Cisco 1841 con alice...non funziona più :-(
Inviato: sab 10 ago , 2013 11:01 am
Salve a tutti
posseggo un cisco 1841 collegato a internet con offerta alice. Da qualche giorno non capisco perchè ma nonostante sia negoziato l'ip e quant'altro, i pc che sono sulla rete hanno difficoltà a navigare. Chiamato telecom, dicono che il problema è del router (effettivamente se ne metto altro funziona). Ho qualche dubbio che hanno cambiato qualche configurazione lato centrale.
Vi posto la mia attuale conf
Building configuration...
Current configuration : 7289 bytes
!
version 12.4
service config
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Cisco1841
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 <removed>
enable password <removed>
!
aaa new-model
!
!
aaa authentication login VPN-GROUP_xauth local
aaa authorization network VPN-GROUP_group local
!
aaa session-id common
!
resource policy
!
clock timezone CET 1
clock summer-time CET recurring
ip cef
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.10
ip dhcp excluded-address 192.168.1.201 192.168.1.254
ip dhcp excluded-address 192.168.1.100 192.168.1.120
ip dhcp excluded-address 192.168.2.1 192.168.2.10
ip dhcp excluded-address 192.168.2.201 192.168.2.254
ip dhcp excluded-address 192.168.2.100 192.168.2.120
!
ip dhcp pool POOL_DHCP_eth0
import all
network 192.168.1.0 255.255.255.0
dns-server 212.216.172.62 212.216.112.112
default-router 192.168.1.254
!
ip dhcp pool POOL_DHCP_eth1
import all
network 192.168.2.0 255.255.255.0
dns-server 212.216.172.62 212.216.112.112
default-router 192.168.2.254
!
!
ip domain name domain.com
ip host members.dyndns.org 204.13.248.112
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh version 2
ip ddns update method DynDNS
HTTP
add http://[email protected]/nic/ ... h>&myip=<a>
remove http://[email protected]/nic ... h>&myip=<a>
interval maximum 0 0 30 0
!
!
!
crypto pki trustpoint TP-self-signed-2910638223
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2910638223
revocation-check none
rsakeypair TP-self-signed-2910638223
!
!
crypto pki certificate chain TP-self-signed-2910638223
certificate self-signed 02
username admin privilege 15 secret 5 <removed>
username xxxxxxxxx secret 5 <removed>
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp client configuration group GROUP_VPN
key dierad
dns 8.8.8.8
pool POOL_VPN-GROUP
acl 101
include-local-lan
pfs
netmask 255.255.255.0
crypto isakmp profile vpn-group-ike-profile
match identity group GROUP_VPN
client authentication list VPN-GROUP_xauth
isakmp authorization list VPN-GROUP_group
client configuration address initiate
client configuration address respond
virtual-template 1
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto ipsec profile VPN-GROUP_Profile
set transform-set ESP-3DES-SHA
set isakmp-profile vpn-group-ike-profile
!
!
!
!
!
interface FastEthernet0/0
description ETH-LAN0
ip address 192.168.1.254 255.255.255.0
ip directed-broadcast
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
duplex auto
speed auto
!
interface FastEthernet0/1
description ETH-LAN1
ip address 192.168.2.254 255.255.255.0
ip directed-broadcast
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
duplex auto
speed auto
!
interface ATM0/0/0
no ip address
no ip route-cache cef
no ip route-cache
no atm ilmi-keepalive
bundle-enable
dsl operating-mode auto
dsl lom 30
hold-queue 224 in
!
interface ATM0/0/0.1 point-to-point
no ip route-cache
no snmp trap link-status
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface Virtual-Template1 type tunnel
ip unnumbered FastEthernet0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile VPN-GROUP_Profile
!
interface Dialer0
ip ddns update hostname xxxxxxxxxxxxx
ip ddns update DynDNS host members.dyndns.org
ip address negotiated
ip directed-broadcast
no ip proxy-arp
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication pap callin
ppp pap sent-username xxxxxxxxxxxxxx password 0 xxxxxxxxxxxxx
!
ip local pool POOL_VPN-GROUP 30.10.10.100 30.10.10.200
ip route 0.0.0.0 0.0.0.0 Dialer0
!
