cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2102
Views
5
Helpful
3
Replies

Cisco 887VA and VDSL Vectoring Problem

GEORGE POLYZOS
Level 1
Level 1

Hello

I am novice to Cisco and I am asking for your help

I have a Cisco 887VA-K9

 

I configured in the past and since 2015 it operated flawlessly with VDSL 50mbits speed . Recently my ISP (Cosmote /Greece) has applied vectoring and since then the router only syncs with ADSL speed and not connecting

I don’t know if the problem is my firmware or anything else . Thank you Very Much

 

My Running Configuration is

 

 

Using 5976 out of 262136 bytes

!

! Last configuration change at 17:17:18 Athens Sun Dec 4 2016

! NVRAM config last updated at 17:17:40 Athens Sun Dec 4 2016

! NVRAM config last updated at 17:17:40 Athens Sun Dec 4 2016

version 15.1

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname cisco887

!

boot-start-marker

boot-end-marker

!

!

no logging buffered

enable secret 5

enable password

!

aaa new-model

!

!

!

!

!

!

!

aaa session-id common

memory-size iomem 10

clock timezone Athens 2 0

clock summer-time Athens date Mar 30 2003 3:00 Oct 26 2003 4:00

crypto pki token default removal timeout 0

!

crypto pki trustpoint TP-self-signed-1627569428

enrollment selfsigned

subject-name cn=IOS-Self-Signed-Certificate-1627569428

revocation-check none

rsakeypair TP-self-signed-1627569428

!

!

crypto pki certificate chain TP-self-signed-1627569428

certificate self-signed 01 nvram:IOS-Self-Sig#1.cer

ip source-route

!

!

!

!

!

ip cef

ip domain name cisco887

ip name-server 195.170.0.1

ip name-server 195.170.2.2

ip port-map user-protocol--1 port tcp 26433

no ipv6 cef

!

!

license udi pid CISCO887VA-K9

!

!

username password

!

!

!

!

controller VDSL 0

!

!

class-map type inspect match-all sdm-nat-user-protocol--1-1

match access-group 101

match protocol user-protocol--1

class-map type inspect match-any ccp-skinny-inspect

match protocol skinny

class-map type inspect match-any ccp-cls-insp-traffic

match protocol dns

match protocol ftp

match protocol https

match protocol icmp

match protocol imap

match protocol pop3

match protocol netshow

match protocol shell

match protocol realmedia

match protocol rtsp

match protocol smtp

match protocol sql-net

match protocol streamworks

match protocol tftp

match protocol vdolive

match protocol tcp

match protocol udp

class-map type inspect match-all ccp-insp-traffic

match class-map ccp-cls-insp-traffic

class-map type inspect match-any ccp-h323nxg-inspect

match protocol h323-nxg

class-map type inspect match-any ccp-cls-icmp-access

match protocol icmp

match protocol tcp

match protocol udp

class-map type inspect match-any ccp-h225ras-inspect

match protocol h225ras

class-map type inspect match-any ccp-h323annexe-inspect

match protocol h323-annexe

class-map type inspect match-any ccp-h323-inspect

match protocol h323

class-map type inspect match-all ccp-invalid-src

match access-group 100

class-map type inspect match-all ccp-icmp-access

match class-map ccp-cls-icmp-access

class-map type inspect match-any ccp-sip-inspect

match protocol sip

class-map type inspect match-all ccp-protocol-http

match protocol http

!

!

policy-map type inspect ccp-permit-icmpreply

class type inspect ccp-icmp-access

inspect

class class-default

pass

policy-map type inspect sdm-pol-NATOutsideToInside-1

class type inspect sdm-nat-user-protocol--1-1

inspect

class class-default

drop

policy-map type inspect ccp-inspect

class type inspect ccp-invalid-src

drop log

class type inspect ccp-protocol-http

inspect

class type inspect ccp-insp-traffic

inspect

class type inspect ccp-sip-inspect

inspect

class type inspect ccp-h323-inspect

inspect

class type inspect ccp-h323annexe-inspect

inspect

class type inspect ccp-h225ras-inspect

inspect

class type inspect ccp-h323nxg-inspect

inspect

class type inspect ccp-skinny-inspect

inspect

class class-default

drop

policy-map type inspect ccp-permit

class class-default

drop

!

zone security in-zone

zone security out-zone

zone-pair security ccp-zp-self-out source self destination out-zone

service-policy type inspect ccp-permit-icmpreply

zone-pair security ccp-zp-in-out source in-zone destination out-zone

service-policy type inspect ccp-inspect

zone-pair security ccp-zp-out-self source out-zone destination self

service-policy type inspect ccp-permit

zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone

service-policy type inspect sdm-pol-NATOutsideToInside-1

!

