if you go to the 7200 series router section on the cisco support website - they tell you how to do this...just a few clicks away.
Worse case you screw it up and have the router down without following cisco's documentation.
Need to break down the testing at the customer location.
a.1) Is this a T1? If so, make a T1 loopback plug and put in DSU - does the interface go UP/UP? It should if the hardware isn't having any problems.
a.2) Test the extended dmarc from the smart jack to the CSU to ensure pin-outs are...
download tftpd (search google) and setup the syslog feature. Then configure your "trap host" and then "log trap debug" will send all messages to the syslog system. You can then review the log file at your leisure when it crashes.
looks good. to get the firewall working just need to setup "ip inspect" commands and assign it to the outside interface.
int fa0/0
ip inspect FW out
also create an access-list to deny outside traffic to enter the outside interface, IE:
access-list 101 deny ip 192.168.1.0 0.0.0.255 any...
Check out the email server configuration example from Cisco. It doesn't NAT inside to DMZ traffic - it uses the actual IP.
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00800941c8.shtml
Otherwise the default way of doing this WILL nat traffic from...
Does this happen when sending to a distribution list or sending a single email to another user?
If it happens to be a distribution list - your expansion server settings are probably pointing to the server that is no longer online. Change the expansion server setting to a server that is still...
Also MXLogic.com (hosted solution which is excellent) - generally cheaper than Postini. Let me know if you need a referall and hopefully better pricing.
HOWEVER..that can't be the only solution. We have to run AV inside exchange to protect the store - we use McAfee GroupShield for exchange...
No...not all routers support DMVPN. You need to find a version of the IOS that supports DMVPN which will also tell you the router/parameters needed to run it. You can find this out on http://www.cisco.com/public/sw-center/index.shtml
You will need a logon from Cisco to find the features/IOS...
even though you have this working I'm confused as to why you need an access-list and nat going outside on the vlan2 interface. Seems like you are trying to prevent access in reverse? If you want two way access - your configuration is too complicated. Get rid of the ACL and change nat outside to...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.