Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Point to Point T1 w/ 2620XM's 1

Status
Not open for further replies.

jrmack03

IS-IT--Management
Jun 24, 2009
7
0
0
US
Hey Guys

I need to setup a point to point T1 using two 2620XM's each with a WIC-1DSU-T1, between two offices. I am a Cisco beginner & can't seem to find any clear instruction online, any help would be appreciated.

The current "core" router is a 1711 which I have the running-config, ACL's & ip route information if needed. I will need the remote 2620XM to handle DHCP as well as QOS for voip traffic through the point to point T1.

I know I haven't provided alot of information here, just let me know what you need & I will get it...

Thanks...

Joe
 
okay,

I was able to get the Point to Point working using a T1 X-over cable on my test network... However once I took them to the production network, it stopped working! I configured a static route on the "Core" router, but still no joy. I suspect that it has to to with the ACL's, but need some help. I will also need help w/ QOS but just want to get the thing working first.

Thanks, Joe...

************************************************************
Remote Office Config
************************************************************

SJ2620#show startup-config
Using 1427 out of 29688 bytes
!
! Last configuration change at 15:22:27 PST Mon Jun 29 2009
! NVRAM config last updated at 15:26:20 PST Mon Jun 29 2009
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SJ2620
!
boot-start-marker
boot-end-marker
!
enable secret XXXXX
enable password XXXXX
!
no aaa new-model
!
resource policy
!
clock timezone PST -8
no network-clock-participate slot 1
no network-clock-participate wic 0
ip subnet-zero
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.200.1 192.168.200.99
ip dhcp excluded-address 192.168.200.200 192.168.200.255
!
ip dhcp pool 192.168.200.0/24
network 192.168.200.0 255.255.255.0
default-router 192.168.200.1
dns-server 192.168.33.5 4.2.2.2
!
!
ip cef
ip name-server 4.2.2.2
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 192.168.200.1 255.255.255.0
speed auto
full-duplex
no mop enabled
!
interface Serial0/0
ip unnumbered FastEthernet0/0
no dce-terminal-timing-enable
!
router rip
redistribute connected
network 192.168.200.0
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.30.2
!
!
ip http server
no ip http secure-server
!
dialer-list 1 protocol ip permit
!
!
!
control-plane
!
!
!
!
!
!
!
!
!
!
line con 0
line aux 0
line vty 0 4
password XXXXX
login
!
ntp clock-period 17179869
ntp server 66.7.96.1
!
end

************************************************************
Home Office Config
************************************************************
SAC2620#show startup-config
Using 1214 out of 29688 bytes
!
! Last configuration change at 15:14:06 PST Mon Jun 29 2009
! NVRAM config last updated at 15:19:01 PST Mon Jun 29 2009
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SAC2620
!
boot-start-marker
boot-end-marker
!
enable secret XXXXX
enable password XXXXX
!
no aaa new-model
!
resource policy
!
clock timezone PST -8
no network-clock-participate slot 1
no network-clock-participate wic 0
ip subnet-zero
!
!
!
!
ip cef
ip name-server 4.2.2.2
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
ip address 192.168.30.2 255.255.255.0
speed auto
full-duplex
no mop enabled
!
interface Serial0/0
ip unnumbered FastEthernet0/0
no fair-queue
no dce-terminal-timing-enable
service-module t1 clock source internal
!
router rip
redistribute connected
network 192.168.30.0
!
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.30.1
!
!
ip http server
no ip http secure-server
!
dialer-list 1 protocol ip permit
!
!
!
control-plane
!
!
!
!
!
!
!
!
!
!
line con 0
line aux 0
line vty 0 4
password XXXXX
login
!
ntp clock-period 17179873
ntp server 69.36.241.112
!
end

************************************************************
Home Office "Core Router"
************************************************************
Office#show startup-config
Using 14584 out of 29688 bytes
!
version 12.3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime
service timestamps log datetime
service password-encryption
service sequence-numbers
!
hostname Office
!
boot-start-marker
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 52000 debugging
logging console informational
enable secret XXXXX
enable password XXXXX
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication login userauthen local
aaa authorization exec default local
aaa authorization network groupauthor local
!
aaa session-id common
!
resource policy
!
clock timezone PST -8
clock summer-time PDT recurring 2 Sun Mar 2:00 1 Sun Nov 2:00
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 10.10.10.1
!
!
ip tcp synwait-time 10
ip cef
no ip domain lookup
ip domain name domain.com
no ip bootp server
ip inspect max-incomplete high 1100
ip inspect one-minute high 1100
ip inspect name FWInspect cuseeme
ip inspect name FWInspect ftp
ip inspect name FWInspect h323
ip inspect name FWInspect netshow
ip inspect name FWInspect rcmd
ip inspect name FWInspect realaudio
ip inspect name FWInspect rtsp
ip inspect name FWInspect smtp
ip inspect name FWInspect sqlnet
ip inspect name FWInspect streamworks
ip inspect name FWInspect tftp
ip inspect name FWInspect tcp
ip inspect name FWInspect udp
ip inspect name FWInspect vdolive
ip inspect name FWInspect icmp
ip inspect name ExtInspect ftp
ip inspect name ExtInspect smtp
ip inspect name ExtInspect tcp
ip inspect name ExtInspect udp
no ip ips deny-action ips-interface
ip ssh time-out 60
ip ssh authentication-retries 2
!
no ftp-server write-enable
!
modemcap entry ESS:MSC=&FS0=1
!
crypto pki trustpoint TP-self-signed-475987074
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-475987074
revocation-check none
rsakeypair TP-self-signed-475987074
!
!
crypto pki certificate chain TP-self-signed-475987074
certificate self-signed 01 nvram:IOS-Self-Sig#3401.cer
username admin privilege 15 password XXXXX
username vpnuser1 privilege 0 password XXXXX
username vpnuser2 privilege 0 password XXXXX
username vpnuser3 privilege 0 password XXXXX
username tech privilege 15 password XXXXX
!
!
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
!
crypto isakmp policy 3
encr 3des
authentication pre-share
group 2
!
crypto isakmp policy 5
encr 3des
authentication pre-share
crypto isakmp key XXXXX address EXTERNAL.241 no-xauth
crypto isakmp key XXXXX address EXTERNAL.4 no-xauth
!
crypto isakmp client configuration group vpnclient
key XXXXX
dns EXTERNAL.6
domain domain.com
pool vpnpool
acl 180
!
!
crypto ipsec transform-set vpnclient-transformset esp-3des esp-sha-hmac
crypto ipsec transform-set kq6eo-transformset esp-3des esp-md5-hmac
crypto ipsec transform-set ess-transformset esp-3des esp-sha-hmac
!
crypto dynamic-map dynmap 10
set transform-set vpnclient-transformset
!
!
crypto map vpn-cryptomap client authentication list userauthen
crypto map vpn-cryptomap isakmp authorization list groupauthor
crypto map vpn-cryptomap client configuration address respond
crypto map vpn-cryptomap 1 ipsec-isakmp
set peer EXTERNAL.241
set transform-set kq6eo-transformset
match address 190
crypto map vpn-cryptomap 5 ipsec-isakmp
! Incomplete
set peer EXTERNAL.4
set transform-set ess-transformset
match address 191
crypto map vpn-cryptomap 10 ipsec-isakmp dynamic dynmap
!
!
!
interface Null0
no ip unreachables
!
interface FastEthernet0
description External Network
ip address EXTERNAL.2 255.255.255.240
ip access-group 102 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
ip inspect ExtInspect in
no ip virtual-reassembly
no ip route-cache cef
no ip route-cache
no ip mroute-cache
speed 100
full-duplex
no cdp enable
crypto map vpn-cryptomap
!
interface FastEthernet1
no ip address
no cdp enable
!
interface FastEthernet2
no ip address
no cdp enable
!
interface FastEthernet3
description Bank Encrypted port
switchport access vlan 2
no ip address
no cdp enable
!
interface FastEthernet4
description Bank Clear port
switchport access vlan 3
no ip address
no cdp enable
!
interface Vlan1
description Internal Network
ip address 192.168.30.1 255.255.255.0
ip access-group 101 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip inspect FWInspect in
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
ip tcp adjust-mss 1200
no ip mroute-cache
!
interface Vlan2
description Encrypted
ip address 192.168.29.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
ip tcp adjust-mss 1200
no ip mroute-cache
!
interface Vlan3
description Clear
ip address 192.168.28.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
ip tcp adjust-mss 1200
no ip mroute-cache
!
interface Async1
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
!
ip local pool vpnpool 192.168.252.10 192.168.252.40
ip default-gateway EXTERNAL.1
ip classless
ip route 0.0.0.0 0.0.0.0 EXTERNAL.1
ip route 192.168.48.0 255.255.255.0 192.168.30.11
ip route 204.194.123.25 255.255.255.255 192.168.28.2
ip route 204.194.123.31 255.255.255.255 192.168.28.2
ip route 192.168.200.0 255.255.255.0 192.168.30.2
no ip http server
ip http authentication aaa
no ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
!
ip nat inside source route-map dynamic-nat-route-map interface FastEthernet0 overload
ip nat inside source static 192.168.30.40 EXTERNAL.17 route-map static-nat-route-map
ip nat inside source static 192.168.30.55 EXTERNAL.18 route-map static-nat-route-map
ip nat inside source static 192.168.30.53 EXTERNAL.19 route-map static-nat-route-map
ip nat inside source static 192.168.30.31 EXTERNAL.20 route-map static-nat-route-map
ip nat inside source static 192.168.29.2 EXTERNAL.21 route-map static-map-route-map
!
!
logging trap debugging
access-list 101 remark
access-list 101 remark Internal to External ACL
access-list 101 remark Allow VPN Client
access-list 101 permit esp 192.168.30.0 0.0.0.255 any
access-list 101 permit udp 192.168.30.0 0.0.0.255 any eq isakmp
access-list 101 permit udp 192.168.30.0 0.0.0.255 any eq non500-isakmp
access-list 101 remark Allow VPN with FD
access-list 101 permit esp 192.168.29.0 0.0.0.255 host 204.194.124.6
access-list 101 permit udp 192.168.29.0 0.0.0.255 host 204.194.124.6 eq isakmp
access-list 101 permit udp 192.168.29.0 0.0.0.255 host 204.194.124.6 eq non500-isakmp
access-list 101 permit esp 192.168.29.0 0.0.0.255 host 204.194.122.213
access-list 101 permit udp 192.168.29.0 0.0.0.255 host 204.194.122.213 eq isakmp
access-list 101 permit udp 192.168.29.0 0.0.0.255 host 204.194.122.213 eq non500-isakmp
access-list 101 remark Allow all
access-list 101 permit ip any any
access-list 101 remark
access-list 102 remark
access-list 102 remark External to Internal ACL
access-list 102 remark Allow established connections
access-list 102 permit tcp any 192.168.30.0 0.0.0.255 established
access-list 102 remark Allow VPN connections all access
access-list 102 permit ip 192.168.51.0 0.0.0.255 192.168.30.0 0.0.0.2
access-list 102 permit ip 192.168.252.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 102 permit icmp any host EXTERNAL.2
access-list 102 remark VPN and SSH connections to router
access-list 102 permit udp any eq isakmp host EXTERNAL.2
access-list 102 permit ahp any host EXTERNAL.2
access-list 102 permit esp any host EXTERNAL.2
access-list 102 permit tcp any host EXTERNAL.2 eq 22
access-list 102 remark Allow Client VPN
access-list 102 permit gre any any
access-list 102 permit udp any host EXTERNAL.2 eq isakmp
access-list 102 permit udp any host EXTERNAL.2 eq non500-isakmp
access-list 102 permit esp any 192.168.30.0 0.0.0.255
access-list 102 permit udp any 192.168.30.0 0.0.0.255 eq isakmp
access-list 102 permit udp any 192.168.30.0 0.0.0.255 eq non500-isakmp
access-list 102 deny ip any host EXTERNAL.2
access-list 102 remark Allow FD VPN
access-list 102 permit icmp any host EXTERNAL.21
access-list 102 permit icmp any host 192.168.29.2
access-list 102 permit gre any host EXTERNAL.21
access-list 102 permit esp any host EXTERNAL.21
access-list 102 permit ahp any host EXTERNAL.21
access-list 102 permit udp any host EXTERNAL.21 eq isakmp
access-list 102 permit udp any host EXTERNAL.21 eq non500-isakmp
access-list 102 permit gre any host 192.168.29.2
access-list 102 permit esp any host 192.168.29.2
access-list 102 permit ahp any host 192.168.29.2
access-list 102 permit udp any host 192.168.29.2 eq isakmp
access-list 102 permit udp any host 192.168.29.2 eq non500-isakmp
access-list 102 deny ip any host EXTERNAL.21
access-list 102 remark Allow green screen/ from to AS400
access-list 102 permit tcp any host EXTERNAL.17 eq telnet
access-list 102 permit tcp any host EXTERNAL.17 eq 449
access-list 102 permit tcp any host EXTERNAL.17 eq 8473
access-list 102 permit tcp any host EXTERNAL.17 eq 8470
access-list 102 permit tcp any host EXTERNAL.17 eq www
access-list 102 permit tcp any host EXTERNAL.17 eq 443
access-list 102 permit tcp host EXTERNAL.132 host EXTERNAL.17 eq 989
access-list 102 permit udp host EXTERNAL.132 host EXTERNAL.17 eq 989
access-list 102 permit tcp host EXTERNAL.132 host EXTERNAL.17 eq 990
access-list 102 permit udp host EXTERNAL.132 host EXTERNAL.17 eq 990
access-list 102 deny ip any host EXTERNAL.17
access-list 102 remark Allow Internet to mail server
access-list 102 permit tcp any host EXTERNAL.20 eq smtp
access-list 102 permit tcp any host EXTERNAL.20 eq 465
access-list 102 permit tcp any host EXTERNAL.20 eq 32001
access-list 102 deny ip any host EXTERNAL.20
access-list 102 remark Allow ESS to phone switch
access-list 102 permit ip 192.168.48.0 0.0.0.255 host 192.168.30.55
access-list 102 permit ip 192.168.48.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 102 deny ip any host 192.168.30.55
access-list 102 remark Allow VNC to Phone Server
access-list 102 permit tcp any host EXTERNAL.18 eq 5900
access-list 102 deny ip any host EXTERNAL.18
access-list 102 remark Allow video to DVR Server
access-list 102 permit tcp any host EXTERNAL.19 eq www
access-list 102 permit tcp any host EXTERNAL.19 eq 135
access-list 102 permit udp any host EXTERNAL.19 eq 135
access-list 102 deny ip any host EXTERNAL.19
access-list 102 remark
access-list 102 remark Deny everything else
access-list 102 deny ip any any
access-list 102 remark
access-list 150 remark
access-list 150 remark dynamic-nat-route-map
access-list 150 remark Do not NAT internal traffic
access-list 150 deny ip 192.168.30.0 0.0.0.255 192.168.50.0 0.0.1.255
access-list 150 deny ip 192.168.50.0 0.0.1.255 192.168.30.0 0.0.0.255
access-list 150 deny ip 192.168.30.0 0.0.0.255 192.168.48.0 0.0.0.255
access-list 150 deny ip 192.168.48.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 150 deny ip 192.168.252.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 150 deny ip 192.168.30.0 0.0.0.255 192.168.252.0 0.0.0.255
access-list 150 deny ip 192.168.30.0 0.0.0.255 192.168.29.0 0.0.0.255
access-list 150 deny ip 192.168.29.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 150 deny ip 192.168.30.0 0.0.0.255 192.168.28.0 0.0.0.255
access-list 150 deny ip 192.168.28.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 150 remark Do not Dynamic NAT Static NAT servers
access-list 150 deny ip any host 192.168.30.40
access-list 150 deny ip host 192.168.30.40 any
access-list 150 deny ip any host 192.168.30.31
access-list 150 deny ip host 192.168.30.31 any
access-list 150 permit ip 192.168.30.0 0.0.0.255 any
access-list 150 remark
access-list 160 remark
access-list 160 remark static-nat-route-map
access-list 160 remark Do not NAT internal traffic
access-list 160 deny ip 192.168.30.0 0.0.0.255 192.168.50.0 0.0.1.255
access-list 160 deny ip 192.168.50.0 0.0.1.255 192.168.30.0 0.0.0.255
access-list 160 deny ip 192.168.30.0 0.0.0.255 192.168.48.0 0.0.0.255
access-list 160 deny ip 192.168.48.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 160 deny ip 192.168.252.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 160 deny ip 192.168.30.0 0.0.0.255 192.168.252.0 0.0.0.255
access-list 160 deny ip 192.168.30.0 0.0.0.255 192.168.29.0 0.0.0.255
access-list 160 deny ip 192.168.29.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 160 deny ip 192.168.30.0 0.0.0.255 192.168.28.0 0.0.0.255
access-list 160 deny ip 192.168.28.0 0.0.0.255 192.168.30.0 0.0.0.255
access-list 160 deny ip host FDVPN.31 host 192.168.30.40
access-list 160 deny ip host 192.168.30.40 host 204.194.123.31
access-list 160 deny ip host FDVPN.25 host 192.168.30.40
access-list 160 deny ip host 192.168.30.40 host 204.194.123.25
access-list 160 permit ip any any
access-list 160 remark
access-list 180 remark
access-list 180 remark Client VPN
access-list 180 permit ip 192.168.30.0 0.0.0.255 any
access-list 180 permit ip 192.168.252.0 0.0.0.255 any
access-list 190 remark
access-list 190 remark VPN to Tech Home
access-list 190 permit ip 192.168.30.0 0.0.0.255 192.168.50.0 0.0.1.255
access-list 190 remark
snmp-server community life RO
snmp-server location Office
snmp-server contact Tech
snmp-server enable traps tty
no cdp run
!
route-map dynamic-nat-route-map permit 10
match ip address 150
!
route-map static-nat-route-map permit 20
match ip address 160
!
!
control-plane
!
banner login ^CCAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
logging synchronous
transport output telnet
line 1
logging synchronous
stopbits 1
speed 115200
flowcontrol hardware
line aux 0
logging synchronous
modem InOut
modem autoconfigure type ESS
transport input telnet
transport output telnet
stopbits 1
speed 1200
flowcontrol hardware
line vty 0 4
privilege level 15
logging synchronous
transport input telnet ssh
line vty 5 15
privilege level 15
logging synchronous
transport input telnet ssh
!
scheduler allocate 4000 1000
scheduler interval 500
end
 
Hello
Do you have layer 1 connectivity?You said that you are doing a point to point setup,but why are the router on different subnets?Try taking out ip unnumered and put the addresses directly on the serial interface.Can you please explain your design more clearly.Is the core router behind one of the two WAN routers?

Regards
 
Minue,

I have included an ascii schematic, does this help out?

-------------
| Internet |
-------------
|
----------------
| Core 1711 |
| 192.168.30.1 |
----------------
|
|
----------------------- -------------- --------------
| Home Office LAN |--| SAC2620 |--T1--| SJ2620 |
----------------------- |192.168.30.2| |192.168.200.1|
-------------- --------------
|
|
------------------------
| Remote Office LAN|
------------------------

The two offices are to be connected via the T1, the remote office needs access to everything on the home office lan including internet.

Thanks, Joe...
 
Okay,

So the two subnets are once again routing between each other properly. I have access to the home office network from the remote office network and vice versa. Does it take some time for the 2620's to build a route map or something? This didn't work until the routers had been on and running for awhile...

I still cannot access the internet from the remote office network & I believe that is related to the ACL's... Any help with that?

Thanks!
 
So you have to go through the SAC2620 then the Core to reach Internet??Can you reach SAC2620 from the remote router?Please post a tracroute to the Internet from the remote router.

Regards
 
Minue,

Yes that is correct, I have to go through SAC2620 then the Core to reach the internet. Currently I can ping any device or router from either subnet. What I cant do is hit anything on the internet from the remote office. I believe it is an ACL issue, but am having little luck in deciphering the previously configured ACL's...

Here is the requested traceroute from the remote router:

SJ2620>traceroute 74.125.127.100

Type escape sequence to abort.
Tracing the route to 74.125.127.100

1 192.168.30.2 4 msec 4 msec 0 msec
2 192.168.30.1 4 msec 4 msec 4 msec
3 * * *
4 * * *
5 * * *
6 * * *
7 * * *
8 * * *
9 * * *

Thanks for the help!

Joe...
 
Hello
The quickest way to troubleshoot your problem is to try and takeout the 2 access-list "ip access-group 102 in" and "ip access-group 101 in" and then test.Also make sure that the Core is NATing the Remote subnet address,with the command "show ip nat translations".If not put a specfic match in access-list 150:
access-list 150 permit ip 192.168.200.0 0.0.0.255 any

Why do have redundancy in the route-map? Access-list 150 and access-list 160 have same subnet.It would best to clean-up to make troubleshooting more simple.
Regards

 
Minue,

Thanks for sticking with me on this, I really appreciate it. I acquired this 1711 already in place. I agree that the current config is confusing & over complicated, but it is in place and working. I believe that whoever was configuring this router previously would just add new changes and never clean up/remove unused changes, I suspect that is why the duplicate ACL's. There is a VPN that constantly sends errors to the console as well as an entire subnet that doesn't exist anymore "192.168.29.0". I will have to deal with all that at sometime in the future.

I ran "show ip nat translations" and the core wasn't NATing the 192.168.200.0 subnet, I added the permit into ACL 150 and the SJ2620 can now ping the internet! I will test w/ a workstation later on today. Do I need to worry about any additional config to secure the 192.168.200.0 subnet from the internet or will the existing ACL's continue to do this?

Thanks!

Joe...
 
The Core router is acting as a Firewall,so it will protect all inside networks.
If the workstation can't surf the WEB try changing their DNS server to that of your ISP
Have you put the two routers into production as yet or are you still connected with the cross orver cable?
Why do you prefer to use ip unnumbered instead of a point-to-point subnet?I think it would be cleaner to have ip addresses on the serial interfaces.

Regards



 
Tested with a workstation today, and everything looks to be working good.

I am still connected using a crossover cable, I will switch over to the real T1 on wed.

I went w/ unnumbered mainly because I read that with a single point to point it is easier.

Thanks,

Joe...
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top