Beste tweakers,
Introductie
Ik heb een Cisco 1801 router. Binnenkort ga ik overschakelen naar Telenet (kabelprovider) als primaire ISP
De 2de ISP wil ik echter behouden (voor als telenet wegvalt). De 2de ISP is Scarlet. Dit betreft een ADSL lijn.
Op dit moment ziet mijn running config er zo uit:
Om Telenet geconfigureerd te krijgen op de router heb ik het volgende in elkaar gestoken. Op dit moment heb ik nog geen telenet (wordt pas opgeleverd 3 december) maar ik wil de router configuratie alvast in orde hebben.
Ik zou echter mijn ADSL lijn willen gebruiken als failover. Indien Telenet wegvalt moet Scarlet het overnemen.
Ik heb reeds een aantal zaken gevonden zoals onderstaande configuratie waar ik een aantal zaken uit kan gebruiken:
Onderstaande links zijn ook interresant:
Wat ik niet snap:
(helpen met onbouwen). Indien jullie een aantal voorbeelden geven met extra uitleg dan kom ik al een heel eind verder.
Alvast bedankt om de TS door te lezen en voor de medewerking. Indien er nog extra info nodig is dan vraag je dit maar!
crash_burn
Introductie
Ik heb een Cisco 1801 router. Binnenkort ga ik overschakelen naar Telenet (kabelprovider) als primaire ISP
De 2de ISP wil ik echter behouden (voor als telenet wegvalt). De 2de ISP is Scarlet. Dit betreft een ADSL lijn.
Op dit moment ziet mijn running config er zo uit:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
| ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Cisco1801 ! boot-start-marker boot-end-marker ! no logging buffered enable secret ***** enable password ***** ! aaa new-model ! ! ! ! aaa session-id common no ip source-route ! ! ip cef ! ! ip tcp synwait-time 10 ip ftp username Administrator ip ftp password ***** no ip bootp server no ip domain lookup ip domain name scarlet.be ip name-server 193.74.208.65 ip name-server 194.119.228.67 ip ssh time-out 60 ip ssh authentication-retries 2 ip inspect max-incomplete high 800 ip inspect max-incomplete low 700 ip inspect one-minute low 500 ip inspect one-minute high 600 ip inspect udp idle-time 20 ip inspect tcp idle-time 60 ip inspect tcp synwait-time 20 ip inspect tcp max-incomplete host 300 block-time 0 ip inspect name firewall tcp timeout 3600 ip inspect name firewall udp timeout 15 ip inspect name firewall icmp ip inspect name firewall ftp timeout 3600 ip inspect name firewall ssh ip inspect name firewall telnet timeout 3600 ip inspect name firewall exec ip inspect name firewall echo timeout 3600 ip inspect name firewall smtp ip inspect name firewall sqlnet timeout 3600 ip inspect name firewall tftp timeout 3600 ip inspect name firewall rcmd timeout 3600 ip inspect name firewall snmp ip inspect name firewall http timeout 3600 ip inspect name firewall h323 timeout 3600 ip inspect name firewall dns timeout 3600 ip inspect name firewall ms-sql timeout 3600 ip inspect name firewall mysql timeout 3600 ip inspect name firewall https timeout 3600 ip inspect name firewall pop3 timeout 3600 ip inspect name firewall ftps timeout 3600 ip inspect name firewall ldap timeout 3600 ip inspect name firewall ldaps timeout 3600 ip inspect name firewall ldap-admin timeout 3600 ip inspect name firewall netbios-ns timeout 3600 ip inspect name firewall netbios-ssn timeout 3600 ip inspect name firewall telnets timeout 3600 ip inspect name firewall wins timeout 3600 ip inspect name firewall vdolive timeout 3600 ip inspect name firewall bittorrent timeout 3600 ip inspect name firewall finger timeout 3600 ip inspect name firewall imap timeout 3600 ip inspect name firewall imaps timeout 3600 ! multilink bundle-name authenticated vpdn enable ! ! crypto pki trustpoint TP-self-signed-4270858707 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-4270858707 revocation-check none rsakeypair TP-self-signed-4270858707 ! ! crypto pki certificate chain TP-self-signed-4270858707 certificate self-signed 01 3082024C 308201B5 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 34323730 38353837 3037301E 170D3039 30393134 31343130 32365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32373038 35383730 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100DD86 F2180A01 52D5C609 CD77A5FD 250F173B 4F6A4F0A 1F6016FE 56AC862E DF622CA3 DFD25FB0 5718276C 23F9D1CB 6D1A009A 9AF3BC16 4FA5B6A4 65A3DD4B 765B3CF0 3E325D9C 7C66D26E 9387B4FC 893C4DFA AB96C7C7 C1A15E7C 2ED97549 F3B6E09D 9A3C6FC5 05187204 91EABC28 1149DD85 B4678C29 EA90048B F601D776 256F0203 010001A3 74307230 0F060355 1D130101 FF040530 030101FF 301F0603 551D1104 18301682 14436973 636F3138 30312E73 6361726C 65742E62 65301F06 03551D23 04183016 80149A65 AE2E55C9 ACCA71D0 97210FD4 87CFAF7C 1008301D 0603551D 0E041604 149A65AE 2E55C9AC CA71D097 210FD487 CFAF7C10 08300D06 092A8648 86F70D01 01040500 03818100 8199022F 55DB4FBD 5EADB1C8 2D652A74 3C352E84 A809999C 0C346284 D31C9234 FDCDCFA3 56FC7770 0FF1E458 3F4A1E07 9D00770C E88FF993 8890A2A6 6F59FDED 57BCF82F FB17C22B 3D4066C2 663A1A84 FB90C278 39693635 3F03AE67 A0487BE9 5DED9D2A 79392955 9D87987D 53D23FA7 D55DCAD0 8EB7BD2C 8BDF45B8 E357D998 quit ! ! username *** privilege 15 secret **** username **** privilege 15 secret ***** ! ! class-map match-any SDM-Transactional-1 match dscp af21 match dscp af22 match dscp af23 class-map match-any SDM-Signaling-1 match dscp cs3 match dscp af31 class-map match-any SDM-Routing-1 match dscp cs6 class-map match-any SDM-Voice-1 match dscp ef class-map match-any SDM-Management-1 match dscp cs2 ! ! policy-map SDM-QoS-Policy-1 class SDM-Voice-1 priority percent 33 class SDM-Signaling-1 bandwidth percent 5 class SDM-Routing-1 bandwidth percent 5 class SDM-Management-1 bandwidth percent 5 class SDM-Transactional-1 bandwidth percent 5 class class-default fair-queue random-detect ! ! ! ! ! ! interface FastEthernet0 no ip address shutdown duplex auto speed auto ! interface BRI0 no ip address encapsulation hdlc shutdown ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3 ! interface FastEthernet4 ! interface FastEthernet5 ! interface FastEthernet6 ! interface FastEthernet7 ! interface FastEthernet8 ! interface ATM0 description De buitenwereld WAN no ip address no atm ilmi-keepalive pvc 8/35 pppoe-client dial-pool-number 1 ! dsl operating-mode auto hold-queue 224 in ! interface Vlan1 description Intern Lan ip address 10.10.10.1 255.255.255.0 ip access-group 101 in no ip redirects no ip unreachables no ip proxy-arp ip nat inside ip inspect firewall in ip inspect firewall out ip virtual-reassembly ip route-cache same-interface ip tcp adjust-mss 1452 ! interface Dialer0 ip address negotiated ip access-group 120 in ip mtu 1492 ip nat outside ip virtual-reassembly encapsulation ppp dialer pool 1 dialer-group 1 no cdp enable ppp authentication chap callin ppp chap hostname ******@SCARLET ppp chap password ****** ppp pap sent-username *****@SCARLET password ****** ! ip route 0.0.0.0 0.0.0.0 Dialer0 ! ! ip http server ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ip nat pool NAT-POOL 10.10.10.0 10.10.10.255 netmask 255.255.255.0 ip nat inside source list 101 interface Dialer0 overload ip nat inside source static tcp 10.10.10.80 3389 interface