Ciao, su un cisco 877W con queste caratteristiche:
MegacineSP#sh ver
Cisco IOS Software, C870 Software (C870-ADVSECURITYK9-M), Version 12.4(6)T, RELE
ASE SOFTWARE (fc1)
...
Compiled Thu 23-Feb-06 04:00 by ccai
ROM: System Bootstrap, Version 12.3(8r)YI2, RELEASE SOFTWARE
...
System image file is "flash:c870-advsecurityk9-mz.124-6.T.bin"
...
Cisco 877W (MPC8272) processor (revision 0x200) with 118784K/12288K bytes of memory.
Processor board ID FCZ10152119
MPC8272 CPU Rev: Part Number 0xC, Mask Number 0x10
4 FastEthernet interfaces
1 ATM interface
1 802.11 Radio
128K bytes of non-volatile configuration memory.
24576K bytes of processor board System flash (Intel Strataflash)
Configuration register is 0x2102
e con questo firmware:
MegacineSP# sh dsl int atm0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.1 (G.DMT) Annex A
ITU STD NUM: 0x03 0x1
Vendor ID: 'STMI' 'ALCB'
Vendor Specific: 0x0000 0x0000
Vendor Country: 0x0F 0x0F
Capacity Used: 91% 76%
Noise Margin: 12.0 dB 19.0 dB
Output Power: 16.5 dBm 12.0 dBm
Attenuation: 12.0 dB 6.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0xDA
Watchdog Resets: 1
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 65142 (0 spurious)
PHY Access Err: 0
Activations: 13
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: embedded
Operation FW: embedded
FW Version: 2.5.42
...
Secondo voi ci posso mettere senza problemi la IOS:
c870-advipservicesk9-mz.124-15.T3.bin
la IOS version 12.5(15)T3?
giusto xchè voglio fare una DMVPN togliendo la classica L2L.. e ho bisogno di questa IOS
Gazie
IOS per Cisco 877W
Moderatore: Federico.Lagni
- micky
- Cisco fan
- Messaggi: 38
- Iscritto il: mer 30 apr , 2008 5:37 pm
- Località: La Spezia
- Contatta:
- Helix
- Messianic Network master
- Messaggi: 1175
- Iscritto il: mar 04 dic , 2007 6:45 pm
- Località: Frosinone
- Contatta:
L'ultima dovrebbe essere questa:
c870-advipservicesk9-mz.124-15.T4.bin
rilasciata il 14-MAR-2008
...come memoria siamo: 128/28 quindi dovresti farcela cancellando quella vecchia...(fai un backup!!!)
c870-advipservicesk9-mz.124-15.T4.bin
rilasciata il 14-MAR-2008
...come memoria siamo: 128/28 quindi dovresti farcela cancellando quella vecchia...(fai un backup!!!)
---
Ciao, Leonardo
"Guarda che il VSS è migliore dell' MPLS"
"Io amo le rotte statiche e non mi fido dei protocolli di RUTING"
"Io ho lavorato per Telecom...li è tutto Layer 2 e tutto RUTING statico"
"L'MPLS VPN è come l' ATM e farà la sua stessa fine"
"A noi l'MPLS non CE n'teressa...mejo se usamo il FlexLink"
"Spostiamo il Livello 3 della Vlan dal Core al Service Edge ma senza modificare il RUTING..."
"Ma sul 3650 a 4 porte si può fare lo stAcK?"
"Noi usiamo quel coso lì...che maschera gli IPPPI'...capito no?"
"Forse non hai capito...puoi risolvere il problema usando le sub-vlan"
Cisco CCNP, CCDP Certified
Ciao, Leonardo
"Guarda che il VSS è migliore dell' MPLS"
"Io amo le rotte statiche e non mi fido dei protocolli di RUTING"
"Io ho lavorato per Telecom...li è tutto Layer 2 e tutto RUTING statico"
"L'MPLS VPN è come l' ATM e farà la sua stessa fine"
"A noi l'MPLS non CE n'teressa...mejo se usamo il FlexLink"
"Spostiamo il Livello 3 della Vlan dal Core al Service Edge ma senza modificare il RUTING..."
"Ma sul 3650 a 4 porte si può fare lo stAcK?"
"Noi usiamo quel coso lì...che maschera gli IPPPI'...capito no?"
