Diversity antenna systems ?
When using two AIR-ANT2506 antennas for a diversity antenna systems, how far apart should they be? I've seen 5", 5.5" 18" etc.
Note that cisco's view is not to go greater than 20" or 4 wavelengths. If you space your antennas greater you run a higher CHANCE of them effecting the performance of your wireless nodes. The cell of each antenna begins to be to far apart and the users start to see their connection dropping. The way i have calculated this is that cisco states you should not exceed 4 multiples of the wavelength... 4x5" = 20". =)
But this is also a thread from 2005 and i doubt the gentleman is still looking for an answer ;)
Similar Messages
-
Diversity Antenna for 1250 Series
For the 1250 Series do you need to specifically purchase a "diversity" antenna, or does that just come with the fact that there are 3 antennas per radio module?
Thanks,
PaulPaul,
I guess that depends by what you mean when you say diversity.
Directional antennas provide just that, direction. Where your signal coverage is 'directed' to just a certain area, such as long range, or in a 90 degree pattern, etc.
By diversity, that sounds more like the fact that each radio has 3 antenna outputs. So each of the radios in the 1252 Access Point is sending out 3 signals at one time. Whether each of the these 3 antennas is separate, or all built into one piece..its still 3 diverse signals.
Hope this doesn't confuse you any more than you already were :)
-Luke -
I was researching something else and ran across some info written by iFixit.
It was talking about the problem with calls on the ATT network and said:
"Apple has gone a step further and tuned the phone to utilize whichever network band is less congested or has the least interference for the best signal quality, regardless of the actual signal strength. Early reports suggest this feature, while buggy in its early stages, will greatly improve the phone's reliability on AT&T's fragile network."
Interesting, considering how some people have talked about worse signals. Maybe that isn't because of worse reception, but the software simply choosing a weaker, but less congested, tower.
I can easily see how this process could screw things up as well as make things better, depending on the details of how it works.With no doubt At&t is the fastest network out there...their internet speed is already close to 4G from sprint...i dont care how well they make verizon sound good they have the slowest network of all the us carriers...people complain about AT&T .... I dont get why nobody complains about other network being slow...ive compared my old 3GS with the best sprint, t-mobile, verizon has to offer...and they are slower compared to At&t unless its on 4G...which is not even that fast...let alone 4G phones eat a lot of battery life...
-
Will disabling wifi cut power to the wifi card and antenna system?
I have searched the web and even called Apple to have this question answered, nothing found online and apple support kept changing their answer. I would like to keep using the AirPort extreme with ethernet but disable the wifi. I know that turning off wifi on a Mac will cut the power to the AirPort card and stop it from emitting any kind of signal (at least this is what I have been told many times). I am wondering if this goes for the AirPort Extreme as well.
I do not have any kind of equipment to measure signal emissions so I just went off of power readings. I do not have the exact readings here with me at the moment but with wifi on and disabled the extreme uses the exact same mount of power. I know this is hardly accurate but it's all I could do
Does anyone have more detailed/technical information or the equipment to test and verify if the radio is actually disabled when wifi is turned off in AriPort Utility? Apple support told me that when wifi is disabled it will continue to broadcast a signal with the same strength, just not one that can be picked up (no name etc), that it would only stop if the power was cut completely. Then I was told, as soon as wifi is disabled there is only a very weak scattered signal left and then I was told there was no signal at all. (Amazing what kind of answers you can get if you just epeat the same question several times).
Any help appreciated.Although I do not have a spectrum analyser.. I do have an excellent ubiquiti router which will produce a spectrum which is somewhat useful at least at 2.4ghz.
I have reduced the wireless routers around me to absolute min.
And I can only do this on 2.4ghz..
So this shows a dlink from a neighbour and the TC sitting near the ubiquiti.
Then I can do a spectrum analysis.
This is with wireless on. You can see the waterfall display of plenty of signal in the channel 6 area.
Now a spectral analysis with wireless off.
You can clearly see there is now no signal at channel 6.. so wireless off has turned off the RF on the TC.
Hope that helps. -
Antenna diversity in LAP1242AG?
Is the antenna diversity functionality in the LAP1242AG described somewhere? I have checked that both antenna ports are used for both transmit and receive. Eg is there a memory that remembers what port a client was best heard/receieved on? What happens with mobile client in a multi path environment. Note: I plan to use dual polarised antennas.
Hi Niklas,
Here is some info on the use of Diversity Antennas;
The purpose of diversity is to overcome multipath reflections. Diversity antennas that share the same physical housing are placed at an optimum distance apart. The maker of the particular antenna determines that distance based on the characteristics of the antenna. When you use a pair of antennas with matching characteristics to provide diversity for cell coverage in your facility, the guideline is to put those matched antennas at a distance apart from each other that is equal to a multiple of the wavelength of the frequency that is being transmitted. The 2.4 GHz wavelength is approximately 4.92 inches. Therefore, to support diversity on a 2.4 GHz radio with two separate antennas, the antennas should be spaced approximately 5 inches apart. The antenna pair could also be spaced at multiples of 5 inches, but the distance between should not exceed 4 multiples: reflected waves farther apart than that are likely to be so distorted and different in delay spread that the radio could not work with them.Because each antenna is selected by itself, both antennas must have the same radiation characteristics and be positioned to provide similar cell coverage. Two antennas connected to the same access point must not be used to cover two different cells.
From this good doc;
Multipath and Diversity
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008019f646.shtml
"You can relate this to a common occurrence in your car. As you pull up to a stop, you may notice static on the radio. But as you move forward a few inches or feet, the station starts to come in more clearly. By rolling forward, you move the antenna slightly, out of the point where the multiple signals converge.
A diversity antenna system can be compared to a switch that selects one antenna or another, never both at the same time. The radio in receive mode will continually switch between antennas listening for a valid radio packet. After the beginning sync of a valid packet is heard, the radio will evaluate the sync signal of the packet on one antenna, then switch to the other antenna and evaluate. Then the radio will select the best antenna and use only that antenna for the remaining portion of that packet.
