Routers
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Can you ping the .118 address from the router?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
ip dhcp excluded-address 10.1.1.1 10.1.1.149
ip dhcp excluded-address 10.1.1.200 10.1.1.255
!
ip dhcp pool HDGDhcpPool
  network 10.1.1.0 255.255.255.0
  domain-name ces-companies.local
  dns-server 10.0.1.11 10.0.1.25
  default-router 10.1.1.1
!
!
ip cef
no ip domain lookup
ip domain name ces-companies.local
no ipv6 cef
!
!
multilink bundle-name authenticated
......
interface Loopback0
 ip address 10.0.29.3 255.255.255.255
 ip flow ingress
 ip flow egress
!
interface Tunnel1
 description ***To ceshour01***
 bandwidth 768
 ip address 10.0.30.2 255.255.255.252
 ip mtu 1440
 ip tcp adjust-mss 1360
 tunnel source 75.17.38.121
 tunnel destination 38.110.192.154
!
interface BRI0
 no ip address
 encapsulation hdlc
 shutdown
 isdn termination multidrop
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
 no ip address
 duplex auto
 speed auto
!
interface GigabitEthernet0
 description $ES_WAN$
 ip address 108.221.240.113 255.255.255.248
 ip access-group internet-inbound in
 no ip proxy-arp
 ip flow ingress
 ip flow egress
 ip nat inside
 ip virtual-reassembly
 duplex full
 speed auto
If I connect a computer directly to the U-Verse Modem, I am able to access the internet. Â WHen I connect an Ethernet cable from the Modem to the Gigabit0 Port, no internet access. Â The Cisco Router is handing out DHCP of 10.1.1.x address.
Below is the setting of the U-Verse Modem:
Home Network Status
Device IPv4 Address      192.168.1.254
DHCPv4 Netmask      255.255.255.0           Â
DHCPv4 Start Address      192.168.1.100           Â
DHCPv4 End Address      192.168.1.150           Â
DHCP Leases Available      54           Â
DHCP Leases Allocated      2           Â
DHCP Primary Pool      Public           Â
Subnets &Â DHCP
Private LAN Subnet
Device IPv4 Address      Â
                Â
Subnet Mask      Â
                Â
                                                            Â
DHCPv4 Start Address      Â
                Â
DHCPv4 End Address      Â
                Â
Public Subnet
Public Subnet Enable      Â
Public IPv4 Address      Â
Public Subnet Mask      Â
DHCPv4 Start Address      Â
DHCPv4 End Address      Â
Primary DHCP Pool       Private  Public
System Information
Manufacturer      Motorola
Model Number      NVG510
Serial Number      255556228877856
Software Version      9.0.6h0d48
MAC Address      e8:6d:52:3e:0e:21
First Use Date      2012/01/03 18:58:32
Time Since Last Reboot      00:00:03:57
Datapump Version      A2pD035b.d23i
Can you ping the .118 address from the router?
FastEthernet0        unassigned    YES unset  up           down
FastEthernet1        unassigned    YES unset  up           down
FastEthernet2        unassigned    YES unset  up           down
FastEthernet3        unassigned    YES unset  up           down
FastEthernet4        unassigned    YES unset  up           down
FastEthernet5        unassigned    YES unset  up           up
FastEthernet6        unassigned    YES unset  up           down
FastEthernet7        unassigned    YES unset  up           down
FastEthernet8        unassigned    YES NVRAM  up           down
GigabitEthernet0      108.221.240.113 YES NVRAM  up           up
Loopback0          10.0.29.3    YES NVRAM  up           up
NVI0            10.0.29.3    YES unset  up           up
SSLVPN-VIF0         unassigned    NO  unset  up           up
Tunnel1           10.0.30.2    YES NVRAM  up           down
Vlan1            10.1.1.1     YES NVRAM  up           up
We are unable to ping the .118 address from the router.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Your config shows an inbound ACL (internet-inbound) but it's not listed in your config. Does this ACL exist? If so, please post it.
This is what I know now:
From the Cisco Router itself, we were able to ping 108.221.240.118 (which is the "Public IPv4 Address" AT&T gave us). Â From the Cisco Router itself, we were able to ping the "Device IPv4 Address" of 192.168.1.254.
When we connect a computer to the Cisco router, the computer is getting an IP address of 10.1.1.150 from the Cisco Router. Â When we try to ping 108.221.240.118 from the computer, we get a "TimeOUt". Â We were also not able to ping 192.168.1.254 (which is the Device IP address) from the computer either. Â
In summary, if we telnet into the Cisco router, we were able to ping the .118 address and the device address. Â If we try to ping from the computer connecting to the Cisco Router, we are unable to ping either. Â However, we were able to successfully ping .113 from the computer.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
interface GigabitEthernet0
 description $ES_WAN$
 ip address 108.221.240.113 255.255.255.248
 ip access-group internet-inbound in
 no ip proxy-arp
 ip flow ingress
 ip flow egress
 ip nat inside
 ip virtual-reassembly
 duplex full
 speed auto
 crypto map cesvpn
!
interface Vlan1
 description *** HDGCAR Lan ***
 ip address 10.1.1.1 255.255.255.0
 ip tcp adjust-mss 1452
!
router eigrp 11
 passive-interface default
 no passive-interface Tunnel1
 network 10.0.0.0
 distribute-list 1 out Tunnel1
 no auto-summary
!
ip forward-protocol nd
ip route 38.110.192.154 255.255.255.255 75.17.38.126
ip route 38.112.166.0 255.255.255.0 75.17.38.126
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
!
ip access-list extended ceshour01
 permit gre host 75.17.38.121 host 38.110.192.154
!
ip sla 1
 icmp-echo 38.110.192.154 source-interface GigabitEthernet0
 frequency 5
ip sla schedule 1 life forever start-time now
ip sla 2
 icmp-echo 10.0.1.51 source-interface Vlan1
 frequency 5
ip sla schedule 2 life forever start-time now
ip sla 3
 icmp-echo 10.0.1.52 source-interface Vlan1
 frequency 5
ip sla schedule 3 life forever start-time now
ip sla 4
 icmp-echo 10.0.1.55 source-interface Vlan1
 frequency 5
ip sla schedule 4 life forever start-time now
logging history size 500
logging trap warnings
logging source-interface Loopback0
logging 10.1.1.10
access-list 1 permit 10.0.29.3
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 105 permit gre host 38.110.192.154 host 75.17.38.121
snmp-server community CES_31 RO
snmp-server ifindex persist
snmp-server trap-source Loopback0
snmp-server system-shutdown
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vrrp
snmp-server enable traps tty
snmp-server enable traps eigrp
snmp-server enable traps license
snmp-server enable traps ethernet cfm cc mep-up mep-down cross-connect loop conf
ig
snmp-server enable traps ethernet cfm crosscheck mep-missing mep-unknown service
-up
snmp-server enable traps envmon
snmp-server enable traps isdn call-information
snmp-server enable traps isdn layer2
snmp-server enable traps isdn chan-not-avail
snmp-server enable traps isdn ietf
snmp-server enable traps aaa_server
snmp-server enable traps bgp
snmp-server enable traps bulkstat collection transfer
snmp-server enable traps cnpd
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps fru-ctrl
snmp-server enable traps resource-policy
snmp-server enable traps event-manager
HDGCARR01#show running-config
Building configuration...
Current configuration : 10597 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname HDGCARR01
!
boot-start-marker
boot-end-marker
!
logging exception 8192
logging message-counter syslog
logging buffered 16777216
no logging console
enable secret 5
enable password 7
!
no aaa new-model
!
crypto pki trustpoint TP-self-signed-2174135109
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certifi
 revocation-check none
 rsakeypair TP-self-signed-2174135109
!
!
crypto pki certificate chain TP-self-signed-2174135109
 certificate self-signed 01
 30820255 308201BE A0030201 02020101 300D0609 2A864886 F70D0101 04050030
 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
 69666963 6174652D 32313734 31333531 3039301E 170D3039 31313233 32323034
 31355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 31373431
 33353130 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
 8100D91C E37CDA86 34963F91 600F3D73 69A53D76 4B5EFAAA 64E15444 8B9138DA
 0CA207BD 87FB2F56 4DBA5E5A F183E280 F172E404 1109ECCB 7BC4E8F0 BCDECCA0
 24657BC8 A70E1FB2 D9073B0A E46C18C2 66CC560C 1F1D6ECD A4F61450 32CE5B69
 5840C2E8 5FF908ED 7213ED40 90DE9547 3F791C1E 937486AD B674B211 201DF87A
 8F870203 010001A3 7D307B30 0F060355 1D130101 FF040530 030101FF 30280603
 551D1104 21301F82 1D484447 43415252 30312E63 65732D63 6F6D7061 6E696573
 2E6C6F63 616C301F 0603551D 23041830 168014C6 F961D557 C471AAF2 833AC132
 6CF8974D 954DDE30 1D060355 1D0E0416 0414C6F9 61D557C4 71AAF283 3AC1326C
 F8974D95 4DDE300D 06092A86 4886F70D 01010405 00038181 001704EA 5C6DB9A9
 E2F6241D E327080B 938A125F 5071F89A 08C97102 B32D15A0 1225237B 32AB5C75
 BB3B7127 2307FBC9 26186997 38E89656 F60DAFF0 6C212B93 90C1A022 D7C6C095
 1F0A1EA8 454ED267 0F01386B 315D47E2 9889E07D 66D66E6F 3B240A7E 3A688B85
 573EE0B1 5872FCF6 DB02EF95 A56E1963 8392EF7A F18B8644 1E
    quit
ip source-route
!
!
ip dhcp excluded-address 10.1.1.1 10.1.1.149
ip dhcp excluded-address 10.1.1.200 10.1.1.255
!
ip dhcp pool HDGDhcpPool
  network 10.1.1.0 255.255.255.0
  domain-name ces-companies.local
  dns-server 10.0.1.11 10.0.1.25
  default-router 10.1.1.1
!
!
ip cef
no ip domain lookup
ip domain name ces-companies.local
no ipv6 cef
!
!
multilink bundle-name authenticated
!
!
username admin privilege 15
!
!
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key hdgcarr01_ceshour01 address 38.110.192.154
!
!
crypto ipsec transform-set ceswanvpn esp-3des esp-sha-hmac
 mode transport
!
crypto map cesvpn 10 ipsec-isakmp
 ! Incomplete
 description ***To ceshour01***
 set peer 38.110.192.154
 set transform-set ceswanvpn
!
archive
 log config
 hidekeys
!
!
!
track 1 ip sla 1 reachability
!
track 2 ip sla 2 reachability
!
track 3 ip sla 3 reachability
!
track 4 ip sla 4 reachability
!
!
!
interface Loopback0
 ip address 10.0.29.3 255.255.255.255
 ip flow ingress
 ip flow egress
!
interface Tunnel1
 description ***To ceshour01***
 bandwidth 768
 ip address 10.0.30.2 255.255.255.252
 ip mtu 1440
 ip tcp adjust-mss 1360
 tunnel source 75.17.38.121
 tunnel destination 38.110.192.154
!
interface BRI0
 no ip address
 encapsulation hdlc
 shutdown
 isdn termination multidrop
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
 no ip address
 duplex auto
 speed auto
!
interface GigabitEthernet0
 description $ES_WAN$
 ip address 108.221.240.113 255.255.255.248
 ip access-group internet-inbound in
 no ip proxy-arp
 ip flow ingress
 ip flow egress
 ip nat inside
 ip virtual-reassembly
 duplex full
 speed auto
crypto map cesvpn
!
interface Vlan1
 description *** HDGCAR Lan ***
 ip address 10.1.1.1 255.255.255.0
 ip tcp adjust-mss 1452
!
router eigrp 11
 passive-interface default
 no passive-interface Tunnel1
 network 10.0.0.0
 distribute-list 1 out Tunnel1
 no auto-summary
!
ip forward-protocol nd
ip route 38.110.192.154 255.255.255.255 75.17.38.126
ip route 38.112.166.0 255.255.255.0 75.17.38.126
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
!
ip access-list extended ceshour01
 permit gre host 75.17.38.121 host 38.110.192.154
!
ip sla 1
 icmp-echo 38.110.192.154 source-interface GigabitEthernet0
 frequency 5
ip sla schedule 1 life forever start-time now
ip sla 2
 icmp-echo 10.0.1.51 source-interface Vlan1
 frequency 5
ip sla schedule 2 life forever start-time now
ip sla 3
 icmp-echo 10.0.1.52 source-interface Vlan1
 frequency 5
ip sla schedule 3 life forever start-time now
ip sla 4
 icmp-echo 10.0.1.55 source-interface Vlan1
 frequency 5
ip sla schedule 4 life forever start-time now
logging history size 500
logging trap warnings
logging source-interface Loopback0
logging 10.1.1.10
access-list 1 permit 10.0.29.3
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 105 permit gre host 38.110.192.154 host 75.17.38.121
snmp-server community CES_31 RO
snmp-server ifindex persist
snmp-server trap-source Loopback0
snmp-server system-shutdown
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vrrp
snmp-server enable traps tty
snmp-server enable traps eigrp
snmp-server enable traps license
snmp-server enable traps ethernet cfm cc mep-up mep-down cross-connect loop conf
ig
snmp-server enable traps ethernet cfm crosscheck mep-missing mep-unknown service
-up
snmp-server enable traps envmon
snmp-server enable traps isdn call-information
snmp-server enable traps isdn layer2
snmp-server enable traps isdn chan-not-avail
snmp-server enable traps isdn ietf
snmp-server enable traps aaa_server
snmp-server enable traps bgp
snmp-server enable traps bulkstat collection transfer
snmp-server enable traps cnpd
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps fru-ctrl
snmp-server enable traps resource-policy
snmp-server enable traps event-manager
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps hsrp
snmp-server enable traps ipmulticast
snmp-server enable traps msdp
snmp-server enable traps mvpn
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface-old
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-messa
ge
snmp-server enable traps pppoe
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps syslog
snmp-server enable traps l2tun session
snmp-server enable traps l2tun pseudowire status
snmp-server enable traps vtp
snmp-server enable traps pw vc
snmp-server enable traps firewall serverstatus
snmp-server enable traps ipmobile
snmp-server enable traps isakmp policy add
snmp-server enable traps isakmp policy delete
snmp-server enable traps isakmp tunnel start
snmp-server enable traps isakmp tunnel stop
snmp-server enable traps ipsec cryptomap add
snmp-server enable traps ipsec cryptomap delete
snmp-server enable traps ipsec cryptomap attach
snmp-server enable traps ipsec cryptomap detach
snmp-server enable traps ipsec tunnel start
snmp-server enable traps ipsec tunnel stop
snmp-server enable traps ipsec too-many-sas
snmp-server host 10.0.1.14 CES_31
snmp-server host 10.0.1.23 CES_31
snmp-server host 10.1.1.10 CES_31
no cdp run
!
!
!
!
!
!
!
control-plane
!
banner exec ^CCC
**************************
* This system is for the use of authorized personnel only. Â *
* Individuals using this system without authority, or    *
* in excess of their authority, are subject to having    *
* all of their activities on this system monitored and    *
* recorded by system personnel. Â If such monitoring reveals *
* possible evidence of criminal activity, system personnel  *
* may provide the evidence of such monitoring to law     *
* enforcement officials. Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â *
**************************
^C
banner login ^CCC
**************************
* This system is for the use of authorized personnel only. Â *
* Individuals using this system without authority, or    *
* in excess of their authority, are subject to having    *
* all of their activities on this system monitored and    *
* recorded by system personnel. Â If such monitoring reveals *
* possible evidence of criminal activity, system personnel  *
* may provide the evidence of such monitoring to law     *
* enforcement officials. Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â *
**************************
^C
!
line con 0
 password 7
 login
line aux 0
line vty 0 4
 privilege level 15
 password 7
 login
 transport input telnet
line vty 5 15
 privilege level 15
 password 7
 login
 transport input telnet
!
scheduler max-task-time 5000
event manager applet TRACK
 event track 1 state down
 action 1.0 syslog msg "NOT REACHABLE"
event manager applet TRACK1
 event track 1 state up
 action 1.0 syslog msg "REACHABLE"
event manager applet TRACK-TS2d
 event track 2 state down
 action 1.0 syslog msg "TS2 NOT REACHABLE"
event manager applet TRACK-TS2r
 event track 2 state up
 action 1.0 syslog msg "TS2 REACHABLE"
event manager applet TRACK-TS3d
 event track 3 state down
 action 1.0 syslog msg "TS3 NOT REACHABLE"
event manager applet TRACK-TS3r
 event track 3 state up
 action 1.0 syslog msg "TS3 REACHABLE"
event manager applet TRACK-TSNLBd
 event track 4 state down
 action 1.0 syslog msg "TSNLB NOT REACHABLE"
event manager applet TRACK-TSNLBr
 event track 4 state up
 action 1.0 syslog msg "TSNLB REACHABLE"
!
end

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
 no ip nat inside
Still able to ping .118 from the router, but not from the computer.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Can the PC ping 10.1.1.1?
