Building configuration...
Current configuration : 17107 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
enable secret ******
!
aaa new-model
!
!
aaa authentication login NCL_AUTHEN local
aaa authentication ppp default local
aaa authorization network NCL_AUTHOR local
!
aaa session-id common
no ip cef
!
!
ip inspect udp idle-time 1800
ip inspect dns-timeout 7
ip inspect name FIREWALL cuseeme
ip inspect name FIREWALL ftp
ip inspect name FIREWALL h323
ip inspect name FIREWALL rcmd
ip inspect name FIREWALL realaudio
ip inspect name FIREWALL smtp
ip inspect name FIREWALL sqlnet
ip inspect name FIREWALL streamworks
ip inspect name FIREWALL tcp
ip inspect name FIREWALL tftp
ip inspect name FIREWALL udp
ip inspect name FIREWALL vdolive
ip inspect name FIREWALL icmp
ip inspect name FIREWALL http
ip inspect name FIREWALL sip
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.42.1 192.168.42.50
ip dhcp excluded-address 192.168.42.76 192.168.42.254
!
ip dhcp pool NCLDHCP
network 192.168.42.0 255.255.255.0
default-router 192.168.42.1
dns-server ******
!
!
no ip domain lookup
ip host r2 192.168.42.254
ip name-server ******
ip name-server ******
ip name-server ******
ip name-server ******
vpdn enable
!
vpdn-group L2TPGroup
! Default L2TP VPDN group
accept-dialin
protocol l2tp
virtual-template 1
l2tp security crypto-profile L2TP_PROFILE
no l2tp tunnel authentication
!
!
async-bootp dns-server ******
!
!
username ****** privilege 15 password ******
archive
log config
hidekeys
!
!
!
!
!
crypto isakmp policy 15
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 20
authentication pre-share
crypto isakmp key ****** address 0.0.0.0 0.0.0.0
crypto isakmp keepalive 40 5
crypto isakmp nat keepalive 20
!
crypto isakmp client configuration group ******
key ******
pool VPN_IP_Pool
acl 140
backup-gateway ******
!
!
crypto ipsec transform-set NCL_Tran_Set esp-des esp-md5-hmac
crypto ipsec transform-set L2TP_TRANS_SET esp-des esp-md5-hmac
mode transport
!
crypto dynamic-map NCL_Dyn_Map 1
set transform-set NCL_Tran_Set
reverse-route remote-peer
!
!
crypto map NCL_CMap client authentication list NCL_AUTHEN
crypto map NCL_CMap isakmp authorization list NCL_AUTHOR
crypto map NCL_CMap client configuration address initiate
crypto map NCL_CMap client configuration address respond
crypto map NCL_CMap 20 ipsec-isakmp dynamic NCL_Dyn_Map
crypto map NCL_CMap 25 ipsec-isakmp profile L2TP_PROFILE
set transform-set L2TP_TRANS_SET
!
!
!
interface Loopback0
ip address 192.168.51.1 255.255.255.0
!
interface Loopback1
ip address 192.168.58.1 255.255.255.0
!
interface FastEthernet0/0
description LAN_PORT
no ip address
ip virtual-reassembly
duplex auto
speed auto
!
interface FastEthernet0/0.1
encapsulation dot1Q 10
ip address 192.168.42.253 255.255.255.0
ip inspect FIREWALL in
ip pim sparse-dense-mode
ip nat inside
ip virtual-reassembly
ip policy route-map NO_NAT
ip igmp query-interval 125
standby 1 ip 192.168.42.1
standby 1 priority 150
standby 1 preempt
standby 1 track ATM0/1/0 150
standby 1 track Dialer2 150
!
interface FastEthernet0/0.2
encapsulation dot1Q 20
ip address 192.168.43.253 255.255.255.0
ip inspect FIREWALL in
ip pim sparse-dense-mode
ip nat inside
ip virtual-reassembly
ip policy route-map NO_NAT
standby 2 ip 192.168.43.1
standby 2 priority 150
standby 2 preempt
standby 2 track ATM0/1/0 150
standby 2 track Dialer2 150
!
interface FastEthernet0/1
description DMZ_PORT
ip address 192.168.60.1 255.255.255.0
ip access-group 130 in
ip inspect FIREWALL in
ip nat inside
ip virtual-reassembly
ip policy route-map NO_NAT
duplex auto
speed auto
!
interface ATM0/1/0
bandwidth 8096
no ip address
no atm ilmi-keepalive
dsl operating-mode auto
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 2
!
!
interface Virtual-Template1
ip unnumbered Loopback1
peer default ip address pool L2TP_POOL
ppp authentication chap ms-chap
!
interface Dialer2
description INTERNET PORT
bandwidth 8096
ip address ******
ip access-group 124 in
ip inspect FIREWALL in
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 2
dialer-group 2
no cdp enable
ppp authentication chap callin
ppp chap hostname ******
ppp chap password ******
crypto map NCL_CMap
!
ip local pool VPN_IP_Pool 192.168.50.100 192.168.50.150
ip local pool L2TP_POOL 192.168.58.2 192.168.58.5
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer2
!
ip http server
ip http authentication local
no ip http secure-server
!
ip nat inside source route-map NAT_MAP interface Dialer2 overload
!
