I'm looking at two Cisco PDF documents, "Configuring Terminal Lines and Modem Support" and "Terminal Lines and Modem Commands". They have a lot of good information. But one issue that I'm just not quite getting.
Basically, it says that I can assign async ports to a rotary group, and then I would use ports 30xx, 50xx, 70xx, where 3/5/7 determine the service, and the xx determines the rotary number. Or, I can use 20xx, 40xx, 60xx, where 2/4/6 determine the service, and xx is a n individual line number you want to connect to.
The issue I have is, using the rotary group seems to work, using the 30xx/50xx/70xx ports. But, I can't seem to get the 20xx/40xx/60xx ports to work, using individual line numbers.
As near as I can tell, the configuration should be identical whether I'm using rotary groups or not, except of course there would be no rotary group assigned. Everything else, like async mode, transport, etc., I think should be the same.
Any ideas on what piece of this puzzle I'm missing?
Okay, I'm a moron. The problem was trivial. I'm using a HWIC-16A 16-port async card. I guess I just assumed the line number would start with 1, but AUX uses line 1 and this device is assigned lines 2-17. I found this out by the "show line" command. Now that I use ports 2002 - 2017, it looks like it works. At least so far, I have to do more testing. But I think so.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...