cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
904
Views
0
Helpful
2
Replies

CISCO1921/K9 terminal server problem

Jan Rolny
Level 3
Level 3

Hi,

i have router 1921/k9 configured as terminal server with HWIC-8A card.

Problem is that one of serial lines where I have ASA connected (to console) is trying authenticate all the time to ASA.

Output seems like this:

1921#host asa1

Trying asa1 (1.1.1.1, 2005)... Open

*******************************

Username:

Password: ********************************************************************************************************************************

Username:

Password: ********************************************************************************************************************************

Username:

Password: ********************************************************************************************************************************

Username:

and so on .....

Problem is solved after reboot of router. I tried reset line and it does not work. I would like to stop this flood authentication but I have no idea how. Is it possible that it is HW failure or bug?

Thanks for any advice.

Jan

2 Replies 2

Richard Burts
Hall of Fame
Hall of Fame

Jan

Do you have "no exec" configured on this line where the problem happens?

Perhaps if you post the config we might find something to suggest.

HTH

Rick

Sent from Cisco Technical Support iPad App

HTH

Rick

Hi Richard,

thanks for reply. I cannot provide you all the confirg but i will cut interesting part what would interest us:

no ip domain lookup

ip domain name taccess.com

ip host cat3750-1 2003 1.1.1.1

ip host cat3750-2 2004 1.1.1.1

ip host asa1 2005 1.1.1.1

ip host asa2 2006 1.1.1.1

ip host ace1 2007 1.1.1.1

ip host ace2 2008 1.1.1.1

ip host acs 2009 1.1.1.1

ip host fw-int-1 2019 1.1.1.1

ip host fw-int-2 2020 1.1.1.1

ip host cat2960-1 2021 1.1.1.1

ip host cat2960-2 2022 1.1.1.1

ip host fw-vpn 2023 1.1.1.1

ip host ntp 2001 1.1.1.1

multilink bundle-name authenticated

!

interface Loopback1

ip address 1.1.1.1 255.255.255.255

!

interface Async0/0/0

no ip address

encapsulation slip

!

interface Async0/1/0

no ip address

encapsulation slip

!

interface Async0/0/1

no ip address

encapsulation slip

!

interface Async0/1/1

no ip address

encapsulation slip

!

interface Async0/0/2

no ip address

encapsulation slip

!

interface Async0/1/2

no ip address

encapsulation slip

!

interface Async0/0/3

no ip address

encapsulation slip

!

interface Async0/1/3

no ip address

encapsulation slip

!

interface Async0/0/4

no ip address

encapsulation slip

!

interface Async0/1/4

no ip address

encapsulation slip

!

interface Async0/0/5

no ip address

encapsulation slip

!

interface Async0/1/5

no ip address

encapsulation slip

!

interface Async0/0/6

no ip address

encapsulation slip

!

interface Async0/1/6

no ip address

encapsulation slip

!

interface Async0/0/7

no ip address

encapsulation slip

!

interface Async0/1/7

no ip address

encapsulation slip

!

line con 0

logging synchronous

line aux 0

no exec

transport preferred telnet

transport input telnet

transport output telnet

telnet transparent

stopbits 1

speed 38400

line 2

no activation-character

no exec

transport preferred none

transport input all

transport output pad telnet rlogin lapb-ta mop udptn v120 ssh

stopbits 1

line 0/0/0 0/0/7

login authentication lines

no exec

transport preferred telnet

transport input telnet

telnet transparent

flowcontrol software

line 0/1/0 0/1/7

login authentication lines

no exec

transport preferred telnet

transport input telnet

telnet transparent

flowcontrol software

line vty 0 4

exec-timeout 120 0

logging synchronous

transport input ssh

line vty 5 31

exec-timeout 120 0

logging synchronous

transport input ssh

!

Thanks,

Jan