Alice7M e dialup PPPoE
Inviato: mer 04 mag , 2011 10:16 am
Salve,
vorrei chiedere un aiuto per quanto riguarda la configurazione di un 837 ed Alice 7M Flat
Sono riuscito a fare una configurazione funzionante tranne per il fatto che ero abituato con il router di Alice, a poter effettuare altre connessioni PPPoE tramite i miei computer della rete interna per poter avere differenti IP pubblici su ognuno di esso o piu semplicemente per cambiare ip pubblico all'occorrenza.
Cosa dovrei cambiare per poter fare la stessa cosa? Io ho messo
pppoe enable group global
pppoe-client dial-pool-number 1
sulla ethernet0 ma evidentemente non è sufficente...
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname c837
!
boot-start-marker
boot-end-marker
!
enable secret 5 **********
!
no aaa new-model
clock timezone met 1
clock summer-time MET+1 recurring last Sun Mar 2:00 last Sun Oct 3:00
no ip source-route
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.99
!
ip dhcp pool dhcppool
import all
network 192.168.1.0 255.255.255.0
dns-server 151.99.125.2 208.67.222.222
default-router 192.168.1.1
update arp
!
!
ip cef
no ip domain lookup
ip domain name telecomitalia.it
ip name-server 151.99.125.2
ip name-server 208.67.222.222
no ip bootp server
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall netshow
ip inspect name firewall rtsp
ip inspect name firewall skinny
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
!
crypto pki trustpoint TP-self-signed-2298798652
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2298798652
revocation-check none
rsakeypair TP-self-signed-2298798652
!
!
crypto pki certificate chain TP-self-signed-2298798652
certificate self-signed 01
3082024A 308201B3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32323938 37393836 3532301E 170D3131 30343233 31383335
34335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32393837
39383635 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
81009485 77915C69 CA8FFA23 E652FBF3 454BDE99 DC0E7E8C 5053114E 70B01F72
01AE7329 7123C4D5 C71DC425 67AA9B37 B4E55C66 012BAF90 20D4AAB4 9A80472A
7CAE03A0 41588B52 08F4E106 13D45FF5 D0EE3C43 D054C26F CB8648D5 096DBB67
160149A8 D4E7497B A72AAC03 40248C48 6B055F0E DE21AECF 0F14BC9A 94631B15
137F0203 010001A3 72307030 0F060355 1D130101 FF040530 030101FF 301D0603
551D1104 16301482 12633833 372E7069 65726F61 6E647265 696E6930 1F060355
1D230418 30168014 7A3EF7B6 9E3BAFA3 71E034CF CFDEFA0A 6A368604 301D0603
551D0E04 1604147A 3EF7B69E 3BAFA371 E034CFCF DEFA0A6A 36860430 0D06092A
864886F7 0D010104 05000381 81005860 86464257 52B72CB0 7E3D95A7 B61E4956
1537BBE9 36148963 1DC947FC 69AD90EF 7DDC4B51 7AB6FD0A AA801272 8A16DC0C
A0185237 9633E01D 74AEC9E7 5BB2B82C 2EE61B09 A0CF9148 4E10E9EB E9DFE0DC
0B4678D1 5AFACEED DD004A85 A8226911 E25D373E 125581D8 148DF63B 91FDAC99
B020AEB5 5D88BF13 1C69853A 1E6B
quit
username ************ privilege 15 secret 5 ***************
!
!
!
!
!
!
interface Ethernet0
ip address 192.168.1.1 255.255.255.0
ip access-group 103 in
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1452
pppoe enable group global
pppoe-client dial-pool-number 1
hold-queue 100 out
!
interface Ethernet2
no ip address
shutdown
hold-queue 100 out
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
pvc 8/35
pppoe-client dial-pool-number 1
!
!
interface FastEthernet1
duplex auto
speed auto
!
interface FastEthernet2
duplex auto
speed auto
!
interface FastEthernet3
duplex auto
speed auto
!
interface FastEthernet4
duplex auto
speed auto
!
interface Dialer0
description Interfaccia Dialer0/0 - Alice ADSL
bandwidth 8096
ip address negotiated
ip access-group 101 in
no ip redirects
no ip unreachables
ip mtu 1492
ip nat outside
ip inspect firewall out
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp pap sent-username aliceadsl password 7 00051F0F075E0A021C2D
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
!
