!This is the running config of the router: 192.168.1.254
!----------------------------------------------------------------------------
!version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname MTData
!
boot-start-marker
boot-end-marker
!
logging buffered 51200
logging console critical
enable secret 5 ########
!
no aaa new-model
clock timezone Sydney 10
clock summer-time Sydney date Mar 30 2003 3:00 Oct 26 2003 2:00
!
crypto pki trustpoint TP-self-signed-3265497259
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3265497259
revocation-check none
rsakeypair TP-self-signed-3265497259
!
!
crypto pki certificate chain TP-self-signed-3265497259
certificate self-signed 01
3082024C 308201B5 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33323635 34393732 3539301E 170D3130 30333136 30343430
32335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 32363534
39373235 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100EA46 A8D9C8E6 5548086E 431A1776 CEBBA773 45907C93 9FB8FA66 8AB4DDB8
1C01D81B 32D53D57 AB6A9E39 36B5779A B339CA22 EE0015B0 6D917E11 896A6CA8
9DF4AD64 C5AD9088 B31D0BEC D5463C1A CE2EF006 06972947 ECF62ECF 8FCEAFCE
B0A1E124 184BD0B5 D9F5E619 22ACDDCE 16BA0F57 70713C7C 14AFCB3A 52FDEEBB
54AF0203 010001A3 74307230 0F060355 1D130101 FF040530 030101FF 301F0603
551D1104 18301682 144D5444 6174612E 6D746461 74612E63 6F6D2E61 75301F06
03551D23 04183016 8014B818 99180EC2 BE23D332 C9EA392E 4E09892B F2A9301D
0603551D 0E041604 14B81899 180EC2BE 23D332C9 EA392E4E 09892BF2 A9300D06
092A8648 86F70D01 01040500 03818100 6788FF4E FB70C633 C8DD1130 1AA5EF72
2C75FC07 A91C0681 2C1AD2C9 F20981DD 2E774C94 FDC55A27 E6CC52A7 68A24172
4FE4F0D0 4AC8843C 0FE83815 D37D16CE B6670A06 2DCD6F10 58DC55EF 9735DB9A
95AA3381 0F4173B4 7A369F2C F21CAE8F 546B280D 3DDAFDF9 29E64BC1 47629CA8
050734B2 65E46773 65895BF5 78CED3E1
quit
dot11 syslog
no ip source-route
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.99
!
ip dhcp pool ccp-pool1
import all
network 192.168.1.0 255.255.255.0
default-router 192.168.1.254
domain-name xxxxx
dns-server 192.168.1.101
netbios-name-server 192.168.1.101
!
!
ip cef
ip inspect name DEFAULT100 cuseeme
ip inspect name DEFAULT100 ftp
ip inspect name DEFAULT100 h323
ip inspect name DEFAULT100 icmp
ip inspect name DEFAULT100 rcmd
ip inspect name DEFAULT100 realaudio
ip inspect name DEFAULT100 rtsp
ip inspect name DEFAULT100 esmtp
ip inspect name DEFAULT100 sqlnet
ip inspect name DEFAULT100 streamworks
ip inspect name DEFAULT100 tftp
ip inspect name DEFAULT100 tcp
ip inspect name DEFAULT100 udp
ip inspect name DEFAULT100 vdolive
no ip bootp server
ip domain name xxxxxx.com.au
ip name-server 139.130.xxx.xxx
ip name-server 203.50.xxx.xxx
ip name-server 192.168.1.101
!
parameter-map type protocol-info msn-servers
server name messenger.hotmail.com
server name gateway.messenger.hotmail.com
server name webmessenger.msn.com
parameter-map type protocol-info aol-servers
server name login.oscar.aol.com
server name toc.oscar.aol.com
server name oam-d09a.blue.aol.com
parameter-map type protocol-info yahoo-servers
server name scs.msg.yahoo.com
server name scsa.msg.yahoo.com
server name scsb.msg.yahoo.com
server name scsc.msg.yahoo.com
server name scsd.msg.yahoo.com
server name cs16.msg.dcn.yahoo.com
server name cs19.msg.dcn.yahoo.com
server name cs42.msg.dcn.yahoo.com
server name cs53.msg.dcn.yahoo.com
server name cs54.msg.dcn.yahoo.com
server name ads1.vip.scd.yahoo.com
server name radio1.launch.vip.dal.yahoo.com
server name in1.msg.vip.re2.yahoo.com
server name data1.my.vip.sc5.yahoo.com
server name address1.pim.vip.mud.yahoo.com
server name edit.messenger.yahoo.com
server name messenger.yahoo.com
server name http.pager.yahoo.com
server name privacy.yahoo.com
server name csa.yahoo.com
server name csb.yahoo.com
server name csc.yahoo.com
!