On transmit, the radio will select the same antenna it used the last time it communicated to that given radio. If a packet fails, it will switch to the other antenna and retry the packet.
One caution with diversity, it is not designed for using two antennas covering two different coverage cells. The problem in using it this way is that, if antenna no. 1 is communicating to device no. 1 while device no. 2 (which is in the antenna no. 2 cell) tries to communicate, antenna no. 2 is not connected (due to the position of the switch), and the communication fails. Diversity antennas should cover the same area from only a slightly different location."
From this Antenna reference guide;
http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008008883b.html
Here is the best description of why to use Diversity Antennas (in laymans terms) from a great NetPro ScottMac. When I read his reference to being at a stadium watching a sporting event, this all finally made sense.Have a look at his great explanation;
http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Wireless%20-%20Mobility&topic=WLAN%20Radio%20Standards&CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dd7905b/6#selected_message
Hope this helps!
Rob -
What's the purpose for the two Wireless Antennas on a WAP?
I have a very simple question, that I'm a little confused about. Here it goes.
Most Access Points have two antennas. One is labeled as LEFT/PRIMARY and the other is RIGHT.
What is the purpose for the two antennas? When I have one antenna connected it works without any issues. Can I just use the LEFT/PRIMARY antenna for wireless connectivity? What are the purpose for the two?
And we are talking about a single band, 802.11b/g NOT 802.11a.
Thank you!Hi Rashida,
The use of two Antennas on these AP's is used for "Diversity Mode. In many cases, 1 single Antenna will work nicely. Here is an explanation for the use of two Antennas :)
This describes the use of 2 **Identical Antennas in "Diversity" Mode;
The purpose of diversity is to overcome multipath reflections. Diversity antennas that share the same physical housing are placed at an optimum distance apart. The maker of the particular antenna determines that distance based on the characteristics of the antenna. When you use a pair of antennas with matching characteristics to provide diversity for cell coverage in your facility, the guideline is to put those matched antennas at a distance apart from each other that is equal to a multiple of the wavelength of the frequency that is being transmitted. The 2.4 GHz wavelength is approximately 4.92 inches. Therefore, to support diversity on a 2.4 GHz radio with two separate antennas, the antennas should be spaced approximately 5 inches apart. The antenna pair could also be spaced at multiples of 5 inches, but the distance between should not exceed 4 multiples: reflected waves farther apart than that are likely to be so distorted and different in delay spread that the radio could not work with them.Because each antenna is selected by itself, both antennas must have the same radiation characteristics and be positioned to provide similar cell coverage.
**** Two antennas connected to the same access point must not be used to cover two different cells.****
From this good doc;
Multipath and Diversity
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008019f646.shtml
A diversity antenna system can be compared to a switch that selects one antenna or another, never both at the same time. The radio in receive mode will continually switch between antennas listening for a valid radio packet. After the beginning sync of a valid packet is heard, the radio will evaluate the sync signal of the packet on one antenna, then switch to the other antenna and evaluate. Then the radio will select the best antenna and use only that antenna for the remaining portion of that packet.
On transmit, the radio will select the same antenna it used the last time it communicated to that given radio. If a packet fails, it will switch to the other antenna and retry the packet.
One caution with diversity, it is not designed for using two antennas covering two different coverage cells. The problem in using it this way is that, if antenna no. 1 is communicating to device no. 1 while device no. 2 (which is in the antenna no. 2 cell) tries to communicate, antenna no. 2 is not connected (due to the position of the switch), and the communication fails. Diversity antennas should cover the same area from only a slightly different location."
Diversity Antenna Systems
Diversity antenna systems are used to overcome a phenomenon known as multipath distortion of multipath fading. It uses two **identical antennas, located a small distance apart, to provide coverage to the same physical area.
From this Antenna reference guide;
http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008008883b.html
Hope this helps!
Rob -
Tips on air-ant1728 with ap 1242
has anyone got any ideas on this... we have wlan project for warehouse and we're lookin at the 5.2 dBi 1728 antena. should this antena come in pairs or only one? will the gain increased to 10.4 dBi if used in pairs? if in pairs, can it be installed like the right will point in one direction and the other on another direction?
a bit confused here...
thanks for any ideas!Hi Pirate,
Arrgghh Matey!
This is NOT supported :( Have a close look at the attached docs (especially the Golf Course Case Study);
The use of two Antennas on these AP's is used for "Diversity Mode" and won't change the stated transmit power of the Antenna as only one Transmits at any given time. Here is an explanation for the use of two Antennas :)
This describes the use of 2 **Identical Antennas in "Diversity" Mode;
The purpose of diversity is to overcome multipath reflections. Diversity antennas that share the same physical housing are placed at an optimum distance apart. The maker of the particular antenna determines that distance based on the characteristics of the antenna. When you use a pair of antennas with matching characteristics to provide diversity for cell coverage in your facility, the guideline is to put those matched antennas at a distance apart from each other that is equal to a multiple of the wavelength of the frequency that is being transmitted. The 2.4 GHz wavelength is approximately 4.92 inches. Therefore, to support diversity on a 2.4 GHz radio with two separate antennas, the antennas should be spaced approximately 5 inches apart. The antenna pair could also be spaced at multiples of 5 inches, but the distance between should not exceed 4 multiples: reflected waves farther apart than that are likely to be so distorted and different in delay spread that the radio could not work with them.Because each antenna is selected by itself, both antennas must have the same radiation characteristics and be positioned to provide similar cell coverage.
**** Two antennas connected to the same access point must not be used to cover two different cells.****
From this good doc;
Multipath and Diversity
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008019f646.shtml
A diversity antenna system can be compared to a switch that selects one antenna or another, never both at the same time. The radio in receive mode will continually switch between antennas listening for a valid radio packet. After the beginning sync of a valid packet is heard, the radio will evaluate the sync signal of the packet on one antenna, then switch to the other antenna and evaluate. Then the radio will select the best antenna and use only that antenna for the remaining portion of that packet.
