cisco 3825 problema abilitazione porte

Tutto ciò che ha a che fare con la configurazione di apparati Cisco (e non rientra nelle altre categorie)

Moderatore: Federico.Lagni

Rispondi
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

salve a tutti ho un problema dovrei aprire la porta 10000 su un cisco 3825 per abilitare alcuni servizi questa è la conf. :

CC
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device.
This feature requires the one-time use of the username "cisco"
with the password "cisco". The default username and password have a privilege le
vel of 15.

Please change these publicly known initial credentials using SDM or the IOS CLI.

Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want to use
.

For more information about SDM please follow the instructions in the QUICK START

GUIDE for your router or go to http://www.cisco.com/go/sdm
-----------------------------------------------------------------------


User Access Verification

Username: cisco$
Password:

yourname#sh conf
Using 15359 out of 491512 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname yourname
!
boot-start-marker
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 warnings
enable secret 5 $1$GDxO$236DjfNT1oJ..kXBsE4Do/
enable password 7 070C285F4D065D
!
aaa new-model
!
!
aaa authentication login local_authen local
aaa authorization exec local_author local
!
!
aaa session-id common
clock timezone PCTime 1
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
dot11 syslog
!
dot11 ssid prova_wifi
authentication open
authentication key-management wpa
guest-mode
wpa-psk ascii 7 030D551F031D2F4D5400160B161E0E
!
no ip source-route
ip cef
!
!
!
!
no ip bootp server
ip domain name yourdomain.com
ip name-server 151.99.125.1
ip name-server 151.99.0.100
ip ips notify SDEE
!
multilink bundle-name authenticated
!
parameter-map type protocol-info msn-servers
server name messenger.hotmail.com
server name gateway.messenger.hotmail.com
server name webmessenger.msn.com

parameter-map type protocol-info aol-servers
server name login.oscar.aol.com
server name toc.oscar.aol.com
server name oam-d09a.blue.aol.com

