 18:53:38: ISAKMP: (0): pre-shared key local found
    234221: * 3 Feb 18:53:38: ISAKMP: analysis of the profiles for xauth...
    234222: * 3 Feb 18:53:38: ISAKMP: (0): audit ISAKMP transform 1 against policy priority 5
    234223: * 3 Feb 18:53:38: ISAKMP: type of life in seconds
    234224: * 3 Feb 18:53:38: ISAKMP: life (basic) of 28800
    234225: * 3 Feb 18:53:38: ISAKMP: 3DES-CBC encryption
    234226: * 3 Feb 18:53:38: ISAKMP: pre-shared key auth
    234227: * 3 Feb 18:53:38: ISAKMP: SHA hash
    234228: * 3 Feb 18:53:38: ISAKMP: group by default 2
    234229: * 3 Feb 18:53:38: ISAKMP: (0): atts are acceptable. Next payload is 3
    234230: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234231: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 69
    234232: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234233: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 164
    234234: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234235: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 123
    234236: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is NAT - T v2
    234237: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234238: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 221
    234239: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234240: * 3 Feb 18:53:38: ISAKMP: (0): provider ID seems the unit/DPD but major incompatibility of 194
    234241: * 3 Feb 18:53:38: ISAKMP: (0): load useful vendor id of treatment
    234242: * 3 Feb 18:53:38: ISAKMP: (0): provider ID is DPD
    234243: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    234244: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM1

    234245: * 3 Feb 18:53:38: ISAKMP: (0): built the seller-02 ID NAT - t
    234246: * 3 Feb 18:53:38: ISAKMP: (0): lot of 93.73.161.229 sending my_port 500 peer_port 500 (R) MM_SA_SETUP
    234247: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    234248: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM1 = IKE_R_MM2

    234249: * 3 Feb 18:53:38: ISAKMP (0:0): received 93.73.161.229 packet 500 Global 500 (R) sport dport MM_SA_SETUP
    234250: * 3 Feb 18:53:38: ISAKMP: (0): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    234251: * 3 Feb 18:53:38: ISAKMP: (0): former State = new State IKE_R_MM2 = IKE_R_MM3

    234252: * 3 Feb 18:53:38: ISAKMP: (0): processing KE payload. Message ID = 0
    234253: * 3 Feb 18:53:38: crypto_engine: create DH shared secret
    234254: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_DH_SHARE_SECRET (hw) (ipsec)
    234255: * 3 Feb 18:53:38: ISAKMP: (0): processing NONCE payload. Message ID = 0
    234256: * 3 Feb 18:53:38: ISAKMP: (0): looking for a key corresponding to 93.73.161.229 in default
    234257: * 3 Feb 18:53:38: ISAKMP: (0): success
    234258: * 3 Feb 18:53:38: ISAKMP: (0): pair found pre-shared key matching 93.73.161.229
    234259: * 3 Feb 18:53:38: crypto_engine: create IKE SA
    234260: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_SA_CREATE (hw) (ipsec)
    234261: * 3 Feb 18:53:38: ISAKMP: receives the payload type 20
    234262: * 3 Feb 18:53:38: ISAKMP: receives the payload type 20
    234263: * 3 Feb 18:53:38: ISAKMP (0:5912): NAT found, the node outside NAT
    234264: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    234265: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM3 = IKE_R_MM3

    234266: * 3 Feb 18:53:38: ISAKMP: (5912): lot of 93.73.161.229 sending my_port 500 peer_port 500 (R) MM_KEY_EXCH
    234267: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    234268: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM3 = IKE_R_MM4

    234269: * 3 Feb 18:53:38: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) MM_KEY_EXCH sport
    234270: * 3 Feb 18:53:38: crypto_engine: package to decipher IKE
    234271: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
    234272: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    234273: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM4 = IKE_R_MM5

    234274: * 3 Feb 18:53:38: ISAKMP: (5912): payload ID for treatment. Message ID = 0
    234275: * 3 Feb 18:53:38: ISAKMP (0:5912): payload ID
    next payload: 8
    type: 1
    address: 192.168.1.218
    Protocol: 17
    Port: 500
    Length: 12
    234276: * 3 Feb 18:53:38: ISAKMP: (5912): peer games * no * profiles
    234277: * 3 Feb 18:53:38: ISAKMP: (5912): HASH payload processing. Message ID = 0
    234278: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
    234279: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    234280: * 3 Feb 18:53:38: ISAKMP: (5912): SA authentication status:
    authenticated
    234281: * 3 Feb 18:53:38: ISAKMP: (5912): SA has been authenticated with 93.73.161.229
    234282: * 3 Feb 18:53:38: ISAKMP: (5912): port detected floating port = 4500
    234283: * 3 Feb 18:53:38: ISAKMP: attempts to insert a peer and inserted 95.6.../93.73.161.229/4500/ 47D305BC successfully.
    234284: * 3 Feb 18:53:38: ISAKMP: (5912): IKE_DPD is enabled, the initialization of timers
    234285: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    234286: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM5 = IKE_R_MM5

    234287: * 3 Feb 18:53:38: ISAKMP: (5912): ITS been pre-shared key, using id ID_IPV4_ADDR type authentication
    234288: * 3 Feb 18:53:38: ISAKMP (0:5912): payload ID
    next payload: 8
    type: 1
    address: 95.6...
    Protocol: 17
    Port: 0
    Length: 12
    234289: * 3 Feb 18:53:38: ISAKMP: (5912): the total payload length: 12
    234290: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
    234291: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    234292: * 3 Feb 18:53:38: crypto_engine: package to encrypt IKE
    routerindc #.
    234293: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_ENCRYPT (hw) (ipsec)
    234294: * 3 Feb 18:53:38: ISAKMP: (5912): lot of 93.73.161.229 sending peer_port my_port 4500 4500 (R) MM_KEY_EXCH
    234295: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    234296: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_R_MM5 = IKE_P1_COMPLETE

    234297: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
    234298: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

    234299: * 3 Feb 18:53:38: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
    234300: * 3 Feb 18:53:38: ISAKMP: node set-893966165 to QM_IDLE
    234301: * 3 Feb 18:53:38: crypto_engine: package to decipher IKE
    234302: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
    234303: * 3 Feb 18:53:38: crypto_engine: hash generate IKE
    234304: * 3 Feb 18:53:38: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    234305: * 3 Feb 18:53:38: ISAKMP: (5912): HASH payload processing. Message ID =-893966165
    234306: * 3 Feb 18:53:38: ISAKMP: (5912): treatment protocol NOTIFIER INITIAL_CONTACT 1
    SPI 0, message ID =-893966165, his 480CFF64 =
    234307: * 3 Feb 18:53:38: ISAKMP: (5912): SA authentication status:
    authenticated
    234308: * 3 Feb 18:53:38: ISAKMP: (5912): process of first contact.
    dropping existing phase 1 and 2 with 95.6 local... 93.73.161.229 remote remote port 4500
    234309: * 3 Feb 18:53:38: ISAKMP: (5912): node-893966165 error suppression FALSE reason 'informational (en) State 1.
    234310: * 3 Feb 18:53:38: ISAKMP: (5912): entry = IKE_MESG_FROM_PEER, IKE_INFO_NOTIFY
    234311: * 3 Feb 18:53:38: ISAKMP: (5912): former State = new State IKE_P1_COMPLETE = IKE_P1_COMPLETE

