Pagina 1 di 1

CISCO 857W con alice adsl

Inviato: ven 09 mag , 2008 11:02 am
da nullmind
Salve a tutti,
premetto che ho cercato e ho provato altre soluzioni proposte in questo forum, ma non ho trovato ciò che faceva al mio caso purtroppo ;(

Ho un Alice adsl 7 mega, ma il router non riesce a connettersi ad Internet ( l'indirizzo ip dell'adsl invece viene assegnato correttamente ). Posto la configurazione certo che qualcuno in questo forum riuscira' ad aiutarmi :)

Codice: Seleziona tutto

no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
service sequence-numbers
!
hostname Routing
!
logging buffered 10240 debugging
logging console critical
!
ip subnet-zero
no ip source-route
ip domain-name local
ip dhcp excluded-address 192.168.1.1 192.168.1.99
ip dhcp excluded-address 192.168.1.254
!
ip dhcp pool dhcppool
import all
network 192.168.1.0 255.255.255.0
default-router 192.168.1.254
update arp
exit
!
!
ip tcp selective-ack
ip tcp timestamp
no ip bootp server
no ip domain lookup
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp max-data 52428800
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall netshow
ip inspect name firewall pptp
ip inspect name firewall rtsp
ip inspect name firewall skinny
ip domain name local
ip name-server 151.99.125.2
ip name-server 212.216.112.112
file verify auto
!
username ********* privilege 15 secret 0 ********
!
bridge irb
!
!
interface Dot11Radio0
no ip address
!
encryption mode ciphers tkip
!
ssid Cisco 857W
authentication open
authentication key-management wpa
guest-mode
wpa-psk ascii 0102030405
!
speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
no cdp enable
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Vlan1
no ip address
bridge-group 1
bridge-group 1 spanning-disabled
!
interface bvi1
ip address 192.168.1.254 255.255.255.0
ip access-group 102 in
ip nat inside
no ip directed-broadcast
exit
!
interface ATM0
 no ip address
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip route-cache flow
 no atm ilmi-keepalive
 dsl operating-mode ansi-dmt
!
interface ATM0.1 point-to-point
 pvc 8/35 
  pppoe-client dial-pool-number 1
!
exit
!
interface Dialer0
 ip inspect firewall out
 ip access-group 101 in
 ip address negotiated
 no ip redirects
 no ip unreachables
 ip nat outside
 ip virtual-reassembly
 encapsulation ppp
 ip route-cache flow
 dialer pool 1
 dialer-group 1
 no cdp enable
 ppp authentication chap pap callin
 ppp chap hostname **************
 ppp chap password 0 ************
 ppp pap sent-username ************* password 0 **********
 exit
!
ip nat inside source list 1 interface Dialer0 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
no ip http server
!
!
line vty 0 4
access-class 2 in
exit
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
!
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
!
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 deny icmp any any echo
access-list 101 deny ip any any log
!
access-list 102 remark Traffic allowed to enter the router from the Ethernet
access-list 102 permit ip any host 192.168.1.254
access-list 102 deny ip any host 192.168.1.255
access-list 102 deny udp any any eq tftp log
access-list 102 deny ip any 0.0.0.0 0.255.255.255 log
access-list 102 deny ip any 10.0.0.0 0.255.255.255 log
access-list 102 deny ip any 127.0.0.0 0.255.255.255 log
access-list 102 deny ip any 169.254.0.0 0.0.255.255 log
access-list 102 deny ip any 172.16.0.0 0.15.255.255 log
access-list 102 deny ip any 192.0.2.0 0.0.0.255 log
access-list 102 deny ip any 192.168.0.0 0.0.255.255 log
access-list 102 deny ip any 198.18.0.0 0.1.255.255 log
access-list 102 deny udp any any eq 135 log
access-list 102 deny tcp any any eq 135 log
access-list 102 deny udp any any eq 137 log
access-list 102 deny udp any any eq 138 log
access-list 102 deny tcp any any eq 445 log
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip any host 255.255.255.255
access-list 102 deny ip any any log
!
bridge 1 route ip
dialer-list 1 protocol ip permit
!
banner login ^C
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device. 
This feature requires the one-time use of the username "cisco" 
with the password "cisco". The default username and password have a privilege level of 15.

Please change these publicly known initial credentials using SDM or the IOS CLI. 
Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want to use. 

