Ti suggerisco di impostare un IP SLA che ogni tot minuti ti faccia un ping per farti salire il dialer
Saluti
            
			
									
									1841 e scheda UMTS
Moderatore: Federico.Lagni
- Francesco87
- Cisco fan
- Messaggi: 59
- Iscritto il: mar 10 apr , 2007 9:13 am
- Località: Ethernet 0/0
Ciao All,
dovrei comprare un Cisco 881 per realizzare una connettività 3g di backup. Mi sono documentato un po' e dalla documentazione risulta che è possibile creare il "modem profile" in due modalità diverse. Cito:
•To configure your GSM data profile, you will need the following information from your service provider:
–Username
–Password
–Access point name (APN)
•To configure your CDMA data profile for manual activation, you need the following information from your service provider:
–Master Subsidy Lock (MSL) number
–Mobile Directory number (MDN)
–Mobile Station Identifier (MSID)
–Electronic Serial Number (ESN)
Qualcuno ha idea di quale sia la differenza o quale sia quello da utilizzare per l'italia?
Grazie
Saluti
Francesco
            
			
									
									dovrei comprare un Cisco 881 per realizzare una connettività 3g di backup. Mi sono documentato un po' e dalla documentazione risulta che è possibile creare il "modem profile" in due modalità diverse. Cito:
•To configure your GSM data profile, you will need the following information from your service provider:
–Username
–Password
–Access point name (APN)
•To configure your CDMA data profile for manual activation, you need the following information from your service provider:
–Master Subsidy Lock (MSL) number
–Mobile Directory number (MDN)
–Mobile Station Identifier (MSID)
–Electronic Serial Number (ESN)
Qualcuno ha idea di quale sia la differenza o quale sia quello da utilizzare per l'italia?
Grazie
Saluti
Francesco
The netmask in Cisco access lists are inverted. Nobody knows why, they just are.
						- 
				KalTorak
- n00b
- Messaggi: 14
- Iscritto il: mar 30 mar , 2010 11:12 pm
Ho l'idea di utilizzare l'umts come backup per un adsl nel caso ci siano problemi con la linea adsl, 1841 con wic adsl e wic umts.
I pro possono essere rispetto al backup isdn la mancanza del canone e la velocità più elevata
Teoricamente se usato come backup non genera traffico quando l'adsl è in funzione.
Contro: ci possono essere problemi nel cambio di nat quando entra in gioco l'umts?
es translation adsl che restano in gioco
            
			
									
									
						I pro possono essere rispetto al backup isdn la mancanza del canone e la velocità più elevata
Teoricamente se usato come backup non genera traffico quando l'adsl è in funzione.
Contro: ci possono essere problemi nel cambio di nat quando entra in gioco l'umts?
es translation adsl che restano in gioco
- zot
- Messianic Network master
- Messaggi: 1274
- Iscritto il: mer 17 nov , 2004 1:13 am
- Località: Teramo
- Contatta:
In uscita ti basta giocare con le route-map,in entrata devi aspettare che il timeout NAT scada o crearti uno script ad hoc.
            
			
									
									
						- 
				mariofiorentino
- n00b
- Messaggi: 12
- Iscritto il: gio 31 gen , 2008 9:33 pm
- Contatta:
Buonasera ragazzi, avrei bisogno di configurare il mio cisco 887 con l'interfaccia UMTS, mi potreste gentilmente aiutarmi ? Il mio operatore è TIM. Di seguito la mia conf:
            
			
									
									- Building configuration...
 