parameter-map type protocol-info yahoo-servers
server name scs.msg.yahoo.com
server name scsa.msg.yahoo.com
server name scsb.msg.yahoo.com
server name scsc.msg.yahoo.com
server name scsd.msg.yahoo.com
server name cs16.msg.dcn.yahoo.com
server name cs19.msg.dcn.yahoo.com
server name cs42.msg.dcn.yahoo.com
server name cs53.msg.dcn.yahoo.com
server name cs54.msg.dcn.yahoo.com
server name ads1.vip.scd.yahoo.com
server name radio1.launch.vip.dal.yahoo.com
server name in1.msg.vip.re2.yahoo.com
server name data1.my.vip.sc5.yahoo.com
server name address1.pim.vip.mud.yahoo.com
server name edit.messenger.yahoo.com
server name messenger.yahoo.com
server name http.pager.yahoo.com
server name privacy.yahoo.com
server name csa.yahoo.com
server name csb.yahoo.com
--More--
voice-card 0
no dspfarm
!
!
chat-script UMTS "" "ATDT*99*1#"
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-3712096020
subject-name cn=IOS-Self-Signed-Certificate-3712096020
revocation-check none
rsakeypair TP-self-signed-3712096020
!
crypto pki trustpoint TP-self-signed-2845945513
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2845945513
revocation-check none
rsakeypair TP-self-signed-2845945513
!
!
crypto pki certificate chain TP-self-signed-3712096020
crypto pki certificate chain TP-self-signed-2845945513
certificate self-signed 01 nvram:IOS-Self-Sig#1.cer
!
!
username cisco$ privilege 15 secret 5 $1$o0EQ$wYgi0eHBwFwcB55gY.h8d0
archive
log config
hidekeys
!
!
!
!
ip tcp synwait-time 10
!
class-map type inspect imap match-any sdm-app-imap
match invalid-command
class-map type inspect match-any sdm-cls-protocol-p2p
match protocol edonkey signature
match protocol gnutella signature
match protocol kazaa2 signature
match protocol fasttrack signature
match protocol bittorrent signature
class-map type inspect match-any sdm-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-insp-traffic
match class-map sdm-cls-insp-traffic
class-map type inspect gnutella match-any sdm-app-gnutella
match file-transfer
class-map type inspect msnmsgr match-any sdm-app-msn-otherservices
match service any
class-map type inspect ymsgr match-any sdm-app-yahoo-otherservices
match service any
class-map match-any ADULT-URL
match protocol http host "*.porno.*"
class-map type inspect match-all sdm-protocol-pop3
match protocol pop3
class-map type inspect match-any sdm-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any sdm-cls-protocol-im
match protocol ymsgr yahoo-servers
match protocol msnmsgr msn-servers
match protocol aol aol-servers
class-map type inspect aol match-any sdm-app-aol-otherservices
match service any
class-map type inspect pop3 match-any sdm-app-pop3
match invalid-command
class-map type inspect kazaa2 match-any sdm-app-kazaa2
match file-transfer
class-map type inspect match-all sdm-protocol-p2p
match class-map sdm-cls-protocol-p2p
class-map type inspect http match-any sdm-http-blockparam
match request port-misuse im
match request port-misuse p2p
match req-resp protocol-violation
class-map type inspect match-all sdm-protocol-im
match class-map sdm-cls-protocol-im
class-map type inspect match-all sdm-icmp-access
match class-map sdm-cls-icmp-access
class-map type inspect match-all sdm-invalid-src
match access-group 100
class-map type inspect ymsgr match-any sdm-app-yahoo
match service text-chat
class-map type inspect msnmsgr match-any sdm-app-msn
match service text-chat
class-map type inspect edonkey match-any sdm-app-edonkey
match file-transfer
match text-chat
match search-file-name
class-map type inspect http match-any sdm-app-httpmethods
match request method bcopy
match request method bdelete
match request method bmove
match request method bpropfind
match request method bproppatch
match request method connect
match request method copy
match request method delete
match request method edit
match request method getattribute
match request method getattributenames
match request method getproperties
match request method index
match request method lock
match request method mkcol
match request method mkdir
match request method move
match request method notify
match request method options
match request method poll
match request method propfind
match request method proppatch
match request method put
match request method revadd
match request method revlabel
match request method revlog
match request method revnum
match request method save
match request method search
match request method setattribute
match request method startrev
match request method stoprev
match request method subscribe
match request method trace
match request method unedit
match request method unlock
match request method unsubscribe
class-map type inspect edonkey match-any sdm-app-edonkeychat
match search-file-name
match text-chat
class-map type inspect fasttrack match-any sdm-app-fasttrack
match file-transfer
class-map type inspect http match-any sdm-http-allowparam
match request port-misuse tunneling
class-map type inspect match-all sdm-protocol-http
match protocol http
class-map type inspect edonkey match-any sdm-app-edonkeydownload
match file-transfer
class-map type inspect match-all sdm-protocol-imap
match protocol imap
class-map type inspect aol match-any sdm-app-aol
match service text-chat
!
!
policy-map type inspect sdm-permit-icmpreply
class type inspect sdm-icmp-access
inspect
class class-default
pass
policy-map type inspect p2p sdm-action-app-p2p
class type inspect edonkey sdm-app-edonkeychat
log
allow
class type inspect edonkey sdm-app-edonkeydownload
log
allow
class type inspect fasttrack sdm-app-fasttrack
log
allow
class type inspect gnutella sdm-app-gnutella
log
allow