    234312: * 3 Feb 18:53:38: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
    234313: * 3 Feb 18:53:39: % s-6-IPACCESSLOGRL: registration of limited or missed rates 150 packages of access list
    234314: * 3 Feb 18:53:39: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
    234315: * 3 Feb 18:53:39: ISAKMP: node set-1224389198 to QM_IDLE
    234316: * 3 Feb 18:53:39: crypto_engine: package to decipher IKE
    234317: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
    234318: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
    234319: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    234320: * 3 Feb 18:53:39: ISAKMP: (5912): HASH payload processing. Message ID =-1224389198
    234321: * 3 Feb 18:53:39: ISAKMP: (5912): treatment ITS payload. Message ID =-1224389198
    234322: * 3 Feb 18:53:39: ISAKMP: (5912): proposal of IPSec checking 1
    234323: * 3 Feb 18:53:39: ISAKMP: turn 1, ESP_3DES
    234324: * 3 Feb 18:53:39: ISAKMP: attributes of transformation:
    234325: * 3 Feb 18:53:39: ISAKMP: type of life in seconds
    234326: * 3 Feb 18:53:39: ISAKMP: life of HIS (basic) of 28800
    234327: * 3 Feb 18:53:39: ISAKMP: program is 61444 (Transport-UDP)
    234328: * 3 Feb 18:53:39: ISAKMP: authenticator is HMAC-SHA
    234329: * 3 Feb 18:53:39: CryptoEngine0: validate the proposal
    234330: * 3 Feb 18:53:39: ISAKMP: (5912): atts are acceptable.
    234331: * 3 Feb 18:53:39: IPSEC (validate_proposal_request): part #1 of the proposal
    (Eng. msg key.) Local INCOMING = 95.6..., distance = 93.73.161.229,.
    local_proxy = 95.6.../255.255.255.255/17/1701 (type = 1),
    remote_proxy = 93.73.161.229/255.255.255.255/17/0 (type = 1),
    Protocol = ESP, transform = esp-3des esp-sha-hmac (UDP Transport),
    lifedur = 0 and 0kb in
    SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 0
    234332: * 3 Feb 18:53:39: map_db_find_best found no corresponding card
    234333: * 3 Feb 18:53:39: ISAKMP: (5912): processing NONCE payload. Message ID =-1224389198
    234334: * 3 Feb 18:53:39: ISAKMP: (5912): payload ID for treatment. Message ID =-1224389198
    234335: * 3 Feb 18:53:39: ISAKMP: (5912): payload ID for treatment. Message ID =-1224389198
    234336: * 3 Feb 18:53:39: ISAKMP: (5912): ask 1 spis of ipsec
    234337: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_PEER, IKE_QM_EXCH
    234338: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_READY = IKE_QM_SPI_STARVE
    234339: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
    234340: * 3 Feb 18:53:39: IPSEC (spi_response): spi getting 834762579 for SA
    of 95.6... to 93.73.161.229 for prot 3
    234341: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
    234342: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    234343: * 3 Feb 18:53:39: crypto_engine: create Security Association IPSec (by QM)
    routerindc #.
    234344: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IPSEC_KEY_CREATE (hw) (ipsec)
    234345: * 3 Feb 18:53:39: crypto_engine: create Security Association IPSec (by QM)
    234346: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IPSEC_KEY_CREATE (hw) (ipsec)
    234347: * 3 Feb 18:53:39: ISAKMP: (5912): establishing IPSec security associations
    234348: * 3 Feb 18:53:39: from 93.73.161.229 to 95.6 SA... (f / i) 0 / 0
    (93.73.161.229 to 95.6 proxy...)
    234349: * 3 Feb 18:53:39: spi 0x31C17753 and id_conn a 0
    234350: * 3 Feb 18:53:39: life of 28800 seconds
    234351: * 3 Feb 18:53:39: ITS 95.6 outgoing... to 93.73.161.229 (f / i) 0/0
    (proxy 95.6... to 93.73.161.229)
    234352: * 3 Feb 18:53:39: spi 0x495A4BD and id_conn a 0
    234353: * 3 Feb 18:53:39: life of 28800 seconds
    234354: * 3 Feb 18:53:39: crypto_engine: package to encrypt IKE
    234355: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_ENCRYPT (hw) (ipsec)
    234356: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
    234357: * 3 Feb 18:53:39: map_db_find_best found no corresponding card
    234358: * 3 Feb 18:53:39: IPSec: rate allocated for brother 80000273 Flow_switching
    234359: * 3 Feb 18:53:39: IPSEC (policy_db_add_ident): 95.6..., src dest 93.73.161.229, dest_port 4500

    234360: * 3 Feb 18:53:39: IPSEC (create_sa): its created.
    (his) sa_dest = 95.6..., sa_proto = 50.
    sa_spi = 0x31C17753 (834762579).
    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 1165
    234361: * 3 Feb 18:53:39: IPSEC (create_sa): its created.
    (his) sa_dest = 93.73.161.229, sa_proto = 50,.
    sa_spi = 0x495A4BD (76915901).
    sa_trans = sa_conn_id of hmac-sha-esp, esp-3des = 1166
    234362: * 3 Feb 18:53:39: ISAKMP: (5912): lot of 93.73.161.229 sending peer_port my_port 4500 4500 (R) QM_IDLE
    234363: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_IPSEC, IKE_SPI_REPLY
    234364: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_SPI_STARVE = IKE_QM_R_QM2
    234365: * 3 Feb 18:53:39: ISAKMP (0:5912): received 93.73.161.229 packet dport 4500 4500 Global (R) QM_IDLE sport
    234366: * 3 Feb 18:53:39: crypto_engine: package to decipher IKE
    234367: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_DECRYPT (hw) (ipsec)
    234368: * 3 Feb 18:53:39: crypto_engine: hash generate IKE
    234369: * 3 Feb 18:53:39: CryptoEngine0: CRYPTO_ISA_IKE_HMAC (hw) (ipsec)
    routerindc #.
    234370: * 3 Feb 18:53:39: ISAKMP: (5912): node-1224389198 error suppression FALSE reason 'QM (wait).
    234371: * 3 Feb 18:53:39: ISAKMP: (5912): entrance, node-1224389198 = IKE_MESG_FROM_PEER, IKE_QM_EXCH
    234372: * 3 Feb 18:53:39: ISAKMP: (5912): former State = new State IKE_QM_R_QM2 = IKE_QM_PHASE2_COMPLETE
    234373: * 3 Feb 18:53:39: IPSEC (key_engine): had an event of the queue with 1 KMI message (s)
    234374: * 3 Feb 18:53:39: IPSEC (key_engine_enable_outbound): rec would notify of ISAKMP
    234375: * 3 Feb 18:53:39: IPSEC (key_engine_enable_outbound): select SA with spinnaker 76915901/50
    234376: * 3 Feb 18:53:40: IPSEC (epa_des_crypt): decrypted packet has no control of her identity
    routerindc #.
    234377: * 3 Feb 18:53:42: IPSEC (epa_des_crypt): decrypted packet has no control of her identity
    routerindc #.
    234378: * 3 Feb 18:53:44: IPSEC (epa_des_crypt): decrypted packet has no control of her identity

    Also when I connect with the phone, I see HIS Active and IPsec tunnel is mounted, but the wire of time tunnel is down and phone connects.

    I hope that you will help me. Thank you.

    Hi dvecherkin1,

    Who IOS you're running, you could hit the next default.

    https://Tools.Cisco.com/bugsearch/bug/CSCsg34166/?reffering_site=dumpcr

    It may be useful

    -Randy-

    Evaluate the ticket to help others find the answer quickly.

  • What clients VPN Cisco 2811 supports?

    Is the solution of VPN Cisco 2811 locked customers cisco or that market with other brands too?

    Best regards Tommy Svensson

    Hello

    With the correct IOS feature set, it will support IPsec VPN clients. This includes not only the Cisco VPN client but almost any standard IPsec client.

    In addition, if on the 2811 can accept any browser SSL VPN connections, or even use the AnyConnect SSL client.

    It will be useful.

    Federico.

  • Access gui Cisco 2811 v7.0.4 w/AIM-CUE

    Hello

    We are running an older router which works fine for our needs, as indicated in the subject. I am trying to access the graphical interface for the AIM - CUE and am unable to. I can access the ccme.html to the router, but that is not integrated with the function of automatic monitoring, nor there of our current configuration info. I added a route to the QUEUE of the command prompt and I am able to ping and the ip address of the QUEUE to access from a browser, but it points to builtin of the 2811 CCME or CCP. Any help anyone could offer would be greatly appreciated. Thanks in advance for your help. Please find the config for the router and the GUIDE below.

    Router:

    Router#sh running-config

    Building configuration...

    Current configuration : 12555 bytes

    !

    ! Last configuration change at 20:19:49 CDT Sat Oct 26 2013 by GlennP

    ! NVRAM config last updated at 20:06:24 CDT Sat Oct 26 2013 by cmeadmin

    !

    version 15.1

    service timestamps debug datetime msec

    service timestamps log datetime msec

    service password-encryption

    !

    hostname Router

    !

    boot-start-marker

    boot-end-marker

    !

    logging discriminator ENV severity drops 4 facility drops ENVMON mnemonics drops

    FAN_LOW_RPM

    logging buffered discriminator ENV 4096

    logging console discriminator ENV

    logging monitor discriminator ENV

    enable secret 5 $1$nCKH$KBDP9dCX10xvqP98Ucm5u/

    !

    no aaa new-model

    clock timezone CST -6

    clock summer-time CDT recurring

    !

    dot11 syslog

    ip source-route

    !

    !

    ip cef

    ip dhcp excluded-address 172.22.1.154

    ip dhcp excluded-address 172.22.1.200

    !

    ip dhcp pool Voice

    network 172.22.1.0 255.255.255.0

    default-router 172.22.1.154

    option 150 ip 172.22.1.154

    !

    !

    ip name-server 4.2.2.2

    no ipv6 cef

    multilink bundle-name authenticated

    !

    !

    !

    !

    !

    !

    trunk group FXO

    !

    !

    !

    !

    voice hunt-group 1 parallel

    list 101,102,103,104,105,106,107

    timeout 60

    pilot 200

    !

    !

    !

    !

    !

    voice-card 0

    !

