ciao ho fatto alcune prova ma continua a non funzionare sulla ethernet0.836 ho impostato sia dhcp che l'ip assegnato interno che negozia con il router tecnicolor che inizia per 100.xx.xx.xx
cmq ho fatto richiesta ieri di un ip pubblico statico e ad oggi ancora non è stato abilitato magari il problema sta li, cioè ho letto in giro che alcuni utenti hanno dovuto configurare una dialer mentre altri direttamente l'ip sulla interfaccia.. riproverò non appena e attivo l'ip pubblico statico intanto allego la conf completa, dimmi come ti sembra..
version 15.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname C867VAE
!
boot-start-marker
boot system flash:c860vae-ipbasek9-mz.154-3.M3.bin
boot-end-marker
!
!
logging buffered 52000
enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
!
aaa new-model
!
!
aaa authentication login local_authen local
aaa authorization exec local_author local
!
!
!
!
!
aaa session-id common
wan mode dsl
clock timezone MET 1 0
clock summer-time MEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
!
!
!
!
ip dhcp excluded-address 192.168.0.201 192.168.0.254
!
ip dhcp pool home
import all
network 192.168.0.0 255.255.255.0
default-router 192.168.0.221
domain-name MATRIX
dns-server 8.8.8.8 8.8.4.4
lease infinite
!
ip dhcp pool ALIENWARE
host 192.168.0.1 255.255.255.0
client-identifier xxxxxxxxxxxxxx
client-name ALIENWARE
!
ip dhcp pool SPLIT-X2
host 192.168.0.2 255.255.255.0
client-identifier xxxxxxxxxxxxxxxx
client-name SPLIT-X2
!
ip dhcp pool IPHONE
host 192.168.0.3 255.255.255.0
client-identifier 013c.d0f8.8440.36
client-name IPHONE
!
ip dhcp pool vmwaresrv
host 192.168.0.4 255.255.255.0
client-identifier xxxxxxxxxxxxxxxxx
client-name vmwaresrv
!
ip dhcp pool chromecast
host 192.168.0.5 255.255.255.0
hardware-address xxxxxxxxxxxx
client-name chromecast
!
!
!
ip domain name MATRIX
ip name-server 8.8.8.8
ip name-server 8.8.4.4
ip cef
no ipv6 cef
!
!
!
!
!
!
!
!
!
!
!
archive
log config
hidekeys
file verify auto
username Agodmin privilege 15 secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
!
!
controller VDSL 0
operating mode vdsl2
no cdp run
!
ip tcp selective-ack
ip tcp timestamp
!
!
!
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
shutdown
no atm ilmi-keepalive
!
interface Ethernet0
no ip address
ip flow ingress
hold-queue 256 in
!
interface Ethernet0.836
description Fastweb Joy
encapsulation dot1Q 836
ip address dhcp
ip access-group 101 in
ip mtu 1492
ip flow ingress
ip nat outside
ip virtual-reassembly in
ip tcp adjust-mss 1452
no cdp enable
!
interface FastEthernet0
description Apple AirPort-Express
no ip address
!
interface FastEthernet1
no ip address
shutdown
!
interface FastEthernet2
no ip address
shutdown
!
interface FastEthernet3
description Linksys Switch-Gigabit
no ip address
!
interface GigabitEthernet0
no ip address
shutdown
duplex auto
speed auto
!
interface Vlan1
ip address 192.168.0.221 255.255.255.0
ip access-group 102 in
ip mtu 1492
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1452
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
ip nat inside source list 1 interface Ethernet0.836 overload
ip nat inside source static tcp 192.168.0.1 4662 interface Ethernet0.836 4662
ip nat inside source static udp 192.168.0.1 4672 interface Ethernet0.836 4672
ip nat inside source static tcp 192.168.0.1 6881 interface Ethernet0.836 6881
ip route 0.0.0.0 0.0.0.0 Ethernet0.836
!
mac-address-table aging-time 10
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.0.0 0.0.0.255
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.0.0 0.0.0.255
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 permit udp any eq bootpc any eq bootps
access-list 101 permit udp any eq bootps any eq bootpc
access-list 101 permit tcp any any gt 1023 established
access-list 101 permit udp any any gt 1023
access-list 101 permit icmp any any echo
access-list 101 permit icmp any any echo-reply
access-list 101 permit icmp any any time-exceeded
access-list 101 permit icmp any any unreachable
access-list 101 permit icmp any any administratively-prohibited
access-list 101 permit icmp any any packet-too-big
access-list 101 permit icmp any any traceroute
access-list 101 deny icmp any any log
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 permit udp host 8.8.8.8 eq domain any
access-list 101 permit udp host 8.8.4.4 eq domain any
access-list 101 permit udp any any eq ntp
access-list 101 permit tcp any any eq 4662
access-list 101 permit udp any any eq 4672
access-list 101 permit tcp any any eq 6881
access-list 101 deny ip any any log
access-list 102 remark Traffic allowed to enter the router from the Ethernet
access-list 102 permit ip any host 192.168.0.221
access-list 102 deny ip any host 192.168.0.255
access-list 102 deny udp any any eq tftp log
access-list 102 deny ip any 0.0.0.0 0.255.255.255 log
access-list 102 deny ip any 10.0.0.0 0.255.255.255 log
access-list 102 deny ip any 127.0.0.0 0.255.255.255 log
access-list 102 deny ip any 169.254.0.0 0.0.255.255 log
access-list 102 deny ip any 172.16.0.0 0.15.255.255 log
access-list 102 deny ip any 192.0.2.0 0.0.0.255 log
access-list 102 deny ip any 192.168.0.0 0.0.255.255 log
access-list 102 deny ip any 198.18.0.0 0.1.255.255 log
access-list 102 deny udp any any eq 135 log
access-list 102 deny tcp any any eq 135 log
access-list 102 deny udp any any eq netbios-ns log
access-list 102 deny udp any any eq netbios-dgm log
access-list 102 deny tcp any any eq 445 log
access-list 102 permit ip 192.168.0.0 0.0.0.255 any
access-list 102 permit ip any host 255.255.255.255
access-list 102 deny ip any any log
!
!
!
control-plane
!
!
banner login ^C.!|!.!|!. Cisco Systems, Inc
_______ ____ __________ _ _____ ______
/ ____(_)_____________ ( __ )/ ___/__ / | | / / | / ____/
/ / / / ___/ ___/ __ \ / __ / __ \ / / | | / / /| | / __/
/ /___/ (__ ) /__/ /_/ / / /_/ / /_/ / / / | |/ / ___ |/ /___
\____/_/____/\___/\____/ \____/\____/ /_/ |___/_/ |_/_____/
Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!
^C
!
line con 0
login authentication local_authen
no modem enable
transport output telnet
line aux 0
login authentication local_authen
transport output telnet
line vty 0 4
access-class 2 in
authorization exec local_author
login authentication local_authen
transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 50000 1000
sntp server 216.239.32.15
sntp server 216.239.34.15
!
end