class type inspect kazaa2 sdm-app-kazaa2
log
allow
class class-default
policy-map type inspect http sdm-action-app-http
class type inspect http sdm-app-httpmethods
log
reset
class type inspect http sdm-http-allowparam
log
allow
class class-default
policy-map type inspect imap sdm-action-imap
class type inspect imap sdm-app-imap
log
class class-default
policy-map type inspect pop3 sdm-action-pop3
class type inspect pop3 sdm-app-pop3
log
class class-default
policy-map type inspect im sdm-action-app-im
class type inspect aol sdm-app-aol
log
allow
class type inspect msnmsgr sdm-app-msn
log
allow
class type inspect ymsgr sdm-app-yahoo
log
allow
class type inspect aol sdm-app-aol-otherservices
log
reset
class type inspect msnmsgr sdm-app-msn-otherservices
log
reset
class type inspect ymsgr sdm-app-yahoo-otherservices
log
reset
class class-default
policy-map type inspect sdm-inspect
class type inspect sdm-invalid-src
drop log
class type inspect sdm-protocol-http
inspect
service-policy http sdm-action-app-http
class type inspect sdm-protocol-imap
inspect
service-policy imap sdm-action-imap
class type inspect sdm-protocol-pop3
inspect
service-policy pop3 sdm-action-pop3
class type inspect sdm-protocol-p2p
inspect
service-policy p2p sdm-action-app-p2p
class type inspect sdm-protocol-im
inspect
service-policy im sdm-action-app-im
class type inspect sdm-insp-traffic
inspect
class class-default
drop
policy-map type inspect sdm-permit
class class-default
drop
policy-map FILTER-ADULT
class ADULT-URL
drop
!
zone security out-zone
zone security in-zone
zone-pair security sdm-zp-self-out source self destination out-zone
service-policy type inspect sdm-permit-icmpreply
zone-pair security sdm-zp-out-self source out-zone destination self
service-policy type inspect sdm-permit
zone-pair security sdm-zp-in-out source in-zone destination out-zone
service-policy type inspect sdm-inspect
bridge irb
!
!
!
!
interface Null0
no ip unreachables
!
interface GigabitEthernet0/0
description $ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$$ETH-LAN$$FW_INSIDE$
ip address 192.168.1.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip flow ingress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip tcp adjust-mss 1412
duplex auto
speed auto
media-type rj45
no mop enabled
service-policy input FILTER-ADULT
!
--More--!
interface GigabitEthernet0/1
ip address 192.168.0.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip flow ingress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip tcp adjust-mss 1412
duplex auto
speed auto
media-type rj45
no mop enabled
!
interface FastEthernet0/3/0
switchport mode trunk
!
interface FastEthernet0/3/1
switchport mode trunk
!
interface FastEthernet0/3/2
switchport mode trunk
!
interface FastEthernet0/3/3
switchport mode trunk
!
interface Cellular0/0/0
description UMTS WAN Interface
no ip address
encapsulation ppp
shutdown
dialer in-band
dialer pool-member 10
async mode interactive
!
interface ATM0/1/0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
no atm ilmi-keepalive
dsl operating-mode auto
dsl enable-training-log
dsl lom 200
!
interface ATM0/1/0.1 point-to-point
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
pvc 8/35
oam-pvc manage
pppoe-client dial-pool-number 1
!
!
interface Dot11Radio0/2/0
ip address 192.168.10.1 255.255.255.0
ip flow ingress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
!
encryption mode ciphers tkip
!
encryption vlan 1 mode ciphers tkip
!
ssid prova_wifi
!
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0
54.0
station-role root
no keepalive
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
!
interface Vlan1
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip flow ingress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
shutdown
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip mtu 1452
ip flow ingress
ip nat outside
ip virtual-reassembly
zone-member security out-zone
encapsulation ppp
ip tcp adjust-mss 1412
dialer pool 1
dialer-group 1
ppp authentication chap pap callin
ppp chap hostname aliceadsl
ppp chap password 7 045A070F0C244D4A1A15
ppp pap sent-username aliceadsl password 7 01120A0D580E070B3240
!
interface Dialer10
ip address negotiated
ip nat outside
ip virtual-reassembly
encapsulation ppp
shutdown
dialer pool 10
dialer string UMTS
dialer-group 10
no cdp enable
ppp authentication chap optional
ppp chap hostname WAPTIM
ppp chap password 7 10792829313E3F4B
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
!
ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 1 interface Dialer0 overload
!
access-list 1 remark INSIDE_IF=GigabitEthernet0/0
access-list 1 remark INSIDE_IF=GigabitEthernet0/1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.0.0 0.0.255.255
access-list 1 remark INSIDE_IF=Dot11Radio0/2/0
access-list 1 permit any
access-list 2 remark HTTP Access-class list
access-list 2 remark SDM_ACL Category=1
access-list 2 permit 192.168.0.0 0.0.255.255
access-list 2 deny any
access-list 100 remark SDM_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 101 remark VTY Access-class list
access-list 101 remark SDM_ACL Category=1
access-list 101 permit ip 192.168.0.0 0.0.255.255 any
access-list 101 deny ip any any
access-list 102 permit ip any any
dialer-list 1 protocol ip permit
dialer-list 10 protocol ip list 102
no cdp run
!
!
!
!
!
!
control-plane
!
bridge 1 protocol ieee
bridge 1 route ip
!
!
!
!
!
!
!
!
banner login ^CCC
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device.
This feature requires the one-time use of the username "cisco"
with the password "cisco". The default username and password have a privilege le
vel of 15.