!
username admin privilege 15 secret 5 xxxxxx
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp key xxxxx address 203.45.xxx.xxx
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA2 esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA3 esp-3des esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to203.45.xxx.xxx
set peer 203.45.xxx.xxx
set transform-set ESP-3DES-SHA3
match address SDM_2
!
archive
log config
hidekeys
!
!
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
!
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
description $FW_OUTSIDE$$ES_WAN$$ETH-WAN$
ip address 139.130.xxx.xxx 255.255.255.252
ip access-group 111 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip inspect DEFAULT100 out
ip flow ingress
ip flow egress
ip nat outside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
crypto map SDM_CMAP_1
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 192.168.1.254 255.255.255.0
ip access-group 110 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
ip route-cache flow
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 139.130.xxx.xxx
ip flow-top-talkers
top 20
sort-by bytes
cache-timeout 360000
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source route-map SDM_RMAP_1 interface FastEthernet4 overload
ip nat inside source static udp 192.168.1.51 14 139.130.xxx.xxx 14 extendable
ip nat inside source static tcp 192.168.1.101 25 139.130.xxx.xxx 25 extendable
ip nat inside source static tcp 192.168.1.92 80 139.130.xxx.xxx 80 extendable
ip nat inside source static tcp 192.168.1.101 110 139.130.xxx.xxx 110 extendable
ip nat inside source static tcp 192.168.1.101 1025 139.130.xxx.xxx 1025 extendable
ip nat inside source static tcp 192.168.1.105 3395 139.130.xxx.xxx 3395 extendable
ip nat inside source static udp 192.168.1.105 3395 139.130.xxx.xxx 3395 extendable
ip nat inside source static tcp 192.168.1.61 3399 139.130.xxx.xxx 3399 extendable
ip nat inside source static tcp 192.168.1.155 3389 139.130.xxx.xxx 3491 extendable
ip nat inside source static udp 192.168.1.155 3492 139.130.xxx.xxx 3492 extendable
ip nat inside source static tcp 192.168.1.161 3389 139.130.xxx.xxx 3499 extendable
ip nat inside source static udp 192.168.1.105 5552 139.130.xxx.xxx 5552 extendable
ip nat inside source static udp 192.168.1.105 5553 139.130.xxx.xxx 5553 extendable
ip nat inside source static udp 192.168.1.105 5554 139.130.xxx.xxx 5554 extendable
ip nat inside source static udp 192.168.1.105 5555 139.130.xxx.xxx 5555 extendable
ip nat inside source static tcp 192.168.1.101 8080 139.130.xxx.xxx 8080 extendable
ip nat inside source static tcp 192.168.1.155 18080 139.130.xxx.xxx 18080 extendable
!
ip access-list extended NAT-RULES
remark SDM_ACL Category=18
remark IPSec Rule
deny ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
permit ip 192.168.1.0 0.0.0.255 any
ip access-list extended SDM_2
remark SDM_ACL Category=4
remark IPSec Rule
permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
ip access-list extended SDM_AH
remark SDM_ACL Category=1
permit ahp any any
ip access-list extended SDM_ESP
remark SDM_ACL Category=1
permit esp any any
ip access-list extended SDM_HTTPS
remark SDM_ACL Category=1
permit tcp any any eq 443
ip access-list extended SDM_SHELL
remark SDM_ACL Category=1
permit tcp any any eq cmd
ip access-list extended SDM_SSH
remark SDM_ACL Category=1
permit tcp any any eq 22
!