"Forse non hai capito...puoi risolvere il problema usando le sub-vlan"
Cisco CCNP, CCDP Certified
- micky
- Cisco fan
- Messaggi: 38
- Iscritto il: mer 30 apr , 2008 5:37 pm
- Località: La Spezia
- Contatta:
Si grazie.. la T4 sto aspettando di beccarla da qualche parte..Helix ha scritto:L'ultima dovrebbe essere questa:
c870-advipservicesk9-mz.124-15.T4.bin
rilasciata il 14-MAR-2008
...come memoria siamo: 128/28 quindi dovresti farcela cancellando quella vecchia...(fai un backup!!!)

per ora o solo a T3.. e la memoria ci sto giusto giusto ma ci sto..
Il backup l'ho già fatto, ora cancello la la vecchia e carico la nuova..
Ciao e grazie
Mik
- micky
- Cisco fan
- Messaggi: 38
- Iscritto il: mer 30 apr , 2008 5:37 pm
- Località: La Spezia
- Contatta:
Ciaokeycien ha scritto:ciao micky, ho da poco preso, giorni, un 877w con 24mega di flash e vorrei cambiare la IOS e il firmware mi puoi dare una mano?
grazie
p.s. ios 12.4(4)T8
L'ultima IOS è la:
c870-advipservicesk9-mz.124-15.T4.bin
rilasciata il 14-MAR-2008
che ti devi procurare da qualche parte.. dovresti essere certificato cisco per averla ma da quello che immagino sarà meglio che la scarichi da qualche parte.. tipo emule

Poi accedia al router e con il comando:
sh falsh
vedi quanta memoria hai libera e fai bene i conti (la nuova IOS è circa 18.3 MB).
Poi cancelli la vecchia IOS con il comando:
del c870-XXXXXXXXXXXXX.bin
tramite TFTP carichi la nuova con il comando:
copy tftp flash
poi un bel:
reload
e il gioco è fatto
PS: fai un backup dell'attuale IOS e della configurazione sul tuo pc prima con i comandi:
copy flash tftp (selezionando il file c870-xxxxxx.bin)
copy startup-config tftp
copy running-config tftp
E magari leggi qualcosa qui:
http://www.areanetworking.it/index_docs ... sco_e_TFTP
Spero di esserti stato di aiuto..
Ciao
Mik
-
- Cisco fan
- Messaggi: 45
- Iscritto il: ven 22 feb , 2008 12:50 am
il firmware per il modulo adsl2+ non l'aggiorni?
guarda qui:
http://www.ciscoforums.it/viewtopic.php?t=4137
io ho il tuo stesso firmware adsl2+ e randomicamente mi si disconnette.
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
User Access Verification
Username: ADMIN
Password:
% Authentication failed
Username: ADMIN
Password:
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
-----------------------------------------------------------------------
yourname#sh dsl int atm0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.5 (ADSL2+) Annex A
ITU STD NUM: 0x03 0x2
Chip Vendor ID: 'STMI' 'BDCM'
Chip Vendor Specific: 0x0000 0x6199
Chip Vendor Country: 0x0F 0xB5
Modem Vendor ID: 'CSCO' ' '
Modem Vendor Specific: 0x0000 0x0000
Modem Vendor Country: 0xB5 0x00
Serial Number Near: FCZ121014M6
Serial Number Far:
Modem Version Near: 12.4(4)T8
Modem Version Far:
Capacity Used: 48% 100%
Noise Margin: 20.5 dB 23.0 dB
Output Power: 20.5 dBm 12.0 dBm
Attenuation: 33.0 dB 12.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0x34
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 7668 (0 spurious)
PHY Access Err: 0
Activations: 2
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: embedded
Operation FW: embedded
FW Version: 2.542
DS Channel1 DS Channel0 US Channel1 US Channel0
Speed (kbps): 0 7993 0 508
Cells: 0 517712 0 2152773
Reed-Solomon EC: 0 0 0 0
CRC Errors: 0 5 0 0
Header Errors: 0 2 0 0
Interleave Delay: 0 0 0 0
LOM Monitoring : Disabled
DMT Bits Per Bin
000: 0 0 0 0 0 0 0 0 4 5 5 5 6 7 7 7
010: 7 7 7 7 8 7 7 7 6 6 6 6 5 5 5 4
020: 0 0 0 0 2 2 2 2 4 5 4 6 6 7 5 7
030: 7 8 8 8 8 8 8 8 9 9 9 7 9 9 9 9
040: 9 9 9 9 9 9 9 9 9 9 2 9 9 9 9 9
050: 9 9 9 7 7 9 9 9 8 9 9 8 9 9 8 8
060: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
070: 8 8 8 8 8 8 8 8 8 7 7 8 8 7 7 7
080: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
090: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
0A0: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 5
0B0: 7 7 7 7 7 5 7 7 5 7 7 7 6 5 6 5
0C0: 6 7 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0D0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0E0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0F0: 6 6 7 6 7 7 7 7 7 7 7 7 7 7 8 8
