06-11-2012 05:03 PM - edited 03-04-2019 04:38 PM
i just purchased a cisco 877,, and got a console cable to programed the modem/router(i had used cisco 857 but doesn't need the console cable to program, don't know why), i can see the router is trained, but just can't got online, i dont know why,, i had tried to used my other modem cisco 857 and test the adsl line, works fine... please help...... -_-
here is the configuration for cisco 877
Building configuration...Current configuration : 8818 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Cisco877
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
no logging buffered
enable secret 5 $1$9QY6$4joK6aXh6e8/mHJE3J250.
enable password **********
!
no aaa new-model
clock timezone PCTime -6
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
!
crypto pki trustpoint TP-self-signed-2007689474
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2007689474
revocation-check none
rsakeypair TP-self-signed-2007689474
!
!
crypto pki certificate chain TP-self-signed-2007689474
certificate self-signed 01
30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32303037 36383934 3734301E 170D3032 30333031 30313036
35385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 30303736
38393437 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100E101 D6A5B91F D4880CBA 98D19DA5 AAD37529 BB2B7833 3CCC0A83 F1B9FFE8
3CF70D16 0A9CBB3D 642EA08F 98F80292 6845FC18 02C14BD6 B0C14267 D79ADE3A
82C76EB3 9DD827F6 B002B29F 8C8A63B6 70F10B0A C5F01963 ABC0CE70 5DEACB3A
2F89E65B 34B9849E E5EFC21F 4D84CDC8 BD2E4C12 31A1C330 76BECA3A D6E7B850
A3070203 010001A3 68306630 0F060355 1D130101 FF040530 030101FF 30130603
551D1104 0C300A82 08436973 636F3837 37301F06 03551D23 04183016 80146B77
81C87A4F 8BBD687A A7C8FC5C 3F6B116F 60B5301D 0603551D 0E041604 146B7781
C87A4F8B BD687AA7 C8FC5C3F 6B116F60 B5300D06 092A8648 86F70D01 01040500
03818100 DF461E08 20E05BD2 AB828A48 6A9B3CAF 4ABE280C EEC4DD31 3D83BFB1
80770F85 99F72351 693F9051 D4E4E0D6 8C0DE23E D10B50D0 C35077FF 9CB73977
BB7D6675 DE963825 8732EAC2 4FFE51F6 87534E22 105AC292 1484F18B 3843D4FB
6687392A 6CE44AF6 EC15F824 4A37F05C 0F565FC5 33F3773A DF87F05C 07E7BFDD FBA4EB23
quit
dot11 syslog
ip source-route
no ip routing
!
!
ip dhcp excluded-address 192.168.0.1 192.168.0.99
ip dhcp excluded-address 192.168.0.201 192.168.0.254
!
ip dhcp pool DownStair
import all
network 192.168.0.0 255.255.255.0
dns-server 205.171.3.65 205.171.2.65
default-router 192.168.0.1
lease infinite
!
!
no ip cef
ip name-server 205.171.3.65
ip name-server 205.171.2.65
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
username admin privilege 15 password 0 **********
!
!
!
archive
log config
hidekeys
!
!
!
class-map type inspect match-any SDM_HTTPS
match access-group name SDM_HTTPS
class-map type inspect match-any SDM_SSH
match access-group name SDM_SSH
class-map type inspect match-any SDM_SHELL
match access-group name SDM_SHELL
class-map type inspect match-any sdm-cls-access
match class-map SDM_HTTPS
match class-map SDM_SSH
match class-map SDM_SHELL
class-map type inspect match-any ccp-skinny-inspect
match protocol skinny
class-map type inspect match-any ccp-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all ccp-insp-traffic
match class-map ccp-cls-insp-traffic
class-map type inspect match-any ccp-h323nxg-inspect
match protocol h323-nxg
class-map type inspect match-any ccp-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any ccp-h225ras-inspect
match protocol h225ras
class-map type inspect match-any ccp-h323annexe-inspect
match protocol h323-annexe
class-map type inspect match-all sdm-access
match class-map sdm-cls-access
match access-group 104
class-map type inspect match-any ccp-h323-inspect
match protocol h323
class-map type inspect match-all ccp-invalid-src
match access-group 103
class-map type inspect match-all ccp-icmp-access
match class-map ccp-cls-icmp-access
class-map type inspect match-any ccp-sip-inspect
match protocol sip
class-map type inspect match-all ccp-protocol-http
match protocol http
!
