Configuration Cisco 1905.

I have a facility where the client uses 1905 router to access the Internet. They have a local network with 192.168.1.0/24 segment and a segment of WAN of 150.129.126.168/29 provided by the ISP.

Currently, they use a D-Link router for internet access and his works fine. But when we use the Cisco router with config below, users are unable to access the internet.

Cisco config:

gi0/0---192.168.1.1/24 (LAN) interface

interface gi0/1---150.129.126.170/29 (WAN)

IP route - 0.0.0.0 0.0.0.0 150.129.126.169

Pool DHCP - 192.168.1.180 to 192.168.1.199

Now, since we use Pvt Ip in the network segment local and Public WAN, I feel that we must run NAT for users to access the internet. But not quite sure how to do it.

Any suggestions and help in this regard would be highly appreciated :).

Hi chinmoy.boruah1,

You can use the following commands:

R1 (config) #ip - 7 standard access list

R1 (config-std-nacl) #permit 192.168.1.0 0.0.0.255

R1 (config) #ip nat inside source list 7 g0/1 interface overload

R1 (config) #interface gi0/0

R1(Config-if) #ip nat inside

R1 (config) #interface gi0/1

R1(Config-if) nat outside #ip

If you need more information about the different ways to configure nat this will help you to:

http://www.Cisco.com/c/en/us/TD/docs/iOS-XML/iOS/ipaddr_nat/configuratio...

Hope this info helps!

Note If you help!

-JP-

Tags: Cisco Support

Similar Questions

  • Configuration Cisco AP 2600 (AIR-CAP2602I-E-K9) and Cisco 2500 wireless controller?

    This is the first time that I work with this type of devices (Cisco Ap 2600 (AIR-CAP2602I-E-K9) and wlc 2500)... my experience to the CCNP (router and Switch)

    How configuration Cisco Ap 2600 (AIR-CAP2602I-E-K9) and wlc 2500?

    Please find attachment (Cisco device map)

    Hello

    Here are the docs for you to configure the Basic for AP switch port configuration IE 2600 s and wlc.

    WLC port must be configured as a trunk.

    Port of the AP must be access.

    CAP2600 series requires software 7.2.110.0 wlc minimum (make sure you have it or above release)

    Upgrade if you follow it.

    http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_configuration_example09186a00805f381f.shtml

    1. http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080665cdf.shtml (SW port configs)

    2. http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00806c9e51.shtml

    (Another thing very importand, discovery mechanism, choose properly)

    If you choose the option dhcp 43, it uses the TLV format. Type is always f1, the length is 4 * (wlc number for which you want to provide discovery for, in your case) Value = Hex conversion of the wlc management ip address.

    A video for the process of

    http://www.youtube.com/watch?v=oOh_Iv1CHxQ.

    Thank you

    Sahil

  • Help to configure cisco

    Hi all

    I need your help here I am trying to configure a router Cisco 881 when infact I have a connection which reached the Wan port on the router, I set up 88.le XXX (public IP) I put the default gateway etc... his short film works because when I ping the IP to the outside, than it works
    My problem, I want to have internet on my FastEthernet port 0, I configured a dhcp 192.168.0.X albums pool it works but I got no internet despite having the nat outside inside put the road, so I added a static route, but it is not the copy of my config work thank you.

    1 running-config #show
    Building configuration...