Dialer0 3389 ip nat inside source static tcp 10.10.10.80 21 interface Dialer0 21 ip nat inside source static tcp 10.10.10.80 110 interface Dialer0 110 ip nat inside source static tcp 10.10.10.80 1987 interface Dialer0 1987 ip nat inside source static tcp 10.10.10.80 1433 interface Dialer0 1433 ip nat inside source static tcp 10.10.10.80 443 interface Dialer0 443 ip nat inside source static tcp 10.10.10.80 25 interface Dialer0 25 ip nat inside source static tcp 10.10.10.80 80 interface Dialer0 80 ip nat inside source static tcp 10.10.10.80 3306 interface Dialer0 3306 ip nat inside source static tcp 10.10.10.80 1311 interface Dialer0 1311 ip nat inside source static tcp 10.10.10.80 8098 interface Dialer0 8098 ! logging trap debugging access-list 101 permit tcp 10.0.0.0 0.255.255.255 any access-list 101 permit udp 10.0.0.0 0.255.255.255 any access-list 101 permit icmp 10.0.0.0 0.255.255.255 any access-list 101 remark ACL om spoofing van andere netwerken tegen te gaan access-list 101 permit ip 10.10.10.0 0.0.0.255 any access-list 101 deny ip any any access-list 120 permit tcp any 0.0.0.0 255.255.255.0 established access-list 120 permit tcp host 10.10.10.3 any eq telnet access-list 120 permit tcp host 10.10.10.3 any eq 22 access-list 120 deny tcp any any eq 12345 access-list 120 deny tcp any any eq 12348 access-list 120 deny tcp any any eq 27374 access-list 120 deny tcp any any eq 31337 access-list 120 deny tcp any any eq lpd access-list 120 deny tcp any any eq cmd access-list 120 deny tcp any any eq whois access-list 120 deny udp any any eq snmptrap access-list 120 deny tcp any any eq telnet access-list 120 deny tcp any any eq 1080 access-list 120 deny tcp any any eq 135 access-list 120 deny tcp any any eq 137 access-list 120 deny tcp any any eq 138 access-list 120 deny tcp any any eq 22 access-list 120 deny tcp any any eq discard access-list 120 deny tcp any any eq chargen access-list 120 deny udp any any eq snmp access-list 120 deny tcp any any eq 139 access-list 120 deny tcp any any eq finger access-list 120 deny ip 127.0.0.0 0.255.255.255 any access-list 120 deny ip 192.168.0.0 0.0.0.255 any access-list 120 deny ip 172.16.0.0 0.0.255.255 any access-list 120 deny ip 224.0.0.0 31.255.255.255 any access-list 120 deny tcp any any eq exec access-list 120 deny icmp any any redirect access-list 120 deny tcp any any eq 6667 access-list 120 deny tcp any any eq login access-list 120 deny tcp any any eq 631 access-list 120 deny tcp any any eq 1214 access-list 120 deny icmp any any echo access-list 120 deny udp any any gt 32768 access-list 120 deny tcp any any eq echo access-list 120 deny udp any any eq echo access-list 120 deny tcp any any eq 1243 access-list 120 deny tcp any any eq 3128 access-list 120 permit tcp any any access-list 120 permit udp any any access-list 120 permit ip any any access-list 120 permit icmp any any access-list 120 deny ip any any dialer-list 1 protocol ip permit no cdp run ! ! ! ! ! ! control-plane ! bridge 1 protocol ieee banner motd C ====================================================== Alleen voor bevoegd personeel! Niet bevoegd? Oprotten! ====================================================== ! line con 0 transport output telnet line aux 0 transport output telnet line vty 0 4 privilege level 15 password *** transport input ssh ! end |
Om Telenet geconfigureerd te krijgen op de router heb ik het volgende in elkaar gestoken. Op dit moment heb ik nog geen telenet (wordt pas opgeleverd 3 december) maar ik wil de router configuratie alvast in orde hebben.