!

!

!

!

!

!

interface Ethernet0

description COSMOTE2

ip address dhcp

!

interface Ethernet0.835

encapsulation dot1Q 835

no ip redirects

no ip unreachables

no ip proxy-arp

ip flow ingress

pppoe-client dial-pool-number 1

!

interface ATM0

no ip address

shutdown

no atm ilmi-keepalive

!

interface FastEthernet0

no ip address

!

interface FastEthernet1

no ip address

!

interface FastEthernet2

no ip address

!

interface FastEthernet3

no ip address

!

interface Vlan1

description $FW_INSIDE$

ip address 10.10.10.1 255.255.255.0

ip nat inside

ip virtual-reassembly in

ip tcp adjust-mss 1412

!

interface Dialer0

mtu 1492

ip address negotiated

ip mtu 1452

ip nat outside

ip virtual-reassembly in

encapsulation ppp

dialer pool 1

dialer-group 1

ppp authentication pap callin

ppp pap sent-username password

ppp ipcp dns request

!

interface Dialer6

no ip address

shutdown

!

ip forward-protocol nd

ip http server

ip http secure-server

!

ip nat inside source list 199 interface Dialer0 overload

ip route 0.0.0.0 0.0.0.0 Dialer0

!

access-list 99 permit 10.10.10.0 0.0.0.255

access-list 100 remark CCP_ACL Category=128

access-list 100 permit ip host 255.255.255.255 any

access-list 100 permit ip 127.0.0.0 0.255.255.255 any

access-list 101 remark CCP_ACL Category=0

access-list 101 permit ip any host 10.10.10.3

access-list 199 permit ip 10.10.10.0 0.0.0.255 any

dialer-list 1 protocol ip permit

dialer-list 2 protocol ip permit

dialer-list 3 protocol ip permit

dialer-list 4 protocol ip permit

dialer-list 5 protocol ip permit

dialer-list 6 protocol ip permit

dialer-list 7 protocol ip permit

!

! Cisco IOS Software, C880 Software (C880DATA-UNIVERSALK9-M), Version 15.1(4)M5, RELEASE SOFTWARE (fc1)

ROM: System Bootstrap, Version 12.4(22r)YB5, RELEASE SOFTWARE (fc1)

cisco887 uptime is 2 days, 3 hours, 25 minutes

System returned to ROM by reload at 17:23:57 Athens Thu Feb 28 2019

System restarted at 17:24:46 Athens Thu Feb 28 2019

System image file is "flash:c880data-universalk9-mz.151-4.M5.bin"

Last reload type: Normal Reload

Last reload reason: Reload Command

Cisco 887VA (MPC8300) processor (revision 1.0) with 236544K/25600K bytes of memory.

Processor board ID

1 DSL controller

1 Ethernet interface

4 FastEthernet interfaces

1 ATM interface

1 Virtual Private Network (VPN) Module

256K bytes of non-volatile configuration memory.

125440K bytes of ATA CompactFlash (Read/Write)

License Information for 'c880-data'

License Level: advsecurity Type: Permanent

Next reboot license Level: advsecurity

Configuration register is 0x2102

NAME: "887VA", DESCR: "887VA chassis, Hw Serial#: , Hw Revision: 1.0"

PID: CISCO887VA-K9 , VID: V02, SN:

Controller VDSL 0 is UP

Daemon Status: Up

XTU-R (DS) XTU-C (US)

Chip Vendor ID: 'BDCM' 'BDCM'

Chip Vendor Specific: 0x0000 0xA4A1

Chip Vendor Country: 0xB500 0xB500

Modem Vendor ID: 'CSCO' ' '

Modem Vendor Specific: 0x4602 0x0000

Modem Vendor Country: 0xB500 0x0000

Serial Number Near: 887VA-K9 15.1(4)M

Serial Number Far: eq nr port:12 oemid softwarerev

Modem Version Near: 15.1(4)M

Modem Version Far: 0xa4a1

Modem Status: TC Sync (Showtime!)