100: 7 8 8 8 7 8 7 8 8 8 8 8 8 7 8 7
110: 7 7 7 8 7 8 6 7 7 7 7 5 7 7 6 6
120: 6 6 6 7 4 6 6 6 6 4 6 4 5 4 4 5
130: 4 5 4 5 4 4 4 4 5 4 5 4 4 4 4 5
140: 4 5 4 4 5 4 5 4 5 4 4 4 0 5 4 6
150: 5 6 6 6 6 5 6 5 5 5 5 5 4 5 4 5
160: 4 4 4 4 4 2 4 4 4 4 2 4 2 4 2 2
170: 2 2 3 2 2 2 2 2 2 2 2 2 2 2 2 2
180: 2 1 2 0 2 2 2 1 0 2 0 0 0 0 0 0
190: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1A0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1B0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1C0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1D0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1E0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1F0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
DSL: Training log buffer capability is not enabled
yourname#
guarda qui:
http://www.ciscoforums.it/viewtopic.php?t=4137
io ho il tuo stesso firmware adsl2+ e randomicamente mi si disconnette.
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
User Access Verification
Username: ADMIN
Password:
% Authentication failed
Username: ADMIN
Password:
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
-----------------------------------------------------------------------
yourname#sh dsl int atm0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.5 (ADSL2+) Annex A
ITU STD NUM: 0x03 0x2
Chip Vendor ID: 'STMI' 'BDCM'
Chip Vendor Specific: 0x0000 0x6199
Chip Vendor Country: 0x0F 0xB5
Modem Vendor ID: 'CSCO' ' '
Modem Vendor Specific: 0x0000 0x0000
Modem Vendor Country: 0xB5 0x00
Serial Number Near: FCZ121014M6
Serial Number Far:
Modem Version Near: 12.4(4)T8
Modem Version Far:
Capacity Used: 48% 100%
Noise Margin: 20.5 dB 23.0 dB
Output Power: 20.5 dBm 12.0 dBm
Attenuation: 33.0 dB 12.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0x34
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 7668 (0 spurious)
PHY Access Err: 0
Activations: 2
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: embedded
Operation FW: embedded
FW Version: 2.542
DS Channel1 DS Channel0 US Channel1 US Channel0
Speed (kbps): 0 7993 0 508
Cells: 0 517712 0 2152773
Reed-Solomon EC: 0 0 0 0
CRC Errors: 0 5 0 0
Header Errors: 0 2 0 0
Interleave Delay: 0 0 0 0
LOM Monitoring : Disabled
DMT Bits Per Bin
000: 0 0 0 0 0 0 0 0 4 5 5 5 6 7 7 7
010: 7 7 7 7 8 7 7 7 6 6 6 6 5 5 5 4
020: 0 0 0 0 2 2 2 2 4 5 4 6 6 7 5 7
030: 7 8 8 8 8 8 8 8 9 9 9 7 9 9 9 9
040: 9 9 9 9 9 9 9 9 9 9 2 9 9 9 9 9
050: 9 9 9 7 7 9 9 9 8 9 9 8 9 9 8 8
060: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
070: 8 8 8 8 8 8 8 8 8 7 7 8 8 7 7 7
080: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
090: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
0A0: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 5
0B0: 7 7 7 7 7 5 7 7 5 7 7 7 6 5 6 5
0C0: 6 7 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0D0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0E0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0F0: 6 6 7 6 7 7 7 7 7 7 7 7 7 7 8 8
100: 7 8 8 8 7 8 7 8 8 8 8 8 8 7 8 7
110: 7 7 7 8 7 8 6 7 7 7 7 5 7 7 6 6
120: 6 6 6 7 4 6 6 6 6 4 6 4 5 4 4 5
130: 4 5 4 5 4 4 4 4 5 4 5 4 4 4 4 5
140: 4 5 4 4 5 4 5 4 5 4 4 4 0 5 4 6
150: 5 6 6 6 6 5 6 5 5 5 5 5 4 5 4 5
160: 4 4 4 4 4 2 4 4 4 4 2 4 2 4 2 2
170: 2 2 3 2 2 2 2 2 2 2 2 2 2 2 2 2
180: 2 1 2 0 2 2 2 1 0 2 0 0 0 0 0 0
190: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1A0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1B0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1C0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1D0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1E0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1F0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
DSL: Training log buffer capability is not enabled
yourname#
- micky
- Cisco fan
- Messaggi: 38
- Iscritto il: mer 30 apr , 2008 5:37 pm
- Località: La Spezia
- Contatta:
Si si.. aggirona pure il firmware.. male non fa
anche se dovrebbe essere "embedded" (come dicono gli inglesi!!) quindi integrato nel IOS
Quale hai caricato di firmware il 3.0.33 o il 3.0.10??
