Solved

Cisco router needs 2 WAN IP ranges from one DSL line. How do I configure this?

Posted on 2011-02-17
4
464 Views
Last Modified: 2012-05-11
Hi All

A client has an exisitng ADSL with a range of IPs. They needed to extend this range as they needed more IP addreses, so their ISP has assigned and additional range in a different subnet to their ADSL too.
So they now have two ranges
82.x.x.x/28 & 212.x.x.x/28. on one ADSL.

How do I configure their Cisco router for both these WAN ranges simultaneously?
0
Comment
Question by:Winfix1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 3

Accepted Solution

by:
topdavis earned 250 total points
ID: 34915019
an option is to use a secondary ip address on the interface.

ip address 82.1.1.1 255.255.255.240
ip address 212.1.1.1 255.255.255.240 secondary

These commands will put two ip addresses on the interface.
0
 
LVL 16

Assisted Solution

by:memo_tnt
memo_tnt earned 250 total points
ID: 34915124
Hi

either by using the above solution
or
by creating sub interfaces i.i interface eth0.1 and interface eth0.2 and assign 1st subnet to the 1st interface and the 2nd subnet to the 2nd interface ..

BR
0
 
LVL 70

Expert Comment

by:Qlemo
ID: 35312668
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question