login as: admin Keyboard-interactive authentication prompts from server: | Password: End of keyboard-interactive prompts from server LocalGateway#show configuration Using 8730 out of 33554432 bytes ! ! Last configuration change at 14:13:01 EDT Fri Oct 13 2023 by admin ! version 17.9 service timestamps debug datetime localtime show-timezone service timestamps log datetime localtime show-timezone service password-encryption service call-home platform qfp utilization monitor load 80 platform punt-keepalive disable-kernel-core platform hardware throughput level 2000000 ! hostname LocalGateway ! boot-start-marker boot-end-marker ! ! vrf definition Mgmt-intf ! address-family ipv4 exit-address-family ! address-family ipv6 exit-address-family ! logging buffered 9999999 no logging console no logging monitor no aaa new-model clock timezone CEST 5 0 clock summer-time EDT recurring ! ! ! ! ! ! ! ip domain name noe.com ! ! ! login on-success log ! ! ! ! ! ! ! subscriber templating ! ! ! ! vtp version 1 ! multilink bundle-name authenticated ! ! ! ! ! password encryption aes ! ! crypto pki trustpoint TP-self-signed-1554245456 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-1554245456 revocation-check none rsakeypair TP-self-signed-1554245456 ! crypto pki trustpoint SLA-TrustPoint enrollment pkcs12 revocation-check crl ! crypto pki trustpoint dummyTp revocation-check crl ! ! crypto pki certificate chain TP-self-signed-1554245456 certificate self-signed 01 nvram:IOS-Self-Sig#5.cer crypto pki certificate chain SLA-TrustPoint certificate ca 01 nvram:CiscoLicensi#1CA.cer crypto pki certificate chain dummyTp ! crypto pki certificate pool cabundle nvram:ios_core.p7b ! ! ! ! voice service voip ip address trusted list ipv4 128.177.14.0 255.255.255.128 ipv4 128.177.36.0 255.255.255.192 ipv4 135.84.169.0 255.255.255.128 ipv4 135.84.170.0 255.255.255.128 ipv4 135.84.171.0 255.255.255.128 ipv4 135.84.172.0 255.255.255.128 ipv4 199.59.65.0 255.255.255.128 ipv4 199.59.66.0 255.255.255.128 ipv4 199.59.70.0 255.255.255.128 ipv4 199.59.71.0 255.255.255.128 ipv4 199.59.64.0 255.255.255.128 ipv4 199.59.67.0 255.255.255.128 ipv4 85.119.56.128 255.255.255.192 ipv4 85.119.57.128 255.255.255.192 ipv4 185.115.196.0 255.255.255.128 ipv4 185.115.197.0 255.255.255.128 ipv4 135.84.172.0 255.255.255.192 ipv4 135.84.173.0 255.255.255.128 ipv4 135.84.174.0 255.255.255.128 ipv4 199.19.197.0 255.255.255.0 ipv4 199.19.199.0 255.255.255.0 ipv4 139.177.64.0 255.255.255.0 ipv4 139.177.65.0 255.255.255.0 ipv4 139.177.66.0 255.255.255.0 ipv4 139.177.67.0 255.255.255.0 ipv4 139.177.68.0 255.255.255.0 ipv4 139.177.69.0 255.255.255.0 ipv4 139.177.70.0 255.255.255.0 ipv4 139.177.71.0 255.255.255.0 ipv4 139.177.72.0 255.255.255.0 ipv4 139.177.73.0 255.255.255.0 ipv4 23.89.76.128 255.255.255.128 ipv4 170.72.29.0 255.255.255.0 ipv4 170.72.17.128 255.255.255.128 ipv4 170.72.0.128 255.255.255.128 media statistics media bulk-stats allow-connections sip to sip no supplementary-service sip refer no supplementary-service sip handle-replaces fax protocol t38 version 0 ls-redundancy 0 hs-redundancy 0 fallback none trace stun stun flowdata agent-id 1 boot-count 18 stun flowdata shared-secret 6 JRUK`M[_MTVR[NVK`TeHHPTKI_dTiMWXOa_`SLL sip early-offer forced g729 annexb-all ! ! voice class uri 100 sip host ipv4:41.222.236.254 ! voice class uri 200 sip pattern dtg=itgest-ao_trunk0657.lgu voice class codec 99 codec preference 1 g711ulaw codec preference 2 g711alaw codec preference 3 g729r8 ! voice class stun-usage 200 stun usage firewall-traversal flowdata stun usage ice lite ! ! voice class sip-profiles 200 rule 9 request ANY sip-header SIP-Req-URI modify "sips:(.*)" "sip:\1" rule 10 request ANY sip-header To modify "" "" rule 13 response ANY sip-header To modify "" ";otg=itgest-ao_trunk0657_lgu>" rule 30 request ANY sip-header P-Asserted-Identity modify "sips:(.