2 ip
Author: b | 2025-04-24
Download IP Camera Viewer 2 [NL] ดาวน์โหลด IP Camera Viewer 2 [TH] Descargar IP Camera Viewer 2 [ES] Scarica IP Camera Viewer 2 [IT] Pobierz IP Camera Viewer 2 [PL] IP Camera Viewer 2 for Mac. Free. In FaxFinder IP Fax Server ProductRegion Description FF240-IP-2 2-Channel IP Fax Server (includes North American power cord) US FF240-IP-2-EU 2-Channel IP Fax Server (includes European power cord) Euro FF240-IP-2-GB/IE 2-Channel IP Fax Server (includes Great Britain/Ireland power cord) GB/IE FF240-IP-UPGRADE-2 2-Channel IP Fax Server Upgrade
Stream 2-2: IP Strategy – Accelerate IP
2} 5. exit 6. interface type number 7. ip rip send version [1] [2] 8. ip rip receive version [1] [2] 9. ip rip authentication key-chain name-of-chain 10. ip rip authentication mode {text | md5} 11. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 router rip Example: Device(config)# router rip Enters router configuration mode. Step 4 version {1 | 2} Example: Device(config-router)# version 2 Enables the Cisco software to send only RIP Version 2 (RIPv2) packets. Step 5 exit Example: Device(config-router)# exit Exits the router configuration mode and enters the global configuration mode. Step 6 interface type number Example: Device(config)# interface Ethernet 3/0 Specifies an interface and enters interface configuration mode. Step 7 ip rip send version [1] [2] Example: Device(config-if)# ip rip send version 2 Configures an interface to send only RIPv2 packets. Step 8 ip rip receive version [1] [2] Example: Device(config-if)# ip rip receive version 2 Configures an interface to accept only RIPv2 packets. Step 9 ip rip authentication key-chain name-of-chain Example: Device(config-if)# ip rip authentication key-chain chainname Enables RIP authentication. Step 10 ip rip authentication mode {text | md5} Example: Device(config-if)# ip rip authentication mode md5 Configures the interface to use message digest algorithm 5 (MD5) authentication (or let it default to plain-text authentication). Step 11 end Example: Device(config-if)# end Exits interface configuration mode and returns to privileged EXEC mode. Managing Split HorizonSUMMARY STEPS1. enable 2. configure terminal 3. interface type number 4. ip split-horizon 5. no ip split-horizon 6. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global
The {IP}_ {1}, {IP}_ {2}, {IP}_ {3}, {IP}_ {4} and {IP}_ {5} of an
A RIP Version and Enabling AuthenticationSUMMARY STEPS1. enable 2. configure terminal 3. router rip 4. version {1 | 2} 5. exit 6. interface type number 7. ip rip send version [1] [2] 8. ip rip receive version [1] [2] 9. ip rip authentication key-chain name-of-chain 10. ip rip authentication mode {text | md5} 11. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 router rip Example: Device(config)# router rip Enters router configuration mode. Step 4 version {1 | 2} Example: Device(config-router)# version 2 Enables the Cisco software to send only RIP Version 2 (RIPv2) packets. Step 5 exit Example: Device(config-router)# exit Exits the router configuration mode and enters the global configuration mode. Step 6 interface type number Example: Device(config)# interface Ethernet 3/0 Specifies an interface and enters interface configuration mode. Step 7 ip rip send version [1] [2] Example: Device(config-if)# ip rip send version 2 Configures an interface to send only RIPv2 packets. Step 8 ip rip receive version [1] [2] Example: Device(config-if)# ip rip receive version 2 Configures an interface to accept only RIPv2 packets. Step 9 ip rip authentication key-chain name-of-chain Example: Device(config-if)# ip rip authentication key-chain chainname Enables RIP authentication. Step 10 ip rip authentication mode {text | md5} Example: Device(config-if)# ip rip authentication mode md5 Configures the interface to use message digest algorithm 5 (MD5) authentication (or let it default to plain-text authentication). Step 11 end Example: Device(config-if)# end Exits interface configuration mode and returns to privileged EXEC mode. Managing Split HorizonSUMMARY STEPS1. enable 2. configure terminal 3. interface type number 4. ip split-horizon 5. no ip split-horizon 6. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable EnablesThe IP 1, IP 2, IP 3, IP 4, IP 5 of an element are
(C) 1998-2005 Cisco Systems, Inc.1) Configuration2) Administration3) Monitoring4) Save changes to Config file5) Help Information6) ExitMain -> 11) Interface Configuration2) System Management3) User Management4) Policy Management5) Tunneling and Security6) BackConfig -> 1This table shows current IP addresses. Intf Status IP Address/Subnet Mask MAC Address-------------------------------------------------------------------------------Ether1-Pri| DOWN | 10.1.1.1/255.255.255.0 | 00.03.A0.89.BF.D0Ether2-Pub|Not Configured| 0.0.0.0/0.0.0.0 |Ether3-Ext|Not Configured| 0.0.0.0/0.0.0.0 |-------------------------------------------------------------------------------DNS Server(s): DNS Server Not ConfiguredDNS Domain Name:Default Gateway: Default Gateway Not Configured1) Configure Ethernet #1 (Private)2) Configure Ethernet #2 (Public)3) Configure Ethernet #3 (External)4) Configure Power Supplies5) BackInterfaces -> 11) Interface Setting (Disable, DHCP or Static IP)2) Set Public Interface3) Select IP Filter4) Select Ethernet Speed5) Select Duplex6) Set MTU7) Set Port Routing Config8) Set Bandwidth Management9) Set Public Interface IPSec Fragmentation Policy10) Set Interface WebVPN Parameters11) BackEthernet Interface 1 -> 11) Disable2) Enable using DHCP Client3) Enable using Static IP AddressingEthernet Interface 1 -> [ ] 3This table shows current IP addresses. Intf Status IP Address/Subnet Mask MAC Address-------------------------------------------------------------------------------Ether1-Pri| DOWN | 10.1.1.1/255.255.255.0 | 00.03.A0.89.BF.D0Ether2-Pub|Not Configured| 0.0.0.0/0.0.0.0 |Ether3-Ext|Not Configured| 0.0.0.0/0.0.0.0 |-------------------------------------------------------------------------------DNS Server(s): DNS Server Not ConfiguredDNS Domain Name:Default Gateway: Default Gateway Not Configured> Enter IP AddressEthernet Interface 1 -> [ 10.1.1.1 ] 172.16.124.120 02/14/2007 09:50:18.830 SEV=3 IP/2 RPT=3IP Interface 1 status changed to Link Down.21 02/14/2007 09:50:18.830 SEV=3 IP/1 RPT=3IP Interface 1 status changed to Link Up.22 02/14/2007 09:50:18.950 SEV=3 IP/1 RPT=4IP Interface 1 status changed to Link Up.> Enter Subnet Mask23 02/14/2007 09:50:19.460 SEV=3 IP/2 RPT=4IP Interface 1 status changed to Link Down.Ethernet Interface 1 -> [ 255.255.255.0 ]1) Interface Setting (Disable, DHCP or Static IP)2) Set Public Interface3) Select IP Filter4) Select Ethernet Speed5) Select Duplex6) Set MTU7) Set Port Routing Config8) Set Bandwidth Management9) Set Public Interface IPSec Fragmentation Policy10) Set Interface WebVPN Parameters11) BackEthernet Interface 1 -> 11This table shows current IP addresses. Intf Status IP Address/Subnet Mask MAC Address-------------------------------------------------------------------------------Ether1-Pri| Up | 172.16.124.1/255.255.255.0 | 00.03.A0.89.BF.D0Ether2-Pub|Not Configured| 0.0.0.0/0.0.0.0 |Ether3-Ext|Not Configured| 0.0.0.0/0.0.0.0 |-------------------------------------------------------------------------------DNS Server(s): DNS Server Not ConfiguredDNS Domain Name:Default Gateway: Default Gateway Not Configured1) Configure Ethernet #1 (Private)2) Configure Ethernet #2 (Public)3) Configure