We have serveral Cisco 3640 routers in use. Each router has 2 PRI interfaces for ISDN & analog (digital modems) for dial-in connections. Because we only allow VPN connections from the remote-users to our network, I've to protect the access router with ACL's allowing only ESP and IPSec/IKE passing through the router. Configuring the required ACL is not the problem for me. I'd like to set the ACL's to the WAN interfaces on the Ciso 3640. I've also to mention, that we use a dialer interfce per user. My question is, if I have to set the ACL to the physical E1/PRI interface of the access router or if I have to set the ACL on each dialer interface (ip access-group xxx in). Because we have quit a lot dialer interfaces in use (>100), it would be easier to set the ACL on the E1/PRI interface, but I'm not sure if this works.
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...