    !

    crypto pki trustpoint TP-self-signed-4121280238

    enrollment selfsigned

    subject-name cn=IOS-Self-Signed-Certificate-4121280238

    revocation-check none

    rsakeypair TP-self-signed-4121280238

    !

    !

    crypto pki certificate chain TP-self-signed-4121280238

    certificate self-signed 02

    3082023E 308201A7 A0030201 02020102 300D0609 2A864886 F70D0101 04050030

    31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274

    69666963 6174652D 34313231 32383032 3338301E 170D3133 31303237 30313035

    34375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649

    4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31323132

    38303233 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281

    8100C0A7 8EB7F49F C57776E1 9CD28DF9 F3EDF876 BB02405F 1DF7B345 319C419A

    23C7D891 28F496B4 675D290C 60FAE2F4 6730D680 655DD0B5 61E64C72 2B73599A

    A5567091 499FD933 646168FD 4E730B8C C1079AC5 7327B695 10ED4D76 2D931584

    DDA2B93B 6681E10D C82F2ABB 9DB055C8 D157EACE AB19335C B172C3E3 D8EF8452

    34E90203 010001A3 66306430 0F060355 1D130101 FF040530 030101FF 30110603

    551D1104 0A300882 06526F75 74657230 1F060355 1D230418 30168014 ADD5749E

    6A87B4CF 22F924BE 400851F6 B9F8412A 301D0603 551D0E04 160414AD D5749E6A

    87B4CF22 F924BE40 0851F6B9 F8412A30 0D06092A 864886F7 0D010104 05000381

    81004F81 D08AC0B6 41AAEA8B 35CAC6AF BC07DBF9 9CA42AF1 782BBCE9 1CBB68B6

    0AD5A177 664FDFA0 079A5C76 29FB06B2 5760445F 8468F04B B6A37A39 32F8F079

    DB6302FE 1792547D 199922B0 907C0CCA 1FD3C322 F7B70E7C 594E96F1 DE283C2A

    B7313614 A028D7FF 96E9F047 79162805 4C1CA86F 0232BF0E 0A0659F5 24B7EEDA D5AE

    quit

    !

    !

    license udi pid CISCO2811 sn FTX1030A49Q

    username cmeadmin privilege 15 password 7 08721D1D5C4854424A

    username GlennP privilege 15 password 7 115A485642435A595C

    !

    !

    no ip ftp passive

    ip ftp source-interface FastEthernet0/0

    ip ftp username cmeadmin

    ip ftp password 7 091F1F5A4C54464753

    !

    !

    !

    !

    !

    interface FastEthernet0/0

    ip address 10.1.1.146 255.255.255.0

    duplex auto

    speed auto

    !

    interface Service-Engine0/0

    ip unnumbered FastEthernet0/1.1

    service-module ip address 172.22.1.155 255.255.255.0

    service-module ip default-gateway 172.22.1.154

    !

    interface FastEthernet0/1

    ip address dhcp

    duplex auto

    speed auto

    !

    interface FastEthernet0/1.1

    encapsulation dot1Q 1 native

    ip address 172.22.1.154 255.255.255.0

    !

    ip forward-protocol nd

    !

    ip http server

    ip http authentication local

    ip http secure-server

    ip http path flash:/gui

    !

    ip route 0.0.0.0 0.0.0.0 10.1.1.30

    ip route 172.22.1.155 255.255.255.255 Service-Engine0/0

    !

    !

    !

    tftp-server flash:phone/7940-7960/P00308000500.bin alias P00308000500.bin

    tftp-server flash:Desktops/320x212x12/CampusNight.png

    tftp-server flash:Desktops/320x212x12/CiscoFountain.png

    tftp-server flash:Desktops/320x212x12/MorroRock.png

    tftp-server flash:Desktops/320x212x12/NantucketFlowers.png

    tftp-server flash:Desktops/320x212x12/TN-CampusNight.png

    tftp-server flash:Desktops/320x212x12/TN-CiscoFountain.png

    tftp-server flash:Desktops/320x212x12/TN-Fountain.png

    tftp-server flash:Desktops/320x212x12/TN-MorroRock.png

    tftp-server flash:Desktops/320x212x12/TN-NantucketFlowers.png

    tftp-server flash:Desktops/320x212x12/Fountain.png

    tftp-server flash:Desktops/320x212x12/CiscoLogo.png

    tftp-server flash:Desktops/320x212x12/TN-CiscoLogo.png

    tftp-server flash:Desktops/320x212x12/List.xml

    tftp-server flash:gui/admin_user.html alias admin_user.html

    tftp-server flash:gui/admin_user.js alias admin_user.js

    tftp-server flash:gui/CiscoLogo.gif alias CiscoLogo.gif

    tftp-server flash:gui/Delete.gif alias Delete.gif

    tftp-server flash:gui/dom.js alias dom.js

    tftp-server flash:gui/downarrow.gif alias downarrow.gif

    tftp-server flash:gui/ephone_admin.html alias ephone_admin.html

    tftp-server flash:gui/logohome.gif alias logohome.gif

    tftp-server flash:gui/normal_user.html alias normal_user.html

    tftp-server flash:gui/normal_user.js alias normal_user.js

    tftp-server flash:gui/Plus.gif alias Plus.gif

    tftp-server flash:gui/sxiconad.gif alias sxiconad.gif

    tftp-server flash:gui/Tab.gif alias Tab.gif

    tftp-server flash:gui/telephony_service.html alias telephony_service.html

    tftp-server flash:gui/uparrow.gif alias uparrow.gif

    tftp-server flash:gui/xml-test.html alias xml-test.html

    tftp-server flash:gui/xml.template alias xml.template

    tftp-server flash:ringtones/Analog1.raw alias Analog1.raw

    tftp-server flash:ringtones/Analog2.raw alias Analog2.raw

    tftp-server flash:ringtones/AreYouThere.raw alias AreYouThere.raw

    tftp-server flash:ringtones/AreYouThereF.raw alias AreYouThereF.raw

    tftp-server flash:ringtones/Bass.raw alias Bass.raw

    tftp-server flash:ringtones/CallBack.raw alias CallBack.raw

    tftp-server flash:ringtones/Chime.raw alias Chime.raw

    tftp-server flash:ringtones/Classic1.raw alias Classic1.raw

    tftp-server flash:ringtones/Classic2.raw alias Classic2.raw

    tftp-server flash:ringtones/ClockShop.raw alias ClockShop.raw

    tftp-server flash:ringtones/DistinctiveRingList.xml alias DistinctiveRingList.xm

    l

    tftp-server flash:ringtones/Drums1.raw alias Drums1.raw

    tftp-server flash:ringtones/Drums2.raw alias Drums2.raw

    tftp-server flash:ringtones/FilmScore.raw alias FilmScore.raw

    tftp-server flash:ringtones/HarpSynth.raw alias HarpSynth.raw

    tftp-server flash:ringtones/Jamaica.raw alias Jamaica.raw

    tftp-server flash:ringtones/KotoEffect.raw alias KotoEffect.raw

    tftp-server flash:ringtones/MusicBox.raw alias MusicBox.raw

    tftp-server flash:ringtones/Piano1.raw alias Piano1.raw

    tftp-server flash:ringtones/Piano2.raw alias Piano2.raw

    tftp-server flash:ringtones/Pop.raw alias Pop.raw

    tftp-server flash:ringtones/Pulse1.raw alias Pulse1.raw

    tftp-server flash:ringtones/Ring1.raw alias Ring1.raw

    tftp-server flash:ringtones/Ring2.raw alias Ring2.raw

    tftp-server flash:ringtones/Ring3.raw alias Ring3.raw

    tftp-server flash:ringtones/Ring4.raw alias Ring4.raw

    tftp-server flash:ringtones/Ring5.raw alias Ring5.raw

    tftp-server flash:ringtones/Ring6.raw alias Ring6.raw

    tftp-server flash:ringtones/Ring7.raw alias Ring7.raw

    tftp-server flash:ringtones/RingList.xml alias RingList.xml

    tftp-server flash:ringtones/Sax1.raw alias Sax1.raw

    tftp-server flash:ringtones/Sax2.raw alias Sax2.raw

    tftp-server flash:ringtones/Vibe.raw alias Vibe.raw

    tftp-server flash:phone/7940-7960/P00308000500.loads alias P00308000500.loads

    tftp-server flash:phone/7940-7960/P00308000500.sb2 alias P00308000500.sb2

    tftp-server flash:phone/7940-7960/P00308000500.sbn alias P00308000500.sbn

    tftp-server flash:phone/7941-7961/apps41.8-4-1-23.sbn alias apps41.8-4-1-23.sbn

    tftp-server flash:phone/7941-7961/cnu41.8-4-1-23.sbn alias cnu41.8-4-1-23.sbn

    tftp-server flash:phone/7941-7961/cvm41sccp.8-4-1-23.sbn alias cvm41sccp.8-4-1-2

    3.sbn

    tftp-server flash:phone/7941-7961/dsp41.8-4-1-23.sbn alias dsp41.8-4-1-23.sbn

    tftp-server flash:phone/7941-7961/jar41sccp.8-4-1-23.sbn alias jar41sccp.8-4-1-2

    3.sbn

    tftp-server flash:phone/7941-7961/SCCP41.8-4-2S.loads alias SCCP41.8-4-2S.loads

    tftp-server flash:phone/7941-7961/term41.default.loads alias term41.default.load

    s

    tftp-server flash:phone/7941-7961/term61.default.loads alias term61.default.load

    s

    tftp-server flash:CP7905080002SCCP060817A.zup

    tftp-server flash:CP7912080003SCCP070409A.sbin

    tftp-server flash:ATA030204SCCP090202A.zup

    tftp-server exit

    tftp-server music-on-hold.au

    tftp-server enable

    !

    control-plane

    !