!
policy-map type inspect ccp-permit-icmpreply
class type inspect ccp-icmp-access
inspect
class class-default
pass
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
drop log
class type inspect ccp-protocol-http
inspect
class type inspect ccp-insp-traffic
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map type inspect ccp-permit
class type inspect sdm-access
inspect
class class-default
drop
!
zone security in-zone
zone security out-zone
zone-pair security ccp-zp-out-self source out-zone destination self
service-policy type inspect ccp-permit
zone-pair security ccp-zp-in-out source in-zone destination out-zone
service-policy type inspect ccp-inspect
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
!
!
!
interface ATM0
no ip address
no ip route-cache
no atm ilmi-keepalive
!
interface ATM0.1 point-to-point
no ip route-cache
pvc 0/32
oam-pvc manage
pppoe-client dial-pool-number 1
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
description $FW_INSIDE$
ip address 192.168.0.1 255.255.255.0
ip access-group 101 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
zone-member security in-zone
no ip route-cache
ip tcp adjust-mss 1412
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
ip mtu 1452
ip nat outside
ip virtual-reassembly
zone-member security out-zone
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname xxxxxxxx@qwest.net
ppp chap password 0 xxxxxxx
ppp pap sent-username xxxxxxx@qwest.net password 0 xxxxxxxxx
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 1 interface Dialer0 overload
!
ip access-list extended SDM_HTTPS
remark CCP_ACL Category=1
permit tcp any any eq 443
ip access-list extended SDM_SHELL
remark CCP_ACL Category=1
permit tcp any any eq cmd
ip access-list extended SDM_SSH
remark CCP_ACL Category=1
permit tcp any any eq 22
!
logging trap debugging
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 2 remark Auto generated by SDM Management Access feature
access-list 2 remark CCP_ACL Category=1
access-list 2 permit 192.168.0.0 0.0.0.255
access-list 100 permit ip any any
access-list 101 remark Auto generated by SDM Management Access feature
access-list 101 remark CCP_ACL Category=1
access-list 101 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq telnet
access-list 101 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 22
access-list 101 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq www
access-list 101 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 443
access-list 101 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq cmd
access-list 101 deny tcp any host 192.168.0.1 eq telnet
access-list 101 deny tcp any host 192.168.0.1 eq 22
access-list 101 deny tcp any host 192.168.0.1 eq www
access-list 101 deny tcp any host 192.168.0.1 eq 443
access-list 101 deny tcp any host 192.168.0.1 eq cmd
access-list 101 deny udp any host 192.168.0.1 eq snmp
access-list 101 permit ip any any
access-list 102 remark Auto generated by SDM Management Access feature
access-list 102 remark CCP_ACL Category=1
access-list 102 permit ip 192.168.0.0 0.0.0.255 any
access-list 103 remark CCP_ACL Category=128
access-list 103 permit ip host 255.255.255.255 any
access-list 103 permit ip 127.0.0.0 0.255.255.255 any
access-list 104 remark CCP_ACL Category=128
access-list 104 permit ip x.x.x.x 0.0.0.7 any
dialer-list 1 protocol ip permit
!
!
!
!
