
请各位帮忙看看,以下是3725 和877 的配置文件, 在877 上如何设置才能保证跟3725的内网组播通信,同时连接在877上的PC又可以访问互联网。多谢。
8 W4 s* \2 W1 Z- F5 L$ s. b+ j. J& M) x
3725 show conf: t" g" _$ A+ {6 Z0 c" N- e
3 c9 P- O; B. z- ~version 12.47 z/ R! v$ C" n
service tcp-keepalives-in3 T: R. |0 K( B$ |( v5 }+ H
service timestamps debug datetime msec
2 O' q4 l* w8 g6 r# R# d+ Vservice timestamps log datetime msec
4 C; r& _8 g4 w1 M4 O2 Sservice password-encryption( E5 a/ I4 b2 ?/ j
!
0 K( y ^0 d' l1 l4 n* Hhostname xxxxx
9 J: E3 Y1 U4 Q3 b1 V!
" Z9 k1 c! ]+ Rboot-start-marker
" \7 |& w8 b9 f5 L- P( W6 O5 eboot-end-marker
" E$ z4 t7 P4 y7 d1 U) L!
# e9 Z5 {7 X* {1 l% p7 g' T7 nlogging buffered 1310729 J# l. o/ |3 |9 A" ] _/ ~
enable secret 5 xxxx
9 {) J2 o" \- T z, `1 H!
9 R# n9 [, [; Maaa new-model1 f U. r X8 s* K' J. t
!
- Z$ b- P; |6 e6 T!
B6 _; r7 J3 a7 v. N! q; Uaaa authentication login userauthen local" S1 B0 r+ z1 `( f V Y, Q
aaa authentication ppp default local
8 E; S* C* `( f* i8 X7 caaa authorization network default local3 [5 O' k$ A: E" `& G' h, ~+ g
aaa authorization network groupauthor local
* |& }+ }" ^9 H$ }!
% r/ F" P" a/ {5 p- Y5 ^!4 p/ G5 ]6 r- M' P s, J; S
aaa session-id common9 L3 X) B0 t- k3 T: u
memory-size iomem 25" ?* b8 M+ w1 {! t I3 I( r2 `, U! f [
clock timezone gmt -5
3 K: r$ ]2 U' z+ eclock summer-time edt recurring
6 u; s* F0 f$ u5 yno network-clock-participate wic 0
( ^- `9 Z% V8 ^7 f# Sip cef
2 b3 Q( }9 l$ D! t) W+ y3 X% S: R: f
!3 c9 B5 z* G; r" G) a* n; {3 U! e
no ip dhcp use vrf connected: a2 ?1 K. C0 O. J8 i. o& s b
ip dhcp excluded-address 10.10.170.1
) S4 c5 e& b% P+ J/ Uip dhcp excluded-address 10.10.170.9
# F; r8 o; F8 O!7 {0 D/ j. {& ^' g
ip dhcp pool tj3-pool& P7 W% N/ F) h1 }0 t0 F$ s. o* I! G& R
network 10.10.170.0 255.255.255.1928 B* k1 y1 a- h7 n m& g. x
domain-name xxxxxxxx.com
; I5 C" J A: i3 t& R/ J' [) Qdns-server 10.10.90.31 192.0.39.96 192.0.39.38& v9 O; J7 w) O& I7 x& _$ w9 ^
netbios-name-server 10.10.90.31 192.0.39.381 J* R- r& T* k$ x {9 v
default-router 10.10.170.11 y! t. c1 L7 ~: G
!
4 ^/ L$ z) H! e8 S! `; Z/ o!
* ]( F( a1 C! I" rip multicast-routing
" Y9 u0 J6 j$ |6 ]$ {4 |- i4 k!$ r, w) b. n5 H" g: v: ^& T) C
multilink bundle-name authenticated
: G" A% Q5 |% K9 J/ T!
# x5 ]! F- L6 W2 Z5 G6 x8 a!
% ^" b% _1 x" j _" }7 \!2 P+ o: b) Q! ?5 m: p
!
$ L. k4 Y1 ~6 [% {) Q4 S/ F!9 a: F8 y/ C3 B* _- j* o
!' y! \8 h" p/ Q4 ^
!
) m8 S3 K; Q& r% L/ D# Y!
7 d9 y* F3 E0 V0 N" @!3 l$ `6 M8 W4 ~% V# x+ Y+ A
!
{2 J3 F3 _/ O: n4 R m: K8 v ?!& _- t: `/ v+ j- N( Z+ p
!