!
ip http server
ip http secure-server
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 192.168.2.101 443 interface Dialer0 8091
ip nat inside source static tcp 192.168.1.105 80 interface Dialer0 9095
ip nat inside source static udp 192.168.1.129 26326 interface Dialer0 26326
ip nat inside source static tcp 192.168.1.129 27631 interface Dialer0 27631
ip nat inside source static tcp 192.168.1.190 22 interface Dialer0 9090
ip nat inside source static udp 192.168.1.190 9 interface Dialer0 9
ip nat inside source static tcp 192.168.1.190 21 interface Dialer0 21
ip nat inside source static udp 192.168.1.190 7 interface Dialer0 7
ip nat inside source static tcp 192.168.1.102 80 interface Dialer0 9092
ip nat inside source static tcp 192.168.2.101 80 interface Dialer0 9091
ip nat inside source static tcp 192.168.2.103 80 interface Dialer0 9093
ip nat inside source static tcp 192.168.1.100 80 interface Dialer0 9094
ip nat inside source static tcp 192.168.2.1 80 interface Dialer0 9096
ip nat inside source static tcp 192.168.2.230 9999 interface Dialer0 9999
ip nat inside source static tcp 192.168.1.99 80 interface Dialer0 9099
ip nat inside source static tcp 192.168.1.38 80 interface Dialer0 9098
!
access-list 1 permit 192.168.2.0 0.0.0.255
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 permit ip any any
access-list 100 permit tcp any any
access-list 100 permit udp any any
access-list 101 permit ip 192.168.1.0 0.0.0.255 30.10.10.0 0.0.0.255
access-list 101 permit ip 192.168.2.0 0.0.0.255 30.10.10.0 0.0.0.255
dialer-list 1 protocol ip permit
dialer-list 1 protocol ipx permit
!
!
!
!
!
!
control-plane
!
!
banner login ^C
Router Cisco 1841
^C
!
line con 0
line aux 0
line vty 0 4
exec-timeout 40 0
password <removed>
transport input telnet ssh
transport output telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 20000 1000
sntp server 193.204.114.232
end
posseggo un cisco 1841 collegato a internet con offerta alice. Da qualche giorno non capisco perchè ma nonostante sia negoziato l'ip e quant'altro, i pc che sono sulla rete hanno difficoltà a navigare. Chiamato telecom, dicono che il problema è del router (effettivamente se ne metto altro funziona). Ho qualche dubbio che hanno cambiato qualche configurazione lato centrale.
Vi posto la mia attuale conf
Building configuration...
Current configuration : 7289 bytes
!
version 12.4
service config
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Cisco1841
!
boot-start-marker
boot-end-marker
!
no logging buffered
enable secret 5 <removed>
enable password <removed>
!
aaa new-model
!
!
aaa authentication login VPN-GROUP_xauth local
aaa authorization network VPN-GROUP_group local
!
aaa session-id common
!
resource policy
!
clock timezone CET 1
clock summer-time CET recurring
ip cef
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.10
ip dhcp excluded-address 192.168.1.201 192.168.1.254
ip dhcp excluded-address 192.168.1.100 192.168.1.120
ip dhcp excluded-address 192.168.2.1 192.168.2.10
ip dhcp excluded-address 192.168.2.201 192.168.2.254
ip dhcp excluded-address 192.168.2.100 192.168.2.120
!
ip dhcp pool POOL_DHCP_eth0
import all
network 192.168.1.0 255.255.255.0
dns-server 212.216.172.62 212.216.112.112
default-router 192.168.1.254
!
ip dhcp pool POOL_DHCP_eth1
import all
network 192.168.2.0 255.255.255.0
dns-server 212.216.172.62 212.216.112.112
default-router 192.168.2.254
!
!
ip domain name domain.com
ip host members.dyndns.org 204.13.248.112
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh version 2
ip ddns update method DynDNS
HTTP
add http://[email protected]/nic/ ... h>&myip=<a>
remove http://[email protected]/nic ... h>&myip=<a>
interval maximum 0 0 30 0
!
!
!
crypto pki trustpoint TP-self-signed-2910638223
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2910638223
revocation-check none
rsakeypair TP-self-signed-2910638223
!