*)" "sip:\1" ! ! ! voice class dpg 100 description Incoming Wbx to IP PSTN dial-peer 101 preference 1 ! voice class dpg 200 description Incoming IP PSTN(DP100) to BCLD(DP201) dial-peer 200201 preference 1 ! voice class tenant 100 registrar ipv4:41.222.236.254 expires 3600 credentials username 227210372 password 6 HK\SDgQLKNac^HFZNfA[eWb^W_RPQ^gPT realm 41.222.236.254 credentials username 227210373 password 6 LPUIbPOPHGSB[NVKU`eLQbe_^aVchXfZK realm 41.222.236.254 bind control source-interface GigabitEthernet0/0/0 bind media source-interface GigabitEthernet0/0/0 ! voice class tenant 300 bind control source-interface GigabitEthernet0/0/0 bind media source-interface GigabitEthernet0/0/0 no pass-thru content custom-sdp ! voice class tenant 200 registrar dns:eun10.bcld.webex.com scheme sips expires 240 refresh-ratio 50 tcp tls credentials number ITGEST-AO_TRUNK4589_LGU username ITGEST-AO_TRUNK0657_LGU password 6 CWG\idHOCL^W_AHZPFCX`cEi[[bTUOPBdM[K realm BroadWorks authentication username ITGEST-AO_TRUNK0657_LGU password 6 VCWG`Y]CGVXceGTRhRZBFTGJ_E_dZOTe`]Ae realm BroadWorks authentication username ITGEST-AO_TRUNK0657_LGU password 6 WgTCR\fNCNGZS`OLcBUUHGhROL[P_d_cIXYb realm eun10.bcld.webex.com no remote-party-id sip-server dns:eun10.bcld.webex.com connection-reuse srtp-crypto 200 session transport tcp tls url sips error-passthru asserted-id pai bind control source-interface GigabitEthernet0/0/0 bind media source-interface GigabitEthernet0/0/0 no pass-thru content custom-sdp sip-profiles 200 outbound-proxy dns:fr11.sipconnect-eun.bcld.webex.com privacy-policy passthru ! voice class srtp-crypto 200 crypto 1 AES_CM_128_HMAC_SHA1_80 ! ! ! ! ! ! no license feature hseck9 license udi pid ISR4451-X/K9 sn FOC20376YFU memory free low-watermark processor 62972 ! diagnostic bootup level minimal ! spanning-tree extend system-id ! enable secret 9 $9$ZWOpaQmSy6Hk8E$NWd8RRyP3DATmExu/rcoYE.jCuAlWmnH8zLMpLBSau. ! username admin privilege 15 secret 9 $9$dkbVEfDfrET44.$VzHVNhsK/NIgb11JCa8rcSpVwK9Vh9OKYZWspJim0Jw ! redundancy mode none ! ! ! ! controller Cellular 0/2/0 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! interface GigabitEthernet0/0/0 ip dhcp client client-id ascii FJC2042D16K ip address 192.168.178.10 255.255.255.0 negotiation auto ! interface GigabitEthernet0/0/1 no ip address negotiation auto ! interface GigabitEthernet0/0/2 no ip address negotiation auto ! interface GigabitEthernet0/0/3 no ip address negotiation auto ! interface Cellular0/2/0 ip address negotiated ! interface Cellular0/2/1 no ip address ! interface GigabitEthernet0 vrf forwarding Mgmt-intf no ip address negotiation auto ! ip http server ip http authentication local ip http secure-server ip http client source-interface GigabitEthernet0/0/0 ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 192.168.178.1 ip ssh version 2 ! ! ! ! ! ! control-plane ! ! mgcp behavior rsip-range tgcp-only mgcp behavior comedia-role none mgcp behavior comedia-check-media-src disable mgcp behavior comedia-sdp-force disable ! mgcp profile default ! ! ! ! dial-peer voice 101 voip description Outgoing dial-peer to IP PSTN destination-pattern BAD.BAD session protocol sipv2 session target ipv4:41.222.236.254 voice-class codec 99 voice-class sip tenant 100 voice-class sip options-keepalive dtmf-relay rtp-nte no vad ! dial-peer voice 200201 voip description Inbound/Outbound Webex Calling max-conn 150 destination-pattern BAD.BAD session protocol sipv2 session target sip-server destination dpg 100 voice-class codec 99 voice-class stun-usage 200 no voice-class sip localhost dtmf-relay rtp-nte srtp no vad ! dial-peer voice 100 voip description Incoming dial-peer from IP PSTN session protocol sipv2 destination dpg 200 incoming uri via 100 voice-class codec 99 voice-class sip tenant 300 dtmf-relay rtp-nte no vad ! dial-peer voice 1 voip ! ! sip-ua transport tcp tls v1.2 crypto signaling default trustpoint dummyTp cn-san-validate server tcp-retry 1000 ! ! line con 0 stopbits 1 line aux 0 line vty 0 4 login local transport input ssh line vty 5 14 login local transport input ssh ! call-home ! If contact email address in call-home is configured as sch-smart-licensing@cisco.com ! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications. contact-email-addr sch-smart-licensing@cisco.com profile "CiscoTAC-1" active destination transport-method http ! ! ! ! ! ! end LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# login as: admin Keyboard-interactive authentication prompts from server: | Password: End of keyboard-interactive prompts from server LocalGateway#show log Syslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) No Active Message Discriminator. No Inactive Message Discriminator. Console logging: disabled Monitor logging: disabled Buffer logging: level debugging, 149 messages logged, xml disabled, filtering disabled Exception Logging: size (4096 bytes) Count and timestamp logging messages: disabled Persistent logging: disabled No active filter modules. Trap logging: level informational, 143 message lines logged Logging Source-Interface: VRF Name: TLS Profiles: Log Buffer (9999999 bytes): *Oct 13 07:09:34.732: %CRYPTO-5-SELF_TEST_START: Crypto algorithms release (Rel5a) begin self-test *Oct 13 07:09:35.168: %CRYPTO-5-SELF_TEST_END: Crypto algoritms self-test completed successfully All tests passed. *Oct 13 07:09:35.886: %ISR_THROUGHPUT-6-LEVEL: Throughput level has been set to 2000000 kbps *Oct 13 07:09:41.140: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled *Oct 13 07:09:41.452: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowedESG-PM-ACL:[subsys-init] Init ESG-ACL subsystem starting *Oct 13 07:09:44.126: *Oct 13 07:09:49.038: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan *Oct 13 07:09:49.097: %TLSCLIENT-5-TLSCLIENT_IOS: TLS Client is IOS based *Oct 13 07:09:49.339: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_ENFORCED: Cisco PSB security compliance is being enforced *Oct 13 07:09:49.339: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by this platform for use of RSA Key Size *Oct 13 07:09:49.535: %CUBE-3-LICENSING: SIP trunking (CUBE) licensing is now based on dynamic sessions counting, static license capacity configuration through 'mode border-element license capacity' would be ignored. *Oct 13 07:09:49.549: %SIP-5-LICENSING: CUBE license reporting period has been set to the minimum value of 8 hours. *Oct 13 07:09:49.569: %VOICE_HA-7-STATUS: CUBE HA-supported platform detected. *Oct 13 07:09:49.690: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of DES *Oct 13 07:09:49.690: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of 3DES *Oct 13 07:09:49.690: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of DH *Oct 13 07:09:49.690: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of MD5 *Oct 13 07:09:49.690: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKEv2 for use of SHA1 *Oct 13 07:09:49.695: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of DES *Oct 13 07:09:49.695: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of 3DES *Oct 13 07:09:49.695: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of DH *Oct 13 07:09:49.695: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of MD5 *Oct 13 07:09:49.695: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Crypto IKMP for use of SHA1 *Oct 13 07:09:49.696: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of 3DES *Oct 13 07:09:49.696: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of MD5 *Oct 13 07:09:49.696: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by IPSEC key engine for use of DES *Oct 13 07:09:53.815: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of MD5 *Oct 13 07:09:53.815: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of DES *Oct 13 07:09:53.815: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by Syslog Traps for use of 3DES *Oct 13 07:09:54.186: %IOSXE_RP_ALARM-2-PEM: ASSERT CRITICAL Power Supply Bay 1 Power Supply/FAN Module Missing *Oct 13 07:09:54.263: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up *Oct 13 07:09:54.523: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of 3DES *Oct 13 07:09:54.524: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of MD5 *Oct 13 07:09:54.524: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by encrypt proc for use of DES *Oct 13 