" q5 J- e1 s# L3 T!
5 l- |; B0 |- {" z4 A* P2 a!
, W( N) c5 n+ Z) c: |!
. P7 j J* _1 c!
9 t* f, S0 `) ?3 f1 q0 s!+ n- u, t; [& [" v
!
* \- G& y6 [) `) O!/ m" }. Y! Q& Y' k) E
!
, ^( ]0 \2 Z; G5 k( husername xxx privilege 15 password 7 xxxx
2 W! m9 o* b1 T4 A) Y* |username xxx password 7 xxxx
# t3 }' w6 R% c" ]. X9 }archive/ y1 @! g H# ?4 M1 ]' t, w
log config3 O: n6 ~% a1 D, D1 \
hidekeys0 P5 \; J* D0 p' s& l9 c- u# ?
!
! M/ C& R% l; ^7 S!0 c2 t" L4 M& m' c% }
crypto isakmp policy 3
( o( K3 ^5 ?7 k( Z uencr 3des6 y* e+ i- {9 C( h( h1 ~
authentication pre-share; u1 u C; T/ I- _
group 2
2 w- j, {- j2 r!4 Y/ p) `: d# J$ q
crypto isakmp client configuration group vpnclient
" n ]5 a7 ^# F& [key cisco123. ~6 U9 `, k4 h2 z& P
dns 10.10.90.31 192.0.39.96# ^1 W i. v+ |* T0 }/ y, x
wins 10.10.90.31 192.0.39.38" @9 q( `8 S q7 c' C( E3 z( K6 J
domain xxxxxx.com
/ `* r5 M$ a1 wpool ippool$ i8 l5 H2 O a
acl 111
7 d; Q, }& }6 O( w# J7 H# s- _" Jnetmask 255.255.255.240+ V1 p& i+ }" l( L6 D) }- J0 \4 ]. D
!
9 i$ v& M9 k% r" @# N' Zcrypto isakmp client configuration group mcast_client
/ U- m9 Y% M9 L( J5 e" { ~key cisco+ n& S5 u! _7 |( A( F' v
pool ippool
8 |+ f; }2 D4 Bsave-password
9 R! F) i/ ~- j) P0 u* L% E4 L, qcrypto isakmp profile vpn1-ra7 D7 {: a5 ?! P" T5 n
match identity group mcast_client( B+ q B/ k$ W0 G/ F
client authentication list userauthen5 b+ n+ V" S% A, H, ^
isakmp authorization list groupauthor' a+ E T% C5 r1 p1 G2 @6 I1 X
client configuration address respond5 G, {9 C# i$ }2 ^$ ^. J. R J; I
virtual-template 18 Y" E+ D7 f. u0 X1 \
!
7 g$ b5 O, b' b!# K: {8 ~- m: x& V8 l
crypto ipsec transform-set myset esp-des esp-md5-hmac
# N6 F1 Y# a, c- v4 a/ l b, O!. g* Y! l7 @6 e1 ^+ P% W5 L
crypto ipsec profile test-vti1+ \4 D) w" J3 ?! a k' q$ l* L
set transform-set myset- G% [0 S) n3 Y" m) [6 J5 k; Q6 D
!6 _' a O9 u# B4 P$ @3 Y
!/ u6 m* T7 p3 S* c& @
crypto dynamic-map dynmap 10
, o* g9 T w6 ?* G( Lset transform-set myset$ i7 d$ e$ \( o# w
reverse-route7 s4 O. P; y( t
!
' k' G b" T0 [. J* P!3 B( s* v8 t( Z5 l, `- b
crypto map clientmap client authentication list userauthen# |3 u$ |" _3 d$ O- C& | N
crypto map clientmap isakmp authorization list groupauthor
; i4 A0 f ^" {" N, Tcrypto map clientmap client configuration address respond
4 s6 c2 a# v" Z$ q2 I" i! k$ pcrypto map clientmap 10 ipsec-isakmp dynamic dynmap
* x3 z) x4 D- z$ n!/ P4 {0 X4 Y2 Q( ~' @
!
: Z/ q; h O3 V* }% H9 q!9 g1 L) D0 p! V
controller E1 0/0
, M) u" W6 ~- J& ~$ V9 x3 R* I# Nframing NO-CRC4
, O3 F" k Q, X3 t. d9 B! m2 {channel-group 0 timeslots 1-31) ?9 d" }/ R' K$ O! n
!
