Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Building configuration...
- Current configuration : 20296 bytes
- !
- ! Last configuration change at 11:31:04 PCTime Thu Jun 7 2012 by admin
- version 15.1
- no service pad
- service tcp-keepalives-in
- service tcp-keepalives-out
- service timestamps debug datetime msec localtime show-timezone
- service timestamps log datetime msec localtime show-timezone
- service password-encryption
- service sequence-numbers
- !
- hostname PEL-VAN-GATE-01
- !
- boot-start-marker
- boot-end-marker
- !
- !
- security authentication failure rate 3 log
- security passwords min-length 6
- logging buffered 51200
- logging console critical
- enable secret 5 $1$oNd1$1X6LCr02kKRKet8oh8Phj/
- !
- aaa new-model
- !
- !
- aaa authentication login default local
- aaa authentication login ciscocp_vpn_xauth_ml_1 local
- aaa authentication login ciscocp_vpn_xauth_ml_2 local
- aaa authentication login ciscocp_vpn_xauth_ml_3 local
- aaa authorization exec default local
- aaa authorization network ciscocp_vpn_group_ml_1 local
- aaa authorization network ciscocp_vpn_group_ml_2 local
- aaa authorization network ciscocp_vpn_group_ml_3 local
- !
- !
- !
- !
- !
- aaa session-id common
- !
- clock timezone PCTime -8 0
- clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
- !
- no ipv6 cef
- no ip source-route
- ip cef
- !
- !
- !
- ip dhcp excluded-address 10.0.10.1 10.0.10.49
- !
- ip dhcp pool ccp-pool1
- network 10.0.10.0 255.255.255.0
- domain-name pelesys.local
- dns-server 204.244.3.129 204.244.3.130
- default-router 10.0.10.1
- lease 90
- !
- !
- no ip bootp server
- ip domain name pelesys.local
- ip name-server 204.244.3.129
- ip name-server 204.244.3.130
- !
- multilink bundle-name authenticated
- !
- !
- crypto pki token default removal timeout 0
- !
- crypto pki trustpoint TP-self-signed-993646292
- enrollment selfsigned
- subject-name cn=IOS-Self-Signed-Certificate-993646292
- revocation-check none
- rsakeypair TP-self-signed-993646292
- !
- !
- crypto pki certificate chain TP-self-signed-993646292
- certificate self-signed 01
- 30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
- 30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
- 69666963 6174652D 39393336 34363239 32301E17 0D313230 33313232 30313734
- 385A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
- 532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3939 33363436
- 32393230 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
- B7EBB61E BFBF756A C00B14F8 4B181126 C3F09EF7 D105FB0C 8B2EB552 3BBDE386
- 3B97155E F768C5F9 24A9BEAC 4589D2D7 FC39E1CD E01F62AA 1A44BD42 39AD881B
- BCD97C72 B85279E9 83D62B5B D1F1E529 A2BB9D0C 3DD3B161 7AB70736 24AD7975
- 6A91E0A1 3A997E2C 94D828BD 90E8506A 0EDA5DB5 EEE3C6DA 77422BB5 45428135
- 02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
- 23041830 168014FE 3118D330 01BEC62C 7EC74E00 87045766 318A9630 1D060355
- 1D0E0416 0414FE31 18D33001 BEC62C7E C74E0087 04576631 8A96300D 06092A86
- 4886F70D 01010505 00038181 004B2C4B 92BB83C7 68B03380 F0A5A6DB 0D994601
- 93F0071A DBC49E6F 80889BAB FFFA837C 9F16271D BE91B5C5 59706878 6BC83FE2
- F44B3851 C651F757 3C89F5A7 1B0A0059 9F39A074 A8150C30 AF11CCB7 9F44AEA6
- 180CB309 A47495F3 7EF3FF74 D743C794 5554146D FE7A53D6 03D827F0 809FE712
- 9B514D97 5BC4E0AE A27FDC4F DC
- quit
- license udi pid CISCO2911/K9 sn FGL161110JA
- !
- !
- username mkennedy privilege 15 view root secret 5 $1$jyJI$g6zupZVDX8vKT/E64yO4m.
- username admin privilege 15 secret 5 $1$d.qV$fZLHcDkgDX/2NL5vTI3AW0
- username mzheng privilege 15 secret 5 $1$q4T5$iLxmf9njTSGmzo8/bxHVn/
- username creynolds privilege 15 secret 5 $1$QB.M$WHf01B8ksAYupONS1oVow0
- !
- redundancy
- !
- !
- !
- !
- ip tcp synwait-time 10
- ip ssh time-out 60
- ip ssh authentication-retries 2
- !
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-1
- match access-group 105
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-3
- match access-group 110
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-2
- match access-group 108
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-5
- match access-group 114
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-4
- match access-group 111
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-7
- match access-group 102
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-6
- match access-group 115
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-9
- match access-group 124
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-8
- match access-group 122
- class-map type inspect match-all SDM_GRE
- match access-group name SDM_GRE
- class-map type inspect match-any CCP_PPTP
- match class-map SDM_GRE
- class-map type inspect match-any SDM_AH
- match access-group name SDM_AH
- class-map type inspect match-any ccp-skinny-inspect
- match protocol skinny
- class-map type inspect match-any SDM_ESP
- match access-group name SDM_ESP
- class-map type inspect match-any SDM_VPN_TRAFFIC
- match protocol isakmp
- match protocol ipsec-msft
- match class-map SDM_AH
- match class-map SDM_ESP
- class-map type inspect match-all SDM_VPN_PT
- match access-group 104
- match class-map SDM_VPN_TRAFFIC
- class-map type inspect match-any ccp-cls-insp-traffic
- match protocol dns
- match protocol ftp
- match protocol https
- match protocol icmp
- match protocol imap
- match protocol pop3
- match protocol netshow
- match protocol shell
- match protocol realmedia
- match protocol rtsp
- match protocol smtp
- match protocol sql-net
- match protocol streamworks
- match protocol tftp
- match protocol vdolive
- match protocol tcp
- match protocol udp
- class-map type inspect match-all ccp-insp-traffic
- match class-map ccp-cls-insp-traffic
- class-map type inspect match-any SDM_IP
- match access-group name SDM_IP
- class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC
- match protocol isakmp
- match protocol ipsec-msft
- match class-map SDM_AH
- match class-map SDM_ESP
- class-map type inspect match-all SDM_EASY_VPN_SERVER_PT
- match class-map SDM_EASY_VPN_SERVER_TRAFFIC
- class-map type inspect match-all SDM_VPN_PT0
- match access-group 109
- match class-map SDM_VPN_TRAFFIC
- class-map type inspect match-any ccp-h323nxg-inspect
- match protocol h323-nxg
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-10
- match access-group 126
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-11
- match access-group 129
- class-map type inspect match-any ccp-cls-icmp-access
- match protocol icmp
- match protocol tcp
- match protocol udp
- class-map type inspect match-all sdm-cls-VPNOutsideToInside-12
- match access-group 132
- class-map type inspect match-any ccp-h225ras-inspect
- match protocol h225ras
- class-map type inspect match-any ccp-h323annexe-inspect
- match protocol h323-annexe
- class-map type inspect match-any SDM_EASY_VPN_CTCP_SERVER_PT
- match access-group 116
- match access-group 117
- match access-group 118
- match access-group 119
- match access-group 120
- match access-group 121
- match access-group 127
- match access-group 128
- match access-group 130
- match access-group 131
- class-map type inspect match-any ccp-h323-inspect
- match protocol h323
- class-map type inspect match-all ccp-invalid-src
- match access-group 100
- class-map type inspect match-all ccp-icmp-access
- match class-map ccp-cls-icmp-access
- class-map type inspect match-any ccp-sip-inspect
- match protocol sip
- class-map type inspect match-all ccp-protocol-http
- match protocol http
- !
- !
