IPT over IPSEC lines with cisco 2821

We are implementing a IPSEC VPN Connection over leased lines using cisco 2821 without AIM-VPN Hardware accelerators.
The line is 2 Mbps and should carry also IPtelephony traffic (4-5 conversations). Will we have problems by mastering the jitter? Since the traffic is devided in small packet, il the 2821 able to handle it accordignly?
Thanks and bye Giorgio

Giorgio,
You should be fine with this configuration. Running voice and video over VPN is certainly a viable solution. It is commonly known as V3PN. Take a look at the V3PN SRND below for best practices, planning, and design tips. As mentioned in this document, IPSEC adds a trivial amount of delay (2 - 5 msec.) to voice deployments.
V3PN SRND
http://www.cisco.com/application/pdf/en/us/guest/netsol/ns241/c649/ccmigration_09186a00801ea79c.pdf
Hope this helps. If so, please rate the post.
Brandon

Similar Messages

  • Ethernet over Public link with Cisco 65XX Series

    We are transferring some equipment from one datacenter to another and we do not have private line connectivity between them at the current time.
    We are hoping to be able to temporarily be able to establish some type of Layer2 connectivity between the facilities to help allow us to spread out the migration into 2 events.  We have Cisco 65XX series switches at the core at both facilities and I am wondering what we might be able to use to make this happen?
    EoMPLS is out as we have to be able to extend the layer2 functionality across carrier networks and L2TPv3 is not supported on Cisco 65XX from what I have read / checked on our switches (if there is an IOS version that does support it, please let me know).
    I have read a bit about VPLS over GRE but I am not clear on the configuration and/or if it supported as it references MPLS at various points within the documentation that I have read.
    Any guidance would be appreciated.

    I've absolutely no idea if this would help in your case. 
    But anyway, I think 6500 handles DMVPN. May be MPLS over DMVPN would be a solution?
    https://sites.google.com/site/amitsciscozone/home/important-tips/traffic-engineering/p2mp-mpls-te-over-dmvpn
    http://networkknerd.blogspot.be/2014/08/dmvpn-mpls-over-dmvpn-oh-yeah.html
    HTH

  • Valcom 2001A single zone paging system with a Cisco 2821 FXS port

    I am new at troubleshooting the Valcom paging system with Cisco 2821 router.  I recently installed a Valcom 2001A that is connecting to FXS port on the Cisco router.  The paging works but the ringing does not stop when the page extension is dialed (you can talk over the ringing).  I was told to use the Valcom 9970 to work with the FXS port on my router.  Will the V9970 worth with the 2001A or in place of it?  Is there anything else I need to know to perfect this install?  Thank you! 

    Put the command 'forward-digits extra ,,,,01' on the outgoing POTS dial-peer. Each comma is one second of delay.

  • Traffic Shaping on Cisco 2821 router

    I have two sites and connected with MPLS links of 2MB with Cisco 2821 routers. Now a requirement came that two sites will have additional server ( one each location - for data replication purpose) and 75% of the bandwidth needs to be allocated to data replication servers on each site and rest of 25% bandwidth will be utilize for both sides normal traffic.
    Is there any additional modules to be added on each router to isolate the traffic. Please let me know.
    Thanks,

    To expand on the information that Collin provided . . .
    If you really want to cap the bandwidth to a class of traffic, i.e. truly limit replication to 75%, you can add a policer or shaper to a class, similar to what Collin shows.
    e.g.
    policy-map RestrictAltiris
    class Altiris
    bandwidth percent 20
    shape average 1500000
    However, like Collin, since CBWFQ guarantees bandwidth allocations, you rarely need to cap bandwidth if you, for instance, insure your other traffic gets the other 25% (i.e. 100% less 75% for replication).
    e.g.
    policy-map RestrictAltiris
    class Altiris
    bandwidth percent 75
    (NB: BTW, there are other rules pertaining to bandwidth reservations, but prior examples, both Collin's and mine, should suffice.)
    Also BTW, since you mention MPLS, and since MPLS often allows multisite communication, if there are more than just these two sites that can communicate with these two sites across their 2 Mbps links, other considerations apply for dealing with such a situation.
    PS:
    Although software based QoS should meet your stated requirements, there are optional modules to provide "WAN optimization", see http://www.cisco.com/en/US/prod/collateral/contnetw/ps5680/ps6870/product_data_sheet0900aecd8058218c.html.
    PPS:
    BTW, when Collin describes:
    ". . . but when the link gets congested the router will limit the traffic for this host to 20% of the total interface bandwidth, and all the remaining traffic to 80%.", this might be just a bit misleading since when the link is congested individual classes aren't really limited they are instead guaranteed their bandwidths as a minimum, not precisely the same thing. For example with 20% and 80% guarantees, either class could still obtain unused bandwidth from the other class while the link is congested.
    [edit]
    This being true, for something like what you describe, I would recommend using the least amount of bandwidth guarantee that data replication needs. Assuming your other traffic, on average, doesn't consume more than 25% of the bandwidth, you might find even providing replication only 1% for a bandwidth guarantee works fine. Why you would want to do this, by lowering the bandwidth guarantee for replication, you allow other traffic to burst. Such bursting capability normally improves any kind of transactional or conversational applications and doesn't (usually) unduly delay replication.