Ethernet #3 (External)4) Configure Power Supplies5) BackInterfaces -> The VPN Concentrator appears in Quick Configuration, and these items are configured. Time/Date Interfaces/Masks in Configuration > Interfaces (public=10.0.0.1/24, private=172.16.124.1/24) Default Gateway in Configuration > System > IP routing > Default_Gateway (10.0.0.2) At this point, the VPN Concentrator is accessible through HTML from the inside network. Note: If the VPN Concentrator is managed from outside, you also perform these steps: Choose. Download IP Camera Viewer 2 [NL] ดาวน์โหลด IP Camera Viewer 2 [TH] Descargar IP Camera Viewer 2 [ES] Scarica IP Camera Viewer 2 [IT] Pobierz IP Camera Viewer 2 [PL] IP Camera Viewer 2 for Mac. Free. In FaxFinder IP Fax Server ProductRegion Description FF240-IP-2 2-Channel IP Fax Server (includes North American power cord) US FF240-IP-2-EU 2-Channel IP Fax Server (includes European power cord) Euro FF240-IP-2-GB/IE 2-Channel IP Fax Server (includes Great Britain/Ireland power cord) GB/IE FF240-IP-UPGRADE-2 2-Channel IP Fax Server UpgradeStream 2: IP Mentorship – Accelerate IP
R1R2 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1!interface Loopback1 ip address 2.2.2.2 255.255.255.255!interface Ethernet0/0 no ip address shutdown duplex auto speed auto bfd interval 50 min_rx 50 multiplier 3!interface Ethernet0/1 description DLEP radio connection ip address 100.100.1.2 255.255.255.0 ip dlep vtemplate 1 version v1.7 client ip 100.100.1.12 port 38682 duplex auto speed auto!interface Ethernet0/2 description DLEP radio connection ip address 100.100.2.2 255.255.255.0 ip dlep vtemplate 2 version v1.7 client ip 100.100.2.12 port 38682 duplex auto speed auto!interface Ethernet0/3 ip address 100.100.3.2 255.255.255.0 shutdown duplex auto speed auto no keepalive!interface Ethernet1/0 no ip address duplex auto speed auto xconnect 209.165.200.10 123 encapsulation l2tpv3 pw-class R1R2!interface Ethernet1/1 ip address 10.124.22.237 255.255.255.0!interface Ethernet1/2 no ip address shutdown!interface Ethernet1/3 no ip address shutdown!interface Virtual-Template1 ip unnumbered Ethernet0/1 ipv6 enable!interface Virtual-Template2 ip unnumbered Ethernet0/2!interface vmi1 ip unnumbered Ethernet0/1 ip dampening-change eigrp 100 5 ipv6 address FE80::901 link-local physical-interface Ethernet0/1!interface vmi2 ip unnumbered Ethernet0/2 ip dampening-change eigrp 100 5 ip hello-interval eigrp 100 60 ip hold-time eigrp 100 180 physical-interface Ethernet0/2!router eigrp 100 metric weights 0 1 0 1 0 1 traffic-share min across-interfaces network 2.2.2.2 0.0.0.0 network 100.100.1.0 0.0.0.255 network 100.100.2.0 0.0.0.255 neighbor 100.100.1.1 vmi1 neighbor 100.100.2.1 vmi2 eigrp router-id 2.2.2.2!ip forward-protocol nd!no ip http serverno ip http secure-serverip route 10.0.0.0 255.0.0.0 Ethernet1/1!dialer-list 1 protocol ip permitipv6 ioam timestamp!access-list 1 permit 2.2.2.2!control-plane!line con 0 exec-timeout 0 0 logging synchronous no domain-lookupline aux 0line vty 0 4 password cisco login transport input all!ntp mindistance 0!end ISR-G2 Configuration The ISR-G2 in this example can be replaced by an ESR with no need to configure DLEP. Use these commands to configure L2TPv3 on ISR-G2. It is required by this example, but optional for basic DLEP configuration. pseudowire-class R2R1 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1 ISR-G2 Configuration Example hostname ISR-G2!boot-start-markerboot-end-marker!no aaa new-modelbsd-client server url dhcp excluded-address 100.100.0.1 100.100.0.10ip dhcp excluded-address 100.100.1.1 100.100.1.10ip dhcp excluded-address 100.100.2.1 100.100.2.10!ip dhcp pool vlan900 network 100.100.0.0 255.255.255.0 domain-name cisco.com default-router 100.100.0.1 lease 0 0 30!ip dhcp pool vlan901 network 100.100.1.0 255.255.255.0 domain-name cisco.com default-router 100.100.1.1 lease 0 0 30!ip dhcp pool vlan902 network 100.100.2.0 255.255.255.0 domain-name cisco.com default-router 100.100.2.1 lease 0 0 30!no ip domain lookupip cefl2tp-class l2tp-defaults retransmit initial retries 30 cookie size 8!ipv6 source-routeipv6 dhcp pool vlan900-v6 address prefix 2016:1:0:900::/112 lifetime 120 90 dns-server 2016:1:0:900::3 domain-name cisco.com!ipv6 multicast-routingno ipv6 cef!multilink bundle-name authenticated!cts logging verbose!!voice-card 0!license udi pid CISCO2911/K9 sn FGL205010MRlicense accept end user agreementlicense boot suite FoundationSuiteK9license boot suite AdvUCSuiteK9!username cisco privilege 15 secret 5 $1$MxQb$wNWP92nY5L3eFxnGHKs.60!redundancy!pseudowire-class R2R1 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1!interface Loopback1 ip address 10.10.10.1 255.255.255.255!interface Embedded-Service-Engine0/0 no ip address shutdown!interface GigabitEthernet0/0 no ip address duplex auto speed auto!interface GigabitEthernet0/0.900 encapsulation dot1Q 900 ip address 100.100.0.1 255.255.255.0 ip hello-interval eigrp 100 1OKIMAT 2 / OKIMAT 2 IPS OKIMAT IPS / OKIMAT IPSe /
Named peer-acl. Serve restrictions are applied to IP addresses that pass the criteria of access list named serve-acl. Serve-only restrictions are applied to IP addresses that pass the criteria of the access list named serve-only-acl. Query-only restrictions are applied to IP addresses that pass the criteria of the access list named query-only-acl. ntp peer 10.1.1.1 peer 10.1.1.1 peer 10.2.2.2 peer 10.3.3.3 peer 10.4.4.4 peer 10.5.5.5 peer 10.6.6.6 peer 10.7.7.7 peer 10.8.8.8 access-group peer peer-acl access-group serve serve-acl access-group serve-only serve-only-acl access-group query-only query-only-acl exitipv4 access-list peer-acl 10 permit ip host 10.1.1.1 any 20 permit ip host 10.8.8.8 any exitipv4 access-list serve-acl 10 permit ip host 10.4.4.4 any 20 permit ip host 10.5.5.5 any exitipv4 access-list query-only-acl 10 permit ip host 10.2.2.2 any 20 permit ip host 10.3.3.3 any exitipv4 access-list serve-only-acl 10 permit ip host 10.6.6.6 any 20 permit ip host 10.7.7.7 any exit Configuring NTP Authentication: Example The following example shows an NTP authentication configuration. In this example, the following is configured: NTP authentication is enabled. Two authentication keys are configured (key 2 and key 3). The router is configured to allow its software clock to be synchronized with the clock of the peer (or vice versa) at IP address 10.3.32.154 using authentication key 2. The router is configured to allow its software clock to be synchronized with the clock by the device at IP address 10.32.154.145 using authentication key 3. The router is configured to synchronize only to systems providing authentication key 3 in their NTP packets. ntp authenticate authentication-key 2 md5 encrypted 06120A2D40031D1008124 authentication-key 3 md5 encrypted 1311121E074110232621 trusted-key 3 server 10.3.32.154 key 3 peer 10.32.154.145 key 2 Disabling NTP on an Interface: Example The following example shows an NTP configuration in which 0/2/0/0 interface is disabled: ntp interface tengige 0/2/0/0 disable exit authentication-key 2 md5 encryptedThe value of IP 1, IP 2, IP 3 and IP 4 of an atom are - BYJU'S
If you use mini toolbox can someone look at your computer? Ran by Ayra1008 (administrator) on 31-07-2013 at 21:27:03Running from "C:\Documents and Settings\Ayra1008\Desktop"Microsoft Windows XP Home Edition Service Pack 3 (X86)Boot Mode: Normal***************************************************************************========================= IE Proxy Settings: ==============================Proxy is not enabled.No Proxy Server is set."Reset IE Proxy Settings": IE Proxy Settings were reset.========================= Hosts content: =================================127.0.0.1 localhost========================= IP Configuration: ================================# ----------------------------------# Interface IP Configuration # ----------------------------------pushd interface ip# Interface IP Configuration for "Local Area Connection"set address name="Local Area Connection" source=dhcpset dns name="Local Area Connection" source=dhcp register=PRIMARYset wins name="Local Area Connection" source=dhcp# Interface IP Configuration for "Wireless Network Connection 2"set address name="Wireless Network Connection 2" source=dhcpset dns name="Wireless Network Connection 2" source=dhcp register=PRIMARYset wins name="Wireless Network Connection 2" source=dhcppopd# End of interface IP configurationWindows IP Configuration Host Name . . . . . . . . . . . . : XD Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Unknown IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : NoEthernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Description . . . . . . . . . . . : Broadcom 440x 10/100 Integrated Controller Physical Address. . . . . . . . . :Ethernet adapter Wireless Network Connection 2: Connection-specific DNS Suffix . :. Download IP Camera Viewer 2 [NL] ดาวน์โหลด IP Camera Viewer 2 [TH] Descargar IP Camera Viewer 2 [ES] Scarica IP Camera Viewer 2 [IT] Pobierz IP Camera Viewer 2 [PL] IP Camera Viewer 2 for Mac. Free. InComments
2} 5. exit 6. interface type number 7. ip rip send version [1] [2] 8. ip rip receive version [1] [2] 9. ip rip authentication key-chain name-of-chain 10. ip rip authentication mode {text | md5} 11. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 router rip Example: Device(config)# router rip Enters router configuration mode. Step 4 version {1 | 2} Example: Device(config-router)# version 2 Enables the Cisco software to send only RIP Version 2 (RIPv2) packets. Step 5 exit Example: Device(config-router)# exit Exits the router configuration mode and enters the global configuration mode. Step 6 interface type number Example: Device(config)# interface Ethernet 3/0 Specifies an interface and enters interface configuration mode. Step 7 ip rip send version [1] [2] Example: Device(config-if)# ip rip send version 2 Configures an interface to send only RIPv2 packets. Step 8 ip rip receive version [1] [2] Example: Device(config-if)# ip rip receive version 2 Configures an interface to accept only RIPv2 packets. Step 9 ip rip authentication key-chain name-of-chain Example: Device(config-if)# ip rip authentication key-chain chainname Enables RIP authentication. Step 10 ip rip authentication mode {text | md5} Example: Device(config-if)# ip rip authentication mode md5 Configures the interface to use message digest algorithm 5 (MD5) authentication (or let it default to plain-text authentication). Step 11 end Example: Device(config-if)# end Exits interface configuration mode and returns to privileged EXEC mode. Managing Split HorizonSUMMARY STEPS1. enable 2. configure terminal 3. interface type number 4. ip split-horizon 5. no ip split-horizon 6. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global
2025-04-07A RIP Version and Enabling AuthenticationSUMMARY STEPS1. enable 2. configure terminal 3. router rip 4. version {1 | 2} 5. exit 6. interface type number 7. ip rip send version [1] [2] 8. ip rip receive version [1] [2] 9. ip rip authentication key-chain name-of-chain 10. ip rip authentication mode {text | md5} 11. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 router rip Example: Device(config)# router rip Enters router configuration mode. Step 4 version {1 | 2} Example: Device(config-router)# version 2 Enables the Cisco software to send only RIP Version 2 (RIPv2) packets. Step 5 exit Example: Device(config-router)# exit Exits the router configuration mode and enters the global configuration mode. Step 6 interface type number Example: Device(config)# interface Ethernet 3/0 Specifies an interface and enters interface configuration mode. Step 7 ip rip send version [1] [2] Example: Device(config-if)# ip rip send version 2 Configures an interface to send only RIPv2 packets. Step 8 ip rip receive version [1] [2] Example: Device(config-if)# ip rip receive version 2 Configures an interface to accept only RIPv2 packets. Step 9 ip rip authentication key-chain name-of-chain Example: Device(config-if)# ip rip authentication key-chain chainname Enables RIP authentication. Step 10 ip rip authentication mode {text | md5} Example: Device(config-if)# ip rip authentication mode md5 Configures the interface to use message digest algorithm 5 (MD5) authentication (or let it default to plain-text authentication). Step 11 end Example: Device(config-if)# end Exits interface configuration mode and returns to privileged EXEC mode. Managing Split HorizonSUMMARY STEPS1. enable 2. configure terminal 3. interface type number 4. ip split-horizon 5. no ip split-horizon 6. end DETAILED STEPS Command or ActionPurposeStep 1 enable Example: Device> enable Enables
2025-03-26R1R2 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1!interface Loopback1 ip address 2.2.2.2 255.255.255.255!interface Ethernet0/0 no ip address shutdown duplex auto speed auto bfd interval 50 min_rx 50 multiplier 3!interface Ethernet0/1 description DLEP radio connection ip address 100.100.1.2 255.255.255.0 ip dlep vtemplate 1 version v1.7 client ip 100.100.1.12 port 38682 duplex auto speed auto!interface Ethernet0/2 description DLEP radio connection ip address 100.100.2.2 255.255.255.0 ip dlep vtemplate 2 version v1.7 client ip 100.100.2.12 port 38682 duplex auto speed auto!interface Ethernet0/3 ip address 100.100.3.2 255.255.255.0 shutdown duplex auto speed auto no keepalive!interface Ethernet1/0 no ip address duplex auto speed auto xconnect 209.165.200.10 123 encapsulation l2tpv3 pw-class R1R2!interface Ethernet1/1 ip address 10.124.22.237 255.255.255.0!interface Ethernet1/2 no ip address shutdown!interface Ethernet1/3 no ip address shutdown!interface Virtual-Template1 ip unnumbered Ethernet0/1 ipv6 enable!interface Virtual-Template2 ip unnumbered Ethernet0/2!interface vmi1 ip unnumbered Ethernet0/1 ip dampening-change eigrp 100 5 ipv6 address FE80::901 link-local physical-interface Ethernet0/1!interface vmi2 ip unnumbered Ethernet0/2 ip dampening-change eigrp 100 5 ip hello-interval eigrp 100 60 ip hold-time eigrp 100 180 physical-interface Ethernet0/2!router eigrp 100 metric weights 0 1 0 1 0 1 traffic-share min across-interfaces network 2.2.2.2 0.0.0.0 network 100.100.1.0 0.0.0.255 network 100.100.2.0 0.0.0.255 neighbor 100.100.1.1 vmi1 neighbor 100.100.2.1 vmi2 eigrp router-id 2.2.2.2!ip forward-protocol nd!no ip http serverno ip http secure-serverip route 10.0.0.0 255.0.0.0 Ethernet1/1!dialer-list 1 protocol ip permitipv6 ioam timestamp!access-list 1 permit 2.2.2.2!control-plane!line con 0 exec-timeout 0 0 logging synchronous no domain-lookupline aux 0line vty 0 4 password cisco login transport input all!ntp mindistance 0!end ISR-G2 Configuration The ISR-G2 in this example can be replaced by an ESR with no need to configure DLEP. Use these commands to configure L2TPv3 on ISR-G2. It is required by this example, but optional for basic DLEP configuration. pseudowire-class R2R1 