Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello,
My network is connected like this. (I left out the other switches connected to the C3560CX)
[ISP modem]-[Cisco ISR C1111-8P]-[Cisco C3560CX]
The ISR is DHCP server, and running zone based firewall.
The C3560CX is the gateway for the hosts ...
I have been trying to get the ISR1100 (C1111-8P) connected to the internet, but no luck...
My ISP is UPC Cable.
Modem provides a dynamic IP so DHCP is required to obtain the public IP address.
I do get a public IP address.
When I set
ip route 0.0...
What would be the best networking practice, I have:
Cisco ISR1100 series router
Switch 1 3560cx
Switch 2 2960cx
Switch 3 (non maneagable "means no Cisco" L2 switch for security cameras)
Accesspoint AP2802i
Router 192.168.0.1
VLAN 10 192.168.10....
Today I got a Cisco ISR1100 (C1111-8P) router.
Maybe I am doing something wrong here but I can't figure out how to enter the initial setup.
I am connecting with a mini usb cable to the console, when the router is booted I type enable and asks me ...
Hello,
I would like to route between two vlans but one of the two vlans should also be accessible on the router (Sophos UTM).
My network has the following network devices.
[Sophos UTM] 192.168.122.1
[Cisco 3560CX SW1] 192.168.122.2
[Cisco SG300...
Thank you Rick for your reply!Its now clear to me that what I configured is not the way it should be.What I wanted to do is to offload traffic from the security cameras (in VLAN40) from the ISR.Did this by setting the Switch as the default gateway so...
When I do not set the IP default gateway to 192.168.10.1 then I cannot ping the internet from the switch and also not from the clients connected to the switch.
Thanks for your reply.
The ISR is also the firewalI.
I want to restrict guest (VLAN20) internet access by only inspecting port 80/443.
For the trusted devices (VLAN10) I want to have more ports to be able to connect to the internet.
For the securit...
Thank you for the suggestion.
Reason why I did this is security.
I used a Sophos UTM before which acted as a DNS proxy so no clients within the network could ever do DNS requests over port 53 but instead using the UTM.
If this is not a good sec...
Thanks!!! :)
Earlier I did try to put NAT inside on the interfaces but that didn't work, how silly they need to be configured on the VLAN interfaces of course.