  • Need help in configuring Client to Site IPSec VPN with Hairpinning on Cisco ASA5510 8.2(1)

    Need urgent help in configuring Client to Site IPSec VPN with Hairpinning on Cisco ASA5510 - 8.2(1).
    The following is the Layout:
    There are two Leased Lines for Internet access - 1.1.1.1 & 2.2.2.2, the latter being the Standard Default route, the former one is for backup.
    I have been able to configure  Client to Site IPSec VPN
    1) With access from Outside to only the Internal Network (172.16.0.0/24) behind the asa
    2) With Split tunnel with simultaneous assess to internal LAN and Outside Internet.
    But I have not been able to make tradiotional Hairpinng model work in this scenario.
    I followed every possible sugestions made in this regard in many Discussion Topics but still no luck. Can someone please help me out here???
    Following is the Running-Conf with Normal Client to Site IPSec VPN configured with No internat Access:
    LIMITATION: Can't Boot into any other ios image for some unavoidable reason, must use 8.2(1)
    running-conf  --- Working  normal Client to Site VPN without internet access/split tunnel
    ASA Version 8.2(1)
    hostname ciscoasa
    domain-name cisco.campus.com
    enable password xxxxxxxxxxxxxx encrypted
    passwd xxxxxxxxxxxxxx encrypted
    names
    interface GigabitEthernet0/0
    nameif internet1-outside
    security-level 0
    ip address 1.1.1.1 255.255.255.240
    interface GigabitEthernet0/1
    nameif internet2-outside
    security-level 0
    ip address 2.2.2.2 255.255.255.224
    interface GigabitEthernet0/2
    nameif dmz-interface
    security-level 0
    ip address 10.0.1.1 255.255.255.0
    interface GigabitEthernet0/3
    nameif campus-lan
    security-level 0
    ip address 172.16.0.1 255.255.0.0
    interface Management0/0
    nameif CSC-MGMT
    security-level 100
    ip address 10.0.0.4 255.255.255.0
    boot system disk0:/asa821-k8.bin
    boot system disk0:/asa843-k8.bin
    ftp mode passive
    dns server-group DefaultDNS
    domain-name cisco.campus.com
    same-security-traffic permit inter-interface
    same-security-traffic permit intra-interface
    object-group network cmps-lan
    object-group network csc-ip
    object-group network www-inside
    object-group network www-outside
    object-group service tcp-80
    object-group service udp-53
    object-group service https
    object-group service pop3
    object-group service smtp
    object-group service tcp80
    object-group service http-s
    object-group service pop3-110
    object-group service smtp25
    object-group service udp53
    object-group service ssh
    object-group service tcp-port
    object-group service udp-port
    object-group service ftp
    object-group service ftp-data
    object-group network csc1-ip
    object-group service all-tcp-udp
    access-list INTERNET1-IN extended permit ip host 1.2.2.2 host 2.2.2.3
    access-list CSC-OUT extended permit ip host 10.0.0.5 any
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq www
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq https
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq ssh
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq ftp
    access-list CAMPUS-LAN extended permit udp 172.16.0.0 255.255.0.0 any eq domain
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq smtp
    access-list CAMPUS-LAN extended permit tcp 172.16.0.0 255.255.0.0 any eq pop3
    access-list CAMPUS-LAN extended permit ip any any
    access-list csc-acl remark scan web and mail traffic
    access-list csc-acl extended permit tcp any any eq smtp
    access-list csc-acl extended permit tcp any any eq pop3
    access-list csc-acl remark scan web and mail traffic
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq 993
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq imap4
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq 465
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq www
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq https
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq smtp
    access-list INTERNET2-IN extended permit tcp any host 1.1.1.2 eq pop3
    access-list INTERNET2-IN extended permit ip any host 1.1.1.2
    access-list nonat extended permit ip 172.16.0.0 255.255.0.0 172.16.0.0 255.255.0.0
    access-list DNS-inspect extended permit tcp any any eq domain
    access-list DNS-inspect extended permit udp any any eq domain
    access-list capin extended permit ip host 172.16.1.234 any
    access-list capin extended permit ip host 172.16.1.52 any
    access-list capin extended permit ip any host 172.16.1.52