DSL Config Mode: AUTO

Trained Mode: G.992.5 (ADSL2+) Annex A

TC Mode: ATM

Selftest Result: 0x00

DELT configuration: disabled

DELT state: not running

Trellis: ON ON

Line Attenuation: 1.0 dB 5.5 dB

Signal Attenuation: 1.0 dB 5.0 dB

Noise Margin: 9.1 dB 10.1 dB

Attainable Rate: 19276 kbits/s 1180 kbits/s

Actual Power: 0.7 dBm 12.1 dBm

Total FECS: 11684 0

Total ES: 163 0

Total SES: 1 0

Total LOSS: 0 0

Total UAS: 0 0

Total LPRS: 0 0

Total LOFS: 0 0

Total LOLS: 0 0

Bit swap: 306 0

Full inits: 10

Failed full inits: 0

Short inits: 0

Failed short inits: 0

Firmware Source File Name (version)

-------- ------ -------------------

VDSL embedded VDSL_LINUX_DEV_01212008 (1)

Modem FW Version: 110506_1916-4.02L.03.A2pv6C032b.d23i

Modem PHY Version: A2pv6C032b.d23i

 

DS Channel1 DS Channel0 US Channel1 US Channel0

Speed (kbps): 0 18143 0 1165

Previous Speed: 0 17749 0 1154

Total Cells: 0 766795386 0 49259381

User Cells: 0 3387 0 0

Reed-Solomon EC: 0 11684 0 0

CRC Errors: 0 290 0 0

Header Errors: 0 3328 0 0

Interleave (ms): 0.00 6.98 0.00 9.58

Actual INP: 0.00 0.33 0.00 0.83

 

Training Log : Stopped

Training Log Filename : flash:vdsllog.bin

3 Replies 3

Hello,

 

I have made some changes/additions (marked in bold) to your configuration, check if you get it to work:

 

version 15.1
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname cisco887
!
boot-start-marker
boot-end-marker
!
no logging buffered

enable secret 5
enable password
!
aaa new-model
!
aaa session-id common
memory-size iomem 10
clock timezone Athens 2 0
clock summer-time Athens date Mar 30 2003 3:00 Oct 26 2003 4:00
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-1627569428
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1627569428
revocation-check none
rsakeypair TP-self-signed-1627569428
!
crypto pki certificate chain TP-self-signed-1627569428
certificate self-signed 01 nvram:IOS-Self-Sig#1.cer
ip source-route
!
ip cef
ip domain name cisco887
ip name-server 195.170.0.1
ip name-server 195.170.2.2
ip port-map user-protocol--1 port tcp 26433
no ipv6 cef
!
license udi pid CISCO887VA-K9
!
username password
!
controller VDSL 0
--> operating mode vdsl2
or
--> operating mode auto
!
class-map type inspect match-all sdm-nat-user-protocol--1-1
match access-group 101
match protocol user-protocol--1
class-map type inspect match-any ccp-skinny-inspect
match protocol skinny
class-map type inspect match-any ccp-cls-insp-traffic
match protocol dns
match protocol ftp
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all ccp-insp-traffic
match class-map ccp-cls-insp-traffic
class-map type inspect match-any ccp-h323nxg-inspect
match protocol h323-nxg
class-map type inspect match-any ccp-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any ccp-h225ras-inspect
match protocol h225ras
class-map type inspect match-any ccp-h323annexe-inspect
match protocol h323-annexe
class-map type inspect match-any ccp-h323-inspect
match protocol h323
class-map type inspect match-all ccp-invalid-src
match access-group 100
class-map type inspect match-all ccp-icmp-access
match class-map ccp-cls-icmp-access
class-map type inspect match-any ccp-sip-inspect
match protocol sip
class-map type inspect match-all ccp-protocol-http
match protocol http
!
policy-map type inspect ccp-permit-icmpreply
class type inspect ccp-icmp-access
inspect
class class-default
pass
policy-map type inspect sdm-pol-NATOutsideToInside-1
class type inspect sdm-nat-user-protocol--1-1
inspect
class class-default
drop
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
drop log
class type inspect ccp-protocol-http
inspect
class type inspect ccp-insp-traffic
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map type inspect ccp-permit
class class-default
drop
!
zone security in-zone
zone security out-zone
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
zone-pair security ccp-zp-in-out source in-zone destination out-zone
service-policy type inspect ccp-inspect
zone-pair security ccp-zp-out-self source out-zone destination self
service-policy type inspect ccp-permit
zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone
service-policy type inspect sdm-pol-NATOutsideToInside-1
!
interface Ethernet0
description COSMOTE2
--> no ip address dhcp
!
interface Ethernet0.835
encapsulation dot1Q 835
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
pppoe-client dial-pool-number 1
!
interface ATM0
no ip address
shutdown
no atm ilmi-keepalive
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
no ip address
!
interface Vlan1
description $FW_INSIDE$
ip address 10.10.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1412
!
interface Dialer0
mtu 1492
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
--> no ip mtu 1452
ip nat outside
no ip virtual-reassembly in
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication pap callin
ppp pap sent-username password
ppp ipcp dns request
ppp ipcp route default
ppp ipcp address accept
no cdp enable
!
ip forward-protocol nd
ip http server
ip http secure-server
!
ip nat inside source list 1 interface Dialer0 overload
--> no ip route 0.0.0.0 0.0.0.0 Dialer0
!
access-list 1 permit 10.10.10.0 0.0.0.255
!
dialer-list 1 protocol ip permit

