cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2967
Views
0
Helpful
1
Replies

Cisco 1941 router GE0/1 port burnt and need to configure Fastethernet port

bmkangaza
Level 1
Level 1

Greetings All,

I Have a Cisco 1941 router which had its GE0/1 port burnt out and we have since plugged in a module with 4 fast ethernet ports. I need to reconfigure the router such that at least one of the Fast ethernet ports can server the purpose of the GE0/1. GE0/0 connects to our Service provider and GE0/1 connected to the inside network.

Currently, while connected to one of the ethernet ports, i can telnet into the router on the address 192.168.29.1. when i'm on the router, i can ping our remote site, network address 192.168.24.0 with no problem, but when i use the command "Ping 192.168.24.0 source 192.168.29.1" there is no response.

From my PC i can ping 192.168.29.1 which is the Fastethernet interface i am connected to, but cannot ping anything outside my network.

My Cisco configuration skills are very basic and i'd appreciate your suggestions.

Here below is a copy of the "Show Running-config" output:

"-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.

YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN
CREDENTIALS

Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want
to use.

IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.

For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------


User Access Verification

Password:
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------

ROUTER1#show run
Building configuration...

Current configuration : 5475 bytes
!
! Last configuration change at 07:07:21 UTC Thu Aug 30 2012
!
version 15.0
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER1
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 warnings
enable secret 5 $1$n/DR$L82IP/4oVk9jjCHJVWdOR/
!
no aaa new-model
!
no ipv6 cef
ip source-route
ip cef
!
!
ip dhcp excluded-address 192.168.29.1 192.168.29.10
ip dhcp excluded-address 192.168.29.254
!
ip dhcp pool ROUTER1_COMPANY
network 192.168.29.0 255.255.255.0
default-router 192.168.29.1
domain-name roads.gov.zm
dns-server 192.168.29.1 192.168.24.4 196.12.12.65 196.12.12.66
!
!
no ip domain lookup
ip domain name yourdomain.com
multilink bundle-name authenticated
!
!
crypto pki trustpoint TP-self-signed-2085554255
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2085554255
revocation-check none
rsakeypair TP-self-signed-2085554255
!
!
crypto pki certificate chain TP-self-signed-2085554255
certificate self-signed 01
30820251 308201BA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32303835 35353432 3535301E 170D3132 30383239 30373237
35365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 30383535
35343235 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100ACC6 B93BE72F C077711D E6EB0B05 7A4ED6B2 3B5F3A0C F4CF8CC8 43BF8D6B
A3602E89 A0487961 3D521461 4BFECBE5 64E5C77F FBBF3A54 D5E48FBA 6CE4B17B
BC92E5EB 670F903D 088A0E6B D7C1E704 8D9566FE 30ABA664 55BE5CDE 7B5B346F
3795D288 92A3F272 5E821FD1 C4580BAC CC36EA68 88284D84 45EBC59C 2148FF0D
7BBB0203 010001A3 79307730 0F060355 1D130101 FF040530 030101FF 30240603
551D1104 1D301B82 19524441 2D4B4153 414D412E 796F7572 646F6D61 696E2E63
6F6D301F 0603551D 23041830 168014AE 11900D4F F2D9F3DE 96202C7C 5642DAAD
36CF3330 1D060355 1D0E0416 0414AE11 900D4FF2 D9F3DE96 202C7C56 42DAAD36
CF33300D 06092A86 4886F70D 01010405 00038181 0044D429 F4529055 4C75B2E1
D356F587 5BD1BB37 8C9B6483 E036FC55 5C1B3768 1EBFF215 D900BFB1 3DAF367C
C7B2FD39 B71EF1E4 2C8E9BD9 8837A604 78C2BD57 5B7941A1 ED4A0117 C76607AE
838E278D F8BD584A DD55DD2B BB7DE98C 8C149F31 47320064 583BD21A F036DED0
9C35FC3C 2373CA4B 46590CA1 116C8B65 26004666 DE
quit
license udi pid CISCO1941/K9 sn FCZ151690A5
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
description connection to ZAMTEL
ip address 172.16.0.42 255.255.255.248
duplex auto
speed auto
!
interface GigabitEthernet0/1
description connection to LAN
no ip address
duplex auto
speed auto
!
interface FastEthernet0/0/0
!
interface FastEthernet0/0/1
!
interface FastEthernet0/0/2
!
interface FastEthernet0/0/3
!
interface Vlan1
ip address 192.168.29.1 255.255.255.0
!
ip forward-protocol nd
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 0.0.0.0 0.0.0.0 192.168.29.254
ip route 10.224.199.0 255.255.255.0 172.16.0.44
ip route 172.16.0.0 255.255.255.0 172.16.0.44
ip route 192.168.24.0 255.255.255.0 172.16.0.44
!
!
!
!
control-plane
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------
^C
banner login ^C
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.

YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN
CREDENTIALS

Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want
to use.

IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.

For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
^C
!
line con 0
password @#$%$777%$@#9*&%%$3
login
line aux 0
password r#21@#$%%^&*(*_++":$###
login
line vty 0 4
access-class 23 in
privilege level 15
password 4#2#4%^^&*7^^***)(_++=-)9
login
transport input telnet ssh
line vty 5 15
access-class 23 in
privilege level 15
password 32!2#$%^%$%^&*()98&65$5$##@!#$%
login
transport input telnet ssh
!
scheduler allocate 20000 1000
end

ROUTER1#"

1 Reply 1

Hi Bisenti,

the subnet in VLAN 1 is doing recursive routing and it is not communicating with the external world:

ip route 0.0.0.0 0.0.0.0 192.168.29.254

this is your default route that is pointing to the local VLAN 1.  Vlan1 is not even advertised and can't be reached.

change the above static route replacing the 192.168.29.254 with the next layer 3 hop or interface.

Actually you should even review the g0/1 config... if you posted a topology i could help you a little bit more wit the code

Let me know

Alessio

Review Cisco Networking for a $25 gift card