The PC is able to ping 10.1.1.1.
The PC is not able to ping .118 address. Â The Cisco Router is able to ping the .118 address.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
The Cisco Router was working when we had an ADSL line. Â It stops working when we upgrade from ADSL to U-Verse and were given a different modem.
I also tried to set the AT&T box to "Passthrough Mode" (similar to bridging), and set the Cisco Int g0 for dhcp. Â When I did that, the Int g0 got an address of 108.212.174.152 (which is the WAN address of the AT&T box). Â still no luck.
 access-list 1 permit 10.0.0.0 0.255.255.255
ip nat inside source list 1 int g0 overload
int g0
 ip nat outside
int vlan 1
 ip nat inside
I was able to ping the .118 address from the CPU. Â I am now able to access the AT&T box from the CPU connecting to the CIsco box.
I still have ONE problem: Â I am still not able to get Internet access from the CPU. Â When I am trying to ping yahoo.com (both the name and its IP address), I am getting a timeout. Â However, if I log into the AT&T Box's interface (108.221.240.118), I am able to ping yahoo.com from their Diagnostic screen.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I don't know what you mean by this. What's the "CPU"?
But when I try to access the world wide web from my computer, I am not able to.
From the router CLI, verify that you can ping an outside IP address like 74.125.225.16 (google) or 98.139.180.147 (yahoo).
If you haven't already done so, put the AT&T box back into the mode it was in before (earlier, you put it in passthrough mode). If you have put it back, verify that.
And post the current configuration of the router (use the "code" feature below).






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
I am not able to ping an outside IP address from the router CLI.
I will post the following: 1)Current running-config 2) show ip int brief 3) AT&T box's configuration 4) Screenshot of AT&T Box and Cisco CLI pinging an outside IP address.
1)
HDGCARR01#show running-config
Building configuration...
Current configuration : 10922 bytes
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption!
hostname HDGCARR01
boot-start-marker
boot-end-marker
logging exception 8192
logging message-counter syslog
logging buffered 16777216
no logging console
enable secret 5
enable password 7
no aaa new-model
crypto pki trustpoint TP-self-signed-2174135109
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certifi
 revocation-check none
 rsakeypair TP-self-signed-2174135109
crypto pki certificate chain TP-self-signed-2174135109
 certificate self-signed 01
 30820255 308201BE A0030201 02020101 300D0609 2A864886 F70D0101 04050030
    quit
ip source-route
ip dhcp excluded-address 10.1.1.1 10.1.1.149
ip dhcp excluded-address 10.1.1.200 10.1.1.255
ip dhcp pool HDGDhcpPool
  network 10.1.1.0 255.255.255.0
  domain-name ces-companies.local
  dns-server 10.0.1.11 10.0.1.25
  default-router 10.1.1.1
ip cef
no ip domain lookup
ip domain name ces-companies.local
no ipv6 cef
multilink bundle-name authenticated
username admin privilege 15 secret 5
crypto isakmp policy 10
 authentication pre-share
crypto isakmp key hdgcarr01_ceshour01 address 38.110.192.154
crypto ipsec transform-set ceswanvpn esp-3des esp-sha-hmac
 mode transport
crypto map cesvpn 10 ipsec-isakmp
 ! Incomplete
 description ***To ceshour01***
 set peer 38.110.192.154
 set transform-set ceswanvpn
archive
 log config
 hidekeys
track 1 ip sla 1 reachability
track 2 ip sla 2 reachability
track 3 ip sla 3 reachability
track 4 ip sla 4 reachability
interface Loopback0
 ip address 10.0.29.3 255.255.255.255
 ip flow ingress
 ip flow egress
interface Tunnel1
 description ***To ceshour01***
 bandwidth 768
 ip address 10.0.30.2 255.255.255.252
 ip mtu 1440
 ip tcp adjust-mss 1360
 tunnel source 75.17.38.121
 tunnel destination 38.110.192.154
interface BRI0
 no ip address
 encapsulation hdlc
 shutdown
 isdn termination multidrop
interface FastEthernet0
interface FastEthernet1
interface FastEthernet2
interface FastEthernet3
interface FastEthernet4
interface FastEthernet5
interface FastEthernet6
interface FastEthernet7
interface FastEthernet8
 no ip address
 duplex auto
 speed auto
interface GigabitEthernet0
 description $ES_WAN$
 ip address 108.221.240.113 255.255.255.248
 ip access-group internet-inbound in
 no ip proxy-arp
 ip flow ingress
 ip flow egress
 ip nat outside
 ip virtual-reassembly
 duplex full
 speed auto
 crypto map cesvpn
interface Vlan1
 description *** HDGCAR Lan ***
 ip address 10.1.1.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 ip tcp adjust-mss 1452
interface Group-Async0
 physical-layer async
 no ip address
 encapsulation slip
 no group-range
router eigrp 11
 passive-interface default
 no passive-interface Tunnel1
 network 10.0.0.0
 distribute-list 1 out Tunnel1
 no auto-summary
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 108.221.240.118
ip route 38.110.192.154 255.255.255.255 75.17.38.126
ip route 38.112.166.0 255.255.255.0 75.17.38.126
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 1 interface GigabitEthernet0 overload
ip access-list extended ceshour01
 permit gre host 75.17.38.121 host 38.110.192.154
ip sla 1
 icmp-echo 38.110.192.154 source-interface GigabitEthernet0
 frequency 5
ip sla schedule 1 life forever start-time now
ip sla 2
 icmp-echo 10.0.1.51 source-interface Vlan1
 frequency 5
ip sla schedule 2 life forever start-time now
ip sla 3
 icmp-echo 10.0.1.52 source-interface Vlan1
 frequency 5
ip sla schedule 3 life forever start-time now
ip sla 4
 icmp-echo 10.0.1.55 source-interface Vlan1
 frequency 5
ip sla schedule 4 life forever start-time now
logging history size 500
logging trap warnings
logging source-interface Loopback0
logging 10.1.1.10
access-list 1 permit 10.0.29.3
access-list 1 permit 10.1.1.0 0.0.0.255