On transmit, the radio will select the same antenna it used the last time it communicated to that given radio. If a packet fails, it will switch to the other antenna and retry the packet.
One caution with diversity, it is not designed for using two antennas covering two different coverage cells. The problem in using it this way is that, if antenna no. 1 is communicating to device no. 1 while device no. 2 (which is in the antenna no. 2 cell) tries to communicate, antenna no. 2 is not connected (due to the position of the switch), and the communication fails. Diversity antennas should cover the same area from only a slightly different location."
Diversity Antenna Systems
Diversity antenna systems are used to overcome a phenomenon known as multipath distortion of multipath fading. It uses two **identical antennas, located a small distance apart, to provide coverage to the same physical area.
From this Antenna reference guide;
http://www.cisco.com/en/US/products/hw/wireless/ps469/products_data_sheet09186a008008883b.html
Hope this helps!
Rob -
Antenna Diversity - Diff Antennas for Transmit and Recieve
Hi,
There is a wierd question wandering i my mind as I read abt Antenna Diversity.
- It eleminates multipath distortions
1. Now if we turn off diverity. Can I use one antenna for Transmit and the Other Antenna for Recive?
2. When We say Antenna Diversity, is it Transmit Diversity or Receive Diversity or both?1. No, access points cannot use one for transmit and one for receive. The reason is that both antennas connect to the same radio, and the radio itself can only transmit or listen, never both at once.
2. Diversity is receive diversity. Transmitting the same signal twice would just make multipath worse :)
A few other points that should hopefully make things a bit clearer:
- Only one antenna is active at a time. The radio uses one to transmit a signal, and it flips between the two antennas very quickly while receiving.
- Diversity works by comparing two similar signals and seeing which one is stronger. The real advantage gained from diversity is the physical separation of the antennas. Since they're located in two different spots, the signal will vary between these two spots, and the AP can pick which one of these spots has the better signal at any given time.
- Diversity antennas should never be deployed to create two separate coverage areas. The two antennas should be identical, be deployed identically, and be intended to create a single coverage area. They should be as close together as possible, and they should be some multiplier of the frequency's wavelength. Using rubber duck antennas on a Cisco AP takes care of all of these points, but you need to keep them all in mind if you ever use detached antennas.
I hope that helps!
Jeff -
Anyone know the name of the small coax used for antennas on most WRT series routers?
I am looking for more information on the coax cable used on most WRT series routers. It has a clear jacket, approximately 1/8" thick. Only way to see is by opening your router, or looking inside the rubber part of antenna.
I would appreciate any experienced assistance!Big Daddy, One other thing I forgot to mention is, If you open the case on your device, you'll instantly void any warranty that came with it. Also, bear in mind, any modifications that you make to the antenna system on this device could not only make the FCC approval that Linksys was given for the device null and void. Be very careful with anything like an antenna system on these devices, you can actually recieve RF burns if you contact any bare metal of the antenna system when it is transmitting. Just bear in mind that 2.4GHz is more less the same frequency that a microwave oven uses (although at a LOT lower power). As a radio ham, I've had the odd RF burn and I can tell you, they really hurt!.
-
Use of external Aironet Antennas
When comparing between the 2 models of external antennas (AIR-ANT5170P-R and AIR-ANT2460P-R), I noticed that they comes with different number of connectors (RP-TNC). The AIR-ANT5170P-R comes with two connectors, while the AIR-ANT2460P-R comes with one connector.
Assuming IÂm using the Cisco 1242 Series Dual Radio AP, how many of the AIR-ANT2460P-R antenna do I connect to the 2.4GHz ports?
I believe I will only need to connect 1 unit of the AIR-ANT5170P-R antenna to the 5GHz port, as it already comes with two connectors.Hi Tan,
You are on the right track here for sure :)
Why don't you try this Antenna instead of the 2460;
AIR-ANT2465P-R
Diversity Patch
Wall-mount indoor/outdoor antenna with two RP-TNC connectors-Similar to the above patch, but providing diversity antennas in the same package for areas where multipath problems exist. The pigtail cable is plenum rated and 36" long.
http://www.cisco.com/en/US/prod/collateral/wireless/ps7183/ps469/product_data_sheet09186a008008883b.html
Hope this helps!
Rob -
I am looking how to easily and cheaply receive analog and or hmdi tv reception through an over the air antenna. I will be at an RV park for a week and want to watch news. I want something simple. My travel trailer has built in antenna system with coaxial connection. Is there something connection that I can plug into my MacBook Pro (2012) which will convert to the coaxial or a standalone antenna in the trailer or merely just plugged into my laptop?
Hi Jay,
EyeTV Hybrid...
http://www.elgato.com/elgato/na/mainmenu/products/EyeTV-Hybrid-10/product1.en.ht ml -
I have acquired a number of the flat patch antennas, and I am looking for some guidance in deploying them properly. I am using cisco 1200 AP's (b/g only), and in some area's I do not need 360' coverage, the patch antennas are better suited, but I cannot find any definitive guidance on their use. Should they be installed 2 per access point, or is their no benefit to using them in pairs? If I can use them in pairs, what is the optimum placement (there are 3 foot cables on the patch antennas). In one large room (appx 76' across, 66' deep), if I could install them in pairs, should they be slightly angled out and down to provide better coverage, or would that make no difference? I have seen the pages that show the coverage by antenna type, but I was looking for some detailed installation guidance for non engineers.
Thanks,
GeneHi Gene,
The use of two Antennas is generally referred to as Diversity mode. They are used
in a "pair" type config to mitigate "Multipath"
In a multipath environment, signal null points are located throughout the area. The distance an RF wave travels, how it bounces, and where the multipath null occurs are based on the wavelength of the frequency. As frequency changes, so does the length of the wave. Therefore, as frequency changes, so does the location of the multipath null. The length of the 2.4 GHz wave is approximately 4.92 inches (12.5 cm). The length of the 5 GHz wave is approximately 2.36 inches (6 cm).