07:09:54.551: %PNP-6-PNP_DISCOVERY_STARTED: PnP Discovery started *Oct 13 07:09:24.349: %BOOT-5-OPMODE_LOG: R0/0: binos: System booted in AUTONOMOUS mode *Oct 13 07:09:37.182: %CMRP_PFU-6-FANASSY_INSERTED: R0/0: cmand: Fan Assembly is inserted. *Oct 13 07:09:37.201: %CMRP-3-PFU_MISSING: R0/0: cmand: The platform does not detect a power supply in slot 1 *Oct 13 07:09:37.204: %CMRP-3-PFU_MISSING: R0/0: cmand: The platform does not detect a power supply in slot 3 *Oct 13 07:09:37.204: %CMRP-3-PFU_MISSING: R0/0: cmand: The platform does not detect a power supply in slot 4 *Oct 13 07:09:41.602: %CMLIB-6-THROUGHPUT_VALUE: R0/0: cmand: Throughput license found, throughput set to 2000000 kbps *Oct 13 07:09:54.664: %LINK-3-UPDOWN: Interface EOBC0, changed state to up *Oct 13 07:09:54.665: %LINEPROTO-5-UPDOWN: Line protocol on Interface LI-Null0, changed state to up *Oct 13 07:09:54.666: %LINEPROTO-5-UPDOWN: Line protocol on Interface VoIP-Null0, changed state to up *Oct 13 07:09:54.666: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to down *Oct 13 07:09:54.668: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0 Physical Port Link Down *Oct 13 07:09:54.668: %LINK-3-UPDOWN: Interface LIIN0, changed state to up *Oct 13 07:09:55.942: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up *Oct 13 07:09:55.942: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up *Oct 13 07:09:55.942: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to down *Oct 13 07:09:55.943: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up *Oct 13 07:09:56.064: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0 *Oct 13 07:09:58.403: %IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO: Management vrf Mgmt-intf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001 *Oct 13 07:09:58.455: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0 *Oct 13 07:09:58.983: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default *Oct 13 07:10:01.968: %SYS-7-NVRAM_INIT_WAIT_TIME: Waited 0 seconds for NVRAM to be available *Oct 13 07:10:02.679: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-1554245456 has been generated or imported by crypto config *Oct 13 07:10:02.688: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named SLA-KeyPair2 has been generated or imported by crypto config *Oct 13 07:10:02.695: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named LocalGateway.noe.com has been generated or imported by crypto config *Oct 13 07:10:02.698: %SYS-6-PRIVCFG_DECRYPT_SUCCESS: Successfully apply the private config file *Oct 13 07:10:02 UTC: %SYS-5-LOG_CONFIG_CHANGE: Buffer logging: level debugging, xml disabled, filtering disabled, size (9999999) *Oct 13 07:10:02 UTC: %SYS-5-LOG_CONFIG_CHANGE: Console logging disabled *Oct 13 07:10:02 UTC: %SYS-5-LOG_CONFIG_CHANGE: Monitor logging disabled *Oct 13 12:10:02 CEST: %SYS-6-CLOCKUPDATE: System clock has been updated from 07:10:02 UTC Fri Oct 13 2023 to 12:10:02 CEST Fri Oct 13 2023, configured from console by vty0. *Oct 13 13:10:02 EDT: %SYS-6-CLOCKUPDATE: System clock has been updated from 12:10:02 CEST Fri Oct 13 2023 to 13:10:02 EDT Fri Oct 13 2023, configured from console by vty0. *Oct 13 13:10:02 EDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: TP-self-signed-1554245456 created succesfully *Oct 13 13:10:02 EDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: SLA-TrustPoint created succesfully *Oct 13 13:10:02 EDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: dummyTp created succesfully *Oct 13 13:10:02 EDT: %PKI-6-TRUSTPOOL_DOWNLOAD_SUCCESS: Trustpool Download is successful *Oct 13 13:10:02 EDT: *********************************************************** Detailed call stats collection has been turned on Use "media disable-detailed-stats" under "voice service voip"to turn it off *********************************************************** *Oct 13 13:10:03 EDT: SBC MPS TDL Error: Failed to handle GET_CAPS response. *Oct 13 13:10:04 EDT: %VOICE_HA-7-STATUS: Create VOICE HA INFRA processes now.... *Oct 13 13:10:04 EDT: %SYS-5-CONFIG_I: Configured