if you go to the 7200 series router section on the cisco support website - they tell you how to do this...just a few clicks away.
Worse case you screw it up and have the router down without following cisco's documentation.
Need to break down the testing at the customer location.
a.1) Is this a T1? If so, make a T1 loopback plug and put in DSU - does the interface go UP/UP? It should if the hardware isn't having any problems.
a.2) Test the extended dmarc from the smart jack to the CSU to ensure pin-outs are...
download tftpd (search google) and setup the syslog feature. Then configure your "trap host" and then "log trap debug" will send all messages to the syslog system. You can then review the log file at your leisure when it crashes.
looks good. to get the firewall working just need to setup "ip inspect" commands and assign it to the outside interface.
int fa0/0
ip inspect FW out
also create an access-list to deny outside traffic to enter the outside interface, IE:
access-list 101 deny ip 192.168.1.0 0.0.0.255 any...
Check out the email server configuration example from Cisco. It doesn't NAT inside to DMZ traffic - it uses the actual IP.
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00800941c8.shtml
Otherwise the default way of doing this WILL nat traffic from...
Does this happen when sending to a distribution list or sending a single email to another user?
If it happens to be a distribution list - your expansion server settings are probably pointing to the server that is no longer online. Change the expansion server setting to a server that is still...
Also MXLogic.com (hosted solution which is excellent) - generally cheaper than Postini. Let me know if you need a referall and hopefully better pricing.
HOWEVER..that can't be the only solution. We have to run AV inside exchange to protect the store - we use McAfee GroupShield for exchange...
No...not all routers support DMVPN. You need to find a version of the IOS that supports DMVPN which will also tell you the router/parameters needed to run it. You can find this out on http://www.cisco.com/public/sw-center/index.shtml
You will need a logon from Cisco to find the features/IOS...
even though you have this working I'm confused as to why you need an access-list and nat going outside on the vlan2 interface. Seems like you are trying to prevent access in reverse? If you want two way access - your configuration is too complicated. Get rid of the ACL and change nat outside to...
Cisco 1841 router should work really good for this. The bigger question is which IOS to use - since it appears to be a firewall start with Advanced IP Services IOS and max out the memory and flash.
Have fun...
VinceWhirlWind is RIGHT! Traceroute sends back packets with the trace info displayed. firewalls tend to block those packets. Now if the trace timed out beyond that firewall then I'd be concerned but I can turn off these packets on a series of routers in a string and demo that behavior.
I would check again with the vendor on the speed issue. If you can get everything working (seems like it is) then either the vendor doesn't have it rate limited to 3MB or one of your routers interfaces in the path may be rate limited or misconfigured. Sounds like the interfaces connected to the...
Can u RDP or HTTP across and that works ok?
Many times you can ping all over the place but to get a simple text message on http webserver to pass won't happen.
If this works then ip fragmentation is not a problem. If this does not work then ip fragmentation would be the first place to start...
Interesting...there is now way to tell if the problem is from the gateway to the shaw modem from the information posted.
First, ask your ISP if they are experiencing any performance problems. Second, logon to your Firewall and find out the top 10 traffic users during the slowness. IE: With a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.