ip nat translation timeout 420
ip nat translation tcp-timeout 120
ip nat translation udp-timeout 120
ip nat translation syn-timeout 120
ip nat translation dns-timeout 300
ip nat translation icmp-timeout 120
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 192.168.1.3 81 interface Dialer0 81
ip nat inside source static tcp 192.168.1.3 9000 interface Dialer0 9000
ip nat inside source static tcp 192.168.1.3 18600 interface Dialer0 18600
ip nat inside source static tcp 192.168.1.5 42000 interface Dialer0 42000
ip nat inside source static udp 192.168.1.5 42000 interface Dialer0 42000
ip nat inside source static tcp 192.168.1.6 80 interface Dialer0 80
ip nat inside source static tcp 192.168.1.14 80 interface Dialer0 84
ip nat inside source static udp 192.168.1.14 5060 interface Dialer0 5060
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
access-list 2 permit any log
access-list 101 remark *************************************************************
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 remark *** DNS and NTP ***
access-list 101 permit udp host 151.99.125.2 eq domain any
access-list 101 permit udp host 208.67.222.222 eq domain any
access-list 101 permit udp host 62.77.57.196 eq ntp any
access-list 101 permit udp host 62.77.57.197 eq ntp any
access-list 101 permit udp host 207.46.197.32 eq ntp any
access-list 101 permit udp host 192.43.244.18 eq ntp any
access-list 101 remark *************************************************************
access-list 101 remark *** Standard Services ***
access-list 101 permit tcp any any eq www
access-list 101 permit tcp any any eq ftp
access-list 101 permit tcp any any eq 22
access-list 101 permit tcp any any eq telnet
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 permit udp any eq isakmp any eq isakmp
access-list 101 remark *** Dreambox ***
access-list 101 permit tcp any any eq 81
access-list 101 remark *** Voip Adapter ***
access-list 101 permit tcp any any eq 84
access-list 101 permit udp any any eq 5060
access-list 101 permit udp host 87.238.30.10 any
access-list 101 remark *** Surveillance ***
access-list 101 permit tcp any any eq 9000
access-list 101 permit tcp any any eq 18600
access-list 101 remark *** Vuze ***
access-list 101 permit tcp any any eq 42000
access-list 101 permit udp any any eq 42000
access-list 101 remark *************************************************************
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 deny icmp any any echo
access-list 101 deny ip any any log
access-list 103 remark Traffic allowed to enter the router from the Ethernet
access-list 103 permit ip any host 192.168.1.1
access-list 103 deny ip any host 192.168.1.255
access-list 103 deny udp any any eq tftp log
access-list 103 deny ip any 0.0.0.0 0.255.255.255 log
access-list 103 deny ip any 10.0.0.0 0.255.255.255 log
access-list 103 deny ip any 127.0.0.0 0.255.255.255 log
access-list 103 deny ip any 169.254.0.0 0.0.255.255 log
access-list 103 deny ip any 172.16.0.0 0.15.255.255 log
access-list 103 deny ip any 192.0.2.0 0.0.0.255 log
access-list 103 deny ip any 192.168.0.0 0.0.255.255 log
access-list 103 deny ip any 198.18.0.0 0.1.255.255 log
access-list 103 deny udp any any eq 135 log
access-list 103 deny tcp any any eq 135 log
access-list 103 deny udp any any eq netbios-ns log
access-list 103 deny udp any any eq netbios-dgm log
access-list 103 deny tcp any any eq 445 log
access-list 103 permit ip 192.168.1.0 0.0.0.255 any
access-list 103 permit ip any host 255.255.255.255
access-list 103 deny ip any any log
dialer-list 1 protocol ip permit
!
!
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
access-class 2 in
login local
transport input telnet ssh
transport output none
!
scheduler max-task-time 5000
ntp master
ntp server 62.77.57.197
ntp server 62.77.57.196
sntp server 207.46.197.32
sntp server 192.43.244.18
end
vorrei chiedere un aiuto per quanto riguarda la configurazione di un 837 ed Alice 7M Flat
Sono riuscito a fare una configurazione funzionante tranne per il fatto che ero abituato con il router di Alice, a poter effettuare altre connessioni PPPoE tramite i miei computer della rete interna per poter avere differenti IP pubblici su ognuno di esso o piu semplicemente per cambiare ip pubblico all'occorrenza.
Cosa dovrei cambiare per poter fare la stessa cosa? Io ho messo
pppoe enable group global
pppoe-client dial-pool-number 1
sulla ethernet0 ma evidentemente non è sufficente...
