Configuration des routeurs Cisco du réseau MDL Extrait des

advertisement
Configuration des routeurs Cisco du réseau MDL
Extrait des différentes configurations des 3 routeurs
Routeur R1 DMZ :
!
! Last configuration change at 12:29:30 UTC Fri Apr 19 2013
! NVRAM config last updated at 14:26:59 UTC Mon Apr 15 2013
! NVRAM config last updated at 14:26:59 UTC Mon Apr 15 2013
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1DMZ
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
enable secret 4 wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
!
no aaa new-model
!
no ipv6 cef
ip source-route
ip cef
!
!
!
!
!
ip domain name jolsio.net
multilink bundle-name authenticated
!
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-1317374056
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1317374056
revocation-check none
rsakeypair TP-self-signed-1317374056
!
!
crypto pki certificate chain TP-self-signed-1317374056
certificate self-signed 01
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34323437 31333939 3332301E 170D3132 30363232 31393132
32395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32343731
33393933 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B6A2 DE2AC56D B5DADE90 3B29EF01 D60FE187 20E40FC0 B747DCA7
C9E10221
753781DA ADBDE54F A4AB356F 1380A0AA D9EDF0AF FE3B473C B0E36858
E679DBF7
97D5B3EA 95257F78 7E5E9E67 2288B441 F10D5F46 6EBD3766 AE6A7E0E
F76D989F
CC7AA356 6B89C385 E61864CF C44015DD F2F303F5 635998B3 E381DEF7
E4AFCE58
566F0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14E9838E AD7B0FF5 842BD6DD 9E6D8070 4E28424A
06301D06
03551D0E 04160414 E9838EAD 7B0FF584 2BD6DD9E 6D80704E 28424A06
300D0609
2A864886 F70D0101 05050003 8181008E 2D5D8836 BDE7F946 16580023 F6D9C796
9EBF319F 71A8219A D773007C CB8103E0 939FCA5F 70336810 6DBBA01F
4472305D
0954C2B7 449E0999 576743CF 1F85C0F0 960A56E9 B3B219EE 784E80D4
D1407772
7D38509C 4DD6D35E F234767F FDE59CD4 AB65D7A2 CA3BF17F 84DAB630
5EF01D40
87A50BD5 4673FCD7 939BC817 A01FFD
quit
license udi pid CISCO2901/K9 sn FCZ162593DY
!
!
username joliverie privilege 15 secret 4
wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
username cisco privilege 15 secret 4
wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$
ip address 192.168.2.242 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
ip address 192.168.12.253 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
ip forward-protocol nd
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 192.168.0.0 255.255.255.0 192.168.12.254
ip route 192.168.3.0 255.255.255.0 192.168.12.254
!
!
!
!
control-plane
!
!
banner exec
% Password expiration warning.
----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
----------------------------------------------------------------------banner login
----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLYKNOWN
CREDENTIALS
Here are the Cisco IOS commands.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT
BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
----------------------------------------------------------------------!
line con 0
password joliverie
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
privilege level 15
password cisco
login local
transport input ssh
line vty 5 15
privilege level 15
login local
transport input ssh
!
scheduler allocate 20000 1000
end
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
Configuration du Routeur 2 (DMZ)
Routeur R2-DMZ
!
! Last configuration change at 14:51:15 UTC Tue Apr 16 2013 by joliverie
! NVRAM config last updated at 14:16:15 UTC Mon Apr 15 2013
! NVRAM config last updated at 14:16:15 UTC Mon Apr 15 2013
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2DMZ
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
enable secret 4 wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
!
no aaa new-model
!
no ipv6 cef
ip source-route
ip cef
!
!
!
!
!
ip domain name jolsio.net
multilink bundle-name authenticated
!
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-1317374056
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1317374056
revocation-check none
rsakeypair TP-self-signed-1317374056
!
!
crypto pki certificate chain TP-self-signed-1317374056
certificate self-signed 01
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 35353830 37393335 32301E17 0D313230 36323830 37353930
385A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3535 38303739
33353230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
E81BF8F3 63C450B3 2F044DF8 8DD1CCDA FEC7DE3A 87C7ACE9 4C11098D
367DC32E
FD7F3911 020C5C1B F0204019 0A1E7FA8 E06A2909 B6CB894D CD7BB92B
053B2507
F5962794 41A69F3B B06DC29C 402C570B 1ED58469 4F6707B3 1AAB9EA4
3C3991BD
89F43891 1F0E4E59 E329D269 596534AD F74369FF 3B12E9A3 EF795B9C
912893E9
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 168014D5 3D79CFD1 31D72CE2 7DAC374B 5F9AFEBF B1437330
1D060355
1D0E0416 0414D53D 79CFD131 D72CE27D AC374B5F 9AFEBFB1 4373300D
06092A86
4886F70D 01010505 00038181 0013E6B2 BA14A391 221EEFCE 661D73A0
6C513BE6
77382631 4BFFE631 11990234 D6C5E112 8C87AB9E DBF3C3E5 7D1CB848
9C6D8FF1
910754A1 59780749 BA6C975E 25C18973 8DFA4B5C 81051D40 0A2D033A
F5A76252
CAE3E5D3 8DE15A9C 6DC3772E E6FDB7FD 2C47B354 732252B3 FD1BE12B
D87423B6
BD22157B 8F8A1EE2 41930088 6D
quit
license udi pid CISCO2901/K9 sn FCZ1626C4FV
!
!
username joliverie privilege 15 secret 4
wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
username joliveri privilege 15 secret 4
wI.gZZsWr.hMPR/pgenE224sgTNUx/SDlgVWGaoWLws
!
!
!
!
!
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$
ip address 192.168.12.254 255.255.255.0
duplex auto
speed auto
!
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
interface GigabitEthernet0/1
ip address 192.168.0.254 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
router rip
version 2
network 10.0.0.0
network 12.0.0.0
!
ip forward-protocol nd
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 192.168.2.0 255.255.255.0 192.168.12.253
ip route 192.168.3.0 255.255.255.0 192.168.0.253
!
!
!
!
control-plane
!
!
banner exec
% Password expiration warning.
----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you want to
use.
-----------------------------------------------------------------------
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
banner login
----------------------------------------------------------------------Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.
YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLYKNOWN
CREDENTIALS
Here are the Cisco IOS commands.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want
to use.
IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT
BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.
For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
----------------------------------------------------------------------!
line con 0
password joliverie
login
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
privilege level 15
password cisco
login local
transport input ssh
line vty 5 15
privilege level 15
login local
transport input ssh
!
scheduler allocate 20000 1000
end
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
Configuration du Routeur 3 (INT)
Routeur 3 INT
!
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R3INT
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
ip subnet-zero
!
!
ip cef
ip flow-cache timeout active 5
!
!
!
!
!
!
!
interface Ethernet0
ip address 192.168.3.254 255.255.255.0
!
interface Ethernet1
ip address 192.168.0.253 255.255.255.0
duplex auto
!
ip classless
ip http server
no ip http secure-server
ip flow-export version 5
ip flow-export destination 192.168.0.204 65001
ip flow-top-talkers
top 10
sort-by bytes
cache-timeout 30000
!
!
snmp-server community public RO
Christopher Cassard
La Joliverie
Configuration des routeurs Cisco du réseau MDL
snmp-server community private RW
snmp-server enable traps tty
snmp-server enable traps config
!
control-plane
!
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
transport preferred all
transport output all
line vty 0 4
exec-timeout 120 0
login
length 0
transport preferred all
transport input all
transport output all
!
scheduler max-task-time 5000
end
Christopher Cassard
La Joliverie
Download