[RISOLTO] Cisco 1801 e Telecom Italia Business
Inviato: mer 17 mar , 2010 12:48 pm
Salve a tutti, sto cercando di configurare il router in questione ma senza successo, o almeno in parte...
è la prima volta che configuro un cisco e quindi sono neofita. ho letto un po' in giro sul forum e mi sono documentato, cercando di creare una configurazione iniziale per farlo funzionare, sono riuscito a far funzionare i pc ma mi navigavano uscendo dalla punto punto, mentre invece le mie necessità sono un po' differenti... avendo 16 ip pubblici avrei la necessità di configurare un NAT e alcuni PAT per alcuni singoli ip, nel modo seguente:
80.21.***.17 192.168.0.0 - 192.168.0.255
80.21.***.20 192.168.0.100
80.21.***.21 192.168.0.99
80.21.***.22 192.168.0.253
80.21.***.23 192.168.0.95
80.21.***.25 192.168.0.104
80.21.***.26 192.168.0.105
80.21.***.27 192.168.0.106
80.21.***.30 192.168.0.107
andando poi a definire sul firewall le porte aperte in entrata per i singoli ip pubblici...
ho creato una configurazione iniziale ma non riesco a navigare, al momento non ho creato alcuna regola di PAT, visto che non so nemmeno come si configurano, intanto mi accontenterei del utilizzare il NAT sul primo ip pubblico in uscita e non uscire più con la punto punto... di seguito trovate la conf che ho creato.
di seguito posto pure uno stato delle porte:
Grazie per l'eventuale aiuto 
è la prima volta che configuro un cisco e quindi sono neofita. ho letto un po' in giro sul forum e mi sono documentato, cercando di creare una configurazione iniziale per farlo funzionare, sono riuscito a far funzionare i pc ma mi navigavano uscendo dalla punto punto, mentre invece le mie necessità sono un po' differenti... avendo 16 ip pubblici avrei la necessità di configurare un NAT e alcuni PAT per alcuni singoli ip, nel modo seguente:
80.21.***.17 192.168.0.0 - 192.168.0.255
80.21.***.20 192.168.0.100
80.21.***.21 192.168.0.99
80.21.***.22 192.168.0.253
80.21.***.23 192.168.0.95
80.21.***.25 192.168.0.104
80.21.***.26 192.168.0.105
80.21.***.27 192.168.0.106
80.21.***.30 192.168.0.107
andando poi a definire sul firewall le porte aperte in entrata per i singoli ip pubblici...
ho creato una configurazione iniziale ma non riesco a navigare, al momento non ho creato alcuna regola di PAT, visto che non so nemmeno come si configurano, intanto mi accontenterei del utilizzare il NAT sul primo ip pubblico in uscita e non uscire più con la punto punto... di seguito trovate la conf che ho creato.
Codice: Seleziona tutto
version 12.4
service config
service nagle
no service pad
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname HTGROUP
!
boot-start-marker
boot-end-marker
!
logging exception 100000
logging count
logging userinfo
logging queue-limit 10000
logging buffered 150000 notifications
logging console critical
enable secret 5 *****
!
no aaa new-model
clock timezone MET 1
clock summer-time MEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
!
crypto pki trustpoint TP-self-signed-3672678414
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3672678414
revocation-check none
rsakeypair TP-self-signed-3672678414
!
