06-17-2013 11:38 PM - edited 03-07-2019 01:56 PM
I have terminated my WAN link on cisco 1921 router,port is coming up but i am not able to ping the remote end ip address.i have change duplex ,speed and bandwidth also,but still not pinging.
for cross check i have directly connected WAN link to laptop ,now i can ping the remote end ip.
What can be issue,how do i solve this problem.
06-18-2013 12:02 AM
Hi,
could you elaborate a little more please because it is very vague description.
did you verify you router end had an ip address ? did you verify arp was working correctly?
Regards
Alain
Don't forget to rate helpful posts.
06-18-2013 12:57 AM
If you could post "show ip interface brief" and "show run" while plugged in to the WAN that would be helpful.
06-18-2013 02:31 AM
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.06.18 14:42:55 =~=~=~=~=~=~=~=~=~=~=~=
CCCC
*****************************************************************************
THIS SYSTEM IS FOR THE USE OF AUTHORIZED USERS ONLY.
USERS HAVE NO EXPLICT OR IMPLICIT EXPECTATIONS OF PRIVACY.
ANY OR ALL USE OF THIS SYSTEM AND ALL FILES ON THIS SYSTEM
MAY BE INTERCEPTED,MONITORED, RECORDED, COPIED, AUDITED,
INSPECTED, AND DISCLOSED TO THE NECESSARY AUTHORITIES. BY
USING THIS SYSTEM, THE USER CONSENTS TO SUCH INTERCEPTION.
UNAUTHORIZED OR IMPROPER USE, OR ATTEMPTED USE, OF THIS
SYSTEM MAY RESULT IN ADMINISTRATIVE DISCIPLINARY ACTION AND
CIVIL AND CRIMINAL PENALTIES. BY CONTINUING TO USE THIS SYSTEM
YOU INDICATE YOUR AWARENESS OF, AND CONSENT TO THESE TERMS
AND CONDITIONS OF USE. LOG OFF IMMEDIATELY IF YOU DO NOT AGREE
TO THE CONDITIONS THAT ARE STATED IN THIS WARNING.
****************************************************************************
User Access Verification
Username: cisc bharti
Password:
% Authentication failed
Username: cisco
Password:
IMCL-AMD01-RTR002#telnet 192.168.100.3
Trying 192.168.100.3 ... Open
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN
CREDENTIALS
Here are the Cisco IOS commands.
username
no username cisco
Replace
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
User Access Verification
Username: bha cisco
Password:
% Login invalid
Username: bharti
Password:
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username
Replace
use.
-----------------------------------------------------------------------
IMCL-AMD02-RTR002#sh run
Building configuration...
Current configuration : 5378 bytes
!
! Last configuration change at 09:10:18 UTC Tue Jun 18 2013 by bharti
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname IMCL-AMD02-RTR002
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
!
no aaa new-model
!
no ip icmp rate-limit unreachable
ip cef
!
!
--More-- !
!
!
!
no ipv6 cef
!
multilink bundle-name authenticated
!
!
crypto pki trustpoint TP-self-signed-2300688261
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2300688261
revocation-check none
rsakeypair TP-self-signed-2300688261
!
!
crypto pki certificate chain TP-self-signed-2300688261
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32333030 36383832 3631301E 170D3133 30333138 31313230
34345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 33303036
--More-- 38383236 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100E3EE 3FBEDA89 F2F14A97 4D53F1AB 86260E70 70CD1EAF E7D68633 39E4C90A
0F520529 06C02735 2990A550 6C16EFC2 CA7E2EA5 AD193443 9E3066BB 43D86D22
6824BCC2 B6BAAA9A 03311071 3609AB1C AB1FCBBA 627CFDD1 8D5592A1 D4740DBF
2B0E6096 5883223F 434E63F6 F5CEC3EE B570BCBD F9DA8F63 649E4C4B D9E0B5F8
F1350203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 142F4DE0 85958184 AD44AD32 08A999A6 EF6CA9CA 15301D06
03551D0E 04160414 2F4DE085 958184AD 44AD3208 A999A6EF 6CA9CA15 300D0609
2A864886 F70D0101 05050003 81810047 D8BEFDAC BBA65111 D28B61FD 6B7DB752
B063099F 8D6EF476 C770D879 AF94587F 71CF526A 9669D3B7 DDE6FCF4 C924D884
E9816526 7F72DDDE 75450F6C 2FDC0289 19B3A894 09C7C2D4 C5C54C04 83FA99C6
37668C4B 135AE2AF 4FB34997 DA6C395A 119A235C 85920B2E 4FDF56F3 A69E3C8E
74818062 E123F2FB B6CD55FB B84B87
quit
license udi pid CISCO1921/K9 sn FGL171220L2
!
!
username bharti privilege 15 password 0 bharti
!
redundancy
!
!
!
--More-- !
!
csdb tcp synwait-time 30
csdb tcp idle-time 3600
csdb tcp finwait-time 5
csdb tcp reassembly max-memory 1024
csdb tcp reassembly max-queue-length 16
csdb udp idle-time 30
csdb icmp idle-time 10
csdb session max-session 65535
!
!
!
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
--More-- interface GigabitEthernet0/0
description LAN-CONNECT
ip address 192.168.100.3 255.255.255.0
standby 1 ip 192.168.100.1
standby 1 preempt
duplex auto
speed auto
!
interface GigabitEthernet0/1
bandwidth 1024
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1/0
bandwidth 1024
ip address 10.227.35.38 255.255.255.252
duplex full
speed 100
!
interface FastEthernet0/1/1
no ip address
shutdown
duplex auto
speed auto
!
ip forward-protocol nd
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 0.0.0.0 0.0.0.0 FastEthernet0/1/0
ip route 10.227.35.64 255.255.255.252 10.227.35.37
!
!
!
!
control-plane
!
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------
--More--
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username
Replace
use.
-----------------------------------------------------------------------
^C
banner login ^C
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
--More--
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN
CREDENTIALS
Here are the Cisco IOS commands.
username
no username cisco
Replace
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
^C
!
line con 0
login local
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
privilege level 15
login local
transport input telnet ssh
line vty 5 15
access-class 23 in
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
!
end
IMCL-AMD02-RTR002#sh int fa
IMCL-AMD02-RTR002#sh int fastEthernet 0/1/0
FastEthernet0/1/0 is up, line protocol is up
Hardware is FastEthernet, address is b0fa.eb3a.e908 (bia b0fa.eb3a.e908)
Internet address is 10.227.35.38/30
MTU 1500 bytes, BW 1024 Kbit/sec, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 100Mb/s, 100BaseTX/FX
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:05:41, output 00:00:02, output hang never
Last clearing of "show interface" counters 02:02:25
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
22 packets input, 7772 bytes
Received 22 broadcasts (0 IP multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog
0 input packets with dribble condition detected
2431 packets output, 189416 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
IMCL-AMD02-RTR002# exit
[Connection to 192.168.100.3 closed by foreign host]
IMCL-AMD01-RTR002#exit
06-18-2013 03:06 AM
Hi,
first do this:
no ip route 0.0.0.0 0.0.0.0 FastEthernet0/1/0
ip route 0.0.0.0 0.0.0.0 x.x.x.x where x.x.x.x is your next-hop IP
Then try to ping 8.8.8.8 and if it is successful but you can't ping the other end it is surely because they filter ICMP.
Regards
Alain
Don't forget to rate helpful posts.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide