techadmin

Members
  • Content count

    322
  • Joined

  • Last visited

Community Reputation

3 Neutral

About techadmin

  • Rank
    Advanced Member
  1. Mark, you forgot to add "NURU Massage"
  2. Hi, Is there any way to erase your crashinfo files from the flash at the same time, It is annoying to remove it one by one, Found a command to prevent the crash files from getting stored on the cisco router, But is there any way to get rid of them at once , If it gets collected.
  3. TIME based ACL is the best solution, We use to block antivirus traffic during business hours.
  4. Hi, The sh ip accounting output on one of the device shows a huge amount of traffic flowing through a single Ip address. The Source and destination Ip is the nothing but the Ip address used to create a GRE tunnel between the branch router and the core device , You can call it Ipsec GRE over OSPF. Now if i deny any of the Ip address with an ACL, the router will loose it's connectivity...................Any way to stop it??
  5. CHRIS BRYANT is the best......................He covers ever daem thing .................There's no one near him..............
  6. hehehe in the emerging markets i can see CCIE'S drawing an annual salary of 15k $ ........................Does this justify the ROI and effort that goes in to pass that exam.
  7. Simple solution..................Dont attempt that shit Exam....................JUNIPER is the Baby to go for.
  8. The biggest battle other vendor's face is providing quality Technical support, The technical documentation provided by CISCO is just amazing..................this is what makes it amazing while studying for their exams as compared to the other vendors.............But JUNIPER , HP and HAWAII are too hot on their Heel's.
  9. there is a ISDN bri interface, under which 2-3 dialer-group commands are configured...............
  10. Hi, DMVPN has been configured at the HUB end (ASA firewall 5580) , the firewall is used to terminate Ipsec vpn from the branches. Since the branches have peering with the DC ASA firewall and DR ASA firewall, The Lan range subnet is included as interesting traffic in the ACL of the branch crypto Ipsec configuration , Many of the branches face Lan reachability issues when the branch looses its peering with the DC ASA end. a sh crypto ipsec sa showed that the branch only has its peering with the DR ASA firewall and not with the DC ASA firewall. after doing a clear crypto sa , the Lan reachability problem goes away, but its very irritating as there are 4000 branches.
  11. that interface jus seems to be stuck in there..............i reloaded it.........donno how to get rid of that virtual-access1 interface.............
  12. the sh run , does not show anything..................very difficult to find out...............
  13. As the great "MARKINMANCHESTER" once said .................."Always follow the Money".
  14. Hi, there is no virtual-template interface , and a sh vpdn command gives a blank output, sh users does not show anything other then the usual stuff..........
  15. Hi, Is there any way to delete the virtual-access interface from my router..................? r1#sh ip int brief Interface IP-Address OK? Method Status Protocol FastEthernet0/0 unassigned YES unset administratively down down Serial1/0 unassigned YES unset administratively down down Serial1/1 unassigned YES unset administratively down down Serial1/2 unassigned YES unset administratively down down Serial1/3 unassigned YES unset administratively down down Virtual-Access1 unassigned YES TFTP down down