5 x0 M4 @; l% g1 M4 c y0 V' Fcontroller E1 0/1
, k# v4 m }" S/ X9 x5 @2 N* i!; P1 P6 |3 B' s" o* Y
ip tcp mss 1436& _: L6 q- X3 O- {- b% Z, z
buffers small permanent 5500; e' }* P/ p9 t3 N, u( C) h
buffers small max-free 6500: |3 Y$ R$ P$ b4 I7 S
buffers small min-free 1000! B0 N+ Q4 o7 K9 o- [
buffers middle permanent 6000
4 Y6 ?5 K9 C# B& R: D, [buffers middle max-free 6500) M4 y2 E" T1 X+ s# m% B1 `, x$ W2 l
buffers middle min-free 1500
' [6 A, b: T$ b4 L; T6 J6 _% ^" {buffers big permanent 1200& x. @' a- K& c
buffers big max-free 1700& K5 y- C3 t4 Q4 P
buffers big min-free 5006 M6 T! {+ }4 t
buffers verybig permanent 200( }5 x2 [( ?; R
buffers verybig max-free 500) S- R6 k+ E$ ]* F' ^; q3 Y2 M
buffers verybig min-free 100
/ f- E, q* q( I/ e3 j9 Cbuffers large permanent 80; U) b* c7 y4 f8 g# B
buffers large max-free 200# [4 V" D. g& `, y* ~9 G* f" K
buffers large min-free 10
s8 p( T; Q( }$ v( Zbuffers huge permanent 50
' G! D, O$ J [, X+ k* ]1 i1 ^buffers huge max-free 1005 ^! Z8 R) f% s
buffers huge min-free 10
/ S' ?2 C* c3 w; s/ `* L!
/ D$ Y7 @ m6 j c!
w) x, j6 S: Y' D( P: }/ r!
" a* @% j9 e5 `! D5 u!, w+ T4 v, ^3 @8 p% t$ g ]8 H
interface Loopback0* y) c5 ~/ l4 `' H$ _9 q
ip address 10.10.170.241 255.255.255.255. X( \) h+ R+ H: x9 }$ M6 g2 t* X
!5 {, V: y4 o9 I9 W
interface Tunnel103( R4 O; Y6 ]1 g3 B* F! R. u6 w |8 a
ip address 10.8.7.50 255.255.255.252
- O0 m% w) c# I8 \# I: [5 C6 ~ip pim sparse-mode* Q" S! U8 [, ]
ip tcp adjust-mss 1436( c/ @, o T- W8 o8 t
load-interval 30& Q7 z7 ?- s& k/ H; M7 `% }: A
tunnel source FastEthernet0/07 p5 G/ q$ f" }" {$ v
tunnel destination xxx.xxx.xxx.xxx; C9 Y, u+ W6 R& d3 G
hold-queue 4096 in9 m9 v0 v0 h+ f: j' V' m0 e
hold-queue 4096 out& N3 e, Q& C9 l5 u& ?7 ~% D& q
!
* W4 X: Z( V. W# ninterface FastEthernet0/0
: ^7 s8 u& X1 T) b4 Cip address xxx.xxx.xxx.xxx 255.255.255.252
$ G+ \2 B$ x+ l7 R8 lip nat outside
7 g2 K5 V1 q; X1 E( ]3 ]" v Z$ {ip virtual-reassembly
& M8 r5 o" ~* R5 jduplex auto2 I. j$ f% J% v( {2 b! t
speed auto
# _; ]. w' m$ Lcrypto map clientmap; T7 ^# l& Y& x- x9 o/ }
!" C( e0 H) d- U% A
interface Serial0/0:08 X/ A8 z" s) w+ s
no ip address- B* ~2 L% M* t, D8 @$ |# Z! c
!# D9 W: U/ Q2 C
interface FastEthernet0/1
8 i8 J4 S" ]) H; h4 yip address 10.10.170.1 255.255.255.192( U2 ?% z! D+ S; M
ip pim sparse-mode
: e: @( c' D9 q2 }- [ip nat inside
% j- B2 t9 ]7 X% o+ p; Xip virtual-reassembly/ g/ j# u) O' T$ Q
ip igmp static-group 224.1.8.94
, @' c8 y; g2 \( uip igmp static-group 224.3.8.94$ H3 h. l# D$ N- |& V/ Y
ip igmp static-group 224.2.8.94
- \7 Z _0 Y6 W+ d3 J: X2 Eip igmp access-group 204 `' c N) f8 r5 i. S7 A, s& ?
speed 100
, D( X8 S3 p, F9 q: c/ f$ n0 Kfull-duplex
" H4 r; n- v/ T; _hold-queue 4096 in. [) p2 d/ s$ d1 S9 ]6 o
hold-queue 4096 out- j0 M$ s O$ k. y3 _5 Z5 G: f) d
!