Please change these publicly known initial credentials using SDM or the IOS CLI.

Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want to use
.

For more information about SDM please follow the instructions in the QUICK START

GUIDE for your router or go to http://www.cisco.com/go/sdm
-----------------------------------------------------------------------
^C
!
line con 0
login authentication local_authen
transport output telnet
line aux 0
login authentication local_authen
transport output telnet
line 0/0/0
script dialer UMTS
modem InOut
no exec
transport input all
line vty 0 4
access-class 101 in
privilege level 15
authorization exec local_author
login authentication local_authen
transport input telnet ssh
line vty 5 15
access-class 101 in
privilege level 15
authorization exec local_author
login authentication local_authen
transport input telnet ssh
!
scheduler allocate 20000 1000
!
end

yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
yourname#
router cisco the best!!!!!!!!!!
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

nessuno che mi può aiutare?
router cisco the best!!!!!!!!!!
Rizio
Messianic Network master
Messaggi: 1158
Iscritto il: ven 12 ott , 2007 2:48 pm
Contatta:

Scusa è che dalla conf che hai postato sembra che tu sia molto più avanti di un banale

Codice: Seleziona tutto

ip nat inside source static IP_LOCALE IP_PUBBLICO eq 10000
o mi sono perso qualcosa?
Si vis pacem para bellum
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

si infatti avevo provato con questo comando:

ip nat inside source static tcp 192.168.0.42 10000 interface Dialer0 10000

devo ancora provare se funziona però.

scusa perchè devo mettere ip pubblico se ho indirizzo con ip dinamico?
router cisco the best!!!!!!!!!!
Rizio
Messianic Network master
Messaggi: 1158
Iscritto il: ven 12 ott , 2007 2:48 pm
Contatta:

Cisco$ ha scritto:scusa perchè devo mettere ip pubblico se ho indirizzo con ip dinamico?
Non devi per forza mettere l'indirizzo IP, il mio era un esempio classico e canonico, non avevo fatto caso alla tua conf a riguardo.
Va bene il comando che hai scritto tu usando perciò la dialer0 come interfaccia di nat esterno.... al resto pensa tutto lui.

Rizio
Si vis pacem para bellum
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

ho provato il comando ma purtroppo mi dà errore 721 va in timeout su verifica password e utente?
router cisco the best!!!!!!!!!!
Rizio
Messianic Network master
Messaggi: 1158
Iscritto il: ven 12 ott , 2007 2:48 pm
Contatta:

Ma tu sei sicuro che ci sia solo la porta 10000 da aprire? Non è che per l'autenticazione il programma che usi vuole accedere anche ad altre porte? Prova a sniffare una sessione in lan e vedi cosa succede.
Perchè, per quanto ne sò io la stringa per il nat è corretta. Potresti sempre provare a togliere la porta e nattare fuori tutta la macchina ma temo che il problema possa non essere il nat a questo punto.

