here is the problems , we have a PRI that is randomly dialing itself out . According to debug dialer the addresses that are causing the problem are the dialer interfaces themselves trying to send to 255.255.255.255 which triggers the dialers . How can i tell what is actually causing the dialers to start this action . Can I use something like debug ip packet with an access list that is limited to the 4 dialer addresses to see if I can see what may be coming into the dialer interfaces making them dial ? All 4 dialers will dial out at the same time . Any ideas as to where I can head with this ?
this was along the path I was leaning , by denying broadcast will this break anything that you can think of ? The box is running ospf and bgp . The isdn is used as backup services for remote locations .
Don't configure any telephone number on the router shouldn't be calling out. Now i don't think that by denying the broadcast will break anything related to ospf and bgp. To be safe you can allow all the ospf and bgp traffic in the access-lists and deny the rest like this.
access-list 101 permit ospf any any
access-list 101 permit bgp any any
access-list 101 deny ip any any
If the isdn is used as a backup of some primary line then isdn interface should not be sending any traffic in/out if the primary line is still up.
you probably already know - 'debug dialer' shows you the interesting traffic for opening your dial connections. if you have windows and w2k clients in your LAN, perhaps LDAP triggers the call. I used an access list which denies ports 137-139 and 389.
It seems to me like either the OSPF or the BGP is triggering the call. What is common in this type of situation is to make the OPSF hellos as uninteresting traffic using an access-list. This way only interesting traffic will trigger the ISDN.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...