Io con la 12.4(15)T3 mi trovo benissimo.. e ho pure messo su una DMVPN hub and spokes... fighissimo
Ciao
Mik

Quale hai caricato di firmware il 3.0.33 o il 3.0.10??
Io con la 12.4(15)T3 mi trovo benissimo.. e ho pure messo su una DMVPN hub and spokes... fighissimo

Ciao
Mik
-
- Cisco fan
- Messaggi: 45
- Iscritto il: ven 22 feb , 2008 12:50 am
anch'io ho messo la 15t3 scaricata dal mulo, e infatti il firmware adsl è diventato 3.0.14
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
User Access Verification
Username: ADMIN
Password:
% Authentication failed
Username: ADMIN
Password:
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
-----------------------------------------------------------------------
yourname#sh dsl int atm0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.5 (ADSL2+) Annex A
ITU STD NUM: 0x03 0x2
Chip Vendor ID: 'STMI' 'BDCM'
Chip Vendor Specific: 0x0000 0x6199
Chip Vendor Country: 0x0F 0xB5
Modem Vendor ID: 'CSCO' ' '
Modem Vendor Specific: 0x0000 0x0000
Modem Vendor Country: 0xB5 0x00
Serial Number Near: FCZ121014M6
Serial Number Far:
Modem VerChip ID: C196 (0)
DFE BOM: DFE3.0 Annex A (1)
Capacity Used: 49% 100%
Noise Margin: 21.5 dB 27.0 dB
Output Power: 20.0 dBm 12.0 dBm
Attenuation: 25.0 dB 12.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0x11
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 49494 (0 spurious)
PHY Access Err: 0
Activations: 1
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: init_AMR-3.0.014_no_bist.bin
Operation FW: AMR-3.0.014.bin
FW Source: embedded
FW Version: 3.0.14
DS Channel1 DS Channel0 US Channel1 US Channel0
Speed (kbps): 0 8000 0 508
Cells: 0 608332 0 11018520
Reed-Solomon EC: 0 0 0 0
CRC Errors: 0 23 0 0
Header Errors: 0 8 0 0
Total BER: 0E-0 2152E-11
Leakage Average BER: 0E-0 3168E-11
Interleave Delay: 0 56 0 32
ATU-R (DS) ATU-C (US)
Bitswap: enabled enabled
Bitswap success: 0 0
Bitswap failure: 0 0
LOM Monitoring : Disabled
DMT Bits Per Bin
000: 0 0 0 0 0 0 0 0 2 4 4 5 5 6 6 6
010: 6 7 7 7 7 8 8 8 8 7 7 7 6 6 5 4
020: 0 0 0 0 2 2 4 4 5 5 6 6 7 7 6 7
030: 7 7 8 8 8 8 8 8 8 8 8 8 8 8 8 8
040: 8 8 8 9 9 9 9 9 8 8 8 8 8 8 8 8
050: 8 8 7 7 7 8 8 7 7 8 7 7 7 8 7 7
060: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
070: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
080: 7 7 7 7 7 6 7 7 7 6 7 6 6 6 6 6
090: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0A0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0B0: 6 6 6 6 6 6 5 6 6 5 5 5 6 5 5 5
0C0: 5 6 6 5 5 5 5 5 5 5 5 5 5 5 5 5
0D0: 5 4 5 5 5 5 5 5 5 5 5 5 5 5 5 5
0E0: 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
0F0: 5 5 6 6 6 6 7 7 7 7 7 7 7 8 8 8
100: 9 2 8 8 8 8 8 8 8 8 8 8 8 8 8 8
110: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
120: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
130: 7 8 8 7 7 7 4 7 7 2 7 2 7 7 2 7
140: 2 7 2 7 7 2 7 7 7 2 6 4 0 5 2 6
150: 2 6 6 6 6 2 6 2 6 2 2 6 2 6 6 6
160: 2 2 6 5 6 5 6 5 2 4 5 5 5 5 2 5
170: 5 5 5 5 5 5 5 5 2 5 5 5 4 5 5 5
180: 4 4 4 4 2 4 4 2 0 2 0 4 0 0 2 0
190: 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1A0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1B0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1C0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1D0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1E0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1F0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
DSL: Training log buffer capability is not enable
