Pagina 1 di 1

Installazione CISCO C837 con ADSL IP Statico

Inviato: gio 16 nov , 2006 2:55 pm
da mangale
Salve devo installare un collegamento ADSL fornitomi da Welcome Italia con IP Statico (protocollo RFC 1483 incapsulamento LLC-MUX) su un cisco C837 IOS 12.3(4)T che gestisco con SDM 2.2.1.

Purtroppo sono un pò asciutto mi sapete aiutare?

N.B.: sulla stessa macchina dovrò installare in seguito una VPN ci sono parametri che conviene già settare?

Grazie a tutti.

Inviato: ven 17 nov , 2006 10:43 am
da TheIrish
Buondì,
vedi, se parti completamente da zero, è pressoché impossibile che qualcuno sia disposto a guidarti passo passo nell'intera configurazione. Questi apparati sanno essere terribilmente complessi e ostici.
Ergo, documentati, lavoraci un po' sopra e appena hai un'idea di come operare (o di come vorresti operare), ne possiamo riparlare qui.,

Inviato: ven 17 nov , 2006 12:43 pm
da mangale
Non proprio da zero...
questa è la conf attuale ma non riesco a navigare!!

Building configuration...

Current configuration : 5375 bytes
!
! Last configuration change at 12:40:11 PCTime Fri Nov 17 2006 by alessio
! NVRAM config last updated at 14:27:55 PCTime Thu Nov 16 2006 by alessio
!
version 12.3
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname Router
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 debugging
logging console critical
enable secret 5 $1$JxWa$6lLwQMAqERv4c9Wvcrmb0.
enable password 7 0305570E151C28431F
!
username alessio privilege 15 secret 5 $1$Gg.q$C8ykCJTnnMtoqewF1xF7g1
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
aaa new-model
!
!
aaa authentication login local_authen local
aaa authorization exec local_author local
aaa session-id common
ip subnet-zero
no ip source-route
no ip routing
ip tcp synwait-time 10
ip name-server 80.93.143.42
ip name-server 80.93.143.44
ip dhcp excluded-address 192.168.2.1 192.168.4.1
!
!
no ip bootp server
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW icmp
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW rtsp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW vdolive
ip audit notify log
ip audit po max-events 100
no ftp-server write-enable
!
!
!
no crypto isakmp enable
!
!
!
!
interface Null0
no ip unreachables
!
interface Ethernet0
description CRWS Generated text. Please do not delete this:192.168.4.1-255.255.255.0$FW_INSIDE$$ETH-LAN$
ip address 192.168.4.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
no ip route-cache
no cdp enable
hold-queue 100 out
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside
no ip route-cache
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.2 point-to-point
ip address 87.247.234.238 255.255.254.0
ip nat outside
no ip route-cache
pvc 8/35
protocol ip 87.247.234.1 broadcast
encapsulation aal5mux ip
!
!
ip nat pool alessio 192.168.4.0 192.168.4.255 netmask 255.255.255.0
ip nat inside source list 1 interface ATM0.2 overload
ip classless
ip route 0.0.0.0 0.0.0.0 ATM0.2
no ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
!
!
logging trap debugging
logging 192.168.4.1
access-list 1 remark INSIDE_IF=Ethernet0
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.4.0 0.0.0.255
access-list 2 remark HTTP Access-class list
access-list 2 remark SDM_ACL Category=1
access-list 2 permit 192.168.4.0 0.0.0.255
access-list 2 deny any
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark SDM_ACL Category=1
access-list 100 deny ip 87.247.234.0 0.0.1.255 any
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 remark auto generated by SDM firewall configuration
access-list 101 remark SDM_ACL Category=1
access-list 101 deny ip 192.168.4.0 0.0.0.255 any
access-list 101 permit icmp any host 87.247.234.238 echo-reply
access-list 101 permit icmp any host 87.247.234.238 time-exceeded
access-list 101 permit icmp any host 87.247.234.238 unreachable
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip host 255.255.255.255 any
access-list 101 deny ip host 0.0.0.0 any
access-list 101 deny ip any any log
access-list 102 remark VTY Access-class list
access-list 102 remark SDM_ACL Category=1
access-list 102 permit ip 192.168.4.0 0.0.0.255 any
access-list 102 deny ip any any
access-list 103 remark auto generated by SDM firewall configuration
access-list 103 remark SDM_ACL Category=1
access-list 103 deny ip 192.168.4.0 0.0.0.255 any
access-list 103 permit icmp any host 87.247.234.238 echo-reply
access-list 103 permit icmp any host 87.247.234.238 time-exceeded
access-list 103 permit icmp any host 87.247.234.238 unreachable
access-list 103 deny ip 10.0.0.0 0.255.255.255 any
access-list 103 deny ip 172.16.0.0 0.15.255.255 any
access-list 103 deny ip 192.168.0.0 0.0.255.255 any
access-list 103 deny ip 127.0.0.0 0.255.255.255 any
access-list 103 deny ip host 255.255.255.255 any
access-list 103 deny ip host 0.0.0.0 any
access-list 103 deny ip any any log
no cdp run
!
control-plane
!
banner login ^CCIAO^C
!
line con 0
login authentication local_authen
no modem enable
transport preferred all
transport output telnet
line aux 0
login authentication local_authen
transport preferred all
transport output telnet
line vty 0 4
access-class 102 in
password 7 0305570E151C28431C
authorization exec local_author
login authentication local_authen
length 0
transport preferred all
transport input telnet ssh
transport output all
!
scheduler max-task-time 5000
scheduler interval 500
!
end

Inviato: ven 17 nov , 2006 3:01 pm
da TheIrish
Sembra relativamente a posto (è un po' una schifezza, ma poi ci mettiamo le mani).
Sei sicuro che l'encapsulation sia aal5mux ?

Inviato: ven 17 nov , 2006 4:00 pm
da mangale
Il protocollo è RFC 1483 e l'incapsulamento LLC-MUX

ma lui mi dà solo la possibilità di settare RFC 1483 aal5MUX è la stessa cosa?

Grazie