logging trap debugging
logging 192.168.1.101
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 remark SDM_ACL Category=2
access-list 100 deny ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 100 permit ip 192.168.1.0 0.0.0.255 any
access-list 101 remark SDM_ACL Category=4
access-list 101 permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 102 remark SDM_ACL Category=128
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 103 remark SDM_ACL Category=128
access-list 103 permit ip host 203.45.xxx.xxx any
access-list 104 remark SDM_ACL Category=0
access-list 104 remark IPSec Rule
access-list 104 permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 105 remark SDM_ACL Category=4
access-list 105 remark IPSec Rule
access-list 105 permit ip 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 106 remark SDM_ACL Category=128
access-list 106 permit ip host 255.255.255.255 any
access-list 106 permit ip 127.0.0.0 0.255.255.255 any
access-list 106 permit ip 139.130.xxx.xxx 0.0.0.3 any
access-list 107 remark SDM_ACL Category=128
access-list 107 permit ip 192.168.1.0 0.0.0.255 any
access-list 108 remark SDM_ACL Category=128
access-list 108 permit ip host 203.45.xxx.xxx any
access-list 109 remark SDM_ACL Category=0
access-list 109 remark IPSec Rule
access-list 109 permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 110 remark auto generated by Cisco SDM Express firewall configuration
access-list 110 remark SDM_ACL Category=17
access-list 110 permit udp host 192.168.1.101 eq domain any
access-list 110 deny ip host 255.255.255.255 any
access-list 110 deny ip 127.0.0.0 0.255.255.255 any
access-list 110 permit ip any any
access-list 111 remark auto generated by Cisco SDM Express firewall configuration
access-list 111 remark SDM_ACL Category=17
access-list 111 remark TaxiDemoVM Web
access-list 111 permit tcp any eq 18080 host 192.168.1.155 eq 18080
access-list 111 remark TaxiDemoVM RDP
access-list 111 permit udp any eq 3491 host 192.168.1.155 eq 3491
access-list 111 remark TaxiDemoVM NextG
access-list 111 permit tcp any eq 3492 host 192.168.1.155 eq 3492
access-list 111 permit udp host 203.45.xxx.xxx host 139.130.xxx.xxx eq non500-isakmp
access-list 111 permit udp host 203.45.xxx.xxx host 139.130.xxx.xxx eq isakmp
access-list 111 permit esp host 203.45.xxx.xxx host 139.130.xxx.xxx
access-list 111 permit ahp host 203.45.xxx.xxx host 139.130.xxx.xxx
access-list 111 permit tcp any any eq 8070
access-list 111 permit udp any any eq 8070
access-list 111 permit ip 192.168.10.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 111 permit icmp any any
access-list 111 permit udp any any eq 8010
access-list 111 permit tcp any any eq 8010
access-list 111 permit udp any any eq 3457
access-list 111 permit udp any any eq 2344
access-list 111 permit udp any any eq 4447
access-list 111 permit tcp any any eq www
access-list 111 permit tcp any any eq 8080
access-list 111 permit udp any any eq 4455
access-list 111 permit udp any any eq 3344
access-list 111 permit tcp any any eq 1025
access-list 111 permit tcp any eq pop3 host 192.168.1.101 eq pop3
access-list 111 permit tcp any eq smtp host 192.168.1.101 eq smtp
access-list 111 permit udp host 139.130.4.4 eq domain any
access-list 111 permit udp any any eq 14
access-list 111 permit udp host 203.50.2.71 eq domain any
access-list 111 permit gre any any
access-list 111 permit icmp any any echo-reply
access-list 111 permit icmp any any time-exceeded
access-list 111 permit icmp any any unreachable
access-list 111 permit tcp any any eq 1723
access-list 111 permit udp any any eq 1701
access-list 111 permit udp any any eq isakmp
access-list 111 permit udp any any eq 47
access-list 111 permit tcp any any eq smtp
access-list 111 permit tcp any any eq pop3
access-list 111 permit udp any any eq 2244
access-list 111 permit tcp any any eq 8050
access-list 111 permit tcp any any eq 3499
access-list 111 permit tcp any any eq 3399
access-list 111 permit tcp any any eq 3491
access-list 111 permit udp any any eq 3492
access-list 111 permit tcp any any eq 18080
access-list 111 permit udp any any eq 5552
access-list 111 permit udp any any eq 5553
access-list 111 permit udp any any eq 5554
access-list 111 permit udp any any eq 5555
access-list 111 permit udp any any eq 3395
access-list 111 permit tcp any any eq 3395
access-list 111 remark CCP_ACL Category=1
access-list 111 deny ip 192.168.1.0 0.0.0.255 any
access-list 111 deny ip 10.0.0.0 0.255.255.255 any
access-list 111 deny ip 172.16.0.0 0.15.255.255 any
access-list 111 deny ip 192.168.0.0 0.0.255.255 any
access-list 111 deny ip 127.0.0.0 0.255.255.255 any
access-list 111 deny ip host 255.255.255.255 any
access-list 111 deny ip host 0.0.0.0 any
access-list 111 deny ip any any
no cdp run
route-map SDM_RMAP_1 permit 1
match ip address NAT-RULES
!
!
control-plane
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you
want to use.
-----------------------------------------------------------------------
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
no modem enable
transport output telnet
line aux 0
login local
transport output telnet
line vty 0 4
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end
|