I'm curious what would happen if you took the "no keepalive" statement off of the ethernet interface you are using. By having this in place, you are effectively "spoofing" the up condition on the interface by telling it that "up" is ok, even if you aren't sending or receiving keepalives. I would imagine that if you took this off, then your test will fail.
Kelly Cobean, CCNP, CCSA, ACSA, MCSE, MCP+I Network Engineer AT&T Government Solutions, Inc. Disclaimer: The opinions expressed herein are those of the author alone, and do not necessarily relfect those of AT&T Government Solutions, Inc., it's management, or it's affiliates. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of richard dumoulin Sent: Monday, July 22, 2002 1:50 PM To: [EMAIL PROTECTED] Subject: Re: Priscilla Oppenheimer [7:49347] No prob, see below. RB#sh run Building configuration... Current configuration: ! version 11.2 no service password-encryption no service udp-small-servers no service tcp-small-servers ! hostname RB ! enable password cisco ! no ip domain-lookup ! interface Ethernet0 ip address 192.168.1.1 255.255.255.0 ! interface Serial0 ip unnumbered Ethernet0 ! interface Serial1 no ip address shutdown ! interface Serial2 no ip address shutdown ! interface Serial3 no ip address shutdown ! interface Serial4 no ip address shutdown ! interface Serial5 no ip address shutdown ! interface Serial6 no ip address shutdown ! interface Serial7 no ip address shutdown ! interface Serial8 no ip address shutdown ! interface Serial9 no ip address shutdown ! interface BRI0 no ip address shutdown ! no ip classless ip route 0.0.0.0 0.0.0.0 Serial0 ! line con 0 line aux 0 line vty 0 4 password cisco login ! end RB#172.16.1.1 Trying 172.16.1.1 ... Open User Access Verification Password: RA>en Password: RA#sh run Building configuration... Current configuration : 801 bytes ! version 12.2 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname RA ! enable password cisco ! memory-size iomem 10 ip subnet-zero ! ! no ip domain-lookup ! ip ssh time-out 120 ip ssh authentication-retries 3 ! call rsvp-sync ! ! ! ! ! ! ! ! interface Ethernet0/0 ip address 172.16.1.1 255.255.0.0 no keepalive half-duplex ! interface Serial0/0 no ip address shutdown ! interface Serial0/1 no ip address shutdown ! interface Serial0/2 ip unnumbered Ethernet0/0 clockrate 2000000 ! interface Serial0/3 no ip address shutdown ! ip classless ip route 0.0.0.0 0.0.0.0 Serial0/2 no ip http server ! ! ! dial-peer cor custom ! ! ! ! ! line con 0 line aux 0 line vty 0 4 password cisco login line vty 5 15 login ! no scheduler allocate end RA# RB# [Resuming connection 1 to 172.16.1.1 ... ] RA# RA# RB#172.16.1.1 Trying 172.16.1.1 ... Open User Access Verification Password: RA>en Password: RA#ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms RA# RB#term mon % Console already monitors RB# %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to down [Resuming connection 2 to 172.16.1.1 ... ] RA#ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms RA#ping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 4/5/8 ms RA# RB#conf t Enter configuration commands, one per line. End with CNTL/Z. RB(config)#int e0 RB(config-if)#shut RB(config-if)# %LINK-5-CHANGED: Interface Ethernet0, changed state to administratively down^Z RB#d %SYS-5-CONFIG_I: Configured from console by consoleeb ip pa det IP packet debugging is on (detailed) RB# [Resuming connection 2 to 172.16.1.1 ... ] RA# IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 40, sending TCP src=11001, dst=23, seq=3044171494, ack=4024004928, win=4288 ACK IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 42, sending TCP src=11001, dst=23, seq=3044171494, ack=4024004928, win=4288 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 42, rcvd 3 TCP src=23, dst=11001, seq=4024004928, ack=3044171496, win=4058 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 43, rcvd 3 TCP src=23, dst=11001, seq=4024004930, ack=3044171496, win=4058 ACK PSH IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 40, sending TCP src=11001, dst=23, seq=3044171496, ack=4024004933, win=4283 ACKping 192.168.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: !! IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 41, sending TCP src=11001, dst=23, seq=3044171496, ack=4024004933, win=4283 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 56, rcvd 3 TCP src=23, dst=11001, seq=4024004933, ack=3044171497, win=4057 ACK PSH IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 40, sending TCP src=11001, dst=23, seq=3044171497, ack=4024004949, win=4267 ACK IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 42, sending TCP s!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 12/16/20 ms RA#rc=11001, dst=23, seq=3044171497, ack=4024004949, win=4267 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 42, rcvd 3 TCP src=23, dst=11001, seq=4024004949, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 142, rcvd 3 TCP src=23, dst=11001, seq=4024004951, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 42, rcvd 3 TCP src=23, dst=11001, seq=4024005053, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 100, rcvd 3 ICMP type=8, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 100, sending ICMP type=0, code=0 IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 41, rcvd 3 TCP src=23, dst=11001, seq=4024005055, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 100, rcvd 3 ICMP type=8, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 100, sending ICMP type=0, code=0 IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 41, rcvd 3 TCP src=23, dst=11001, seq=4024005056, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 100, rcvd 3 ICMP type=8, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 100, sending ICMP type=0, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 40, sending TCP src=11001, dst=23, seq=3044171499, ack=4024005057, win=4159 ACK IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 41, rcvd 3 TCP src=23, dst=11001, seq=4024005057, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 100, rcvd 3 ICMP type=8, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 100, sending ICMP type=0, code=0 IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 41, rcvd 3 TCP src=23, dst=11001, seq=4024005058, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 100, rcvd 3 ICMP type=8, code=0 IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 100, sending ICMP type=0, code=0 IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 41, rcvd 3 TCP src=23, dst=11001, seq=4024005059, ack=3044171499, win=4055 ACK PSH IP: s=172.16.1.1 (Serial0), d=192.168.1.1 (Serial0), len 118, rcvd 3 TCP src=23, dst=11001, seq=4024005060, ack=3044171499, win=4055 ACK PSH IP: s=192.168.1.1 (local), d=172.16.1.1 (Serial0), len 40, sending TCP src=11001, dst=23, seq=3044171499, ack=4024005138, win=4078 ACK Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=49447&t=49347 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]