jsingh9741
Technical User
- Jul 12, 2001
- 9
I have a Cisco 1720 Router with a ISDN BRI0 interface, a 10baset-T interface and a Fast-Ethernet port. The Fast Ethernet port is connected to The Local Area Network. The ISDN Connection establishes a link to the Corporate office in Australia. The 10-Base-T connects to a DSL modem that is the internet access. The problem we are having is that the ISDN connection is kicking on automatically even when we are not trying to use the connection and it will not terminate something is turning it on and keeping it up. I don't know if it is something in the access list or the bri0 configuration. Also is there a way to look at all traffic that is going across the router debug commands?
here is part of the configuration.
interface FastEthernet0
ip address 10.9.0.254 255.255.255.0
ip accounting output-packets
ip nat inside
speed autoe
full-duplex
no cdp enable
!
ip nat inside source list 2 interface Ethernet0 Overload
ip classless
ip route 0.0.0.0 0.0.0.0 62.12.192.134
ip route 10.30.0.1 255.255.255.0 BRI0
ip route 10.30.0.5 255.255.255.0 BRI0
ip route 143.155.12.2 255.255.255.255 BRI0
ip route 192.0.0.0 255.0.0.0 143.155.12.2
no ip http server
!
access-list 1 permit any
access-list 2 deny 10.9.0.254
access-list 2 permit any
access-list 2 permit 10.50.0.0 0.0.0.255
access-list 101 deny ip host 62.12.192.135host 192.168.200.5
access-list 101 deny ip any 224.0.0.0 0.255.255.255
access-list 101 deny ip any host 255.255.255.255
access-list 1 protocol ip list 101
Any advise would be helpful.
Thanks
Jas Singh
here is part of the configuration.
interface FastEthernet0
ip address 10.9.0.254 255.255.255.0
ip accounting output-packets
ip nat inside
speed autoe
full-duplex
no cdp enable
!
ip nat inside source list 2 interface Ethernet0 Overload
ip classless
ip route 0.0.0.0 0.0.0.0 62.12.192.134
ip route 10.30.0.1 255.255.255.0 BRI0
ip route 10.30.0.5 255.255.255.0 BRI0
ip route 143.155.12.2 255.255.255.255 BRI0
ip route 192.0.0.0 255.0.0.0 143.155.12.2
no ip http server
!
access-list 1 permit any
access-list 2 deny 10.9.0.254
access-list 2 permit any
access-list 2 permit 10.50.0.0 0.0.0.255
access-list 101 deny ip host 62.12.192.135host 192.168.200.5
access-list 101 deny ip any 224.0.0.0 0.255.255.255
access-list 101 deny ip any host 255.255.255.255
access-list 1 protocol ip list 101
Any advise would be helpful.
Thanks
Jas Singh