This chapter introduces and explains some of the technologies used in dialup networks. You will find configuration tips and interpretations of some of the show commands, which are useful for verifying correct operation of the network. Troubleshooting procedures are beyond the scope of this document and can be found in the document entitled Troubleshooting Dialup.
For more information on document conventions, see the Cisco Technical Tips Conventions.
There are no specific prerequisites for this document.
This document is not restricted to specific software and hardware versions.
The information presented in this document was created from devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If you are working in a live network, ensure that you understand the potential impact of any command before using it.
This section explains issues related specifically to the setup, verification, and use of modems with Cisco routers.
If you are using Cisco Internetwork Operating System (Cisco IOS) Release 11.1 or later, you can configure your Cisco router to communicate with and configure your modem automatically.
Use the following procedure to configure a Cisco router to automatically attempt to discover what kind of modem is connected to the line, and then to configure the modem:
To discover the type of modem attached to your router, use the modem autoconfigure discovery line configuration command.
When the modem is successfully discovered, configure the modem automatically using the modem autoconfigure type modem-name line configuration command.
If you want to display the list of modems for which the router has entries, use the show modemcap modem-name . If you want to change a modem value that was returned from the show modemcap command, use the modemcap edit modem-name attribute value line configuration command.
For complete information on the use of these commands, refer to the Cisco IOS Documentation Dial Solutions Configuration Guide and Dial Solutions Command Reference.
Note: Do not enter &W in the modemcap entry that is used for the autoconfigure. This causes the NVRAM to be rewritten every time a modem autoconfigure is performed and will destroy the modem.
For diagnostic purposes, or to initially configure the modem if you are running Cisco IOS Release 11.0 or earlier, you must establish a reverse Telnet session to configure a modem to communicate with a Cisco device. As long as you lock the data terminal equipment (DTE) side modem speed, the modem will always communicate with the access server or router at the desired speed. Refer to Table 16-5 for information on locking the modem speed. Be certain that the speed of the Cisco device is configured before issuing commands to the modem via a reverse Telnet session. Again, refer to Table 16-5 for information on configuring the speed of the access server or router.
To configure the modem for a reverse telnet session, use the line configuration command transport input telnet. To set up a rotary group (in this case, on port 1), enter the line configuration command rotary 1. Placing these commands under the line configuration causes IOS to allocate IP listeners for incoming connections at port ranges starting with the following base numbers:
2000 | Telnet protocol |
3000 | Telnet protocol with rotary |
4000 | Raw TCP protocol |
5000 | Raw TCP protocol with rotary |
6000 | Telnet protocol, binary mode |
7000 | Telnet protocol, binary mode with rotary |
9000 | Xremote protocol |
10000 | XRemote protocol with rotary |
To initiate a reverse Telnet session to your modem, perform the following steps:
From your terminal, use the command telnet ip-address 20yy where ip-address is the IP address of any active, connected interface on the Cisco device, and yy is the line number to which the modem is connected.
For example, the following command would connect you to the auxiliary port on a Cisco 2501 router with IP address 192.169.53.52: telnet 192.169.53.52 2001. Generally, a Telnet command of this kind can be issued from anywhere on the network, if it can ping the IP address in question.
Note: On most Cisco routers, port 01 is the auxiliary port. On a Cisco access server, the auxiliary port is the last TTY +1. As an example, the auxiliary port on a 2511 is port 17 (16 TTY ports + 1). Always use the show line exec command to find the auxiliary port number - particularly on the 2600 and 3600 series, which use non-contiguous port numbers to accommodate varying async module sizes.
If the connection is refused, it could indicate that there is either no listener at the specified address and port, or that someone is already connected to that port. Verify the connection address and port number. Also, make sure the command modem inout or modem DTR-active, as well as transport input all, appear under the line configuration for the lines being reached.
If using the rotary function, make sure the command rotary n also appears in the line configuration where n is the number of the rotary group. To check if someone is already connected, telnet to the router and use the command show line n . Look for an asterisk to indicate the line is in use. Make sure CTS is high and DSR is not. Use the command clear line n to disconnect the current session on port number n. If the connection is still refused, the modem might be asserting Carrier Detect (CD) all the time. Disconnect the modem from the line, establish a reverse Telnet session, and then connect the modem.
After successfully making the Telnet connection, enter AT and be sure the modem replies with OK.
If the modem is not responsive, refer to the following table.
Table 16-1 below outlines possible causes of modem-to-router connectivity problem symptoms and describes solutions to those problems.
Table 16-1: No Connectivity Between Modem and Router
Possible Causes | Suggested Actions |
---|---|
Modem control is not enabled on the access server or router |
line 5 modem inout Note: Be certain to use the modem inout command, and not the modem dialin command while the connectivity of the modem is in question. The latter command allows the line to accept incoming calls only. Outgoing calls will be refused and it will be impossible to establish a Telnet session with the modem in order to configure it. If you want to use the modem dialin command, do so only after you are certain the modem is functioning correctly. |
Modem could be misconfigured or have a hung session. | Enter AT&FE1Q0 to return it to factory defaults and make sure the modem is set to echo characters and return output. The modem may have a hung session. Use "^U" to clear the line and "^Q" to open the flow control (XON). Verify parity settings. |
Incorrect cabling |
|
Hardware problem |
|
For some applications, the modems on a given router need to be shared by a group of users. Cisco Dialout Utility is an example of this type of application. Basically, users connect to one port that connects them to an available modem. To add an async line to a rotary group, simply enter rotary n where n is the number of the rotary group in the configuration for the async line. Refer to the example below.
line 1 16 modem InOut transport input all rotary 1 speed 115200 flowcontrol hardware
The above line configuration would allow users to connect to the rotary group by entering telnet 192.169.53.52 3001 for normal telnet. Alternatives include ports 5001 for Raw TCP, 7001 for binary telnet (which Cisco Dialout Utility uses), and 10001 for Xremote connections.
Note: To verify the configuration of the Cisco Dialout Utility, double click on the dialout utility icon at the bottom right of the screen and press the More> button. Next, press the Configure Ports> button. Make sure the port is in the 7000 range, if using rotary groups, and the 6000 range, if the Dialout utility is targeting an individual modem. You should also enable modem logging on the PC. This is done by selecting the following sequence: Start->Control Panel-> modems->(choose your Cisco Dialout modem)->Properties->Connection->Advanced...->Record a log file.
The output from the show line line-number exec command is useful when troubleshooting a modem-to-access server or router connection. Below is the output from the show line command.
as5200-1#show line 1 Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int 1 TTY 115200/115200- - - - - 0 0 0/0 - Line 1, Location: "", Type: "" Length: 24 lines, Width: 80 columns Baud rate (TX/RX) is 115200/115200, no parity, 1 stopbits, 8 databits Status: No Exit Banner Capabilities: Hardware Flowcontrol In, Hardware Flowcontrol Out Modem state: Hanging up modem(slot/port)=1/0, state=IDLE dsx1(slot/unit/channel)=NONE, status=VDEV_STATUS_UNLOCKED Group codes: 0 Modem hardware state: CTS noDSR noDTR RTS Special Chars: Escape Hold Stop Start Disconnect Activation ^^x none - - none Timeouts: Idle EXEC Idle Session Modem Answer Session Dispatch 00:10:00 never none not set Idle Session Disconnect Warning never Login-sequence User Response 00:00:30 Autoselect Initial Wait not set Modem type is unknown. Session limit is not set. Time since activation: never Editing is enabled. History is enabled, history size is 10. DNS resolution in show commands is enabled Full user help is disabled Allowed transports are lat pad telnet rlogin udptn v120 lapb-ta. Preferred is l at pad telnet rlogin udptn v120 lapb-ta. No output characters are padded No special data dispatching characters as5200-1#
When connectivity problems occur, important output appears in the Modem state and the Modem hardware state fields.
Note: The Modem hardware state field does not appear in the show line output for every platform. In certain cases, the indications for signal states will be shown in the Modem state field instead.
Table 16-2 shows typical Modem state and Modem hardware state strings from the output of the show line command. It also explains the meaning of each state.
Table 16-2: Modem and Modem Hardware States in Show Line Output
Modem State | Modem Hardware State | Meaning |
---|---|---|
Idle | CTS noDSR DTR RTS | These are the proper modem states for connections between an access server or router and a modem (when there is no incoming call). Output of any other kind generally indicates a problem. |
Ready | - | If the modem state is Ready, instead of Idle, consider the following:
|
Ready | noCTS noDSR DTR RTS(2) | The noCTS string appears in the Modem hardware state field for one of the following four reasons:
|
Ready | CTS DSR DTR RTS(2) | The DSR string (instead of the noDSR string) appears in the Modem hardware state field for one of the following reasons:
|
Ready | CTS* DSR* DTR RTS(2) | If this string appears in the Modem hardware state field, modem control is probably not enabled on the access server. Use the modem inout line configuration command to enable modem control on the line. Additional information on configuring modem control on an access server or router line is provided earlier in this table. |
(1) CD = Carrier Detect
(2) A * next to a signal indicates one of two things: The signal has changed within the past few seconds or the signal is not being used by the modem control method selected.
This section explains methods for gathering performance data on the MICA digital modems found in the Cisco AS5x00 family of access servers. The performance data can be used for trend analysis and is useful in troubleshooting performance problems that might be encountered. When looking at the numbers presented below, bear in mind that perfection is not possible in the real world. The possible modem call success rate (CSR) is a function of the quality of the circuits, the client modem userbase, and the set of modulations being used. A typical CSR percentage for V.34 calls is 95%. V.90 calls can be expected to connect successfully 92% of the time. Premature drops are likely to happen 10% of the time.
Use the following commands to gain an overall view of modem behavior on the access server:
show modem
show modem summary
show modem connect-speeds
show modem call-stats
The following information is helpful when troubleshooting an individual modem connection or gathering data for trend analysis:
debug modem csm
modem call-record terse
show modem op (MICA) / AT@E1 (Microcom) while connected
show modem log for the session of interest after disconnect
ANI (caller's number)
Time of day
Client modem hardware / firmware revision
Interesting information from the client (after disconnect)-ATI6, ATI11, AT&V, AT&V1, and so on
An audio record (.wav file) of the trainup attempt from the client modem
In the following sections, the commands will be explained further and some common trends will be discussed.
The show modem command gives a view of individual modems. From these numbers the health of individual modems can be viewed.
router# show modem Codes: * - Modem has an active call C - Call in setup T - Back-to-Back test in progress R - Modem is being Reset p - Download request is pending and modem cannot be used for taking calls D - Download in progress B - Modem is marked bad and cannot be used for taking calls b - Modem is either busied out or shut-down d - DSP software download is required for achieving K56flex connections ! - Upgrade request is pending Inc calls Out calls Busied Failed No Succ Mdm Usage Succ Fail Succ Fail Out Dial Answer Pct. * 1/0 17% 74 3 0 0 0 0 0 96% * 1/1 15% 80 4 0 0 0 1 1 95% * 1/2 15% 82 0 0 0 0 0 0 100% 1/3 21% 62 1 0 0 0 0 0 98% 1/4 21% 49 5 0 0 0 0 0 90% * 1/5 18% 65 3 0 0 0 0 0 95%
To see the aggregate numbers for all the modems on the router, use the show modem summary command.
router#show modem summary Incoming calls Outgoing calls Busied Failed No Succ Usage Succ Fail Avail Succ Fail Avail Out Dial Ans Pct. 0% 6297 185 64 0 0 0 0 0 0 97%
Table 16-3: show modem Fields
Fields | Descriptions |
---|---|
Incoming and Outgoing calls | Calls dialing into and out of the modem.
|
Busied Out | Total number of times the modems were taken out of service with the modem busy command or the modem shutdown command. |
Failed Dial | Total number of attempts the modems did not hang up or there was no dial tone. |
No Ans | Total number of times call ringing was detected, but the calls were not answered by a modem. |
Succ Pct. | Successful connection percentage of total available modems. |
compress retrain lostCarr rmtLink trainup hostDrop wdogTimr inacTout Mdm # % # % # % # % # % # % # % # % Total 9 41 271 3277 7 2114 0 0
Table 16-4: show modem call-stats Fields
rmtLink | This show that error correction was in effect, and the call was hung up by the client system attached to the remote modem. |
hostDrop | This shows the call was hung up by IOS host system. Some common reasons include: idle timeout, a circuit clear from the telephone company, or a PPP LCP termreq from the client. The best way to determine the reason for the hang up is by using modem call-record terse or AAA accounting. |
The other disconnect reasons should add up to less than 10% of the total.
router>show modem connect 33600 0 Mdm 26400 28000 28800 29333 30667 31200 32000 33333 33600 TotCnt Tot 614 0 1053 0 0 1682 0 0 822 6304 router>show modem connect 56000 0 Mdm 48000 49333 50000 50666 52000 53333 54000 54666 56000 TotCnt Tot 178 308 68 97 86 16 0 0 0 6304
Expect to see a distribution of V.34 speeds. There should be a peak at 26.4, if the T1s use channel associated signaling (CAS). For ISDN (PRI) T1s, the peak should be at 31.2. Also, look for a few K56Flex, V.90 speeds. If there are no V.90 connections there may be a network topology problem.
Rather than an exec command, this is a configuration command placed at the system level of the access server in question. When a user disconnects, a message similar to the following displays:
*May 31 18:11:09.558: %CALLRECORD-3-MICA_TERSE_CALL_REC: DS0 slot/contr/chan=2/0/18, slot/port=1/29, call_id=378, userid=cisco, ip=0.0.0.0, calling=5205554099, called=4085553932, std=V.90, prot=LAP-M, comp=V.42bis both, init-rx/tx b-rate=26400/41333, finl-rx/tx brate=28800/41333, rbs=0, d-pad=6.0 dB, retr=1, sq=4, snr=29, rx/tx chars=93501/94046, bad=5, rx/tx ec=1612/732, bad=0, time=337, finl-state=Steady, disc(radius)=Lost Carrier/Lost Carrier, disc(modem)=A220 Rx (line to host) data flushing - not OK/EC condition - locally detected/received DISC frame -- normal LAPM termination
The exec command show modem operational-status shows the current (or most recent) parameters pertaining to the modem's connection.
The documentation entry for this command is found in the Cisco IOS Release 12.0 Dial Solutions Command Reference. show modem operational-status is only for MICA modems. The equivalent command for Microcom modems is modem at-mode / AT@E1. Use the modem at-mode <slot>/<port> command to connect to the modem, then issue the AT@E1 command. Complete documentation for the modem at-mode command can be found in the Cisco AS5300 Software Configuration Guide, and documentation for the AT@E1 command is in the AT Command Set and Register Summary for Microcom Modem Modules Command Reference.
Use the following steps to determine which modems a user is coming in on:
Issue the command show user and look for the TTY to which they are connected.
Use the command show line and look for the modem slot/port numbers.
For trend analysis, it's very important to gather client-side performance data. Always try to obtain the following information:
client hardware model/firmware version (attainable with the command ATI3I7 on the client's modem)
client-reported disconnect reasons (use ATI6 or AT&V1)
Other information available on the client end includes the PC's modemlog.txt and ppplog.txt. You must specifically configure your PC to generate these files.
Once you have collected and understood the performance data for your modem system, you need to look at any remaining patterns and components that may need improvement.
Use show modem or show modem call-stats to identify any modems with abnormally high rates of trainup failure or bad disconnect rates (MICA). If adjacent pairs of modems are having problems, the problem is likely a hung/dead DSP. Use copy flash modem to the affected HMM in order to recover. Make sure the modems are running the latest version of portware. To verify that all modems are correctly configured, use the configuration command modem autoconfigure type mica/microcom_server in the line configuration. To make sure the modems are being autoconfigured whenever a call is hung up, use the exec command debug confmodem. In order to fix modems that are badly misconfigured, you may need to establish a reverse Telnet session.
DS0 problems are rare, but possible. To locate malfunctioning DS0s, use the command show controller t1 call-counters and look for any DS0s with abnormally high TotalCalls and abnormally low TotalDuration. To target suspected DS0s, you may need to busy out other DS0s with the configuration command isdn service dsl, ds0 busyout under the serial interface for the T1. The output from show controller t1 call-counters looks like this:
TimeSlot Type TotalCalls TotalDuration 1 pri 873 1w6d 2 pri 753 2w2d 3 pri 4444 00:05:22
Obviously, timeslot 3 is the suspect channel in this case.
Below are a few of the more common trends seen by the Cisco TAC.
Bad circuit paths
You might be getting bad circuit paths through the public switched telephone network (PSTN) if you have the following problems:
long distance calls have problems, but local do not (or vice versa)
calls at certain times of day have problems
calls from specific remote exchanges have problems
Problems with long distance calls
If your long distance service isn't functioning properly or at all (but local service is fine):
Be sure that the digital line connects into a digital switch, not a channel bank .
Instruct the telephone companies to examine the circuit paths used for long distance.
Problems with calls from specific calling areas.
If calls from specific geographical regions/exchanges tend to have problems, you should obtain the network topology from the telephone company.
If multiple analog-to-digital conversions are required, V.90/K56flex modem connects will not be possible and V.34 may be somewhat degraded. Analog-to-digital conversions are required in areas that are served by non-integrated digital switches or by analog switches.
ISDN refers to a set of digital services that are available to end users. ISDN involves the digitization of the telephone network so that voice, data, text, graphics, music, video, and other source material can be provided to end users from a single, end-user terminal over existing telephone wiring. Proponents of ISDN imagine a worldwide network much like the present telephone network, but with digital transmission and a variety of new services.
ISDN is an effort to standardize subscriber services, user/network interfaces, and network and internetwork capabilities. Standardizing subscriber services attempts to ensure a level of international compatibility. Standardizing the user/network interface stimulates development and marketing of these interfaces by third-party manufacturers. Standardizing network and internetwork capabilities helps achieve the goal of worldwide connectivity by ensuring that ISDN networks easily communicate with one another.
ISDN applications include high-speed image applications (such as Group IV facsimile), additional telephone lines in homes to serve the telecommuting industry, high-speed file transfer, and video conferencing. Voice, of course, isl also a popular application for ISDN.
The home access market is being divided up among different technologies. In areas where newer less expensive technologies such as DSL and Cable become available the home market is moving away from ISDN. Businesses, however, continue to use ISDN in the form of PRI T1/E1s to carry large amounts of data or to provide v.90 dialin access.
ISDN components include terminals, terminal adapters (TAs), network-termination devices, line-termination equipment, and exchange-termination equipment. ISDN terminals come in two types. Specialized ISDN terminals are referred to as terminal equipment type 1 (TE1). Non-ISDN terminals, such as DTE that predate the ISDN standards, are referred to as terminal equipment type 2 (TE2). TE1s connect to the ISDN network through a four-wire, twisted-pair digital link. TE2s connect to the ISDN network through a terminal adapter. The ISDN TA can either be a standalone device or a board inside the TE2. If the TE2 is implemented as a standalone device, it connects to the TA via a standard physical-layer interface. Examples include EIA/TIA-232-C (formerly RS-232-C), V.24, and V.35.
Beyond the TE1 and TE2 devices, the next connection point in the ISDN network is the network termination type 1 (NT1) or network termination type 2 (NT2) device. These are network-termination devices that connect the four-wire subscriber wiring to the conventional two-wire local loop. In North America, the NT1 is a customer premises equipment (CPE) device. In most other parts of the world, the NT1 is part of the network provided by the carrier. The NT2 is a more complicated device, typically found in digital private branch exchanges (PBXs), that performs Layer 2 and 3 protocol functions and concentration services. An NT1/2 device also exists; it is a single device that combines the functions of an NT1 and an NT2.
A number of reference points are specified in ISDN. These reference points define logical interfaces between functional groupings such as TAs and NT1s. ISDN reference points include the following:
R-The reference point between non-ISDN equipment and a TA
S-The reference point between user terminals and the NT2
T-The reference point between NT1 and NT2 devices
U-The reference point between NT1 devices and line-termination equipment in the carrier network. The U reference point is relevant only in North America, where the NT1 function is not provided by the carrier network
The following is a sample ISDN configuration. This sample shows three devices attached to an ISDN switch at the central office. Two of these devices are ISDN-compatible, so they can be attached through an S reference point to NT2 devices. The third device (a standard, non-ISDN telephone) attaches through the R reference point to a TA. Any of these devices could also attach to an NT1/2 device, which would replace both the NT1 and the NT2. And, although they are not shown, similar user stations are attached to the far right ISDN switch.
2503B#show running-config Building configuration... Current configuration: ! version 11.1 service timestamps debug datetime msec service udp-small-servers service tcp-small-servers ! hostname 2503B ! ! username 2503A password ip subnet-zero isdn switch-type basic-5ess ! interface Ethernet0 ip address 172.16.141.11 255.255.255.192 ! interface Serial0 no ip address shutdown ! interface Serial1 no ip address shutdown ! interface BRI0 description phone#5553754 ip address 172.16.20.2 255.255.255.0 encapsulation ppp dialer idle-timeout 300 dialer map ip 172.16.20.1 name 2503A broadcast 5553759 dialer-group 1 ppp authentication chap ! no ip classless ! dialer-list 1 protocol ip permit ! line con 0 line aux 0 line vty 0 4 ! end 2503B#
The ISDN Basic Rate Interface (BRI) service offers two B channels and one D channel (2B+D). BRI B-channel service operates at 64 kbps and is meant to carry user data; BRI D-channel service operates at 16 kbps and is meant to carry control and signaling information, although it can support user data transmission under certain circumstances. The D-channel signaling protocol comprises Layers 1 through 3 of the OSI reference model. BRI also provides for framing control and other overhead, bringing its total bit rate to 192 kbps. The BRI physical layer specification is International Telecommunication Union Telecommunication Standardization Sector (ITU-T; formerly the Consultative Committee for International Telegraph and Telephone [CCITT]) I.430.
ISDN Primary Rate Interface (PRI) service offers 23 B channels and one D channel in North America and Japan, yielding a total bit rate of 1.544 Mbps (the PRI D channel runs at 64 kbps). ISDN PRI in Europe, Australia, and other parts of the world provides 30 B plus one 64-kbps D channel and a total interface rate of 2.048 Mbps. The PRI physical layer specification is ITU-T I.431.
The ISDN physical layer (Layer 1) frame formats differ depending on whether the frame is outbound (from terminal to network) or inbound (from network to terminal). Both physical layer interfaces are shown in Figure 16-1.
Figure 16-1: ISDN Physical-Layer Frame Formats
The frames are 48 bits long, of which 36 bits represent data. The bits of an ISDN physical layer frame are used as follows:
F - Provides synchronization.
L - Adjusts the average bit value.
E - Used for contention resolution when several terminals on a passive bus contend for a channel.
A - Activates devices.
S - Unassigned.
B1, B2, and D - For user data.
Multiple ISDN user devices can be physically attached to one circuit. In this configuration, collisions can result if two terminals transmit simultaneously. Therefore, ISDN provides features to determine link contention. When an NT receives a D bit from the TE, it echoes back the bit in the next E-bit position. The TE expects the next E bit to be the same as its last transmitted D bit.
Terminals cannot transmit into the D channel unless they first detect a specific number of ones (indicating "no signal") corresponding to a pre-established priority. If the TE detects a bit in the echo (E) channel that is different from its D bits, it must stop transmitting immediately. This simple technique ensures that only one terminal can transmit its D message at one time. After successful D message transmission, the terminal has its priority reduced by being required to detect more continuous ones before transmitting. Terminals cannot raise their priority until all other devices on the same line have had an opportunity to send a D message. Telephone connections have higher priority than all other services, and signaling information has a higher priority than nonsignaling information.
Layer 2 of the ISDN signaling protocol is Link Access Procedure on the D channel, also known as LAPD. LAPD is similar to High-Level Data Link Control (HDLC) and Link Access Procedure, Balanced (LAPB). As the expansion of the LAPD abbreviation indicates, it is used across the D channel to ensure that control and signaling information flows and is received properly. The LAPD frame format (see Figure 16-2) is very similar to that of HDLC and, like HDLC, LAPD uses supervisory, information, and unnumbered frames. The LAPD protocol is formally specified in ITU-T Q.920 and ITU-T Q.921.
Figure 16-2: LAPD Frame Format
The LAPD Flag and Control fields are identical to those of HDLC. The LAPD Address field can be either 1 or 2 bytes long. If the extended address bit of the first byte is set, the address is 1 byte; if it is not set, the address is 2 bytes. The first address field byte contains the service access point identifier (SAPI), which identifies the portal at which LAPD services are provided to Layer 3. The C/R bit indicates whether the frame contains a command or a response. The terminal endpoint identifier (TEI) field identifies either a single terminal or multiple terminals. A TEI of all ones indicates a broadcast.
Two Layer 3 specifications are used for ISDN signaling: ITU-T (formerly CCITT) I.450 (also known as ITU-T Q.930) and ITU-T I.451 (also known as ITU-T Q.931). Together, these protocols support user-to-user, circuit-switched, and packet-switched connections. A variety of call establishment, call termination, information, and miscellaneous messages are specified, including SETUP, CONNECT, RELEASE, USER INFORMATION, CANCEL, STATUS, and DISCONNECT.
These messages are functionally similar to those provided by the X.25 protocol (see Chapter 19, "Troubleshooting X.25 Connections," for more information). Figure 16-3, from ITU-T I.451, shows the typical stages of an ISDN circuit-switched call.
Figure 16-3 ISDN Circuit-Switched Call Stages
To find out what the current condition of the ISDN connection is between the router and the telephone company switch, use the command show isdn status. The two kinds of interfaces that are supported by this command are the BRI and the PRI.
3620-2#show isdn status Global ISDN Switchtype = basic-ni ISDN BRI0/0 interface dsl 0, interface ISDN Switchtype = basic-ni Layer 1 Status: ACTIVE Layer 2 Status: TEI = 88, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED TEI = 97, Ces = 2, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED Spid Status: TEI 88, ces = 1, state = 5(init) spid1 configured, no LDN, spid1 sent, spid1 valid Endpoint ID Info: epsf = 0, usid = 0, tid = 1 TEI 97, ces = 2, state = 5(init) spid2 configured, no LDN, spid2 sent, spid2 valid Endpoint ID Info: epsf = 0, usid = 1, tid = 1 Layer 3 Status: 0 Active Layer 3 Call(s) Activated dsl 0 CCBs = 0 The Free Channel Mask: 0x80000003
Table 16-5:- show isdn status for BRI
Field | Significance |
---|---|
Layer 1 Status: DEACTIVATED | This indicates the BRI interface is not seeing a signal on the line. There are five possible reasons for this condition.
|
Layer 2 Status: State = TEI_ASSIGNED | Check the switchtype setting and SPIDS. The interface-specific ISDN switch setting will override the global switch setting. The SPID status will indicate whether the switch accepted the SPIDS (valid or invalid). Contact your service provider to verify the setting configured on the router. To change the SPID settings, use the isdn spidn interface configuration command. Where n is either 1 or 2, depending on the channel in question. Use the no form of this command to remove the specified SPID. isdn spidn spid-number [ldn] no isdn spidn spid-number [ldn]Syntax Description: spid-numberThe number identifying the service to which you have subscribed. This value is assigned by the ISDN service provider and is usually a 10-digit telephone number with additional digits. ldn(Optional) Local directory number (LDN), which is a 7-digit number assigned by the service provider. The switch in the incoming setup message delivers this information. If you do not include the local directory access to the switch is permitted, but the other B channel may not be able to receive incoming calls. To see the layer 2 negotiations between the switch and the router, use the privileged exec command debug isdn q921. The q921 debugs are documented in the Debug Command Reference. Debugs rely heavily on CPU resources, so use caution when employing them. |
5200-1# show isdn status Global ISDN Switchtype = primary-5ess ISDN Serial0:23 interface dsl 0, interface ISDN Switchtype = primary-5ess Layer 1 Status: ACTIVE Layer 2 Status: TEI = 0, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED Layer 3 Status: 0 Active Layer 3 Call(s) Activated dsl 0 CCBs = 0 The Free Channel Mask: 0x807FFFFF Total Allocated ISDN CCBs = 0 5200-1#
If the show isdn status command does not work or does not show the PRI, try using the show isdn service command. Make sure the pri-group command appears in the configuration under the T1/E1 controller in the configuration. If the command is not present, configure the controller with the pri-group command.
The following is an example of a configuration for a Cisco router with a channelized T1/PRI controller:
controller t1 0 framing esf line code b8zs pri-group timeslots 1-24
Table 16-6: show isdn status for PRI
Field | Significance |
---|---|
Layer 1 Status: DEACTIVATED | This indicates the PRI interface is not seeing T1/E1 framing on the line. Consider the following possible causes for this condition:
|
Layer 2 Status: State = TEI_ASSIGNED | Check the switchtype setting. The interface-specific ISDN switch setting will override the global switch setting. Verify the T1/E1 is configured to match the provider's switch (T1/E1 problems are discussed in Chapter 15). To see the layer 2 negotiations between the switch and the router, use the privileged exec command debug isdn q921. The q921 debugs are documented in the Debug Command Reference. Debugs rely heavily on CPU resources, so use caution when employing them. |
Number of calls / Call Control Blocks in use / Total Allocated ISDN Call Control Blocks | These numbers indicate how many calls are in progress, and the number of resources that are allocated to support those calls. If the number of allocated CCBs is higher than the number of CCBs being used, consider that there might be a problem in releasing CCBs. Make sure there are available CCBs for incoming calls. |
Dial on Demand Routing (DDR) is a method of providing WAN connectivity on an economical, as-needed basis, either as a primary link or as backup for a non-dial serial link.
A dialer interface is defined as any router interface capable of placing or receiving a call. This generic term should be distinguished from the term Dialer interface (with a capital D), which refers to a logical interface configured to control one or more physical interfaces of a router and which is seen in a router configuration as interface Dialer X. From this point forward, unless otherwise stated, we will be using the term dialer in its generic sense.
Dialer interface configuration comes in two flavors: dialer map-based (sometimes referred to as Legacy DDR), and dialer profiles. Which method you use depends on the circumstances under which you need dial connectivity. Dialer map-based DDR was first introduced in IOS version 9.0, dialer profiles in IOS version 11.2.
At its heart, DDR is just an extension of routing wherein interesting packets are routed to a dialer interface, triggering a dial attempt. The following sections explain the concepts involved in defining interesting traffic and explain the routing used for DDR connections.
Interesting is the term used to describe packets or traffic that will either trigger a dial attempt or, if a dial link is already active, will reset the idle timer on the dialer interface. For a packet to be considered interesting:
the packet must meet the "permit" criteria defined by an access-list
the access-list must be referenced by the dialer-list or the packet must be of a protocol which is universally permitted by the dialer-list
the dialer list must be associated with a dialer interface by use of a dialer-group
Packets are never automatically considered to be interesting (by default). Interesting packet definitions must be explicitly declared in a router or access server configuration.
In the configuration of each dialer interface on the router or access server, there must be a dialer-group command. If the dialer-group command is not present, there is no logical link between the interesting packet definitions and the interface. The command syntax:
dialer-group [group number]
The group number is the number of the dialer access group to which the specific interface belongs. This access group is defined with the dialer-list command. Acceptable values are nonzero, positive integers between 1 and 10.
An interface can be associated with a single dialer access group only; multiple dialer-group assignment is not allowed. A second dialer access group assignment will override the first. A dialer access group is defined with the dialer-group command. The dialer-list command associates an access list with a dialer access group.
Packets that match the specified dialer group trigger a connection request.
The destination address of the packet is evaluated against the access list specified in the associated dialer-list command. If it passes, either a call is initiated (if no connection has already been established) or the idle timer is reset (if a call is currently connected).
The dialer-list global configuration command is used to define a DDR dialer list to control dialing by protocol, or by a combination of protocol and access list. Interesting packets are those which match the protocol-level permit or which are permitted by the list in the dialer-list command: dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number | access-group}
dialer-group is the number of a dialer access group identified in any dialer-group interface configuration command.
protocol-name is one of the following protocol keywords: appletalk, bridge, clns, clns_es, clns_is, decnet, decnet_router-L1, decnet_router-L2, decnet_node, ip, ipx, vines, or xns.
permit permits access to an entire protocol.
deny denies access to an entire protocol.
list specifies that an access list will be used for defining a granularity finer than an entire protocol.
access-list-number - Access list numbers specified in any DECnet, Banyan VINES, IP, Novell IPX, or XNS standard or extended access lists, including Novell IPX extended service access point (SAP) access lists and bridging types. See Table 16-7 for the supported access list types and numbers.
access-group filter list name used in the clns filter-set and clns access-group commands.
Table 16-7: Access-List Numbering By Protocol
Access List Type | Access List Number Range (decimal) |
---|---|
AppleTalk | 600-699 |
Banyan VINES (standard) | 1-100 |
Banyan VINES (extended) | 101-200 |
DECnet | 300-399 |
IP (standard) | 1-99 |
IP (extended) | 100-199 |
Novell IPX (standard) | 800-899 |
Novell IPX (extended) | 900-999 |
Transparent Bridging | 200-299 |
XNS | 500-599 |
For each networking protocol that is to be sent across the dial connection, a access list may be configured. For purposes of cost control, it is usually desirable to configure an access list in order to prevent certain traffic, such as routing updates, from bringing up or keeping up a connection. Note that when we create access lists for the purpose of defining interesting and uninteresting traffic, we are not declaring that uninteresting packets cannot cross the dial link. We are just indicating that they will not reset the idle timer, nor will they bring up a connection on their own. As long as the dial connection is up, uninteresting packets will still be allowed to flow across the link.
For example, a router running EIGRP as its routing protocol can have an access list configured to declare EIGRP packets uninteresting and all other IP traffic interesting:
access-list 101 deny eigrp any any access-list 101 permit ip any any
Access lists can be configured for all protocols that might cross the dial link. Remember that for any protocol, the default behavior in the absence of an access-list permit statement is to deny all traffic. If there is no access list and no dialer-list command permitting the protocol, then that protocol will be uninteresting. In actual practice, if there is no dialer list for a protocol, those packets will not flow across the link at all.
With all the elements in place, you can examine the complete process by which the "interesting" status of a packet is determined. In this example, IP and IPX are the protocols which may cross the dial link. The user wants to prevent broadcasts and routing updates from initiating a call or keeping the link up.
! interface async 1 dialer-group 7 ! access-list 121 deny eigrp any any access-list 121 deny ip any host 255.255.255.255 access-list 121 permit ip any any access-list 903 deny -1 FFFFFFFF 0 FFFFFFFF 452 access-list 903 deny -1 FFFFFFFF 0 FFFFFFFF 453 access-list 903 deny -1 FFFFFFFF 0 FFFFFFFF 457 access-list 903 permit -1 ! dialer-list 7 protocol ip list 121 dialer-list 7 protocol ipx list 903 !
A packet must be permitted by the access-list 121 statements, before crossing the interface async 1, in order to be considered interesting. In this case, EIGRP packets are denied, as are any other broadcast packets, while all other IP traffic is permitted. Remember that this does not prevent EIGRP packets from transiting the link. It only means that these packets will not reset the idle-timer or initiate a dial attempt.
Similarly, access-list 903 declares IPX RIP, SAPs and GNS requests to be uninteresting, while all other IPX traffic is interesting. Without these deny statements, the dial connection would likely never come down and a very large phone bill would result since packets of these types constantly flow across an IPX network.
With dialer-group 7 configured on the async interface, we know that dialer-list 7 is needed to tie the interesting traffic filters (that is, access lists) to the interface. One dialer-list statement is required (and only one can be configured) for each protocol, making sure that the dialer list number is the same as the dialer group number on the interface.
Once again, it is important to remember that deny statements in the access lists configured for defining interesting traffic will not prevent the denied packets from crossing the link.
Using the command debug dialer, you can see the activity that triggers a dial attempt:
Dialing cause: Async1: ip (s=172.16.1.111 d=172.16.2.22)
Here we see that IP traffic with a source address of 172.16.1.111 and a destination address of 172.16.2.22 has triggered a dial attempt on interface Async1.
Once defined, interesting packets must be routed properly for a call to be initiated. The routing process depends on two things: routing table entries and an "up" interface over which to route packets.
In order for packets to be routed to and through an interface, that interface must be up/up as seen in a show interfaces output:
Montecito# show interfaces ethernet 0 Ethernet0 is up, line protocol is up Hardware is Lance, address is . . .
What happens to a dialer interface that is not connected? If protocol is not up and running on the interface, the implication is that the interface itself will not be up. Routes which rely on that interface will be flushed from the routing table, and traffic will not be routed to that interface. The result is that no calls would be initiated by the interface.
The solution to counter this possibility is to allow the state up/up (spoofing) for dialer interfaces. Any interface can be configured as a dialer interface. For example, a Serial or Async interface could be made into a dialer by adding the command dialer in-band or dialer dtr to the interface's configuration. These lines are unnecessary for interfaces that are by nature a dialer interface (BRIs and PRIs). The output for a show interface will look like this:
Montecito# show interfaces bri 0 BRI0 is up, line protocol is up (spoofing) Hardware is BRI Internet address is . . .
In other words, the interface "pretends" to be up/up so that associated routes will remain in force and so that packets can be routed to the interface.