    !

    voice-port 0/3/0

    trunk-group FXO

    no battery-reversal

    no comfort-noise

    connection plar 300

    description 715833XXXX

    caller-id enable

    !

    voice-port 0/3/1

    trunk-group FXO

    no battery-reversal

    no comfort-noise

    connection plar 300

    description 715833YYYY

    caller-id enable

    !

    voice-port 0/3/2

    trunk-group FXO

    no battery-reversal

    no comfort-noise

    connection plar 300

    description 715833AAAA

    caller-id enable

    !

    voice-port 0/3/3

    !

    !

    !

    !

    dial-peer voice 100 pots

    trunkgroup FXO

    destination-pattern 9.T

    !

    dial-peer voice 800 voip

    description VM

    destination-pattern 800

    session protocol sipv2

    session target ipv4:172.22.1.155

    dtmf-relay rtp-nte

    codec g711ulaw

    no vad

    !

    dial-peer voice 300 voip

    description Sterling AA

    destination-pattern 300

    session protocol sipv2

    session target ipv4:172.22.1.155

    dtmf-relay rtp-nte

    codec g711ulaw

    no vad

    !

    !

    sip-ua

    mwi-server ipv4:172.22.1.155 expires 86400 port 5060 transport u

    !

    !

    telephony-service

    no auto-reg-ephone

    max-ephones 40

    max-dn 100

    ip source-address 172.22.1.154 port 2000

    timeouts interdigit 3

    system message Sterling Optical #258

    load 7960-7940 P00308000500

    dialplan-pattern 1 . extension-length 3

    voicemail 800

    max-conferences 8 gain -6

    call-park system application

    moh flash:/music-on-hold.au

    multicast moh 239.10.16.1 port 2000

    web admin system name admin password cisco

    dn-webedit

    time-webedit

    transfer-system full-consult

    secondary-dialtone 9

    fac custom dpark-retrieval *00

    create cnf-files version-stamp 7960 Apr 15 2013 22:15:20

    !

    !

    ephone-dn  1

    !

    !

    ephone-dn  11  dual-line

    number 101

    name Front 1

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  12  dual-line

    number 102

    name Front 2

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  13

    number 103

    name Front 3

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  14

    number 104

    name Exam Room

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  15

    number 105

    name Screening Area

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  16

    number 106

    name Lab

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  17

    number 107

    name Insurance Office

    call-forward busy 800

    call-forward noan 800 timeout 10

    mwi sip

    !

    !

    ephone-dn  18

    number 108

    name 7940

    !

    !

    ephone-dn  19

    number 109

    name Spare1

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  20

    number 110

    name spare2

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  21

    number 111

    name Spare1

    call-forward busy 800

    call-forward noan 800 timeout 70

    !

    !

    ephone-dn  30

    number 201

    label General VM

    description General VM

    call-forward all 800

    hold-alert 30 originator

    !

    !

    ephone-dn  77

    number 777

    park-slot timeout 300 limit 2 recall

    description Call Park Slot

    !

    !

    ephone-dn  88

    number 888

    park-slot timeout 300 limit 2 recall

    description Call Park Slot

    !

    !

    ephone-dn  99

    number 000

    mwi off

    !

    !

    ephone-dn  100

    number 001

    mwi on

    !

    !

    ephone  1

    mac-address 0015.62EA.5C58

    username "frontdesk1" password cisco

    type 7960

    button  1:11

    !

    !

    !

    ephone  2

    mac-address 0015.62B5.DBF6

    username "frontdesk2" password cjp44206

    type 7960

    button  1:12

    !

    !

    !

    ephone  3

    mac-address 0007.855C.853F

    type 7940

    button  1:13

    !

    !

    !

    ephone  4

    mac-address 0017.E001.0940

    type 7940

    button  1:14

    !

    !

    !

    ephone  5

    mac-address 0007.8553.2B3C

    type 7940

    button  1:15

    !

    !

    !

    ephone  6

    mac-address 0015.C614.A1D1

    type 7940

    button  1:16

    !

    !

    !

    ephone  7

    mac-address 0015.F9EC.1EED

    username "insurance" password 1234

    type 7940

    button  1:17

    !

    !

    !

    ephone  9

    !

    !

    !

    ephone  10

    mac-address 0007.8553.2E74

    type 7940

    button  1:20

    !

    !

    !

    ephone  11

    mac-address 0019.E855.7616

    type 7940

    button  1:21

    !

    !

    !

    line con 0

    line aux 0

    line 194

    no activation-character

    no exec

    transport preferred none

    transport input all

    transport output pad telnet rlogin lapb-ta mop udptn v120 ssh

    line vty 0 4

    login local

    transport input telnet ssh

    transport output telnet ssh

    !

    scheduler allocate 20000 1000

    ntp master 6

    ntp peer 69.164.217.193

    ntp peer 204.9.136.253

    end

    CUE:

    Router#service-module service-Engine 0/0 sess

    Trying 172.22.1.154, 2194 ... Open

    AIM-CUE#

    AIM-CUE# sh running-config

    Generating configuration:

    clock timezone America/Chicago

    hostname AIM-CUE

    line console

    exit

    system language preferred "en_US"

    ip name-server 4.2.2.2 4.2.2.3

    ntp server 172.22.1.154 prefer

    software download server url "ftp://127.0.0.1/ftp" credentials hidden "6u/dKTN/h

    sEuSAEfw40XlF2eFHnZfyUTSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfG

    WTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmP"

    site name local

    site-hostname 172.22.1.154

    web credentials hidden "c9yem6kD1vJqrOHVxftjAknfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0n

    fGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmP"

    end site

    privilege ViewHistoricalReports create

    privilege manage-users create

    privilege manage-passwords create

    privilege ViewRealTimeReports create

    privilege local-broadcast create

    privilege broadcast create

    privilege vm-imap create

    privilege ManagePublicList create

    privilege ViewPrivateList create

    privilege ManagePrompts create

    groupname staff create

    groupname Broadcasters create

    username GlennP create

    username insurance create

    username admin create

    username cisco create

    privilege ViewHistoricalReports description "Privilege to view historical report

    s"

    privilege manage-users description "Privilege to create, modify, and delete user

    s and groups"

    privilege manage-passwords description "Privilege to reset user passwords"

    privilege ViewRealTimeReports description "Privilege to view realtime reports"

    privilege local-broadcast description "Privilege to send local broadcast message

    s"

    privilege broadcast description "Privilege to send local or remote broadcast mes

    sages"

    privilege vm-imap description "Privilege to manage personal voicemail via IMAP c

    lient"

    privilege ManagePublicList description "Privilege to manage public lists"

    privilege ViewPrivateList description "Privilege to view private list"

    privilege ManagePrompts description "Privilege to create, modify, or delete syst

    em prompts"

    privilege ViewHistoricalReports operation report.historical.view

    privilege manage-users operation user.configuration

    privilege manage-users operation user.mailbox

    privilege manage-users operation user.password

    privilege manage-users operation user.remote

    privilege manage-users operation user.pin

    privilege manage-users operation system.debug

    privilege manage-users operation user.notification

    privilege manage-users operation group.configuration

    privilege manage-passwords operation user.password

    privilege manage-passwords operation user.pin

    privilege manage-passwords operation system.debug

    privilege ViewRealTimeReports operation report.realtime

    privilege local-broadcast operation broadcast.local

    privilege local-broadcast operation system.debug

    privilege broadcast operation broadcast.local

    privilege broadcast operation system.debug

    privilege broadcast operation broadcast.remote

    privilege vm-imap operation voicemail.imap.user

    privilege ManagePublicList operation voicemail.lists.public

    privilege ManagePublicList operation system.debug

    privilege ViewPrivateList operation voicemail.lists.private.view

    privilege ManagePrompts operation prompt.modify

    privilege ManagePrompts operation system.debug

    groupname Administrators member admin

    groupname Administrators member cisco

    groupname Broadcasters member admin

    groupname staff privilege broadcast

    groupname staff privilege local-broadcast

    groupname Broadcasters privilege broadcast

    groupname staff phonenumber "201"

