bold aboveOriginally Posted by r0mm3L
bold aboveOriginally Posted by r0mm3L
i already activated the interfaces using "no shut" command
wala lang nako gi include ug type diha sorry
I suggest that before troubleshooting the routing of your network.Make sure that the frame-relay is up.I mean that there is exchage of frame-relay LMI(show frame lmi),PVC is up...Because even if your config is okay,there's no way that you can ping the other side if the frame-relay is down.You can see if its active or not even without ip address on interface.Have a debug on frame relay LMI to see LMI message exchange.
hi zaky,Originally Posted by zaky
lmi's are autosensed on cisco devices and his config was set to that, so this shouldn't be the problem. and he said that he could ping the hub from the spoke so i believe he has layer 2 configured successfully.
on layer 3 issues, there are serveral reasons why ospf neighbor adjacencies won't come up (in this scenario)
1. hello timers are different
2. interface had been set as passive
3. incompatible network type
4. authentication had been misconfigured
but looking at his config, everything seems to be quite right. a "sh ip ospf neighbor" would be a good place to start.
ridney
Yes, agree with you..from config, no passive interface and no ospf authentication is set which i think not so important on basic ospf network.
r0mm3l,pls post the show ip ospf neig and show ip ospf int
mga abai,
rid kmusta naman dha asa nka ron sa ccnp...have anybody know tunneling...
edsel
wla pako ka balik sa study habits but will soon be back in my old ways hehe
why are you trying to configure tunneling? is this VPN tunneling or GRE?
with GRE you only need to indicate the source and the destination under the tunnel interface. the tunnel interface doesn't need to have ip address configured on it, but you may do so.
with VPN ambot, hehe kuti man. policy, authentication, key, encryption etc. i only know peer-to-peer ipsec.
how's you network?
i will b posting the results of the show commands as soon as i configure d live network
rid vpn tunneling nga config sguro.. the fastethernet port is the source of internet connection connecting to modem dsl the other fastethernet is the source of all users pero sa cisco router agi sya.
there are also different method to implement VPN tunneling like IPSEC or PPTP. What are you trying to implement site-to-site or remote access vpn?
If you want to implement ipsec, check your ios if it is supported. Configure the NAT and then proceed for the IPSEC,ISAKMP parameters.
If you really want the detailed configuration, check at cisco website... actually, there are lots of configuration that you will learn from cisco...
Similar Threads |
|