Solved

cisco using external ip pool for users

Posted on 2003-10-21
4
322 Views
Last Modified: 2010-04-11
Hello !!

i have a cisco router with nm 16 for dial up users and 1 as5300 for e1 users. and also i have a computer for accounting with an accounting program. i've defined a local ip pool which users get ip from it. but i need an external ip pool in my accounting which users get static ip from ther. is there any command in cisco to define an external ip pool rather ip local pool which users get ip from there?
i mean define an ip pool out side the cisco, then cisco use that pool to give ip to users.
thank you.
0
Comment
Question by:hoomant
4 Comments
 
LVL 7

Accepted Solution

by:
NicBrey earned 63 total points
ID: 9591371
Yes there is.

Configure the DHCP server and pool on another machine and use:
router(config)# ip dhcp server  <IP address of server>

0
 
LVL 12

Assisted Solution

by:mburdick
mburdick earned 62 total points
ID: 9595914
If you're using something like Cisco's ACS program to authenticate users, you can define the pool on the ACS server and download it to the device (as5300, for example).

There are other possibilities as well, but I don't really understand what you're trying to accomplish. A more detailed description of what you are trying to do any why will be helpful...
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
google exe file 5 76
Sonicwall one way trust 2 43
not able to to ping server on a switch 1 34
HP network exams 3 34
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question