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
| Building configuration... Current configuration : 10469 bytes ! version 12.4 no service pad service tcp-keepalives-in service tcp-keepalives-out service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service sequence-numbers ! hostname Cisco1801 ! boot-start-marker boot-end-marker ! no logging buffered enable secret *** enable password *** ! no aaa new-model no ip source-route ! ip cef ip dhcp excluded-address 10.10.10.1 ! ! ip tcp synwait-time 10 ip ftp username Administrator ip ftp password **** no ip domain lookup ip domain name telenet.be ip name-server 193.74.208.65 ip name-server 194.119.228.67 ip ssh time-out 60 ip ssh authentication-retries 3 ip inspect max-incomplete high 800 ip inspect max-incomplete low 700 ip inspect one-minute low 500 ip inspect one-minute high 600 ip inspect udp idle-time 20 ip inspect tcp idle-time 60 ip inspect tcp synwait-time 20 ip inspect tcp max-incomplete host 300 block-time 0 ip inspect name firewall tcp timeout 3600 ip inspect name firewall udp timeout 15 ip inspect name firewall icmp ip inspect name firewall ftp timeout 3600 ip inspect name firewall ssh ip inspect name firewall telnet timeout 3600 ip inspect name firewall exec ip inspect name firewall echo timeout 3600 ip inspect name firewall smtp ip inspect name firewall sqlnet timeout 3600 ip inspect name firewall rcmd timeout 3600 ip inspect name firewall dns timeout 3600 ip inspect name firewall ms-sql timeout 3600 ip inspect name firewall mysql timeout 3600 ip inspect name firewall pop3 timeout 3600 ip inspect name firewall ftps timeout 3600 ip inspect name firewall ldap timeout 3600 ip inspect name firewall ldaps timeout 3600 ip inspect name firewall ldap-admin timeout 3600 ip inspect name firewall vdolive timeout 3600 ip inspect name firewall bittorrent timeout 3600 ip inspect name firewall imap timeout 3600 ip inspect name firewall imaps timeout 3600 ip inspect name firewall http timeout 3600 ip inspect name firewall https timeout 3600 ! multilink bundle-name authenticated vpdn enable ! ! crypto pki trustpoint TP-self-signed-4270858707 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-4270858707 revocation-check none rsakeypair TP-self-signed-4270858707 ! ! crypto pki certificate chain TP-self-signed-4270858707 certificate self-signed 01 3082024C 308201B5 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 34323730 38353837 3037301E 170D3039 30393134 31343130 32365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32373038 35383730 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100DD86 F2180A01 52D5C609 CD77A5FD 250F173B 4F6A4F0A 1F6016FE 56AC862E DF622CA3 DFD25FB0 5718276C 23F9D1CB 6D1A009A 9AF3BC16 4FA5B6A4 65A3DD4B 765B3CF0 3E325D9C 7C66D26E 9387B4FC 893C4DFA AB96C7C7 C1A15E7C 2ED97549 F3B6E09D 9A3C6FC5 05187204 91EABC28 1149DD85 B4678C29 EA90048B F601D776 256F0203 010001A3 74307230 0F060355 1D130101 FF040530 030101FF 301F0603 551D1104 18301682 14436973 636F3138 30312E73 6361726C 65742E62 65301F06 03551D23 04183016 80149A65 AE2E55C9 ACCA71D0 97210FD4 87CFAF7C 1008301D 0603551D 0E041604 149A65AE 2E55C9AC CA71D097 210FD487 CFAF7C10 08300D06 092A8648 86F70D01 01040500 03818100 8199022F 55DB4FBD 5EADB1C8 2D652A74 3C352E84 A809999C 0C346284 D31C9234 FDCDCFA3 56FC7770 0FF1E458 3F4A1E07 9D00770C E88FF993 8890A2A6 6F59FDED 57BCF82F FB17C22B 3D4066C2 663A1A84 FB90C278 39693635 3F03AE67 A0487BE9 5DED9D2A 79392955 9D87987D 53D23FA7 D55DCAD0 8EB7BD2C 8BDF45B8 E357D998 quit ! ! username *** privilege 15 secret ** username *** privilege 15 secret *** ! ! class-map match-any SDM-Transactional-1 match dscp af21 match dscp af22 match dscp af23 class-map match-any SDM-Signaling-1 match dscp cs3 match dscp af31 class-map match-any SDM-Routing-1 match dscp cs6 class-map match-any SDM-Voice-1 match dscp ef class-map match-any SDM-Management-1 match dscp cs2 ! ! policy-map SDM-QoS-Policy-1 