- policy-map type inspect ccp-permit-icmpreply
- class type inspect ccp-icmp-access
- pass
- class class-default
- pass
- policy-map type inspect ccp-inspect
- class type inspect ccp-invalid-src
- pass
- class type inspect ccp-protocol-http
- inspect
- class type inspect ccp-insp-traffic
- inspect
- class type inspect ccp-sip-inspect
- inspect
- class type inspect ccp-h323-inspect
- inspect
- class type inspect ccp-h323annexe-inspect
- inspect
- class type inspect ccp-h225ras-inspect
- inspect
- class type inspect ccp-h323nxg-inspect
- inspect
- class type inspect ccp-skinny-inspect
- inspect
- policy-map type inspect ccp-permit
- class type inspect SDM_VPN_PT
- pass
- class type inspect SDM_EASY_VPN_CTCP_SERVER_PT
- inspect
- class class-default
- pass
- policy-map type inspect ccp-pol-outToIn
- class type inspect CCP_PPTP
- pass
- class type inspect sdm-cls-VPNOutsideToInside-1
- inspect
- class type inspect sdm-cls-VPNOutsideToInside-2
- inspect
- class type inspect sdm-cls-VPNOutsideToInside-3
- pass
- class type inspect sdm-cls-VPNOutsideToInside-4
- pass
- class type inspect sdm-cls-VPNOutsideToInside-5
- inspect
- class type inspect sdm-cls-VPNOutsideToInside-6
- inspect
- class type inspect sdm-cls-VPNOutsideToInside-7
- pass
- class type inspect sdm-cls-VPNOutsideToInside-8
- pass
- class type inspect sdm-cls-VPNOutsideToInside-9
- pass
- class type inspect sdm-cls-VPNOutsideToInside-10
- pass
- class type inspect sdm-cls-VPNOutsideToInside-11
- pass
- class type inspect sdm-cls-VPNOutsideToInside-12
- pass
- class class-default
- pass
- policy-map type inspect sdm-permit-ip
- class type inspect SDM_IP
- pass
- class type inspect sdm-cls-VPNOutsideToInside-5
- pass
- class type inspect sdm-cls-VPNOutsideToInside-6
- pass
- class type inspect sdm-cls-VPNOutsideToInside-9
- pass
- class type inspect sdm-cls-VPNOutsideToInside-10
- pass
- class type inspect sdm-cls-VPNOutsideToInside-11
- pass
- class type inspect sdm-cls-VPNOutsideToInside-12
- pass
- class class-default
- drop log
- !
- zone security out-zone
- zone security in-zone
- zone security ezvpn-zone
- zone-pair security ccp-zp-self-out source self destination out-zone
- service-policy type inspect ccp-permit-icmpreply
- zone-pair security ccp-zp-in-out source in-zone destination out-zone
- service-policy type inspect ccp-inspect
- zone-pair security ccp-zp-out-self source out-zone destination self
- service-policy type inspect ccp-permit
- zone-pair security ccp-zp-out-zone-To-in-zone source out-zone destination in-zone
- service-policy type inspect ccp-pol-outToIn
- zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone
- service-policy type inspect sdm-permit-ip
- zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone
- service-policy type inspect sdm-permit-ip
- zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone
- service-policy type inspect sdm-permit-ip
- zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone
- service-policy type inspect sdm-permit-ip
- zone-pair security sdm-zp-ezvpn-in2 source ezvpn-zone destination ezvpn-zone
- service-policy type inspect sdm-permit-ip
- !
- crypto logging ezvpn
- crypto ctcp port 10000
- !
- crypto isakmp policy 1
- encr 3des
- authentication pre-share
- group 2
- crypto isakmp key **REDACTED** address 66.119.163.2
- !
- crypto isakmp client configuration group Pelesys
- key **REDACTED**
- pool SDM_POOL_1
- acl 101
- save-password
- max-users 5
- max-logins 1
- netmask 255.255.255.0
- banner ^CPelesys Learning Systems Hosting Network.
- For Authorized use only by the Systems and Network Administration team. Any unlawful use will be prosecuted by law. ^C
- crypto isakmp profile ciscocp-ike-profile-1
- match identity group Pelesys
- client authentication list ciscocp_vpn_xauth_ml_1
- isakmp authorization list ciscocp_vpn_group_ml_1
- client configuration address initiate
- client configuration address respond
- virtual-template 1
- !
- !
- crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
- crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac
- !
- crypto ipsec profile CiscoCP_Profile1
- set transform-set ESP-3DES-SHA
- set isakmp-profile ciscocp-ike-profile-1
- !
- !
- crypto map SDM_CMAP_1 1 ipsec-isakmp
- description Tunnel to66.119.163.2
- set peer 66.119.163.2
- set transform-set ESP-3DES-SHA1
- match address 103
- crypto map SDM_CMAP_1 2 ipsec-isakmp
- description Tunnel to66.119.163.2
- set peer 66.119.163.2
- set transform-set ESP-3DES-SHA
- match address 123
- !
- crypto map SDM_CMAP_2 1 ipsec-isakmp
- description Tunnel to66.119.163.2
- set peer 66.119.163.2
- set transform-set ESP-3DES-SHA1
- match address 125
- !