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname c837
!
boot-start-marker
boot-end-marker
!
enable secret 5 **********
!
no aaa new-model
clock timezone met 1
clock summer-time MET+1 recurring last Sun Mar 2:00 last Sun Oct 3:00
no ip source-route
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.99
!
ip dhcp pool dhcppool
import all
network 192.168.1.0 255.255.255.0
dns-server 151.99.125.2 208.67.222.222
default-router 192.168.1.1
update arp
!
!
ip cef
no ip domain lookup
ip domain name telecomitalia.it
ip name-server 151.99.125.2
ip name-server 208.67.222.222
no ip bootp server
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall cuseeme
ip inspect name firewall h323
ip inspect name firewall rcmd
ip inspect name firewall realaudio
ip inspect name firewall streamworks
ip inspect name firewall vdolive
ip inspect name firewall sqlnet
ip inspect name firewall tftp
ip inspect name firewall ftp
ip inspect name firewall icmp
ip inspect name firewall sip
ip inspect name firewall esmtp
ip inspect name firewall fragment maximum 256 timeout 1
ip inspect name firewall netshow
ip inspect name firewall rtsp
ip inspect name firewall skinny
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
!
crypto pki trustpoint TP-self-signed-2298798652
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2298798652
revocation-check none
rsakeypair TP-self-signed-2298798652
!
!
crypto pki certificate chain TP-self-signed-2298798652
certificate self-signed 01
3082024A 308201B3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32323938 37393836 3532301E 170D3131 30343233 31383335
34335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32393837
39383635 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
81009485 77915C69 CA8FFA23 E652FBF3 454BDE99 DC0E7E8C 5053114E 70B01F72
01AE7329 7123C4D5 C71DC425 67AA9B37 B4E55C66 012BAF90 20D4AAB4 9A80472A
7CAE03A0 41588B52 08F4E106 13D45FF5 D0EE3C43 D054C26F CB8648D5 096DBB67
160149A8 D4E7497B A72AAC03 40248C48 6B055F0E DE21AECF 0F14BC9A 94631B15
137F0203 010001A3 72307030 0F060355 1D130101 FF040530 030101FF 301D0603
551D1104 16301482 12633833 372E7069 65726F61 6E647265 696E6930 1F060355
1D230418 30168014 7A3EF7B6 9E3BAFA3 71E034CF CFDEFA0A 6A368604 301D0603
551D0E04 1604147A 3EF7B69E 3BAFA371 E034CFCF DEFA0A6A 36860430 0D06092A
864886F7 0D010104 05000381 81005860 86464257 52B72CB0 7E3D95A7 B61E4956
1537BBE9 36148963 1DC947FC 69AD90EF 7DDC4B51 7AB6FD0A AA801272 8A16DC0C
A0185237 9633E01D 74AEC9E7 5BB2B82C 2EE61B09 A0CF9148 4E10E9EB E9DFE0DC
0B4678D1 5AFACEED DD004A85 A8226911 E25D373E 125581D8 148DF63B 91FDAC99
B020AEB5 5D88BF13 1C69853A 1E6B
quit
username ************ privilege 15 secret 5 ***************
!
!
!
!
!
!
interface Ethernet0
ip address 192.168.1.1 255.255.255.0
ip access-group 103 in
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1452
pppoe enable group global
pppoe-client dial-pool-number 1
hold-queue 100 out
!
interface Ethernet2
no ip address
shutdown
hold-queue 100 out
!
interface ATM0
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
pvc 8/35
pppoe-client dial-pool-number 1
!
!
interface FastEthernet1
duplex auto
speed auto
!
interface FastEthernet2
duplex auto
speed auto
!
interface FastEthernet3
duplex auto
speed auto
!
interface FastEthernet4
duplex auto
speed auto
!
interface Dialer0
description Interfaccia Dialer0/0 - Alice ADSL
bandwidth 8096
ip address negotiated
ip access-group 101 in
no ip redirects
no ip unreachables
ip mtu 1492
ip nat outside
ip inspect firewall out
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp pap sent-username aliceadsl password 7 00051F0F075E0A021C2D
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
ip http server
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
!
ip nat translation timeout 420
ip nat translation tcp-timeout 120
ip nat translation udp-timeout 120
ip nat translation syn-timeout 120
ip nat translation dns-timeout 300
ip nat translation icmp-timeout 120
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 192.168.1.3 81 interface Dialer0 81
ip nat inside source static tcp 192.168.1.3 9000 interface Dialer0 9000
ip nat inside source static tcp 192.168.1.3 18600 interface Dialer0 18600
ip nat inside source static tcp 192.168.1.5 42000 interface Dialer0 42000
ip nat inside source static udp 192.168.1.5 42000 interface Dialer0 42000
ip nat inside source static tcp 192.168.1.6 80 interface Dialer0 80
ip nat inside source static tcp 192.168.1.14 80 interface Dialer0 84
ip nat inside source static udp 192.168.1.14 5060 interface Dialer0 5060
!
access-list 1 remark The local LAN.