    username insurance phonenumber "107"

    username GlennP supervisor designate

    restriction msg-notification create

    restriction msg-notification min-digits 1

    restriction msg-notification max-digits 30

    restriction msg-notification dial-string preference 1 pattern * allowed

    backup server url "ftp://127.0.0.1/ftp" credentials hidden "EWlTygcMhYmjazXhE/VN

    XHCkplVV4KjescbDaLa4fl4WLSPFvv1rWUnfGWTYHfmPSd8ZZNgd+Y9J3xlk2B35j0nfGWTYHfmPSd8Z

    ZNgd+Y9J3xlk2B35j0nfGWTYHfmP"

    calendar biz-schedule sterling_open

    closed day 1 from 00:00 to 24:00

    open day 2 from 10:00 to 18:00

    open day 3 from 10:00 to 20:00

    open day 4 from 10:00 to 18:00

    open day 5 from 10:00 to 20:00

    open day 6 from 10:00 to 18:00

    open day 7 from 09:00 to 17:00

    end schedule

    calendar biz-schedule systemschedule

    open day 1 from 00:00 to 24:00

    open day 2 from 00:00 to 24:00

    open day 3 from 00:00 to 24:00

    open day 4 from 00:00 to 21:00

    open day 4 from 22:00 to 24:00

    open day 5 from 00:00 to 24:00

    open day 6 from 00:00 to 24:00

    open day 7 from 00:00 to 24:00

    end schedule

    ccn application autoattendant aa

    description "Sterling Auto-Attendant"

    enabled

    maxsessions 4

    script "aa.aef"

    parameter "busClosedPrompt" "AABusinessClosed.wav"

    parameter "holidayPrompt" "AAHolidayPrompt.wav"

    parameter "welcomePrompt" "AAWelcome.wav"

    parameter "disconnectAfterMenu" "false"

    parameter "dialByFirstName" "false"

    parameter "allowExternalTransfers" "false"

    parameter "MaxRetry" "3"

    parameter "dialByExtnAnytime" "false"

    parameter "busOpenPrompt" "AABusinessOpen.wav"

    parameter "businessSchedule" "systemschedule"

    parameter "dialByExtnAnytimeInputLength" "4"

    parameter "operExtn" "1001"

    end application

    ccn application ciscomwiapplication aa

    description "ciscomwiapplication"

    enabled

    maxsessions 6

    script "setmwi.aef"

    parameter "CallControlGroupID" "0"

    parameter "strMWI_OFF_DN" "8001"

    parameter "strMWI_ON_DN" "8000"

    end application

    ccn application msgnotification aa

    description "msgnotification"

    enabled

    maxsessions 6

    script "msgnotify.aef"

    parameter "logoutUri" "http://localhost/voicemail/vxmlscripts/mbxLogout.jsp"

    parameter "DelayBeforeSendDTMF" "1"

    end application

    ccn application promptmgmt aa

    description "promptmgmt"

    enabled

    maxsessions 1

    script "promptmgmt.aef"

    end application

    ccn application sterlingaa aa

    description "sterlingaa"

    enabled

    maxsessions 6

    script "sterlingaa.aef"

    parameter "Sterling_Sched" "sterling_open"

    parameter "Sterling_Hunt" "200"

    end application

    ccn application voicemail aa

    description "Sterling Voicemail by RhinoIT"

    enabled

    maxsessions 4

    script "voicebrowser.aef"

    parameter "logoutUri" "http://localhost/voicemail/vxmlscripts/mbxLogout.jsp"

    parameter "uri" "http://localhost/voicemail/vxmlscripts/login.vxml"

    end application

    ccn engine

    end engine

    ccn reporting historical

    database local

    description "se-10-1-1-6"

    end reporting

    ccn subsystem sip

    gateway address "172.22.1.154"

    mwi envelope-info

    mwi sip sub-notify

    end subsystem

    ccn trigger http urlname msgnotifytrg

    application "msgnotification"

    enabled

    maxsessions 2

    end trigger

    ccn trigger http urlname mwiapp

    application "ciscomwiapplication"

    enabled

    maxsessions 1

    end trigger

    ccn trigger sip phonenumber 2000

    application "voicemail"

    enabled

    maxsessions 4

    end trigger

    ccn trigger sip phonenumber 300

    application "sterlingaa"

    enabled

    maxsessions 6

    end trigger

    ccn trigger sip phonenumber 800

    application "voicemail"

    enabled

    maxsessions 6

    end trigger

    service phone-authentication

    end phone-authentication

    service voiceview

    enable

    end voiceview

    voicemail callerid

    voicemail broadcast recording time 300

    voicemail default messagesize 240

    voicemail notification restriction msg-notification

    voicemail mailbox owner "admin" size 775

    description "admin mailbox"

    end mailbox

    voicemail mailbox owner "insurance" size 775

    description "insurance mailbox"

    end mailbox

    end

    -Pat

    Is not clear what you mean. IP of CUe should put CUE GUI.

  • What IOS supports LLDP for router cisco 2811

    Hi, we run 12.4 T11 (13r) and we are not able to activate LLDP because it is not supported, could you please help in what IOS it is supported.

    model of router is 2811

    Thank you

    Anas,

    Your best friend looking for the feature that is supported on the platform and IOS would be:

    http://Tools.Cisco.com/ITDIT/CFN/

    And this IOS you have does not support LLDP.

    HTH

    Concerning

    Reem

    * Please note all useful messages.

  • VWIC3-1MFT-T1/E1, showing no recorded in CUCM 10.5

    Hello

    I am trying to record E1 and FXO 8 with CUCM 10.5 using mgcp. FXOs are recorded in CUCM but not E1, it shows not registered. I have attached the configuration of the gateway and the CUCM screenshot. I use the software REL C2900, Cisco IOS Software (C2900-UNIVERSALK9-M), T3 Version 15.4 (1)
    EASY SOFTWARE. Please let me if there is no error in my configuration.

    AD_Voice_GW #show ccm-Manager
    MGCP domain name: AD_Voice_GW
    Host of priority status
    ============================================================
    Registered primary 10.20.13.9
    First backup ready 10.20.13.8
    Second backup none

    Current active call manager: 10.20.13.9
    Backhaul/redundant link port: 2428
    Failover interval: 30 seconds
    KeepAlive interval: 15 seconds
    Last keepalive sent: 14:39:48 GMT April 10, 2015 (duration: 00:00:12)
    )
    MGCP traffic last time: 14:39:48 GMT April 10, 2015 (duration: 00:00:12)
    )
    Last failover time: None
    Last hour switchback: None
    Switchback lifestyle: graceful
    MGCP rescue mode: unchecked
    Start time of last backup MGCP: None
    Last backup MGCP end time: None
    MGCP download ringtones: disabled
    TFTP retry count to close Ports: 2

    Backhaul link info:
    The link protocol: TCP
    Remote Port number: 2428
    Remote IP address: 10.20.13.9
    Current link status: OPEN
    Statistics:
    Recvd packages: 1
    Recv failures: 0
    Xmitted of packets: 2
    Xmit failures: 0
    PRI ports in return:
    Slot 0, VIC 0, port 0
    Automatic download of configuration information
    =======================================
    The current version id: 1428657466-23cb555c-fb36-457e-81fa-58438df308d4
    Last downloaded-config: 00:00:00
    Current situation: waiting for orders
    Configuration of download statistics:
    Download tried: 1
    Successful upload: 1
    Download failed: 0
    TFTP download failed: 0
    Configuration has attempted: 1
    Successful configuration: 1
    Setup Failed (Parsing): 0
    Configuration (config) Failed: 0
    Last command upload config: new registration
    FAX mode: disable
    History of configuration error:
    AD_Voice_GW #.

    ==============================================================================

    D_Voice_GW #show ISDN status
    Global ISDN Switchtype = primary-net5

    %Q.931 is back at CCM MANAGER 0 x 0003 lis 0. Out of layer 3 can not appl
    There

    ISDN Serial0/0/0: interface 15
    DSL 0, the interface ISDN Switchtype = primary-net5
    L2 Protocol = 0x0000 L3 = MANAGER of CCM protocols Q.921 0 x 0003
    Layer 1 status:
    SHUTDOWN
    Status of layer 2:
    TEI = 0, CES = 1, SAPI = 0, status = TEI_ASSIGNED
    Status of layer 3:
    0 active Layer 3 call (s)
    CCBs active dsl 0 = 0
    The free channel mask: 0x00000000
    Number of L2 ignores = 0, ID of Session L2 = 0
    Total allocated ISDN TSC = 0
    AD_Voice_GW #.

