Basically what am I trying to do is establishing a PPPOE connection from our FW to Cisco 878, and get the public IP to the untrust interface of the FW. The interface of the FW of PPPoE(SSG520 - Netscreen) is quite simple..
But on the 878 bridging, I think I am failed :\
I know that these commands are used for briding...
no ip routing
Interface ethernet 0
Interface serial 0
bridge 1 protocol ieee
My questions are:
1) Which interfaces should I put in the "bridge-group 1" (My Fast ethernets are just switches, they are used in a VLAN) Dialer 0, VLAN 1, ATM 0, Virtual Teplates...etc??
2) Should I use the
"ppp pap sent-username MYUSERNAME password 0 MYPASSWORD" on the C878 to establish the connection or ommit it (to use in the FW) (without this command Virtual access is going up and down)
1- You are missing the command "bridge-group 1 route ip".
2- You will need to issue the command ppp pap sent-username x password x in case the ISP will authenticate your router. In normal cases, all ISPs authenticate the clients so you have to issue this command. One thing to check wheather your ISP is using PAP or CHAP as well. Chap commands are different:
PPP chap hostname x
PPP chap password x
4- You need to set an IP address on the FW same as the dialer interface and you should put the dialer androuter ethernet which is connected to the firewall in the bridge group.
I am trying to help as much as I can eventhough my knowledge is limited in bridging,
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...