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 2 remark Where management can be done from.
access-list 2 permit 192.168.1.0 0.0.0.255
access-list 2 permit any log
access-list 101 remark *************************************************************
access-list 101 remark Traffic allowed to enter the router from the Internet
access-list 101 remark *** DNS and NTP ***
access-list 101 permit udp host 151.99.125.2 eq domain any
access-list 101 permit udp host 208.67.222.222 eq domain any
access-list 101 permit udp host 62.77.57.196 eq ntp any
access-list 101 permit udp host 62.77.57.197 eq ntp any
access-list 101 permit udp host 207.46.197.32 eq ntp any
access-list 101 permit udp host 192.43.244.18 eq ntp any
access-list 101 remark *************************************************************
access-list 101 remark *** Standard Services ***
access-list 101 permit tcp any any eq www
access-list 101 permit tcp any any eq ftp
access-list 101 permit tcp any any eq 22
access-list 101 permit tcp any any eq telnet
access-list 101 permit tcp any any eq 1723
access-list 101 permit gre any any
access-list 101 permit udp any eq isakmp any eq isakmp
access-list 101 remark *** Dreambox ***
access-list 101 permit tcp any any eq 81
access-list 101 remark *** Voip Adapter ***
access-list 101 permit tcp any any eq 84
access-list 101 permit udp any any eq 5060
access-list 101 permit udp host 87.238.30.10 any
access-list 101 remark *** Surveillance ***
access-list 101 permit tcp any any eq 9000
access-list 101 permit tcp any any eq 18600
access-list 101 remark *** Vuze ***
access-list 101 permit tcp any any eq 42000
access-list 101 permit udp any any eq 42000
access-list 101 remark *************************************************************
access-list 101 deny ip 0.0.0.0 0.255.255.255 any
access-list 101 deny ip 10.0.0.0 0.255.255.255 any
access-list 101 deny ip 127.0.0.0 0.255.255.255 any
access-list 101 deny ip 169.254.0.0 0.0.255.255 any
access-list 101 deny ip 172.16.0.0 0.15.255.255 any
access-list 101 deny ip 192.0.2.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip 198.18.0.0 0.1.255.255 any
access-list 101 deny ip 224.0.0.0 0.15.255.255 any
access-list 101 deny ip any host 255.255.255.255
access-list 101 deny icmp any any echo
access-list 101 deny ip any any log
access-list 103 remark Traffic allowed to enter the router from the Ethernet
access-list 103 permit ip any host 192.168.1.1
access-list 103 deny ip any host 192.168.1.255
access-list 103 deny udp any any eq tftp log
access-list 103 deny ip any 0.0.0.0 0.255.255.255 log
access-list 103 deny ip any 10.0.0.0 0.255.255.255 log
access-list 103 deny ip any 127.0.0.0 0.255.255.255 log
access-list 103 deny ip any 169.254.0.0 0.0.255.255 log
access-list 103 deny ip any 172.16.0.0 0.15.255.255 log
access-list 103 deny ip any 192.0.2.0 0.0.0.255 log
access-list 103 deny ip any 192.168.0.0 0.0.255.255 log
access-list 103 deny ip any 198.18.0.0 0.1.255.255 log
access-list 103 deny udp any any eq 135 log
access-list 103 deny tcp any any eq 135 log
access-list 103 deny udp any any eq netbios-ns log
access-list 103 deny udp any any eq netbios-dgm log
access-list 103 deny tcp any any eq 445 log
access-list 103 permit ip 192.168.1.0 0.0.0.255 any
access-list 103 permit ip any host 255.255.255.255
access-list 103 deny ip any any log
dialer-list 1 protocol ip permit
!
!
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
access-class 2 in
login local
transport input telnet ssh
transport output none
!
scheduler max-task-time 5000
ntp master
ntp server 62.77.57.197
ntp server 62.77.57.196
sntp server 207.46.197.32
sntp server 192.43.244.18
end