    Current configuration: 5424 bytes
    !
    ! Last configuration change at 15:56:09 UTC Thursday, March 13, 2014 by admin
    version 15.2
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    hostname R1
    !
    boot-start-marker
    boot-end-marker
    !
    !
    logging buffered 51200 warnings
    !
    No aaa new-model
    iomem 10 memory size
    !
    Crypto pki trustpoint TP-self-signed-2132292671
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2132292671
    revocation checking no
    rsakeypair TP-self-signed-2132292671
    !
    !
    TP-self-signed-2132292671 crypto pki certificate chain
    certificate self-signed 01
    3082022B XXXXXXXXXXXXXXXXXXXXXXXXXXXX
    !
    !
    !
    DHCP excluded-address IP 10.10.10.1
    DHCP excluded-address IP 192.168.0.254
    !
    DHCP IP CCP-pool
    import all
    Network 10.10.10.0 255.255.255.248
    default router 10.10.10.1
    Rental 2 0
    !
    IP dhcp pool vlan5
    network 192.168.0.0 255.255.255.0
    default router 192.168.0.254
    Server DNS 8.8.8.8
    !
    !
    !
    no ip domain search
    "yourdomain.com" of the IP domain name
    IP cef
    No ipv6 cef
    !
    !
    license udi pid CISCO881-K9 sn FCZ18047124
    !
    !
    !
    !
    !
    !
    !
    property intellectual ssh version 2
    !
    !
    !
    !
    !
    !
    !
    !
    !
    interface FastEthernet0
    switchport access vlan 5
    no ip address
    !
    interface FastEthernet1
    no ip address
    !
    interface FastEthernet2
    no ip address
    !
    interface FastEthernet3
    no ip address
    !
    interface FastEthernet4
    IP 84.14.XXX. X 255.255.255.248
    NAT outside IP
    IP virtual-reassembly in
    automatic duplex
    automatic speed
    !
    interface Vlan1
    Description $ETH_LAN$
    IP 10.10.10.1 255.255.255.248
    IP tcp adjust-mss 1452
    !
    interface Vlan5
    IP 192.168.0.254 255.255.255.0
    !
    default IP gateway - 84.14.209.185
    IP forward-Protocol ND
    IP http server
    23 class IP http access
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    IP nat inside source list 2 interface FastEthernet4 overload
    IP route 0.0.0.0 0.0.0.0 84.14.209.185
    !
    access-list 2 allow 192.168.0.0 0.0.0.255
    not run cdp
    !
    !
    exec banner ^ C
    % Warning of password expiration.
    -----------------------------------------------------------------------

    Professional configuration Cisco (Cisco CP) is installed on this device
    and it provides the default username "cisco" single use. If you have
    already used the username "cisco" to connect to the router and your IOS image
    supports the option "unique" user, that user name is already expired.
    You will not be able to connect to the router with the username when you leave
    This session.

    It is strongly recommended that you create a new user name with a privilege level
    15 using the following command.

    username secret privilege 15 0

    Replace and with the username and password you
    you want to use.

    -----------------------------------------------------------------------
    ^ C
    connection of the banner ^ C
    -----------------------------------------------------------------------
    Professional configuration Cisco (Cisco CP) is installed on this device.
    This feature requires the unique use of the user name "cisco" with the
    password "cisco". These default credentials have a privilege level of 15.

    YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE
    IDENTIFICATION INFORMATION PUBLICLY KNOWN

    Here are the Cisco IOS commands.

    username secret privilege 15 0
    No username cisco

    Replace and with the username and password
    to use.

    IF YOU DO NOT CHANGE THE IDENTIFICATION INFORMATION PUBLICLY KNOWN, YOU WILL HAVE
    NOT BE ABLE TO CONNECT TO THE DEVICE AGAIN ONCE YOU HAVE DISCONNECTED.

    For more information about Cisco CP, you follow the instructions of the
    Of your router's QUICK START GUIDE or go to http://www.cisco.com/go/ciscocp
    -----------------------------------------------------------------------
    ^ C
    !
    Line con 0
    local connection
    no activation of the modem
    line to 0
    line vty 0 4
    access-class 23 in
    privilege level 15
    password
    opening of session
    entry ssh transport
    line vty 5 15
    access-class 23 in
    privilege level 15
    local connection
    transport input telnet ssh
    !
    !
    end

    Add below

    interface Vlan5

    IP nat inside

  • IP SLA WORKS IS NOT ON THE ROUTER CISCO 1905

    Hello

    I use a 1905 series cisco router in my office, I have two links in this router.

    The problem is that I am not able to configure IP SLAs at this router.

    Here's the model and this router IOS image.