logging 192.168.42.53
access-list 101 remark INTERNET NAT ACL
access-list 101 remark Deny VPN traffic from NAT process
access-list 101 deny ip 192.168.42.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 101 deny ip 192.168.43.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 101 deny ip 192.168.60.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 101 deny ip 192.168.203.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 101 deny ip 192.168.72.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 101 remark Match all other traffic for NAT
access-list 101 permit ip 192.168.42.0 0.0.0.255 any
access-list 101 permit ip 192.168.43.0 0.0.0.255 any
access-list 101 permit ip 192.168.60.0 0.0.0.255 any
access-list 101 permit ip 192.168.201.0 0.0.0.255 any
access-list 101 permit ip 192.168.71.0 0.0.0.255 any
access-list 101 permit ip 192.168.203.0 0.0.0.255 any
access-list 101 permit ip 192.168.72.0 0.0.0.255 any
access-list 124 remark FIREWALL ACL INTERNET
access-list 124 remark Permit incoming IKE VPN traffic
access-list 124 permit udp any any eq non500-isakmp
access-list 124 permit udp any any eq isakmp
access-list 124 permit esp any any
access-list 124 permit ahp any any
access-list 124 remark Permit Internet
access-list 124 permit tcp any any eq www
access-list 124 remark Permit Email
access-list 124 permit tcp any any eq smtp
access-list 124 remark Permit ICMP
access-list 124 permit icmp any any
access-list 124 remark Permit incoming PPTP
access-list 124 permit tcp any any eq 1723
access-list 124 permit gre any any
access-list 124 remark Permit incoming L2TP
access-list 124 permit udp any any eq 1701
access-list 124 remark Prevent spoof addresses
access-list 124 deny ip 10.0.0.0 0.255.255.255 any
access-list 124 deny ip 172.16.0.0 0.15.255.255 any
access-list 124 deny ip 192.160.0.0 0.15.255.255 any
access-list 124 deny ip 127.0.0.0 0.255.255.255 any
access-list 124 deny ip host 0.0.0.0 any
access-list 124 deny ip host 255.255.255.255 any
access-list 130 remark DMZ ACL
access-list 130 remark Permit DMZ to LAN Notes Ports
access-list 130 permit tcp host 192.168.60.x 192.168.42.0 0.0.0.255 eq 1352
access-list 130 permit tcp any any eq 1533
access-list 130 permit tcp host 192.168.60.x host 192.168.42.x eq 1503
access-list 130 permit tcp host 192.168.60.x host 192.168.42.x eq 1516
access-list 130 permit tcp host 192.168.60.x host 192.168.42.x eq 1503
access-list 130 permit tcp host 192.168.60.x host 192.168.42.x eq 1516
access-list 130 remark Deny DMZ to LAN all other ports
access-list 130 deny ip 192.168.60.0 0.0.0.255 192.168.42.0 0.0.0.255
access-list 130 remark Deny DMZ to Voice LAN
access-list 130 deny ip 192.168.60.0 0.0.0.255 192.168.43.0 0.0.0.255
access-list 130 remark Permit Server to everything else
access-list 130 permit ip host 192.168.60.x any
access-list 140 remark ISAKMP ACL
access-list 140 permit ip 192.168.42.0 0.0.0.255 192.168.42.0 0.0.0.255
access-list 140 permit ip 192.168.43.0 0.0.0.255 192.168.43.0 0.0.0.255
access-list 140 permit ip 192.168.51.0 0.0.0.255 192.168.51.0 0.0.0.255
access-list 140 permit ip 192.168.60.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 140 permit ip 192.168.50.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 140 permit ip 192.168.201.0 0.0.0.255 192.168.201.0 0.0.0.255
access-list 140 permit ip 192.168.70.0 0.0.0.255 192.168.70.0 0.0.0.255
access-list 140 permit ip 0.0.0.0 255.255.255.0 0.0.0.0 255.255.255.0
access-list 141 remark NONAT ACL
access-list 141 permit ip 192.168.42.0 0.0.0.255 192.168.42.0 0.0.0.255
access-list 141 permit ip 192.168.43.0 0.0.0.255 192.168.43.0 0.0.0.255
access-list 141 permit ip 192.168.50.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 141 permit ip 192.168.51.0 0.0.0.255 192.168.51.0 0.0.0.255
access-list 141 permit ip 192.168.60.0 0.0.0.255 192.168.60.0 0.0.0.255
access-list 141 permit ip 192.168.201.0 0.0.0.255 192.168.201.0 0.0.0.255
access-list 142 remark NONAT ACL
access-list 142 permit ip 192.168.42.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 142 permit ip 192.168.43.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 142 permit ip 192.168.50.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 142 permit ip 192.168.51.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 142 permit ip 192.168.60.0 0.0.0.255 192.168.50.0 0.0.0.255
access-list 142 permit ip 192.168.201.0 0.0.0.255 192.168.50.0 0.0.0.255
dialer-list 2 protocol ip permit
snmp-server community ****** RW
route-map NO_NAT permit 20
match ip address 141 142
set ip next-hop 192.168.51.2
!
route-map NAT_MAP permit 20
match ip address 101
set interface Dialer2
!
!
!
control-plane
!
alias exec crs copy run start
alias exec sr show run
!
line con 0
logging synchronous
login authentication NCL_AUTHEN
line aux 0
line vty 0 4
logging synchronous
login authentication NCL_AUTHEN
!
scheduler allocate 20000 1000
end
Quite a bit here! Router acts as IPSec server, DHCP server, L2TP server, has HSRP running (we have a second DLS connection) and is also performing Inter VLAN routing for a L2 switch, segregating voice and data networks
Thanks for your help Burt