In order to increase coverage, conduct a site survey to determine the RF coverage of the antennas. Place access points in the appropriate areas of the installation site. The purpose of diversity is to overcome multipath reflections. Diversity antennas that share the same physical housing are placed at an optimum distance apart. The maker of the particular antenna determines that distance based on the characteristics of the antenna. When you use a pair of antennas with matching characteristics to provide diversity for cell coverage in your facility, the guideline is to put those matched antennas at a distance apart from each other that is equal to a multiple of the wavelength of the frequency that is being transmitted. The 2.4 GHz wavelength is approximately 4.92 inches. Therefore, to support diversity on a 2.4 GHz radio with two separate antennas, the antennas should be spaced approximately 5 inches apart. The antenna pair could also be spaced at multiples of 5 inches, but the distance between should not exceed 4 multiples: reflected waves farther apart than that are likely to be so distorted and different in delay spread that the radio could not work with them.Because each antenna is selected by itself, both antennas must have the same radiation characteristics and be positioned to provide similar cell coverage. Two antennas connected to the same access point must not be used to cover two different cells.
From this good doc;
Multipath and Diversity
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008019f646.shtml
If you provide the patch model #'s we can provide some mounting/installation instructions.
Reference Guide;
https://www.cisco.com/en/US/prod/collateral/wireless/ps7183/ps469/product_data_sheet09186a008008883b.html
Cheers!
Rob -
AIR-BR1310G-A-K9R Integrated Antenna
I have a couple of BR1310 with the integrated antenna. I am getting an extremely weak signal out of the antenna about a 70 DB loss sitting 10 feet away from the AP. Is there an IOS command to the enable the integrated antenna, I also opened one of the AP up and I did not see an antenna in the casing. Just curious if anyone has any insight?
THe reason there is no internal antenna is the model number you reference is for an 1310 with the remote antenna option. thats the R at the end.
this is the reference
Antenna Recommendations
â¢AIR-BR1310G-x-K9 has a single integrated antenna and is not configurable for antenna selection (diversity/left/right). The x represents your regulatory region.
â¢AIR-BR1310G-x-K9-R does not ship with an antenna because many different external antennas can be used with this product to cover various environments and applications. You must install one or two external antennas. The x represents your regulatory region. For additional information on antennas and accessories, refer to this URL:
http://www.cisco.com/en/US/products/ps5861/products_data_sheet09186a008022b11b.html
-If two diversity antennas are installed, Cisco recommends that you configure Diversity for the antenna receive and antenna transmit settings.
-If only one antenna is installed, Cisco recommends that you connect it to the right RP-TNC antenna connector and that you configure Right (Primary) for the antenna receive and antenna transmit settings.
Here is the link to the document referenced above.
http://www.cisco.com/en/US/docs/wireless/access_point/1300/ios/read_me_first/sheet/ReadMe.html#wp37024
Bill -
Compatible outdoor antennas?
I'm considering a WRT54GL router for my business. I need to connect the router to an outdoor omni-directional antenna. I live at Lake Tahoe, so the antenna must be able to stand snow storms and freezing temperatures. Can anyone recommend a good antenna that is compatible with this router?
What are you trying to do and what range do you expect to get? These wireless routers are very low power and depend on a diversity antenna approach to improve connection reliability.
If you need to cover a fairly large area (more than just a back yard or beach/boatdock in good weather) then you should be looking at some of the manufacturers that make wireless equipment designed for outdoor use. Besides, if you have an antenna hanging outside in the rain, snow and ice the signal will be lucky to get more than about 5 ft away from the antenna. -
Hello, i am working with 871w and i am trying to switch form ip inspect to zone-based firewall. Below are the class-maps, policy-map, zone-pairs, zones, and ACLs. The issues i am having is that onces i depoly the ZBF, i can not get ip via DHCP. Please review and suggest any impovements or fixes needed?
class-map type inspect match-any Egress-Filter match access-group name egress-filter
class-map type inspect match-any Guest_Protocols match protocol http
match protocol https match protocol dns
class-map type inspect match-any Ingress-Filter match access-group name ingress-filter
class-map type inspect match-any All_Protocols match protocol tcp
match protocol udp match protocol icmp
class-map type inspect match-all DHCP-Allow match access-group name dhcp-allow
policy-map type inspect Self_to_Internet class type inspect Egress-Filter
inspect
class class-default
drop log
policy-map type inspect Internet_to_Self class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Trusted_To_Self class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Guest_to_Internet class type inspect Guest_Protocols
inspect
class class-default
drop log
policy-map type inspect Internet_to_Guest class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Trusted_to_Self class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Self_to_Trusted class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Trusted_to_Internet class type inspect All_Protocols
inspect
class class-default
drop log
policy-map type inspect Internet_to_Trusted class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Guest_to_Self class type inspect All_Protocols inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Self_to_Guest
class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
zone-pair security Trusted->Internet source Trusted destination Internet service-policy type inspect Trusted_to_Internet
zone-pair security Guest->Internet source Guest destination Internet service-policy type inspect Guest_to_Internet
zone-pair security Internet->Trusted source Internet destination Trusted service-policy type inspect Internet_to_Trusted
zone-pair security Internet->Guest source Internet destination Guest service-policy type inspect Internet_to_Guest
zone-pair security Self->Internet source self destination Internet service-policy type inspect Self_to_Internet
zone-pair security Internet->Self source Internet destination self service-policy type inspect Internet_to_Self
zone-pair security Self->Trusted source self destination Trusted service-policy type inspect Self_to_Trusted
zone-pair security Trusted->Self source Trusted destination self service-policy type inspect Trusted_to_Self
zone-pair security Self->Guest source self destination Guest service-policy type inspect Self_to_Guest
zone-pair security Guest->Self source Guest destination self service-policy type inspect Guest_to_Self
zone security Trustedzone security Guestzone security Internet
ip access-list extended NAT deny ip 192.168.16.0 0.0.0.63 192.168.16.64 0.0.0.15
permit ip any any
ip access-list extended dhcp-allow permit udp any eq bootps any
permit udp any any eq bootpc
permit udp any any eq bootps
permit udp any eq bootpc any
ip access-list extended egress-filter permit ip <REMOVED> 0.0.0.2 any
remark ----- Junk Traffic -----
deny ip any host <REMOVED>
deny ip any host <REMOVED>
deny ip host <REMOVED> any
deny ip host <REMOVED> any
remark ----- Bogons Filter -----
deny ip 0.0.0.0 0.255.255.255 any
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 169.254.0.0 0.0.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.0.0.0 0.0.0.255 any
deny ip 192.0.2.0 0.0.0.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 198.18.0.0 0.1.255.255 any
deny ip 198.51.100.0 0.0.0.255 any
deny ip 203.0.113.0 0.0.0.255 any
deny ip 224.0.0.0 31.255.255.255 any
deny ip any any
ip access-list extended ingress-filter remark ----- Allow access from work
permit ip <REMOVED> 0.0.0.127 any
permit ip <REMOVED 0.0.0.31 any
permit ip <REMOVED> 0.0.0.255 any
permit esp any host <REMOVED>
permit gre any host <REMOVED>
permit udp any host <REMOVED> eq isakmp
remark ----- To get IP form COX -----
permit udp any eq bootps any eq bootpc deny icmp any any
deny udp any any eq echo
deny udp any eq echo any
deny tcp any any fragments
deny udp any any fragments
deny ip any any fragments
deny ip any any option any-options
deny ip any any ttl lt 4
deny ip any host <REMOVED>
deny ip any host <REMOVED>
deny udp any any range 33400 34400
remark ----- Bogons Filter -----
deny ip 0.0.0.0 0.255.255.255 any
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 169.254.0.0 0.0.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.0.0.0 0.0.0.255 any
deny ip 192.0.2.0 0.0.0.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 198.18.0.0 0.1.255.255 any
deny ip 198.51.100.0 0.0.0.255 any
deny ip 203.0.113.0 0.0.0.255 any
deny ip 224.0.0.0 31.255.255.255 any
remark ----- Internal networks -----
deny ip <REMOVED> 0.0.0.3 any
deny ip any anyRunning Config
! Last configuration change at 05:24:59 AZT Sun Feb 19 2012 by asucrews
! NVRAM config last updated at 05:25:57 AZT Sun Feb 19 2012 by asucrews
version 12.4
configuration mode exclusive auto expire 600
parser cache
no service log backtrace
no service config
no service exec-callback
service nagle
service slave-log
no service slave-coredump
no service pad to-xot
no service pad from-xot
no service pad cmns
no service pad
no service telnet-zeroidle
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
no service exec-wait
service linenumber
no service internal
no service scripting
no service compress-config
service prompt config
no service old-slip-prompts
service pt-vty-logging
no service disable-ip-fast-frag
service sequence-numbers
hostname rtwan
boot-start-marker
boot-end-marker
logging exception 4096
logging count
no logging message-counter log
no logging message-counter debug
logging message-counter syslog
no logging snmp-authfail
no logging userinfo
logging buginf
logging queue-limit 100
logging queue-limit esm 0
logging queue-limit trap 100
logging buffered 65536
no logging persistent
logging rate-limit 512 except critical
logging console guaranteed
logging console critical
logging monitor debugging
logging on
enable secret 5
enable password 7
aaa new-model
aaa group server radius rad_eap
server auth-port 1645 acct-port 1646
aaa group server radius rad_mac
aaa group server radius rad_acct
aaa group server radius rad_admin
aaa group server tacacs+ tac_admin
aaa group server radius rad_pmip
aaa group server radius dummy
aaa authentication login default local
aaa authentication login eap_methods group rad_eap
aaa authorization exec default local
aaa accounting network acct_methods
action-type start-stop
group rad_acct
aaa session-id common
memory-size iomem 10
clock timezone AZT -7
clock save interval 8
errdisable detect cause all
errdisable recovery interval 300
dot11 syslog
dot11 activity-timeout unknown default 60
dot11 activity-timeout client default 60
dot11 activity-timeout repeater default 60
dot11 activity-timeout workgroup-bridge default 60
dot11 activity-timeout bridge default 60
dot11 ssid guestonpg
vlan 2
authentication open
authentication key-management wpa optional
guest-mode
wpa-psk ascii 7
dot11 ssid playground
vlan 1
authentication open
authentication key-management wpa optional
wpa-psk ascii 7
dot11 aaa csid default
no ip source-route
no ip gratuitous-arps
ip icmp redirect subnet
ip spd queue threshold minimum 73 maximum 74
ip options drop
ip dhcp bootp ignore
ip dhcp excluded-address 192.168.16.33 192.168.16.40
ip dhcp excluded-address 192.168.16.1 192.168.16.7
ip dhcp pool vlan1pool
import all
network 192.168.16.0 255.255.255.224
default-router 192.168.16.1
domain-name jeremycrews.home
lease 4
ip dhcp pool vlan2pool
import all
network 192.168.16.32 255.255.255.224
default-router 192.168.16.33
domain-name guest.jeremycrews.home
lease 0 6
ip cef
ip inspect name firewall tcp router-traffic
ip inspect name firewall udp router-traffic
ip inspect name firewall icmp router-traffic
no ip bootp server
no ip domain lookup
ip domain name jeremycrews.home
ip host rtwan.jeremycrews.home 192.168.16.1 192.168.16.33
ip host ap1.jeremycrews.home 192.168.16.2 192.168.16.34
ip host ap2.jeremycrews.home 192.168.16.3 192.168.16.35
