I'm in need of a little assistance in configuring an Async interface on a Cisco 1811 router. My customer has a requirement to have two pop numbers in case the first one answers, no problem. The issue I've run into is this - each pop number takes a separate set of credentials, from what I can see, only one set of credentials can be configured on the interface. Both sets will use PAP authentication.
Here is the config I have for the interface. 819-454-6638 must one use one set, the 1-800 number must use a second set. Any assistance would be appreciated.
interface Async1 description DIAL BACKUP INTERFACE ip address negotiated ip access-group EXTERNAL-INTERNET-IN in ip access-group EXTERNAL-INTERNET-OUT out no ip unreachables ip nat outside ip inspect FW_Inspect out ip virtual-reassembly encapsulation ppp no ip route-cache cef no ip route-cache ip tcp header-compression ip tcp adjust-mss 1300 dialer in-band dialer idle-timeout 300 dialer wait-for-carrier-time 10 dialer string 819-454-6638
dialer string 1-800-670-7489 dialer-group 2 async mode dedicated no peer default ip address ppp pap sent-username username-popA password 7 username-popA ppp timeout idle 300 crypto ipsec client ezvpn backup_profile end
One question.... with two dialers, how will the router know to dial the 2nd dialer if the first dialer fails? Is it simply by the routing table or do I need to specify a failover interface for the 1st dialer?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...