Hi guys, how is it going?
I would like to ask your help and present you a challenge:
In a CUCM 10.x environment, when my users call '8000' I need that:
- 1st option: Calls are routed to other PBX system (a SIP gateway connected to CUCM);
- 2nd option: If PBX gateway is unreachable, calls are routed to a voicemail (CUC mailbox) to users record their messages.
At this time, it works in a manual failover proccess: When users call '8000', theses calls get the route-patter '8000' that points to the SIP trunk (other PBX). If this other PBX goes down then I create a CTI route point and calls are redirected to CUC and users record their messages.
Somehow, I need this failover system becomes automatically. Any ideas?
... View more
Hi, I use this configuration: Router (g0/1) ---------- (f0/1) Switch Switch (f0/2) ---------- (eth) ADSL Modem Switch (f0/3) ---------- (eth) ADSL Modem :: ROUTER CONFIGURATION :: interface GigabitEthernet0/1 no ip address ip virtual-reassembly interface GigabitEthernet0/1.301 description MODEM-01 encapsulation dot1Q 301 no ip redirects no ip unreachables no ip proxy-arp ip virtual-reassembly pppoe enable group global pppoe-client dial-pool-number 1 interface GigabitEthernet0/1.302 description MODEM-02 encapsulation dot1Q 302 no ip redirects no ip unreachables no ip proxy-arp ip virtual-reassembly pppoe enable group global pppoe-client dial-pool-number 2 interface Dialer1 ip address negotiated ip flow ingress ip flow egress ip nat outside ip virtual-reassembly encapsulation ppp ip tcp adjust-mss 1452 load-interval 30 dialer pool 1 dialer-group 1 ppp authentication pap chap callin ppp chap hostname ppp chap password ppp pap sent-username password no cdp enable interface Dialer2 ip address negotiated ip flow ingress ip flow egress ip nat outside ip virtual-reassembly encapsulation ppp ip tcp adjust-mss 1452 load-interval 30 dialer pool 2 dialer-group 1 ppp authentication pap chap callin ppp chap hostname ppp chap password ppp pap sent-username password no cdp enable :: SWITCH CONFIGURATION :: interface FastEthernet0/1 description Router switchport mode trunk interface FastEthernet0/2 description Modem-1 switchport mode access switchport access vlan 301 interface FastEthernet0/2 description Modem-2 switchport mode access switchport access vlan 302 Bye!
... View more
Hello, I have a problem with the ACS 5.2 configuration: I am trying to use the AAA authorization to centralize privileges and commands but only the privilege level is sent to router, the command set aren't sent. The test cenary is this: ACS 5.2 Router 2900 family IOS 15.0 The ACS is configured with: Shell Profiles (to match with a privilege level), Command Sets (with the command list), Service Selection Rules (to set to one service) and Authorization (to assign one shell profile and one command set). The router is configured with the follows commands: aaa new-model aaa authentication login default group tacacs+ local aaa authorization config-commands aaa authorization exec default group tacacs+ aaa authorization commands 5 default group tacacs+ aaa authorization commands 10 default group tacacs+ aaa authorization configuration default group tacacs+ aaa session-id common tacacs-server host xxxxxxxxxxx tacacs-server key xxxxxxxxxxx Troubleshoot: In the reports (AAA Protocol > TACACS+ Authorization) the term "[ CmdAV= ]" is empty, no item was selected; In the router the privilege level is loaded, only the command set aren't: Router#show privilege Current privilege level is 15 debug aaa authorization: Jan 16 12:56:28.549: AAA/BIND(000000F2): Bind i/f Jan 16 12:56:30.317: AAA/AUTHOR (0xF2): Pick method list 'default' Jan 16 12:56:30.333: AAA/AUTHOR/EXEC(000000F2): processing AV cmd= Jan 16 12:56:30.333: AAA/AUTHOR/EXEC(000000F2): processing AV priv-lvl=5 Jan 16 12:56:30.333: AAA/AUTHOR/EXEC(000000F2): Authorization successful Can anyone help me please? Sorry for my english, Thanks,
... View more