Torna indietro   Hardware Upgrade Forum > Networking e sicurezza > Networking > Networking in generale

Prova GeForce NOW upgrade Blackwell: il cloud gaming cambia per sempre
Prova GeForce NOW upgrade Blackwell: il cloud gaming cambia per sempre
L'abbonamento Ultimate di GeForce NOW ora comprende la nuova architettura Blackwell RTX con GPU RTX 5080 che garantisce prestazioni tre volte superiori alla precedente generazione. Non si tratta solo di velocità, ma di un'esperienza di gioco migliorata con nuove tecnologie di streaming e un catalogo giochi raddoppiato grazie alla funzione Install-to-Play
Ecovacs Deebot X11 Omnicyclone: niente più sacchetto per lo sporco
Ecovacs Deebot X11 Omnicyclone: niente più sacchetto per lo sporco
Deebot X11 Omnicyclone implementa tutte le ultime tecnologie Ecovacs per l'aspirazione dei pavimenti di casa e il loro lavaggio, con una novità: nella base di ricarica non c'è più il sacchetto di raccolta dello sporco, sostituito da un aspirapolvere ciclonico che accumula tutto in un contenitore rigido
Narwal Flow: con il mocio orizzontale lava i pavimenti al meglio
Narwal Flow: con il mocio orizzontale lava i pavimenti al meglio
Grazie ad un mocio rotante che viene costantemente bagnato e pulito, Narwal Flow assicura un completo e capillare lavaggio dei pavimenti di casa. La logica di intellignza artificiale integrata guida nella pulizia tra i diversi locali, sfruttando un motore di aspirazione molto potente e un sistema basculante per la spazzola molto efficace sui tappeti di casa
Tutti gli articoli Tutte le news

Vai al Forum
Rispondi
 
Strumenti
Old 14-02-2019, 23:44   #1
soundworks
Junior Member
 
Iscritto dal: Oct 2002
Messaggi: 8
Configurazione DHCP Bindings Cisco CA887VA

C'è qualche anima pia che può darmi qualche dritta sulla configurazione di un Cisco CA887 per configurazione degli IP fissi ?
il router è collegato tramite cavo ad un AP Dlink
nel router ho creato il Pool Principale
ho creato il bindings assegnando nome, Ip e mac address nessun errore nella configurazione infatti ritrovo tutto nella running config
ma poi il notebook non prende IP configurato ma una qualsiasi del pool principale
perchè ? cosa sbaglio ????

grazie
soundworks è offline   Rispondi citando il messaggio o parte di esso
Old 15-02-2019, 17:00   #2
anthony.barbagallo
Bannato
 
Iscritto dal: Feb 2019
Messaggi: 2
Ciao!
Sarebbe utile se postassi uno show della configurazione.

Possibilmente anche del mac della scheda eth del pc.
Grazie!
anthony.barbagallo è offline   Rispondi citando il messaggio o parte di esso
Old 15-02-2019, 17:45   #3
soundworks
Junior Member
 
Iscritto dal: Oct 2002
Messaggi: 8
Quote:
Originariamente inviato da anthony.barbagallo Guarda i messaggi
Ciao!
Sarebbe utile se postassi uno show della configurazione.

Possibilmente anche del mac della scheda eth del pc.
Grazie!
Ecco è proprio questo il dubbio, il MAC è della scheda Wireless del pc e non della scheda ethernet, l'associazione il bindings funziona solo su cavo o anche su wifi ?!!

il bindings lo devo fare su tutti i dispositivi sulla wifi, le poche macchina collegate su cavo hanno tutte IP fisso

dopo allego configurazione, grazie intanto
soundworks è offline   Rispondi citando il messaggio o parte di esso
Old 15-02-2019, 22:11   #4
soundworks
Junior Member
 
Iscritto dal: Oct 2002
Messaggi: 8
Ecco la conf



Building configuration...


Current configuration : 13539 bytes
!
! Last configuration change at 22:47:17 Berlin Fri Feb 15 2019 by pixelbit
! NVRAM config last updated at 00:35:23 Berlin Fri Feb 15 2019 by pixelbit
!
version 15.7
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname C887VA
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 emergencies
logging console critical
enable secret
!
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
!
!
!
!
!
!
aaa session-id common
clock timezone Berlin 1 0
clock summer-time Berlin date Mar 30 2003 2:00 Oct 26 2003 3:00
!
crypto pki trustpoint TP-self-signed-1960091521
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1960091521
revocation-check none
rsakeypair TP-self-signed-1960091521
!
!
crypto pki certificate chain TP-self-signed-1960091521
certificate self-signed 01
xxxxxx
xxxxxx
xxxxxx
quit
!
!
!
!
!
no ip source-route
!
!
!
!
!
!
!
!
!
!