For more information about SDM please follow the instructions in the QUICK START 
GUIDE for your router or go to http://www.cisco.com/go/sdm 
-----------------------------------------------------------------------
^C
!
interface FastEthernet0
no shutdown
exit
interface FastEthernet1
no shutdown
exit
interface FastEthernet2
no shutdown
exit
interface FastEthernet3
no shutdown
exit
interface vlan1
no shutdown
exit
interface ATM0
no shutdown
exit
interface Dot11Radio0
no shutdown
exit
interface bvi1
no shutdown
exit
Questo è invece il test di connessione ad alice adsl:

Codice: Seleziona tutto

Router Details 
Attribute	Value
Router Model 	857W 
Image Name 	c850-advsecurityk9-mz.124-15.T3.bin 
IOS Version 	12.4(15)T3 
Hostname 	Routing 



Interface Details 

Attribute	Value
Interface 	ATM0.1 
IP address 	Easy IP 
Description 	



Test Activity Summary 
Activity	Status
Checking interface status... 	Up 
Checking for DNS settings... 	Successful 
Checking interface IP address.. 	Successful 
Checking exit interface... 	Successful 
Pinging to destination host... 	Failed 
Checking ATM PVC status... 	Up 
Checking PPPoE tunnel... 	Up 



Test Activity Details 
Activity	Status
Checking interface status... 	Up 
    Interface physical status :Up 	
    Line protocol status :Up 	
Checking for DNS settings... 	Successful 
    DNS lookup set :Yes 	
    Statically configured DNS servers : 151.99.125.2 212.216.112.112 	
    Dynamically imported DNS servers :None 	
Checking interface IP address.. 	Successful 
    Interface IP address :82.51.8.55 	
    Interface IP address Type :Negotiated 	
Checking exit interface... 	Successful 
    Exit interface found :Dialer0 	
    Exit interface found :Dialer0 	
Pinging to destination host... 	Failed 
    Destination pinged to :151.99.125.2 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No 	
    Destination pinged to :212.216.112.112 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No 	
Checking ATM PVC status... 	Up 
    VPI :8 	
    VCI :35 	
    Sub interface type :point-to-point 	
Checking PPPoE tunnel... 	Up 
    Session ID :39906 	
    Dialer Interface :Di0 	
    Port :ATM0.1 	
    Virtual Access Identifier :Vi1 	
    Virtual Access Status :UP
Grazie a tutti quelli che vorrando darmi una mano :oops:

Inviato: ven 09 mag , 2008 11:40 am
da Helix
prova questa!!!

interface ATM0
no ip address
no atm ilmi-keepalive
pvc 8/35
encapsulation aal5mux ppp dialer
dialer pool-member 1
dsl operating-mode auto

interface Dialer0
ip address negotiated
ip nat outside
encapsulation ppp
dialer pool 1
ppp chap hostname NOME_HOST
ppp chap password 0 PASSWORD
ppp pap sent-username XXXXXXX password 0 XXXXXXX

Inviato: ven 09 mag , 2008 1:35 pm
da nullmind
Ciao Leonardo,
prima di tutto grazie per la risposta e per l'aiuto :)
Ho modificato le impostazione come mi hai suggerito e in questo modo mi si accende la spia PPP, ma come prima non riesco a superare il test verso la fine:

Codice: Seleziona tutto

Attribute	Value
Router Model 	857W 
Image Name 	c850-advsecurityk9-mz.124-15.T3.bin 
IOS Version 	12.4(15)T3 
Hostname 	Routing 



Interface Details 

Attribute	Value
Interface 	ATM0.1 
IP address 	Easy IP 
Description 	



Test Activity Summary 
Activity	Status
Checking interface status... 	Up 
Checking for DNS settings... 	Successful 
Checking interface IP address.. 	Successful 
Checking exit interface... 	Successful 
Pinging to destination host... 	Failed 