class SDM-Voice-1 priority percent 33 class SDM-Signaling-1 bandwidth percent 5 class SDM-Routing-1 bandwidth percent 5 class SDM-Management-1 bandwidth percent 5 class SDM-Transactional-1 bandwidth percent 5 class class-default fair-queue random-detect ! ! ! ! ! ! interface FastEthernet0 ip address dhcp ip access-group 120 in description De buitenwereld WAN ip nat outside ip virtual-reassembly duplex auto speed auto no cdp enable ! interface BRI0 no ip address encapsulation hdlc shutdown ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3 ! interface FastEthernet4 ! interface FastEthernet5 ! interface FastEthernet6 ! interface FastEthernet7 ! interface FastEthernet8 ! interface ATM0 shutdown no ip address no atm ilmi-keepalive pvc 8/35 pppoe-client dial-pool-number 1 ! dsl operating-mode auto hold-queue 224 in ! interface Vlan1 description Intern LAN ip address 10.10.10.1 255.255.255.0 ip access-group 101 in no ip redirects no ip unreachables no ip proxy-arp ip nat inside ip inspect firewall in ip virtual-reassembly ip route-cache same-interface ip tcp adjust-mss 1452 ! no interface Dialer0 ! ip route 0.0.0.0 0.0.0.0 FastEthernet0 ! ! ip http server ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ip nat pool NAT-POOL 10.10.10.0 10.10.10.255 netmask 255.255.255.0 ip nat inside source list 101 interface FastEthernet0 overload ip nat inside source static tcp 10.10.10.80 3389 interface FastEthernet0 3389 ip nat inside source static tcp 10.10.10.80 21 interface FastEthernet0 21 ip nat inside source static tcp 10.10.10.80 110 interface FastEthernet0 110 ip nat inside source static tcp 10.10.10.80 1987 interface FastEthernet0 1987 ip nat inside source static tcp 10.10.10.80 1433 interface FastEthernet0 1433 ip nat inside source static tcp 10.10.10.80 443 interface FastEthernet0 443 ip nat inside source static tcp 10.10.10.80 25 interface FastEthernet0 25 ip nat inside source static tcp 10.10.10.80 80 interface FastEthernet0 80 ip nat inside source static tcp 10.10.10.80 3306 interface FastEthernet0 3306 ip nat inside source static tcp 10.10.10.80 1311 interface FastEthernet0 1311 ip nat inside source static tcp 10.10.10.80 8098 interface FastEthernet0 8098 ! logging trap debugging access-list 1 permit any access-list 101 deny ip any host 85.17.79.115 access-list 101 permit tcp host 10.10.10.3 any eq telnet access-list 101 permit tcp host 10.10.10.3 any eq 22 access-list 101 permit tcp host 10.10.10.80 any eq telnet access-list 101 permit tcp host 10.10.10.80 any eq 22 access-list 101 deny tcp any any eq telnet access-list 101 deny tcp any any eq 22 access-list 101 permit tcp 10.0.0.0 0.255.255.255 any access-list 101 permit udp 10.0.0.0 0.255.255.255 any access-list 101 permit icmp 10.0.0.0 0.255.255.255 any access-list 101 permit ip 10.10.10.0 0.0.0.255 any access-list 101 remark ACL om spoofing van andere netwerken tegen te gaan access-list 101 deny ip any any access-list 120 permit tcp any 0.0.0.0 255.255.255.0 established access-list 120 permit tcp host 10.10.10.3 any eq telnet access-list 120 permit tcp host 10.10.10.3 any eq 22 access-list 120 deny ip any host 85.17.79.115 access-list 120 deny tcp any any eq 12345 access-list 120 deny tcp any any eq 12348 access-list 120 deny tcp any any eq 27374 access-list 120 deny tcp any any eq 31337 access-list 120 deny tcp any any eq lpd access-list 120 deny tcp any any eq cmd access-list 120 deny tcp any any eq whois access-list 120 deny udp any any eq snmptrap access-list 120 deny tcp any any eq telnet access-list 120 deny tcp any any eq 1080 access-list 120 deny tcp any any eq 135 access-list 120 deny tcp any any eq 137 access-list 120 deny tcp any any eq 138 access-list 120 deny tcp any any eq 22 access-list 120 deny tcp any any eq discard access-list 120 deny tcp any any eq chargen access-list 120 deny udp any any eq snmp access-list 120 deny tcp any any eq 139 access-list 120 