access-list 1 permit 10.0.0.0 0.255.255.255
access-list 105 permit gre host 38.110.192.154 host 75.17.38.121
snmp-server community CES_31 RO
snmp-server ifindex persist
snmp-server trap-source Loopback0
snmp-server system-shutdown
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vrrp
snmp-server enable traps tty
snmp-server enable traps eigrp
snmp-server enable traps license
snmp-server enable traps ethernet cfm cc mep-up mep-down cross-connect loop config
snmp-server enable traps ethernet cfm crosscheck mep-missing mep-unknown service-up
snmp-server enable traps envmon
snmp-server enable traps isdn call-information
snmp-server enable traps isdn layer2
snmp-server enable traps isdn chan-not-avail
snmp-server enable traps isdn ietf
snmp-server enable traps aaa_server
snmp-server enable traps bgp
snmp-server enable traps bulkstat collection transfer
snmp-server enable traps cnpd
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps fru-ctrl
snmp-server enable traps resource-policy
snmp-server enable traps event-manager
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps hsrp
snmp-server enable traps ipmulticast
snmp-server enable traps msdp
snmp-server enable traps mvpn
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface-old
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message
snmp-server enable traps pppoe
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps syslog
snmp-server enable traps l2tun session
snmp-server enable traps l2tun pseudowire status
snmp-server enable traps vtp
snmp-server enable traps pw vc
snmp-server enable traps firewall serverstatus
snmp-server enable traps ipmobile
snmp-server enable traps isakmp policy add
snmp-server enable traps isakmp policy delete
snmp-server enable traps isakmp tunnel start
snmp-server enable traps isakmp tunnel stop
snmp-server enable traps ipsec cryptomap add
snmp-server enable traps ipsec cryptomap delete
snmp-server enable traps ipsec cryptomap attach
snmp-server enable traps ipsec cryptomap detach
snmp-server enable traps ipsec tunnel start
snmp-server enable traps ipsec tunnel stop
snmp-server enable traps ipsec too-many-sas
snmp-server host 10.0.1.14 CES_31
snmp-server host 10.0.1.23 CES_31
snmp-server host 10.1.1.10 CES_31
no cdp run
control-plane
banner exec ^CCC
**************************
* This system is for the use of authorized personnel only. Â *
* Individuals using this system without authority, or    *
banner login ^CCC
**************************
* This system is for the use of authorized personnel only. Â *
^C
line con 0
 password 7
 login
line aux 0
line vty 0 4
 privilege level 15
 password 7
 login
 transport input telnet
line vty 5 15
 privilege level 15
 password 7
 login
 transport input telnet
scheduler max-task-time 5000
event manager applet TRACK
 event track 1 state down
 action 1.0 syslog msg "NOT REACHABLE"
event manager applet TRACK1
 event track 1 state up
 action 1.0 syslog msg "REACHABLE"
event manager applet TRACK-TS2d
 event track 2 state down
 action 1.0 syslog msg "TS2 NOT REACHABLE"
event manager applet TRACK-TS2r
 event track 2 state up
 action 1.0 syslog msg "TS2 REACHABLE"
event manager applet TRACK-TS3d
 event track 3 state down
 action 1.0 syslog msg "TS3 NOT REACHABLE"
event manager applet TRACK-TS3r
 event track 3 state up
 action 1.0 syslog msg "TS3 REACHABLE"
event manager applet TRACK-TSNLBd
line con 0
 password 7
 login
line aux 0
line vty 0 4
 privilege level 15
 password 7
 login
 transport input telnet
line vty 5 15
 privilege level 15
 password 7
 login
 transport input telnet
scheduler max-task-time 5000
event manager applet TRACK
 event track 1 state down
 action 1.0 syslog msg "NOT REACHABLE"
event manager applet TRACK1
 event track 1 state up
 action 1.0 syslog msg "REACHABLE"
event manager applet TRACK-TS2d
 event track 2 state down
 action 1.0 syslog msg "TS2 NOT REACHABLE"
event manager applet TRACK-TS2r
 event track 2 state up
 action 1.0 syslog msg "TS2 REACHABLE"
event manager applet TRACK-TS3d
 event track 3 state down
 action 1.0 syslog msg "TS3 NOT REACHABLE"
event manager applet TRACK-TS3r
 event track 3 state up
 action 1.0 syslog msg "TS3 REACHABLE"
event manager applet TRACK-TSNLBd
 event track 4 state down
 action 1.0 syslog msg "TSNLB NOT REACHABLE"
event manager applet TRACK-TSNLBr
 event track 4 state up
 action 1.0 syslog msg "TSNLB REACHABLE"
end
HDGCARR01#
2)
HDGCARR01#show ip int brief
Interface          IP-Address    OK? Method Status         Protocol
BRI0            unassigned    YES NVRAM  administratively down down
BRI0:1           unassigned    YES unset  administratively down down
BRI0:2           unassigned    YES unset  administratively down down
FastEthernet0        unassigned    YES unset  up           down
FastEthernet1        unassigned    YES unset  up           down
FastEthernet2        unassigned    YES unset  up           down
FastEthernet3        unassigned    YES unset  up           up
FastEthernet4        unassigned    YES unset  up           down
FastEthernet5        unassigned    YES unset  up           down
FastEthernet6        unassigned    YES unset  up           down
FastEthernet7        unassigned    YES unset  up           down
FastEthernet8        unassigned    YES NVRAM  up           down
GigabitEthernet0      108.221.240.113 YES NVRAM  up           down
Group-Async0        unassigned    YES NVRAM  down          down
Loopback0          10.0.29.3    YES NVRAM  up           up
NVI0            108.221.240.113 YES unset  up           up
SSLVPN-VIF0         unassigned    NO  unset  up           up
Tunnel1           10.0.30.2    YES NVRAM  up           down
Vlan1            10.1.1.1     YES NVRAM  up           up
HDGCARR01#
3)
To get this working requires an understanding of how the AT&T device is behaving. Which can be difficult.