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
User Access Verification
Username: ADMIN
Password:
% Authentication failed
Username: ADMIN
Password:
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
-----------------------------------------------------------------------
yourname#sh dsl int atm0
ATM0
Alcatel 20190 chipset information
ATU-R (DS) ATU-C (US)
Modem Status: Showtime (DMTDSL_SHOWTIME)
DSL Mode: ITU G.992.5 (ADSL2+) Annex A
ITU STD NUM: 0x03 0x2
Chip Vendor ID: 'STMI' 'BDCM'
Chip Vendor Specific: 0x0000 0x6199
Chip Vendor Country: 0x0F 0xB5
Modem Vendor ID: 'CSCO' ' '
Modem Vendor Specific: 0x0000 0x0000
Modem Vendor Country: 0xB5 0x00
Serial Number Near: FCZ121014M6
Serial Number Far:
Modem VerChip ID: C196 (0)
DFE BOM: DFE3.0 Annex A (1)
Capacity Used: 49% 100%
Noise Margin: 21.5 dB 27.0 dB
Output Power: 20.0 dBm 12.0 dBm
Attenuation: 25.0 dB 12.0 dB
Defect Status: None None
Last Fail Code: None
Watchdog Counter: 0x11
Watchdog Resets: 0
Selftest Result: 0x00
Subfunction: 0x00
Interrupts: 49494 (0 spurious)
PHY Access Err: 0
Activations: 1
LED Status: ON
LED On Time: 100
LED Off Time: 100
Init FW: init_AMR-3.0.014_no_bist.bin
Operation FW: AMR-3.0.014.bin
FW Source: embedded
FW Version: 3.0.14
DS Channel1 DS Channel0 US Channel1 US Channel0
Speed (kbps): 0 8000 0 508
Cells: 0 608332 0 11018520
Reed-Solomon EC: 0 0 0 0
CRC Errors: 0 23 0 0
Header Errors: 0 8 0 0
Total BER: 0E-0 2152E-11
Leakage Average BER: 0E-0 3168E-11
Interleave Delay: 0 56 0 32
ATU-R (DS) ATU-C (US)
Bitswap: enabled enabled
Bitswap success: 0 0
Bitswap failure: 0 0
LOM Monitoring : Disabled
DMT Bits Per Bin
000: 0 0 0 0 0 0 0 0 2 4 4 5 5 6 6 6
010: 6 7 7 7 7 8 8 8 8 7 7 7 6 6 5 4
020: 0 0 0 0 2 2 4 4 5 5 6 6 7 7 6 7
030: 7 7 8 8 8 8 8 8 8 8 8 8 8 8 8 8
040: 8 8 8 9 9 9 9 9 8 8 8 8 8 8 8 8
050: 8 8 7 7 7 8 8 7 7 8 7 7 7 8 7 7
060: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
070: 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
080: 7 7 7 7 7 6 7 7 7 6 7 6 6 6 6 6
090: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0A0: 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6 6
0B0: 6 6 6 6 6 6 5 6 6 5 5 5 6 5 5 5
0C0: 5 6 6 5 5 5 5 5 5 5 5 5 5 5 5 5
0D0: 5 4 5 5 5 5 5 5 5 5 5 5 5 5 5 5
0E0: 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
0F0: 5 5 6 6 6 6 7 7 7 7 7 7 7 8 8 8
100: 9 2 8 8 8 8 8 8 8 8 8 8 8 8 8 8
110: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
120: 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8
130: 7 8 8 7 7 7 4 7 7 2 7 2 7 7 2 7
140: 2 7 2 7 7 2 7 7 7 2 6 4 0 5 2 6
150: 2 6 6 6 6 2 6 2 6 2 2 6 2 6 6 6
160: 2 2 6 5 6 5 6 5 2 4 5 5 5 5 2 5
170: 5 5 5 5 5 5 5 5 2 5 5 5 4 5 5 5
180: 4 4 4 4 2 4 4 2 0 2 0 4 0 0 2 0
190: 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1A0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1B0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1C0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1D0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1E0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1F0: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
DSL: Training log buffer capability is not enable
-
- n00b
- Messaggi: 9
- Iscritto il: ven 02 mag , 2008 5:40 pm
Anch'io ho lo stesso router e ieri ho aggiornato a questa versione:micky ha scritto:Si si.. aggirona pure il firmware.. male non faanche se dovrebbe essere "embedded" (come dicono gli inglesi!!) quindi integrato nel IOS
Quale hai caricato di firmware il 3.0.33 o il 3.0.10??
