Solved

Cisco 1800 onfiguration

Posted on 2011-03-16
6
430 Views
Last Modified: 2012-05-11
Hi ;

I'm trying to get my router working but it doesn't. Where i could go wrong ? Here's my details
 
My ISP provide this :
Serial IP address:       1.9.32.218/30 (IP Scheme)

Customer’s IP address:       1.9.61.32/27

And my router config is this :-

Current configuration : 883 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname BRJRO02
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$FJ3u$OJyOVYGkeZDuUXKOsps5p.
enable password secret1
!
no aaa new-model
ip cef
!
!
!
!
ip auth-proxy max-nodata-conns 3
 --More--         ip admission max-nodata-conns 3
!
!
!
!
!
!
!
!
!
interface FastEthernet0/0
 no ip address
 shutdown
 duplex auto
 speed auto
 no cdp enable
!
interface FastEthernet0/1
 ip address 1.9.61.35 255.255.255.224
 speed auto
 full-duplex
 no cdp enable
 no mop enabled
 --More--         !
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 1.9.61.33
!
!
ip http server
no ip http secure-server
!
!
!
!
control-plane
!
!
!
line con 0
 exec-timeout 0 0
line aux 0
line vty 0 4
 password secret2
 login
!
scheduler allocate 20
0
Comment
Question by:chongbenkee
6 Comments
 
LVL 35

Expert Comment

by:Ernie Beek
Comment Utility
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
>Serial IP address:       1.9.32.218/30
I don't even see a serial interface on your router, or is this on another router that you are trying to use as a default route -- 1.9.61.33?
0
 

Author Comment

by:chongbenkee
Comment Utility
im not sure why is the purpose of the serial ip address as well . Therefore, im just using the given customer address.

Ok simply put , does my router config is correct based on the customer IP given ? Or I'm missing something such as routing and so forth ?
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:chongbenkee
Comment Utility
oh ya, we just install this MPLS line. Therefore , the UAT haven't been done with the ISP and is schedule later . Is it possible that the port is shut by them until that day ? FYI, they already install the alcatel7210 SAS at our office. And when I connect to of the port, I can see light but it is not blinking.Just constant light.
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
Comment Utility
ip route 0.0.0.0 0.0.0.0 1.9.61.33

This won't work even if the internet line is up.  You're trying to route via an address on your LAN.


The ISP should have told you what the Gateway address is, if they've provided a Serial address in a /30 format (as you need to know which IP address they are using, and allocate the remaining IP address from the /30 to your side).


Assuming you have an active Serial or FastEthernet0/0 configured using the /30 address (where the first IP is the ISP) you should use:

ip route 0.0.0.0 0.0.0.0 1.9.32.219
0
 

Author Closing Comment

by:chongbenkee
Comment Utility
Yes. The gateway was different. Thanks very much.It works wonders now.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
3Com 3016 Router Configuration 12 61
NTP port 123 UDP 5 53
QoS Policing 2 57
TCP connections per server 12 64
Understanding FTPS File transfer is a common requirement in most Enterprises. While there are numerous ways to get a file from Point A to Point B over a network, perhaps the most common method still in use is FTP – File Transfer Protocol. FTP is …
Please see preceding article here: http://www.experts-exchange.com/Networking/Operating_Systems/A_11209-Root-Bridge-Election.html Figure 1 After Root Bridge has been elected, then what?..... Let's start by defining a Root Port in la…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now