Try this: Configure the G0 interface of the router to get an IP address with DHCP.
After setting the G0 interface to get DHCP, the AT&T box assigned it 108.221.240.113 (which is one of the 5 available static IP given to us). Â I release and renew the IP address and keeps getting the same IP address via DHCP. Â But still not able to ping outside IP address.
You were right about that this has something to do with the way the AT&T device is behaving. Â After many hours on the phone with AT&T Tier 1 and Tier 2 Support, they claimed that it has something to do with the Cisco Router. Â After a closer look at the AT&T box, I was kind of confuse to why the box has a 192.168.1.254 as the "Device IPv4 Address" and the "Public IPv4 address" was set to 108.221.240.118. Â Even though the AT&T box is given out the address of 108.221.240.113 -117 via DHCP, I was able to access the AT&T box via 192.168.1.254.
Going against what AT&T's support was telling me, I turned off the "Public Subnet". Â After this, the g0 interface is receiving an IP address of 192.168.1.100 via DHCP from the AT&T box. Â Now I am able to ping outside IP address and now able to access the internet via the Cisco Router.
Thank you for all your help DONJOHNSTON. Â You were able to help guide me in getting the CIsco router to talk to the AT&T box and then finally internet access.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I am assuming that I will need to change the old host IP address to the new one. Â Do I need to log into my corporate Router and add somekind of command to allow the new IP address to get through?






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
The WAN Broadband Address is 108.212.174.152.
The Gateway address I used for the U-Verse Box is 108.221.240.118.
The IP address I assigned to the G0 interface is 108.221.240.113.
I have changed the Cisco Router int Tunnel1 Source IP from 75.17.38.121 (the old IP address) to the 108.221.240.113 (the new int G0 IP address).
I have changed our Corporate Router int Tunnel1 Destination IP from 75.17.38.121 to the 108.221.240.113.
So far, I am not able to ping the tunnel interface of the other. Â Just wondering maybe I need to use the Broadband WAN IP address instead of the Int GO IP address.
And PLEASE, when posting full configurations, use the "code" feature below the comment box. It makes it much easier to review the thread.
HDGCARR01#show ip int brief
Interface IP-Address OK? Method Status Prot
ocol
BRI0 unassigned YES NVRAM administratively down down
BRI0:1 unassigned YES unset administratively down down
BRI0:2 unassigned YES unset administratively down down
FastEthernet0 unassigned YES unset up down
FastEthernet1 unassigned YES unset down down
FastEthernet2 unassigned YES unset up down
FastEthernet3 unassigned YES unset up up
FastEthernet4 unassigned YES unset up down
FastEthernet5 unassigned YES unset up down
FastEthernet6 unassigned YES unset up down
FastEthernet7 unassigned YES unset up down
FastEthernet8 unassigned YES NVRAM up down
GigabitEthernet0 108.221.240.113 YES manual up up
Group-Async0 unassigned YES NVRAM down down
Loopback0 10.0.29.3 YES NVRAM up up
NVI0 108.221.240.113 YES unset up up
SSLVPN-VIF0 unassigned NO unset up up
Tunnel1 10.0.30.2 YES manual up up
Virtual-Access1 unassigned YES TFTP down down
Virtual-Access2 unassigned YES unset down down
Vlan1 10.1.1.1 YES NVRAM up up
HDGCARR01#

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
The destination of the corporate's tunnel is 38.110.192.154. Â
I am not able to ping 38.110.192.154 from this field office's router. Â I am not able to ping 108.221.240.113 from the Corporate's router.
CESHOUR01#show ip int brief
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 10.0.1.225 YES NVRAM up up
FastEthernet0/1 38.110.192.154 YES NVRAM up up
NVI0 unassigned YES unset up up
Loopback0 10.0.29.1 YES NVRAM up up
Tunnel1 10.0.30.1 YES NVRAM up up
Tunnel11 10.0.30.5 YES NVRAM up up
Tunnel21 10.0.30.9 YES NVRAM up down
Tunnel31 10.0.30.17 YES NVRAM up up
I think that the reason why I am unable to establish a tunnel between HDGCARR01 to my Corporate Router is because I really do not have a static IP for the HDGCARR01 router. Â See if you can make sense of this: Â The field office is using an AT&T U-verse router NVG510; the NVG510 router has a Broadband IP address of 108.212.174.152 with a Gateway of 108.212.174.1; I was given 5 static IPs of 108.221.240.113 - .117 with a Gateway of 108.221.240.118; within the NVG510's interface configuration, it has a Private LAN Subnet which was originally set at 192.168.1.254, 255.255.255.0, ranges from .100 - .150; it also has a Public Subnet which I was told by AT&T is where I am suppose to put my five static IPs, so I put in 108.221.240.118 for the Public IPv4 Address, mask of 255.255.255.248, from .113 - .117, and I set the Primary DHCP Pool to Public (this means the NVG510 router will give out IP address from .113 - .117); if I set the Primary DHCP Pool from Public to Private then it will gives out IP address in the 192.168.1.100 - .150 range. Â With the current setup, before putting in the Cisco Router, if I connect my Computer directly to the NVG510 router, set IP to Obtain Automatically, I will get an IP address in the 108.221.240.113 - .117 range. Â WIth this current configuration, I can ping and access the NVG510 router, but I am unable to ping any outside IP address nor I am able to access the World Wide Web (call AT&T support, and they can't explain why either, and they told me that they don't support this, which is hilarious considering that this is the service they are offering to business); Â the only way I can access the internet is if I Turn Off the Public Subnet and use the Private LAN Subnet.
As we speak, the current setup I have right now is: I have turned off the Public Subnet, therefore I am only using the Private LAN Subnet ( in this case, you can set your Private LAN Subnet to anything; I can use the 192.168.1.x address or I can put in 108.221.240.xxx addresses because this is just basically a LAN setting now.) Â
So, basically, the Cisco G0 interface is really using a DHCP address from the LAN configuration of the NVG510 router. Â The 5 static IPs that was given to me is useless right now because if I use that feature, I am unable to get out to the World Wide Web. Â So when I set my tunnel from 108.221.240.113 to my corporate router ip, I am assuming that the 108.221.240.113 is not going to work because it is a LAN address and not a WAN address. Â If that is the case, what IP address or routing do I need to do on the Cisco to establish the VPN tunnel? Â I hope this kind of explains the AT&T router's behavior.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
108.221.240.113 is a public address. 38.110.192.154 is a public address. Once you determine why the two devices can't ping each other and fix it, then you'll have a tunnel.
So the question is why can't these two devices see each other?
And I think that I just figured that out.
Do this to the HDGCARR01 router:
no ip route 38.110.192.154 255.255.255.255 75.17.38.126
then try and ping the other router's public IP address.
The 108.221.240.113 is not a public address. Â To get the Internet working, I had to turn off the Public IP Subnet and had to use the Private IP Subnet. Â The Private IP Subnet was set to 192.168.1.254, but instead of changing the G0 Interface to the 192.168.1.x address, I change the 192.168.1.254 from the AT&T Private Subnet to 108.221.240.118. Â It's kind of confusing but bear with me. Â Basically, if I log back into the AT&T router and change the Private IPv4 address back to 192.168.1.254, 255.255.255.0, ranges from .100 -.150 and then change the G0 interface to get DHCP addresses, then I will be able to access the Internet the G0 interface IP of 192.168.1.100, gateway of 192.168.1.254.
The 108.221.240.113 address is suppose to be public if I enable the Public Subnet (I have attach a screenshot of what the router's interface looks like). Â In another words, the 108.221.240 .113 is a local IP address of the AT&T router and not a public IP address. Â It would be a public IP address if I enable the Public Subnet.
AT&T router gives me DHCP addresses locally and I configure my cisco interface G0 to get DHCP addresses from the AT&T router. Â I connect a computer to my Cisco router and get a 10.1.1.x address. Â I am able to access the Internet from my computer because I configure Cisco to route all local traffic to the G0 interface. Â
So the issue would be how to setup a tunnel using this configuration. Â I am still trying to find a way to bridge the AT&T router to the Cisco Router so that the Cisco G0 will get the WAN IP address.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Pro Inside global Inside local Outside local Outside global
icmp 108.221.240.113:2 10.1.1.1:2 10.0.1.51:2 10.0.1.51:2
icmp 108.221.240.113:3 10.1.1.1:3 10.0.1.52:3 10.0.1.52:3
icmp 108.221.240.113:4 10.1.1.1:4 10.0.1.55:4 10.0.1.55:4
tcp 108.221.240.113:4720 10.1.1.10:4720 216.219.113.250:8200 216.219.113.250:8200
tcp 108.221.240.113:4721 10.1.1.10:4721 68.64.24.250:8200 68.64.24.250:8200
tcp 108.221.240.113:4722 10.1.1.10:4722 216.219.112.250:8200 216.219.112.250:8200
tcp 108.221.240.113:4724 10.1.1.10:4724 216.115.218.197:8200 216.115.218.197:8200
tcp 108.221.240.113:4730 10.1.1.10:4730 216.115.218.197:8200 216.115.218.197:8200
tcp 108.221.240.113:4734 10.1.1.10:4734 216.115.218.197:8200 216.115.218.197:8200
udp 108.221.240.113:49274 10.1.1.150:49274 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:49430 10.1.1.150:49430 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:49760 10.1.1.150:49760 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:50383 10.1.1.150:50383 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:50652 10.1.1.150:50652 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:50826 10.1.1.150:50826 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:51029 10.1.1.150:51029 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:51378 10.1.1.150:51378 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:52418 10.1.1.150:52418 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:52687 10.1.1.150:52687 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:52774 10.1.1.150:52774 108.221.240.118:53 108.221.240.118:53
udp 108.221.240.113:54020 10.1.1.150:54020 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:54140 10.1.1.150:54140 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:54473 10.1.1.150:54473 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:55929 10.1.1.150:55929 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:56638 10.1.1.150:56638 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:56689 10.1.1.150:56689 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:56999 10.1.1.150:56999 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:57034 10.1.1.150:57034 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:58012 10.1.1.150:58012 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:58184 10.1.1.150:58184 68.94.156.1:53 68.94.156.1:53
tcp 108.221.240.113:58411 10.1.1.150:58411 10.0.3.12:80 10.0.3.12:80
tcp 108.221.240.113:58414 10.1.1.150:58414 10.0.3.12:80 10.0.3.12:80
tcp 108.221.240.113:58416 10.1.1.150:58416 108.221.240.118:80 108.221.240.118:80
udp 108.221.240.113:58580 10.1.1.150:58580 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:59048 10.1.1.150:59048 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:59699 10.1.1.150:59699 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:59935 10.1.1.150:59935 108.221.240.118:53 108.221.240.118:53
udp 108.221.240.113:60060 10.1.1.150:60060 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:60089 10.1.1.150:60089 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:60960 10.1.1.150:60960 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:61282 10.1.1.150:61282 10.0.1.31:161 10.0.1.31:161
udp 108.221.240.113:62117 10.1.1.150:62117 108.221.240.118:53 108.221.240.118:53
udp 108.221.240.113:62389 10.1.1.150:62389 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:63019 10.1.1.150:63019 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:63677 10.1.1.150:63677 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:63730 10.1.1.150:63730 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:63883 10.1.1.150:63883 68.94.156.1:53 68.94.156.1:53
udp 108.221.240.113:64053 10.1.1.150:64053 68.94.156.1:53 68.94.156.1:53
HDGCARR01#trace 38.110.192.154
Type escape sequence to abort.
