Table Of Contents
L2TP Large-Scale Dial-Out
Feature Overview
Benefits
Related Features and Technologies
Supported Platforms
Supported Standards, MIBs, and RFCs
Configuration Tasks
Configuring the LNS to Request Dial-Out
Configuring a LAC to Accept Dial-Out
Verifying L2TP Large-Scale Dial-Out
Monitoring and Maintaining L2TP Large-Scale Dial-Out
Configuration Examples
LNS Configured to Request Dial-Out Example
LAC Configured to Accept Dial-Out Example
Command Reference
L2TP Large-Scale Dial-Out
Feature History
Release
|
Modification
|
12.2(4)T
|
This feature was introduced.
|
12.2(11)T
|
This feature was implemented on Cisco access server platforms.
|
This document describes the L2TP Large-Scale Dial-Out feature. It includes the following sections:
•Feature Overview
•Supported Platforms
•Supported Standards, MIBs, and RFCs
•Configuration Tasks
•Monitoring and Maintaining L2TP Large-Scale Dial-Out
•Configuration Examples
•Command Reference
Feature Overview
The Asynchronous Line Monitoring feature feature enables the router to dial multiple Layer 2 Tunnel Protocol (L2TP) access concentrators (LACs) from a single L2TP network server (LNS). The LACs are signaled through the LNS and use L2TP to establish the dial sessions. User-defined profiles can be configured on an authentication, authorization, and accounting (AAA) server and retrieved by the LNS when dial-out occurs.The Asynchronous Line Monitoring feature feature also supports multiple LACs bound into one stack group, call traffic load balancing, and outbound call congestion management.
Figure 1 provides an example of L2TP large-scale dial-out session startup. Each part of the process is numbered and described in text following the figure.
Figure 1 Sample Scenario L2TP Large-Scale Dial-Out Session
1. The IP packets arrive at the LNS and are forwarded to the dialer interface by the routing protocol. (A virtual access interface has not been created yet.)
2. A dialer session is created and placed in a pending state while the dialer interface sends a Dial Out Request message to the AAA server requesting the user profile. The AAA server sends the user profile, and the LNS builds a dynamic map based on the reply.
3. The dialer interface looks for its dial resources and finds the virtual private dialup network (VPDN) group. The dialer interface then issues a dial call request to the VPDN group, which creates a virtual access interface. The virtual access interface becomes a member of a rotary group.
4. If there is no existing L2TP tunnel between the LNS and the primary LAC, the LNS would establish one; otherwise, it uses the existing tunnel. The LNS sends an Outgoing Call ReQuest (OCRQ) message, inside of which is the dynamic dialer map, to the primary LAC.
5. Upon receiving the OCRQ message, the primary LAC determines whether it is congested. If the primary LAC is congested, it sends a Stack Group Bidding Protocol (SGBP) Discover message through a new tunnel to the secondary LAC in the scenario depicted in Figure 1, but it could send the message to any other LAC configured in the SGBP stack group.
After the secondary LAC receives the SGBP Discover message from the LNS, it responds with an SGBP Offer message describing available resources.
6. If neither LAC has resources to dial out, the primary LAC would send a Call Disconnect Notification (CDN) message to the LNS. The LNS would then tear down the tunnel.
If the secondary LAC has more resources, the primary LAC can choose to dial through the secondary LAC. The primary LAC sends a CDN message to the LNS with error code 7, which means "Try another" as defined in RFC 2661. Inside this message, the LNS learns that its dial-out request should be redirected to the secondary LAC, and the LNS clears the session to the primary LAC.
7. The LNS creates a new tunnel to the secondary LAC if one does not exist. The dial-out LAC creates a VPDN session and sets it in a pending state. It then places a call to the PPP client. Once the call is connected, the LAC determines to which pending VPDN session the connected interface belongs and binds the connected interface with the session. The secondary LAC sends an Outgoing Call Connected (OCCN) message to the LNS. The LNS determines for which pending virtual access interface and VPDN session this OCCN is meant, and then the LNS brings up the virtual access interface.
Benefits
Large-Scale Dial-Out Integrated with L2TP
Before Cisco IOS Release 12.2(4)T, L2TP required that requests for tunneled dial-out calls be from a single LNS to a single LAC, and that configurations be available on the local server. The Asynchronous Line Monitoring feature feature introduced in Cisco IOS Release 12.2(4)T allows dialing multiple LACs from a single LNS. The LACs are signaled through the LNS using L2TP to establish the dial sessions. User-defined profiles can also be configured on a AAA server and retrieved by the LNS when dial-out occurs.
Enhanced Dial Management
The Asynchronous Line Monitoring feature feature also provides the following benefits:
•Multiple LACs bound into one stack group
•Call traffic load balancing
•Outbound call congestion management
Related Features and Technologies
L2TP, VPDNs, and large-scale dial-out are described in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2. Refer to the chapter "Configuring Virtual Private Networks" in the part "Virtual Templates, Profiles, and Networks," and the chapter "Configuring Large-Scale Dial-Out" in the part "Dial Access Specialized Features."
Supported Platforms
See the next section for information about Feature Navigator and how to use this tool to determine the platforms and software images in which this feature is available.
Platform Support Through Feature Navigator
Cisco IOS software is packaged in feature sets that support specific platforms. To get updated information regarding platform support for this feature, access Feature Navigator. Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature.
Feature Navigator is a web-based tool that enables you to quickly determine which Cisco IOS software images support a specific set of features and which features are supported in a specific Cisco IOS image.
To access Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions at http://www.cisco.com/register.
Feature Navigator is updated when major Cisco IOS software releases and technology releases occur. As of May 2001, Feature Navigator supports M, T, E, S, and ST releases. You can access Feature Navigator at the following URL:
http://www.cisco.com/go/fn
Supported Standards, MIBs, and RFCs
Standards
None
MIBs
None
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
RFCs
•RFC 2661, Layer Two Tunneling Protocol (L2TP)
Configuration Tasks
See the following sections for configuration tasks for the Asynchronous Line Monitoring feature feature. Each task in the list is identified as either required or optional:
•Configuring the LNS to Request Dial-Out (required)
•Configuring a LAC to Accept Dial-Out (required)
Configuring the LNS to Request Dial-Out
Virtual profiles depend on PPP authentication; therefore the LNS must authenticate the connection to use virtual profiles.
You must configure AAA network security services on the LNS. For more information about AAA, refer to the chapter "AAA Overview" in the Cisco IOS Security Configuration Guide, Release 12.2. The Cisco IOS Security Command Reference, Release 12.2, describes the commands to configure AAA.
You also need to configure your LNS to communicate with the applicable security server, either a TACACS+ or RADIUS daemon.
If you are using RADIUS and Ascend attributes, use the radius-server host non-standard global configuration command to enable your Cisco router, acting as a network access server, to recognize that the RADIUS security server is using a vendor-proprietary version of RADIUS. Use the radius-server key global configuration command to specify the shared secret text string used between your Cisco router and the RADIUS server. For more information, refer to the chapter "Configuring RADIUS" in the Cisco IOS Security Configuration Guide, Release 12.2.
If you are using TACACS+, use the tacacs-server host global configuration command to specify the IP address of one or more TACACS+ daemons. Use the tacacs-server key global configuration command to specify the shared secret text string used between your Cisco router and the TACACS+ daemon. For more information, see the Cisco IOS Security Configuration Guide, Release 12.2.
To configure the LNS to request dial-out tunneled PPP connections from a LAC, use the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# vpdn enable
|
Enables VPDN and directs the router to look for tunnel definitions on a remote authorization server.
|
Step 2
|
Router(config)# vpdn group 1
|
Creates VPDN group 1 and enters VPDN group configuration mode.
|
Step 3
|
Router(config-vpdn)# request-dialout
|
Enters VPDN request-dialout group configuration mode and enables the tunnel server to send L2TP dial-out requests.
|
Step 4
|
Router(config-vpdn-req-ou)# protocol l2tp
|
Specifies L2TP as the tunneling protocol.