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
access-class 102 in
password **********
login
transport input telnet ssh
!
scheduler max-task-time 5000
end
and here is the show dsl interface atm 0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.1 (G.DMT) Annex A
ITU STD NUM: 0x03 0x1
Vendor ID: 'STMI' 'IFTN'
Vendor Specific: 0x0000 0x71C5
Vendor Country: 0x0F 0xB5
Chip ID: C196 (0)
DFE BOM: DFE3.0 Annex A (1)
Capacity Used: 63% 80%
Noise Margin: 25.5 dB 16.0 dB
Output Power: 17.0 dBm 10.0 dBm
Attenuation: 10.0 dB 6.5 dB
FEC ES Errors: 0 0
ES Errors: 0 0
SES Errors: 0 0
LOSES Errors: 0 0
UES Errors: 0 0
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0x02
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 8259 (0 spurious)
PHY Access Err: 0
Activations: 2
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: init_AMR-3.0.014_no_bist.bin
Operation FW: AMR-3.0.014.bin
FW Source: embedded
FW Version: 3.0.14Interleave Fast Interleave Fast
Speed (kbps): 7168 0 896 0
Cells: 185 0 1058430 0
Reed-Solomon EC: 0 0 0 0
CRC Errors: 0 0 0 0
Header Errors: 0 0 0 0
Total BER: 0E-0 0E-0
Leakage Average BER: 0E-0 0E-0
ATU-R (DS) ATU-C (US)
Bitswap: enabled enabled
Bitswap success: 0 0
Bitswap failure: 0 0LOM Monitoring : Disabled
DMT Bits Per Bin
000: 0 0 0 0 0 0 4 6 8 8 9 A B B B C
010: C C C C C C C B B B B B A 9 9 8
020: 0 0 0 0 0 0 0 4 5 5 6 7 7 8 8 9
030: 9 9 A A A A A A A A A A A B B A
040: 0 A B A B B B B B B B B B A B B
050: B B A B A B B B B B B B B B B A
060: B A B B A B A 2 A A A A B B A A
070: A A A A A A A A A A A A A A A A
080: A A A A A A A A A A A A A A A A
090: A A A A A A A A A A A A A A A 9
0A0: 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
0B0: 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
0C0: 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
0D0: 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
0E0: 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9 9
0F0: 9 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8DSL: Training log buffer capability is not enabled
and here is the configuration for cisco 857, this configuration used my other account has a block of static ip. but i had tried to change to a single ip, it works, just the cisco 877 is not working..
Building configuration...Current configuration : 11365 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname Cisco857
!
boot-start-marker
boot-end-marker
!
logging buffered 51200
logging console critical
enable secret 5 $1$NAWc$CH1VUmksNXMkkat90KfbB1
!
no aaa new-model
clock timezone PCTime -6
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
!
crypto pki trustpoint TP-self-signed-2303996204
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2303996204
revocation-check none
rsakeypair TP-self-signed-2303996204
!
!
crypto pki certificate chain TP-self-signed-2303996204
certificate self-signed 01
30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32333033 39393632 3034301E 170D3132 30353236 30333433
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 33303339
39363230 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100BF21 6828CD85 E210711C 803B25AB A8925091 A9857FFD 27F41EDF 5B3AF02C
2091C97B 5AE61741 54A5C59B CD67BBB5 BADC622C 72C66DB3 3C6EFB63 D26AD1E8
55E8359B 20537D4E 921BF325 BF0189D1 F239F6C6 5A25A749 8F4FADF2 6C221038
59B2E779 020BEA00 74E630F0 EB63F7A4 A27447A0 8A344173 BC8D3A49 42A0401B
9E030203 010001A3 68306630 0F060355 1D130101 FF040530 030101FF 30130603
551D1104 0C300A82 08436973 636F3835 37301F06 03551D23 04183016 80147DC7
C0A62275 777DE818 ED11203D 6AF0A21A 974F301D 0603551D 0E041604 147DC7C0
A6227577 7DE818ED 11203D6A F0A21A97 4F300D06 092A8648 86F70D01 01040500
03818100 0611714C D40109C7 5679E67E 79E22FC4 58EC1319 B19FDE21 636DC31D
E27333C5 7465A13C C841011A 0129F475 7C2F4B58 D45554CC 00B81B28 58E0A9B2
94477CBA 8CF21107 E3CB9983 10A0C225 A24CD3D8 B4BE5741 7AB4217C 4B239485
7ACBB5DB C836AD8B 44D14068 0B7B5D3B D6FEFAA3 02AFC77E 2310C0D8 83E84473 7E485DA3
quit
dot11 syslog
no ip source-route
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.0.1 192.168.0.99
!
ip dhcp pool ccp-pool1
import all
network 192.168.0.0 255.255.255.0
default-router 192.168.0.1
dns-server 192.168.0.2 205.171.2.65
!
ip dhcp pool Server1
hardware-address 0027.0e0a.9339
client-name Intel-i5
!
!
ip cef
ip inspect name CCP_LOW cuseeme
ip inspect name CCP_LOW dns
ip inspect name CCP_LOW ftp
ip inspect name CCP_LOW h323
ip inspect name CCP_LOW sip
ip inspect name CCP_LOW https
ip inspect name CCP_LOW icmp
ip inspect name CCP_LOW imap
ip inspect name CCP_LOW pop3
ip inspect name CCP_LOW rcmd
ip inspect name CCP_LOW realaudio
ip inspect name CCP_LOW rtsp
ip inspect name CCP_LOW esmtp
ip inspect name CCP_LOW sqlnet
ip inspect name CCP_LOW streamworks
ip inspect name CCP_LOW tftp
ip inspect name CCP_LOW tcp
ip inspect name CCP_LOW udp
ip inspect name CCP_LOW vdolive
no ip bootp server
ip name-server 205.171.3.65
ip name-server 205.171.2.65
!
!
!
username admin privilege 15 secret 5 $1$b8Ew$IT41ysH8Q0vre4RtpnVz2.
!
!
archive
log config
hidekeys
!
!
no ip ftp passive
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
!
!
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
description $FW_OUTSIDE$$ES_WAN$
pvc 0/32
pppoe-client dial-pool-number 1
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 192.168.0.1 255.255.255.0
ip access-group 103 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
ip route-cache flow
ip tcp adjust-mss 1412
!
interface Dialer0
description $FW_OUTSIDE$
ip address x.x.x.78 255.255.255.248
ip access-group 104 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip mtu 1452
ip inspect CCP_LOW out
ip nat outside
ip virtual-reassembly
encapsulation ppp
ip route-cache flow
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap pap callin
ppp chap hostname xxxxxx@qwest.net
ppp chap password 7 0961561xxxxxxxxxxxxx
ppp pap sent-username xxxxxxx@qwest.net password 7 112401xxxxxxxxxxx
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http access-class 3
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static 192.168.0.2 x.x.x.73
ip nat inside source static 192.168.0.3 x.x.x.75
!
logging trap debugging
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 2 remark CCP_ACL Category=2
access-list 2 permit 192.168.254.0 0.0.0.255
access-list 3 permit x.x.x.232
access-list 3 remark Auto generated by SDM Management Access feature
access-list 3 remark CCP_ACL Category=1
access-list 3 permit 192.168.0.0 0.0.0.255
access-list 100 remark Auto generated by SDM Management Access feature
access-list 100 remark CCP_ACL Category=1
access-list 100 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq telnet
access-list 100 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 22
access-list 100 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq www
access-list 100 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 443
access-list 100 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq cmd
access-list 100 permit udp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq snmp
access-list 100 deny tcp any host 192.168.0.1 eq telnet
access-list 100 deny tcp any host 192.168.0.1 eq 22
access-list 100 deny tcp any host 192.168.0.1 eq www
access-list 100 deny tcp any host 192.168.0.1 eq 443
access-list 100 deny tcp any host 192.168.0.1 eq cmd
access-list 100 deny udp any host 192.168.0.1 eq snmp
access-list 100 permit ip any any
access-list 101 remark Auto generated by SDM Management Access feature
access-list 101 remark CCP_ACL Category=1
access-list 101 permit ip 192.168.0.0 0.0.0.255 any
access-list 101 permit ip host x.x.x.x any
access-list 102 remark Auto generated by SDM Management Access feature
access-list 102 remark CCP_ACL Category=1
access-list 102 permit tcp host x.x.x.x host x.x.x.78 eq telnet
access-list 102 permit tcp host x.x.x.x host x.x.x.78 eq 22
access-list 102 permit tcp host x.x.x.x host x.x.x.78 eq www
access-list 102 permit tcp host x.x.x.x host x.x.x.78 eq 443