Tracing the route to 38.110.192.154
1 108.221.240.118 4 msec 0 msec 0 msec
2 108.212.172.2 8 msec 8 msec 8 msec
3 71.150.32.70 8 msec 8 msec 8 msec
4 71.150.32.130 8 msec 8 msec 8 msec
5 * * *
6 12.83.42.153 8 msec 12 msec 8 msec
7 12.122.139.17 20 msec 20 msec 16 msec
8 * * *
9 154.54.6.53 36 msec 36 msec 40 msec
10 154.54.25.214 36 msec
154.54.3.178 40 msec
154.54.24.25 36 msec
11 154.54.3.154 36 msec 48 msec 36 msec
12 66.28.6.210 40 msec 36 msec 40 msec
13 38.104.62.134 36 msec 40 msec 40 msec
14 * * *
15 * * *
16 * * *
17 * * *
18 * * *
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
HDGCARR01#
CESHOUR01#trace 108.221.240.113
Type escape sequence to abort.
Tracing the route to 108-221-240-113.lightspeed.mssnks.sbcglobal.net (108.221.240.113)
1 38.110.192.153 0 msec 0 msec 0 msec
2 fa0-5.na01.b000889-0.iah02.atlas.cogentco.com (38.104.62.133) 0 msec 4 msec 0 msec
3 te4-4.3503.ccr01.iah02.atlas.cogentco.com (66.28.6.209) 4 msec 0 msec 4 msec
4 te0-2-0-4.ccr21.iah01.atlas.cogentco.com (154.54.3.149) 0 msec 0 msec
te0-2-0-4.ccr22.iah01.atlas.cogentco.com (154.54.3.153) 4 msec
5 te0-0-0-6.ccr22.dfw01.atlas.cogentco.com (154.54.3.177) 20 msec
te0-2-0-6.ccr21.dfw01.atlas.cogentco.com (154.54.1.73) 8 msec
te0-3-0-5.ccr22.dfw01.atlas.cogentco.com (154.54.24.26) 20 msec
6 te0-0-0-1.ccr21.mci01.atlas.cogentco.com (154.54.46.185) 16 msec
te0-2-0-3.ccr21.mci01.atlas.cogentco.com (154.54.5.170) 16 msec
te0-1-0-1.ccr22.mci01.atlas.cogentco.com (154.54.46.209) 20 msec
7 te0-0-0-3.ccr22.ord01.atlas.cogentco.com (154.54.30.102) 28 msec
te0-3-0-2.ccr21.ord01.atlas.cogentco.com (154.54.2.190) 28 msec
te0-1-0-2.ccr21.ord01.atlas.cogentco.com (154.54.25.82) 32 msec
8 te0-5-0-7.ccr22.ord03.atlas.cogentco.com (154.54.44.166) 28 msec
te0-0-0-7.ccr22.ord03.atlas.cogentco.com (154.54.6.210) 28 msec
te0-1-0-3.ccr22.ord03.atlas.cogentco.com (154.54.1.2) 28 msec
9 192.205.37.173 76 msec 28 msec 32 msec
10 cr2.cgcil.ip.att.net (12.122.84.94) 32 msec 36 msec 36 msec
11 cr2.sl9mo.ip.att.net (12.122.2.22) 36 msec 32 msec 36 msec
12 cr2.kc9mo.ip.att.net (12.122.28.89) 32 msec 32 msec 32 msec
13 12.122.150.197 60 msec 28 msec 28 msec
14 * * *
15 * * *
16 * * *
17 * * *
18 108-212-174-152.lightspeed.mssnks.sbcglobal.net (108.212.174.152) 36 msec 36 msec 36 msec
19 * * *
20 * * *
21 * * *
22 * * *
23 * * *
24 * * *
25 * * *
26 * * *
27 * * *
28 * * *
29 * * *
30 * * *
CESHOUR01#






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Routers
--
Questions
--
Followers
Top Experts
A router is a networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet. The most familiar type of routers are home and small office cable or DSL routers that simply pass data, such as web pages, email, IM, and videos between computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.