Sunteți pe pagina 1din 5

Building configuration... Current configuration : 8149 bytes ! version 12.

4 no service pad service tcp-keepalives-in service tcp-keepalives-out service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service sequence-numbers ! hostname PIHER-ROUTER ! boot-start-marker boot-end-marker ! logging message-counter syslog logging buffered 51200 logging console critical enable secret 5 $1$06Bb$aeBNmibCXSsjut6o1P2AX1 ! aaa new-model ! ! aaa authentication login default local group radius aaa authentication login ciscocp_vpn_xauth_ml_1 local group radius aaa authentication ppp default local group radius aaa authorization exec default local group radius aaa authorization network default local group radius aaa authorization network ciscocp_vpn_group_ml_1 local group radius aaa authorization auth-proxy default local group radius ! ! aaa session-id common clock timezone PCTime 1 clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00 ! crypto pki trustpoint TP-self-signed-3145293677 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-3145293677 revocation-check none rsakeypair TP-self-signed-3145293677 ! ! crypto pki certificate chain TP-self-signed-3145293677 certificate self-signed 01 30820250 308201B9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 33313435 32393336 3737301E 170D3131 30373232 31353133 31345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 31343532 39333637 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 810094EA E20F95A2 7CF37CBE 30133971 A0ACDDC7 0846F82B 8C95594D 35DABBD4 62B2A246 85B902B2 A1AACF5F 4B645FFF 9D30A3C7 13F43CAA 891A35FB E47E5600 A2142C9A 1352B7E9 E3782407 C7A4D70F 030CC212 38FB6607 04A20B18 25C46241 7CD2E24D FFB669CF 473173B6 884441D0 EB25DB08 535A4D53 7FD16B77 C5106CD9 878F0203 010001A3 78307630 0F060355 1D130101 FF040530 030101FF 30230603

551D1104 1C301A82 18504948 45522D52 4F555445 522E7069 6865722E 6C6F6361 6C301F06 03551D23 04183016 8014F895 559C2A70 D4E2A019 07930A31 29DE9F78 47E4301D 0603551D 0E041604 14F89555 9C2A70D4 E2A01907 930A3129 DE9F7847 E4300D06 092A8648 86F70D01 01040500 03818100 3D4D522F ED6AA552 7ED6595E 72007C6B EEB85707 60025952 CE8FD692 2A4BDC3B 1F91C83D 3B54E63E 3D52F588 D1A0FCEE B3011E4C 92413DD0 FBA426B1 2169EDA3 9AB0F8CE B211ED33 0297AA36 CF97F556 747D3AA6 25BB4951 0B9BBADC 656C1B3D 2874F761 96BD3570 754A231E FB80598F 9707019D ED0DEB92 C99488C0 9D299139 quit dot11 syslog ! dot11 ssid PH-WLAN ! no ip source-route ! ! ip cef no ip bootp server ip domain name piher.local ip name-server 192.168.0.1 ip name-server 192.168.0.2 ip name-server 80.58.61.250 ! ! ! ! username admin privilege 15 secret 5 $1$dy2E$ciMSxtTtJD8U2LPkGvXnZ1 username cisco privilege 15 password 7 06362609697C584B56162D ! ! crypto isakmp policy 1 encr 3des authentication pre-share group 2 crypto isakmp key PIHER1m: address 0.0.0.0 0.0.0.0 ! crypto isakmp client configuration group USERS-VPN key PIHER1m: dns 192.168.0.1 192.168.0.2 wins 192.168.0.1 192.168.0.2 domain piher.local pool POOL-IPSEC acl 100 netmask 255.255.255.0 banner ^CIndustrias Piqueras S.A. ^C crypto isakmp profile ciscocp-ike-profile-1 match identity group USERS-VPN client authentication list ciscocp_vpn_xauth_ml_1 isakmp authorization list ciscocp_vpn_group_ml_1 client configuration address respond virtual-template 1 ! ! crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac ! crypto ipsec profile CiscoCP_Profile1 set security-association idle-time 1800 set transform-set ESP-3DES-SHA set isakmp-profile ciscocp-ike-profile-1 !

! archive log config hidekeys ! ! ip tcp synwait-time 10 ip ssh time-out 60 ip ssh authentication-retries 2 ! bridge irb ! ! interface Loopback0 ip address 10.0.0.1 255.255.255.255 ! interface ATM0 no ip address no ip redirects no ip unreachables no ip proxy-arp ip flow ingress no atm ilmi-keepalive ! interface ATM0.1 point-to-point description $ES_WAN$$FW_OUTSIDE$ ip flow ingress pvc 8/32 oam-pvc manage pppoe-client dial-pool-number 1 ! ! interface FastEthernet0 ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3 ! interface Virtual-Template1 type tunnel ip unnumbered Loopback0 tunnel mode ipsec ipv4 tunnel protection ipsec profile CiscoCP_Profile1 ! interface Dot11Radio0 no ip address ! ssid PH-WLAN ! speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0 station-role root bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 spanning-disabled bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding !

interface Vlan1 description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$FW_INSIDE$ no ip address bridge-group 1 ! interface Dialer0 ip address 79.148.244.46 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp ip mtu 1452 ip flow ingress ip nat outside ip virtual-reassembly encapsulation ppp dialer pool 1 dialer-group 1 no cdp enable ppp authentication chap pap callin ppp chap hostname adslppp@telefonicanet.pa ppp chap password 7 104F0D0A0907021B ppp pap sent-username adslppp@telefonicanet.pa password 7 13041301071C143A ! interface BVI1 description $ES_LAN$ ip address 192.168.0.10 255.255.255.0 ip nat inside ip virtual-reassembly ip tcp adjust-mss 1412 ! ip local pool POOL-IPSEC 192.168.1.1 192.168.1.10 ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 Dialer0 ip http server ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ip nat inside source list 1 interface Dialer0 overload ip nat inside source static tcp 192.168.0.2 21 interface Dialer0 21 ip nat inside source static tcp 192.168.0.2 1433 interface Dialer0 1433 ip nat inside source static tcp 192.168.0.1 3389 interface Dialer0 3389 ip nat inside source static tcp 192.168.0.1 443 interface Dialer0 443 ip nat inside source static tcp 192.168.0.1 25 interface Dialer0 25 ip nat inside source static tcp 192.168.0.1 110 interface Dialer0 110 ip nat inside source static tcp 192.168.0.1 143 interface Dialer0 143 ! ip radius source-interface BVI1 logging trap debugging access-list 1 remark INSIDE_IF=BVI1 access-list 1 remark CCP_ACL Category=2 access-list 1 permit 192.168.0.0 0.0.0.255 access-list 100 remark CCP_ACL Category=4 access-list 100 permit ip 192.168.0.0 0.0.0.255 any access-list 101 remark CCP_ACL Category=4 access-list 101 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255 dialer-list 1 protocol ip permit no cdp run !

! ! radius-server host 192.168.0.1 auth-port 1645 acct-port 1646 key 7 107E203120254 30656 radius-server key 7 073F08646B3B48084D ! control-plane ! bridge 1 protocol ieee bridge 1 route ip banner exec ^C % Password expiration warning. ----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device and it provides the default username "cisco" for one-time use. If you have already used the username "cisco" to login to the router and your IOS image supports the "one-time" user option, then this username has already expired. You will not be able to login to the router with this username after you exit this session. It is strongly suggested that you create a new username with a privilege level of 15 using the following command. username <myuser> privilege 15 secret 0 <mypassword> Replace <myuser> and <mypassword> with the username and password you want to use. ----------------------------------------------------------------------^C banner login ^CAuthorized access only! Disconnect IMMEDIATELY if you are not an authorized user!^C ! line con 0 no modem enable transport output telnet line aux 0 transport output telnet line vty 0 4 transport input telnet ssh ! scheduler max-task-time 5000 scheduler allocate 4000 1000 scheduler interval 500 end

S-ar putea să vă placă și