Note L2TP is the only protocol that supports dial-out.
|
Step 5
|
Router(config-vpdn-req-ou)# rotary-group group-number
|
Specifies the dialer rotary group that will be used to dial out.
Note You can configure only one dialer rotary group. Attempting to configure a second dialer resource will remove the first from the configuration.
|
Step 6
|
Router(config-vpdn-req-ou)# virtual-template
template-number
|
Specifies the number of the virtual template that will be used to clone the virtual access interface.
|
Step 7
|
Router(config-vpdn-req-ou)# exit
|
Returns to VPDN group configuration mode.
|
Step 8
|
Router(config-vpdn)# initiate-to ip ip-address
|
Specifies the IP address that will be dialed out. This is the IP address of the LAC.
Note The limit and priority keywords are not available for VPDN dial-out.
|
Step 9
|
Router(config-vpdn)# local name hostname
|
Specifies that the L2TP tunnel will identify itself with this host name.
|
Step 10
|
Router(config-vpdn)# exit
|
Returns to global configuration mode.
|
Step 11
|
Router(config)# virtual-template template-number
|
Specifies the number of the virtual template that will be used to clone the virtual access interface. Enters interface configuration mode so that you can set the configuration parameters that you want applied to virtual access interfaces.
|
Step 12
|
Router(config-if)# interface virtual-template number
|
Creates a virtual template interface that can be configured and applied dynamically in creating virtual access interfaces.
|
Step 13
|
Router(config-if)# no ip directed-broadcast
|
Disables the translation of a directed broadcast to physical broadcasts.
|
Step 14
|
Router(config-if)# encapsulation ppp
|
Sets the PPP encapsulation method on the interface.
|
Step 15
|
Router(config-if)# ppp multilink
|
Enables Multilink PPP (MLP) on an interface.
|
Step 16
|
Router(config-if)# exit
|
Returns to global configuration mode.
|
Step 17
|
Router(config)# aaa new-model
|
Enables AAA access control .
|
Step 18
|
Router(config)# aaa authentication arguments
|
Specifies one or more AAA authentication methods for use on serial interfaces that are running PPP. Refer to the Cisco IOS security guides for specific authentication arguments for your network security configuration.
|
Step 19
|
Router(config)# aaa authorization arguments
|
Sets parameters that restrict user access to a network. Refer to the Cisco IOS security guides for specific authentication arguments for your network security configuration.
|
Step 20
|
Router(config)# interface dialer 1
|
Enters interface configuration mode for dialer interface 1.
|
Step 21
|
Router(config-if)# dialer in-band
|
Specifies that DDR is to be supported.
|
Step 22
|
Router(config-if)# dialer vpdn
|
Enables a dialer profile to use L2TP dial-out.
|
Step 23
|
Router(config-if)# dialer aaa [suffix suffix password
password]
|
Allows a dialer to access the AAA server for dialing information or, optionally, specifies a suffix and nondefault password for authentication.
|
Step 24
|
Router(config-if)# no ip directed-broadcast
|
Disables the translation of a directed broadcast to physical broadcasts.
|
Step 25
|
Router(config-if)# dialer-group group-number
|
Controls access by configuring an interface to belong to a specific dialing group.
|
Step 26
|
Router(config-if)# dialer-list dialer-group protocol
protocol-name {permit | deny | list access-list-number |
access-group}
|
Defines a DDR dialer list to control dialing by protocol or by a combination of a protocol and a previously defined access list.
|
Step 27
|
Router(config-if)# encapsulation ppp
|
Sets the PPP encapsulation method on the dialer interface.
|
Step 28
|
Router(config-if)# ppp multilink
|
Enables MLP on an interface.
|
The MLP feature provides load-balancing functionality over multiple WAN links and offers load calculation on both inbound and outbound traffic. Refer to the part "PPP Configuration" and the chapter "Configuring Media-Independent PPP and Multilink PPP" in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2, for more information.
See the configuration examples later in this document for additional commands that may be configured on the LAC.
