Cisco 877 contro Netgear da SuperMercato

Tutto ciò che ha a che fare con la configurazione di apparati Cisco (e non rientra nelle altre categorie)

Moderatore: Federico.Lagni

Rispondi
mmarangon61
Cisco fan
Messaggi: 34
Iscritto il: dom 28 ott , 2007 1:21 am

Mi scuso per l'oggetto provocatorio. Ho un Cisco 877-K9 in cui da 7 mesi, nonostante tentate molte IOS e Firmware, di notte (in cui il segnale ADSL di una 20 Mega solo dati Tiscali è più disturbato) cade la portante almeno ogni 10 minuti se ho fortuna.
Stremato, comprato da MediaWorld Netgear 834 ad euro 49 ed il link rimane up giorno e notte.
Ovvio che ho configurato male il Cisco, ma non ho idea di che sintassi usare per dirgli "quando il Noise Margin scende tieni su la portante". O qualcosa di simile.
Cosa faccio? Ok... capito vostra risposta... tieniti il Netgear... :-)
Avatar utente
Helix
Messianic Network master
Messaggi: 1175
Iscritto il: mar 04 dic , 2007 6:45 pm
Località: Frosinone
Contatta:

Posta la configurazione (senza quella come facciamo a capire se è giusta?)...
e uno show dsl int
---
Ciao, Leonardo

"Guarda che il VSS è migliore dell' MPLS"
"Io amo le rotte statiche e non mi fido dei protocolli di RUTING"
"Io ho lavorato per Telecom...li è tutto Layer 2 e tutto RUTING statico"
"L'MPLS VPN è come l' ATM e farà la sua stessa fine"
"A noi l'MPLS non CE n'teressa...mejo se usamo il FlexLink"
"Spostiamo il Livello 3 della Vlan dal Core al Service Edge ma senza modificare il RUTING..."
"Ma sul 3650 a 4 porte si può fare lo stAcK?"
"Noi usiamo quel coso lì...che maschera gli IPPPI'...capito no?"
"Forse non hai capito...puoi risolvere il problema usando le sub-vlan"

Cisco CCNP, CCDP Certified
mmarangon61
Cisco fan
Messaggi: 34
Iscritto il: dom 28 ott , 2007 1:21 am

E' un fatto di principio. Posso anche usare il Netgear ma prima voglio far funzionare il Cisco. Ne va della mia curiosità scientifica :-) Grazie :-(