- !
- !
- !
- !
- interface Null0
- no ip unreachables
- !
- interface Embedded-Service-Engine0/0
- no ip address
- no ip redirects
- no ip unreachables
- no ip proxy-arp
- ip flow ingress
- !
- interface GigabitEthernet0/0
- description $ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$$ETH-WAN$$FW_INSIDE$
- ip address 10.10.10.1 255.255.255.248
- no ip redirects
- no ip unreachables
- no ip proxy-arp
- ip flow ingress
- ip nat inside
- ip virtual-reassembly in
- zone-member security in-zone
- duplex auto
- speed auto
- no mop enabled
- !
- interface GigabitEthernet0/1
- description $ES_WAN$$FW_OUTSIDE$$ETH-WAN$
- ip address 204.244.50.254 255.255.255.0
- ip mask-reply
- no ip redirects
- no ip proxy-arp
- ip flow ingress
- ip nat outside
- ip virtual-reassembly in
- ip verify unicast reverse-path
- zone-member security out-zone
- duplex auto
- speed auto
- no mop enabled
- crypto map SDM_CMAP_2
- !
- interface GigabitEthernet0/2
- description $ES_LAN$$FW_INSIDE$$ETH-LAN$
- ip address 10.0.10.1 255.255.255.0
- no ip redirects
- no ip unreachables
- no ip proxy-arp
- ip flow ingress
- ip nat inside
- ip virtual-reassembly in
- zone-member security in-zone
- duplex auto
- speed auto
- no mop enabled
- !
- interface Virtual-Template1 type tunnel
- ip unnumbered GigabitEthernet0/1
- zone-member security ezvpn-zone
- tunnel mode ipsec ipv4
- tunnel protection ipsec profile CiscoCP_Profile1
- !
- ip local pool SDM_POOL_1 10.0.10.200 10.0.10.250
- ip forward-protocol nd
- !
- ip http server
- ip http access-class 2
- ip http authentication local
- ip http secure-server
- ip http timeout-policy idle 60 life 86400 requests 10000
- !
- ip dns server
- ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/1 overload
- ip nat inside source route-map SDM_RMAP_2 interface GigabitEthernet0/1 overload
- ip route 0.0.0.0 0.0.0.0 204.244.50.193 permanent
- !
- ip access-list extended ICMP
- remark ICMP
- remark CCP_ACL Category=1
- permit icmp any any
- ip access-list extended SDM_AH
- remark CCP_ACL Category=1
- permit ahp any any
- ip access-list extended SDM_ESP
- remark CCP_ACL Category=1
- permit esp any any
- ip access-list extended SDM_GRE
- remark CCP_ACL Category=1
- permit gre any any
- ip access-list extended SDM_IP
- remark CCP_ACL Category=1
- permit ip any any
- !
- logging trap debugging
- access-list 1 remark INSIDE_IF=GigabitEthernet0/2
- access-list 1 remark CCP_ACL Category=2
- access-list 1 permit 10.0.10.0 0.0.0.255
- access-list 2 remark HTTP Access-class list
- access-list 2 remark CCP_ACL Category=1
- access-list 2 permit 10.0.10.0 0.0.0.255
- access-list 2 permit 10.10.10.0 0.0.0.7
- access-list 2 deny any
- access-list 3 remark CCP_ACL Category=2
- access-list 3 permit 10.0.10.0 0.0.0.255
- access-list 100 remark CCP_ACL Category=129
- access-list 100 permit ip host 255.255.255.255 any
- access-list 100 permit ip 127.0.0.0 0.255.255.255 any
- access-list 100 permit ip 204.244.50.192 0.0.0.63 any
- access-list 101 remark CCP_ACL Category=4
- access-list 101 permit ip 10.0.10.0 0.0.0.255 any
- access-list 102 remark CCP_ACL Category=0
- access-list 102 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 102 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 103 remark CCP_ACL Category=4
- access-list 103 remark IPSec Rule
- access-list 103 permit ip 10.10.10.0 0.0.0.7 10.0.10.0 0.0.0.255
- access-list 103 remark IPSec Rule
- access-list 103 permit ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 104 remark CCP_ACL Category=128
- access-list 104 permit ip host 66.119.163.2 any
- access-list 104 permit ip any any
- access-list 105 remark CCP_ACL Category=0
- access-list 105 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 105 permit ip 10.0.10.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 106 remark CCP_ACL Category=2
- access-list 106 remark IPSec Rule
- access-list 106 deny ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 106 permit ip 10.0.10.0 0.0.0.255 any
- access-list 107 remark CCP_ACL Category=2
- access-list 107 remark IPSec Rule
- access-list 107 deny ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 107 permit ip 10.0.10.0 0.0.0.255 any
- access-list 108 remark CCP_ACL Category=0
- access-list 108 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 108 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 109 remark CCP_ACL Category=128
- access-list 109 permit ip host 66.119.163.2 any
- access-list 110 remark CCP_ACL Category=0
- access-list 110 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 110 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 111 remark CCP_ACL Category=0
- access-list 111 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 111 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 112 remark CCP_ACL Category=1
- access-list 112 permit tcp any any eq 10000
- access-list 113 remark CCP_ACL Category=1
- access-list 113 permit tcp any any eq 10000
- access-list 114 remark CCP_ACL Category=0
- access-list 114 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 114 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 115 remark CCP_ACL Category=0
- access-list 115 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 115 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 116 remark CCP_ACL Category=1
- access-list 116 permit tcp any any eq 10000 log
- access-list 117 remark CCP_ACL Category=1
- access-list 117 permit tcp any any eq 10000
- access-list 118 remark CCP_ACL Category=1
- access-list 118 permit tcp any any eq 10000
- access-list 119 remark CCP_ACL Category=1
- access-list 119 permit tcp any any eq 10000
- access-list 120 remark CCP_ACL Category=1
- access-list 120 permit tcp any any eq 10000
- access-list 121 remark CCP_ACL Category=1
- access-list 121 permit tcp any any eq 10000
- access-list 122 remark CCP_ACL Category=0
- access-list 122 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 122 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 123 remark CCP_ACL Category=4
- access-list 123 remark IPSec Rule
- access-list 123 permit ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 124 remark CCP_ACL Category=0
- access-list 124 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 124 permit ip 10.0.10.0 0.0.0.255 10.10.10.0 0.0.0.7
- access-list 125 remark CCP_ACL Category=4
- access-list 125 remark IPSec Rule
- access-list 125 permit ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 126 remark CCP_ACL Category=0
- access-list 126 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 127 remark CCP_ACL Category=1
- access-list 127 permit tcp any any eq 10000
- access-list 128 remark CCP_ACL Category=1
- access-list 128 permit tcp any any eq 10000
- access-list 129 remark CCP_ACL Category=0
- access-list 129 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- access-list 129 permit ip 10.0.10.0 0.0.0.255 192.168.1.0 0.0.0.255
- access-list 130 remark CCP_ACL Category=1
- access-list 130 permit tcp any any eq 10000
- access-list 131 remark CCP_ACL Category=1
- access-list 131 permit tcp any any eq 10000
- access-list 132 remark CCP_ACL Category=0
- access-list 132 permit ip 192.168.1.0 0.0.0.255 10.0.10.0 0.0.0.255
- !
- no cdp run
- !
- !
- !
- route-map SDM_RMAP_1 permit 1
- match ip address 106
- !
- route-map SDM_RMAP_2 permit 1
- match ip address 107
- !
- !
- snmp-server community public RO
- !
- !
- !
- control-plane
- !
- !
- banner exec ^C
- % Password expiration warning.
- -----------------------------------------------------------------------
- Cisco Configuration Professional (Cisco CP) is installed on this device
- and it provides the default username "cisco" for one-time use. If you have
- already used the username "cisco" to login to the router and your IOS image
- supports the "one-time" user option, then this username has already expired.
- You will not be able to login to the router with this username after you exit
- this session.
- It is strongly suggested that you create a new username with a privilege level
- of 15 using the following command.
- username <myuser> privilege 15 secret 0 <mypassword>
- Replace <myuser> and <mypassword> with the username and password you want to
- use.
- -----------------------------------------------------------------------
- ^C
- banner login ^CFree Punch and Pie after the meeting.
- ^C
- !
- line con 0
- transport output telnet
- line aux 0
- transport output telnet
- line 2
- no activation-character
- no exec
- transport preferred none
- transport input all
- transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
- stopbits 1
- line vty 0 4
- transport input telnet ssh
- line vty 5 15
- transport input telnet ssh
- !
- scheduler allocate 20000 1000
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement