I recently took CCND1 and 2. I understand that for a router serial interface configuration I need to use the "interface serial X/X" command, along with the chosen IP address and associated mask, and so on. In fact, I had done so in a similar configuration on a 2811 once before with success.
I recently was tasked with configuring a similar interface for another 2811; the new serial interface will be using slot 1, as slot 0 is in use with a dual T1 card. The new card is a dual port T1 as well.
My problem is that, upon looking at the running config of the router, the person who configured it used the "controller T1" command as well. Back in ICND, we didn't touch on the "controller" command, so I am not sure why or if is needed, and why.
As Giuseppe points out, whether you need the controller T1 command or not depends on the type of card used for the new T1 in the router. Many of the older cards did not use the controller T1 command. Many of the newer cards (especially cards that allow you to use them for either T1 or E1 circuits) do require the controller command.
ICND does not focus on some things like the controller T1 command because ICND is more focused on what are the fundamentals required to make an interface work (things like IP address, subnet mask, and for serial interfaces things like encapsulation). ICND assumes that some things such as controller T1 are things that you will encounter and will figure out as you perform network configuration tasks that are more sophisticated than what is the focus of ICND.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...