4 }0 Z5 M; v4 M, [" `interface Virtual-Template1 type tunnel% [$ Z5 N( q9 l2 H# y& f
ip unnumbered Loopback0) [2 J( f% r. N0 M+ w, J% l
ip mtu 1436
3 f/ Y+ P8 h0 V8 u- m# }; hip pim sparse-mode
, ?/ v, j+ U: z, n$ [ip nat inside
, u0 c. O! S" w6 d; N! jip virtual-reassembly
+ e/ h- B }3 Xtunnel mode ipsec ipv49 Q$ z: v' W2 z6 ?- P, x8 B( M2 R4 ~% [; N
tunnel protection ipsec profile test-vti1
, W2 Q4 m4 R0 I4 k!
2 G/ u) T/ x _5 v" hip local pool ippool 10.10.170.251 10.10.170.254
" N) Z8 q& q# z& `3 t: I# gip forward-protocol nd& q! |8 a4 e& `! `9 c/ |& @
ip route 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx( z3 v+ w [% C0 W# h3 l+ L3 E
ip route 10.0.0.0 255.0.0.0 Null0
( E4 Y$ t t. K+ Bip route 10.9.1.0 255.255.255.0 Tunnel103. \! k% h f6 E) @( I5 s" v* T
ip route 10.10.12.0 255.255.255.0 Tunnel1038 o# D/ d# v: Y+ l- z
ip route 10.10.80.0 255.255.255.0 Tunnel103
6 y7 B, }4 ~0 g1 Q* uip route 10.10.90.0 255.255.255.0 Tunnel103
" e# a7 H9 i# t }ip route 10.10.118.0 255.255.255.0 Tunnel103
' B' m9 j" \2 q- q7 qip route 10.20.17.0 255.255.255.0 Tunnel103
( Y5 }5 w1 g# a5 o" d1 g$ cip route 10.50.170.0 255.255.255.0 Tunnel1035 W$ e! d1 d+ P# E* [& x+ k
ip route 172.16.0.0 255.240.0.0 Null0
( N4 E. d- N, Z7 G- H) cip route 172.16.90.0 255.255.255.0 Tunnel103
: ~$ R( V/ n1 C ~0 X& Bip route 172.16.110.0 255.255.255.0 Tunnel103
5 K# b3 B# \# z _ip route 192.0.39.0 255.255.255.0 Tunnel1031 g' v- ~6 u6 I8 ]% i, a
ip route 192.168.0.0 255.255.0.0 Null0
6 R1 _0 l/ o( b C6 X6 [!4 m4 N/ k" n0 E* ^
!
* P+ H4 a. [( I/ ]9 pip http server' k9 E5 y$ q* A+ [0 g8 k
ip http authentication local& u' ?* V( K# S* J
no ip http secure-server0 k0 v# f( E3 {. M4 B
ip pim bidir-enable9 H& r% Q8 J# r, L
ip pim rp-address 10.50.170.1 20 bidir5 Y6 w S5 H4 a! c4 [- W
no ip nat service sip udp port 5060
9 F6 I% ^; U% j2 i- J# [ip nat inside source list 1 interface FastEthernet0/0 overload
. ^2 G6 @. e4 f+ ]( l0 F!