deny tcp any any eq finger access-list 120 deny ip 127.0.0.0 0.255.255.255 any access-list 120 deny ip 192.168.0.0 0.0.0.255 any access-list 120 deny ip 172.16.0.0 0.0.255.255 any access-list 120 deny ip 224.0.0.0 31.255.255.255 any access-list 120 deny tcp any any eq exec access-list 120 deny icmp any any redirect access-list 120 deny tcp any any eq 6667 access-list 120 deny tcp any any eq login access-list 120 deny tcp any any eq 631 access-list 120 deny tcp any any eq 1214 access-list 120 deny icmp any any echo access-list 120 deny udp any any gt 32768 access-list 120 deny tcp any any eq echo access-list 120 deny udp any any eq echo access-list 120 deny tcp any any eq 1243 access-list 120 deny tcp any any eq 3128 access-list 120 permit tcp any any access-list 120 permit udp any any access-list 120 permit ip any any access-list 120 permit icmp any any access-list 120 deny ip any any dialer-list 1 protocol ip permit no cdp run ! ! control-plane ! bridge 1 protocol ieee banner motd ^CC ====================================================== Alleen voor bevoegd personeel! Niet bevoegd? Oprotten! ======================================================^C ! line con 0 login local transport output telnet line aux 0 login local transport output telnet line vty 0 4 privilege level 15 password **** login local transport input telnet ssh ! end |
Ik zou echter mijn ADSL lijn willen gebruiken als failover. Indien Telenet wegvalt moet Scarlet het overnemen.
Ik heb reeds een aantal zaken gevonden zoals onderstaande configuratie waar ik een aantal zaken uit kan gebruiken:
code:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
| interface FastEthernet0/0 Description Primary link ISP1 ip address 12.x.x.x 255.255.255.240 ip nat outside interface FastEthernet1/0 Description Secondary link ISP2 ip address 76.x.x.x. 255.255.255.0 ip nat outside interface FastEthernet1/1 Description Inside LAN segment ip address 172.168.60.1 255.255.255.0 ip nat inside access-list 100 permit ip 172.168.60.0 0.0.0.255 any route-map isp1 permit 10 match ip address 100 match interface FastEthernet0/0 route-map isp2 permit 10 match ip address 100 match interface FastEthernet1/0 ip nat inside source route-map isp1 interface FastEthernet0/0 overload ip nat inside source route-map isp2 interface FastEthernet1/0 overload ip route 0.0.0.0 0.0.0.0 12.y.y.y -----> Primary Default route pointing towards Next hop ip of ISP1 ip route 0.0.0.0 0.0.0.0 76.y.y.y 10 -----> Backup Default route with higher AD (10) pointing towards Next hop ip of ISP2 the above example shows how we can perform Failover for PAT (Port Address Translation) for the traffic going out to Internet. By using route-maps and "match interface" option, we can achieve failover for Static NAT translation as well which is generally configured when services are hosted out to the internet like webserver or exchange server hosted inside accessible from Internet route-map isp1static permit 10 match interface FastEthernet0/0 route-map isp2static permit 10 match interface FastEthernet1/0 ip nat inside source static 172.168.60.2 12.x.x.x route-map isp1static ip nat inside source static 172.168.60.2 76.x.x.x route-map isp2static |
Onderstaande links zijn ook interresant:
- http://community.spicewor...cisco-dual-wan-redundancy
- http://docwiki.cisco.com/...ter_Configuration_Example
Wat ik niet snap:
- Hoe zit het dan met de access-lists? Nu pas je een access-list toe op een interface. Hoe dien in dit te doen als ik met 2 ISP's ga werken
- Wat met de portforwards? Mijn server moet wel bereikbaar blijven indien Telenet wegvalt (hier draait een dyndns client op dus dit mag geen probleem vormen).
(helpen met onbouwen). Indien jullie een aantal voorbeelden geven met extra uitleg dan kom ik al een heel eind verder.
Alvast bedankt om de TS door te lezen en voor de medewerking. Indien er nog extra info nodig is dan vraag je dit maar!
crash_burn