access-list 102 permit tcp host x.x.x.x host x.x.x.78 eq cmd
access-list 102 deny tcp any host x.x.x.78 eq telnet
access-list 102 deny tcp any host x.x.x.78 eq 22
access-list 102 deny tcp any host x.x.x.78 eq www
access-list 102 deny tcp any host x.x.x.78 eq 443
access-list 102 deny tcp any host x.x.x.78 eq cmd
access-list 102 deny udp any host x.x.x.78 eq snmp
access-list 102 permit ip any any
access-list 103 remark auto generated by CCP firewall configuration
access-list 103 remark CCP_ACL Category=1
access-list 103 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq telnet
access-list 103 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 22
access-list 103 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq www
access-list 103 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq 443
access-list 103 permit tcp 192.168.0.0 0.0.0.255 host 192.168.0.1 eq cmd
access-list 103 deny tcp any host 192.168.0.1 eq telnet
access-list 103 deny tcp any host 192.168.0.1 eq 22
access-list 103 deny tcp any host 192.168.0.1 eq www
access-list 103 deny tcp any host 192.168.0.1 eq 443
access-list 103 deny tcp any host 192.168.0.1 eq cmd
access-list 103 deny udp any host 192.168.0.1 eq snmp
access-list 103 deny ip x.x.x.72 0.0.0.7 any
access-list 103 deny ip host 255.255.255.255 any
access-list 103 deny ip 127.0.0.0 0.255.255.255 any
access-list 103 permit ip any any
access-list 104 remark auto generated by CCP firewall configuration
access-list 104 remark CCP_ACL Category=1
access-list 104 permit tcp host x.x.x.x host x.x.x.78 eq telnet
access-list 104 permit tcp host x.x.x.x host x.x.x.78 eq 22
access-list 104 permit tcp host x.x.x.x host x.x.x.78 eq www
access-list 104 permit tcp host x.x.x.x host x.x.x.78 eq 443
access-list 104 permit tcp host x.x.x.x host x.x.x.78 eq cmd
access-list 104 deny udp any host x.x.x.78 eq snmp
access-list 104 remark Custom Terminals
access-list 104 permit tcp any host x.x.x.73 range 1982 1984
access-list 104 remark Allow WebServer
access-list 104 permit tcp any host x.x.x.73 eq www
access-list 104 remark SVN Server
access-list 104 permit tcp any host x.x.x.73 eq 8443
access-list 104 remark From Rest To I7 All Port
access-list 104 permit ip host x.x.x.x host x.x.x.75
access-list 104 permit udp host 205.171.2.65 eq domain host x.x.x.78
access-list 104 permit udp host 205.171.3.65 eq domain host x.x.x.78
access-list 104 deny ip 192.168.0.0 0.0.0.255 any
access-list 104 permit icmp any host x.x.x.78 echo-reply
access-list 104 permit icmp any host x.x.x.78 time-exceeded
access-list 104 permit icmp any host x.x.x.78 unreachable
access-list 104 permit tcp 192.168.0.0 0.0.0.255 host x.x.x.78 eq 4443
access-list 104 deny ip 10.0.0.0 0.255.255.255 any
access-list 104 deny ip 172.16.0.0 0.15.255.255 any
access-list 104 deny ip 192.168.0.0 0.0.255.255 any
access-list 104 deny ip 127.0.0.0 0.255.255.255 any
access-list 104 deny ip host 255.255.255.255 any
access-list 104 deny ip host 0.0.0.0 any
access-list 104 deny ip any any log
dialer-list 1 protocol ip permit
no cdp run
!
control-plane
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you
want to use.
-----------------------------------------------------------------------
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
no modem enable
transport output telnet
line aux 0
login local
transport output telnet
line vty 0 4
access-class 101 in
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end
Solved! Go to Solution.
06-12-2012 01:50 AM
Hello,
A couple of suggestions:
Thank you!
Best regards,
Peter
06-12-2012 03:38 PM
Hello,
Let's continue with the suggestions:
Please keep me informed! Thank you!