5 b* B' o5 c o/ Naccess-list 1 permit 10.10.170.0 0.0.0.255& M; O! u2 {* ~# N; @- s
access-list 20 permit 224.2.8.94
# f z% A5 F( R$ m& r: Iaccess-list 20 permit 224.3.8.94
2 X) s" ]) G( b, ]# Q& Vaccess-list 20 permit 224.1.8.94: j: o4 ]9 g/ O. A+ Y' p0 z' B
access-list 98 permit 10.10.90.0 0.0.0.72 y. N# x4 ^5 b5 p& Z- m/ Y6 C
access-list 98 permit 10.10.12.32 0.0.0.3
- W8 q) z8 y; Z/ J) Xaccess-list 111 permit ip 10.10.170.0 0.0.0.240 10.10.170.240 0.0.0.15& a# K. e' m9 P$ {
access-list 111 permit ip 10.9.1.0 0.0.0.255 10.10.170.240 0.0.0.15. [8 ^5 H1 H; e7 c9 n0 L1 A y( u9 _
access-list 111 permit ip 10.10.12.0 0.0.0.255 10.10.170.240 0.0.0.15- l( e, P. a5 n1 L2 `
access-list 111 permit ip 10.10.80.0 0.0.0.255 10.10.170.240 0.0.0.15 A$ g3 f1 O4 e, A0 p
access-list 111 permit ip 10.10.90.0 0.0.0.255 10.10.170.240 0.0.0.153 F* b! R! J' J3 K ^
access-list 111 permit ip 10.10.118.0 0.0.0.255 10.10.170.240 0.0.0.15
' d3 j. V9 G! g" j9 p! Oaccess-list 111 permit ip 10.20.17.0 0.0.0.255 10.10.170.240 0.0.0.15
9 ?( [! I- |$ P( b! Y+ `0 y: saccess-list 111 permit ip 10.50.170.0 0.0.0.255 10.10.170.240 0.0.0.15! ~( f- w* j3 T& k. {; v$ K
access-list 111 permit ip 172.16.90.0 0.0.0.255 10.10.170.240 0.0.0.15
! H# T/ q1 z1 u* y! haccess-list 111 permit ip 172.16.110.0 0.0.0.255 10.10.170.240 0.0.0.15& n+ [) O A+ c* I0 a
access-list 111 permit ip 192.0.39.0 0.0.0.255 10.10.170.240 0.0.0.15$ C' E. Y$ _5 f( k
!$ i" o: j" {& Q
!: _9 u$ T L @0 @8 U
!
: i1 A, J$ i) k3 g( [2 t( z!
1 S) u I( t8 W( s4 W+ K0 Z!; u2 U. n! @( [& Q; w( Z! j! }- P
tftp-server nvram:startup-config
& ~/ B' J' h& s0 g/ R!
, Y9 J' Y2 j! r) h( Ocontrol-plane
+ P8 z, l2 S- _. _: a: g!# b3 y" h' h; u/ h; l
!
) p/ d) y6 x- B+ G- z5 t3 p!* O; @# ~/ N" v3 k! @
!
7 [( V- ~+ C: h( g0 J/ M, `7 T!
1 {4 K" F, w9 v9 D! o( G: ^" I& l!$ D Y, T; {& {5 k
!
) M) Q o, x; W$ d$ o4 k!
( C, Q" c7 C' V0 [!, Q0 F9 i2 b3 O! p. H4 m6 ~
!
4 x3 T8 s/ q5 x& g0 Z! @9 oline con 0
1 Q( W9 ?$ h1 tpassword 7 xxx0 H4 g$ _! ~( k) u# X& Q
stopbits 1
! ]8 f0 v! I1 h0 l% [! y- ~line aux 0
7 P, g1 }# g# v% xpassword 7 xxx
5 {. Z+ v. r3 K/ J; [" H9 p, vstopbits 1! x& w: T4 X) ^2 J3 S* L. c
line vty 0 @- @! T- f h! K5 Z' W* N4 V) R
exec-timeout 0 0
- M) q; c2 s, o+ o! Lpassword 7 xxx
+ r" L9 W3 h% ]( e$ Mline vty 1 41 j7 e9 n% L; ^- u4 |$ m. V) p
exec-timeout 0 0
* a8 H0 m& w; R6 V6 j( ?password 7 xxx$ ~# {4 Q+ Q) O" ^2 ^' K
!# @- [7 ` V Z: q( V
ntp clock-period 17180624
- Z& h1 Z1 U) t7 K$ s) w3 i6 pntp server 10.3.1.16 l! \: r9 z0 A' ?9 |" G1 b% I; B1 O
ntp server 10.10.80.657 h: N! _' R; E; F
!, \# k/ h# x1 ^; [/ ], Q
end
2 ?: ?+ z) Z. w9 M9 L' w( Z7 k8 }
: P& O3 }3 V# w9 Z! `
- P9 _: B% n p0 ?( P877 show conf
% T8 P7 j1 P" P0 x: Q
) P3 J! P! f2 {/ l( d2 ?8 \) Z, n/ V
* q$ k q3 b' T( @5 Fversion 12.4! u0 r8 Y! y1 Z$ M. V( M
no service pad
: }0 n* }" M5 u' W/ O% z: uservice timestamps debug datetime msec
; W/ Z! h1 L! b. Q; y& \service timestamps log datetime msec4 Y. `4 B/ n) Z" Z7 z
no service password-encryption
2 B4 B, z, U+ F8 }+ D& m! F2 N" k. x!
1 _2 J- \, q. N6 [, o! jhostname 8778 W( f" p! d" S7 H2 ~6 z- l' L
!5 x; w9 W7 C+ [
boot-start-marker8 J& S% k$ R/ X7 I2 u; |2 g5 ? h
boot-end-marker' q" }7 R. k, h, Y) @% U
!