    access-list capin extended permit ip host 172.16.0.82 host 172.16.0.61
    access-list capin extended permit ip host 172.16.0.61 host 172.16.0.82
    access-list capout extended permit ip host 2.2.2.2 any
    access-list capout extended permit ip any host 2.2.2.2
    access-list campus-lan_nat0_outbound extended permit ip 172.16.0.0 255.255.0.0 192.168.150.0 255.255.255.0
    pager lines 24
    logging enable
    logging buffered debugging
    logging asdm informational
    mtu internet1-outside 1500
    mtu internet2-outside 1500
    mtu dmz-interface 1500
    mtu campus-lan 1500
    mtu CSC-MGMT 1500
    ip local pool vpnpool1 192.168.150.2-192.168.150.250 mask 255.255.255.0
    ip verify reverse-path interface internet2-outside
    ip verify reverse-path interface dmz-interface
    ip verify reverse-path interface campus-lan
    ip verify reverse-path interface CSC-MGMT
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-621.bin
    no asdm history enable
    arp timeout 14400
    global (internet1-outside) 1 interface
    global (internet2-outside) 1 interface
    nat (campus-lan) 0 access-list campus-lan_nat0_outbound
    nat (campus-lan) 1 0.0.0.0 0.0.0.0
    nat (CSC-MGMT) 1 10.0.0.5 255.255.255.255
    static (CSC-MGMT,internet2-outside) 2.2.2.3 10.0.0.5 netmask 255.255.255.255
    access-group INTERNET2-IN in interface internet1-outside
    access-group INTERNET1-IN in interface internet2-outside
    access-group CAMPUS-LAN in interface campus-lan
    access-group CSC-OUT in interface CSC-MGMT
    route internet2-outside 0.0.0.0 0.0.0.0 2.2.2.5 1
    route internet1-outside 0.0.0.0 0.0.0.0 1.1.1.5 2
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa authentication ssh console LOCAL
    aaa authentication enable console LOCAL
    http server enable
    http 10.0.0.2 255.255.255.255 CSC-MGMT
    http 10.0.0.8 255.255.255.255 CSC-MGMT
    http 1.2.2.2 255.255.255.255 internet2-outside
    http 1.2.2.2 255.255.255.255 internet1-outside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
    crypto map internet2-outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map internet2-outside_map interface internet2-outside
    crypto ca trustpoint _SmartCallHome_ServerCA
    crl configure
    crypto ca certificate chain _SmartCallHome_ServerCA
    certificate ca xyzxyzxyzyxzxyzxyzxyzxxyzyxzyxzy
            a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
        a67a897as a67a897as a67a897as a67a897as a67a897as
      quit
    crypto isakmp enable internet2-outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes
    hash md5
    group 2
    lifetime 86400
    telnet 10.0.0.2 255.255.255.255 CSC-MGMT
    telnet 10.0.0.8 255.255.255.255 CSC-MGMT
    telnet timeout 5
    ssh 1.2.3.3 255.255.255.240 internet1-outside
    ssh 1.2.2.2 255.255.255.255 internet1-outside
    ssh 1.2.2.2 255.255.255.255 internet2-outside
    ssh timeout 5
    console timeout 0
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy VPN_TG_1 internal
    group-policy VPN_TG_1 attributes
    vpn-tunnel-protocol IPSec
    username ssochelpdesk password xxxxxxxxxxxxxx encrypted privilege 15
    username administrator password xxxxxxxxxxxxxx encrypted privilege 15
    username vpnuser1 password xxxxxxxxxxxxxx encrypted privilege 0
    username vpnuser1 attributes
    vpn-group-policy VPN_TG_1
    tunnel-group VPN_TG_1 type remote-access
    tunnel-group VPN_TG_1 general-attributes
    address-pool vpnpool1
    default-group-policy VPN_TG_1
    tunnel-group VPN_TG_1 ipsec-attributes
    pre-shared-key *
    class-map cmap-DNS
    match access-list DNS-inspect
    class-map csc-class
    match access-list csc-acl
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum 512
    policy-map global_policy
    class csc-class
      csc fail-open
    class cmap-DNS
      inspect dns preset_dns_map
    service-policy global_policy global
    prompt hostname context
    Cryptochecksum: y0y0y0y0y0y0y0y0y0y0y0y0y0y
    : end
    Neither Adding dynamic NAT for 192.168.150.0/24 on outside interface works, nor does the sysopt connection permit-vpn works
    Please tell what needs to be done here, to hairpin all the traffic to internet comming from VPN Clients.
    That is I need clients conected via VPN tunnel, when connected to internet, should have their IP's NAT'ted  against the internet2-outside interface address 2.2.2.2, as it happens for the Campus Clients (172.16.0.0/16)
    I'm not much conversant with everything involved in here, therefore please be elaborative in your replies. Please let me know if you need any more information regarding this setup to answer my query.
    Thanks & Regards
    maxs

    Hi Jouni,
    Thanks again for your help, got it working. Actually the problem was ASA needed some time after configuring to work properly ( ?????? ). I configured and tested several times within a short period, during the day and was not working initially, GUI packet tracer was showing some problems (IPSEC Spoof detected) and also there was this left out dns. Its working fine now.
    But my problem is not solved fully here.
    Does hairpinning model allow access to the campus LAN behind ASA also?. Coz the setup is working now as i needed, and I can access Internet with the NAT'ed ip address (outside-interface). So far so good. But now I cannot access the Campus LAN behind the asa.
    Here the packet tracer output for the traffic:
    packet-tracer output
    asa# packet-tracer input internet2-outside tcp 192.168.150.1 56482 172.16.1.249 22
    Phase: 1
    Type: ACCESS-LIST
    Subtype:
    Result: ALLOW
    Config:
    Implicit Rule
    Additional Information:
    MAC Access list
    Phase: 2
    Type: FLOW-LOOKUP
    Subtype:
    Result: ALLOW
    Config:
    Additional Information:
    Found no matching flow, creating a new flow
    Phase: 3
    Type: ROUTE-LOOKUP
    Subtype: input
    Result: ALLOW
    Config:
    Additional Information:
    in   172.16.0.0      255.255.0.0     campus-lan
    Phase: 4
    Type: ROUTE-LOOKUP
    Subtype: input
    Result: ALLOW
    Config:
    Additional Information:
    in   192.168.150.1   255.255.255.255 internet2-outside
    Phase: 5
    Type: ACCESS-LIST
    Subtype: log
    Result: ALLOW
    Config:
    access-group internnet1-in in interface internet2-outside
    access-list internnet1-in extended permit ip 192.168.150.0 255.255.255.0 any
    Additional Information:
    Phase: 6
    Type: IP-OPTIONS
    Subtype:
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 7
    Type: CP-PUNT
    Subtype:
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 8
    Type: VPN
    Subtype: ipsec-tunnel-flow
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 9
    Type: NAT-EXEMPT
    Subtype: rpf-check
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 10
    Type: NAT
    Subtype:     
    Result: DROP
    Config:
    nat (internet2-outside) 1 192.168.150.0 255.255.255.0
      match ip internet2-outside 192.168.150.0 255.255.255.0 campus-lan any
        dynamic translation to pool 1 (No matching global)
        translate_hits = 14, untranslate_hits = 0
    Additional Information:
    Result:
    input-interface: internet2-outside
    input-status: up
    input-line-status: up
    output-interface: internet2-outside
    output-status: up
    output-line-status: up
    Action: drop
    Drop-reason: (acl-drop) Flow is denied by configured rule
    The problem here as you can see is the Rule for dynamic nat that I added to make hairpin work at first place
    dynamic nat
    asa(config)#nat (internet2-outside) 1 192.168.150.0 255.255.255.0
    Is it possible to access both
    1)LAN behind ASA
    2)INTERNET via HAIRPINNING  
    simultaneously via a single tunnel-group?
    If it can be done, how do I do it. What changes do I need to make here to get simultaneous access to my LAN also?
    Thanks & Regards
    Abhijit

  • Configuring lines 1 60 on Cisco 2821

    Hi all,
    I'd like to know what is necessary to configure the parameter line 1 60 in a Cisco 2821 router with a two E1's direct connected in a interfaca VWIC2-MFT-E1 and two PVDM's modules installed.
    When I try to enter the line "router(config)#line 1 60" the ios returns an error message that there are no physical hardware to support "line 2". I just can enter line 1.
    Which is necessary to do this?
    My best Regards,
    Adriano

    try to do a show of the interface using the following example and see the output.
    #sh voice po 1/1

  • When i open my computer I get the white screen with apple symbol and there are vertical lines all over the screen with green pixels and after a few minutes the screen gets grey and I get message to restart my computer what happens

    3 years ago I bought an IMac Desktop that I am using for a lot of things but the most important for dvd montage in Imovies and Idvd.
    Now today when I opened my computer I get as usual the white screen with the Apple symbol but there were all over the screen vertical lines with green pixels and after a while the screen gets grey and I get message to restart my computer using the power button or the restart button and when I do so each time the same is happening somebody can tell me what is happening and what caused this. This computer is my work and now I have no income anymore.
    On the Apple support site they are asking to enter the serial number and when I do so I get message it is wrong but it is the only one I have and I buy this computer in Cairo Egypt. I am living in Hurghada in Egypt for the moment. When I call the technical support of the shop where I buy it they are telling me that it is the hard disk or ram and that I probably lost everything on it and they are asking a big amount to repair.
    Can somebody advise me on this matter. Thanks in advance

    You can find the serial number either in About this Mc in the Menu bar under the , or it should be on a sticker under the foot of the machine.
    If you have the install discs, try booting from them, holding down the c key and then using Disk Utility to check the drive. 
    You can also boot into Safe mode
    To start up into Safe Mode (to "Safe Boot"), do this:
       1. Be sure the computer is shut down.
       2. Press the power button.
       3. Immediately after you hear the startup tone, press and hold the Shift key.
          Tip: The Shift key should be held as soon as possible after the startup tone but not before.
       4. Release the Shift key when you see the gray Apple and progress indicator (looks like a spinning gear).
    During the startup in Mac OS X 10.2 through 10.3.9, you will see "Safe Boot" on the Mac OS X startup screen.
    During the startup in Mac OS X 10.4 or later, you will see "Safe Boot" on the login window, which appears even if you normally log in automatically.
    Please post back with results,
    To leave Safe Mode in any version of Mac OS X, restart the computer normally, without holding any keys during startup.

  • Strange issue - unable to establish PPP with Cisco 887 VAG router on one particular ADSL line

    I have a strange problem that I’m struggling to get to the bottom of with my ISP and wondered if anyone could help.
    We have a site with an older Cisco 877 ADSL router which was working happily until a few weeks ago when the connection dropped suddenly (out-of-hours at 2am if that’s of any significance – made me think most likely something carrier/ISP related?)    When connectivity was lost, the router could sync with the BT exchange (we are in the UK) but could not establish PPP.
    We logged fault with our ISP – after some to’ing and fro’ing, they passed it onto BT and their engineers visited site, they fixed “a line fault” (we don’t get much detail on what was actually fixed) but we still could not establish connectivity – same thing, solid CD light but no PPP.
    So, we replaced the router with another 877 – same again, solid CD but no PPP.  We replaced all the cables and microfilter etc but no difference. 
    We tried a different Cisco router (a newer Cisco 887VAG) which, as I understand, uses a different modem chipset but no matter – PPP could still not be established.  We tested this router on another ADSL line with the same ISP and it worked without issue, using the same ADSL account details, it was able to establish connectivity.  So we figured this must still be a BT/ISP issue.
    Since then we’ve had BT out again twice but they say there is no fault.  The ISP say there is no issue with them.  But we still cannot establish ADSL connectivity on this line, despite having tried 3 different ADSL routers and despite the fact the routers work with the same account details on another ADSL line.
    The 887VAG router we have currently connected has 3G backup so that is keeping us going in the meantime and also means I can login to the router remotely to check on the ADSL status. 
    But I’m struggling to pinpoint where the problem may lie.   Strangely, if I turn on PPP negotiation and authentication debug then I’m not actually seeing any output from it at all?
    Yet, the ATM interface is up and shows packets being sent and received:
    ATM0 is up, line protocol is up
      Hardware is MPC ATMSAR, address is bc16.6596.9b00 (bia bc16.6596.9b00)
      MTU 1600 bytes, sub MTU 1600, BW 704 Kbit/sec, DLY 520 usec,
         reliability 255/255, txload 1/255, rxload 1/255
      Encapsulation ATM, loopback not set
      Keepalive not supported
      Encapsulation(s): AAL5
      4 maximum active VCs, 1024 VCs per VP, 1 current VCCs
      VC Auto Creation Disabled.
      VC idle disconnect time: 300 seconds
      Last input 00:00:28, output 00:00:07, output hang never
      Last clearing of "show interface" counters 6d23h
      Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
      Queueing strategy: Per VC Queueing
      5 minute input rate 0 bits/sec, 0 packets/sec
      5 minute output rate 0 bits/sec, 0 packets/sec
         23886 packets input, 1676964 bytes, 0 no buffer
         Received 0 broadcasts (0 IP multicasts)
         0 runts, 0 giants, 0 throttles
         0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
         56469 packets output, 4418592 bytes, 0 underruns
         0 output errors, 0 collisions, 6 interface resets
         0 unknown protocol drops
         0 output buffer failures, 0 output buffers swapped out
    Does anyone have any ideas on where the problem may be and what more I can do to troubleshoot and provide the relevant evidence to our ISP (assuming it is an ISP/BT issue though the fact the same router works ok with the exact same details etc would seem to indicate it must be their issue!)