    =====================================================================================

    AD_Voice_GW #show mgcp endpoint

    E1 0/0/0 interface

    GIS-TYPE V-PORT ADMIN ENDPOINT NAME
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_G: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place
      [email protected]/ * / 0/0/0 _Voice_: 15 place

    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW
    [email protected]/ * / _Voice_GW

    AD_Voice_GW #.

    Since ISDN layer 1 was showing as Deactivated/Shutdown, crc4 framing so could cause.

    regds,

    Aman

  • Radio card of Cisco 2811 router wireless

    Hello

    Is it possible to configure the card wireless in a router as a customer to use another radio as gateway?

    The situation is that I need to set up Internet access temporary to query users on a local network cable but have no Internet connectivity. I have a Novatel MiFi, which allows Internet connectivity which I want the radio on the router to connect to. In this case, the radio will be more than one client or a bridge.

    Thanks for any input.

    Vincent

    The answer is no. Cisco access points using the Protocol IAPP talk to each other... Cisco with Non-cisco, we cannot communicate...

    Let me know if that answers your question...

    Concerning
    Surendra
    ====
    Please do not forget to note positions that answered your question and mark as answer or was useful

  • Cisco 2811 with NME-AIR-WLC6-K9 wireless module?

    Hello.

    I'm setting up a WLAN and wanted som to comment on certain things. I understand that NME-AIR-WLC6-K9 standard 802.11n support, I was hoping someone could confirm. Is that also to the NME-AIR-WLC6-K9 kan module be configured such that all the accesspoints can broadcast multiple SSID, say 10-15 SSID and each access point that I put in place allows to broadcast the same.

    Best regards Tommy Svensson

    Hello

    T1 > I understand that NME-AIR-WLC6-K9 standard 802.11n support, I was hoping someone could confirm

    1 YEARS > Yes it supports N, unless you have a N speeds taken APs supported as 1142, 1252, 3500, 1040, 1260.

    Q2 > is it also for the NME-AIR-WLC6-K9 kan module be configured such that all the accesspoints can broadcast multiple SSID, say 10-15 SSID and that each access point I put in place allows to broadcast the same.

    ANS2 > Yes we can broadcast multiple SSID with... However each counter can broadcast only 16 SSID, so if you have more than 16 SSID then you must configure the grouping AP or override Wlan function to achieve.

    Let me know if that answers your question...

    Concerning
    Surendra
    ====
    Please do not forget to note positions that answered your question and mark as answer or was useful

  • PPTP VPN on a Cisco 2811

    Hi guys,.

    Can someone please advise what I'm doing wrong? I'm currently testing one of our routers to use the pptp VPN Protocol.

    Please find below the config:

    VPDN enable
    !
    VPDN-Group 1
    ! PPTP by default VPDN group
    accept-dialin
    Pptp Protocol
    virtual-model 1
    tunnel L2TP non-session timeout 15

    interface virtual-Template1
    IP nat inside
    IP virtual-reassembly
    POOL_IP of the peer default ip address pool
    No keepalive
    PPP encryption mppe auto
    PPP authentication ms-chap-v2, ms-chap
    !
    !
    local IP POOL_IP 192.168.42.50 pool 192.168.42.100

    debugging running I get this:

    NTCSYD2 #sh debugging
    PPP:
    Debugging PPP authentication is on
    PPP protocol errors debug is on
    Negotiation of Protocol PPP debug is on

    NTCSYD2 #.
    * 23:43:21.855 Jan 18: PPP: Alloc context [4670 550]
    * 23:43:21.859 Jan 18: ppp8 PPP: Phase is
    * 23:43:21.859 Jan 18: ppp8 PPP: via vpn, set the direction of the call
    * 23:43:21.859 Jan 18: ppp8 PPP: treatment of connection as a callin
    * 23:43:21.859 Jan 18: ppp8 PPP: Session Session handle [8] id [8]
    * Jan 18 23:43:21.859: ppp8 TPIF: State of the event [OPEN] [initial check]
    * 23:43:21.859 Jan 18: ppp8 PPP LCP: switch to passive mode, State [stopped]
    * Jan 18 23:43:22.203: ppp8 TPIF: I CONFREQ [order] id 0 len 21
    * Jan 18 23:43:22.207: ppp8 TPIF: MRU 1400 (0 x 01040578)
    * Jan 18 23:43:22.207: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
    * Jan 18 23:43:22.207: ppp8 TPIF: PFC (0 x 0702)
    * Jan 18 23:43:22.207: ppp8 TPIF: RAC (0 x 0802)
    * Jan 18 23:43:22.207: ppp8 TPIF: reminder 6 (0x0D0306)
    * Jan 18 23:43:22.207: ppp8 TPIF: O CONFREQ [order] id 1 len 15
    * Jan 18 23:43:22.207: ppp8 TPIF: AuthProto MS-CHAP-V2 (0x0305C22381)
    * Jan 18 23:43:22.207: ppp8 TPIF: MagicNumber 0x3710B12D (0x05063710B12D)
    * Jan 18 23:43:22.207: ppp8 TPIF: O [order] CONFREJ id 0 len 7
    * Jan 18 23:43:22.207: ppp8 TPIF: reminder 6 (0x0D0306)
    * Jan 18 23:43:22.207: ppp8 TPIF: State of the event [receive ConfReq-] [arrested at REQsent
    ]
    * Jan 18 23:43:22.211: ppp8 TPIF: I CONFACK [REQsent] id 1 len 15
    * Jan 18 23:43:22.211: ppp8 TPIF: AuthProto MS-CHAP-V2 (0x0305C22381)
    * Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x3710B12D (0x05063710B12D)
    * Jan 18 23:43:22.211: ppp8 TPIF: State of the event [receive ConfAck] [REQsent to ACKrcvd]
    * Jan 18 23:43:22.211: ppp8 TPIF: I CONFREQ [ACKrcvd] id 1 len 18
    * Jan 18 23:43:22.211: ppp8 TPIF: MRU 1400 (0 x 01040578)
    * Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
    * Jan 18 23:43:22.211: ppp8 TPIF: PFC (0 x 0702)
    * Jan 18 23:43:22.211: ppp8 TPIF: RAC (0 x 0802)
    * Jan 18 23:43:22.211: ppp8 TPIF: O CONFNAK [ACKrcvd] id 1 len 8
    * Jan 18 23:43:22.211: ppp8 TPIF: MRU 1500 (0x010405DC)
    * Jan 18 23:43:22.211: ppp8 TPIF: State of the event [receive ConfReq-] [ACKrcvd to ACKrcvd
    ]
    * Jan 18 23:43:22.211: ppp8 TPIF: I CONFREQ [ACKrcvd] id 2 len 18
    * Jan 18 23:43:22.211: ppp8 TPIF: MRU 1400 (0 x 01040578)
    * Jan 18 23:43:22.211: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
    * Jan 18 23:43:22.211: ppp8 TPIF: PFC (0 x 0702)
    * Jan 18 23:43:22.211: ppp8 TPIF: RAC (0 x 0802)
    * Jan 18 23:43:22.215: ppp8 TPIF: O CONFNAK [ACKrcvd] id 2 len 8
    * Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
    * Jan 18 23:43:22.215: ppp8 TPIF: State of the event [receive ConfReq-] [ACKrcvd to ACKrcvd
    ]
    * Jan 18 23:43:22.215: ppp8 TPIF: I CONFREQ [ACKrcvd] id 3 len 18
    * Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
    * Jan 18 23:43:22.215: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
    * Jan 18 23:43:22.215: ppp8 TPIF: PFC (0 x 0702)
    * Jan 18 23:43:22.215: ppp8 TPIF: RAC (0 x 0802)
    * Jan 18 23:43:22.215: ppp8 TPIF: O CONFACK [ACKrcvd] id 3 len 18
    * Jan 18 23:43:22.215: ppp8 TPIF: MRU 1500 (0x010405DC)
    * Jan 18 23:43:22.215: ppp8 TPIF: MagicNumber 0x48C56584 (0x050648C56584)
    * Jan 18 23:43:22.215: ppp8 TPIF: PFC (0 x 0702)
    * Jan 18 23:43:22.215: ppp8 TPIF: RAC (0 x 0802)
    * Jan 18 23:43:22.219: ppp8 TPIF: State of the event [receive ConfReq +] [ACKrcvd to open]
    * Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 4 len 18 magic 0x48C56584MS
    RASV5.20
    * Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 5 len 20 magic 0x48C56584MS
    RAS-0-MIS4
    * Jan 18 23:43:22.219: ppp8 TPIF: I IDENTIFY [open] id 6 len 24 magic 0x48C56584qY
    GSQK'IGC 'xKt6e '.
    * 23:43:22.239 Jan 18: ppp8 PPP: Phase is AUTHENTICATING,
    * 23:43:22.239 Jan 18: ppp8 MS-CHAP-V2: O CHALLENGE id 1 len 28 of 'NTCSYD2 '.
    * Jan 18 23:43:22.239: ppp8 TPIF: State is open
    * 23:43:22.243 Jan 18: ppp8 MS-CHAP-V2: I ANSWER id 1 len 67 of "administrateu".
    r '.
    * 23:43:22.243 Jan 18: ppp8 PPP: Phase TRANSFER, tempting with impatience
    * 23:43:22.247 Jan 18: ppp8 PPP: Phase is AUTHENTICATING, unauthenticated user
    * 23:43:22.247 Jan 18: ppp8 PPP: request sent MSCHAP_V2 LOGIN
    * 23:43:22.251 Jan 18: ppp8 PPP: received LOGIN response FAIL
    * 23:43:22.255 Jan 18: ppp8 MS-CHAP-V2: FAILURE O id 1 len 13 msg's 'E = 691 R = 0 '.
    * 23:43:22.255 Jan 18: ppp8 PPP DISC: the user has no MSCHAP V2 authentication
    * 23:43:22.255 Jan 18: ppp8 PPP: sending Acct event [low] id [2a]
    * Jan 18 23:43:22.255: ppp8 TPIF: O TERMREQ [open] id 2 len 4
    * Jan 18 23:43:22.255: ppp8 TPIF: event [CLOSE] State [Open for closure]
    * 23:43:22.255 Jan 18: ppp8 PPP: Phase ENDS
    * Jan 18 23:43:22.259: ppp8 TPIF: I TERMACK [closing] id 2 len 4
    * Jan 18 23:43:22.259: ppp8 TPIF: State of the event [TermAck receive] [closing closed]
    * Jan 18 23:43:22.259: ppp8 TPIF: event [DOWN] [closed on Initial]
    * 23:43:22.259 Jan 18: ppp8 PPP: Phase is BROKEN

