Special ISDN Signaling Commands

Size: px
Start display at page:

Download "Special ISDN Signaling Commands"

Transcription

1 Special ISDN Signaling Commands This chapter describes the function and displays the syntax for special ISDN signaling commands. For more information about defaults and usage guidelines, see the corresponding chapter of the Dial Solutions Command Reference. autodetect encapsulation To enable automatic detection of the encapsulation types in operation over a point-to-point link to a specified serial or ISDN interface, use the autodetect encapsulation interface configuration command. To disable automatic, dynamic detection of the encapsulation types in operation on a link, use the no form of this command. autodetect encapsulation encapsulation-type no autodetect encapsulation encapsulation-type One or both of the encapsulation keywords v120 and ppp. cpp authentication To enable negotiation of authentication with a router or bridge that supports the Combinet Proprietary Protocol (CPP) and that is calling in to this router, use the cpp authentication interface configuration command. To disable negotiation of CPP authentication, use the no form of this command. cpp authentication no cpp authentication cpp callback accept To enable the router to accept callback from a Combinet router or bridge that supports the Combinet Proprietary Protocol (CPP), use the cpp callback accept interface configuration command. cpp callback accept Special ISDN Signaling Commands 821

2 dialer isdn short-hold dialer isdn short-hold To configure the router to disconnect a call at the end of the current charging period if the line has been idle for at least the specified minimum period, use the dialer isdn short-hold map-class dialer configuration command. To reset the ISDN short-hold timer to the default period, use the no form of the command. dialer isdn short-hold seconds no dialer isdn short-hold seconds Minimum number of seconds of idle time on the line. Default is 120 seconds. dialer map (AOC) To configure an ISDN interface to place a call to multiple sites, to authenticate calls from multiple sites, and to identify the class name that configures the ISDN AOC short-hold idle timeout, use the following form of the dialer map interface configuration command: dialer map protocol next-hop-address [name hostname] [spc] [speed 56 64] [broadcast] class class-name [dial-string[:isdn-subaddress]] protocol next-hop-address name hostname spc speed broadcast class class-name Protocol keywords; one of the following: appletalk, bridge, clns, decnet, ip, ipx, novell, snapshot, vines, and xns. Protocol address used to match against addresses to which packets are destined. This argument is not used with the bridge protocol keyword. (Optional) Case-sensitive name or ID of the remote device (usually the host name). For routers with ISDN interfaces, if calling line identification sometimes called CLI, but also known as caller ID and automatic number identification (ANI) is provided, the hostname field can contain the number that the calling line ID provides. (Optional) Specifies a semipermanent connection between customer equipment and the exchange; used only in Germany to configure connections between an ISDN BRI and a 1TR6 ISDN switch type. (Optional) Line speed in kilobits per second to use. Used for ISDN only. The default speed is 64 kbps. (Optional) Indicates that broadcasts should be forwarded to this protocol address. Name of the class that configures the ISDN AOC static dialer timeout period or the short-hold timeout period or both. 822 Cisco IOS Software Command Summary

3 dialer map (SPC) dial-string[:isdn-subaddress] (Optional) Telephone number and optional ISDN subaddress used for ISDN multipoint connections that are sent to the dialing device when it recognizes packets with the specified next hop address that matches the access lists defined. The dial string and ISDN subaddress, if used, must be the last item in the command line. dialer map (SPC) To set up network addressing on an ISDN BRI interface to support semipermanent connections (if the ISDN switch supports such connections), use the following form of the dialer map interface configuration command: dialer map protocol next-hop-address [name hostname] [spc] [speed 56 64] [broadcast] dial-string[:isdn-subaddress] protocol next-hop-address name hostname spc speed broadcast dial-string[:isdn-subaddress] Protocol keywords; one of the following: appletalk, bridge, clns, decnet, ip, ipx, novell, snapshot, vines, and xns. Protocol address used to match against addresses to which packets are destined. This argument is not used with the bridge protocol keyword. (Optional) Case-sensitive name or ID of the remote device (usually the host name). For routers with ISDN interfaces, if calling line identification sometimes called CLI, but also known as caller ID and automatic number identification (ANI) is provided, the hostname field can contain the number that the calling line ID provides. (Optional) Specifies a semipermanent connection between customer equipment and the exchange; used only in Germany to configure connections between an ISDN BRI and a 1TR6 ISDN switch type. (Optional) Line speed in kilobits per second to use. Used for ISDN only. The default speed is 64 kbps. (Optional) Indicates that broadcasts should be forwarded to this protocol address. (Optional) Telephone number and optional ISDN subaddress used for ISDN multipoint connections that are sent to the dialing device when it recognizes packets with the specified next hop address that matches the access lists defined. The dial string and ISDN subaddress, if used, must be the last item in the command line. Special ISDN Signaling Commands 823