A: e3 @" b8 @+ klogging buffered 262144 debugging9 f# V4 Y; p7 d0 ^; _
enable secret 5 xxx% m! e% Z# h& {! p; Y
!
# o, d X/ E- j& v' ~3 o2 z( W- pno aaa new-model J1 y" c. ?) s) G$ f* E' }/ c( |
!$ t) Q' l6 L5 l0 e' S
resource policy
! w: I3 f1 q% M7 Z7 r% T) h!
* \- r* S% S2 qip cef
& p" d+ H- T6 b0 E+ t!1 [# C S# u/ x2 g
!) T( R6 \9 e, u# Z3 g; o
no ip dhcp use vrf connected
$ ^* n9 }& l- I$ k# d: W8 Y2 hip dhcp excluded-address 10.10.170.129# [9 w( l5 B" v ~
!9 N& N* X e- Q- ?! J1 T4 D! E. `
ip dhcp pool c877-pool% `. m0 v! u1 Y
network 10.10.170.128 255.255.255.248) `1 j6 L" A4 g8 J9 M( ]( }
domain-name xxx.com
' u1 {6 M$ A" x5 U% d0 a5 h9 r% Ydns-server 10.10.90.31 192.0.39.96 192.0.39.38
: p/ c6 Q8 T1 _9 @/ I$ Inetbios-name-server 10.10.90.31 192.0.39.38
: v: m/ o4 v5 ~2 b9 o: Jdefault-router 10.10.170.129- U0 G6 b+ }, ^ k/ R
!9 ?* X) r4 Y/ b+ T% e$ d
!
5 S/ Q* }! Z1 G( e8 I Ono ip domain lookup X8 m2 K2 b; X; g! w
ip multicast-routing8 I- l$ B% A( ^3 y1 f5 ~# N
vpdn enable4 a- [# I! u% q) H9 T
!% w+ G: n5 O7 O, }5 Y. X
!7 X; }9 z8 j1 O6 w
!
1 g( m* |) | t4 J0 @0 h# x6 n!; L3 `6 q( t2 [" U" ]
!* I- F" ]* V6 J" H8 M! l6 o6 w
!5 K; V9 b0 g# b5 l0 c$ L" F6 Y
!
' q2 o& }2 N* t* D1 `!$ x# [2 C4 z: q; J' c; D. B0 V8 ]
!% o# ^+ \% Z8 O4 u& k& z3 |
!
. `8 H( W* B( \. e$ \2 v; m8 J!3 `( q# g1 q2 R1 M' \4 a: }/ f5 z
crypto ipsec client ezvpn CLIENT4 j; H0 w" u4 r* @5 a. L/ ~
connect auto
* d; l7 v3 X: f6 P6 R. pgroup mcast_client key cisco
9 {6 T5 ?" l4 Z8 {. `mode network-extension8 \9 ?$ r2 B$ V' P1 `6 E, x
peer xxx.xxx.xxx.xxx' @* w( a3 }5 ]8 D% b4 R- w
acl 100* i( G) F+ i) ?9 u8 X9 V
virtual-interface 1 I5 R/ s$ e( D( `4 B! f
username xxx password xxx
+ E4 E7 }' H' U! S2 z1 v. R; Wxauth userid mode local
7 ? u+ H$ e; N. G, }!6 k( a- N0 f! [8 p# r4 m! g
!
7 O, x! h8 \( M* a!/ \; i( P# J* z3 z0 U! t; d
!
7 p; C/ Y* x* {' R9 B/ t!
) o6 D0 F; S5 Y+ g* Einterface Loopback0( V4 E+ O6 w" N8 Z# \, a' T) C3 i
no ip address; y7 U3 F: [0 I. |' |* g9 }0 [0 B
!4 M/ O! C$ ~$ Z7 {) K; |9 n0 [
interface ATM09 }* B, D. P B; l; ^! O8 u
no ip address9 \. O" f1 }% F$ a( G
no atm ilmi-keepalive7 ?9 ~: O4 o8 }( s9 I, u0 F0 p& r
pvc 0/35
: U( _4 g. D2 p8 Y6 v; }: Mpppoe-client dial-pool-number 1" A t8 ^3 y, H1 A- ~6 t/ O; H
!
