?
Solved

AS5300 Cisco Router Configuration

Posted on 2008-06-10
2
Medium Priority
?
1,227 Views
Last Modified: 2011-10-03
Hi,
I have a as5300 cisco router and 2 E1 line in sonnected to this router (controller e1 2  and controller e1 3).router has 4 e1 module.
every e1 line has unic number for example e1 2 : x         e1 3:y
i have a radius accounting server and users dialing to every number they want with specific username and password and all thing is right.
now,i want seperated one of e1 lines from other,when a user dialling to x (e1 2),user must connect with username and password but if a user dialling y (e1 3) ,user doesn't need to enter user and pass and i want users can connect to this number without authentication.
i configure se2:15 and se3:15 and group async for every se but it doesn;t work
please help me

please help me
0
Comment
Question by:mr_mpz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 27

Accepted Solution

by:
Nopius earned 800 total points
ID: 21851666
> when a user dialling to x (e1 2),user must connect with username and password

this is already working

> but if a user dialling y (e1 3) ,user doesn't need to enter user and pass and i want users can connect to this number without authentication.

you may try to do it on RADIUS server. Just create a user with empty string username (or some kind of default user, entry, that is checked when no user is specified), remove Password from checked attributes and add dialed phone number to checked attributes.
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question