    Model - CISCO1905/K9

    IOS: c1900-universalk9-mz. Spa. 151 - 4.M4.bin

    its display under option only.

    srbi_shillong (config) #ip als?
    authentication MD5 use Keychain for IP SLA control Messages
    answering machine activate IP SLAS responder

    can someone tell me what IOS will support IP sla in this router?

    Thanks in advance...

    Good evening

    You need the DATA license installed on the router. Basic IP license only provides IP SLAS responder feature that you see.

  • Backup of configuration Cisco Codec C40

    Dear all,

    Can I know how to take backup of the configuration of the Cisco Codec C40, please?

    And also help me with the document of the administrator?

    Thanks in advance

    Kind regards

    Syed

    You can simply copy the output of the xConfiguration and paste it into the SSH client.  You may need to change the output a bit to get the correct formatting, however.  For example, the output registered since my SHH client contains a preceding * c which must be removed before that I can stick again in the SSH client:

    *c xConfiguration Video Wallpaper: Waves
    When you perform a software update, codec configuration, including the keys installed option is not affected and will remain in the process. Keys options include Premium (PR), double (DD) display resolution and Multisite (MS). C40 has been end of sales since June 2015, so it is not possible to order anything for this, see eos-eol-notice-c51-733467. Procedure to upgrade the software codec is on pg 28, the same page mentioned in my previous answer. To upgrade codec software, you will need a release key when switching from one major version to another, as TC5 to TC7. You can request a release of the Cisco Licensing Portal key > obtain other Licenses > telepresence free software key, as long as the device has an active support contract. If you do not have an active support contract, you can contact TAC and get the free unlock key by referencing the Security Advisory cisco-sa-20160504-tpxml, which you can get a key to unlocking TC7.
  • Configuration Cisco 1921

    I am configuring a Cisco 1921 router to connect with my cable modem.  The router gets an IP address from the DHCP server and I can ping resources on the internet on the router.   The router distributes DHCP addresses to clients, but clients are unable to access the internet.  I'm missing something simple.  Here is my config:

    R1-1921 #sh run
    Building configuration...
    Current configuration: 6236 bytes
    !
    ! 19:11:22 EST configuration was last modified Thursday, November 5, 2015 by *.
    version 15.3
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    hostname R1-1921
    !
    boot-start-marker
    boot system flash: c1900-universalk9-mz. Spa. 153 - 3.M6.bin
    boot-end-marker
    !
    !
    logging buffered 51200 warnings
    enable secret 5 $1$ F3oi$ EtowSjpBITAVsWVxr4EDM.
    activate the password *.
    !
    No aaa new-model
    No process cpu extended history
    No pork process autoprofile cpu
    iomem 10 memory size
    clock timezone IS - 5 0
    clock to summer time EDT recurring
    !
    !
    !
    !
    DHCP excluded-address 192.168.1.1 IP 192.168.1.100
    DHCP excluded-address IP 192.168.1.201 192.168.1.254
    DHCP excluded-address 192.168.2.1 IP 192.168.2.100
    DHCP excluded-address 192.168.2.201 IP 192.168.2.254
    DHCP excluded-address IP 10.10.10.1 10.10.10.100
    DHCP excluded-address IP 10.10.10.201 10.10.10.254
    DHCP excluded-address IP 192.168.20.1 192.168.20.100
    DHCP excluded-address IP 192.168.20.201 192.168.20.254
    !
    IP dhcp pool vlan2_Home_DHCP
    network 192.168.2.0 255.255.255.0
    F104.0a0a.140b hexagonal option 43
    domain name *.
    Server DNS 8.8.8.8 8.8.4.4
    default router 192.168.2.254
    Rental 7
    !
    IP dhcp pool vlan10_Home_DHCP
    Network 10.10.0.0 255.255.0.0
    F104.0a0a.140b hexagonal option 43
    domain name *.
    default router 10.10.10.1
    Server DNS 8.8.8.8 8.8.4.4
    Rental 7
    !
    IP dhcp pool vlan20_Home_DHCP
    network 192.168.20.0 255.255.255.0
    F104.0a0a.140b hexagonal option 43
    domain name *.
    Server DNS 8.8.8.8 8.8.4.4
    default router 192.168.2.254
    Rental 7
    !
    IP dhcp pool vlan1_Home_DHCP
    network 192.168.1.0 255.255.255.0
    F104.0a0a.140b hexagonal option 43
    domain name *.
    Server DNS 8.8.8.8 8.8.4.4
    by default-router 192.168.1.254
    Rental 7
    !
    !
    !
    IP domain name *.
    IP cef
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    !
    Crypto pki trustpoint TP-self-signed-2424561219
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 2424561219
    revocation checking no
    rsakeypair TP-self-signed-2424561219
    !
    !
    TP-self-signed-2424561219 crypto pki certificate chain
    certificate self-signed 01
    3082022B 30820194 02020101 300 D 0609 2A 864886 F70D0101 05050030 A0030201
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
    69666963 32343234 35363132 6174652D 3139301E 170 3135 31313032 31383034
    35395A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 32 34323435 65642D
    36313231 3930819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
    81008E99 C46CD1DA 4626A4A1 614268 HAS 4 FC70E1B0 66E4D691 6F1DDA9E EE15D3D6
    44469CAF D9EB6EAF B155D164 5E75CD1E B0541204 98C7BC8A E973A18A 852F7BC3
    09B33BDB C4C63C75 4C8B7A60 BA3BB4E7 C980BDFA 35F50803 C92973F4 19A 90217
    48E993E3 BFC1EE4D C9A8ABE7 C094E89B 9629195A 0763605 A D577278C B8C39AB9
    010001A 3 53305130 1 130101 FF040530 030101FF 301F0603 0F060355 0CEF0203
    551 2304 18301680 14B9ECCC A5378EAC C33EA600 3A11948F 56021544 74301 06
    03551D0E 04160414 B9ECCCA5 378EACC3 3EA6003A 11948F56 02154474 300 D 0609
    2A 864886 05050003 81810046 FC666C70 E65C191B 951D69CC BE68D6D1 F70D0101
    B5EC7175 ED432B26 7C44E882 1 C 04F30A7C 006392 E782CB04 CC898FD4 2B5F9085
    A84DB5BA 0996408A 46D36AE7 20A4BADA D418EC0D F7A94E46 08782215 C7EEF16F
    998E78F0 17026E9A 0705D4F7 FCEEED19 AB467E35 6A8E2CED A35BD0C3 236CF87D
    76F3BF78 45D940EF DF0A8934 D411F3
    quit smoking