!
crypto pki certificate chain TP-self-signed-3672678414
certificate self-signed 01
30820249 308201B2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33363732 36373834 3134301E 170D3130 30333137 31313032
32355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 36373236
37383431 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
81009F8F 6D01659B 953ACAF4 AADDFBB7 B2090498 0E618944 4175E6F6 C6AE4772
1043FDB4 98DFDC57 E8FD3484 5467FF92 3007D3B2 B869D0DD 411CA798 6BD96F9F
175A12B6 3C7774D4 0EB29896 ADD4A3C7 BD8F513F E24AB0EA 216BF69E E1110419
07AB03E9 E5411090 A41A9B5E 5F9686EA 18F92F80 67D571DE 4CB29038 F1ECB81A
6E930203 010001A3 71306F30 0F060355 1D130101 FF040530 030101FF 301C0603
551D1104 15301382 11485447 524F5550 2E636973 636F2E63 6F6D301F 0603551D
23041830 16801485 8C726A6C 51C9A032 78402C0A 8C31EC11 BA78B030 1D060355
1D0E0416 0414858C 726A6C51 C9A03278 402C0A8C 31EC11BA 78B0300D 06092A86
4886F70D 01010405 00038181 0023C246 69D71F33 D8FBE96E 17EC7EF8 A9317CFD
A4D9D77E 2AC57EEC E80C12F0 98958711 6B07488A B1CF46D2 3358A284 C2A8110B
12EB89EF E1B44242 C0BD2E19 16936DF7 7EAF5E9F A435A66B B21FF956 DE328E1F
02052151 47B63CAE 1D40D2F6 8CF373C8 7D17199D 5CF7C30D C9DB0B54 0FD597BE
B062D2E5 136A9906 98AAA6F2 FE
quit
dot11 syslog
no ip source-route
no ip gratuitous-arps
ip icmp rate-limit unreachable 1000
!
!
ip cef
!
no ip bootp server
ip domain name cisco.com
ip name-server 151.99.125.1
ip name-server 208.67.222.222
ip inspect log drop-pkt
ip inspect max-incomplete low 300
ip inspect max-incomplete high 400
ip inspect one-minute low 300
ip inspect hashtable-size 2048
ip inspect tcp synwait-time 20
ip inspect tcp max-incomplete host 300 block-time 60
ip inspect name IDS tcp
ip inspect name IDS udp
ip inspect name IDS ftp
login block-for 1 attempts 3 within 30
login on-failure
login on-success
!
multilink bundle-name authenticated
!
!
username ##### privilege 15 secret 5 *****
!
!
archive
log config
hidekeys
!
!
ip tcp selective-ack
ip tcp window-size 2144
ip tcp synwait-time 10
!
!
!
interface Loopback0
description INTERFACCIA VIRTUALE END-POINT VPN
ip address 80.21.***.17 255.255.255.240
!
interface Null0
no ip unreachables
!
interface FastEthernet0
no ip address
duplex auto
speed auto
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
!
interface ATM0
description ALICE BUSINESS 20 Mbps - TGU:
mtu 1500
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
description INTERFACCIA PER ACCESSO AD INTERNET
mtu 1500
ip address 88.48.***.178 255.255.255.252
ip access-group 131 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting access-violations
ip nat outside
ip inspect IDS out
ip virtual-reassembly
no ip mroute-cache
pvc 8/35
encapsulation aal5snap
!
!
interface Vlan1
description CONNESSIONE LAN HT
ip address 192.168.0.254 255.255.255.0
ip accounting output-packets
ip nat inside
ip virtual-reassembly
ip route-cache flow
no ip mroute-cache
hold-queue 100 out
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 ATM0.1
!
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat pool INTERNET 80.21.***.17 80.21.***.30 netmask 255.255.255.240
ip nat pool LAN 192.168.0.0 192.168.0.255 netmask 255.255.255.0
ip nat inside source list 100 pool INTERNET overload
!
