A cisco router used as you said is wasted and useless.
You should instead set the modem in bridge mode, and let the router do the router. There are many threads on the subject.
Anyway an enterprise-class Cisco router is not apt as home or user-friendly device so unless you are prepare to sped a lot of time studying and trying, and receive much aggravation, maye it's better that you gave up on it.
i need to do the same thing, connect a 876 Cisco router with an existing ADSL modem. The reason is that the router itself cannot synchronize with the DSL line due to very bad condition of the telephone lines.
We found a modem that is probably more 'sensitive' and can synchronize, so i would like to connect it with the Cisco router.
I have read somewhere that i have to connect the modem to the console or AUX port of the cisco router using a rollover modem cable. Is that true? Can i connect the two devices through ethernet, and how?
I need the authentication done by the router.
Can you please help with the configuration? I have some experience with cisco router configuration.
Hello!I'm looking for a way to make my EEM script more dynamic and automated for my environment. This is what I have - basically I just capture the 4 IPSec peer IP addresses of each neighbor and insert this data into 4 different variables. ...
Hi all,I have a couple of Nexus9k switches. I need to get tcpdump from the physical interface which connected to the server. I'm looking for a specific protocol on tcpdump so that which feature should I use? I asked that because I couldn't full...
We are building out our first few AAR polices and are running into an error message.Built Global Policy with SLA class and traffic rules for voice traffic, attached to to the sites and VPN we needed, no issue. Building a second policy for management ...
Cisco Champion Radio · S7|E45 Network Insights with AI Endpoint Analytics
Identifying who and what is on the network is a challenge for many organizations. Incomplete visibility makes it difficult to implement advanced security policies and recommendatio...