Io con la 12.4(15)T3 mi trovo benissimo.. e ho pure messo su una DMVPN hub and spokes... fighissimo
Ciao
Mik
Cisco IOS Software, C870 Software (C870-ADVIPSERVICESK9-M), Version 12.4(15)T4, RELEASE SOFTWARE (fc2)
Cos'è la DMVPN hub and spokes? di che si tratta?
bye MoL0ToV
-
- Cisco fan
- Messaggi: 45
- Iscritto il: ven 22 feb , 2008 12:50 am
io ho imputtanato tutto, ho caricato una config con il wireless e il router non mi dava l'accesso perchè non mi richiedeva user e pass che sono richieste x la config. via telnet.
mi sono attaccato via hyperterminal ho cancellato la config caricata ma ora non lo pinga nemmeno più e nella fase di boot da hypert mi mostra tantissimi errori.
esiste un modo per formattare a basso livello la memoria flash in modo da cancellare tutto?
Mi potete indicare una guida per aggiornare ios di hypert.?
Mi potete indicare una guida per caricare una config. da hypert.?
In parole povere aiutat'm
Per Molotov: dove hai rimediato la 15T4?
Vi posto la config. che mi ha rovinato con user e pass., il mio attuale ios è il 15T3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
service sequence-numbers
no service dhcp
!
hostname 877W
!
logging buffered 10240 debugging
logging console critical
!
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2008 2:00 Oct 26 2008 3:00
!
!
ip subnet-zero
no ip source-route
ip domain-name HOMELAN
archive
path flash:config
write-memory
!
ip tcp selective-ack
ip tcp timestamp
no ip bootp server
no ip domain lookup
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp max-data 52428800
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall netshow
ip inspect name firewall rtsp
ip inspect name firewall pptp
ip inspect name firewall rtsp
ip inspect name firewall skinny
ip name-server 193.70.152.25
ip name-server 193.70.152.15
file verify auto
!
!
bridge irb
!
!
interface Dot11Radio0
no ip address
!
encryption mode ciphers tkip
!
ssid .
authentication open
authentication key-management wpa
guest-mode
wpa-psk ascii xxxxxxxxxxxxxxxxxxx
!
speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
no cdp enable
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Vlan1
no ip address
bridge-group 1
bridge-group 1 spanning-disabled
!
interface bvi1
ip address 192.168.1.1 255.255.255.0
ip access-group 102 in
ip nat inside
no ip directed-broadcast
exit
!
interface ATM0
dsl operating-mode auto
exit
!
interface ATM0.1 point-to-point
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
exit
!
interface Dialer0
ip address negotiated
ip inspect firewall out
ip access-group 101 in
no ip redirects
no ip unreachables
ip nat outside
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname xxxxxxxxxxxxxxxxx
ppp chap password xxxxxxxxxx
ppp pap sent-username xxxxxxxxx password xxxxxxx
ppp ipcp dns request
ppp ipcp route default
no cdp enable
exit
!
ip nat inside source list 1 interface Dialer0 overload
ip classless
no ip http server
!
!
line vty 0 4
access-class 2 in
exit
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
!
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
!