!

access-list 100 remark CCP_ACL Category=128

access-list 100 permit ip host 255.255.255.255 any

access-list 100 permit ip 127.0.0.0 0.255.255.255 any

access-list 101 remark CCP_ACL Category=0

access-list 101 permit ip any host 10.10.10.3

 

Hello

I made the changes/additions you advise me but unfortunately it did not work . It Syncs on ADSL Speed  and is not connecting . When I change to operating mode vdsl2 it does not sync at all

 

The problem is that I don’t have a Cisco Service Contract so I cannot upgrade my IOS and Firmware

 

Thank you for the help you gave me

 

 

My Configuration :

 

Building configuration...

 

Current configuration : 7296 bytes

!

! Last configuration change at 22:29:06 Athens Wed Mar 6 2019

version 15.1

no service pad

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname cisco887

!

boot-start-marker

boot-end-marker

!

!

no logging buffered

enable secret 5

enable password

!

aaa new-model

 

aaa session-id common

memory-size iomem 10

clock timezone Athens 2 0

clock summer-time Athens date Mar 30 2003 3:00 Oct 26 2003 4:00

 

 

ip source-route

 

 

ip cef

ip domain name cisco887

ip name-server 195.170.0.1

ip name-server 195.170.2.2

ip port-map user-protocol--1 port tcp 26433

no ipv6 cef

!

!

license udi pid CISCO887VA-K9

!

!

username password

!

!

!

!

controller VDSL 0

!

!

class-map type inspect match-all sdm-nat-user-protocol--1-1

match access-group 101

match protocol user-protocol--1

class-map type inspect match-any ccp-skinny-inspect

match protocol skinny

class-map type inspect match-any ccp-cls-insp-traffic

match protocol dns

match protocol ftp

match protocol https

match protocol icmp

match protocol imap

match protocol pop3

match protocol netshow

match protocol shell

match protocol realmedia

match protocol rtsp

match protocol smtp

match protocol sql-net

match protocol streamworks

match protocol tftp

match protocol vdolive

match protocol tcp

match protocol udp

class-map type inspect match-all ccp-insp-traffic

match class-map ccp-cls-insp-traffic

class-map type inspect match-any ccp-h323nxg-inspect

match protocol h323-nxg

class-map type inspect match-any ccp-cls-icmp-access

match protocol icmp

match protocol tcp

match protocol udp

class-map type inspect match-any ccp-h225ras-inspect

match protocol h225ras

class-map type inspect match-any ccp-h323annexe-inspect

match protocol h323-annexe

class-map type inspect match-any ccp-h323-inspect

match protocol h323

class-map type inspect match-all ccp-invalid-src

match access-group 100

class-map type inspect match-all ccp-icmp-access

match class-map ccp-cls-icmp-access

class-map type inspect match-any ccp-sip-inspect

match protocol sip

class-map type inspect match-all ccp-protocol-http

match protocol http

!