!
crypto pki certificate chain TP-self-signed-2910638223
certificate self-signed 02
username admin privilege 15 secret 5 <removed>
username xxxxxxxxx secret 5 <removed>
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp client configuration group GROUP_VPN
key dierad
dns 8.8.8.8
pool POOL_VPN-GROUP
acl 101
include-local-lan
pfs
netmask 255.255.255.0
crypto isakmp profile vpn-group-ike-profile
match identity group GROUP_VPN
client authentication list VPN-GROUP_xauth
isakmp authorization list VPN-GROUP_group
client configuration address initiate
client configuration address respond
virtual-template 1
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto ipsec profile VPN-GROUP_Profile
set transform-set ESP-3DES-SHA
set isakmp-profile vpn-group-ike-profile
!
!
!
!
!
interface FastEthernet0/0
description ETH-LAN0
ip address 192.168.1.254 255.255.255.0
ip directed-broadcast
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
duplex auto
speed auto
!
interface FastEthernet0/1
description ETH-LAN1
ip address 192.168.2.254 255.255.255.0
ip directed-broadcast
ip nat inside
ip virtual-reassembly
no ip route-cache cef
no ip route-cache
duplex auto
speed auto
!
interface ATM0/0/0
no ip address
no ip route-cache cef
no ip route-cache
no atm ilmi-keepalive
bundle-enable
dsl operating-mode auto
dsl lom 30
hold-queue 224 in
!
interface ATM0/0/0.1 point-to-point
no ip route-cache
no snmp trap link-status
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface Virtual-Template1 type tunnel
ip unnumbered FastEthernet0/0
tunnel mode ipsec ipv4
tunnel protection ipsec profile VPN-GROUP_Profile
!
interface Dialer0
ip ddns update hostname xxxxxxxxxxxxx
ip ddns update DynDNS host members.dyndns.org
ip address negotiated
ip directed-broadcast
no ip proxy-arp
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication pap callin
ppp pap sent-username xxxxxxxxxxxxxx password 0 xxxxxxxxxxxxx
!
ip local pool POOL_VPN-GROUP 30.10.10.100 30.10.10.200
ip route 0.0.0.0 0.0.0.0 Dialer0
!
!
ip http server
ip http secure-server
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 192.168.2.101 443 interface Dialer0 8091
ip nat inside source static tcp 192.168.1.105 80 interface Dialer0 9095
ip nat inside source static udp 192.168.1.129 26326 interface Dialer0 26326
ip nat inside source static tcp 192.168.1.129 27631 interface Dialer0 27631
ip nat inside source static tcp 192.168.1.190 22 interface Dialer0 9090
ip nat inside source static udp 192.168.1.190 9 interface Dialer0 9
ip nat inside source static tcp 192.168.1.190 21 interface Dialer0 21
ip nat inside source static udp 192.168.1.190 7 interface Dialer0 7
ip nat inside source static tcp 192.168.1.102 80 interface Dialer0 9092
ip nat inside source static tcp 192.168.2.101 80 interface Dialer0 9091
ip nat inside source static tcp 192.168.2.103 80 interface Dialer0 9093
ip nat inside source static tcp 192.168.1.100 80 interface Dialer0 9094
ip nat inside source static tcp 192.168.2.1 80 interface Dialer0 9096
ip nat inside source static tcp 192.168.2.230 9999 interface Dialer0 9999
ip nat inside source static tcp 192.168.1.99 80 interface Dialer0 9099
ip nat inside source static tcp 192.168.1.38 80 interface Dialer0 9098
!
access-list 1 permit 192.168.2.0 0.0.0.255
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 permit ip any any
access-list 100 permit tcp any any
access-list 100 permit udp any any
access-list 101 permit ip 192.168.1.0 0.0.0.255 30.10.10.0 0.0.0.255
access-list 101 permit ip 192.168.2.0 0.0.0.255 30.10.10.0 0.0.0.255
dialer-list 1 protocol ip permit
dialer-list 1 protocol ipx permit
!
!
!
!
!
!
control-plane
!
!
banner login ^C
Router Cisco 1841
^C
!
line con 0
line aux 0
line vty 0 4
exec-timeout 40 0
password <removed>
transport input telnet ssh
transport output telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 20000 1000
sntp server 193.204.114.232
end