    udi pid CISCO1921/K9 sn license *.
    !
    !
    !
    redundancy
    !
    !
    !
    !
    !
    property intellectual ssh time 60
    !
    !
    !
    !
    !
    !
    !
    !
    !
    interface Loopback0
    172.40.59.1 the IP 255.255.255.255
    !
    the Embedded-Service-Engine0/0 interface
    no ip address
    Shutdown
    No cdp enable
    !
    interface GigabitEthernet0/0
    no ip address
    automatic duplex
    automatic speed
    No cdp enable
    No mop enabled
    !
    interface GigabitEthernet0/0.1
    encapsulation dot1Q 1 native
    IP 192.168.1.253 255.255.255.0
    No cdp enable
    !
    interface GigabitEthernet0/0.2
    encapsulation dot1Q 2
    192.168.2.253 IP address 255.255.255.0
    No cdp enable
    !
    interface GigabitEthernet0/0.10
    encapsulation dot1Q 10
    IP 10.10.10.1 255.255.0.0
    No cdp enable
    !
    interface GigabitEthernet0/0.20
    encapsulation dot1Q 20
    address 192.168.20.1 255.255.255.0
    No cdp enable
    !
    interface GigabitEthernet0/1
    DHCP IP address
    no ip redirection
    no ip proxy-arp
    NAT outside IP
    IP virtual-reassembly in
    automatic duplex
    automatic speed
    No cdp enable
    !
    IP forward-Protocol ND
    !
    no ip address of the http server
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    IP nat inside source list 1 interface GigabitEthernet0/1 overload
    IP default-network 192.168.1.0
    IP route 0.0.0.0 0.0.0.0 dhcp 20
    !
    no routing capabilities-Manager service
    not run cdp
    !
    !
    access-list 1 permit 192.168.1.0 0.0.0.255
    access-list 2 allow to 192.168.10.0 0.0.0.255
    access-list 2 allow 192.168.20.0 0.0.0.255
    access-list 2 allow 192.168.30.0 0.0.0.255
    access-list 2 permit 192.168.40.0 0.0.0.255
    access-list 2 allow to 192.168.1.0 0.0.0.255
    access-list 2 allow 10.10.20.0 0.0.0.255
    access-list 3 Let 192.168.10.0 0.0.0.255
    access-list 3 allow 192.168.20.0 0.0.0.255
    access-list 3 allow 192.168.30.0 0.0.0.255
    access-list 3 permit 192.168.40.0 0.0.0.255
    access-list 3 Let 192.168.1.0 0.0.0.255
    access-list 23 allow 10.10.10.0 0.0.0.7
    !
    control plan
    !
    !
    !
    Line con 0
    exec-timeout 0 0
    local connection
    line to 0
    line 2
    no activation-character
    No exec
    preferred no transport
    transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
    StopBits 1
    line vty 0 4
    privilege level 15
    local connection
    transport of entry all
    line vty 5 15
    privilege level 15
    local connection
    transport of entry all
    !
    Scheduler allocate 20000 1000
    !
    end

    Your modem might need routes to subnets and the NAT configuration for these subnets.

    However, another way to do it is NAT CBC all IP addresses to the IP of the interface gi0/1 looks you can try to do.

    If you don't then.

    (1) you must add 'ip nat inside' to every subinterface

    (2) the ACL for your NAT made reference only 192.168.1.x customers while your other ACL refers all subnets.

    If you want to have all subnets access the internet turn it into NAT reference one another ACLs

    (3) don't know what you're doing with the statement "ip default-network 192.168.1.0.

    Just remove it and use the default route you have in your configuration and you don't need to add an ad at the end.

    Jon

  • configuration cisco air-ap1142n-a-k9 problem wpa2 wireless access point

    HI people,

    I am brand new to Cisco Wireless, just that I bought new wireless access point air-ap1142n-a-k9 cisco, try to configure the configuration of wpa2 for security reason, but impossible to configure in any mode security. So my AP is currently no security / encryption mode.

    Could someone can help and suggest me I will appreciate if I get all documents, so the security problem can be solved.

    Concerning

    Sanjeev

    OK great

    ----------------------------------------------------------------------------------------------------------------------

    Be sure to note the correct answer and mark the thread as answered

  • Configuration Cisco 881

    Hi all

    Let me start by saying I've searched high and low to find answers to my questions but couldn't find one. So here: I'm not very familiar with Cisco products. I have some knowledge and experience with configuration of routers/switches but all very basic. Today, we received our new router to our business environment. A standard C881 Cisco-K9. Our previous router was a model House and not suitable for our needs.

    -Configuration of the WAN port. We have a fiber of our ISP connection, the modem they provide has a useful interface that we can use our internet connection. Basically just connect our router to the router with a network (RJ-45 UTP) cable. Very basic, but it is that we put in some very specific IP on our router on the router to communicate. No DHCP on our side of the ISP; I have to put in manually by default, a gateway address DNS, subnet mask and IP address. How to proceed on the CLI? What are the commands once I have access to the port to the WAN interface?

    -I know a little how configure DHCP for our workstations, but one thing that has been a problem, is that the ports are L2 according to the router. Once I put in the no command switchport, in order to be able to assign a DHCP server to an interface I get a message prompt that the command was not disabled or something like that. How to solve this?

