03-21-2013 07:38 AM - edited 03-07-2019 12:24 PM
We have:
Print server: TROY PocketPro 100s(Ethernet)
Cisco cat 2960
Cisco 2911
Config Cisco 2911
mac address of print server logged in dhcp pool
i can connect print server with home assus router.he is get dhcp options correctly.
!
! Last configuration change at 18:13:02 Moscow Thu Sep 20 2012 by root
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 1308-2911-1
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
no logging console
enable secret 5 *CENSORED*
!
aaa new-model
!
aaa user profile 1308
!
aaa authentication login default local
aaa authorization exec default local
!
!
!
!
!
aaa session-id common
!
clock timezone Moscow 4 0
!
no ipv6 cef
ip source-route
ip cef
!
!
!
!
ip dhcp pool MGMT(UPS_card)
import all
network 172.16.10.0 255.255.255.0
default-router 172.16.10.1
dns-server 8.8.8.8
!
ip dhcp pool GUEST-POOL
network 172.16.111.0 255.255.255.0
default-router 172.16.111.1
dns-server 8.8.8.8
!
ip dhcp pool admin
origin file tftp://address
default-router 172.16.20.1
dns-server 172.16.50.253 10.128.1.22 10.128.1.23 8.8.8.8
!
ip dhcp pool elementary
origin file tftp://address
default-router 172.16.30.1
dns-server 172.16.50.253 10.128.1.22 10.128.1.23 8.8.8.8
!
ip dhcp pool it-class
origin file tftp://address
default-router 172.16.40.1
dns-server 172.16.50.253 10.128.1.22 10.128.1.23 8.8.8.8
!
ip dhcp pool general
origin file tftp://address
default-router 172.16.50.1
dns-server 172.16.50.253 10.128.1.22 10.128.1.23 8.8.8.8
!
ip dhcp pool guest
default-router 172.16.111.1
dns-server 8.8.8.8 10.128.1.22 10.128.1.23
!
!
ip domain name yourdomain.com
ip name-server 10.128.1.22
ip name-server 10.128.1.23
!
multilink bundle-name authenticated
!
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-1634340867
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1634340867
revocation-check none
rsakeypair TP-self-signed-1634340867
!
!
crypto pki certificate chain TP-self-signed-1634340867
certificate self-signed 01
*CENSORED*
quit
license udi pid CISCO2911/K9 sn *CENSORED*
!
!
!
redundancy
!
!
ip tftp source-interface GigabitEthernet0/0
ip ssh version 2
!
class-map match-all IP
match any
!
!
policy-map shaping
class IP
shape average 1000000
!
bridge irb
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
!
interface GigabitEthernet0/0
description Internet
no ip address
ip access-group Inet-in in
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
bridge-group 100
bridge-group 100 spanning-disabled
!
interface GigabitEthernet0/1
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/1.10
description MGMT
encapsulation dot1Q 10 native
ip address 172.16.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.20
description private_eth
encapsulation dot1Q 20
ip address 172.16.20.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.30
description public_eth
encapsulation dot1Q 30
ip address 172.16.30.1 255.255.255.0
ip access-group VLAN30-in in
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.40
description private_WiFi
encapsulation dot1Q 40
ip address 172.16.40.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.50
description public_WiFi
encapsulation dot1Q 50
ip address 172.16.50.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface GigabitEthernet0/1.100
encapsulation dot1Q 100
bridge-group 100
bridge-group 100 spanning-disabled
!
interface GigabitEthernet0/1.111
encapsulation dot1Q 111
ip address 172.16.111.1 255.255.255.0
ip access-group GUESTVLAN in
ip nat inside
ip virtual-reassembly in
service-policy output shaping
!
interface GigabitEthernet0/2
no ip address
shutdown
duplex auto
speed auto
!
interface BVI100
ip address 10.137.87.254 255.255.255.128
ip nat outside
ip virtual-reassembly in
arp timeout 60
!
ip forward-protocol nd
!
no ip http server
ip http access-class 23
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip flow-export destination 10.143.255.42 9995
!
ip nat inside source list PAT interface BVI100 overload
ip route 0.0.0.0 0.0.0.0 10.137.87.129
ip route 0.0.0.0 0.0.0.0 Null0 255
!
ip access-list extended GUESTVLAN
deny ip 172.16.111.0 0.0.0.255 172.16.0.0 0.0.63.255
permit ip any any
ip access-list extended Inet-in
permit icmp any any
permit ip any any
remark ------------------------ to do -----------------------
permit udp any eq domain any
permit tcp any any established
deny ip any any
ip access-list extended PAT
deny udp any range 6881 6889 any
permit ip 172.16.10.0 0.0.0.255 any
permit ip 172.16.20.0 0.0.0.255 any
permit ip 172.16.40.0 0.0.0.255 any
permit ip 172.16.30.0 0.0.0.255 any
permit ip 172.16.50.0 0.0.0.255 any
permit ip 172.16.111.0 0.0.0.255 any
deny ip any any
ip access-list extended VLAN30-in
permit ip any any
ip access-list extended VLAN50-in
permit ip any any
!
logging source-interface GigabitEthernet0/0
logging 10.143.255.2
logging 10.143.255.6
logging 10.143.255.10
logging 10.143.255.14
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 23 permit 10.143.255.0 0.0.0.255
access-list 23 permit any
!
!
!
!
!
snmp-server community school-ro RO
snmp-server community school-rw RW
snmp-server location enter address
snmp-server enable traps envmon
snmp-server enable traps flash insertion removal
snmp-server enable traps config
snmp-server enable traps cpu threshold
snmp-server host 10.143.255.10 version 2c school-ro
snmp-server host 10.143.255.14 version 2c school-ro
snmp-server host 10.143.255.2 version 2c school-ro
snmp-server host 10.143.255.42 version 2c school-ro
snmp-server host 10.143.255.6 version 2c school-ro
!
!
!
control-plane
!
bridge 100 protocol ieee
bridge 100 route ip
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
access-class 23 in
privilege level 15
transport input telnet ssh
line vty 5 15
access-class 23 in
privilege level 15
transport input telnet ssh
!
scheduler allocate 20000 1000
ntp source GigabitEthernet0/0
ntp server 10.143.255.2
ntp server 10.143.255.6
ntp server 10.143.255.10
ntp server 10.143.255.14
end
some Cisco cat 2960 config:
!
version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname 1308-2960-up-1
!
boot-start-marker
boot-end-marker
!
no logging console
!
!
!
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
!
!
!
aaa session-id common
clock timezone Moscow 4
system mtu routing 1500
!
!
ip domain-name mydomain.com
ip name-server 8.8.8.8
!
!
crypto pki trustpoint TP-self-signed-2802847744
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2802847744
revocation-check none
rsakeypair TP-self-signed-2802847744
!
!
crypto pki certificate chain TP-self-signed-2802847744
certificate self-signed 01
*CENSORED*
quit
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
ip ssh version 2
!
!
interface FastEthernet0/1
description WiFi
switchport access vlan 10
switchport trunk native vlan 10
switchport mode trunk
spanning-tree portfast
!
interface FastEthernet0/2
description WiFi
switchport access vlan 20
switchport trunk native vlan 10
switchport mode trunk
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/3
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/4
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/5
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/6
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/7
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/8
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/9
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/10
switchport access vlan 20
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/11
description WiFi
switchport access vlan 20
switchport trunk native vlan 10
switchport mode trunk
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/12
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/13
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/14
switchport access vlan 40
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/15
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/16
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/17
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/18
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/19
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/20
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/21
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/22
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/23
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface FastEthernet0/24
switchport access vlan 50
switchport mode access
storm-control broadcast level 10.00
spanning-tree portfast
!
interface GigabitEthernet0/1
switchport trunk native vlan 10
switchport mode trunk
!
interface GigabitEthernet0/2
switchport trunk native vlan 10
switchport mode trunk
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
interface Vlan10
ip address 172.16.10.12 255.255.255.0
no ip route-cache
!
interface Vlan20
no ip address
no ip route-cache
!
interface Vlan30
no ip address
no ip route-cache
!
interface Vlan40
no ip address
no ip route-cache
!
interface Vlan50
no ip address
no ip route-cache
!
interface Vlan100
no ip address
no ip route-cache
!
interface Vlan111
no ip address
no ip route-cache
!
ip default-gateway 10.137.87.129
ip http server
ip http secure-server
logging 10.143.255.2
logging 10.143.255.6
logging 10.143.255.10
logging 10.143.255.14
access-list 23 permit any
snmp-server community school-ro RO
snmp-server community school-rw RW
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps transceiver all
snmp-server enable traps tty
snmp-server enable traps cluster
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rep
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps auth-framework sec-violation
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps energywise
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency
snmp-server enable traps syslog
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 10.143.255.10 version 2c school-ro
snmp-server host 10.143.255.14 version 2c school-ro
snmp-server host 10.143.255.2 version 2c school-ro
snmp-server host 10.143.255.42 version 2c school-ro
snmp-server host 10.143.255.6 version 2c school-ro
!
line con 0
exec-timeout 30 0
line vty 0 4
access-class 23 in
exec-timeout 30 0
transport input telnet ssh
line vty 5 15
access-class 23 in
exec-timeout 30 0
transport input telnet ssh
!
ntp clock-period 36029305
ntp server 10.143.255.14
ntp server 10.143.255.10
ntp server 10.143.255.6
ntp server 10.143.255.2
end
03-21-2013 11:26 AM
Hello,
Can you please describe your problem little bit more. In router configuration I can see nothing about your print server.
Best Regards
Please rate all helpful posts and close solved questions
03-21-2013 11:39 PM
Print-server successfully connected by static ip.
Print-server writed in tftp pools.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide