Ti suggerisco di impostare un IP SLA che ogni tot minuti ti faccia un ping per farti salire il dialer
Saluti
1841 e scheda UMTS
Moderatore: Federico.Lagni
- Francesco87
- Cisco fan
- Messaggi: 59
- Iscritto il: mar 10 apr , 2007 9:13 am
- Località: Ethernet 0/0
Ciao All,
dovrei comprare un Cisco 881 per realizzare una connettività 3g di backup. Mi sono documentato un po' e dalla documentazione risulta che è possibile creare il "modem profile" in due modalità diverse. Cito:
•To configure your GSM data profile, you will need the following information from your service provider:
–Username
–Password
–Access point name (APN)
•To configure your CDMA data profile for manual activation, you need the following information from your service provider:
–Master Subsidy Lock (MSL) number
–Mobile Directory number (MDN)
–Mobile Station Identifier (MSID)
–Electronic Serial Number (ESN)
Qualcuno ha idea di quale sia la differenza o quale sia quello da utilizzare per l'italia?
Grazie
Saluti
Francesco
dovrei comprare un Cisco 881 per realizzare una connettività 3g di backup. Mi sono documentato un po' e dalla documentazione risulta che è possibile creare il "modem profile" in due modalità diverse. Cito:
•To configure your GSM data profile, you will need the following information from your service provider:
–Username
–Password
–Access point name (APN)
•To configure your CDMA data profile for manual activation, you need the following information from your service provider:
–Master Subsidy Lock (MSL) number
–Mobile Directory number (MDN)
–Mobile Station Identifier (MSID)
–Electronic Serial Number (ESN)
Qualcuno ha idea di quale sia la differenza o quale sia quello da utilizzare per l'italia?
Grazie
Saluti
Francesco
The netmask in Cisco access lists are inverted. Nobody knows why, they just are.
-
- n00b
- Messaggi: 14
- Iscritto il: mar 30 mar , 2010 11:12 pm
Ho l'idea di utilizzare l'umts come backup per un adsl nel caso ci siano problemi con la linea adsl, 1841 con wic adsl e wic umts.
I pro possono essere rispetto al backup isdn la mancanza del canone e la velocità più elevata
Teoricamente se usato come backup non genera traffico quando l'adsl è in funzione.
Contro: ci possono essere problemi nel cambio di nat quando entra in gioco l'umts?
es translation adsl che restano in gioco
I pro possono essere rispetto al backup isdn la mancanza del canone e la velocità più elevata
Teoricamente se usato come backup non genera traffico quando l'adsl è in funzione.
Contro: ci possono essere problemi nel cambio di nat quando entra in gioco l'umts?
es translation adsl che restano in gioco
- zot
- Messianic Network master
- Messaggi: 1274
- Iscritto il: mer 17 nov , 2004 1:13 am
- Località: Teramo
- Contatta:
In uscita ti basta giocare con le route-map,in entrata devi aspettare che il timeout NAT scada o crearti uno script ad hoc.
-
- n00b
- Messaggi: 12
- Iscritto il: gio 31 gen , 2008 9:33 pm
- Contatta:
Buonasera ragazzi, avrei bisogno di configurare il mio cisco 887 con l'interfaccia UMTS, mi potreste gentilmente aiutarmi ? Il mio operatore è TIM. Di seguito la mia conf:
- Building configuration...
Current configuration : 6130 bytes
!
! Last configuration change at 21:29:13 PCTime Fri Mar 8 2013 by admin
version 15.1
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname router
!
boot-start-marker
boot-end-marker
!
!
no logging buffered
enable secret 5 $1$MJuQ$QjVcuMJSPmCVuE2cEkhWY.
enable password _ucLQK9e
!
no aaa new-model
!
memory-size iomem 10
clock timezone PCTime 1 0
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
service-module wlan-ap 0 bootimage autonomous
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-3482365739
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3482365739
revocation-check none
rsakeypair TP-self-signed-3482365739
!
!
crypto pki certificate chain TP-self-signed-3482365739
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33343832 33363537 3339301E 170D3133 30333032 32323434
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34383233
36353733 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B373 A3DB5205 69F65D8F 27B9CA5E 18B8769C CD2C3F2B 4FEE4C87 299D116D
243D242F 33AE8C6C A1A71752 586DEC32 E1EFA571 50033408 F827C37E 5D3674CF
3FB7223E A295D2AF 1226F551 3A2DC384 D7027BB9 C6FB2185 8F9947DB F4736435
2A468720 C696194A 91DFECC2 21AFCEAA 1A1F19C0 FDF7DBEA E367768C D56177AB
02690203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 144927BB 712CBBDD A0E7F669 62C52F84 D6F34047 BA301D06
03551D0E 04160414 4927BB71 2CBBDDA0 E7F66962 C52F84D6 F34047BA 300D0609
2A864886 F70D0101 05050003 81810006 D5EF93DC FB962105 BC9CA8B5 6CED0ECA
E51740E3 2E5C15EA 08D8ED4A 18FC1190 559ADEAB 9FBB65D6 4A76C95A 5690C75D
18EA991C EAB82460 17521ADB 2377E3CA 23EBE2AD 7904B764 07792DFA E97F54DB
575AF277 6B8E9FF0 486CF835 0162A3AC 568424A3 5886DF5D F2CF035C C12EC3FD
23E4D6CD 0519426E E70BE581 B1EB64
quit
ip source-route
!
!
!
ip dhcp excluded-address 192.168.0.1
!
ip dhcp pool ccp-pool1
import all
network 192.168.0.0 255.255.255.0
dns-server 212.216.112.112 212.216.172.62
default-router 192.168.0.1
!
!
ip cef
ip name-server 212.216.112.112
ip name-server 212.216.172.62
ip inspect name CCP_LOW dns
ip inspect name CCP_LOW ftp
ip inspect name CCP_LOW h323
ip inspect name CCP_LOW sip
ip inspect name CCP_LOW https
ip inspect name CCP_LOW icmp
ip inspect name CCP_LOW imap
ip inspect name CCP_LOW pop3
ip inspect name CCP_LOW netshow
ip inspect name CCP_LOW rcmd
ip inspect name CCP_LOW realaudio
ip inspect name CCP_LOW rtsp
ip inspect name CCP_LOW esmtp
ip inspect name CCP_LOW sqlnet
ip inspect name CCP_LOW streamworks
ip inspect name CCP_LOW tftp
ip inspect name CCP_LOW tcp
ip inspect name CCP_LOW udp
ip inspect name CCP_LOW vdolive
no ipv6 cef
!
!
multilink bundle-name authenticated
license udi pid CISCO887GW-GN-E-K9 sn FCZ1521C28Z
!
!
username admin privilege 15 secret 5 $1$MsL3$LTJALWmq5X55FfgPy20.u/
!
!
!
!
controller Cellular 0
!
!
!
!
!
!
!
!
interface ATM0
mtu 1500
no ip address
no atm ilmi-keepalive
!
interface ATM0.1 point-to-point
mtu 1500
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
shutdown
!
interface FastEthernet2
no ip address
shutdown
!
interface FastEthernet3
no ip address
shutdown
!
interface wlan-ap0
description Service module interface to manage the embedded AP
no ip address
arp timeout 0
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
switchport mode trunk
no ip address
!
interface Cellular0
no ip address
encapsulation ppp
shutdown
!
interface Vlan1
description $FW_INSIDE$
ip address 192.168.0.1 255.255.255.0
ip access-group 100 in
ip nat inside
ip virtual-reassembly in
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
ip access-group 101 in
ip nat outside
ip inspect CCP_LOW out
ip virtual-reassembly in
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication pap callin
ppp pap sent-username ivsfiore password 0 telecono
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 1 interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
!
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 100 remark auto generated by CCP firewall configuration
access-list 100 remark CCP_ACL Category=1
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark auto generated by CCP firewall configuration
access-list 101 remark CCP_ACL Category=1
access-list 101 permit udp host 212.216.172.62 eq domain any
access-list 101 permit udp host 212.216.112.112 eq domain any
access-list 101 deny ip 192.168.0.0 0.0.0.255 any
access-list 101 permit icmp any any echo
access-list 101 permit icmp any any time-exceeded
access-list 101 permit icmp any any unreachable
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip any any log
dialer-list 1 protocol ip permit
!
!
!
!
snmp-server community public RO
!
control-plane
!
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
line 3
no exec
line vty 0 4
privilege level 15
password _ucLQK10e
login local
transport input telnet ssh
transport output telnet ssh
!
ntp update-calendar
end
Mario Fiorentino