    -How can I set up a VPN on a specific interface on the router port? And is it possible to use the portfast on this interface once said VPN is enabled? I need to do this because our mediaplayers running on Android have problems with the VPN and DHCP at the same time. And static assignment does not work, I tried.

    I would be very grateful for your help!

    Hello

    Assuming the following:

    1. WAN interface is GigabitEthernet0/0
    2. Static IP address given to you is 1.1.1.1/30
    3. Default gateway is 1.1.1.2.
    4. LAN is GigabitEthernet0/1 and is configured as 192.168.1.1
    5. LAN subnet is 192.168.1.0/24

    -To set up your interface WAN from the Global Configuration mode:

    interface GigabitEthernet0/0

    IP 1.1.1.1 255.255.255.252

    no downtime

    IP route 0.0.0.0 0.0.0.0 1.1.1.2

    ! You need to configure NAT as well!

    -To set up your DHCP for your local network:

    int vlan 1 (or any VLAN that you use)

    IP 192.168.1.1 255.255.255.0

    !

    DHCP excluded-address 192.168.1.1 IP 192.168.1.10

    !

    IP dhcp data pool

    network 192.168.1.0 255.255.255.0

    default router 192.168.1.1

    business domain name

    Server DNS 8.8.8.8 8.8.4.4

    0 8 rental

    More details: http://www.internetworkingcareer.com/ccna/how-to-configure-your-cisco-router-as-a-dhcp-server/

    -The VPN will be implemented on the WAN interface. If you have problems 'VPN and DHCP', then your VPN probably is not configured correctly. PortFast can not be enabled on a port of layer 3, and even though it is possible he would do nothing since STP does not run on it. Just forget about Portfast altogether when you think of your VPN.

    I hope this helps!

    Kind regards

    Tim

    Please don't forget to rate helpful messages and mark the answers accurate.

  • Backup folder Configuration Cisco first infrastructure 2.0?

    Hi all

    where is the backup devices folder in PI 2.0 configuration, I tried searching with winscp for *.cfg but have not found anything.

    the most funny thing is when I am connected via the WEB (GUI), I can see the configurations of devices (under configuration of archive).

    so anyone know where is the file?

    Thank you

    Dawit

    Hi Dawit,

    https://supportforums.Cisco.com/message/3975460#3975460

    check the thread above, hope this will answer your query...

    Thank you-
    Alya
    [Note the useful post]
    Ratings encourage contributors *.

  • configuration Cisco No. 2851 IPS intrusion prevention system

    Hi, I wonder - could someone guide me to the implementation of IPS intrusion prevention system. I'm new to the world of cisco and still did not have my head around it. for the intrusion prevention system IPS I put 0/1 (lan) entrants and g 0/0 as a wan?

    Hello

    You must be careful when activating the IP address of your router. Category will activate you more cpu/memory will be used, and your router may crash.

    I'll write all the config as directly here, because it is a good step by step by Cisco:

    http://www.Cisco.com/c/en/us/products/collateral/security/iOS-intrusion-...

    I'll also join a best practice document from Cisco.

    IPS/signature of software should be found on the Cisco's Web site: https://software.cisco.com/download/release.html?mdfid=282941564&reltype...

    To answer your question, you can do inbound and outbound on your WAN interface (attacks should come first to the outside).

    If you have enough power, why not do as well on the LAN but I will recommend doing it on the WAN, organize and when you're comfortable, you can create one for the LAN interface.

    Here is a config I made for a cisco 892 router which works fine:

    IP IP config flash card: ips try again 1
    IP IP address notify CETS
    IPS the ips name iosips IP list
    !
    category-signature IP ips
    all categories
    true retreat
    category ios_ips base
    fake retirement
    category all-ddos ddos
    fake retirement
    enabled true
    products-alert event-action connection tcp reset-deny-package-inline connection inline deny deny-attacker-inserted
    category, any adware/spyware-adware/spyware
    fake retirement
    enabled true
    products-alert event-action connection tcp reset-deny-package-inline connection inline deny deny-attacker-inserted
    category virus/worms/trojans botnet
    fake retirement
    enabled true
    products-alert event-action connection tcp reset-deny-package-inline connection inline deny deny-attacker-inserted
    category virus/worms/trojans all-viruses/worms/trojans
    fake retirement
    enabled true
    products-alert event-action connection tcp reset-deny-package-inline connection inline deny deny-attacker-inserted
    category models internet_edge
    Advanced ios_ips category
    fake retirement
    !

    ips-setting IP to auto update
    occur - 0 0 06 weekly
    Cisco
    username password xxxxxx xxxxx

    !

    !

    IPS extended IP access list
    allow a full tcp
    allow a udp
    allow icmp a whole
    allow an ip

    I don't know if you have a firewall on your local network, but when I do IPS on a cisco router if there is no firewall, I recommend you to activate ZBF on router itself. This allows to add a little more security.

    Just in case, under a ZBF configuration for home router (like the 892 series):

    extended access IP MANAGEMENT list
    permit tcp any any eq 22
    allow icmp a whole
    !
    Underisable extended IP access list
    deny ip host fragments 224.0.0.5


    deny ip host fragments 224.0.0.6
    refuse the host ip 224.0.0.5 no fragment
    refuse the host ip 224.0.0.6 no fragment
    permit icmp any any fragment
    allow udp any any fragment
    permit tcp any any fragment
    permit tcp any RST eq 639
    permit tcp any RST bgp eq
    IP enable any no fragment
    !
    zbf-wan-to-lan extended IP access list
    permit tcp any host 192.168.0.1 eq 3389 ===> internal of the server accessible from the internet (port forwarding)
    !
    type of class-card inspect entire game Internet
    group-access name zbf-wan-to-lan game
    class-map correspondence class-mgmt
    match the name of group-access MANAGEMENT
    unwanted match class-map
    match the name of group-access Underisable
    type of class-card inspect entire game All_Protocols
    tcp protocol match
    udp Protocol game
    match icmp Protocol
    !
    type of policy-card inspect Trusted_to_Internet
    class type inspect All_Protocols
    inspect
    class class by default
    drop
    type of policy-card inspect Trusted
    class class by default
    Pass
    copp-policy policy-map
    unwanted class
    drop
    class class-mgmt
    to comply with-police action 2048000 pass drop action exceeds
    class class by default
    type of policy-card inspect Internet_to_Trusted
    class type inspect Internet
    inspect
    class class by default
    drop
    !
    !
    Trusted zone security
    Security for the Internet zone
    Trusted zone-pair security-> trusted destination trust Trusted source
    traffic LAN to LAN Description
    type of service-strategy inspect Trusted
    Trusted zone-pair security-> Trusted Internet source Internet destination
    Description LAN for Internet traffic
    type of service-strategy inspect Trusted_to_Internet
    security Internet zone - pair-> Trusted Internet source Trusted destination
    Description WAN for Internet traffic
    type of service-strategy inspect Internet_to_Trusted
    !
    the g0/0 interface (WAN)
    the Member's area Internet Security
    !
    G0/1 of the interface (LAN)
    approved members area security
    !

    Thank you

  • Can I configure Cisco (AIR-CAP1602I-T-K9) 1602i offline?

    Hi everyone, please, I need help here.

    I bought 3 Cisco (AIR-CAP1602I-T-K9) 1602i but I did not buy a controller. How can I configure then offline?

    I saw in other forums, I need to change the IOS software to a stand-alone software. They suggested the ap1g2-k9w7 - tar.152 - 4.JA1.tar. I would like to know if this is the right software and if there is no problem with the license if I download and use it.

    Explanation of the differences between AIR-CAP-1602i-x-K9 e AIR-SAP-1602i-x-K9

    http://community.Spiceworks.com/topic/448208-Cisco-Aironet-1602i-questions-issues

    How to convert standalone IOS

    http://www.experts-exchange.com/Networking/Wireless/Q_28245190.html

    Download IOS:

    http://software.Cisco.com/download/release.html?mdfid=284366503&softwareid=280775090&release=15.2.4-JA1&flowid=37523

    Thank you.

    Wesley

    Hello

    Yes, you must pass in stand-alone mode. Yes, this is the right software and you will not face any problem regarding the license.

    But to download the standalone AP image of cisco, you need a CCO (Cisco connection) and the valid service contract.

    Here is the final image: can download here

    http://software.Cisco.com/download/release.html?mdfid=284366503&flowid=3...

    How to covert to lAP for standalone:

    http://www.YouTube.com/watch?v=QQ_NuxdRhQ4

    http://rscciew.WordPress.com/2014/05/07/access-point-conversion-lap-to-a...

    Concerning

    Remember messages useful rates

  • Configuration Cisco 1841

    Hi all

    I work for a company of Radio 2-way, we use Motorola equipment.  One of the systems requires a router for each repeater site. Motorola recommends a MSR20 20 HP router. I set up this router before and it works great but I would use cisco vs. HP equipment.  I'm having issues reflecting the way in which we present the HP router to the CLI on the Cisco 1841.  I'd appreciate any help that someone is willing to offer.

    Here's how the HP router is configured in the CLI...   Thank you!!

    Hello

    the following is the equivalent of Cisco for the yellow highlisghted lines:

    !hostname Site1!int Eth0/0  ip nat outide  ip address 192.168.1.1 255.255.255.0!int Eth0/1  ip nat inside  ip address 10.1.1.1 255.255.255.0!ip nat inside source static udp 192.168.1.10 55001 10.1.1.1 55001ip nat inside source static udp 192.168.1.11 55011 10.1.1.1 55011ip nat inside source static udp 192.168.1.12 55012 10.1.1.1 55012!ip route 0.0.0.0 0.0.0.0 10.1.1.254!
    Cheers, Seb.
  • Configure Cisco 3560 catalyst

    I have cisco 3560 series switch I want to configure my pc using an rj45 rollover cable, no com port, how can I configure with LAN and is it possible to configure using cisco packet tracer

    Hello faizkt777,

    Using the series USB adapter you can solve your problem. If you install the right driver, it would generate COM Port, so you can configure your switch with her. Another option is to use the usb port on the cisco console, if it is to provide your switch. You can download here the driver of cisco

    https://software.Cisco.com/download/release.html?mdfid=282979369&SOFTWAR...

    Try and tell us if this suggestion may solve your problem.
    Note and marked as correct if that is the case.

    Kind regards

  • Configuration Cisco AnyConnect secure mobility assistance

    Hello!

    A partner of CIsco of Singapore asks if it would be possible on Cisco Anyconnect Secure Mobility

    If I want to use "Cisco AnyConnect Secure mobility" in Anyconnect 3.0, I can set that the user is not able to access all traffic via a wireless sound card when the VPN is established via the wired LAN port. I want to prevent any bypass between these two network ports if the VPN in place.

    In addition, to enable split tunneling so that all traffic has to go through the VPN tunnel?

    Kind regards!

    Ice Flancia

    Cisco partner Helpline Tier 2 team

    To route all traffic to the VPN tunnel, split tunnel should be turned off (not enabled).

    Under group policy configuration: split-tunnel-policy tunnelall

    Once the split tunnel is disabled, VPN users will not be able to access one of its local LAN networks (including wireless).

    Hope that helps.

  • Router configuration Cisco for the IPSec VPN with VPN in Windows 7 builtin client

    Where can I find an example config for IPSec VPN where Windows 7 native client to connect to the Cisco routers. I use the cisco 881w, in this case.

    Thomas McLeod

    Native Client Windows supports only L2TP over IPSec. Example at the end of this doc may be enough for you:

    http://www.Cisco.com/en/us/docs/security/vpn_modules/6342/configuration/guide/6342vpn4.html#wp1036111

    I've not personally configured L2TP/IPSec on IOS, only on ASA, so cannot be 100% sure that the config in the link works, but the general idea should be ok.

Maybe you are looking for