Rizio
Si vis pacem para bellum
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

scusa è per una vpn pptp non per la 10000

ho aperto le porte 1723 e la 47

con questi comandi:

ip nat inside source static tcp 192.168.0.3 1723 interface Dialer0 1723

ip nat inside source static tcp 192.168.0.3 47 interface Dialer0 47

devo poter aprire queste porte per collegarmi ad un altro firewall.

purtroppo mi da quel errore perchè forse nella conf. c'è qualcosa che fa andare la connessione in timeout.

con il pc che ho a casa devo potermi collegare ad un firewall con indirizzo ip pubblico statico il firewall è già configurato penso che il problema sia sul mio router che blocca ancora qualcosa?
router cisco the best!!!!!!!!!!
Rizio
Messianic Network master
Messaggi: 1158
Iscritto il: ven 12 ott , 2007 2:48 pm
Contatta:

Mah, essendo una vpn non sono pacchetti normali, hanno caratteristiche più rigide da rispettare. La tua conf del resto è tanto tanto strutturata, sia per l'uso del firewall che per l'uso massimo dei match type.... io personalmente proverei a togliere un pò di roba guardando se va, poi, un pezzo alla volta la rimetto su fino a quando non smette di andare e allora trovo il problema.
Io per esempio partirei col provare a togliere questo:

Codice: Seleziona tutto

ip tcp synwait-time 10
poi verificherei l'mss che hai impostato 1412 sulle interfaccie Gb ma a 1452 sulla dialer. Non dico che sia sbagliato ma magari è quello a segarti il pacchetto annullando perciò l'integrità dello stesso che arrivato all'altro capo della comunicazione risulta corrotto.

Non so, sono solo indizi però non sono in grado di darti nulla di certo
Rizio
Si vis pacem para bellum
Avatar utente
Cisco$
Network Emperor
Messaggi: 360
Iscritto il: sab 19 apr , 2008 11:48 pm
Località: Battipaglia (Sa)

ho monitorato cosa succede quando si crea il collegamento con la vpn pptp con un sniffer di rete:

NetworkActiv PIAFCTM saved information:

Type Size Source IP Destination IP sPort dPort Date/Time
----------------------------------------------------------------
TCP 48 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:22.406]
TCP 196 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:22.484]
TCP 44 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.484]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.578]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.578]
TCP 196 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.593]
TCP 208 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:22.593]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.671]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.687]
TCP 72 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.687]
TCP 64 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:22.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:22.687]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.765]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:22.781]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:24.859]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:27.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:31.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:35.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:39.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:43.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:47.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:51.687]
GRE 57 192.168.0.3 81.117.204.67 0 0 [2011.10.10 - 01:20:55.687]
TCP 56 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:59.687]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.765]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.765]
TCP 188 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.781]
TCP 56 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:59.781]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.859]
TCP 40 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:59.859]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.875]
TCP 56 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.875]
TCP 40 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:20:59.890]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:20:59.890]
TCP 40 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:21:01.109]
TCP 40 192.168.0.3 81.117.204.67 1681 1723 [2011.10.10 - 01:21:02.953]
TCP 40 81.117.204.67 192.168.0.3 1723 1681 [2011.10.10 - 01:21:04.593]
TCP 40 217.18.101.171 192.168.0.3 80 1608 [2011.10.10 - 01:21:22.187]
TCP 40 217.18.101.171 192.168.0.3 80 1605 [2011.10.10 - 01:21:27.171]
TCP 40 217.18.101.171 192.168.0.3 80 1604 [2011.10.10 - 01:21:27.171]
TCP 40 217.18.101.171 192.168.0.3 80 1607 [2011.10.10 - 01:21:27.171]
TCP 40 217.18.101.171 192.168.0.3 80 1609 [2011.10.10 - 01:21:27.171]
TCP 40 217.18.101.171 192.168.0.3 80 1606 [2011.10.10 - 01:21:32.171]
TCP 40 174.36.33.192 192.168.0.3 80 1678 [2011.10.10 - 01:21:42.921]

----------------------------------------------------------------
Type Size Source IP Destination IP sPort dPort Date/Time

44 Packets listed in 0 milliseconds.



ecco.
router cisco the best!!!!!!!!!!
Rispondi