4 encapsulation cpp encapsulation cpp To enable encapsulation for communication with routers or bridges using the Combinet Proprietary Protocol (CPP), use the encapsulation cpp interface configuration command. Use the no form of this command to disable CPP encapsulation. encapsulation cpp no encapsulation cpp isdn leased-line bri 128 To configure an ISDN BRI for leased-line service at 128 kbps, use the isdn leased-line bri 128 global configuration command. isdn leased-line bri number 128 number BRI interface number. isdn service To take an individual B channel or an entire PRI interface out of service or set it to a different channel service state that is passed in to the switch, use the isdn service interface configuration command. isdn service dsl number b_channel number state state-value dsl number b_channel number state state-value Digital subscriber loop number; displayed with the show isdn status command. B channel or range of B channels to be set with the passed-in state value. The b_channel 0 keyword sets the entire PRI interface to a specified state value. B channel numbers range from 1 to 24. Desired channel service state to be set on the channels. The following channel service state values are supported: 0 In service 1 Maintenance 2 Out of service 824 Cisco IOS Software Command Summary

5 pri-group timeslots nfas_d pri-group timeslots nfas_d To configure NFAS and specify the channels to be controlled by the primary NFAS D channel, use the pri-group timeslots nfas_d controller configuration command. pri-group timeslots range nfas_d [primary backup none] nfas_interface number nfas_group number range primary backup none nfas_interface number nfas_group number Channels in the range 1 to 24. A range of channels is shown with a hyphen (-). (Optional) Function of channel 24: the primary NFAS D channel. (Optional) Function of channel 24: the backup NFAS D channel. (Optional) Function of channel 24: B channel. Value in the range 0 to 9 assigned by the service provider to ensure unique identification of a PRI interface. The 0 interface number should be assigned to the primary NFAS D channel. Group identifier unique on the router. Multiple NFAS groups can exist on the router. show isdn To display the information about memory, Layer 2 and Layer 3 timers, and the status of PRI channels, use the show isdn global configuration command. show isdn {active history memory services status [dsl interface-type number] timers} active history memory services status [dsl interface-type number] Displays current call information, including called number, the time until the call is disconnected, AOC charging units used during the call, and whether the AOC information is provided during calls or at end of calls. Displays historic and current call information, including the called number, the time until the call is disconnected, AOC charging time units used during the call, and whether the AOC information is provided during calls or at the end of calls. Displays memory pool statistics. This keyword is for use by technical development staff only. Displays the status of PRI channels. Displays the status of all ISDN interfaces or, optionally, a specific digital signal link (DSL) or a specific ISDN interface. Values of dsl range from 0 to 15. Interface-type can be bri or serial. Special ISDN Signaling Commands 825

6 show isdn nfas group timers Displays the values of Layer 2 and Layer 3 timers. show isdn nfas group To display all the members of a specified NFAS group or all NFAS groups, use the show isdn nfas group privileged EXEC command. show isdn nfas group [number] number (Optional) Identifier number of a specific NFAS group. show isdn service To display the state and the service status of each ISDN channel, use the show isdn service privileged EXEC command. show isdn service 826 Cisco IOS Software Command Summary

Configuring ISDN Special Signaling

Configuring ISDN Special Signaling Configuring ISDN Special Signaling This chapter describes features that either depend on special signaling services offered by an ISDN network service provider or overcome an inability to deliver certain

More information

Channelized E1 and Channelized T1 Setup Commands

Channelized E1 and Channelized T1 Setup Commands Channelized E1 and Channelized T1 Setup Commands This chapter describes the function and displays the syntax for channelized E1 and channelized T1 setup commands. For more information about defaults and

More information

ISDN Commands. interface bri number

ISDN Commands. interface bri number This chapter describes the function and displays the syntax of each ISDN command. For more information about defaults and usage guidelines, see the corresponding chapter of the Router Products Command

More information

Configuring ISDN PRI. Cisco IOS Dial Technologies Configuration Guide DC-257

Configuring ISDN PRI. Cisco IOS Dial Technologies Configuration Guide DC-257 Configuring ISDN PRI This chapter describes how to configure channelized E1 and channelized T1 for ISDN PRI and for two types of signaling to support analog calls over digital lines. This information is

More information

Configuring ISDN PRI and Other Signaling on E1 and T1 Lines

Configuring ISDN PRI and Other Signaling on E1 and T1 Lines Configuring ISDN PRI and Other Signaling on E1 and T1 Lines This chapter describes how to configure channelized E1 and channelized T1 for ISDN PRI and for two types of signaling to support analog calls

More information

1ISDN. August 2000. Software Reference ISDN 1

1ISDN. August 2000. Software Reference ISDN 1 1ISDN August 2000 Software Reference ISDN 1 2 ISDN Software Reference Table of Contents ISDN Table of Contents A REFERENCE 5 1 ISDN Connections on a BinTec router 6 1.1 Some background on ISDN 6 1.1.1

More information

Configuring Network Side ISDN PRI Signaling, Trunking, and Switching

Configuring Network Side ISDN PRI Signaling, Trunking, and Switching Configuring Network Side ISDN PRI Signaling, Trunking, and Switching This chapter describes the Network Side ISDN PRI Signaling, Trunking, and Switching feature. The following main sections are provided:

More information

BRI to PRI Connection Using Data Over Voice

BRI to PRI Connection Using Data Over Voice BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Configure ISDN Backup and VPN Connection

Configure ISDN Backup and VPN Connection Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint

More information

PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for

PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for PPP Concept 1 What is PPP? Recall that HDLC is the default serial encapsulation method when you connect two Cisco routers. With an added protocol type field, the Cisco version of HDLC is proprietary. Thus,

More information

ISDN. rek. Petr Grygárek. 2005 Petr Grygarek, Advanced Computer Networks Technologies 1

ISDN. rek. Petr Grygárek. 2005 Petr Grygarek, Advanced Computer Networks Technologies 1 ISDN Petr Grygárek rek 1 Integrated Services Digital Network Circuit-switched digital network connection setup and termination required user pays for connection time addressing of subscriber devices according

More information

Access Control Lists: Overview and Guidelines

Access Control Lists: Overview and Guidelines Access Control Lists: Overview and Guidelines Cisco provides basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed

More information

Configuring Dial Backup and Remote Management

Configuring Dial Backup and Remote Management 13 CHAPTER Configuring Dial Backup and Remote Management The Cisco 800 series access routers support dial-in (for remote management) and dial-out (for dial backup) capabilities. By allowing you to configure

More information

Overview of Dial Interfaces, Controllers, and Lines

Overview of Dial Interfaces, Controllers, and Lines Overview of Dial Interfaces, Controllers, and Lines This chapter describes the different types of software constructs, interfaces, controllers, channels, and lines that are used for dial-up remote access.

More information

Network Address Translation Commands

Network Address Translation Commands Network Address Translation Commands This chapter describes the function and displays the syntax for Network Address Translation (NAT) commands. For more information about defaults and usage guidelines,

More information

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server

More information

Troubleshooting Second B channel Call Failures on ISDN B

Troubleshooting Second B channel Call Failures on ISDN B Troubleshooting Second B channel Call Failures on ISDN B Table of Contents Troubleshooting Second B channel Call Failures on ISDN BRI Links..1 Introduction.1 Prerequisites..1 Prior Steps..1 Hardware and

More information

Leased Line Support for Cisco 2600/3600 Series Analog Modems

Leased Line Support for Cisco 2600/3600 Series Analog Modems Leased Line Support for Cisco 2600/3600 Series Analog Modems This feature adds one modem AT command (AT&L) and two AT registers to be added to the modemcap for the appropriate leased lines. Several new

More information

Virtual Private Network and Remote Access

Virtual Private Network and Remote Access Virtual Private Network and Remote Access Introduction A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A

More information

Using Configuration Builder, Show Commands, and Health Monitor

Using Configuration Builder, Show Commands, and Health Monitor CHAPTER 4 Using Configuration Builder, Show Commands, and Health Monitor CiscoWorks Windows is a suite of integrated PC-based network configuration and diagnostic tools for small to medium-sized networks