 Current configuration : 6130 bytes
 !
 ! Last configuration change at 21:29:13 PCTime Fri Mar 8 2013 by admin
 version 15.1
 no service pad
 service timestamps debug datetime msec
 service timestamps log datetime msec
 no service password-encryption
 !
 hostname router
 !
 boot-start-marker
 boot-end-marker
 !
 !
 no logging buffered
 enable secret 5 $1$MJuQ$QjVcuMJSPmCVuE2cEkhWY.
 enable password _ucLQK9e
 !
 no aaa new-model
 !
 memory-size iomem 10
 clock timezone PCTime 1 0
 clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
 service-module wlan-ap 0 bootimage autonomous
 crypto pki token default removal timeout 0
 !
 crypto pki trustpoint TP-self-signed-3482365739
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-3482365739
 revocation-check none
 rsakeypair TP-self-signed-3482365739
 !
 !
 crypto pki certificate chain TP-self-signed-3482365739
 certificate self-signed 01
 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
 69666963 6174652D 33343832 33363537 3339301E 170D3133 30333032 32323434
 32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 34383233
 36353733 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
 8100B373 A3DB5205 69F65D8F 27B9CA5E 18B8769C CD2C3F2B 4FEE4C87 299D116D
 243D242F 33AE8C6C A1A71752 586DEC32 E1EFA571 50033408 F827C37E 5D3674CF
 3FB7223E A295D2AF 1226F551 3A2DC384 D7027BB9 C6FB2185 8F9947DB F4736435
 2A468720 C696194A 91DFECC2 21AFCEAA 1A1F19C0 FDF7DBEA E367768C D56177AB
 02690203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
 551D2304 18301680 144927BB 712CBBDD A0E7F669 62C52F84 D6F34047 BA301D06
 03551D0E 04160414 4927BB71 2CBBDDA0 E7F66962 C52F84D6 F34047BA 300D0609
 2A864886 F70D0101 05050003 81810006 D5EF93DC FB962105 BC9CA8B5 6CED0ECA
 E51740E3 2E5C15EA 08D8ED4A 18FC1190 559ADEAB 9FBB65D6 4A76C95A 5690C75D
 18EA991C EAB82460 17521ADB 2377E3CA 23EBE2AD 7904B764 07792DFA E97F54DB
 575AF277 6B8E9FF0 486CF835 0162A3AC 568424A3 5886DF5D F2CF035C C12EC3FD
 23E4D6CD 0519426E E70BE581 B1EB64
 quit
 ip source-route
 !
 !
 !
 ip dhcp excluded-address 192.168.0.1
 !
 ip dhcp pool ccp-pool1
 import all
 network 192.168.0.0 255.255.255.0
 dns-server 212.216.112.112 212.216.172.62
 default-router 192.168.0.1
 !
 !
 ip cef
 ip name-server 212.216.112.112
 ip name-server 212.216.172.62
 ip inspect name CCP_LOW dns
 ip inspect name CCP_LOW ftp
 ip inspect name CCP_LOW h323
 ip inspect name CCP_LOW sip
 ip inspect name CCP_LOW https
 ip inspect name CCP_LOW icmp
 ip inspect name CCP_LOW imap
 ip inspect name CCP_LOW pop3
 ip inspect name CCP_LOW netshow
 ip inspect name CCP_LOW rcmd
 ip inspect name CCP_LOW realaudio
 ip inspect name CCP_LOW rtsp
 ip inspect name CCP_LOW esmtp
 ip inspect name CCP_LOW sqlnet
 ip inspect name CCP_LOW streamworks
 ip inspect name CCP_LOW tftp
 ip inspect name CCP_LOW tcp
 ip inspect name CCP_LOW udp
 ip inspect name CCP_LOW vdolive
 no ipv6 cef
 !
 !
 multilink bundle-name authenticated
 license udi pid CISCO887GW-GN-E-K9 sn FCZ1521C28Z
 !
 !
 username admin privilege 15 secret 5 $1$MsL3$LTJALWmq5X55FfgPy20.u/
 !
 !
 !
 !
 controller Cellular 0
 !
 !
 !
 !
 !
 !
 !
 !
 interface ATM0
 mtu 1500
 no ip address
 no atm ilmi-keepalive
 !
 interface ATM0.1 point-to-point
 mtu 1500
 pvc 8/35
 encapsulation aal5mux ppp dialer
 dialer pool-member 1
 !
 !
 interface FastEthernet0
 no ip address
 !
 interface FastEthernet1
 no ip address
 shutdown
 !
 interface FastEthernet2
 no ip address
 shutdown
 !
 interface FastEthernet3
 no ip address
 shutdown
 !
 interface wlan-ap0
 description Service module interface to manage the embedded AP
 no ip address
 arp timeout 0
 !
 interface Wlan-GigabitEthernet0
 description Internal switch interface connecting to the embedded AP
 switchport mode trunk
 no ip address
 !
 interface Cellular0
 no ip address
 encapsulation ppp
 shutdown
 !
 interface Vlan1
 description $FW_INSIDE$
 ip address 192.168.0.1 255.255.255.0
 ip access-group 100 in
 ip nat inside
 ip virtual-reassembly in
 !
 interface Dialer0
 description $FW_OUTSIDE$
 ip address negotiated
 ip access-group 101 in
 ip nat outside
 ip inspect CCP_LOW out
 ip virtual-reassembly in
 encapsulation ppp
 dialer pool 1
 dialer-group 1
 ppp authentication pap callin
 ppp pap sent-username ivsfiore password 0 telecono
 !
 ip forward-protocol nd
 ip http server
 ip http authentication local
 ip http secure-server
 ip http timeout-policy idle 60 life 86400 requests 10000
 !
 !
 ip nat inside source list 1 interface Dialer0 overload
 ip route 0.0.0.0 0.0.0.0 Dialer0
 !
 access-list 1 remark INSIDE_IF=Vlan1
 access-list 1 remark CCP_ACL Category=2
 access-list 1 permit 192.168.0.0 0.0.0.255
 access-list 100 remark auto generated by CCP firewall configuration
 access-list 100 remark CCP_ACL Category=1
 access-list 100 deny ip host 255.255.255.255 any
 access-list 100 deny ip 127.0.0.0 0.255.255.255 any
 access-list 100 permit ip any any
 access-list 101 remark auto generated by CCP firewall configuration
 access-list 101 remark CCP_ACL Category=1
 access-list 101 permit udp host 212.216.172.62 eq domain any
 access-list 101 permit udp host 212.216.112.112 eq domain any
 access-list 101 deny ip 192.168.0.0 0.0.0.255 any
 access-list 101 permit icmp any any echo
 access-list 101 permit icmp any any time-exceeded
 access-list 101 permit icmp any any unreachable
 access-list 101 deny ip 10.0.0.0 0.255.255.255 any
 access-list 101 deny ip 172.16.0.0 0.15.255.255 any
 access-list 101 deny ip 192.168.0.0 0.0.255.255 any
 access-list 101 deny ip 127.0.0.0 0.255.255.255 any
 access-list 101 deny ip host 255.255.255.255 any
 access-list 101 deny ip host 0.0.0.0 any
 access-list 101 deny ip any any log
 dialer-list 1 protocol ip permit
 !
 !
 !
 !
 snmp-server community public RO
 !
 control-plane
 !
 !
 line con 0
 line aux 0
 line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 line 3
 no exec
 line vty 0 4
 privilege level 15
 password _ucLQK10e
 login local
 transport input telnet ssh
 transport output telnet ssh
 !
 ntp update-calendar
 end
Mario Fiorentino
						