!
ip dhcp excluded-address 192.168.1.1 192.168.1.69
ip dhcp excluded-address 192.168.1.161 192.168.1.254
!
ip dhcp pool Local_Home
import all
network 192.168.1.0 255.255.255.0
domain-name xxxxx.local
dns-server 85.37.17.47 85.38.28.82
default-router 192.168.1.1
netbios-name-server 192.168.1.1
!
ip dhcp pool aliconport
host 192.168.1.11 255.255.255.0
!
!
!
ip domain name xxxxxx.local
ip name-server 85.37.17.47
ip name-server 85.38.28.82
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
license udi pid C887VA-K9 sn FCZ212392CF
!
!
username xxxx privilege 15 secret 5 xxxxxxx
!
redundancy
!
!
!
!
!
controller VDSL 0
!
ip tcp synwait-time 10
!
class-map type inspect match-any ccp-skinny-inspect
match protocol skinny
class-map match-any CCP-Transactional-1
match dscp af21
match dscp af22
match dscp af23
class-map match-any CCP-Transactional-2
match dscp af21
match dscp af22
match dscp af23
class-map type inspect match-any ccp-h323nxg-inspect
match protocol h323-nxg
class-map type inspect match-any ccp-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map match-any CCP-Voice-2
match dscp ef
class-map match-any CCP-Voice-1
match dscp ef
class-map type inspect match-any ccp-h225ras-inspect
match protocol h225ras
class-map match-any CCP-Signaling-2
match dscp cs3
match dscp af31
class-map match-any CCP-Routing-1
match dscp cs6
class-map match-any CCP-Routing-2
match dscp cs6
class-map match-any CCP-Signaling-1
match dscp cs3
match dscp af31
class-map type inspect match-any ccp-h323annexe-inspect
match protocol h323-annexe
class-map type inspect match-any ccp-cls-insp-traffic
match protocol pptp
match protocol dns
match protocol ftp
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-any SDM_SSH
match access-group name SDM_SSH
class-map type inspect match-any SDM_HTTPS
match access-group name SDM_HTTPS
class-map match-any CCP-Management-2
match dscp cs2
class-map match-any CCP-Management-1
match dscp cs2
class-map type inspect match-all SDM_GRE
match access-group name SDM_GRE
class-map type inspect match-any SDM_SHELL
match access-group name SDM_SHELL
class-map type inspect match-any ccp-h323-inspect
match protocol h323
class-map type inspect match-all ccp-invalid-src
match access-group 102
class-map type inspect match-any ccp-sip-inspect
match protocol sip
class-map type inspect match-all ccp-protocol-http
match protocol http
class-map type inspect match-any sdm-cls-access
match class-map SDM_HTTPS
match class-map SDM_SSH
match class-map SDM_SHELL
class-map type inspect match-any CCP_PPTP
match class-map SDM_GRE
class-map type inspect match-all ccp-insp-traffic
match class-map ccp-cls-insp-traffic
class-map type inspect match-all ccp-icmp-access
match class-map ccp-cls-icmp-access
class-map type inspect match-all sdm-access
match class-map sdm-cls-access
match access-group 103
!
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
drop log
class type inspect ccp-protocol-http
inspect
class type inspect ccp-insp-traffic
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map sdm-qos-test-123
class class-default
policy-map type inspect ccp-permit
class type inspect sdm-access
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map type inspect ccp-pol-outToIn
class type inspect CCP_PPTP
pass
class class-default
drop log
policy-map type inspect ccp-permit-icmpreply
class type inspect ccp-icmp-access
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
pass
policy-map CCP-QoS-Policy-2
class CCP-Voice-2
priority percent 45
police cir 45000000
conform-action transmit
exceed-action drop
class CCP-Signaling-2
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Routing-2
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Management-2
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Transactional-2
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class class-default
fair-queue
random-detect
police cir 10000000
conform-action transmit
exceed-action drop
policy-map CCP-QoS-Policy-1
class CCP-Voice-1
priority percent 33
police cir 33000000
conform-action transmit
exceed-action drop
class CCP-Signaling-1
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Routing-1
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Management-1
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class CCP-Transactional-1
bandwidth percent 5
police cir 5000000
conform-action transmit
exceed-action drop
class class-default
fair-queue
random-detect
police cir 22000000
conform-action transmit
exceed-action drop
!
zone security out-zone
zone security in-zone
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
zone-pair security ccp-zp-out-zone-To-in-zone source out-zone destination in-zone
service-policy type inspect ccp-pol-outToIn
zone-pair security ccp-zp-in-out source in-zone destination out-zone
service-policy type inspect ccp-inspect
zone-pair security ccp-zp-out-self source out-zone destination self
service-policy type inspect ccp-permit
!
!
!
!
!
!
!
!
!
!
!
interface Null0
no ip unreachables
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
ip flow ingress
shutdown
no atm ilmi-keepalive
!
interface Ethernet0
description $ETH-WAN$
no ip address
no ip redirects
no ip unreachables
ip flow ingress
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface Ethernet0.835
encapsulation dot1Q 835
no ip redirects
no ip unreachables
ip flow ingress
ip nat inside
ip virtual-reassembly in
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
no ip address
!
interface Vlan1
description $FW_INSIDE$
ip address 192.168.1.1 255.255.255.0
ip access-group 100 in
no ip redirects
no ip unreachables
ip nbar protocol-discovery
ip flow ingress
ip nat inside
ip virtual-reassembly in
zone-member security in-zone
ip tcp adjust-mss 1412
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
no ip redirects
no ip unreachables
ip mtu 1452
ip flow ingress
ip nat outside
ip virtual-reassembly in
zone-member security out-zone
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname xxx@xxx.it
ppp chap password 7 15420609037A2A282E3267724352
ppp pap sent-username xxx@xxx.it password xxxxxxxxxx
!
ip forward-protocol nd
ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
no ip ftp passive
ip nat inside source list 1 interface Dialer0 overload
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip access-list extended SDM_GRE
remark CCP_ACL Category=1
permit gre any any
ip access-list extended SDM_HTTPS
remark CCP_ACL Category=1
permit tcp any any eq 443
ip access-list extended SDM_SHELL
remark CCP_ACL Category=1
permit tcp any any eq cmd
ip access-list extended SDM_SSH
remark CCP_ACL Category=1
permit tcp any any eq 22
!
logging trap debugging
dialer-list 1 protocol ip permit
ipv6 ioam timestamp
!
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 2 remark Auto generated by SDM Management Access feature
access-list 2 remark CCP_ACL Category=1
access-list 2 permit 192.168.1.0 0.0.0.255
access-list 100 remark Auto generated by SDM Management Access feature
access-list 100 remark CCP_ACL Category=1
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq telnet
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 22
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq www
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 443
access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq cmd
access-list 100 deny tcp any host 192.168.1.1 eq telnet
access-list 100 deny tcp any host 192.168.1.1 eq 22
access-list 100 deny tcp any host 192.168.1.1 eq www
access-list 100 deny tcp any host 192.168.1.1 eq 443
access-list 100 deny tcp any host 192.168.1.1 eq cmd
access-list 100 deny udp any host 192.168.1.1 eq snmp
access-list 100 permit ip any any
access-list 101 remark Auto generated by SDM Management Access feature
access-list 101 remark CCP_ACL Category=1
access-list 101 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 remark CCP_ACL Category=128
access-list 102 permit ip host 255.255.255.255 any
access-list 102 permit ip 127.0.0.0 0.255.255.255 any
access-list 103 remark CCP_ACL Category=128
access-list 103 permit ip any any
!
!
!
control-plane
!
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
vstack
banner login ^Cxxxxxxx^C
!
line con 0
no modem enable
transport output telnet
line aux 0
transport output telnet
line vty 0 4
access-class 101 in
transport input telnet ssh
!
scheduler allocate 20000 1000
scheduler interval 500
ntp update-calendar
ntp server 80.20.16.52 source Dialer0
!
!
!
!
!
!
end
soundworks è offline   Rispondi citando il messaggio o parte di esso
 Rispondi