    Hi Jody,
    thanks for the suggestions.  Here's what I see from the ppp debugs (but I'm not sure how to interpret?)
    Jan  6 14:50:22.838: pppoe_send_padi:
    contiguous pak, size 74
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 FF FF
             FF FF FF FF BC 16 65 96 9B 00 88 63 11 09 00 00
             00 10 01 01 00 00 01 03 00 08 0C 00 00 01 00 00
             04 A3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
             00 00 00 00 00 00 00 00 ...
    Jan  6 14:50:22.878: PPPoE 0: I PADO  R:0030.8810.000b L:bc16.6596.9b00 0/38  ATM0.1
    contiguous pak, size 71
             BC 16 65 96 9B 00 00 30 88 10 00 0B 88 63 11 07
             00 00 00 33 01 03 00 08 0C 00 00 01 00 00 04 A3
             01 02 00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73
             2D 62 61 73 2D 42 32 32 36 45 34 37 30 39 45 30
             31 34 5A 01 01 00 00
    Jan  6 14:50:24.885: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:50:35.125: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:50:45.364: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:50:55.603: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:51:05.843: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:51:16.114: OUT PADR from PPPoE Session
    contiguous pak, size 85
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 30
             88 10 00 0B BC 16 65 96 9B 00 88 63 11 19 00 00
             00 33 01 03 00 08 0C 00 00 01 00 00 04 A3 01 02
             00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73 2D 62
             61 73 2D 42 32 32 36 45 ...
    Jan  6 14:51:26.353: [0]PPPoE 0: O PADT  R:0000.0000.0000 L:0000.0000.0000 0/38  ATM0.1
    contiguous pak, size 74
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 00 00
             00 00 00 00 00 00 00 00 00 00 88 63 11 A7 00 00
             00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
             00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
             00 00 00 00 00 00 00 00 ...
    Jan  6 14:51:46.576: pppoe_send_padi:
    contiguous pak, size 74
             00 01 09 00 AA AA 03 00 80 C2 00 07 00 00 FF FF
             FF FF FF FF BC 16 65 96 9B 00 88 63 11 09 00 00
             00 10 01 01 00 00 01 03 00 08 0C 00 00 01 00 00
             04 A3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
             00 00 00 00 00 00 00 00 ...
    Jan  6 14:51:46.608: PPPoE 0: I PADO  R:0030.8810.000b L:bc16.6596.9b00 0/38  ATM0.1
    contiguous pak, size 71
             BC 16 65 96 9B 00 00 30 88 10 00 0B 88 63 11 07
             00 00 00 33 01 03 00 08 0C 00 00 01 00 00 04 A3
             01 02 00 1F 62 72 61 73 2D 72 65 64 37 2E 6C 73
             2D 62 61 73 2D 42 32 32 36 45 34 37 30 39 45 30
             31 34 5A 01 01 00 00
    Provider wouldn't have bumped us from ADSL to VDSL - but here's the output of show controller vdsl 0:
    Controller VDSL 0 is UP
    Daemon Status:           Up
                            XTU-R (DS)              XTU-C (US)
    Chip Vendor ID:         'BDCM'                   'IFTN'
    Chip Vendor Specific:   0x0000                   0x71C8
    Chip Vendor Country:    0xB500                   0xB500
    Modem Vendor ID:        'CSCO'                   '    '
    Modem Vendor Specific:  0x4602                   0x0000
    Modem Vendor Country:   0xB500                   0x0000
    Serial Number Near:    FCZ1111C08V C887VAG 15.2(4)M
    Serial Number Far:
    Modem Version Near:    15.2(4)M
    Modem Version Far:     0x71c8
    Modem Status:            TC Sync (Showtime!)
    DSL Config Mode:         AUTO
    Trained Mode:            G.992.1 (ADSL) Annex A
    TC Mode:                 ATM
    Selftest Result:         0x00
    DELT configuration:      disabled
    DELT state:              not running
    Trellis:                 ON                       ON
    SRA:                     disabled                        disabled
     SRA count:              0                       0
    Bit swap:                enabled                         enabled
     Bit swap count:         1                       8
    Line Attenuation:        54.5 dB                 31.5 dB
    Signal Attenuation:      54.5 dB                  0.0 dB
    Noise Margin:             6.7 dB                 11.0 dB
    Attainable Rate:        2132 kbits/s             888 kbits/s
    Actual Power:            16.7 dBm                12.7 dBm
    Total FECC:             546                      0
    Total ES:               6                        0
    Total SES:              0                        0
    Total LOSS:             0                        0
    Total UAS:              486                      486
    Total LPRS:             0                        0
    Total LOFS:             0                        0
    Total LOLS:             0                        0
    Full inits:             14
    Failed full inits:      1
    Short inits:            0
    Failed short inits:     1
    Firmware        Source          File Name (version)
    VDSL            user config     flash:vdsl.bin-A2pv6C035d_d23j (10)
    Modem FW  Version:      110802_1752-4.02L.03.A2pv6C035d.d23j
    Modem PHY Version:      A2pv6C035d.d23j
    Vendor Version:
                      DS Channel1     DS Channel0   US Channel1       US Channel0
    Speed (kbps):             0             1664             0               704
    SRA Previous Speed:       0                0             0                 0
    Previous Speed:           0             1600             0               736
    Total Cells:              0          2786872             0                 0
    User Cells:               0               68             0                 0
    Reed-Solomon EC:          0              546             0                 0
    CRC Errors:               0                9             0                 0
    Header Errors:            0               10             0                 0
    Interleave (ms):       0.00             8.00          0.00              8.00
    Actual INP:            0.00             1.12          0.00              1.28
    Training Log :  Stopped
    Training Log Filename : flash:vdsllog.bin
    And here's the output from the ATM and dialer interfaces:
    interface ATM0
     no ip address
     ip flow ingress
     no atm ilmi-keepalive
    end
    interface ATM0.1 point-to-point
     ip flow ingress
     pvc 0/38
      pppoe-client dial-pool-number 2
    end
    interface Dialer2
     description OUTSIDE
     ip address negotiated
     ip access-group firewall in
     ip mtu 1492
     ip flow ingress
     ip nat outside
     ip inspect DEFAULT100 out
     ip virtual-reassembly in
     encapsulation ppp
     dialer pool 2
     dialer-group 2
     ppp authentication chap callin
     ppp chap hostname ###removed###
     ppp chap password ###removed###
     no cdp enable
     crypto map dcvpn
    end
    As I say though, config-wise, everything should be correct - the same router works fine on another line (which should also confirm the authentication details are correct - at least in as far as it matches what the ISP have on their RADIUS)
    Any further thoughts?

  • Drawing a curved line using the pen tool, dragging the text cursor over the line but will only give me a small area to write in, in-between a circle and a circle with a cross in?

    Drawing a curved line using the pen tool, dragging the text cursor over the line but will only give me a small area to write in, in-between a circle and a circle with a cross in?

    If you change your tool to the "Direct Selection Tool" (A) then you should be able to adjust the area for you to type in...

  • Honeywell Integration with Cisco IPT

    Hi,
    One of my customer has BMS fom Honeywell. He needs to integrate this system with Cisco IPT 8.6.
    IP telephony system shall be capable of providing a software adjustable temperature setpoint at each telephony terminal, this point info shall be synchronized with the BMS in order to provide the telephony user the ability to adjust the room temperature setpoint from the telephony set, or from the room wall module, and the final value of the point shall be determined as of the final order received from one of the two destinations.
    The link between the two systems, BMS and IP Telephony, shall be in one of the below methods:
    •1-      Open protocol connection (BACnet, OPC DA, or Modbus)
    •2-      SDK development tool provided by Honeywell Building Solutions.
    How can the above be achieved? What components do i require to achieve the above functionality?
    Appreciate your help.

    Hi,
    I am providing you with the below CUCM interop link, where in different product inetrop testing is done with CUCM and is supported.
    http://www.cisco.com/en/US/solutions/ns340/ns414/ns728/networking_solutions_products_genericcontent0900aecd805b561d.html
    Please see any of the similiar protocol is used with some other product which is listed here.
    Hope it helps.
    Anand
    Please rate helpful posts !!

  • RPS 2300 together with 3750 - 48 PoE and Cisco 2821

    Hi,
    I'm wondering what kind of power modules to include in RPS 2300 (750 or 1150 Watt) to provide redundant power supply for 1 x Cisco 2821 router (standart power supply) and Catalyst 3750 with PoE 48 ports.
    Thanks

    I am not qualified to answer your question... I would like to mention to be careful when calculating power for phones, because some of the phones (especially color) will take more power than others. We ended up only being able to support 24-ish phones on a 3750 due to power limitations.

  • Cisco 2821 router IOS and Ipsec

    Hi all.I was wondering can you create VPN tunnels using Ipsec on a 2821 router if you have only the IPBASE image(the basic image 2821 router comes with) on the router or do you need some other version of IOS?
    I've gone totally nuts trying to find out but can't seem to find an answer.Thanks in advance.