!
access-list 100 remark *************************************************************
access-list 100 remark *** ACL PER PAT E NAT0 ***
access-list 100 permit ip 192.168.0.0 0.0.0.255 any
access-list 131 remark *************************************************************
access-list 131 remark *** ACL ANTI-SPOOFING ***
access-list 131 deny ip host 0.0.0.0 any log
access-list 131 deny ip 127.0.0.0 0.255.255.255 any log
access-list 131 deny ip 192.0.2.0 0.0.0.255 any log
access-list 131 deny ip 224.0.0.0 31.255.255.255 any log
access-list 131 deny ip 10.0.0.0 0.255.255.255 any log
access-list 131 deny ip 172.16.0.0 0.15.255.255 any log
access-list 131 deny ip 192.168.0.0 0.0.255.255 any log
access-list 131 remark *************************************************************
access-list 131 remark *** ACL PER CONTROLLARE TRAFFICO ICMP ***
access-list 131 permit icmp any any echo
access-list 131 permit icmp any any echo-reply
access-list 131 permit icmp any any time-exceeded
access-list 131 permit icmp any any unreachable
access-list 131 permit icmp any any administratively-prohibited
access-list 131 permit icmp any any packet-too-big
access-list 131 permit icmp any any traceroute
access-list 131 deny icmp any any
access-list 131 remark *************************************************************
access-list 131 remark *** ACL VERSO SERVER WEB
access-list 131 permit tcp any any eq www
access-list 131 remark *** ACL PER BLOCCARE L'ACCESSO A VIRUS E ATTACCHI ***
access-list 131 deny tcp any any eq 135
access-list 131 deny udp any any eq 135
access-list 131 deny udp any any eq netbios-ns
access-list 131 deny udp any any eq netbios-dgm
access-list 131 deny tcp any any eq 139
access-list 131 deny udp any any eq netbios-ss
access-list 131 deny tcp any any eq 445
access-list 131 deny tcp any any eq 593
access-list 131 deny tcp any any eq 2049
access-list 131 deny udp any any eq 2049
access-list 131 deny tcp any any eq 2000
access-list 131 deny tcp any any range 6000 6010
access-list 131 deny udp any any eq 1433
access-list 131 deny udp any any eq 1434
access-list 131 deny udp any any eq 5554
access-list 131 deny udp any any eq 9996
access-list 131 deny udp any any eq 113
access-list 131 deny udp any any eq 3067
access-list 131 remark *************************************************************
access-list 131 remark *** ACL PER BLOCCARE ACCESSI NON AUTORIZZATI ***
access-list 131 deny ip any any log
!
!
!
!
!
!
control-plane
!
banner motd ^CC
****************************************************************
----------------------------------------------------------------
* *** ROUTER PERIMETRALE ---- *** *
----------------------------------------------------------------
* WARNING: System is RESTRICTED to authorized personnel ONLY! *
* Unauthorized use of this system will be logged and *
* prosecuted to the fullest extent of the law. *
* *
* If you are NOT authorized to use this system, LOG OFF NOW! *
* *
****************************************************************
^C
!
line con 0
exec-timeout 120 0
login local
transport output ssh
stopbits 1
line aux 0
login local
transport output ssh
stopbits 1
line vty 0 4
exec-timeout 0 0
login local
transport input telnet ssh
transport output telnet ssh
!
scheduler max-task-time 5000
scheduler interval 500
sntp server 193.204.114.232
sntp server 193.204.114.233
sntp server 193.204.114.105
end
Codice: Seleziona tutto
Interface IP-Address OK? Method Status Protocol
FastEthernet0 unassigned YES manual up down
BRI0 unassigned YES unset administratively down down
BRI0:1 unassigned YES unset administratively down down
BRI0:2 unassigned YES unset administratively down down
FastEthernet1 unassigned YES unset up up
FastEthernet2 unassigned YES unset up down
FastEthernet3 unassigned YES unset up down
FastEthernet4 unassigned YES unset up down
FastEthernet5 unassigned YES unset up down
FastEthernet6 unassigned YES unset up down
FastEthernet7 unassigned YES unset up down
FastEthernet8 unassigned YES unset up down
ATM0 unassigned YES manual up up
ATM0.1 88.48.***.178 YES manual up up
Vlan1 192.168.0.254 YES manual up up
Loopback0 80.21.***.17 YES manual up up
NVI0 unassigned NO unset up up
