Cisco 837 ADSL Router blocking SMTP Authentication?

Hi, Since my ISP has gone over to SMTP Server Authentication I have not been able to send E-mail from my E-mail Account.

I can send ok from my ISP's Web mail via my Web browser.

Please can someone check my config below to see if there is anything that may be blocking this Authentication?

Router#sh run Building configuration...

Current configuration : 4998 bytes ! version 12.3 no service pad service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone no service password-encryption service sequence-numbers ! hostname Router ! no logging buffered enable secret 5 $1$LgVA$5cEhQTZE02p0odR6QhmY0. ! username cisco password 0 cisco username sdm privilege 15 password 0 cisco clock timezone PCTime 0 clock summer-time PCTime date Mar 30 2003 1:00 Oct 26 2003 2:00 no aaa new-model ip subnet-zero no ip source-route ip dhcp excluded-address 10.10.10.1 ! ip dhcp pool CLIENT import all network 10.10.10.0 255.255.255.0 default-router 10.10.10.1 lease 0 2 ! no ip bootp server ip cef ip inspect name myfw cuseeme timeout 3600 ip inspect name myfw ftp timeout 3600 ip inspect name myfw rcmd timeout 3600 ip inspect name myfw realaudio timeout 3600 ip inspect name myfw smtp timeout 3600 ip inspect name myfw tftp timeout 30 ip inspect name myfw udp timeout 15 ip inspect name myfw tcp timeout 3600 ip inspect name myfw h323 timeout 3600 ip inspect name DEFAULT100 cuseeme ip inspect name DEFAULT100 ftp ip inspect name DEFAULT100 h323 ip inspect name DEFAULT100 netshow ip inspect name DEFAULT100 rcmd ip inspect name DEFAULT100 realaudio ip inspect name DEFAULT100 rtsp ip inspect name DEFAULT100 smtp ip inspect name DEFAULT100 sqlnet ip inspect name DEFAULT100 streamworks ip inspect name DEFAULT100 tftp ip inspect name DEFAULT100 tcp ip inspect name DEFAULT100 udp ip inspect name DEFAULT100 vdolive ip inspect name DEFAULT100 icmp ip audit notify log ip audit po max-events 100 no ftp-server write-enable ! ! ! ! ! ! interface Ethernet0 description $FW_INSIDE$ ip address 10.10.10.1 255.255.255.0 ip access-group 100 in no ip proxy-arp ip nat inside ip route-cache flow no ip mroute-cache no cdp enable hold-queue 100 out ! interface ATM0 no ip address no ip proxy-arp ip route-cache flow no ip mroute-cache atm vc-per-vp 64 no atm ilmi-keepalive pvc 0/38 encapsulation aal5mux ppp dialer dialer pool-member 1 ! dsl operating-mode auto dsl power-cutback 6 ! interface Dialer1 description $FW_OUTSIDE$ ip address negotiated ip access-group 101 in no ip proxy-arp ip nat outside ip inspect DEFAULT100 out encapsulation ppp ip route-cache flow dialer pool 1 dialer-group 1 ppp authentication chap pap callin ppp chap hostname ****.****@*********.*** ppp chap password 0 ********** ppp ipcp dns request ppp ipcp wins request hold-queue 224 in ! ip nat inside source list 102 interface Dialer1 overload ip classless ip route 0.0.0.0 0.0.0.0 Dialer1 ip http server ip http authentication local ip http secure-server ! access-list 23 permit 10.10.10.0 0.0.0.255 access-list 100 remark auto generated by SDM firewall configuration access-list 100 remark SDM_ACL Category=1 access-list 100 deny ip host 255.255.255.255 any access-list 100 deny ip 127.0.0.0 0.255.255.255 any access-list 100 permit ip any any access-list 101 remark auto generated by SDM firewall configuration access-list 101 remark SDM_ACL Category=1 access-list 101 deny ip 10.10.10.0 0.0.0.255 any access-list 101 permit icmp any any echo-reply access-list 101 permit icmp any any time-exceeded access-list 101 permit icmp any any unreachable access-list 101 deny ip 10.0.0.0 0.255.255.255 any access-list 101 deny ip 172.16.0.0 0.15.255.255 any access-list 101 deny ip 192.168.0.0 0.0.255.255 any access-list 101 deny ip 127.0.0.0 0.255.255.255 any access-list 101 deny ip host 255.255.255.255 any access-list 101 deny ip host 0.0.0.0 any access-list 101 deny ip any any log access-list 102 permit ip 10.10.10.0 0.0.0.255 any access-list 111 permit icmp any any administratively-prohibited access-list 111 permit icmp any any echo access-list 111 permit icmp any any echo-reply access-list 111 permit icmp any any packet-too-big access-list 111 permit icmp any any time-exceeded access-list 111 permit icmp any any traceroute access-list 111 permit icmp any any unreachable access-list 111 permit udp any eq bootps any eq bootpc access-list 111 permit udp any eq bootps any eq bootps access-list 111 permit udp any eq domain any access-list 111 permit esp any any access-list 111 permit udp any any eq isakmp access-list 111 permit udp any any eq 10000 access-list 111 permit tcp any any eq 1723 access-list 111 permit tcp any any eq 139 access-list 111 permit udp any any eq netbios-ns access-list 111 permit udp any any eq netbios-dgm access-list 111 permit gre any any access-list 111 deny ip any any dialer-list 1 protocol ip permit no cdp run ! line con 0 login local no modem enable transport preferred all transport output telnet stopbits 1 line aux 0 login local transport preferred all transport output telnet stopbits 1 line vty 0 4 access-class 23 in privilege level 15 login local length 0 transport preferred all transport input telnet ssh transport output all ! scheduler max-task-time 5000 scheduler interval 500 ! end

Cheers Eric.

Reply to
EricC
Loading thread data ...

In article , EricC wrote: :Since my ISP has gone over to SMTP Server Authentication I have not been :able to send E-mail from my E-mail Account.

:Please can someone check my config below to see if there is anything that :may be blocking this Authentication?

:ip inspect name DEFAULT100 smtp

That. The smtp inspection restricts smtp to basic RFC822 verbs. Authentication is not part of RFC822, so the authentication verbs get blocked as invalid commands. Turn off that inspection and your SMTP will likely start to work.

Reply to
Walter Roberson

Walter,

It worked.

Thank you, thank you.

Best Regards Eric.

Reply to
EricC

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.