    Igor
    You can not create IPSec tunnels if the 2821 is running the IP BASE image. You need a feature set that supports crypto to do IPSec. In general image names that include k9 in the image name will support crypto. You probably would want the Advanced Security feature set or the Advanced IP Services feature set, both of which do support crypto and do support IPSec tunnels.
    HTH
    Rick

  • Cisco 2811 VPN L2TP over IPSEC

    Hi,
    Does the cisco 2811 support L2TP over IPSEC?

    Check these links:
    http://www.cisco.com/en/US/products/ps5854/products_data_sheets_list.html
    http://www.cisco.com/en/US/products/ps5854/products_qanda_item0900aecd80169bd6.shtml
    http://www.cisco.com/en/US/products/ps5854/products_qanda_item0900aecd80169bba.shtml

  • High cpu consumption with GRE over IPSEC

    Hi all,
         After applying a gre over ipsec tunnel on one of our branch office, we get high cpu consumption (average 90%).
    Tunnel is applied between Cisco 2851 (C2800NM-ADVIPSERVICESK9-M), Version 12.4(24)T2, (fc2) and
    Cisco CISCO2921/K9 Version 15.0(1)M3.
    Config of the tunnet is as follow :
    - authentication pre-share
    - encryption aes 256
    - hash : sha
    - transform set : esp-aes esp-sha-hmac mode transport
    Routing process is eigrp.
    Could anyone please help me on solving this issue?

    Cool, good start.
    Check "show ip traffic" on both sides, it would be interesting to see what's going on.
    BTW the CPU usage of top process doesn't add up to 90%, there's a possibility it's traffic rate/pattern + features (IP input and pool manager would suggest that).

  • VideoCalls with gateway 2821 Cisco (H320)

    H320 to H323 gateway
    I  have to set up a video conference environment with a video endpoint registered how h323 to CUCM. Internal videoCalls run ok.
    I have problems with PSTN videocalls. I route this videoCalls to a Cisco Gateway 2821 by E1.
    Cisco 2821 (revision 53.51) with 243712K/18432K bytes of memory.
    Processor board ID FHK0850F1Q8
    2 Gigabit Ethernet interfaces
    62 Serial interfaces
    2 Channelized E1/PRI ports
    1 Virtual Private Network (VPN) Module
    2 ATM/Voice AIMs
    4 Voice FXS interfaces
    BCNTVGW01#sh ver
    Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(25b)                                                                             ,
    ROM: System Bootstrap, Version 12.3(8r)T7, RELEASE SOFTWARE (fc1)
    System image file is "flash:c2800nm-advipservicesk9-mz.124-25b.bin"
    I need other IOS version?
    I need new hardware?
    Can anyone help me with a configuration example on this as the Cisco 2821 will need to do the H.320 to H.323 conversion
    Thanks and sorry by my English!
    Daniel Garzón

    HI,
    Thanks for you response.
    I am downloading:
    15.1.1T1(ED)
    ADVANCED ENTERPRISE SERVICES                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   --> c2800nm-adventerprisek9-mz.151-1.T.bin
    Or is better this?
    12.4(24)T
    ADVANCED ENTERPRISE SERVICES                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   c2800nm-adventerprisek9-mz.124-24.T.bin
    Thanks
    Daniel Garzón

Maybe you are looking for

  • Count distinct in case statement

    SELECT A.P_ID, B.P_NAME, C.P_DESC, SUM(CASE WHEN A.DATE BETWEEN TRUNC(ADD_MONTHS(LAST_DAY(SYSDATE),-4) + 1) AND ADD_MONTHS(LAST_DAY(TO_DATE(SYSDATE)),-1) AND A.M_ID IS NOT NULL THEN 1 ELSE 0 END) AS COUNT, SUM(CASE WHEN A.DATE BETWEEN TRUNC(ADD_MONTH

  • MYSQL + Oracle Forms

    I am an experienced Oracle developer who has only worked with Oracle products and I have never developed any application for the web. Question: Can I develop a application using Oracle Forms on my home pc and have it work on my web server who uses a

  • Strange characters in azalea barcode

    I have azalea barcode I2of5 in a crystal report 2008 sp2 report that show strange characters such as paragraph symbols in barcode image. See the image: [[http://i39.tinypic.com/eqpjbp.jpg]] The OS is win7 64bits What's wrong is going on?

  • Can't install 7.0.3 version

    I've done downloading 7.0.3 version on my ipad 2 (current version is 5.1, available storage is 8,8GB out of 64GB) then everytime I click button "Install Now" and click "Agree" then it appears "Verifying update..." but it will appear: "Unable to Insta

  • Does BBM use alot of data?

    Hey Just got my BB and wonder does using the BBM and having it on all the time use alot of data? i have a 750mb plan and all i use is facebook msn(wlm) and BBM somtimes just google will i use much of my 750mb or not Thanks in advance