There are circumstances under which a dialer interface will not be up/up (spoofing). The show interface output may show the interface as being administratively down:
Montecito# show interfaces bri 0 BRI0 is administratively down, line protocol is down Hardware is BRI Internet address is . . .
Administratively down merely means that the interface has been configured with the command shutdown. This is the default state of any router interface when the router is booted for the very first time. To remedy this, use the interface configuration command no shutdown.
The interface may also be seen to be in standby mode:
Montecito# show interfaces bri 0 BRI0 is standby mode, line protocol is down Hardware is BRI Internet address is . . .
This state indicates that the interface has been configured as the backup for another interface. When a connection requires redundancy in case of failure, a dialer interface can be set up as the backup. This is accomplished by adding the following commands to the primary connection's interface:
backup interface [interface] backup delay [enable-delay] [disable-delay]
Once the backup interface command has been configured, the interface used as the backup will be put into standby mode until such time as the primary interface goes to a state of down/down. At that time, the dialer interface configured as a backup, will go to a state of up/up (spoofing) pending a dial event.
The surest way to route packets to a dialer interface is with static routing. These routes are manually entered into the configuration of the router or access server with the command:
ip route prefix mask {address | interface} [distance]
prefix : IP route prefix for the destination.
mask : Prefix mask for the destination.
address : IP address of the next hop that can be used to reach the destination network.
interface : Network interface to use for outbound traffic.
distance : (Optional) An administrative distance. This argument is used in floating static routes.
Static routes are used in situations where the dial link is the only connection to the remote site. A static route has an administrative distance value of one (1), which makes it preferred over dynamic routes to the same destination.
On the other hand, floating static routes - that is, static routes with a pre-defined administrative distance - are typically used in backup DDR scenarios. In these scenarios a dynamic routing protocol, such as RIP or EIGRP, routes packets across the primary link.
A normal static route (administrative distance = 1) is preferable to either the EIGRP (administrative distance = 90) or RIP (administrative distance = 120). The static route causes packets to be routed across the dial line, even if the primary is up and capable of passing traffic. If, however, the static route is configured with an administrative distance higher than that of any of the dynamic routing protocols in use on the router, the floating static route will only be used in the absence of a "better" route - one with a lower administrative distance.
If Backup DDR is being invoked by use of the backup interface command, the situation is somewhat different. Because the dialer interface remains in standby mode while the primary is up, a static route or a floating static route may be configured. The dialer interface will not attempt to connect until after the primary interface goes down/down.
For a given connection, the number of static (or floating static) routes necessary is a function of the addressing on the dialer interfaces. In cases where the two dialer interfaces (one on each of the two routers) share a common network or subnet, typically only one static route is required. It points to the remote LAN using the address of the remote router's dialer interface as the next-hop address.
Example 1: Dial is the only connection using numbered interfaces. One route is sufficient.
Figure 16-4: Dial Using Numbered Interfaces
Montecito: ip route 192.168.10.0 255.255.255.0 172.16.20.2 Goleta: ip route 10.1.1.0 255.255.255.0 172.16.20.1
Example 2: Dial is the only connection using unnumbered interfaces. This can be configured with just one route, but it is common to configure two routes: a host-route to the LAN interface on the remote router and a route to the remote LAN via the remote LAN interface. This is done to prevent Layer3-to-Layer2 mapping problems, which can result in encapsulation failures.
This method is also used if the dialer interfaces on the two devices are numbered, but not in the same network or subnet.
Figure 16-5: Dial Using Unnumbered Interfaces
Montecito: ip route 192.168.10.0 255.255.255.0 192.168.10.1 ip route 192.168.10.1 255.255.255.255 BRI0 Goleta: ip route 10.1.1.0 255.255.255.0 10.1.1.1 ip route 10.1.1.1 255.255.255.255 BRI0
Example 3: Dial is a backup connection using numbered interfaces. One floating static route is required.
Figure 16-6: Backup Using Numbered Interfaces
Montecito: ip route 192.168.10.0 255.255.255.0 172.16.20.2 200 Goleta: ip route 10.1.1.0 255.255.255.0 172.16.20.1 200
Example 4: Dial is a backup connection using unnumbered interfaces. As in Example 2 above, this method is also used if the dialer interfaces on the two devices are numbered, but not in the same network or subnet.
Figure 16-7: Backup Using Unumbered Interfaces
Montecito: ip route 192.168.10.0 255.255.255.0 192.168.10.1 200 ip route 192.168.10.1 255.255.255.255 BRI0 200 Goleta: ip route 10.1.1.0 255.255.255.0 10.1.1.1 200 ip route 10.1.1.1 255.255.255.255 BRI0 200
Dialer Map-based (Legacy) DDR is powerful and comprehensive, but its limitations affect scaling and extensibility. Dialer Map-based DDR is based on a static binding between the per-destination call specification and the physical interface configuration.
However, Dialer Map-based DDR also has many strengths. It supports Frame Relay, ISO CLNS, LAPB, snapshot routing, and all routed protocols that are supported on Cisco routers. By default, Dialer Map-based DDR supports fast switching.
When configuring an interface for outbound calling, one dialer map must be configured for each remote destination, and for each different called number at the remote destination. For instance, if you want a Multilink PPP connection when dialing from an ISDN BRI into another ISDN BRI interface that has a different local directory number for each of its B-Channels, you need one dialer map for each of the remote numbers:
! interface bri 0 dialer map ip 172.16.20.1 name Montecito broadcast 5551234 dialer map ip 172.16.20.1 name Montecito broadcast 5554321 !
The order in which dialer maps are configured can be important. If two or more dialer map commands refer to the same remote address, the router or access server will try them one after another, in order, until a it successfully establishes a connection
Note: IOS can dynamically build dialer maps on a router receiving a call. The dialer map is built based on the authenticated username and the negotiated IP address of the caller. Dynamic dialer maps can only be seen in the output of the command show dialer map. You cannot view them in the running configuration of the router or access server.
Use the following form of the dialer map interface configuration command to:
configure a serial interface or ISDN interface to call one or multiple sites, or
receive calls from multiple sites.
All options are shown in this first form of the command. To delete a particular dialer map entry, use a no form of this command.
dialer map protocol next-hop-address [name hostname] [spc] [speed 56 | 64] [broadcast] [modem-script modem-regexp] [system-script system-regexp] [dial-string[:isdn-subaddress]]
Use the following form of the dialer map command to:
configure a serial interface or ISDN interface to place a call to multiple sites, and
to authenticate calls from multiple sites.
dialer map protocol next-hop-address [name hostname] [spc] [speed 56 | 64] [broadcast] [dial-string[:isdn-subaddress]]
Use the following form of the dialer map command to configure a serial interface or ISDN interface to support bridging.
dialer map bridge [name hostname] [spc] [broadcast] [dial-string[:isdn-subaddress]]
Use the following form of the dialer map command to configure an asynchronous interface to place a call to:
a single site that requires a system script or that has no assigned modem script, or
multiple sites on a single line, on multiple lines, or on a dialer rotary group.
dialer map protocol next-hop-address [name hostname] [broadcast] [modem-script modem-regexp] [system-script system-regexp] [dial-string]
protocol - Protocol keywords. Use one of the following: appletalk, bridge, clns, decnet, ip, ipx, novell, snapshot, vines, or xns.
next-hop-address - The protocol address used to match against addresses to which packets are destined. This argument is not used with the bridge protocol keyword.
name - (Optional) Indicates the remote system with which the local router or access server communicates. Used for authenticating the remote system on incoming calls.
hostname - (Optional) Case-sensitive name or ID of the remote device (usually the host name). For routers with ISDN interfaces, the hostname field can contain the number that the calling line ID provides (in cases where calling line identification, also referred to as CLI , caller ID , and automatic number identification (ANI), is available).
spc - (Optional) Specifies a semipermanent connection between customer equipment and the exchange. It is used only in Germany for circuits between an ISDN BRI and a 1TR6 ISDN switch and in Australia for circuits between an ISDN PRI and a TS-014 switch.
speed 56 | 64 - (Optional) Keyword and value indicating the line speed in kilobits per second to use. Used for ISDN only. The default speed is 64 kbps.
broadcast - (Optional) Indicates that broadcasts should be forwarded to this protocol address.
modem-script - (Optional) Indicates the modem script to be used for the connection (for asynchronous interfaces).
modem-regexp - (Optional) Regular expression to which a modem script will be matched (for asynchronous interfaces).
system-script - (Optional) Indicates the system script to be used for the connection (for asynchronous interfaces).
system-regexp - (Optional) Regular expression to which a system script will be matched (for asynchronous interfaces).
dial-string[:isdn-subaddress] (Optional) Telephone number sent to the dialing device upon recognition of packets with a specified next hop address that matches the defined access list (and the optional subaddress number used for ISDN multipoint connections). The dial string and ISDN subaddress, if used, must be the last item in the command line.
Note: In this section the term "dialer interface" refers to the configured interface; not to a physical interface on the router or access server.
The Dialer Profiles implementation of DDR, introduced in IOS version 11.2, is based on a separation between logical and physical interface configuration. Dialer Profiles also allows the logical and physical configurations to be bound together dynamically on a per-call basis.
The Dialer Profiles methodology is advantageous when you want to do the following:
share an interface (ISDN, asynchronous, or synchronous serial) to place or receive calls
change any configuration on a per-user basis (except encapsulation in the first phase of Dialer Profiles)
bridge to many destinations
avoid split horizon problems
Dialer Profiles allow the configuration of physical interfaces to be separated from the logical configuration required for a call, and they also allow the logical and physical configurations to be bound together dynamically on a per-call basis.
A Dialer Profile consists of the following elements:
A Dialer interface (a logical entity) configuration, including one or more dial strings (each of which is used to reach one destination subnetwork)
A dialer map class that defines all the characteristics for any call to the specified dial string
An ordered dialer pool of physical interfaces to be used by the dialer interface
All calls going to or from the same destination subnetwork use the same dialer profile.
A Dialer interface configuration includes all settings needed to reach a specific destination subnetwork (and any networks reached through it). Multiple dial strings can be specified for the same Dialer interface; each dial string can be associated with a different dialer map class. The dialer map-class defines all the characteristics for any call to the specified dial string. For example, the map-class for one destination might specify a 56-kbps ISDN speed. The map-class for a different destination might specify a 64-kbps ISDN speed.
Each Dialer interface uses a dialer pool, which is a pool of physical interfaces ordered on the basis of the priority assigned to each physical interface. A physical interface can belong to multiple dialer pools, with contention being resolved by priority. ISDN BRI and PRI interfaces can set a limit on the minimum and maximum number of B channels reserved by any dialer pools. A channel reserved by a dialer pool remains idle until traffic is directed to the pool.
When Dialer Profiles are used to configure DDR, a physical interface has no configuration settings except encapsulation and the dialer pools to which the interface belongs.
Note: The preceding paragraph has one exception. Commands that apply before authentication is complete must be configured on the physical (or BRI or PRI) interface and not on the Dialer Profile. Dialer Profiles do not copy PPP authentication commands (or LCP commands) to the physical interface.
Figure 16-8 shows a typical application of dialer profiles. Router A has dialer interface 1 for dial-on-demand routing with subnetwork 1.1.1.0, and dialer interface 2 for dial-on-demand routing with subnetwork 2.2.2.0. The IP address for dialer interface 1 is its address as a node in network 1.1.1.0. At the same time, that IP address serves as the IP address of the physical interfaces used by the dialer interface 1. Similarly, the IP address for dialer interface 2 is its address as a node in network 2.2.2.0.
Figure 16-8: Typical Dialer Profiles Application
A dialer interface uses only one dialer pool. A physical interface, however, can be a member of one or many dialer pools, and a dialer pool can have several physical interfaces as members.
Figure 16-9 illustrates the relations among the concepts of dialer interface, dialer pool, and physical interfaces. Dialer interface 0 uses dialer pool 2. Physical interface BRI 1 belongs to dialer pool 2 and has a specific priority in the pool. Physical interface BRI 2 also belongs to dialer pool 2. Because contention is resolved on the basis of priority-levels of the physical interfaces in the pool, BRI 1 and BRI 2 have to be assigned different priorities in the pool. Perhaps BRI 1 is assigned priority 100 and BRI 2 is assigned priority 50 in dialer pool 2 (a priority of 50 is higher than a priority of 100). BRI 2 has a higher priority in the pool, and its calls will be placed first.
Figure 16-9: Relations Among Dialer Interfaces, Dialer Pools, and Physical Interfaces
Command | Purpose |
---|---|
interface dialer number | Create a Dialer interface. |
ip address address mask | Specify the IP address and mask of the Dialer interface as a node in the destination network to be called. |
encapsulation ppp | Specify PPP encapsulation. |
dialer remote-name username | Specify the remote router CHAP authentication name. |
dialer string dial-string class class-name | Specify the remote destination to call and the map class that defines characteristics for calls to this destination. |
dialer poolnumber | Specify the dialing pool to use for calls to this destination. |
dialer-group group-number | Assign the Dialer interface to a dialer group. |
dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number} | Specify an access list by list number or by protocol and list number to define the "interesting" packets that can trigger a call. |
The Point-to-Point Protocol (PPP) is far and away the most common link-layer transport protocol, having completely usurped SLIP as the protocol of choice for dial (and in many cases, non-dial) synchronous and asynchronous serial connections. PPP was originally defined in 1989 by RFC 1134, which has since been made obsolete by a series of RFCs culminating (as of this writing) in RFC1661. There are also numerous RFCs that define elements of the protocol, such as RFC1990 (the PPP Multilink Protocol), RFC2125 (the PPP Bandwidth Allocation Protocol), and many others. An online repository of RFCs can be found at:
Perhaps the best definition of PPP can be found in RFC1661, which states:
The Point-to-Point Protocol (PPP) provides a standard method for transporting multi-protocol datagrams over point-to-point links. PPP is comprised of three main components:
A method for encapsulating multi-protocol datagrams.
A Link Control Protocol (LCP) for establishing, configuring, and testing the data-link connection.
A family of Network Control Protocols (NCPs) for establishing and configuring different network-layer protocols.
PPP negotiation consists of three phases: Link Control Protocol (LCP), Authentication, and Network Control Protocol (NCP). Each proceeds in order, following the establishment of the async or ISDN connection.
PPP does not follow a client/server model. All connections are peer-to-peer. Therefore, when there is a caller and a receiver, both ends of the point-to-point connection must agree on the negotiated protocols and parameters.
When negotiation begins, each of the peers wanting to establish a PPP connection must send a Configure Request (seen in debug ppp negotiation and referred to hereafter as CONFREQ). Included in the CONFREQ are any options that are not the link default. These often include Maximum Receive Unit (MRU), Async Control Character Map (ACCM), Authentication Protocol (AuthProto), and the Magic Number. Also seen are the Maximum Receive Reconstructed Unit (MRRU) and Endpoint Discriminator (EndpointDisc), used for Multilink PPP.
There are three possible responses to any CONFREQ:
A Configure-Acknowledge (CONFACK) must be issued if the peer recognizes the options and agrees to the values seen in the CONFREQ.
A Configure-Reject (CONFREJ) must be sent if any of the options in the CONFREQ are not recognized (for instance, some vendor-specific options) or if the values for any of the options have been explicitly disallowed in the configuration of the peer.
A Configure-Negative-Acknowledge (CONFNAK) must be sent if all the options in the CONFREQ are recognized, but the values are not acceptable to the peer.
The two peers continue to exchange CONFREQs, CONFREJs and CONFNAKs until each sends a CONFACK, until the dial connection is broken, or until one or both of the peers indicates that the negotiation can not be completed.
After the successful completion of LCP negotiation and reaching an agreement on AuthProto, the next step is authentication. Authentication, while not mandatory per RFC1661, is highly recommended on all dial connections. In some instances, it is a requirement for proper operation; Dialer Profiles being a case in point.
The two principal types of authentication in PPP are the Password Authentication Protocol (PAP) and the Challenge Handshake Authentication Protocol (CHAP), defined by RFC1334 and updated by RFC1994.
PAP is the simpler of the two, but is less secure because the plain-text password is sent across the dial connection. CHAP is more secure because the plain-text password is not ever sent across the dial connection.
PAP may be necessary in one of the following environments:
A large installed base of client applications that do not support CHAP
Incompatibilities between different vendor implementations of CHAP
When discussing authentication, it is helpful to use the terms "requester" and "authenticator" to distinguish the roles played by the devices at either end of the connection, though either peer can act in either role. "Requester" describes the device that requests network access and supplies authentication information; the "authenticator" verifies the validity of the authentication information and either allows or disallows the connection. It is common for both peers to act in both roles when a DDR connection is being made between routers.
PAP is fairly simple. After successful completion of the LCP negotiation, the requester repeatedly sends its username/password combination across the link until the authenticator responds with an acknowledgment or until the link is broken. The authenticator may disconnect the link if it determines that the username/password combination is not valid.
CHAP is somewhat more complicated. The authenticator sends a challenge to the requester, which then responds with a value. This value is calculated by using a "one-way hash" function to hash the challenge and the CHAP password together. The resulting value is sent to the authenticator along with the requester's CHAP hostname (which may be different from its actual hostname) in a response message.
The authenticator reads the hostname in the response message, looks up the expected password for that hostname, and then calculates the value it expects the requester sent in its response by performing the same hash function the requester performed. If the resulting values match, the authentication is successful. Failure should lead to a disconnect.
An authentication, authorization and accounting (AAA) service, such as TACACS+ or RADIUS, may be used in accomplishing PAP or CHAP.
After successful authentication, the NCP phase begins. As in LCP, the peers exchange CONFREQs, CONFREJs, CONFNAKs and CONFACKs. However, in this phase of negotiation, the elements being negotiated have to do with higher layer protocols - IP, IPX, Bridging, CDP, and so on. One or more of these protocols may be negotiated. As it is the most commonly used, and because other protocols operate in much the same fashion, Internet Protocol Control Protocol (IPCP), defined in RFC1332, is the focus of this discussion. Other pertinent RFCs include, but are not limited to:
RFC1552 (IPX Control Protocol)
RFC1378 (AppleTalk Control Protocol)
RFC1638 (Bridging Control Protocol)
RFC1762 (DECnet Control Protocol)
RFC1763 (Vines Control Protocol)
In addition, Cisco Discovery Protocol Control Protocol (CDPCP) may be negotiated during NCP, though this is not common. Cisco TAC engineers will usually advise that the command no cdp enable be configured on any and all dialer interfaces to prevent CDP packets keeping a call up indefinitely.
The key element negotiated in IPCP is each peer's address. Each of the peers is in one of two possible states; either it has an IP address or it does not. If the peer already has an address, it will send that address in a CONFREQ to the other peer. If the address is acceptable to the other peer, a CONFACK will be returned. If the address is not acceptable, the reply will be a CONFNAK containing an address for the peer to use.
If the peer has no address, it will send a CONFREQ with the address 0.0.0.0. This tells the other peer to assign an address, which is accomplished by the sending of a CONFNAK with the proper address.
Other options may be negotiated in IPCP. Commonly seen are the primary and secondary addresses for Domain Name Server and NetBIOS Name Server, as described in Informational RFC1877. The IP Compression Protocol (RFC1332) is also common.
Alternate PPP methodologies include multilink PPP, multichassis PPP, and virtual profiles.
The Multilink Point-to-Point Protocol (MLP) feature provides load-balancing functionality over multiple WAN links. At the same time it provides multi-vendor interoperability, packet fragmentation and proper sequencing, and load calculation on both inbound and outbound traffic. The Cisco implementation of Multilink PPP supports the fragmentation and packet sequencing specifications in RFC1717.
Multilink PPP allows packets to be fragmented. These fragments can be sent at the same time over multiple point-to-point links to the same remote address. The multiple links come up in response to a dialer load threshold that you define. The load can be calculated on inbound traffic, outbound traffic, or on either, as needed for the traffic between the specific sites. MLP provides bandwidth on demand and reduces transmission latency across WAN links.
Multilink PPP works over the following interface types (single or multiple) which are configured to support both dial-on-demand rotary groups and PPP encapsulation:
asynchronous serial interfaces
BRIs
PRIs
To configure Multilink PPP on asynchronous interfaces, you configure the asynchronous interfaces to support DDR and PPP encapsulation. You then configure a Dialer interface to support PPP encapsulation, bandwidth on demand, and Multilink PPP. At some point, however, adding more asynchronous interfaces does not improve performance. With the default MTU size, Multilink PPP should support three asynchronous interfaces using V.34 modems. However, packets might be dropped occasionally if the MTU is small or if large bursts of short frames occur.
To enable Multilink PPP on a single ISDN BRI or PRI interface, you are not required to define a dialer rotary group separately because ISDN interfaces are dialer rotary groups by default. If you do not use PPP authentication procedures, your telephone service must pass caller ID information.
A load threshold number is required. For an example of configuring Multilink PPP on a single ISDN BRI interface, see the Example of Multilink PPP on One ISDN Interface below.
When Multilink PPP is configured and you want a multilink bundle to be connected indefinitely, use the dialer idle-timeout command to set a very high idle timer. The dialer-load threshold 1 command does not keep a multilink bundle of n links connected indefinitely, and the dialer-load threshold 2 command does not keep a multilink bundle of two links connected indefinitely.
To enable Multilink PPP on multiple ISDN BRI or PRI interfaces, you set up a Dialer rotary interface and configure it for Multilink PPP. You then configure the BRIs separately and add them each to the same rotary group. See the Example of Multilink PPP on Multiple ISDN Interfaces below.
The following example enables Multilink PPP on the BRI interface 0. When one BRI is configured, no dialer rotary group configuration is required (ISDN interface is a rotary group by default).
interface bri 0 ip address 171.1.1.7 255.255.255.0 encapsulation ppp dialer idle-timeout 30 dialer load-threshold 40 either dialer map ip 172.16.20.2 name Goleta 5551212 dialer-group 1 ppp authentication pap ppp multilink
The following example configures multiple ISDN BRIs to belong to the same dialer rotary group for Multilink PPP. Use the dialer rotary-group command to assign each of the ISDN BRIs to that dialer rotary group which must match the number of the Dialer interface (number 0 in this case).
interface BRI0 no ip address encapsulation ppp dialer rotary-group 0 ! interface BRI1 no ip address encapsulation ppp dialer rotary-group 0 ! interface Dialer0 ip address 172.16.20.1 255.255.255.0 encapsulation ppp dialer in-band dialer idle-timeout 500 dialer map ip 172.16.20.2 name Goleta broadcast 5551212 dialer load-threshold 30 either dialer-group 1 ppp authentication chap ppp multilink
Multilink PPP provides the capability of splitting and recombining packets to a single end-system across a logical pipe (also called a bundle) formed by multiple links. Multilink PPP provides bandwidth on demand and reduces transmission latency across WAN links.
Multichassis Multilink PPP (MMP), on the other hand, provides the additional capability for links to terminate at multiple routers with different remote addresses. MMP can also handle both analog and digital traffic.
This functionality is intended for situations in which there are large pools of dial-in users, in which a single access server cannot provide enough dial-in ports. MMP allows companies to provide a single dialup number to its users and to apply the same solution to analog and digital calls. This feature allows internet service providers, for example, to allocate a single ISDN rotary number to several ISDN PRIs across several routers.
For a complete description of the MMP commands referenced herein, refer to the Cisco Dial Solutions Command Reference. To locate documentation of other commands that appear in this chapter, use the command reference master index or search online.
MMP is supported on the Cisco 7500, 4500, and 2500 series platforms and on synchronous serial, asynchronous serial, ISDN BRI, ISDN PRI, and Dialer interfaces.
MMP does not require reconfiguration of telephone company switches.
Routers or access servers are configured to belong to groups of peers, called stack groups. All members of the stack group are peers; stack groups do not need a permanent lead router. Any stack group member can answer calls coming from a single access number, which is usually an ISDN PRI hunt group. Calls can come in from remote user devices, such as routers, modems, ISDN terminal adapters, or PC cards.
Once a connection is established with one member of a stack group, that member owns the call. If a second call comes in from the same client and a different router answers the call, the router establishes a tunnel and forwards all packets belonging to the call to the router that owns the call. The process of establishing a tunnel and forwarding calls through it to the router that owns the call is sometimes called projecting the PPP link to the call master.
If a more powerful router is available, it can be configured as a member of the stack group and the other stack group members can establish tunnels and forward all calls to it. In such a case, the other stack group members are just answering calls and forwarding traffic to the more powerful offload router.
Note: High-latency WAN lines between stack group members can make stack group operation inefficient.
MMP call handling, bidding, and Layer 2 forwarding operations in the stack group proceed as follows. It is also shown in Figure 16-10.
When the first call comes in to the stack group, Router A answers.
In the bidding, Router A wins because it already has the call. Router A becomes the call-master for that session with the remote device. Router A might also be called the host to the master bundle interface.
When the remote device that initiated the call needs more bandwidth, it makes a second Multilink PPP call to the group.
When the second call comes in, Router D answers it and informs the stack group. Router A wins the bidding because it already is handling the session with that remote device.
Router D establishes a tunnel to Router A and forwards the raw PPP data to Router A.
Router A re-assembles and re-sequences the packets.
If more calls come in to Router D and they too belong to Router A, the tunnel between A and D enlarges to handle the added traffic. Router D does not establish an additional tunnel to A.
If more calls come in and are answered by any other router, that router also establishes a tunnel to A and forwards the raw PPP data.
The re-assembled data is passed on the corporate network as if it had all come through one physical link.
Figure 16-10: Typical Multichassis Multilink PPP Scenario
In contrast to the previous figure, Figure 16-11 features an offload router. Access servers that belong to a stack group answer calls, establish tunnels, and forward calls to a Cisco 4700 router that wins the bidding and is the call-master for all the calls. The Cisco 4700 re-assembles and re-sequences all the packets coming in through the stack group.
Figure 16-11: Multichassis Multilink PPP with an Offload Router as a Stack Group Member
Note: You can build stack groups using different access server, switching, and router platforms. However, universal access servers such as the Cisco AS5200 should not be combined with ISDN. This should only be done with access servers such as the 4x00 platform. Because calls from the central office are allocated in an arbitrary way, this combination could result in an analog call being delivered to a digital-only access server, which would not be able to handle the call.
MMP support on a group of routers requires that each router be configured to support the following:
Multilink PPP
Stack Group Bidding Protocol (SGBP)
Virtual template used for cloning interface configuration to support MMP
Virtual Profiles is a unique Point-to-Point Protocol (PPP) application that can create and configure a virtual access interface dynamically when a dial-in call is received, and tear down the interface dynamically when the call ends. Virtual Profiles works with straightforward PPP and with Multilink PPP (MLP).
The configuration information for a Virtual Profiles virtual access interface can come from a virtual template interface, or from user-specific configuration stored on an authentication, authorization, and accounting (AAA) server, or both.
The user-specific AAA configuration used by Virtual Profiles is interface configuration and is downloaded during LCP negotiations. Another feature, called Per-User Configuration, also uses configuration information gained from a AAA server. However, Per-User Configuration uses network configuration (such as access lists and route filters) downloaded during NCP negotiations.
Two rules govern virtual access interface configuration by Virtual Profiles virtual template interfaces and AAA configurations:
Each virtual access application can have, at most, one template from which to clone. However, it can have multiple AAA configurations from which to clone (Virtual Profiles AAA information and AAA Per-User Configuration, which in turn might include configuration for multiple protocols).
When Virtual Profiles is configured by virtual template, its template has higher priority than any other virtual template.
See the "Interoperability with Other Cisco Dial Features" section below for a description of the possible configuration sequences that depend on the presence or absence by MLP or another virtual access feature that clones a virtual template interface.
This feature runs on all Cisco IOS platforms that support MLP.
For a complete description of the commands mentioned in this section, refer to the "Virtual Profiles Commands" chapter in the Dial Solutions Command Reference in the Cisco IOS documentation set. To locate documentation of other commands that appear in this chapter, you can use the command reference master index or search online.
This section presents background information about Virtual Profiles to help you understand this application before you start to configure it.
We recommend that unnumbered addresses be used in virtual template interfaces to ensure that duplicate network addresses are not created on virtual access interfaces.
Use of user-specific AAA interface configuration information with Virtual Profiles requires the router to be configured for AAA and requires the AAA server to have user-specific interface configuration AV-pairs. The relevant AV-pairs (on a RADIUS server) begin as follows:
cisco-avpair = "lcp:interface-config=...",
The information that follows the equal sign (=) could be any Cisco IOS interface configuration command. For example, the line might be the following:
cisco-avpair = "lcp:interface-config=ip address 200.200.200.200 255.255.255.0",
Use of a virtual template interface with Virtual Profiles requires a virtual template to be defined specifically for Virtual Profiles.
Virtual Profiles interoperates with Cisco DDR, Multilink PPP (MLP), and dialers such as ISDN.
Virtual Profiles fully interoperates with physical interfaces in the following DDR configuration states when no other virtual access interface application is configured:
Dialer Profiles are configured for the interface. The dialer profile is used instead of the Virtual Profiles configuration.
DDR is not configured on the interface. Virtual Profiles overrides the current configuration.
Legacy DDR is configured on the interface. Virtual Profiles overrides the current configuration.
Note: If a dialer interface is used (including any ISDN dialer), its configuration is used on the physical interface instead of the Virtual Profiles configuration.
As shown in table 16-8, the exact configuration of a virtual access interface depends on the following three factors:
Whether Virtual Profiles is configured by Virtual Template, by AAA, by both, or by neither. These states are shown as "VP VT only," "VP AAA only," "VP VT and VP AAA," and "No VP at all," respectively, in the table.
The presence or absence of a dialer interface.
The presence or absence of MLP. The column label "MLP" is a stand-in for any virtual access feature that supports MLP and clones from a virtual template interface.
In Table 16-8, "Multilink VT" means that a virtual template interface is cloned if one is defined for MLP or a virtual access feature that uses MLP.
Table 16-8: Virtual Profiles Configuration Cloning Sequence
Virtual Profiles Configuration | MLP No Dialer | MLP Dialer | No MLP No Dialer | No MLP Dialer |
---|---|---|---|---|
VP VT only | VP VT | VP VT | VP VT | VP VT |
VP AAA only | (Multilink VT) VP AAA | (Multilink VT) VP AAA | VP AAA | VP AAA |
VP VT and VP AAA | VP VT VP AAA | VP VT VP AAA | VP VT VP AAA | VP VT VP AAA |
No VP at all | (Multilink VT) | Dialer | No virtual access interface is created. | No virtual access interface is created. |
The order of items in any cell of the table is important. Where VP VT is shown above VP AAA, it means that first the Virtual Profiles virtual template is cloned on the interface, and then the AAA interface configuration for the user is applied to it. The user-specific AAA interface configuration adds to the configuration and overrides any conflicting physical interface or virtual template configuration commands.
Virtual Profiles also interoperates with virtual access applications that clone a virtual template interface. Each virtual access application can have, at most, one template from which to clone, but can clone from multiple AAA configurations.
The interaction between Virtual Profiles and other virtual template applications is as follows:
If Virtual Profiles is enabled and a virtual template is defined for it, the Virtual Profiles virtual template is used.
If Virtual Profiles is configured by AAA alone (no virtual template is defined for Virtual Profiles), the virtual template for another virtual access application (VPDN, for example) can be cloned onto the virtual access interface.
A virtual template, if any, is cloned to a virtual access interface before the Virtual Profiles AAA configuration or AAA Per-User Configuration. AAA Per-User Configuration, if used, is applied last.
The following new or uncommon terms are used in this chapter:
AV pair: A configuration parameter on an AAA server; part of the user configuration that the AAA server sends to the router, in response to user-specific authorization requests. The router interprets each AV pair as a Cisco IOS router configuration command and applies the AV pairs in order. In this chapter, the term AV pair refers to an interface configuration parameter on a RADIUS server.
An interface configuration AV pair for Virtual Profiles can take a form such as this:
cisco-avpair = "lcp:interface-config=ip address 1.1.1.1 255.255.255.255.0",
cloning: Creating and configuring a virtual access interface by applying configuration commands from a specific virtual template. The virtual template is the source of the generic user information and router-dependent information. The result of cloning is a virtual access interface configured with all the commands in the template.
virtual access interface: Instance of a unique virtual interface that is created dynamically and exists temporarily. Virtual access interfaces can be created and configured differently by different applications, such as Virtual Profiles and virtual private dialup networks.
virtual template interface: Generic interface configuration for certain users or for a certain purpose, plus router-dependent information. This takes the form of a list of Cisco IOS interface commands to be applied to the virtual interface as needed.
virtual profile: Instance of a unique virtual access interface that is created dynamically when certain users call in, and is torn down dynamically when the call disconnects. A specific user's virtual profile can be configured by a virtual template interface, user-specific interface configuration stored on an AAA server, or both a virtual template interface and user-specific interface configuration from AAA.
Configuration of a virtual access interface begins with a virtual template interface (if any), followed by application of user-specific configuration for the particular user's dial-in session (if any).
In this example, a ping brings up an ISDN link between routers Montecito and Goleta. Note that, while there is no timestamping in this example, it is usually recommended that you use the global configuration command service timestamps debug datetime msec.
Figure 16-12: Router-ISDN-Router
These debugs are taken from Montecito; however, the debugging on Goleta would look much the same.
Note: Your debugs may appear in a different format. This output is the older PPP debugging output format, before the modifications introduced in IOS version 11.2(8). See Chapter 17 for an example of PPP debugging in newer versions of IOS.
Montecito#show debugging PPP: PPP authentication debugging is on PPP protocol negotiation debugging is on A Montecito#ping 172.16.20.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.20.2, timeout is 2 seconds: B %LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up C ppp: sending CONFREQ, type = 3 (CI_AUTHTYPE), value = C223/5 C ppp: sending CONFREQ, type = 5 (CI_MAGICNUMBER), value = 29EBD1A7 D PPP BRI0: B-Channel 1: received config for type = 0x3 (AUTHTYPE) value = 0xC223 digest = 0x5 acked D PPP BRI0: B-Channel 1: received config for type = 0x5 (MAGICNUMBER) value = 0x28FC9083 acked E PPP BRI0: B-Channel 1: state = ACKsent fsm_rconfack(0xC021): rcvd id 0x65 F ppp: config ACK received, type = 3 (CI_AUTHTYPE), value = C223 F ppp: config ACK received, type = 5 (CI_MAGICNUMBER), value = 29EBD1A7 G PPP BRI0: B-Channel 1: Send CHAP challenge id=1 to remote H PPP BRI0: B-Channel 1: CHAP challenge from Goleta J PPP BRI0: B-Channel 1: CHAP response id=1 received from Goleta K PPP BRI0: B-Channel 1: Send CHAP success id=1 to remote L PPP BRI0: B-Channel 1: remote passed CHAP authentication. M PPP BRI0: B-Channel 1: Passed CHAP authentication with remote. N ipcp: sending CONFREQ, type = 3 (CI_ADDRESS), Address = 172.16.20.1 P ppp BRI0: B-Channel 1: Negotiate IP address: her address 172.16.20.2 (ACK) Q ppp: ipcp_reqci: returning CONFACK. R PPP BRI0: B-Channel 1: state = ACKsent fsm_rconfack(0x8021): rcvd id 0x25 S ipcp: config ACK received, type = 3 (CI_ADDRESS), Address = 172.16.20.1 T BRI0: install route to 172.16.20.2 U %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to up
A - Traffic is generated in order to initiate a dial attempt.
B - The connection is established (ISDN debugs not used in this example).
C - Montecito sends LCP configuration requests for AUTHTYPE and for MAGICNUMBER.
D - Goleta sends its CONFREQs. If the value for MAGICNUMBER is the same as the value sent by Montecito, there is a strong probability that the line is looped.
E - This indicates that Montecito has sent acknowledgments to Goleta's CONFREQs.
F - Montecito receives CONFACKs from Goleta.
G, H - Montecito and Goleta challenge each other for authentication.
J - Goleta responds to the challenge.
K, L - Goleta successfully passes authentication.
M - Message from Goleta to Montecito: authentication successful.
N, P - Each router sends its configured IP address in a CONFREQ.
Q, R - Montecito sends a CONFACK to Goleta's CONFREQ.
S - ? and vice-versa.
T, U - A route is installed from Montecito to Goleta and protocol on the interface changes to "up", indicating that the NCP negotiations have completed successfully.
Before calling the Cisco Systems Technical Assistance Center (TAC), make sure you have read through this chapter and completed the actions suggested for your system's problem.
Additionally, do the following and document the results so that we can better assist you:
For all problems, collect the output of show running-config and show version. Ensure that the command service timestamps debug datetime msec is in the configuration.
For DDR problems, collect the following:
show dialer map
debug dialer
debug ppp negotiation
debug ppp authentication
If ISDN is involved, collect:
show isdn status
debug isdn q931
debug isdn events
If modems are involved, collect:
show lines
show line [x]
show modem (if integrated modems are involved)
show modem version (if integrated modems are involved)
debug modem
debug modem csm (if integrated modems are involved)
debug chat (if a DDR scenario)
If T1s or PRIs are involved, collect:
show controller t1
Revision | Publish Date | Comments |
---|---|---|
1.0 |
30-Aug-2005 |
Initial Release |