Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations John Tel on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cisco 1841 T1 Assistance

Status
Not open for further replies.

mitelritz

IS-IT--Management
Mar 28, 2007
128
US
trying to get the T1 internet to come in on the S0/0/0 on a 1841 router With a 16 static IP block from the ISP


im assuming using a ppp for the encap or something and point that to like

int fa 0/1.200
or maybe something like using the

ip unnumbered fastethernet0/1.200 command

But just checking


and the other one would be the

int fa 0/1.100
ip address 192.168.11.3 255.255.255.0
but vlaning is set up some what on the hp switch too so im not sure how i can accomplish this



for the sake of security ive changed the static address

AmtecLV1841#sh run
Building configuration...

Current configuration : 14212 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime
service timestamps log datetime localtime
service password-encryption
!
hostname AmtecLV1841
!
boot-start-marker
boot system flash
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 5
logging buffered 51200 debugging
logging console critical
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication login User_Database local
aaa authorization network MGMT local
!
aaa session-id common
clock timezone PST -8
no ip source-route
ip cef
!
!
ip inspect name Firewall cuseeme
ip inspect name Firewall ftp
ip inspect name Firewall h323
ip inspect name Firewall netshow
ip inspect name Firewall rcmd
ip inspect name Firewall realaudio
ip inspect name Firewall rtsp
ip inspect name Firewall sqlnet
ip inspect name Firewall streamworks
ip inspect name Firewall tftp
ip inspect name Firewall tcp
ip inspect name Firewall udp
ip inspect name Firewall vdolive
ip inspect name Firewall icmp
ip inspect name Firewall esmtp
ip tcp path-mtu-discovery
ip telnet source-interface FastEthernet0/1
!
!
no ip bootp server
ip domain name amtec.local
ip name-server 24.17.154.10
ip name-server 4.2.2.2
ip name-server 4.2.2.4
!

!
!
class-map match-any IP_Node
match access-group 104
!
!
policy-map VoIP_Priority
class IP_Node
set ip dscp ef
priority 256
class class-default
fair-queue
random-detect
policy-map QoS
class class-default
shape average 500000 5000 0
service-policy VoIP_Priority
!!
!
interface Loopback0
description Virtual NAT Interface
ip address 1.1.1.1 255.255.255.252
!
interface Null0
no ip unreachables
!
interface FastEthernet0/0
description Connected to TelePacific Internet$FW_OUTSIDE$
ip address 241.80.156.46 255.255.255.128
ip access-group 103 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
ip directed-broadcast
ip inspect Firewall out
ip nat outside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
no cdp enable
crypto map VPN_Tunnel
crypto ipsec fragmentation before-encryption
!
interface FastEthernet0/1
description $FW_INSIDE$
ip address 192.168.11.3 255.255.255.0
ip access-group 102 in
no ip redirects
no ip unreachables
ip directed-broadcast
ip nat inside
ip virtual-reassembly
ip route-cache flow
ip policy route-map NAT_Filter
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
no ip redirects
no ip unreachables
encapsulation ppp
service-module t1 timeslots 1-24
!
ip local pool VPN_IPs 192.168.255.1 192.168.255.10
ip default-gateway 241.80.156.1
ip forward-protocol udp netbios-ss
ip route 0.0.0.0 0.0.0.0 241.80.156.1
ip route 192.168.14.0 255.255.255.0 192.168.11.2
!
ip http server
ip http authentication local
ip http secure-server
ip nat inside source route-map Nat interface FastEthernet0/0 overload
ip nat inside source static tcp 192.168.11.33 20 241.80.156.46 20 extendable
ip nat inside source static tcp 192.168.11.33 21 241.80.156.46 21 extendable
ip nat inside source static tcp 192.168.11.1 25 241.80.156.46 25 extendable
ip nat inside source static tcp 192.168.11.1 80 241.80.156.46 80 extendable
ip nat inside source static tcp 192.168.11.1 443 241.80.156.46 443 extendable
ip nat inside source static tcp 192.168.11.1 3389 241.80.156.46 3389 extendable
ip nat inside source static tcp 192.168.11.1 4125 241.80.156.46 4125 extendable
ip nat inside source static udp 192.168.14.2 5060 241.80.156.46 5060 extendable
ip nat inside source static tcp 192.168.11.30 5800 241.80.156.46 5800 extendable
ip nat inside source static tcp 192.168.11.30 5900 241.80.156.46 5900 extendable
ip nat inside source static tcp 192.168.14.24 37000 241.80.156.46 37000 extendable





Exactly what i want to do is have the Data T1 used for Our Voice traffic, (SIP TRUNKING) .... VPN site to site since theres a 1.5 upload . but use about 8 of the statics for other router connections for learning and deploying..

Basically just like as if it was a cable modem and put a switch in front of it then your router to take some of the statics for like VPN concentrators and a Teleworker Server (mitel terms Remote IP sets)..


But im not to sure on exactly what to put in the Sub if or if i have to
Do any Vlaning to accomplish this ONE FA ethernet Interface to have like 2 subnets attatched to it so i can statically set a computer on the same switch to one of the 16 available statics.



as in network diagram hope this helps

Cisco 1841 router

wic slot 0 T1------Secondary ISP SmartJack (Voice Traffic)..(VPN)
FE0/0 -------------Primary ISP Ethernet
FE0/1 -------------Connected to HP procurve Switch


Aiming for to Use the 16 Statics From the T1 across the same ethernet Wire connected to the HP procurve Switch (FE0/1).... and to be able to connect a pc or router to that Procurve switch and Assign the Ip address of a static IP address outside the 172 192 or 10 range..

Hope that helps a little
and thank you for the help ahead of time
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top