Test Activity Details 
Activity	Status
Checking interface status... 	Up 
    Interface physical status :Up 	
    Line protocol status :Up 	
Checking for DNS settings... 	Successful 
    DNS lookup set :Yes 	
    Statically configured DNS servers : 151.99.125.2 212.216.112.112 208.67.222.222 208.67.220.220 	
    Dynamically imported DNS servers :None 	
Checking interface IP address.. 	Successful 
    Interface IP address :82.51.10.17 	
    Interface IP address Type :Negotiated 	
Checking exit interface... 	Successful 
    Exit interface found :Dialer0 	
    Exit interface found :Dialer0 	
    Exit interface found :Dialer0 	
    Exit interface found :Dialer0 	
Pinging to destination host... 	Failed 
    Destination pinged to :151.99.125.2 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No 	
    Destination pinged to :212.216.112.112 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No 	
    Destination pinged to :208.67.222.222 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No 	
    Destination pinged to :208.67.220.220 	
    Size of the ping packet (in bytes) :100 	
    Timeout interval :2 	
    Number of ping packets sent to the destination address :5 	
    Ping reply validated :No 	
    Fragmentation allowed on ping packet :No
Può essere colpa di come ho configurato il firewall? :roll:

Codice: Seleziona tutto

Building configuration...

Current configuration : 6673 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
service sequence-numbers
!
hostname Routing
!
boot-start-marker
boot-end-marker
!
logging buffered 10240
logging console critical
!
no aaa new-model
!
!
!
dot11 ssid Cisco 857W
   authentication open 
   authentication key-management wpa
   guest-mode
   wpa-psk ascii 7 **********
!
no ip source-route
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.99
ip dhcp excluded-address 192.168.1.254
!
ip dhcp pool dhcppool
   import all
   network 192.168.1.0 255.255.255.0
   default-router 192.168.1.254 
   update arp
!
!
ip cef
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp max-data 52428800
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall pptp
ip inspect name firewall rtsp
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
no ip bootp server
ip domain name local
ip name-server 151.99.125.2
ip name-server 212.216.112.112
ip name-server 208.67.222.222
ip name-server 208.67.220.220
!
!
!
file verify auto
username ******* privilege 15 secret 5 ********
! 
!
archive
 log config
  hidekeys
!
!
ip tcp selective-ack
ip tcp timestamp
!
bridge irb
!
!
interface ATM0
 no ip address
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip route-cache flow
 no atm ilmi-keepalive
 dsl operating-mode auto 
!
interface ATM0.1 point-to-point
 pvc 8/35 
  encapsulation aal5mux ppp dialer
  dialer pool-member 1
 !
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Dot11Radio0
 no ip address
 !
 encryption mode ciphers tkip 
 !
 ssid Cisco 857W
 !
 speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
 station-role root
 no cdp enable
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Vlan1
 no ip address
 bridge-group 1
 bridge-group 1 spanning-disabled
!
interface Dialer0
 ip address negotiated
 ip access-group 101 in
 no ip redirects
 no ip unreachables
 ip inspect firewall out
 ip nat outside
 ip virtual-reassembly
 encapsulation ppp
 ip route-cache flow
 dialer pool 1
 dialer-group 1
 no cdp enable
 ppp authentication chap pap callin
 ppp chap hostname *********
 ppp chap password 7 **********
 ppp pap sent-username *********** password 7 **********
!
interface BVI1
 ip address 192.168.1.254 255.255.255.0
 ip access-group 102 in
 ip nat inside
 ip virtual-reassembly
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http authentication local
no ip http secure-server
ip nat inside source list 1 interface Dialer0 overload
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 remark SDM_ACL Category=17
access-list 101 permit udp host 208.67.220.220 eq domain any
access-list 101 permit udp host 208.67.222.222 eq domain any
access-list 101 permit udp host 212.216.112.112 eq domain any
access-list 101 permit udp host 151.99.125.2 eq domain any
access-list 101 deny   ip 0.0.0.0 0.255.255.255 any
access-list 101 deny   ip 10.0.0.0 0.255.255.255 any
access-list 101 deny   ip 127.0.0.0 0.255.255.255 any
access-list 101 deny   ip 169.254.0.0 0.0.255.255 any
access-list 101 deny   ip 172.16.0.0 0.15.255.255 any
access-list 101 deny   ip 192.0.2.0 0.0.0.255 any
access-list 101 deny   ip 192.168.0.0 0.0.255.255 any
access-list 101 deny   ip 198.18.0.0 0.1.255.255 any
access-list 101 deny   ip 224.0.0.0 0.15.255.255 any
access-list 101 deny   ip any host 255.255.255.255
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 deny   icmp any any echo
access-list 101 deny   ip any any log
access-list 102 remark Traffic allowed to enter the router from the Ethernet
access-list 102 permit ip any host 192.168.1.254
access-list 102 deny   ip any host 192.168.1.255
access-list 102 deny   udp any any eq tftp log
access-list 102 deny   ip any 0.0.0.0 0.255.255.255 log
access-list 102 deny   ip any 10.0.0.0 0.255.255.255 log
access-list 102 deny   ip any 127.0.0.0 0.255.255.255 log
access-list 102 deny   ip any 169.254.0.0 0.0.255.255 log
access-list 102 deny   ip any 172.16.0.0 0.15.255.255 log
access-list 102 deny   ip any 192.0.2.0 0.0.0.255 log
access-list 102 deny   ip any 192.168.0.0 0.0.255.255 log
access-list 102 deny   ip any 198.18.0.0 0.1.255.255 log
access-list 102 deny   udp any any eq 135 log
access-list 102 deny   tcp any any eq 135 log
access-list 102 deny   udp any any eq netbios-ns log
access-list 102 deny   udp any any eq netbios-dgm log
access-list 102 deny   tcp any any eq 445 log
access-list 102 permit ip 192.168.1.0 0.0.0.255 any
access-list 102 permit ip any host 255.255.255.255
access-list 102 deny   ip any any log
dialer-list 1 protocol ip permit
!
control-plane
!
bridge 1 route ip
banner login ^CCC
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device. 
This feature requires the one-time use of the username "cisco" 
with the password "cisco". The default username and password have a privilege level of 15.

Please change these publicly known initial credentials using SDM or the IOS CLI. 
Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco

Replace <myuser> and <mypassword> with the username and password you want to use. 

For more information about SDM please follow the instructions in the QUICK START 
GUIDE for your router or go to http://www.cisco.com/go/sdm 
-----------------------------------------------------------------------
^C
!
line con 0
 no modem enable
line aux 0
line vty 0 4
 access-class 2 in
 login
!
scheduler max-task-time 5000
end

Inviato: ven 09 mag , 2008 2:16 pm
da Helix
fai una prova in PPPoE

interface ATM0/0
no ip address
dsl operating-mode auto
pvc 8/35
pppoe enable
pppoe-client dial-pool-number 1
!

!
interface Dialer0
ip address negotiated
ip mtu 1492
encapsulation ppp
dialer pool 1


aggiungendo anche l'autenticazione come hai anche per il PPPoA

Inviato: ven 09 mag , 2008 3:15 pm
da nullmind
Helix ha scritto:fai una prova in PPPoE

interface ATM0/0
no ip address
dsl operating-mode auto
pvc 8/35
pppoe enable
pppoe-client dial-pool-number 1
!

!
interface Dialer0
ip address negotiated
ip mtu 1492
encapsulation ppp
dialer pool 1


aggiungendo anche l'autenticazione come hai anche per il PPPoA
niente da fare, purtroppo neanche cosi' non passa il test di connessione ( si blocca al ping ) ;(

Inviato: ven 09 mag , 2008 3:38 pm
da Helix
Ma hai richiesto la linea da poco?

Inviato: ven 09 mag , 2008 3:58 pm
da nullmind
Helix ha scritto:Ma hai richiesto la linea da poco?
no, l'adsl alice è da mooolto tempo che ce l'ho.
Non credo sia un problema di linea in quanto con il mio vecchio modem netgear dm602 navigo senza problemi.
E' strano perche' il CISCO prende l'ip correttamente dall'adsl 82.**.**.**.** ma è come se non riuscisse a dialogare con l'esterno

Inviato: ven 09 mag , 2008 5:08 pm
da proton
Credo manchino le inspect in ingresso sull'interfaccia interna, le acl ti stanno isolando, prova con un
no access-list 102 deny ip any any log
se in questo modo naviga dovresti settarle e togli i log dalle acl ke ti mangiano cpu :)

Inviato: ven 09 mag , 2008 7:02 pm
da nullmind
proton ha scritto:Credo manchino le inspect in ingresso sull'interfaccia interna, le acl ti stanno isolando, prova con un
no access-list 102 deny ip any any log
se in questo modo naviga dovresti settarle e togli i log dalle acl ke ti mangiano cpu :)
Grazie anche a te proton per essere intervenuto :)

Intanto ho "rifatto" la configurazione e disattivato il firewall per ora. Adesso riesco a fare ping IP dalla console, ma come prima non riesco a fare ping IP da windows o a navigare su internet ;(

Il test della connessione ora risulta ok, ma come ho scritto sopra non riesco a navigare ugualmente...

Codice: Seleziona tutto

!
! Last configuration change at 19:49:30 PCTime Fri May 9 2008 by cisco
! NVRAM config last updated at 19:49:32 PCTime Fri May 9 2008 by cisco
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname CISCO
!
boot-start-marker
boot-end-marker
!
logging buffered 51200
logging console critical
enable secret 5 $1$qxzZ$573quzvFLU16dBLsLhipi0
!
no aaa new-model
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
!
crypto pki trustpoint TP-self-signed-2902278428
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-2902278428
 revocation-check none
 rsakeypair TP-self-signed-2902278428
!
!
crypto pki certificate chain TP-self-signed-2902278428
 certificate self-signed 01 nvram:IOS-Self-Sig#11.cer
!
dot11 ssid cisco
   authentication open 
!
no ip source-route
no ip dhcp use vrf connected
ip dhcp excluded-address 10.10.10.1
!
ip dhcp pool sdm-pool1
   import all
   network 10.10.10.0 255.255.255.0
   dns-server 208.67.222.222 208.67.220.220 
   default-router 10.10.10.1 
!
!
ip cef
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
no ip bootp server
ip domain name LOCAL
ip name-server 208.67.222.222
ip name-server 208.67.220.220
!
!
!
username ++++ privilege 15 secret 5 ++++++
! 
!
archive
 log config
  hidekeys
!
!
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
!
bridge irb
!
!
interface ATM0
 no ip address
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip route-cache flow
 no atm ilmi-keepalive
 dsl operating-mode auto 
!
interface ATM0.1 point-to-point
 description $FW_OUTSIDE$$ES_WAN$
 pvc 8/35 
  pppoe-client dial-pool-number 1
 !
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Dot11Radio0
 no ip address
 !
 ssid cisco
 !
 speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
 station-role root
 bridge-group 1
 bridge-group 1 subscriber-loop-control
 bridge-group 1 spanning-disabled
 bridge-group 1 block-unknown-source
 no bridge-group 1 source-learning
 no bridge-group 1 unicast-flooding
!
interface Vlan1
 description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$FW_INSIDE$
 no ip address
 ip tcp adjust-mss 1452
 bridge-group 1
!
interface Dialer0
 ip address negotiated
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip mtu 1452
 encapsulation ppp
 ip route-cache flow
 dialer pool 1
 dialer-group 1
 no cdp enable
 ppp authentication chap pap callin
 ppp chap hostname +++
 ppp chap password ++++
 ppp pap sent-username ++++ password +++
!
interface BVI1
 description $ES_LAN$
 ip address 10.10.10.1 255.255.255.0
 ip tcp adjust-mss 1412
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
logging trap debugging
dialer-list 1 protocol ip permit
no cdp run
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
banner login ^CAuthorized access only!
 Disconnect IMMEDIATELY if you are not an authorized user!^C
!
 line con 0
 login local
 no modem enable
 transport output telnet
line aux 0
 login local
 transport output telnet
line vty 0 4
 privilege level 15
 login local
 transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end

CISCO#

Inviato: ven 09 mag , 2008 7:29 pm
da Helix
Riesci a pingare un IP e non un DOMINIO?

Inviato: ven 09 mag , 2008 7:38 pm
da nullmind
Helix ha scritto:Riesci a pingare un IP e non un DOMINIO?
esatto, il ping all'ip pero' posso farlo SOLO da console del router. Mentre dal sistema operativo no

Codice: Seleziona tutto

ping alice.it
Translating "alice.it"...domain server (208.67.222.222) [OK]

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 212.48.10.150, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
CISCO#
CISCO#ping 209.85.173.99

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 209.85.173.99, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 208/212/216 ms
CISCO#

Inviato: sab 10 mag , 2008 11:47 am
da nullmind
Non avevo settato il nat ed ho risolto in questo modo:

Codice: Seleziona tutto

access-list 1 permit 10.10.10.0 0.0.0.255
!
ip nat inside source list 1 interface Dialer0 overload
!
interface Dialer0
ip nat outside
!
interface BVI1
ip nat inside
Ora funziona tutto molto bene e la navigazione è molto più veloce del vecchio netgear :)

Non mi resta che settare il Wireless e un po' di security e dovrei aver finito ;P

Grazie a tutti[/code]