ip host ap3.jeremycrews.home 192.168.16.4 192.168.16.36
ip host ooma.jeremycrews.home 192.168.16.5
ip host xbox.jeremycrews.home 192.168.16.6
ip host wii.jeremycrews.home 192.168.16.7
ip name-server 8.8.8.8
ip name-server 8.8.4.4
ip accounting-threshold 100
ip accounting-list 192.168.16.0 0.0.0.31
ip accounting-list 192.168.16.32 0.0.0.31
ip accounting-transits 25
ip igmp snooping vlan 1
ip igmp snooping vlan 1 mrouter learn pim-dvmrp
ip igmp snooping vlan 2
ip igmp snooping vlan 2 mrouter learn pim-dvmrp
ip igmp snooping
login block-for 120 attempts 5 within 60
login delay 5
login on-failure log
parameter-map type inspect log
audit-trail on
dot1x system-auth-control
memory free low-watermark processor 65536
memory free low-watermark IO 16384
file prompt alert
emm clear 1b5b324a1b5b303b30480d
vtp file flash:vlan.dat
vtp mode server
vtp version 1
username privilege 15 password 7
username privilege 15 password 7
no crypto isakmp diagnose error
archive
log config
no record rc
logging enable
no logging persistent reload
no logging persistent
logging size 255
notify syslog contenttype plaintext
no notify syslog contenttype xml
hidekeys
path tftp://192.168.16.12/rtwan-config
maximum 10
no rollback filter adaptive
rollback retry timeout 0
write-memory
time-period 10080
scripting tcl low-memory 28965007
scripting tcl trustpoint untrusted terminate
no scripting tcl secure-mode
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh break-string ~break
ip ssh logging events
ip ssh version 2
ip ssh dh min size 1024
class-map type inspect match-any Egress-Filter
match access-group name egress-filter
class-map type inspect match-any Guest_Protocols
match protocol http
match protocol https
match protocol dns
match protocol bootpc
match protocol bootps
class-map type inspect match-any Ingress-Filter
match access-group name ingress-filter
class-map type inspect match-any All_Protocols
match protocol tcp
match protocol udp
match protocol icmp
class-map type inspect match-all DHCP-Allow
match access-group name dhcp-allow
policy-map type inspect Self_to_Internet
class type inspect Egress-Filter
inspect
class class-default
drop log
policy-map type inspect Internet_to_Self
class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Self_To_Self
class class-default
drop log
policy-map type inspect Trusted_To_Self
class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Guest_to_Internet
class type inspect Guest_Protocols
inspect
class class-default
drop log
policy-map type inspect Internet_to_Guest
class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Trusted_to_Self
class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Self_to_Trusted
class type inspect All_Protocols
inspect
class type inspect DHCP-Allow
pass
class class-default
drop log
policy-map type inspect Trusted_to_Internet
class type inspect All_Protocols
inspect
class class-default
drop log
policy-map type inspect Internet_to_Trusted
class type inspect Ingress-Filter
inspect
class class-default
drop log
policy-map type inspect Guest_to_Self
class type inspect All_Protocols
inspect
class class-default
drop log
policy-map type inspect Self_to_Guest
class type inspect All_Protocols
inspect
class class-default
drop log
zone security Trusted
zone security Guest
zone security Internet
zone-pair security Trusted->Internet source Trusted destination Internet
service-policy type inspect Trusted_to_Internet
zone-pair security Guest->Internet source Guest destination Internet
service-policy type inspect Guest_to_Internet
zone-pair security Internet->Trusted source Internet destination Trusted
service-policy type inspect Internet_to_Trusted
zone-pair security Internet->Guest source Internet destination Guest
service-policy type inspect Internet_to_Guest
zone-pair security Self->Internet source self destination Internet
service-policy type inspect Self_to_Internet
zone-pair security Internet->Self source Internet destination self
service-policy type inspect Internet_to_Self
zone-pair security Self->Trusted source self destination Trusted
service-policy type inspect Self_to_Trusted
zone-pair security Trusted->Self source Trusted destination self
service-policy type inspect Trusted_to_Self
zone-pair security Self->Guest source self destination Guest
service-policy type inspect Self_to_Guest
zone-pair security Guest->Self source Guest destination self
service-policy type inspect Guest_to_Self
bridge irb
interface Loopback0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
shutdown
snmp trap link-status
interface Null0
no ip unreachables
interface FastEthernet0
description To switch
switchport access vlan 1
switchport trunk encapsulation dot1q
switchport trunk native vlan 1
switchport trunk allowed vlan 1-4094
switchport mode trunk
switchport voice vlan none
switchport priority extend none
switchport priority default 0
snmp trap link-status
ip igmp snooping tcn flood
interface FastEthernet1
switchport access vlan 1
switchport trunk encapsulation dot1q
switchport trunk native vlan 1
switchport trunk allowed vlan 1-4094
switchport mode trunk
switchport voice vlan none
switchport priority extend none
switchport priority default 0
shutdown
snmp trap link-status
spanning-tree portfast
ip igmp snooping tcn flood
interface FastEthernet2
switchport access vlan 1
switchport trunk encapsulation dot1q
switchport trunk native vlan 1
switchport trunk allowed vlan 1-4094
switchport mode access
switchport voice vlan none
switchport priority extend none
switchport priority default 0
shutdown
snmp trap link-status
spanning-tree portfast
ip igmp snooping tcn flood
interface FastEthernet3
description Ooma Hub 192.168.16.5
switchport access vlan 1
switchport trunk encapsulation dot1q
switchport trunk native vlan 1
switchport trunk allowed vlan 1-4094
switchport mode access
switchport voice vlan none
switchport priority extend none
switchport priority default 0
shutdown
snmp trap link-status
spanning-tree portfast
ip igmp snooping tcn flood
interface FastEthernet4
description Cox Internet Connection
ip address dhcp
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting access-violations
ip flow ingress
ip flow egress
ip nat outside
no ip virtual-reassembly
duplex auto
speed auto
snmp trap link-status
no cdp enable
zone-member security Internet
interface Dot11Radio0