match access-group 101
match protocol http
class-map type inspect match-all sdm-nat-user-protocol--2-1
match access-group 105
match protocol user-protocol--2
class-map type inspect match-all sdm-nat-user-protocol--1-1
match access-group 103
match protocol user-protocol--1
class-map type inspect match-any Cisco
match protocol clp
match protocol cisco-net-mgmt
match protocol cisco-sys
match protocol cisco-tna
match protocol cisco-fna
match protocol cisco-tdp
match protocol cisco-svcs
match protocol stun
match protocol tr-rsrb
class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-1
match class-map Cisco
match access-group name mario
class-map type inspect match-all sdm-nat-imap-1
match access-group 102
match protocol imap
class-map type inspect match-any sdm-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-insp-traffic
match class-map sdm-cls-insp-traffic
class-map type inspect match-any sdm-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-icmp-access
match class-map sdm-cls-icmp-access
class-map type inspect match-all sdm-invalid-src
match access-group 100
class-map type inspect match-all sdm-protocol-http
match protocol http
class-map type inspect match-all sdm-nat-https-1
match access-group 104
match protocol https
!
!
policy-map type inspect sdm-permit-icmpreply
class type inspect sdm-icmp-access
inspect
class class-default
pass
policy-map type inspect sdm-pol-NATOutsideToInside-1
class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-1
inspect
class type inspect sdm-nat-http-1
inspect
class type inspect sdm-nat-imap-1
inspect
class type inspect sdm-nat-user-protocol--1-1
inspect
class type inspect sdm-nat-https-1
inspect
class type inspect sdm-nat-user-protocol--2-1
inspect
class type inspect sdm-nat-user-protocol--3-1
inspect
class type inspect sdm-nat-user-protocol--4-1
inspect
class type inspect sdm-nat-user-protocol--5-1
inspect
class class-default
policy-map type inspect sdm-inspect
class type inspect sdm-invalid-src
drop log
class type inspect sdm-insp-traffic
inspect
class type inspect sdm-protocol-http
inspect
class class-default
policy-map type inspect sdm-permit
class class-default
!
zone security out-zone
zone security in-zone
zone-pair security sdm-zp-self-out source self destination out-zone
service-policy type inspect sdm-permit-icmpreply
zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone
service-policy type inspect sdm-pol-NATOutsideToInside-1
zone-pair security sdm-zp-out-self source out-zone destination self
service-policy type inspect sdm-permit
zone-pair security sdm-zp-in-out source in-zone destination out-zone
service-policy type inspect sdm-inspect
!
!
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
description $ES_WAN$$FW_OUTSIDE$
no snmp trap link-status
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 192.168.2.2 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip tcp adjust-mss 1452
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip virtual-reassembly
zone-member security out-zone
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap pap callin
ppp chap hostname [email protected]
ppp chap password 7 141A4B1C1F152D
ppp pap sent-username [email protected] password 7 0309021C151E26
!
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat translation timeout 900
ip nat translation tcp-timeout 900
ip nat translation udp-timeout 600
ip nat translation finrst-timeout 300
ip nat translation syn-timeout 120
ip nat translation dns-timeout 300
ip nat translation icmp-timeout 120
ip nat translation max-entries 8192
ip nat inside source static tcp 192.168.2.3 80 interface Dialer0 80
ip nat inside source static tcp 192.168.2.3 143 interface Dialer0 143
ip nat inside source static tcp 192.168.2.3 587 interface Dialer0 587
ip nat inside source static tcp 192.168.2.3 443 interface Dialer0 443
ip nat inside source static tcp 192.168.2.3 4662 interface Dialer0 4662
ip nat inside source static udp 192.168.2.3 4672 interface Dialer0 4672
ip nat inside source static tcp 192.168.2.3 6881 interface Dialer0 6881
ip nat inside source static udp 192.168.2.3 4444 interface Dialer0 4444
ip nat inside source list 1 interface Dialer0 overload
!
ip access-list extended mario
remark SDM_ACL Category=128
permit ip any any
!
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.2.0 0.0.0.255
access-list 100 remark SDM_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 101 remark SDM_ACL Category=0
access-list 101 permit ip any host 192.168.2.3
access-list 102 remark SDM_ACL Category=0
access-list 102 permit ip any host 192.168.2.3
access-list 103 remark SDM_ACL Category=0
access-list 103 permit ip any host 192.168.2.3
access-list 104 remark SDM_ACL Category=0
access-list 104 permit ip any host 192.168.2.3
access-list 105 remark SDM_ACL Category=0
access-list 105 permit ip any host 192.168.2.3
access-list 106 remark SDM_ACL Category=0
access-list 106 permit ip any host 192.168.2.3
access-list 107 remark SDM_ACL Category=0
access-list 107 permit ip any host 192.168.2.3
access-list 108 remark SDM_ACL Category=0
access-list 108 permit ip any host 192.168.2.3
dialer-list 1 protocol ip permit
no cdp run
!
!
!
control-plane
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
no modem enable
line aux 0
line vty 0 4
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000

!
webvpn cef
end
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!

User Access Verification

Username: mario
Password:
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------

yourname#sh dsl int
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.5 (ADSL2+) Annex A
ITU STD NUM: 0x03 0x2
Chip Vendor ID: 'STMI' 'GSPN'
Chip Vendor Specific: 0x0000 0x0010
Chip Vendor Country: 0x0F 0xFF
Modem Vendor ID: 'CSCO' 'GSPN'
Modem Vendor Specific: 0x0000 0x1000
Modem Vendor Country: 0xB5 0xFF
Serial Number Near: FHK113517B4
Serial Number Far:
Modem VersChip ID: C196 (0)
DFE BOM: DFE3.0 Annex A (1)
Chip ID: C196 (0)
DFE BOM: DFE3.0 Annex A (1)
Capacity Used: 97% 92%
Noise Margin: 6.5 dB 12.5 dB
Output Power: 20.5 dBm 12.5 dBm
Attenuation: 34.0 dB 15.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0xA3
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 8306 (0 spurious)
PHY Access Err: 0
Activations: 1
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: init_AMR-4.0.003.bin
Operation FW: AMR-4.0.003.bin
FW Source: external
FW Version: 4.0.3

DS Channel1 DS Channel0 US Channel1 US Channel0
Speed (kbps): 0 16384 0 1020
Cells: 0 209062 0 993542
Reed-Solomon EC: 0 120 0 0
CRC Errors: 0 51 0 0
Header Errors: 0 40 0 0
Total BER: 0E-0 3665E-9
Leakage Average BER: 0E-0 3665E-9
Interleave Delay: 0 17 0 5
ATU-R (DS) ATU-C (US)
Bitswap: enabled enabled
Bitswap success: 0 0
Bitswap failure: 0 0

yourname#
Rispondi