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1 ISR-G2 Configuration Example hostname ISR-G2!boot-start-markerboot-end-marker!no aaa new-modelbsd-client server url dhcp excluded-address 100.100.0.1 100.100.0.10ip dhcp excluded-address 100.100.1.1 100.100.1.10ip dhcp excluded-address 100.100.2.1 100.100.2.10!ip dhcp pool vlan900 network 100.100.0.0 255.255.255.0 domain-name cisco.com default-router 100.100.0.1 lease 0 0 30!ip dhcp pool vlan901 network 100.100.1.0 255.255.255.0 domain-name cisco.com default-router 100.100.1.1 lease 0 0 30!ip dhcp pool vlan902 network 100.100.2.0 255.255.255.0 domain-name cisco.com default-router 100.100.2.1 lease 0 0 30!no ip domain lookupip cefl2tp-class l2tp-defaults retransmit initial retries 30 cookie size 8!ipv6 source-routeipv6 dhcp pool vlan900-v6 address prefix 2016:1:0:900::/112 lifetime 120 90 dns-server 2016:1:0:900::3 domain-name cisco.com!ipv6 multicast-routingno ipv6 cef!multilink bundle-name authenticated!cts logging verbose!!voice-card 0!license udi pid CISCO2911/K9 sn FGL205010MRlicense accept end user agreementlicense boot suite FoundationSuiteK9license boot suite AdvUCSuiteK9!username cisco privilege 15 secret 5 $1$MxQb$wNWP92nY5L3eFxnGHKs.60!redundancy!pseudowire-class R2R1 encapsulation l2tpv3 protocol l2tpv3 l2tp-defaults ip local interface Loopback1!interface Loopback1 ip address 10.10.10.1 255.255.255.255!interface Embedded-Service-Engine0/0 no ip address shutdown!interface GigabitEthernet0/0 no ip address duplex auto speed auto!interface GigabitEthernet0/0.900 encapsulation dot1Q 900 ip address 100.100.0.1 255.255.255.0 ip hello-interval eigrp 100 1
2025-04-05Named peer-acl. Serve restrictions are applied to IP addresses that pass the criteria of access list named serve-acl. Serve-only restrictions are applied to IP addresses that pass the criteria of the access list named serve-only-acl. Query-only restrictions are applied to IP addresses that pass the criteria of the access list named query-only-acl. ntp peer 10.1.1.1 peer 10.1.1.1 peer 10.2.2.2 peer 10.3.3.3 peer 10.4.4.4 peer 10.5.5.5 peer 10.6.6.6 peer 10.7.7.7 peer 10.8.8.8 access-group peer peer-acl access-group serve serve-acl access-group serve-only serve-only-acl access-group query-only query-only-acl exitipv4 access-list peer-acl 10 permit ip host 10.1.1.1 any 20 permit ip host 10.8.8.8 any exitipv4 access-list serve-acl 10 permit ip host 10.4.4.4 any 20 permit ip host 10.5.5.5 any exitipv4 access-list query-only-acl 10 permit ip host 10.2.2.2 any 20 permit ip host 10.3.3.3 any exitipv4 access-list serve-only-acl 10 permit ip host 10.6.6.6 any 20 permit ip host 10.7.7.7 any exit Configuring NTP Authentication: Example The following example shows an NTP authentication configuration. In this example, the following is configured: NTP authentication is enabled. Two authentication keys are configured (key 2 and key 3). The router is configured to allow its software clock to be synchronized with the clock of the peer (or vice versa) at IP address 10.3.32.154 using authentication key 2. The router is configured to allow its software clock to be synchronized with the clock by the device at IP address 10.32.154.145 using authentication key 3. The router is configured to synchronize only to systems providing authentication key 3 in their NTP packets. ntp authenticate authentication-key 2 md5 encrypted 06120A2D40031D1008124 authentication-key 3 md5 encrypted 1311121E074110232621 trusted-key 3 server 10.3.32.154 key 3 peer 10.32.154.145 key 2 Disabling NTP on an Interface: Example The following example shows an NTP configuration in which 0/2/0/0 interface is disabled: ntp interface tengige 0/2/0/0 disable exit authentication-key 2 md5 encrypted
2025-04-22