4.1 cluster with all three servers setup as MOH servers. MOH files work fine - I can put people on hold and it plays stored sound files no problem.
Added a USB iMic with audio and configured a fixed audio source in CM. I made sure the name of the device was spelled perfectly. As far as i can...
I guess propagation was the wrong term, though I know for a fact the MAC will show up on the CORE CAM table (I tested this myself yesterday) in the exact situation listed above - this was counter to what I was expecting. I thought like you described - CAM is local to the switch and unless...
PC-->sw1-->sw2-->CORE<--SW3<--SW4
If a new PC plugs into sw1 with a static IP NOT in the correct VLAN (can't do any layer 3 communication) will it's MAC show up in the CAM tables of each switch (sw1 - sw4), just sw1 or what? I know this all happens on layer 2, but it the PC can't do layer 3...
A couple of quick qauestions before I head off to class.
I am not sure what you are saying here. In one sentence you say you cannot ping the hosts behind the Juniper, but then several sentences later you say you can ping hosts behind the Juniper, just not the Juniper internet interface itself...
So, just point out how much of a moron I am (and for those who may run across this thread in the future), we are blocking that traffic from going out the internet with the 101 access-list, then permitting it to cross the VPN using 102. Correct?
This worked great by the way. Thanks a lot you guys.
I will post the PIX config tomorrow AM. Even if the conduits on the PIX didn't allow for those other internal subnets to pass, wouldn't I see my attempts to those subnets from the remote site blocked at the firewall (and wouldn't I see those attempts try to go across the VPN and not the...
I originally posted this over at the VPN forum, but did not receive much help so I am trying here.
Remote clinic - Cisco 831 router - 192.168.180.0 internal subnet
Local office - Cisco PIX firewall - 192.168.120.0, 192.168.140.0, 192.168.100.0, and 192.168.160.0 internal subnets
L2L IPSEC...
Remote clinic - Cisco 831 router - 192.168.180.0 internal subnet
Local office - Cisco PIX firewall - 192.168.120.0, 192.168.140.0, 192.168.100.0, and 192.168.160.0 internal subnets
L2L IPSEC VPN tunnel works great, but the 192.168.180.0 users on the remote clinic (on the 192.168.180.0 subnet)...
If an internal caller creates a conference (calls two parties, joins them all to a conference) it works fine.
If an external caller calls an internal caller, and then the internal caller tries to join a third party to a conference (doesn't matter if it is an external call or an outside call)...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.