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 deny icmp any any echo
access-list 101 deny ip any any log
!
access-list 102 remark Traffic allowed to enter the router from the Ethernet
access-list 102 permit ip any host 192.168.1.1
access-list 102 deny ip any host 192.168.1.255
access-list 102 deny udp any any eq tftp log
access-list 102 deny ip any 0.0.0.0 0.255.255.255 log
access-list 102 deny ip any 10.0.0.0 0.255.255.255 log
access-list 102 deny ip any 127.0.0.0 0.255.255.255 log
access-list 102 deny ip any 169.254.0.0 0.0.255.255 log
access-list 102 deny ip any 172.16.0.0 0.15.255.255 log
access-list 102 deny ip any 192.0.2.0 0.0.0.255 log
access-list 102 deny ip any 192.168.0.0 0.0.255.255 log
access-list 102 deny ip any 198.18.0.0 0.1.255.255 log
access-list 102 deny udp any any eq 135 log
access-list 102 deny tcp any any eq 135 log
access-list 102 deny udp any any eq 137 log
access-list 102 deny udp any any eq 138 log
access-list 102 deny tcp any any eq 445 log
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip any host 255.255.255.255
access-list 102 deny ip any any log
!
bridge 1 route ip
dialer-list 1 protocol ip permit
banner motd |
Original config (c)IFM Ltd [email protected], prepared by /
You require authorisation to connect to this device.
If you are not authorised to connect to this device please disconnect now. If
you fail to disconnect you may be prosecuted under the Crimes Amendment
Act 2003 section 252 under New Zealand law.
|
!
interface FastEthernet0
no shutdown
exit
interface FastEthernet1
no shutdown
exit
interface FastEthernet2
no shutdown
exit
interface FastEthernet3
no shutdown
exit
interface vlan1
no shutdown
exit
interface ATM0
no shutdown
exit
interface Dot11Radio0
no shutdown
exit
interface bvi1
no shutdown
exit
crypto key generate rsa general-keys modulus 2048
mi sono attaccato via hyperterminal ho cancellato la config caricata ma ora non lo pinga nemmeno più e nella fase di boot da hypert mi mostra tantissimi errori.
esiste un modo per formattare a basso livello la memoria flash in modo da cancellare tutto?
Mi potete indicare una guida per aggiornare ios di hypert.?
Mi potete indicare una guida per caricare una config. da hypert.?
In parole povere aiutat'm

Per Molotov: dove hai rimediato la 15T4?
Vi posto la config. che mi ha rovinato con user e pass., il mio attuale ios è il 15T3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
service sequence-numbers
no service dhcp
!
hostname 877W
!
logging buffered 10240 debugging
logging console critical
!
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2008 2:00 Oct 26 2008 3:00
!
!
ip subnet-zero
no ip source-route
ip domain-name HOMELAN
archive
path flash:config
write-memory
!
ip tcp selective-ack
ip tcp timestamp
no ip bootp server
no ip domain lookup
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp max-data 52428800
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall netshow
ip inspect name firewall rtsp
ip inspect name firewall pptp
ip inspect name firewall rtsp
ip inspect name firewall skinny
ip name-server 193.70.152.25
ip name-server 193.70.152.15
file verify auto
!
!
bridge irb
!
!
interface Dot11Radio0
no ip address
!
encryption mode ciphers tkip
!
ssid .
authentication open
authentication key-management wpa
guest-mode
wpa-psk ascii xxxxxxxxxxxxxxxxxxx
!
speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
no cdp enable
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Vlan1
no ip address
bridge-group 1
bridge-group 1 spanning-disabled
!
interface bvi1
ip address 192.168.1.1 255.255.255.0
ip access-group 102 in
ip nat inside
no ip directed-broadcast
exit
!
interface ATM0
dsl operating-mode auto
exit
!
interface ATM0.1 point-to-point
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
exit
!
interface Dialer0
ip address negotiated
ip inspect firewall out
ip access-group 101 in
no ip redirects
no ip unreachables
ip nat outside
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname xxxxxxxxxxxxxxxxx
ppp chap password xxxxxxxxxx
ppp pap sent-username xxxxxxxxx password xxxxxxx
ppp ipcp dns request
ppp ipcp route default
no cdp enable
exit
!
ip nat inside source list 1 interface Dialer0 overload
ip classless
no ip http server
!
!
line vty 0 4
access-class 2 in
exit
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
!
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
!