Prova GeForce NOW upgrade Blackwell: il cloud gaming cambia per sempre Prova GeForce NOW upgrade Blackwell: il cloud ga...
Ecovacs Deebot X11 Omnicyclone: niente più sacchetto per lo sporco Ecovacs Deebot X11 Omnicyclone: niente più...
Narwal Flow: con il mocio orizzontale lava i pavimenti al meglio Narwal Flow: con il mocio orizzontale lava i pav...
Panasonic 55Z95BEG cala gli assi: pannello Tandem e audio senza compromessi Panasonic 55Z95BEG cala gli assi: pannello Tande...
HONOR Magic V5: il pieghevole ultra sottile e completo! La recensione HONOR Magic V5: il pieghevole ultra sottile e co...
Larry Ellison guadagna 101 miliardi in u...
Johnson Controls amplia la gamma di solu...
NASA Perseverance: il rover potrebbe ave...
Quelli di Immuni si 'pappano' Vimeo: Ben...
Changan lancia la Deepal S05 in Europa, ...
Substrati in vetro, Intel smentisce le v...
ECOVACS DEEBOT T50 PRO OMNI Gen2 fa piaz...
Windelo 62: catamarano a vela che unisce...
Francia, in arrivo un incentivo di 1.000...
Haier, la sorpresa a IFA: la lavatrice C...
GeForce RTX 5000 SUPER in arrivo? Sembra...
Ionity prova una soluzione contro i ladr...
Pirateria, svolta clamorosa: Dazn e Lega...
Maxi richiamo Toyota e Lexus: oltre 900....
Blackwell Ultra: fino al 45% di prestazi...
Chromium
GPU-Z
OCCT
LibreOffice Portable
Opera One Portable
Opera One 106
CCleaner Portable
CCleaner Standard
Cpu-Z
Driver NVIDIA GeForce 546.65 WHQL
SmartFTP
Trillian
Google Chrome Portable
Google Chrome 120
VirtualBox
Tutti gli articoli Tutte le news Tutti i download

Strumenti

Regole
Non Puoi aprire nuove discussioni
Non Puoi rispondere ai messaggi
Non Puoi allegare file
Non Puoi modificare i tuoi messaggi

Il codice vB è On
Le Faccine sono On
Il codice [IMG] è On
Il codice HTML è Off
Vai al Forum


Tutti gli orari sono GMT +1. Ora sono le: 22:23.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Served by www3v