    Any help would be appreciated extremelly.

    See you soon,.

    Fabio

    It seems that users are unable to authenticate. What do you use to authenticate users?  You have a pool of default aaa authentication which checks the ms-chap-v2 user names against RADIUS via AD?

  • Cisco 2811 compatibility for VPN

    Hello

    I have an existing direct router which is at present not manage the VPN.

    It is necessary to add VPN service to it and I'm trying to find the match for her.

    The router is

    PID: CISCO2811

    and the IOS operating system on it

    c2800nm-spservicesk9 - mz.124 - 24.T3.bin

    There not all DRY beams inside.

    Can you please let me know if I need to Exchange on the router with one of those with the beams of SEC to establish a VPN on it?

    Thank you very much

    Kone

    Hi, you will need to upgrade image to

    c2800nm-adventerprisek9 or c2800nm-adsecurityk9

    * Do note of useful messages *.

  • UC540 compatibility with card VWIC3?

    Hi all

    We have a customer using a UC540W-BIS-K9. They move from their office and improve their current ranges from 2xBRI to 1xE1 in order to have 30 channels.

    as you all know, the VWIC2-1MFT-T1/E1 = is now EoL/EoS. Will be the new model VWIC3-1MFT-T1/E1 = be completely cared for and compatible with our

    UC540W-BIS-K9? It is running

    Version of the software is a bit old but...

    !!!!!

    Cisco IOS software, software UC500 (UC500-ADVIPSERVICESK9-M), Version 15.1 (2) T4, RELEASE SOFTWARE (fc1)

    Technical support: http://www.cisco.com/techsupport

    Copyright (c) 1986-2011 by Cisco Systems, Inc.

    Updated Wednesday, July 12, 11 22:01 by prod_rel_team

    ROM: System Bootstrap, Version 12.4 SB (24r), RELEASE SOFTWARE (fc1)

    The availability of KFL-UC-01 is 26 weeks, 4 days, 14 hours, 11 minutes

    System to regain the power ROM

    System restarted at 22:33:37 THIS Thursday, July 12, 2012

    System image file is "flash: uc500-advipservicesk9 - mz.151 - 2.T4.

    !!!!!

    Thanks for your advice.

    Hi Hiromichi,

    As per UC540 platform reference guide, VWIC3-1MFT-T1/E1is not supported. VWIC2-1MFT-T1/E1 is the only supported card.

    http://www.Cisco.com/c/en/us/products/collateral/unified-communications/Unity-Express/C78-557768-00_540_platform_reference_guide_DS_v2a.html

    Rate to the post accordinly.

    Kind regards

    Kevin

  • Cisco router some computers were able to access the internet.

    I'm having a weird problem recently that some computers were unable to browse some site. I even try to put in place a different router from cisco (cisco 2811) with IOS version 15.0 and the same configuration but still no luck. Tried to reboot all devices and I also try to use the computer that is having problem to access the web connect directly to the router, but the result is the same. FYI the router being works well for a month a few without this problem. I try to use the inexpensive router like the dlink / tplink and there is no problem. Another piece of information, it's the computer that could not browse some site were able to ping the website, but fail to load in the web browser. 10 computer there are 3 unit have this problem and new features such as my customer/guest computer also were unable to browse some site. There are no firewall or any security in our regard. It makes me crazy!

    My circuit diagram as below;

    WAN-> router (Cisco 2821)-> switch-> computer

    -See the version-

    Cisco IOS software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 12.4 (24) T6, VERSION of the SOFTWARE (fc2)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2011 by Cisco Systems, Inc.
    Updated Wednesday, Aug 23, 11 01:30 by prod_rel_team

    ROM: System Bootstrap, Version 12.4 (13r) T, RELEASE SOFTWARE (fc1)

    Linear_Router uptime is 2 weeks, 3 days, 21 hours, 56 minutes
    System return to the ROM to reload at 12:49:51 MAS Thu Sep 1 2016
    System image file is "flash: c2800nm-adventerprisek9 - mz.124 - 24.T6.bin".

    This product contains cryptographic features and is under the United States
    States and local laws governing the import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third party approval to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. laws and local countries. By using this product you
    agree to comply with the regulations and laws in force. If you are unable
    to satisfy the United States and local laws, return the product.

    A summary of U.S. laws governing Cisco cryptographic products to:
    http://www.Cisco.com/WWL/export/crypto/tool/stqrg.html

    If you need assistance please contact us by mail at
    [email protected] / * /.

    Cisco 2821 (revision 53.51) with 249856K / 12288K bytes of memory.
    Card processor ID FHK1235F3T0
    2 gigabit Ethernet interfaces
    2 interfaces Serial (sync/async)
    1 ATM interface
    1 module of virtual private network (VPN)
    Configuration of DRAM is wide with parity 64-bit capable.
    239K bytes of non-volatile configuration memory.
    1000944K bytes of ATA CompactFlash (read/write)

    Configuration register is 0 x 2102

    -show running-config-

    Building configuration...

    Current configuration: 8378 bytes
    !
    version 12.4
    horodateurs service debug datetime msec
    Log service timestamps datetime localtime
    encryption password service
    !
    hostname Linear_Router
    !
    boot-start-marker
    start the flash system: c2800nm-adventerprisek9 - mz.124 - 24.T6.bin
    boot-end-marker
    !
    forest-meter operation of syslog messages
    logging buffered 16000
    enable password 7
    !
    AAA new-model
    !
    !
    AAA authentication login sdm_vpn_xauth_ml_1 local
    AAA authorization sdm_vpn_group_ml_1 LAN
    !
    !
    AAA - the id of the joint session
    clock timezone 8 MAS
    !
    dot11 syslog
    IP source-route
    !
    !
    IP cef
    No dhcp use connected vrf ip
    dhcp IP 30 binding cleanup interval
    DHCP excluded-address IP 192.168.88.1 192.168.88.141
    DHCP excluded-address IP 192.168.88.180 192.168.88.254
    !
    pool of dhcp IP LAN
    network 192.168.88.0 255.255.255.0
    router by default - 192.168.88.254
    domain losb.local
    Server DNS 8.8.8.8 8.8.4.4
    0 0 15 rental
    !
    !
    IP domain name losb.local
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4

    !
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    !
    voice-card 0
    !
    !
    Crypto pki trustpoint test_trustpoint_config_created_for_sdm
    e subject name =[email protected] / * /
    crl revocation checking
    !
    Crypto pki trustpoint TP-self-signed-3132623275
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 3132623275
    revocation checking no
    rsakeypair TP-self-signed-3132623275
    !
    !
    for the crypto pki certificate chain test_trustpoint_config_created_for_sdm
    TP-self-signed-3132623275 crypto pki certificate chain
    certificate self-signed 01
    30820250 308201B 9 A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
    69666963 33313332 36323332 6174652D 3735301E 170 3134 31323032 31393436
    35385A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 33 31333236 65642D
    32333237 3530819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
    8569B 674 5F07B434 8E5F9D59 D298DB7E 51FBB58A B 460084 9 34AE8461 8100D01A
    471637 C F6CFC65F 9639C1C6 2 50CF9117 D459482F 1EF22E29 322F39AA 88 42306
    F4B6686A 161FDD3D 69B0647B 46FC7CD0 966C03E8 D6CF9181 8E2B3514 300D980B
    EE9225A6 173F7673 655A1DE8 FB720F13 0FD8E550 A7DDB314 50461510 A72C5DBE
    010001A 3 78307630 1 130101 FF040530 030101FF 30230603 0F060355 A1CF0203
    551D 1104 1C301A82 184C696E 6561725F 526F7574 65722E6C 6F73622E 6C6F6361
    23 04183016 8014FA7F D98E6D69 462EEAED 41BEC8D3 7042F812 03551D 6C301F06
    95B3301D 0603551D 0E041604 14FA7FD9 8E6D6946 2EEAED41 BEC8D370 42F81295
    B3300D06 092 HAS 8648 01040500 03818100 043EC1A4 7363A7FD 3AED777D 86F70D01
    CAAEC570 99 HAS 02166 A3958A66 0E5A5DD2 368C2F8B D9A96E69 9F57852C ACE0C67F
    73 D 17753 53BE14C4 824BE043 B8A52822 E38DBC3C C3F33787 813FD207 0AB04004
    E0303A2F 2A3BF5AA 81481429 F53C1EDD 8AC2EC48 D64DF89A 4D047B7C 6B 516970
    55EAFF10 B1453DBD ABC96845 FDF7AAF9 77B8C381
    quit smoking
    !
    !
    password username privilege 15 7 kent
    Archives
    The config log
    hidekeys
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    Configuration group customer crypto isakmp 11
    11 key
    DNS 8.8.8.8 8.8.4.4
    losb.local field
    pool SDM_POOL_1
    ACL 100
    Max-users 11
    ISAKMP crypto sdm-ike-profile-1 profile
    identity group game 11
    client authentication list sdm_vpn_xauth_ml_1
    ISAKMP authorization list sdm_vpn_group_ml_1
    client configuration address respond
    virtual-model 1
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    !
    Profile of crypto ipsec SDM_Profile1
    game of transformation-ESP-3DES-SHA
    isakmp-profile sdm-ike-profile-1 game
    !
    !
    Crypto ctcp port 10000
    !
    !
    !
    !
    !
    !
    interface GigabitEthernet0/0
    Description of connection WAN to Unifi BTU
    no ip address
    no ip-cache cef route
    no ip route cache
    automatic duplex
    automatic speed
    No mop enabled
    !
    interface GigabitEthernet0/0.500
    encapsulation dot1Q 500
    no ip route cache
    PPPoE enable global group
    PPPoE-client dial-pool-number 1
    !
    interface GigabitEthernet0/1
    internal network LAN Description
    IP 192.168.88.254 255.255.255.0
    IP access-group UDP/TCP in
    IP nat inside
    IP virtual-reassembly
    no ip-cache cef route
    no ip route cache
    automatic duplex
    automatic speed
    !
    ATM0/0/0 interface
    no ip address
    Shutdown
    ATM 300 restart timer
    No atm ilmi-keepalive
    !
    interface Serial0/1/0
    no ip address
    Shutdown
    2000000 clock frequency
    !
    interface Serial0/1/1
    no ip address
    Shutdown

    2000000 clock frequency
    !
    type of interface virtual-Template1 tunnel
    11 description
    Dialer1 IP unnumbered
    ipv4 ipsec tunnel mode
    Tunnel SDM_Profile1 ipsec protection profile
    !
    interface Dialer1
    the negotiated IP address
    IP mtu 1480
    NAT outside IP
    IP virtual-reassembly
    encapsulation ppp
    Dialer pool 1
    Dialer idle-timeout 0
    persistent Dialer
    Dialer-Group 1
    PPP authentication chap callin pap
    PPP chap hostname [email protected] / * /
    password PPP chap 7 15381
    PPP pap sent-username [email protected] / * / 132F0 password 7
    !
    local IP SDM_POOL_1 192.168.88.130 pool 192.168.88.141
    default IP gateway - 192.168.88.254
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 Dialer1
    IP http server
    local IP http authentication
    IP http secure server
    !
    !
    overload of IP nat inside source list Internet_List interface Dialer1
    IP nat inside source static tcp 192.168.88.89 8001 interface 3389 Dialer1
    IP nat inside source static udp 192.168.88.89 8001 interface 3389 Dialer1
    IP nat inside interface 80 static udp 192.168.88.102 source Dialer1 5555
    IP nat inside source static tcp 192.168.88.102 80 5555 Dialer1 interface
    IP nat inside source static tcp 192.168.88.90 80 Dialer1 8080 interface
    IP nat inside interface 80 static udp 192.168.88.90 source Dialer1 8080
    IP nat inside source static tcp 192.168.88.101 interface 8888-8888 Dialer1
    IP nat inside source static udp 192.168.88.101 interface 8888-8888 Dialer1
    IP nat inside source static tcp 192.168.88.101 80 Dialer1 7777 interface
    IP nat inside interface 80 static udp 192.168.88.101 7777 Dialer1 source
    !
    Internet_List extended IP access list
    IP 192.168.88.0 allow 0.0.0.255 any
    !
    Access-list 100 = 4 SDM_ACL category note
    access-list 100 permit ip 192.168.88.0 0.0.0.255 any
    Dialer-list 1 ip protocol allow
    !
    !
    !
    !
    !
    !
    control plan
    !
    !
    !
    !
    !
    !
    !
    !
    !
    Banner motd ^ CC
    #####################################################################
    #                            WARNING!!!                             #
    # This system is for the use of only authorized customers.        #
    # Who is using the computer network system without #.
    authorization of #, or their permission, are #.
    # subject to having their activities on this computer.
    # Network monitored and recorded by system #.
    staff of #. To protect the computer network system of #.
    # unauthorized use and to ensure that computer network systems #.
    # does not work properly, system administrators monitor this #.
    system of #. Anyone using this computer system #.
    # consents to such monitoring and is expressly informed that #.
    # If this control reveals possible criminal conduct.
    activity #, the system can provide evidence of #.
    # This activity to police officers.              #
    #                                                                   #
    # Access is limited to authorized users only.           #
    # Unauthorized access is a violation of # State and federal.
    # civil and criminal.                       #
    #####################################################################^C
    !
    Line con 0
    line to 0
    line vty 0 4
    privilege level 15
    password 7
    transport input telnet ssh
    exit telnet ssh transport
    !
    Scheduler allocate 20000 1000
    NTP-Calendar Update
    end

    Hello

    try changing the size of the "ip mtu" on your Dialer interface to 1492, and/or the 'ip tcp adjust-mss' on your GigabitEthernet interfaces to 1452 and see if that makes a difference.

  • Major question Dhcp on cisco switch please help!

    Hi Experts,
    One of our remote sites has Cisco 2811 router and switch 3650. The switch provides switching and DHCP PC to all customers.
    Please see attachment for more details files.
    Problem:
    After the expiry of the term of the DHCP lease (10 hours), some of the PC (Windows 7) on the remote site received Windows popup says that duplicate IP. Then, the network connectivity of the computer has been disconnected. After you restart the PC, then its network connectivity was back to active state.
    If all the computers have been placed in static mode, there is no problem.
    Please see the attached configuration of the router and Switch.
    Thank you very much

    It's strange this generally solves the problem of IP duplicate

    How to put the DHCP server on the router instead of this?

    what you get when you place an order 'show ip dhcp conflict '.

    also can you share the command 'show ip dhcp pool '.

    Richard

  • iPhone 2.0 & 2811 IOS VPN

    Hello

    My iPhone can establish a session isakmp and get an address IP etc with my IOS 12.4 VPN on a cisco 2811.

    However, when I try and pass traffic, the connection of 2 ipsec phase ends the tunnel.

    I get the error as

    IPSec invalidated policy proposal

    Jul 31 13:13:32.590: ISAKMP:(0:791:HW:2): politics of ITS phase 2 is not acceptable!

    and also

    CRYPTO-6-IKMP_MODE_FAILURE: fast mode processing failed with the peer to

    Someone at - it an iPhone 2.0 to work with a 2811?

    It works with an ASA (not sure which model however)

    Thank you

    Take a look at this:

    http://discussions.Apple.com/thread.jspa?MessageID=7221787�

    http://www.Cisco.com/en/us/docs/security/vpn_client/cisco_vpn_client/iPhone/2.0/connectivity/guide/iPhone.html

    "What Cisco platforms work with Cisco VPN Client on the iPhone?

    PIX firewall and Cisco ASA 5500 security equipment. We recommend the latest version of the software 8.0.x (or), but you can also use software 7.2.x.

    Routers of Cisco IOS nor series VPN 3000 Concentrators VPN supports iPhone VPN features. "

    Concerning

    Farrukh

Maybe you are looking for