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 deny icmp any any echo
access-list 101 deny ip any any log
!
access-list 102 remark Traffic allowed to enter the router from the Ethernet
access-list 102 permit ip any host 192.168.1.1
access-list 102 deny ip any host 192.168.1.255
access-list 102 deny udp any any eq tftp log
access-list 102 deny ip any 0.0.0.0 0.255.255.255 log
access-list 102 deny ip any 10.0.0.0 0.255.255.255 log
access-list 102 deny ip any 127.0.0.0 0.255.255.255 log
access-list 102 deny ip any 169.254.0.0 0.0.255.255 log
access-list 102 deny ip any 172.16.0.0 0.15.255.255 log
access-list 102 deny ip any 192.0.2.0 0.0.0.255 log
access-list 102 deny ip any 192.168.0.0 0.0.255.255 log
access-list 102 deny ip any 198.18.0.0 0.1.255.255 log
access-list 102 deny udp any any eq 135 log
access-list 102 deny tcp any any eq 135 log
access-list 102 deny udp any any eq 137 log
access-list 102 deny udp any any eq 138 log
access-list 102 deny tcp any any eq 445 log
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip any host 255.255.255.255
access-list 102 deny ip any any log
!
bridge 1 route ip
dialer-list 1 protocol ip permit
banner motd |
Original config (c)IFM Ltd [email protected], prepared by /
You require authorisation to connect to this device.
If you are not authorised to connect to this device please disconnect now. If
you fail to disconnect you may be prosecuted under the Crimes Amendment
Act 2003 section 252 under New Zealand law.
|
!
interface FastEthernet0
no shutdown
exit
interface FastEthernet1
no shutdown
exit
interface FastEthernet2
no shutdown
exit
interface FastEthernet3
no shutdown
exit
interface vlan1
no shutdown
exit
interface ATM0
no shutdown
exit
interface Dot11Radio0
no shutdown
exit
interface bvi1
no shutdown
exit
crypto key generate rsa general-keys modulus 2048
- micky
- Cisco fan
- Messaggi: 38
- Iscritto il: mer 30 apr , 2008 5:37 pm
- Località: La Spezia
- Contatta:
Dove hai trovato la 12.4(15)T4??MoL0ToV ha scritto:Anch'io ho lo stesso router e ieri ho aggiornato a questa versione:micky ha scritto:Si si.. aggirona pure il firmware.. male non faanche se dovrebbe essere "embedded" (come dicono gli inglesi!!) quindi integrato nel IOS
Quale hai caricato di firmware il 3.0.33 o il 3.0.10??
Io con la 12.4(15)T3 mi trovo benissimo.. e ho pure messo su una DMVPN hub and spokes... fighissimo
Ciao
Mik
Cisco IOS Software, C870 Software (C870-ADVIPSERVICESK9-M), Version 12.4(15)T4, RELEASE SOFTWARE (fc2)
Cos'è la DMVPN hub and spokes? di che si tratta?
bye MoL0ToV

La DMVPN è una VPN dinamica tra più router, uno fa da HUB (il master) e gli altri si collegano al lui (SPOKE) e il router hub poi permette anche ai vari spoke di scambiare dati direttamente tra di loro senza doverli mandare attraverso l'hub.
Ci sono molti vantaggi.. tipo che i router spoke non necessitano nemmeno di un IP statico

Datti una lettura a questo articolo.. è molto esplicativo:
http://www.cisco.com/en/US/docs/ios/12_ ... reips.html
Ciao
Mik
-
- n00b
- Messaggi: 9
- Iscritto il: ven 02 mag , 2008 5:40 pm
l'ho scaricata dal sito cisco.
Unica cosa sul sito non sono riuscito a capire qual'era l'ultima versione del firmware della wic adsl. dove si può controllare??
Ho preso questo cisco per fare un pò di esperimenti, in pratica vorrei usare aaa e radius come autentication proxy e tirare su una connessione ppp cifrata fra il client e il cisco per la navigazione internet (limitando così l'accesso a internet solo agli utenti autorizzati.
Qualcuno ha mai provato una configurazione simile?
bye MoL0ToV
Unica cosa sul sito non sono riuscito a capire qual'era l'ultima versione del firmware della wic adsl. dove si può controllare??
Ho preso questo cisco per fare un pò di esperimenti, in pratica vorrei usare aaa e radius come autentication proxy e tirare su una connessione ppp cifrata fra il client e il cisco per la navigazione internet (limitando così l'accesso a internet solo agli utenti autorizzati.
Qualcuno ha mai provato una configurazione simile?
bye MoL0ToV