description Radio b/g
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
shutdown
beacon period 100
beacon dtim-period 2
dot11 extension aironet
encryption vlan 1 mode ciphers aes-ccm tkip wep128
encryption vlan 2 mode ciphers aes-ccm tkip wep128
broadcast-key vlan 1 change 3600 membership-termination
broadcast-key vlan 2 change 3600 membership-termination
ssid guestonpg
ssid playground
countermeasure tkip hold-time 60
short-slot-time
speed ofdm join
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
packet retries 64
preamble-short
channel least-congested
fragment-threshold 2346
station-role root
rts threshold 2312
rts retries 64
antenna receive diversity
antenna transmit diversity
payload-encapsulation rfc1042
snmp trap link-status
interface Dot11Radio0.1
description Home WLAN
encapsulation dot1Q 1 native
no ip redirects
no ip unreachables
no ip proxy-arp
no snmp trap link-status
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
interface Dot11Radio0.2
description Guest WLAN
encapsulation dot1Q 2
no ip redirects
no ip unreachables
no ip proxy-arp
no snmp trap link-status
bridge-group 2
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
interface Vlan1
description Home LAN
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
no ip virtual-reassembly
autostate
snmp trap link-status
bridge-group 1
bridge-group 1 spanning-disabled
interface Vlan2
description Guest LAN
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
no ip virtual-reassembly
autostate
snmp trap link-status
bridge-group 2
bridge-group 2 spanning-disabled
interface BVI1
description Home Bridge LAN to WLAN
ip address 192.168.16.1 255.255.255.224
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
no ip virtual-reassembly
snmp trap link-status
zone-member security Trusted
interface BVI2
description Guest Bridge LAN to WLAN
ip address 192.168.16.33 255.255.255.240
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
no ip virtual-reassembly
snmp trap link-status
zone-member security Guest
ip classless
ip forward-protocol nd
no ip http server
ip http port 80
ip http authentication enable
no ip http secure-server
ip http secure-port 443
ip http secure-active-session-modules all
ip http max-connections 5
ip http timeout-policy idle 180 life 180 requests 1
ip http active-session-modules all
ip http digest algorithm md5
ip http client cache memory pool 100
ip http client cache memory file 2
ip http client cache ager interval 5
ip http client connection timeout 10
ip http client connection retry 1
ip http client connection idle timeout 30
ip http client response timeout 30
ip http path
ip flow-top-talkers
top 10
sort-by bytes
ip nat inside source static tcp 192.168.16.6 53 interface FastEthernet4 53
ip nat inside source static tcp 192.168.16.6 3074 interface FastEthernet4 3074
ip nat inside source static udp 192.168.16.6 3074 interface FastEthernet4 3074
ip nat inside source static tcp 192.168.16.6 80 interface FastEthernet4 80
ip nat inside source static udp 192.168.16.6 88 interface FastEthernet4 88
ip nat inside source static udp 192.168.16.6 53 interface FastEthernet4 53
ip nat inside source list NAT interface FastEthernet4 overload
ip access-list extended NAT
deny ip 192.168.16.0 0.0.0.63 192.168.16.64 0.0.0.15
permit ip any any
ip access-list extended dhcp-allow
permit udp any eq bootps any
permit udp any any eq bootpc
permit udp any any eq bootps
permit udp any eq bootpc any
ip access-list extended egress-filter
permit ip 0.0.0.2 any
remark ----- Junk Traffic -----
deny ip any host
deny ip any host
deny ip host any
deny ip host any
remark ----- Bogons Filter -----
deny ip 0.0.0.0 0.255.255.255 any
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 169.254.0.0 0.0.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.0.0.0 0.0.0.255 any
deny ip 192.0.2.0 0.0.0.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 198.18.0.0 0.1.255.255 any
deny ip 198.51.100.0 0.0.0.255 any
deny ip 203.0.113.0 0.0.0.255 any
deny ip 224.0.0.0 31.255.255.255 any
deny ip any any
ip access-list extended ingress-filter
remark ----- Allow access from work
permit ip 0.0.0.127 any
permit ip 0.0.0.31 any
permit ip 0.0.0.255 any
permit esp any host
permit gre any host
permit udp any host eq isakmp
remark ----- To get IP form COX -----
permit udp any eq bootps any eq bootpc
deny icmp any any
deny udp any any eq echo
deny udp any eq echo any
deny tcp any any fragments
deny udp any any fragments
deny ip any any fragments
deny ip any any option any-options
deny ip any any ttl lt 4
deny ip any host
deny ip any host
deny udp any any range 33400 34400
remark ----- Bogons Filter -----
deny ip 0.0.0.0 0.255.255.255 any
deny ip 10.0.0.0 0.255.255.255 any
deny ip 127.0.0.0 0.255.255.255 any
deny ip 169.254.0.0 0.0.255.255 any
deny ip 172.16.0.0 0.15.255.255 any
deny ip 192.0.0.0 0.0.0.255 any
deny ip 192.0.2.0 0.0.0.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 198.18.0.0 0.1.255.255 any
deny ip 198.51.100.0 0.0.0.255 any
deny ip 203.0.113.0 0.0.0.255 any
deny ip 224.0.0.0 31.255.255.255 any
remark ----- Internal networks -----
deny ip 0.0.0.2 any
deny ip any any
no ip sla logging traps
ip sla 1
icmp-echo 8.8.4.4 source-interface FastEthernet4
frequency 120
history hours-of-statistics-kept 1
history filter failures
ip sla schedule 1 life forever start-time now
ip sla 2
icmp-echo 8.8.8.8 source-interface FastEthernet4
frequency 30
history hours-of-statistics-kept 1
history filter failures
ip sla reaction-configuration 1 react connectionLoss threshold-type consecutive 5 action-type trapAndTrigger
ip sla reaction-trigger 1 2
logging history size 1
logging history warnings
logging trap informational
logging delimiter tcp
logging facility local7
no logging source-interface
access-list 1 permit 192.168.16.0 0.0.0.63
access-list 20 permit 127.127.1.1
access-list 20 permit 192.43.244.18
access-list 20 permit 204.235.61.9
access-list 20 permit 173.201.38.85
access-list 20 permit 216.229.4.69
access-list 20 permit 152.2.21.1
access-list 20 permit 130.126.24.24
access-list 21 permit 192.168.16.0 0.0.0.63
access-list 22 permit 192.168.16.0 0.0.0.63
mac-address-table aging-time 300
cdp run
snmp-server engineID local
snmp-server view *ilmi system included
snmp-server view *ilmi atmForumUni included
snmp-server view v1default iso included