More information

Lab 4.2.4 Advanced Telnet Operations

Lab 4.2.4 Advanced Telnet Operations Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend

More information

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server

Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key

More information

Configuring Access Service Security

Configuring Access Service Security CHAPTER 3 Configuring Access Service Security The access service security paradigm presented in this guide uses the authentication, authorization, and accounting (AAA) facility. Authentication requires

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Configuring Demand Routing for Primary ISDN Modules

Configuring Demand Routing for Primary ISDN Modules 8 Configuring Demand Routing for Primary ISDN Modules Contents Overview of ISDN Connections................................... 8-4 Elements of an ISDN Connection.............................. 8-5 The Local

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Exam questions. 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line.

Exam questions. 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line. Nguyen Khac Quyet - Take Exam Exam questions Time remaining: 00: 08: 31 1. Which of the following are true regarding xdsl? Choose three. It uses a portion of the existing phone line It is symmetrical It

More information

CiscoWorks for Windows Features 2-1

CiscoWorks for Windows Features 2-1 CHAPTER 2 CiscoWorks for Windows Features CiscoWorks for Windows 1.0 is a suite of integrated PC-based network configuration and diagnostic tools for small to medium-sized networks or remote workgroups

More information

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Mediatrix 4404 Step by Step Configuration Guide June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents First Steps... 3 Identifying your MAC Address... 3 Identifying your Dynamic IP Address...

More information

NetFlow Subinterface Support

NetFlow Subinterface Support NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the

More information

Leased Line PPP Connections Between IOS and HP Routers

Leased Line PPP Connections Between IOS and HP Routers Leased Line PPP Connections Between IOS and HP Routers This technical document describes how to connect an IOS Router to an HP Router using point-to-point protocol. An example of an IOS router connected

More information

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach Funkwerk

More information

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability. WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect

More information

Chapter 32 Time Division Multiplexing (TDM)

Chapter 32 Time Division Multiplexing (TDM) Chapter 32 Time Division Multiplexing (TDM) Introduction... 32-2 E1/T1 Time Division Multiplexing... 32-3 Static E1/T1 TDM Versus ISDN Calling... 32-4 BRI Time Division Multiplexing... 32-5 Configuration

More information

Introduction to WAN Technologies

Introduction to WAN Technologies CHAPTER 3 Chapter Goals Become familiar with WAN terminology. Learn about different types of WAN connections. Become familiar with different types of WAN equipment. This chapter introduces the various

More information

Configuring Analog and Digital Voice Interfaces

Configuring Analog and Digital Voice Interfaces Configuring Analog and Digital Voice Interfaces Foreign Exchange Station Ports (FXS) FXS ports connect analog edge devices. This topic identifies the parameters that are configurable on the FXS port. FXS

More information

About This Guide. Document Objectives. Audience

About This Guide. Document Objectives. Audience About This Guide This preface describes the objectives, audience, organization, and conventions of the Cisco 1600 Series Software Configuration Guide. Cisco documentation and additional literature are

More information

Using Configuration Builder, Show Commands, and Health Monitor

Using Configuration Builder, Show Commands, and Health Monitor CHAPTER 2 Using Configuration Builder, Show Commands, and Health Monitor CiscoWorks Windows is a suite of integrated PC-based network configuration and diagnostic tools for small to medium-sized networks

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

Lab 7.2.9 Load Balancing Across Multiple Paths

Lab 7.2.9 Load Balancing Across Multiple Paths Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Chapter 1 Implement EIGRP operations... 2. Chapter 2 Implement multiarea OSPF operations... 18. Chapter 4 Implement Cisco IOS routing features...

Chapter 1 Implement EIGRP operations... 2. Chapter 2 Implement multiarea OSPF operations... 18. Chapter 4 Implement Cisco IOS routing features... Table of Contents Chapter 1... 2 94 106 Chapter 2 Implement multiarea OSPF operations... 18 96 120 Chapter 3 Describe integrated IS-IS... 30 97 130 Chapter 4 Implement Cisco IOS routing features... 48

More information

Enhanced Voice Services for Japan for Cisco 800 Series Routers

Enhanced Voice Services for Japan for Cisco 800 Series Routers Enhanced Voice Services for Japan for Cisco 800 Series Routers This appendix describes the Enhanced Voice Services for Japan Cisco IOS features, including INS-NET-64 voice features. This appendix includes

More information

Configuring Modem Transport Support for VoIP

Configuring Modem Transport Support for VoIP Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,

More information

Configuring a Leased Line

Configuring a Leased Line CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Overview of Access VPNs and Tunneling Technologies

Overview of Access VPNs and Tunneling Technologies Overview of Access VPNs and Tunneling Technologies Introduction A virtual private network (VPN) is a network that extends remote access to users over a shared infrastructure. VPNs maintain the same security

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Configuring DHCP Snooping

Configuring DHCP Snooping CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.

