When configuring a PIX 6.x to use the PPPoE client on the outside interface, if you recieve the following error :
“PPPoE: Unsolicited PADO, Invalid session state”
It probably means you’re as dumb as I am and didn’t specify a vpdn username with the following command :
pix(config)#vpdn username <username from ISP> password <Password>
One of our clients recently rolled out a series of VG224 voice gateways to provide analogue services in a residential deployment. Everything was running smoothly until one of the tenants wanted to know how to forward all his calls out to a mobile phone.
I remembered reading that this is supported if the VG224 is registering using Skinny, but couldn’t find any documentation on what the codes were.
I ended up finding the answer on an archived post from the [cisco-voip] mailing list.
To Enable Call Forward All on a VG224 you require the following command :
VG224(Config)#stcapp feature access-code
To View the Access Codes use the following Command:
VG224#sh stcapp feature codes
stcapp feature access-code
call forward all **1
call forward cancel **2
pickup local group **3
pickup different group **4
pickup direct **6
stcapp feature speed-dial disabled
It is possible to use 3rd party SFP’s in a Cisco 3750 with the following commands:
Switch(config)#no errdisable detect cause gbic-invalid
The first command will generate the following warning from cisco :
” Warning: When Cisco determines that a fault or defect can be traced to
the use of third-party transceivers installed by a customer or reseller,
then, at Cisco’s discretion, Cisco may withhold support under warranty or
a Cisco support program. In the course of providing support for a Cisco
networking product Cisco may require that the end user install Cisco
transceivers if Cisco determines that removing third-party parts will
assist Cisco in diagnosing the cause of a support issue.”
I wouldn’t recommend using non-Cisco SFP’s in production environments, but for a lab save the bucks and go for it.
I discovered a really cool feature of IOS that is probably common knowledge but I was never aware of.
You can perform a ping sweep of a directly connected network by pinging the broadcast or Network address.
The output is as follows :
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.255, timeout is 2 sec
Reply to request 0 from 192.168.1.19, 4 ms
Reply to request 0 from 192.168.1.59, 40 ms
Reply to request 0 from 192.168.1.57, 40 ms
Reply to request 0 from 192.168.1.56, 40 ms
This is incredibly useful for doing discovery and populating the routers ARP table after a reboot.