PIX 6.x – PPPoE: Unsolicited PADO, Invalid session state

When configuring a PIX 6.x to use the PPPoE client on the outside interface, if you recieve the following error :

“PPPoE: Unsolicited PADO, Invalid session state”

It probably means you’re as dumb as I am and didn’t specify a vpdn username with the following command :

pix(config)#vpdn username <username from ISP> password <Password>

Advertisements

VG224 – Call Forward all / Feature Codes

One of our clients recently rolled out a series of VG224 voice gateways to provide analogue services in a residential deployment. Everything was running smoothly until one of the tenants wanted to know how to forward all his calls out to a mobile phone.

I remembered reading that this is supported if the VG224 is registering using Skinny, but couldn’t find any documentation on what the codes were.

I ended up finding the answer on an archived post from the [cisco-voip] mailing list.

To Enable Call Forward All on a VG224 you require the following command :

VG224(Config)#stcapp feature access-code

To View the Access Codes use the following Command:

VG224#sh stcapp feature codes

VG224 Output:
stcapp feature access-code
prefix **
call forward all **1
call forward cancel **2
pickup local group **3
pickup different group **4
pickup direct **6

stcapp feature speed-dial disabled

Cisco 3750 – 3rd Party SFP

It is possible to use 3rd party SFP’s in a Cisco 3750 with the following commands:

Switch(config)#service unsupported-transceiver

and

Switch(config)#no errdisable detect cause gbic-invalid

The first command will generate the following warning from cisco :

” Warning: When Cisco determines that a fault or defect can be traced to
the use of third-party transceivers installed by a customer or reseller,
then, at Cisco’s discretion, Cisco may withhold support under warranty or
a Cisco support program. In the course of providing support for a Cisco
networking product Cisco may require that the end user install Cisco
transceivers if Cisco determines that removing third-party parts will
assist Cisco in diagnosing the cause of a support issue.”

I wouldn’t recommend using non-Cisco SFP’s in production environments, but for a lab save the bucks and go for it.

IOS – Ping Sweep

I discovered a really cool feature of IOS that is probably common knowledge but I was never aware of.

You can perform a ping sweep of a directly connected network by pinging the broadcast or Network address.

Example:

Router#ping 192.168.1.255

The output is as follows :
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.255, timeout is 2 sec

Reply to request 0 from 192.168.1.19, 4 ms
Reply to request 0 from 192.168.1.59, 40 ms
Reply to request 0 from 192.168.1.57, 40 ms
Reply to request 0 from 192.168.1.56, 40 ms

This is incredibly useful for doing discovery and populating the routers ARP table after a reboot.