Best regards,
Peter
06-12-2012 01:50 AM
Hello,
A couple of suggestions:
Thank you!
Best regards,
Peter
06-12-2012 09:50 AM
thank you for your reply.....
1. i didn't deactived ip cef, it just deactived itself.. -_-,
i tried:
Cisco877#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Cisco877(config)#ip cef
%Must enable ip routing first
Cisco877(config)#
2. i tried "no oam-pvc manage" at interface atm 0.1, but didn't work..
3.
show pppoe session:
----------------------------1 client session
Uniq ID PPPoE RemMAC Port Source VA State
SID LocMAC VA-st
N/A 110 50c5.8dd5.5628 ATM0.1 Di0 Vi1 UP
001e.be7d.1b66 VC: 0/32 UP-----------END SHOW PPPOE SESSION-------------------
show interface dialer0
---------------------------------Dialer0 is up, line protocol is up (spoofing)
Hardware is Unknown
Description: $FW_OUTSIDE$
Internet address is 207.224.103.27/32
MTU 1500 bytes, BW 56 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
Keepalive set (10 sec)
DTR is pulsed for 1 seconds on reset
Interface is bound to Vi1
Last input never, output never, output hang never
Last clearing of "show interface" counters 17:01:49
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/0/16 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 42 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
101 packets input, 5438 bytes
7329 packets output, 97178 bytes
Bound to:
Virtual-Access1 is up, line protocol is up
Hardware is Virtual Access interface
MTU 1500 bytes, BW 896 Kbit/sec, DLY 20000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, LCP Open
Listen: CDPCP
Open: IPCP
PPPoE vaccess, cloned from Dialer0
Vaccess status 0x44, loopback not set
Keepalive set (10 sec)
Interface is bound to Di0 (Encapsulation PPP)
Last input 00:08:54, output never, output hang never
Last clearing of "show interface" counters 16:58:16
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
7420 packets input, 102544 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
7322 packets output, 97083 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out
0 carrier transitions---------------END SHOW INTERFACE DIALER0----------------------
show interface atm 0
------------------------------------------------------ATM0 is up, line protocol is up
Hardware is MPC ATMSAR (with Alcatel ADSL Module)
MTU 4470 bytes, sub MTU 4470, BW 896 Kbit/sec, DLY 410 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ATM, loopback not set
Encapsulation(s): AAL5 AAL2, PVC mode
10 maximum active VCs, 1024 VCs per VP, 1 current VCCs
VC Auto Creation Disabled.
VC idle disconnect time: 300 seconds
Last input 16:56:24, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: Per VC Queueing
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
7458 packets input, 356894 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
13525 packets output, 865552 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 unknown protocol drops
0 output buffer failures, 0 output buffers swapped out-------------------END SHOW INTERFACE ATM 0-------------------------
show interface atm 0.1
-----------------------------------------------------ATM0.1 is up, line protocol is up
Hardware is MPC ATMSAR (with Alcatel ADSL Module)
MTU 4470 bytes, BW 896 Kbit/sec, DLY 410 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ATM
7460 packets input, 553627 bytes
7368 packets output, 545432 bytes
6160 OAM cells input, 6161 OAM cells output
AAL5 CRC errors : 0
AAL5 SAR Timeouts : 0
AAL5 Oversized SDUs : 0
Last clearing of "show interface" counters never--------------END SHOW INTERFACE ATM 0.1------------------
show atm pvc
-----------------------------------------------VCD / Peak Avg/Min Burst
Interface Name VPI VCI Type Encaps SC Kbps Kbps Cells Sts
0.1 1 0 32 PVC SNAP UBR 896 UP-----------------END SHOW ATM PVC--------------------
4. i had removed all firewall settigns....
still not working yet...
06-12-2012 03:38 PM
Hello,
Let's continue with the suggestions:
Please keep me informed! Thank you!
Best regards,
Peter
06-12-2012 05:14 PM
thank you very very much for the help aboves..... after i turn on ip routing and ip cef,, its working now,,, and again thank you very mush experts....
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide