Solved

how to connect ISDN line to network

Posted on 2008-10-27
3
1,016 Views
Last Modified: 2008-11-06
Hi Expert,

CompanyABC have a mpls link going to core location using dmvpn. a  customer need to communicate with companyABC but will like it to be done over an ISDN line.remote rtr is 2800 Please provide a smae config how to do this


             COMPANY ABC DESIGN

 [-----------dmvpn-------------]    
core rtr ----mpls-----remote rtr----userlan
                            I
                            I
                            I
           CUSTOMER WOULD LIKE ISDN LINE TO CONNECT TO COMPANY ABC  
0
Comment
Question by:rcollie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Expert Comment

by:jgmontgo
ID: 22818885
Basically you need 2 ISDN modems, and a Point to Point ISDN line. It ie really not too hard to setup.
0
 

Author Comment

by:rcollie
ID: 22820472
Hi Do you have a sample config for reference if so I would like to see it. Thanks
0
 
LVL 11

Accepted Solution

by:
jgmontgo earned 500 total points
ID: 22828755
There is not much to it, you obtain a P2P ISDN then 2 ISDN Modems. You place the modems (one in each location) and connect the ISDN. Configuration is based on the ISDN provider and the rest of your equipment.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco 3650 switch licensing 6 79
Add GoToMeeting Invites Rooms to Exchange Conference Rooms 2 58
Active directory DNS integrated question? 7 46
Move WSUS to Server 2016 3 42
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question