" p! y! Q; g) E, R5 ibundle-enable7 K6 C! P" Q5 S: R9 d- I3 U: ]
dsl operating-mode auto7 ], ~& P& O" z. r: }& m
hold-queue 224 in
) P P( e* t$ k3 W2 S!+ H, J) t1 I- q! i8 B" m+ H3 c w
interface ATM0.1 point-to-point
8 f" e) K6 i, |) C* dno snmp trap link-status
; P b* _" @! n: d0 e, q!
4 `8 h+ g/ Z% v+ O; o2 N- w8 h2 Pinterface FastEthernet0
; \2 n, I" }5 a: c0 _switchport access vlan 28 Y; n. D; V) _3 b' p% ^
crypto ipsec client ezvpn CLIENT inside
% V7 x+ R2 x0 d+ x6 C+ _!
4 y/ `& |, `3 v2 p% e- C5 V6 ninterface FastEthernet1
$ n3 n" M- N; oswitchport access vlan 22 [( B9 k+ M0 n4 l# e
crypto ipsec client ezvpn CLIENT inside
- x) d; i9 l, J6 w, r0 |' b) `8 {!
7 x8 @4 D3 c' b, c! Qinterface FastEthernet2) N4 n' C' b* u) ~& v1 S: ^0 Z2 D
switchport access vlan 2
8 n/ B8 j( E) Y4 _7 Kcrypto ipsec client ezvpn CLIENT inside
3 n% u3 Y1 J: F" i7 H! ]9 H- k) w!
2 F( c; z# Y6 y* Ginterface FastEthernet3
2 x5 x, F3 i" kswitchport access vlan 2+ e2 ^% C* j2 | x# t5 J! D5 ?
crypto ipsec client ezvpn CLIENT inside
# h1 D2 T/ d+ {( j+ K!
0 a4 x% w: H* Iinterface Virtual-Template1 type tunnel
( U" H0 r% i5 h/ M- x8 N) nno ip address
6 n1 T2 B' U9 \( Jip mtu 1436
: K, X; K9 Q7 R/ U' ` Dip pim sparse-mode+ j) \" }0 }" @( `+ Z
!
3 Z+ {% i/ T* W5 e, ?8 m& S* Iinterface Vlan1
9 p! b0 ^( }) b# g bno ip address
9 U) x% c! `/ ]/ C: G* A- dip pim sparse-mode
. ^. t9 p0 T" k+ N( u, Bip igmp join-group 224.1.8.949 k1 p7 B" N, H6 ?
ip igmp join-group 224.2.8.94
) l' a) F5 |4 h' ]ip igmp join-group 224.3.8.941 h+ n, o6 Y! r
crypto ipsec client ezvpn CLIENT inside
: R2 }. N9 |: q; y0 ?!1 g- ]7 P* x% G1 g% q" L
interface Vlan2, h$ Y! I7 u- E9 c7 e* y& `
ip address 10.10.170.129 255.255.255.248
' J: z7 m! @2 ^0 |' o# Q3 pip pim sparse-mode
8 @1 P6 X7 k, C6 H& K+ L zip igmp join-group 224.1.8.94
# t4 A P" R, ^* D) j" uip igmp join-group 224.2.8.94
! P ]- J- H3 zip igmp join-group 224.3.8.94: C4 o- e. A% x! k2 X
ip igmp static-group 224.1.8.948 r' V) y; V1 W" k9 g
ip igmp static-group 224.3.8.94; [ ~' ^1 _3 W' I2 m, j
ip igmp static-group 224.2.8.94
~ B# c, `: x6 j7 ~ip igmp access-group 20% _# k7 O8 A& Y L
crypto ipsec client ezvpn CLIENT inside
. H' R# _8 N6 G, L5 v! \) t8 t!0 t m# b4 r% L
interface Dialer17 f! G: ^! x' }4 ^6 `
ip address negotiated
9 V% g" w6 |; M/ `1 {$ u' {% S* Hip mtu 1492
5 J4 F6 {( g7 A" m& E: @! ~encapsulation ppp" p) d, H7 V, b/ w
dialer pool 1
, ?* c: I) n5 I0 U+ H2 c6 e7 Jppp authentication chap callin' O ?" L. B* x2 {
ppp chap hostname xxxx
3 [- k. [, k* A- xppp chap password 0 xxxxx
) ~" \& [' }4 j1 mppp pap sent-username xxxx password 0 xxxx
% Y' ?6 Z" d9 E! ~* Pcrypto ipsec client ezvpn CLIENT
9 o% H4 E3 c$ E: _) v0 K!