Configuring a LAC to Accept Dial-Out
You must configure SGBP to allow a primary LAC that is congested or otherwise unable to dial out to select an alternate LAC to dial out. Configure SGBP using the sgbp group and sgbp member global configuration commands before enabling the stack group to bid for dial-out connection. Configuring SGBP is described in the chapter "Configuring Multichassis Multilink PPP" in the Cisco IOS Dial Technologies Configuration Guide, Release 12.2. The Cisco IOS Dial Technologies Command Reference, Release 12.2, describes the commands to configure a stack group.
Additionally, the information about configuring network security in the section "Configuring the LNS to Request Dial-Out" of this document also applies to configuring the LAC.
To configure a LAC to accept tunneled dial-out connections from the LNS, use the following commands beginning in global configuration mode:
|
Command
|
Purpose
|
Step 1
|
Router(config)# vpdn enable
|
Enables VPDN and directs the router to look for tunnel definitions on a remote authorization server.
|
Step 2
|
Router(config)# vpdn group 1
|
Creates VPDN group 1 and enters VPDN group configuration mode.
|
Step 3
|
Router(config-vpdn)# accept-dialout
|
Enters VPDN accept-dialout group configuration mode and enables the NAS to accept L2TP dial-out requests.
|
Step 4
|
Router(config-vpdn-acc-ou)# protocol l2tp
|
Specifies L2TP as the tunneling protocol.
Note L2TP is the only protocol that supports dial-out.
|
Step 5
|
Router(config-vpdn-acc-ou)# dialer dialer-interface
|
Specifies the dialer that is used to dial out to the client.
|
Step 6
|
Router(config-vpdn-acc-ou)# exit
|
Returns to VPDN group configuration mode.
|
Step 7
|
Router(config-vpdn)# initiate-to ip ip-address [limit
limit-number] [priority priority-number]
|
Specifies the IP address that will be tunneled to.
|
Step 8
|
Router(config-vpdn)# local name hostname
|
Specifies that the L2TP tunnel will identify itself with this host name.
|
Step 9
|
Router(config-vpdn)# exit
|
Returns to global configuration mode.
|
Step 10
|
Router(config)# aaa new-model
|
Enables the AAA access control model.
|
Step 11
|
Router(config)# aaa authentication arguments
|
Specifies one or more AAA authentication methods for use on serial interfaces that are running PPP. Refer to the Cisco IOS security guides for specific authentication arguments for your network security configuration.
|
Step 12
|
Router(config)# aaa authorization arguments
|
Sets parameters that restrict user access to a network. Refer to the Cisco IOS security guides for specific authorization arguments for your network security configuration.
|
Step 13
|
Router(config)# username name password password
|
Creates authentication credentials for the stack group.
|
Step 14
|
Router(config)# sgbp group name
|
Creates the stack group and assigns this router to it.
|
Step 15
|
Router(config)# sgbp member peer-name [peer-ip-address]
|
Specifies a peer member of the stack group.
|
Step 16
|
Router(config)# interface dialer 1
|
Enters interface configuration mode for dialer interface 1.
|
Step 17
|
Router(config-if)# dialer aaa
|
Allows a dialer to access the AAA server for dialing information.
|
Step 18
|
Router(config-if)# dialer in-band
|
Specifies that DDR is to be supported.
|
Step 19
|
Router(config-if)# no ip directed-broadcast
|
Disables the translation of a directed broadcast to physical broadcasts.
|
Step 20
|
Router(config-if)# encapsulation ppp
|
Sets the PPP encapsulation method on the dialer interface.
|
Step 21
|
Router(config-if)# ppp multilink
|
Enables MLP on an interface.
|
See the configuration examples later in this document for additional commands that may be configured on the LAC.
Verifying L2TP Large-Scale Dial-Out
To verify that L2TP large-scale dial-out is configured correctly, perform the following steps:
Note Effective with Cisco Release 12.4(11)T, the L2F protocol was removed in Cisco IOS software.
Step 1 From the LNS, display tunnel statistics by entering the show vpdn and the show vpdn tunnel all EXEC commands:
L2TP Tunnel and Session Information Total tunnels 1 sessions 1
LocID RemID Remote Name State Remote Address Port Sessions
55788 55043 rdt5300-15 est 10.23.1.1 1701 1
LocID RemID TunID Intf Username State Last Chg
83 50 55788 Vi1 rdt7204-1 est 00:01:08
Router# show vpdn tunnel all
L2TP Tunnel Information Total tunnels 1 sessions 1
Tunnel id 8873 is up, remote id is 41736, 1 active sessions
Tunnel state is established, time since change 00:00:05
Remote tunnel name is rdt5300-15
Internet Address 10.23.1.1, port 1701
Local tunnel name is rdt7206vxr-8
Internet Address 10.23.1.100, port 1701
11 packets sent, 12 received
653 bytes sent, 666 received
Local RWS 10000 (default), Remote RWS 800
Tunnel PMTU checking disabled
Retransmission time 1, max 1 seconds
Unsent queuesize 0, max 0
Resend queuesize 0, max 2
Total resends 0, ZLB ACKs sent 2
Current nosession queue check 0 of 5
Retransmit time distribution: 0 2 0 0 0 0 0 0 0
Sessions disconnected due to lack of resources 0
Step 2 From the LNS, enter the show interfaces virtual-access EXEC command to verify that the interface is up and that no errors are reported:
Router# show interfaces virtual-access 1
Virtual-Access1 is up, line protocol is up
Hardware is Virtual Access interface
MTU 1500 bytes, BW 64 Kbit, DLY 100000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation PPP, loopback not set
DTR is pulsed for 5 seconds on reset
Time to interface disconnect: idle 00:01:16
Interface is bound to Di1 (Encapsulation PPP)
Last input 00:00:07, output never, output hang never
Last clearing of "show interface" counters 00:01:33
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: weighted fair
Output queue: 0/1000/64/0 (size/max total/threshold/drops)
Conversations 0/1/16 (active/max active/max total)
Reserved Conversations 0/0 (allocated/max allocated)
Available Bandwidth 48 kilobits/sec
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
9 packets input, 767 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
10 packets output, 849 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out
Step 3 From the LNS, display information for MLP bundles by entering the show ppp multilink EXEC command:
Router# show ppp multilink
Virtual-Access3, bundle name is rdt7204-1
Using relaxed lost fragment detection algorithm.
Dialer interface is Dialer1
0 lost fragments, 0 reordered, 0 unassigned
0 discarded, 0 lost received, 1/255 load
0x8 received sequence, 0x8 sent sequence
Member links: 4 (max not set, min not set)
rdt5300-15:Virtual-Access1 (10.23.1.1), since 00:01:19, last rcvd seq
rdt5300-15:Virtual-Access5 (10.23.1.1), since 00:01:18, last rcvd seq
rdt5300-15:Virtual-Access4 (10.23.1.1), since 00:00:48, no frags rcvd,
rdt5300-15:Virtual-Access6 (10.23.1.1), since 00:00:18, no frags rcvd,
Step 4 From the LAC, display active tunnel statistics by entering the show vpdn and show vpdn tunnel all EXEC commands:
L2TP Tunnel and Session Information Total tunnels 1 sessions 1
LocID RemID Remote Name State Remote Address Port Sessions
51111 46115 rdt7206vxr-8 est 10.23.1.100 1701 1
LocID RemID TunID Intf Username State Last Chg
2 86 51111 Se0:22 rdt7204-1 est 00:00:05
Router# show vpdn tunnel all
L2TP Tunnel Information Total tunnels 1 sessions 1
Tunnel id 51111 is up, remote id is 46115, 1 active sessions
Tunnel state is established, time since change 00:00:18
Remote tunnel name is rdt7206vxr-8
Internet Address 10.23.1.100, port 1701
Local tunnel name is rdt5300-15
Internet Address 10.23.1.1, port 1701
13 packets sent, 12 received
1156 bytes sent, 677 received
Local RWS 800 (default), Remote RWS 800 (max)
Tunnel PMTU checking disabled
Retransmission time 1, max 1 seconds
Unsent queuesize 0, max 0
Resend queuesize 0, max 1
Total resends 1, ZLB ACKs sent 2
Current nosession queue check 0 of 5
Retransmit time distribution: 0 3 1 0 0 0 0 0 0
Sessions disconnected due to lack of resources 0
Step 5 From the LAC, confirm active SGBP group members by entering the show sgbp EXEC command:
Group Name: bri_pri Ref: 0x7B920584
Seed bid: default, 50, default seed bid setting
Member Name: rdt3640-17 State: active Id: 2
Step 6 From the LAC, display connection status by entering the show isdn status EXEC command or the show user EXEC command:
Global ISDN Switchtype = primary-5ess
ISDN Serial0:23 interface
dsl 0, interface ISDN Switchtype = primary-5ess
TEI = 0, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED
CCB:callid=8008, sapi=0, ces=0, B-chan=23, calltype=DATA
CCB:callid=8009, sapi=0, ces=0, B-chan=22, calltype=DATA
The Free Channel Mask: 0x801FFFFF
Number of L2 Discards = 0, L2 Session ID = 0
Total Allocated ISDN CCBs = 2
Line User Host(s) Idle Location
Interface User Mode Idle Peer
Monitoring and Maintaining L2TP Large-Scale Dial-Out
To monitor and maintain L2TP large-scale dial-out, use the following EXEC commands:
Command
|
Purpose
|
Router> clear dialer sessions
|
Removes all dialer sessions and disconnects links.
|
Router# clear vpdn tunnel l2tp
network-access-server gateway-name
|
Shuts down a specific tunnel and all the sessions within the tunnel.
|
Router> show dialer sessions
|
Displays all dialer sessions.
|
Router# show interfaces virtual access number
|
Displays information about the virtual access interface, LCP, protocol states, and interface statistics. The status of the virtual access interface should be:
Virtual-Accessn is up, line protocol is up
|
Router> show ip route [static [download]]
|
Displays all static IP routes or those installed using the AAA route download function.
|
Router> show ppp multilink
|
Displays MLP and Multichassis Multilink PPP (MMP) bundle information.
|
Router# show vpdn
|
Displays a summary of all active VPDN tunnels.
|
Router# show vpdn group [name | name domain | name
endpoint]
|
Displays a summary of the relationships among VPDN groups and customer or VPDN profiles.
Note When you include the name of the VPDN group, the output displays information on domain or DNIS, tunnel endpoint, session limits, group priority, active sessions, group status, and reserved sessions.
|
Router# show vpdn history failure
|
Displays information about VPDN user failures.
|
Router# show vpdn multilink
|
Displays VPDN multilink information.
|
Router# show vpdn session [all | packets | sequence
| state | timers | window] [interface | tunnel |
username]
|
Displays VPDN session information including interface, tunnel, username, packets, status, and window statistics.
|
Router# show vpdn tunnel [all | packets | state |
summary | transport] [id | local-name |
remote-name]
|
Displays VPDN tunnel information including tunnel protocol, ID, local and remote tunnel names, packets sent and received, tunnel, and transport status.
|
Configuration Examples
This section provides the following configuration examples:
•LNS Configured to Request Dial-Out Example
•LAC Configured to Accept Dial-Out Example
LNS Configured to Request Dial-Out Example
In the following example, the LNS VPDN group is configured to make a dial-out request using L2TP:
initiate-to ip 10.3.2.1 limit 5 priority 2
interface virtual-template 1
access-list 101 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
dialer-list 1 protocol ip list 101
LAC Configured to Accept Dial-Out Example
In the following example, the VPDN group of a LAC is configured to accept dial-outs using L2TP as the tunneling protocol and dialer interface 2:
terminate-from hostname host2
aaa authentication ppp default radius local
aaa authorization network default radius none
aaa authorization configuration default radius
enable password 7 1236173C1B0F
username LAC1 password 7 030752180500
sgbp member LAC2 172.21.17.17
isdn switch-type basic-5ess
ip address 172.19.2.3 255.255.128
dialer remote-name group1
Command Reference
This feature uses no new or modified commands. For information about all Cisco IOS commands, go to the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup or to the Cisco IOS Master Commands List.
•xremote
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2001-2009 Cisco Systems, Inc. All rights reserved.