snmp-server view v1default internet.6.3.15 excluded
snmp-server view v1default internet.6.3.16 excluded
snmp-server view v1default internet.6.3.18 excluded
snmp-server view v1default ciscoMgmt.394 excluded
snmp-server view v1default ciscoMgmt.395 excluded
snmp-server view v1default ciscoMgmt.399 excluded
snmp-server view v1default ciscoMgmt.400 excluded
snmp-server view *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF7F ieee802dot11 included
snmp-server view *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF7F internet included
snmp-server community 1682CrewsSNMP v1default RW 22
snmp-server priority normal
no snmp-server trap link ietf
snmp-server trap authentication vrf
snmp-server trap authentication acl-failure
snmp-server trap authentication unknown-content
snmp-server packetsize 1500
snmp-server queue-limit notification-host 10
snmp-server chassis-id FHK111016LX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vrrp
snmp-server enable traps tty
snmp-server enable traps pw vc
snmp-server enable traps isdn call-information
snmp-server enable traps isdn layer2
snmp-server enable traps isdn chan-not-avail
snmp-server enable traps isdn ietf
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps dot11-qos
snmp-server enable traps switch-over
snmp-server enable traps rogue-ap
snmp-server enable traps wlan-wep
snmp-server enable traps adslline
snmp-server enable traps flash insertion removal
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps fru-ctrl
snmp-server enable traps resource-policy
snmp-server enable traps event-manager
snmp-server enable traps hsrp
snmp-server enable traps ipmulticast
snmp-server enable traps msdp
snmp-server enable traps mvpn
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface-old
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server enable traps cpu threshold
snmp-server enable traps syslog
snmp-server enable traps cef resource-failure peer-state-change peer-fib-state-change inconsistency
snmp-server enable traps l2tun session
snmp-server enable traps l2tun pseudowire status
snmp-server enable traps vtp
snmp-server enable traps aaa_server
snmp-server enable traps atm subif
snmp-server enable traps firewall serverstatus
snmp-server enable traps isakmp policy add
snmp-server enable traps isakmp policy delete
snmp-server enable traps isakmp tunnel start
snmp-server enable traps isakmp tunnel stop
snmp-server enable traps ipsec cryptomap add
snmp-server enable traps ipsec cryptomap delete
snmp-server enable traps ipsec cryptomap attach
snmp-server enable traps ipsec cryptomap detach
snmp-server enable traps ipsec tunnel start
snmp-server enable traps ipsec tunnel stop
snmp-server enable traps ipsec too-many-sas
snmp-server enable traps ipsla
snmp-server host 192.168.16.10 traps version 1 udp-port 162
snmp-server inform retries 3 timeout 15 pending 25
snmp mib nhrp
snmp mib notification-log globalsize 500
snmp mib notification-log globalageout 15
snmp mib community-map ILMI engineid
snmp mib community-map engineid
radius-server local
no authentication mac
eapfast authority id
eapfast authority info
eapfast server-key primary 7
eapfast server-key secondary 7
nas key 7
group users
vlan 1
ssid playground
block count 5 time 60
reauthentication time 3600
group guest
vlan 2
ssid guestonpg
block count 3 time 60
reauthentication time 3600
user nthash 7 group users
user nthash 7 group guest
radius-server attribute 32 include-in-access-req format %h
radius-server host auth-port 1645 acct-port 1646 key 7
radius-server vsa send accounting
control-plane
bridge 1 protocol ieee
bridge 1 route ip
bridge 2 protocol ieee
bridge 2 route ip
bridge 3 protocol ieee
bridge 3 route ip
alias exec h help
alias exec lo logout
alias exec p ping
alias exec r resume
alias exec s show
alias exec u undebug
alias exec un undebug
alias exec w where
default-value exec-character-bits 7
default-value special-character-bits 7
default-value data-character-bits 8
line con 0
password 7
logging synchronous
no modem enable
transport output ssh
line aux 0
password 7
logging synchronous
transport output ssh
line vty 0 4
password 7
logging synchronous
transport preferred ssh
transport input all
transport output ssh
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
process cpu threshold type total rising 80 interval 10 falling 40 interval 10
ntp authentication-key 1 md5 7
ntp authenticate
ntp trusted-key 1
ntp source FastEthernet4
ntp access-group peer 20
ntp access-group serve-only 21
ntp master 1
ntp server 152.2.21.1 maxpoll 4
ntp server 204.235.61.9 maxpoll 4
ntp server 130.126.24.24
ntp server 216.229.4.69 maxpoll 4
ntp server 173.201.38.85 maxpoll 4
cns id hostname
cns id hostname event
cns id hostname image
cns image retry 60
netconf max-sessions 4
netconf lock-time 10
netconf max-message 0
event manager scheduler script thread class default number 1
event manager scheduler applet thread class default number 32
event manager history size events 10
event manager history size traps 10
end
Maybe you are looking for
-
How do I remove a credit/debit card from my account? I ask because I currently have a VISA gift/debit card with 50 dollars on it, but the money has run out so I want to usea new card. Also, there is no 'None' check option for payment type on my accou
-
How do I Install Adobe Flash Successfully?
I have Vista and Firefox. I've downloaded v. 11.4 several times and each one is a bad installation. Same thing with the plug-in. I have to keep it uninstalled or else I can't upload work files. But I constantly get prompted to install the damn th
-
Hello What is the process of configuring Std Print program for Material Document What are the steps Regards Niti Narayan
-
Error conection to fpt R3 - XI - FILE FTP
In message monitorin the following error is registered - Attempt to process file failed with java.net.SocketException: Connection reset - Delivery of the message to the application using connection File_http://sap.com/xi/XI/System failed, due to: com
-
When will the 7d Mark II camera be supported for tethering?
Good Morning All - I purchased a 7d Mark II camera recently and was pleased to see Lightroom be able to work with my RAW files. I would now like to move into the realm of Tethered shooting with this new camera and Lightroom but it appears my camera