/ r+ ^' @2 F; k- @, {$ `. aip route xxx.xxx.xxx.xxx 255.255.255.255 Dialer12 \3 {8 ^% L( H5 t5 I
!
8 W/ C3 [2 K/ v5 c, j!" U6 Y' u" ^* v7 o
no ip http server/ D9 V- v7 ^; ?4 R- i' }8 J
no ip http secure-server/ |2 i! t8 u6 W0 }# g) K
ip pim bidir-enable" o n& K8 n: {. ?6 v
ip pim rp-address 10.50.170.1 20 bidir; k, L, A( u0 P$ b, G' G3 b
ip nat inside source list 1 interface Dialer1 overload
! [) b$ Q+ s! \7 w, E7 D!5 |: \( X2 \1 W8 x2 }, ]$ m! V7 q
access-list 1 permit 10.92.1.0 0.0.0.255
# |. r" @: X* S3 e6 \access-list 20 permit 224.2.8.94: V* _$ d! S5 f' J0 F$ w# ^
access-list 20 permit 224.3.8.946 _; }7 F& z7 K) n
access-list 20 permit 224.1.8.94% z3 ?; K( v" E# w
access-list 100 permit ip 10.10.170.128 0.0.0.7 any" G2 h( h* ~2 B
access-list 101 permit ip 10.10.170.128 0.0.0.7 10.9.1.0 0.0.0.255' W3 H( R5 A+ J+ Y; X& {
access-list 101 permit ip 10.10.170.128 0.0.0.7 10.10.12.0 0.0.0.2550 U! a c$ s E+ B3 S/ j, I
access-list 101 permit ip 10.10.170.128 0.0.0.7 10.10.80.0 0.0.0.255- G5 B+ ^1 p2 q, r
access-list 101 permit ip 10.10.170.128 0.0.0.7 10.10.90.0 0.0.0.255/ @$ U6 @: [8 P ?
access-list 101 permit ip 10.10.170.128 0.0.0.7 10.10.118.0 0.0.0.255
9 W1 l$ @( P, I! d& i2 |0 zaccess-list 101 permit ip 10.10.170.128 0.0.0.7 10.20.17.0 0.0.0.255
i' x; W( i8 I" J6 X) maccess-list 101 permit ip 10.10.170.128 0.0.0.7 10.50.170.0 0.0.0.2550 p9 ?1 \1 F/ R3 m
access-list 101 permit ip 10.10.170.128 0.0.0.7 172.16.90.0 0.0.0.255
/ M7 q, L2 b. _- _) q# R' I' X% Q* Caccess-list 101 permit ip 10.10.170.128 0.0.0.7 172.16.110.0 0.0.0.255* y9 X0 p) k2 b* Q' U& ]: Z
access-list 101 permit ip 10.10.170.128 0.0.0.7 192.0.39.0 0.0.0.2552 }; X6 F7 z( a- R' K
dialer-list 1 protocol ip permit5 y7 Z. z! }% z" I1 M: g% R7 j5 R
!, R) R& R' H. b8 o7 M
!: D; _; ~+ s- H0 w
!
$ o- D& V5 I8 x2 S!# {; j0 M2 a4 J+ P. }; r+ q
control-plane
8 ?$ i/ g0 [9 q- _!
, |/ w: u3 ~" N8 h7 m!3 N! j% J. v5 j% M. ?
line con 0
o& _! a( `! C$ \0 z+ c4 m1 u& }+ Wno modem enable
) P% H8 Q4 h$ y% g; j' ]line aux 0
2 D0 P8 a- H4 E2 @7 b' v0 t7 vline vty 0 42 h! r3 i+ a- f# n" V+ b" ?
password xxx
1 K8 G9 R+ z; I. z) Ilogin A' x. w# @& t P' a% L I
!- T% K$ U" u6 a& M9 l0 b5 J6 ?
scheduler max-task-time 50000 d2 i' }! S5 n, r' _8 m
ntp clock-period 17180579( m( p0 n9 T! g/ k$ \
ntp server 10.3.1.1- F3 r* K4 g' g9 i! ?+ W
ntp server 10.10.80.657 Q5 [' _% G& c" |
end |
|