I am having a strange ISDN dial-up problem. I have
a dialer watch-group set up to watch a loopback
interface on the other end of my T1 connection. For
some reason, even though the T1 is still up, my ISDN
dialer will pick up and dial. It will only dial some of the time. It used to be every hour until I denied icmp traffic. I have debugged the ospf packets coming through and the neighbor never goes away. Yet it will still pick up and dial. Here is my config
no ip address
dialer pool-member 1
isdn switch-type basic-ni
isdn spid1 xxxxxxx
isdn spid2 xxxxxxxx
ppp authentication chap
ip address xxxxxxxxxxx
dialer pool 1
dialer idle-timeout 180
dialer string xxxxxxxxx
dialer load-threshold 5 either
dialer watch-group 2
ppp authentication chap callin
dialer watch-list 2 ip xxxxxxxxxxx
dialer-list 1 protocol ip list 115
access-list 115 deny ip any host 255.255.255.255
access-list 115 deny ospf any any
access-list 115 deny icmp any any
access-list 115 permit ip any any
The dial is initiated from one side only.
This is a Cisco 3620 with 12.2.19a IOS on it. Could
You need to catch it and do a sho dialer when the line is up. If the dwatch caused the call it will say so in the dial reason. If not it will tell you who did cause the call. This info is also available in the output of debug dialer. That way you wont have to catch it active.
Log Buffer (16000 bytes):
Nov 13 10:39:43 CST: As11 DDR: re-enable timeout
Nov 13 10:39:49 CST: Se0:23 DDR: rotor dialout [priority]
Nov 13 10:39:49 CST: Se0:23 DDR: Dialing cause ip (s=10.3.3.97, d=10.0.4.2)
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...