I am having a strange issue with my Cisco 2611 series router. I bought this router along with some other Cisco equipment to get CCNA certification. I thought what better way off than learn what I am doing is to put into practice in my apartment so I can see things happen in real time. The router worked all well and good until I ordered a memory upgrade kit off ebay to max it out both in flash and ram. I also upgraded the IOS from 12.2 something to 12.3(17b) which came in my router kit. Ever since then the routers Ethernet interfaces are experiencing strange issues like they are unresponsive but there is no crash log in the flash or when you do show ver. If I try to ping from the router depending on what interface is having issues I will usually get a 20% success rate on the ping. A reload will sometimes fix the problem but every once and a while I have to erase the nvram and copy my config back to the router to get the dhcp to pull from my cable modem. It does this every 12-20 hours, before the memory upgrade the router ran for a week without problems. I am hoping someone here has some insight on what could be going on. I can post any outputs that you like. I have about had it with the upgraded memory and flash and I am thinking about putting the old stuff back in, but I would prefer to be able to use the better feature sets when working with it.
Thank you in advance. bhawkins
Here is the output from show ver:
HNGATEWAY>show ver Cisco Internetwork Operating System Software IOS (tm) C2600 Software (C2600-IK9O3S3-M), Version 12.3(17b), RELEASE SOFTWARE ( fc2) Technical Support:
ROM: System Bootstrap, Version 12.2(6r), RELEASE SOFTWARE (fc1) ROM: C2600 Software (C2600-IK9O3S3-M), Version 12.3(17b), RELEASE SOFTWARE (fc2)
HNGATEWAY uptime is 22 minutes System returned to ROM by reload System image file is "flash:C2600_IK9O3S3_MZ_123_17B.BIN"
This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
cisco 2611 (MPC860) processor (revision 0x202) with 61440K/4096K bytes of memory . Processor board ID JAB031803Y5 (3007107769) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Basic Rate ISDN software, Version 1.1.
2 Ethernet/IEEE 802.3 interface(s) 1 Serial network interface(s) 4 Low-speed serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non-volatile configuration memory. 16384K bytes of processor board System flash (Read/Write)Configuration register is 0x2102
Current running config with passwords removed. I used cisco config maker to make the basic script then I changed and added a few other options.
HNGATEWAY#show run Building configuration...
Current configuration : 3260 bytes ! version 12.3 service timestamps debug uptime service timestamps log uptime service password-encryption ! hostname HNGATEWAY ! boot-start-marker boot-end-marker ! enable secret 5 ! no aaa new-model ip subnet-zero ip cef ! ! ip name-server 192.168.1.162 ip dhcp excluded-address 192.168.1.1 192.168.1.99 ip dhcp excluded-address 192.168.1.200 192.168.1.254 ! ip dhcp pool 1 network 192.168.1.0 255.255.255.0 domain-name HAWKNET.LOCAL default-router 192.168.1.1 dns-server 192.168.1.162 208.67.220.220 208.67.222.222 netbios-name-server 192.168.1.162 ! ip dhcp pool xbox host 192.168.1.100 255.255.255.0 hardware-address 02c7.f800.0422 ieee802 client-name xbox360 domain-name HAWKNET.LOCAL default-router 192.168.1.1 dns-server 192.168.1.162 208.67.220.220 208.67.222.222 ! ip dhcp pool hndc02 host 192.168.1.162 255.255.255.0 hardware-address 00a0.cc7b.58f9 ieee802 client-name hndc02 domain-name HAWKNET.LOCAL default-router 192.168.1.1 dns-server 192.168.1.162 208.67.220.220 208.67.222.222 ! ip dhcp pool hndc021 host 192.168.1.122 255.255.255.0 hardware-address 0010.b57f.eb1e ieee802 client-name hndc01 domain-name HAWKNET.LOCAL default-router 192.168.1.1 dns-server 192.168.1.162 208.67.220.220 208.67.222.222 ! ip audit po max-events 100 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! interface Ethernet0/0 description connected to Internet ip address dhcp ip nat outside half-duplex ! interface BRI0/0 no ip address encapsulation hdlc shutdown ! interface Serial0/0 no ip address shutdown ! interface Ethernet0/1 description connected to HAWKNET.LOCAL Lan ip address 192.168.1.1 255.255.255.0 ip nat inside half-duplex ! interface Serial1/0 no ip address shutdown ! interface Serial1/1 no ip address shutdown ! interface Serial1/2 no ip address shutdown ! interface Serial1/3 no ip address shutdown ! router rip version 2 passive-interface Ethernet0/0 network 192.168.1.0 no auto-summary ! ip nat inside source list 1 interface Ethernet0/0 overload ip nat inside source static tcp 192.168.1.162 80 interface Ethernet0/0
80 ip nat inside source static tcp 192.168.1.162 443 interface Ethernet0/0 443 ip nat inside source static tcp 192.168.1.162 25 interface Ethernet0/0 25 ip nat inside source static tcp 192.168.1.162 5060 interface Ethernet0/0 5060 ip nat inside source static tcp 192.168.1.50 88 interface Ethernet0/0 88 ip nat inside source static tcp 192.168.1.50 3074 interface Ethernet0/0 3074 ip nat inside source static udp 192.168.1.50 3074 interface Ethernet0/0 3074 ip nat inside source static tcp 192.168.1.122 1723 interface Ethernet0/0 1723 ip nat inside source static tcp 192.168.1.162 20481 interface Ethernet0/0 20481 no ip http server no ip http secure-server ip classless ip route 0.0.0.0 0.0.0.0 Ethernet0/0 ! ! access-list 1 permit 192.168.1.0 0.0.0.255 ! snmp-server community RO snmp-server community RW snmp-server location Server Rack snmp-server contact ,@hawknet.local snmp-server enable traps tty ! ! dial-peer cor custom ! ! ! ! ! line con 0 exec-timeout 0 0 password 7 login line aux 0 line vty 0 4 password 7 login ! ! end