!

policy-map type inspect ccp-permit-icmpreply

class type inspect ccp-icmp-access

inspect

class class-default

pass

policy-map type inspect sdm-pol-NATOutsideToInside-1

class type inspect sdm-nat-user-protocol--1-1

inspect

class class-default

drop

policy-map type inspect ccp-inspect

class type inspect ccp-invalid-src

drop log

class type inspect ccp-protocol-http

inspect

class type inspect ccp-insp-traffic

inspect

class type inspect ccp-sip-inspect

inspect

class type inspect ccp-h323-inspect

inspect

class type inspect ccp-h323annexe-inspect

inspect

class type inspect ccp-h225ras-inspect

inspect

class type inspect ccp-h323nxg-inspect

inspect

class type inspect ccp-skinny-inspect

inspect

class class-default

drop

policy-map type inspect ccp-permit

class class-default

drop

!

zone security in-zone

zone security out-zone

zone-pair security ccp-zp-self-out source self destination out-zone

service-policy type inspect ccp-permit-icmpreply

zone-pair security ccp-zp-in-out source in-zone destination out-zone

service-policy type inspect ccp-inspect

zone-pair security ccp-zp-out-self source out-zone destination self

service-policy type inspect ccp-permit

zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone

service-policy type inspect sdm-pol-NATOutsideToInside-1

!

!

!

!

!

!

!

interface Ethernet0

description COSMOTE2

no ip address

!

interface Ethernet0.835

encapsulation dot1Q 835

no ip redirects

no ip unreachables

no ip proxy-arp

ip flow ingress

pppoe-client dial-pool-number 1

!

interface ATM0

no ip address

shutdown

no atm ilmi-keepalive

!

interface FastEthernet0

no ip address

!

interface FastEthernet1

no ip address

!

interface FastEthernet2

no ip address

!

interface FastEthernet3

no ip address

!

interface Vlan1

description $FW_INSIDE$

ip address 10.10.10.1 255.255.255.0

ip nat inside

ip virtual-reassembly in

ip tcp adjust-mss 1412

!

interface Dialer0

mtu 1492

ip address negotiated

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat outside

no ip virtual-reassembly in

encapsulation ppp

dialer pool 1

dialer-group 1

ppp authentication pap callin

ppp pap sent-username password

ppp ipcp dns request

ppp ipcp route default

ppp ipcp address accept

no cdp enable

!

interface Dialer6

no ip address

shutdown

!

ip forward-protocol nd

ip http server

ip http secure-server

!

ip nat inside source list 1 interface Dialer0 overload

ip nat inside source list 199 interface Dialer0 overload

!

access-list 1 permit 10.10.10.0 0.0.0.255

access-list 99 permit 10.10.10.0 0.0.0.255

access-list 100 remark CCP_ACL Category=128

access-list 100 permit ip host 255.255.255.255 any

access-list 100 permit ip 127.0.0.0 0.255.255.255 any

access-list 101 remark CCP_ACL Category=0

access-list 101 permit ip any host 10.10.10.3

access-list 199 permit ip 10.10.10.0 0.0.0.255 any

dialer-list 1 protocol ip permit

dialer-list 2 protocol ip permit

dialer-list 3 protocol ip permit

dialer-list 4 protocol ip permit

dialer-list 5 protocol ip permit

dialer-list 6 protocol ip permit

dialer-list 7 protocol ip permit

 

line con 0

no modem enable

line aux 0

line vty 0 1

password t

transport input ssh

line vty 2 4

password

transport input none

 

end

amikat
Level 7
Level 7

Hi,

To support VDSL vectoring (ITU-T G.993.5) your VDSL (modem) firmware needs to be at least 38h, ie. you need upgrade.

Best regards,

Antonin

Review Cisco Networking for a $25 gift card