from memory by console *Oct 13 13:10:04 EDT: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled *Oct 13 13:10:04 EDT: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/2, interfaces disabled *Oct 13 13:10:04 EDT: %SPA_OIR-6-OFFLINECARD: SPA (ISR4451-X-4x1GE) offline in subslot 0/0 *Oct 13 13:10:04 EDT: %CELLWAN-2-MODEM_DOWN: Modem in slot 0/2 is DOWN *Oct 13 13:10:04 EDT: %CELLWAN-2-MODEM_DOWN: Modem in slot 0/2 is DOWN *Oct 13 13:10:04 EDT: %SPA_OIR-6-OFFLINECARD: SPA (NIM-4G-LTE-GA) offline in subslot 0/2 *Oct 13 13:10:04 EDT: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0 *Oct 13 13:10:04 EDT: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0 *Oct 13 13:10:04 EDT: %CRYPTO-5-SELF_TEST_START: Crypto algorithms release (Rel5a) begin self-test *Oct 13 13:10:04 EDT: %CRYPTO-5-SELF_TEST_END: Crypto algoritms self-test completed successfully All tests passed. *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 0 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 1 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 1 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 2 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 2 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0 *Oct 13 13:10:05 EDT: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/2 *Oct 13 13:10:05 EDT: %SSH-5-ENABLED: SSH 2.0 has been enabled *Oct 13 13:10:06 EDT: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF *Oct 13 13:10:06 EDT: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF *Oct 13 13:10:06 EDT: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-1554245456.server has been generated or imported by crypto-engine *Oct 13 13:10:06 EDT: %SYS-5-RESTART: System restarted -- Cisco IOS Software [Cupertino], ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.9.4, RELEASE SOFTWARE (fc5) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2023 by Cisco Systems, Inc. Compiled Wed 26-Jul-23 10:15 by mcpre *Oct 13 13:10:07 EDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface VoipNull0, changed state to up *Oct 13 13:10:09 EDT: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF *Oct 13 13:10:09 EDT: %CRYPTO-6-GDOI_ON_OFF: GDOI is OFF *Oct 13 13:10:10 EDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI created succesfully *Oct 13 13:10:10 EDT: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named CISCO_IDEVID_SUDI has been generated or imported by pki-sudi *Oct 13 13:10:10 EDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI0 created succesfully *Oct 13 13:10:10 EDT: %PKI-2-NON_AUTHORITATIVE_CLOCK: PKI functions can not be initialized until an authoritative time source, like NTP, can be obtained. *Oct 13 13:10:11 EDT: %SIP-5-DIALPEER_STATUS: VoIP dial-Peer <101> is Busied Out, Raising SNMP DOWN Trap *Oct 13 13:10:12 EDT: %PNP-6-PNP_BEST_UDI_UPDATE: Best UDI [PID:ISR4451-X/K9,VID:V06,SN:FJC2042D16K] identified via (entity-mibs) *Oct 13 13:10:12 EDT: %PNP-6-PNP_CDP_UPDATE: Device UDI [PID:ISR4451-X/K9,VID:V06,SN:FJC2042D16K] identified for CDP *Oct 13 13:10:12 EDT: %PNP-6-PNP_DISCOVERY_STOPPED: PnP Discovery stopped (Startup Config Present) *Oct 13 13:10:14 EDT: %SPA_OIR-6-ONLINECARD: SPA (ISR4451-X-4x1GE) online in subslot 0/0 *Oct 13 13:10:14 EDT: %SYS-5-CONFIG_P: Configured programmatically by process EPM CREATE DEFAULT CWA URL ACL from console as console *Oct 13 13:10:14 EDT: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to down *Oct 13 13:10:16 EDT: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/1, changed state to down *Oct 13 13:10:16 EDT: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/2, changed state to down *Oct 13 13:10:16 EDT: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/3, changed state to down *Oct 13 13:10:28 EDT: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to up *Oct 13 13:10:29 EDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0/0, changed state to up *Oct 13 13:10:38 EDT: spa in 0/2, still in booting *Oct 13 13:10:45 EDT: %CMRP-5-CHASSIS_MONITOR_BOOT_TIME_PRINT: R0/0: cmand: Card F0 took 64 secs to boot *Oct 