More information

Configuring LLDP, LLDP-MED, and Location Service

Configuring LLDP, LLDP-MED, and Location Service 27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service

More information

Release Notes for Cisco C881G-U-K9

Release Notes for Cisco C881G-U-K9 First Published: May 30, 2011 Release: Cisco IOS Release 15.1(4)M or later releases Contents Introduction, page 1 New Features, page 2 List of New Commands, page 9 Introduction This document describes

More information

Configuring Asynchronous SLIP and PPP

Configuring Asynchronous SLIP and PPP Configuring Asynchronous SLIP and PPP This chapter describes how to configure asynchronous Serial Line Internet Protocol (SLIP) and PPP. It includes the following main sections: Asynchronous SLIP and PPP

More information

RADIUS Server Load Balancing

RADIUS Server Load Balancing First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in

More information

Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)

More information

PPP (Point-to-Point Protocol)

PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

CCNA2 Chapter 11 Practice

CCNA2 Chapter 11 Practice CCNA2 Chapter 11 Practice Two neighbouring routers are configured for OSPF, but they have different hello and dead intervals. What will happen? They will become adjacent as long as they are configured

More information

Voice Dial Plans, Configuring Voice Interfaces and Dial Peers

Voice Dial Plans, Configuring Voice Interfaces and Dial Peers Voice Dial Plans, Configuring Voice Interfaces and Dial Peers Cisco Networking Academy Program 1 Call Establishment Principles 2 Dial-Peer Call Legs 3 End-to-End Calls 4 Configuring Dial Peers 5 Understanding

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Build yourself an ISP

Build yourself an ISP Ouch what just bit me? So you ve been bitten by the Internet bug and want to dive into the world wide web by becoming what is called an Internet Service Provider (ISP). The good news is that it is actually

More information

co Sample Configurations for Cisco 7200 Broadband Aggreg

co Sample Configurations for Cisco 7200 Broadband Aggreg co Sample Configurations for Cisco 7200 Broadband Aggreg Table of Contents Sample Configurations for Cisco 7200 Broadband Aggregation...1 Introduction...1 Configurations...1 PPPoA Session Termination:

More information

L2F Case Study Overview

L2F Case Study Overview LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Configuring EtherChannels

Configuring EtherChannels CHAPTER 12 This chapter describes how to configure EtherChannels on the Cisco 7600 series router Layer 2 or Layer 3 LAN ports. For complete syntax and usage information for the commands used in this chapter,

More information

Configuring the Firewall Management Interface

Configuring the Firewall Management Interface Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management

More information

Traffic Mirroring Commands on the Cisco IOS XR Software

Traffic Mirroring Commands on the Cisco IOS XR Software Traffic Mirroring Commands on the Cisco IOS XR Software This module describes the commands used to configure and monitor traffic mirroring. acl, page 2 clear monitor-session counters, page 4 destination

More information

Introduction to WAN Technologies

Introduction to WAN Technologies CHAPTER 3 Introduction to WAN Technologies This chapter introduces the various protocols and technologies used in wide- area network (WAN) environments. Topics summarized here include point-to-point links,

More information

Sampled NetFlow. Feature Overview. Benefits

Sampled NetFlow. Feature Overview. Benefits Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Connecting to the Firewall Services Module and Managing the Configuration

Connecting to the Firewall Services Module and Managing the Configuration CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Administrative Distance

Administrative Distance RIP is a distance vector routing protocol. It shares routing information through the local broadcast in every 30 seconds. In this tutorial we will explain RIP routing fundamentals with examples such as

More information

LifeSize Networker Installation Guide

LifeSize Networker Installation Guide LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF

More information

Triple DES Encryption for IPSec

Triple DES Encryption for IPSec Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form

More information

Transferring Files Using HTTP or HTTPS

Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Cisco Router and Security Device Manager Dial-Backup Solution

Cisco Router and Security Device Manager Dial-Backup Solution Application Note Cisco Router and Security Device Manager Dial-Backup Solution Introduction Point-to-Point Protocol over Ethernet (PPPoE) and IP Security (IPSec) VPN deployments are increasing and require

More information

DHCP Server Port-Based Address Allocation

DHCP Server Port-Based Address Allocation The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement

PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement This feature module describes the PA-MC-T3 Multi-Channel T3 port adapter (PA-MC-T3 [=]), which can now be configured as either customer

More information

ccna question and answers

ccna question and answers ccna question and answers 46 Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31,B & D Subnet addresses in this situation are all in

More information

Version Date Status Owner. 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt

Version Date Status Owner. 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt History of Change Version Date Status Owner 1.0 2009-02-04 Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt 1.1 2010-09-01 Update for OpenScape Office MX V2 and hints for Fax F. Kneissl 1.2

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

VWIC 1MFT T1, VWIC 2MFT T1,

VWIC 1MFT T1, VWIC 2MFT T1, sing VWIC 1MFT T1, VWIC 2MFT T1, and VWIC 2MFT T1 DI Interface Cards for Data on Cisco 1700, 2600, 3600 and Table of Contents Using VWIC 1MFT T1, VWIC 2MFT T1, and VWIC 2MFT T1 DI Interface Cards for Data

More information

Network Security and AAA

Network Security and AAA ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote

More information

CCNP2 - Implementing Secure Converged Wide-area Networks v5.0

CCNP2 - Implementing Secure Converged Wide-area Networks v5.0 2.6.11 - Configuring a DSL ATM Interface Figures and show the steps you use to configure a DSL ATM interface. Use the dsl operating-mode auto interface configuration command to specify that the router

More information

Link Layer Discovery Protocol

Link Layer Discovery Protocol 12 Link Layer Discovery Protocol Contents Overview..................................................... 12-2 LLDP..................................................... 12-2 LLDP Messages............................................

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.

More information

User's Guide bintec R3000w / R3400 / R3800 ISDN. Copyright February 8, 2006 Funkwerk Enterprise Communications GmbH Version 0.9

User's Guide bintec R3000w / R3400 / R3800 ISDN. Copyright February 8, 2006 Funkwerk Enterprise Communications GmbH Version 0.9 User's Guide bintec R3000w / R3400 / R3800 ISDN Copyright February 8, 2006 Funkwerk Enterprise Communications GmbH Version 0.9 Purpose Liability Trademarks Copyright Guidelines and standards How to reach

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

Application Note 2. Using the TCPDIAL & TCPPERM Commands to Connect Two TransPort router Serial Interfaces Over TCP/IP.

Application Note 2. Using the TCPDIAL & TCPPERM Commands to Connect Two TransPort router Serial Interfaces Over TCP/IP. Application Note 2 Using the TCPDIAL & TCPPERM Commands to Connect Two TransPort router Serial Interfaces Over TCP/IP. Reverse Telnet or Serial Terminal Server MultiTX feature UK Support March 2014 1 Contents

More information

VRRPv3: Object Tracking Integration

VRRPv3: Object Tracking Integration Virtual Router Redundancy Protocol (VRRP) enables a group of devices to form a single virtual device to provide redundancy. The LAN clients then can be configured with the virtual device as the default

More information

Troubleshooting Remote Viewing on the. Combo DVR/Monitor System

Troubleshooting Remote Viewing on the. Combo DVR/Monitor System Troubleshooting Remote Viewing on the L20WD800 Series Combo DVR/Monitor System Network Troubleshooting English Version 090808.1 MODEL: L20WD800 Series www.lorexcctv.com Copyright 2008 Lorex Technology

More information

How To Configure A Cisco Router With A Cio Router

How To Configure A Cisco Router With A Cio Router CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also

More information

Configure Common ISDN Access Concentration With The Firewall. How To. Introduction. What information will you find in this note?

Configure Common ISDN Access Concentration With The Firewall. How To. Introduction. What information will you find in this note? How To Configure Common ISDN Access Concentration With The Firewall Introduction This How To Note provides examples of how to configure a network consisting of a number of remote Small Office / Home Office

More information