13 13:10:45 EDT: %CMRP-5-CHASSIS_MONITOR_BOOT_TIME_PRINT: R0/0: cmand: Card 0 took 59 secs to boot *Oct 13 13:10:45 EDT: %CMRP-5-CHASSIS_MONITOR_BOOT_TIME_PRINT: R0/0: cmand: Card 1 took 59 secs to boot *Oct 13 13:10:45 EDT: %CMRP-5-CHASSIS_MONITOR_BOOT_TIME_PRINT: R0/0: cmand: Card 2 took 59 secs to boot *Oct 13 13:11:08 EDT: spa in 0/2, still in booting *Oct 13 13:11:20 EDT: %SIP-5-DIALPEER_STATUS: VoIP dial-Peer <101> is Up, Raising SNMP UP Trap *Oct 13 13:11:27 EDT: %SPA_OIR-6-ONLINECARD: SPA (NIM-4G-LTE-GA) online in subslot 0/2 *Oct 13 13:11:29 EDT: %LINK-3-UPDOWN: Interface Cellular0/2/0, changed state to down *Oct 13 13:11:29 EDT: %LINK-3-UPDOWN: Interface Cellular0/2/1, changed state to down *Oct 13 13:11:38 EDT: %CELLWAN-2-SIM_NOT_PRESENT: [Cellular0/2/0]: SIM is not present in Slot 0 *Oct 13 13:11:38 EDT: %CALL_HOME-6-CALL_HOME_ENABLED: Call-home is enabled by Smart Agent for Licensing. *Oct 13 13:11:38 EDT: %SMART_LIC-6-REPORTING_REQUIRED: A Usage report acknowledgement will be required in 349 days. *Oct 13 13:12:47 EDT: %CELLWAN-2-MODEM_UP: Modem in slot 0/2 is now UP *Oct 13 13:12:47 EDT: FOTA not supported on modems older than SWI 74xx or non Telit modem. modem DIP (0x74) *Oct 13 13:12:48 EDT: %CELLWAN-2-MODEM_RADIO: Cellular0/2/0 Modem radio has been turned on *Oct 13 13:13:01 EDT: %SMART_LIC-3-COMM_FAILED: Communications failure with the Cisco Smart License Utility (CSLU) : Unable to resolve server hostname/domain name *Oct 13 13:37:47 EDT: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_EXCEPTION_ADDED: Cisco PSB security compliance exception has been added by SSH Process for use of MD5 *Oct 13 13:38:02 EDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: admin] [Source: 192.168.178.32] [localport: 22] at 13:38:02 EDT Fri Oct 13 2023 *Oct 13 13:57:06 EDT: %SYS-6-TTY_EXPIRE_TIMER: (exec timer expired, tty 866 (192.168.178.32)), user admin *Oct 13 13:57:06 EDT: %SYS-6-LOGOUT: User admin has exited tty session 866(192.168.178.32) *Oct 13 14:06:54 EDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: admin] [Source: 192.168.178.32] [localport: 22] at 14:06:54 EDT Fri Oct 13 2023 *Oct 13 14:13:01 EDT: %SYS-5-CONFIG_I: Configured from console by admin on vty0 (192.168.178.32) *Oct 13 14:13:21 EDT: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private config file *Oct 13 14:15:24 EDT: %SYS-6-LOGOUT: User admin has exited tty session 866(192.168.178.32) *Oct 13 14:15:55 EDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: admin] [Source: 192.168.178.32] [localport: 22] at 14:15:55 EDT Fri Oct 13 2023 *Oct 13 14:27:12 EDT: %SYS-6-TTY_EXPIRE_TIMER: (exec timer expired, tty 866 (192.168.178.32)), user admin *Oct 13 14:27:12 EDT: %SYS-6-LOGOUT: User admin has exited tty session 866(192.168.178.32) *Oct 13 14:42:33 EDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: admin] [Source: 192.168.178.32] [localport: 22] at 14:42:33 EDT Fri Oct 13 2023 LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway# LocalGateway#debug ccsip all This may severely impact system performance. Continue? [confirm]n LocalGateway#debug ccsip call SIP Call statistics tracing is enabled LocalGateway#show sip-ua register % Incomplete command. LocalGateway#show sip-ua register status Tenant: 100 --------------------- Registrar-Index 1 --------------------- Line peer expires(sec) reg survival P-Associ-URI ================================ ========= ============ === ======== ============ 227210372 -1 8 no normal Tenant: 100 --------------------- Registrar-Index 1 --------------------- Line peer expires(sec) reg survival P-Associ-URI ================================ ========= ============ === ======== ============ 227210373 -1 8 no normal Tenant: 200 --------------------- Registrar-Index 1 --------------------- Line peer expires(sec) reg survival P-Associ-URI ================================ ========= ============ === ======== ============ ITGEST-AO_TRUNK4589_LGU -1 106 no normal LocalGateway# LocalGateway# LocalGateway#debug ccsip message SIP Call messages tracing is enabled LocalGateway#