нет это с tftp. почитайте предудужие ссылки там есть про нехватку места и тд
» Настройка Cisco оборудования
skliz
Тогда попробуйте взять, желательно свежеустановленный, ноут и подключить _напрямую_ к вашей железке.
На нем уже tftp развернуть, и с него забрать. Мне как-то раз только так помогло ...
2) Может ошибка на внутренней флешке/или_что_там ? Может её можно форматнуть, только осторожно конечно.
Тогда попробуйте взять, желательно свежеустановленный, ноут и подключить _напрямую_ к вашей железке.
На нем уже tftp развернуть, и с него забрать. Мне как-то раз только так помогло ...
2) Может ошибка на внутренней флешке/или_что_там ? Может её можно форматнуть, только осторожно конечно.
подключал через сервисный порт гапрямую все тоже самое , передел уже все что только можно сам непонимаю почему так. даже контроллер из стойки вытащил крышку снял посмотрел что да как тама заодно и продул с балона его а то запылился малек.
Добавлено:
была мысль про формат флешки , есть там такой пункт если выбратьзагрузку "ручную" но что он сделает я если честно незнаю . вообще страно памяти тама 512, флешка на 240 если прошивка весит старая метров 60 да загрущик метро 5 чем остальное то забито что пишет про место. всетаки склоняюсь что надо пробовать через промежуточную версию 6 но пока мне ее невыложили в ветке про ios
Добавлено:
была мысль про формат флешки , есть там такой пункт если выбратьзагрузку "ручную" но что он сделает я если честно незнаю . вообще страно памяти тама 512, флешка на 240 если прошивка весит старая метров 60 да загрущик метро 5 чем остальное то забито что пишет про место. всетаки склоняюсь что надо пробовать через промежуточную версию 6 но пока мне ее невыложили в ветке про ios
cisco предлагает такой вариант
5 -> 6 -> 7.
Добавлено:
либо перейти на 5.2, а потом уже на 7ку.
в качестве 6-ки можно взять 6.0.181.0 или 6.0.188.0.
5 -> 6 -> 7.
Добавлено:
либо перейти на 5.2, а потом уже на 7ку.
в качестве 6-ки можно взять 6.0.181.0 или 6.0.188.0.
Как я и думал прошилось только через 6 версию а потом на 7 , теперь все отлично. обидно что столькр времени было потрачено зря изза неверных рекомендации цисковских манов )
Добавлено:
интересно а как снести промежуточную 6 она теперь как Backup image весит в меню
Добавлено:
интересно а как снести промежуточную 6 она теперь как Backup image весит в меню
Всем доброго времени суток!
Такая ситуация - есть CISCO 1841, на на транковый порт которого приходит инет от провайдера. В нём два vlana, 1841 об этом знает. В одном вилане инет 4 мбит, в другом 2 мбит.
Далее стоит ASA 5510, которая собственно инет и раздаёт. На ней подняты два сабинтерфейса, outside500 и outside982, соответственно номерам VLAN-ов. У каждого сабинтерфейса есть айпи адреса.
Есть задача - сделать так, чтобы определённая группа пользователей, назовём её users500 ходила в инет через outside500, а другая группа пользователей, users982 через outside982.
Как можно попробовать сделать это?
Я создавал динамическое правило нат, чтобы группа users982 транслировалась наружу через outside982, но они идут через VLAN500, а так как в NAT правиле для интерфейса outside500 их нет, соответственно в инет они выйти не могут.
Такая ситуация - есть CISCO 1841, на на транковый порт которого приходит инет от провайдера. В нём два vlana, 1841 об этом знает. В одном вилане инет 4 мбит, в другом 2 мбит.
Далее стоит ASA 5510, которая собственно инет и раздаёт. На ней подняты два сабинтерфейса, outside500 и outside982, соответственно номерам VLAN-ов. У каждого сабинтерфейса есть айпи адреса.
Есть задача - сделать так, чтобы определённая группа пользователей, назовём её users500 ходила в инет через outside500, а другая группа пользователей, users982 через outside982.
Как можно попробовать сделать это?
Я создавал динамическое правило нат, чтобы группа users982 транслировалась наружу через outside982, но они идут через VLAN500, а так как в NAT правиле для интерфейса outside500 их нет, соответственно в инет они выйти не могут.
Всем привет!
Возможно ли на коммутаторе С-2960 (24-х портовом) сделать "коммутатор в коммутаторе"?
А именно:
например, первые 4 порта запрограммировать так, чтобы пакеты из них не уходили в транк. А только бы ходили между собой (т.е. с 1-ого по 4-й порт). К примеру - к этим портам будут подключены 4 компа с адресами 192.168.10.2-5. И эта адресация не привязана ни какой Vlan (т.е. полная автономность или изоляция этих 4-х портов от "внешнего мира"). А другие порты - с 5-ого по 23-й - будут работать в разных Vlan-ах. 24-й порт - транковый.
Возможно ли на коммутаторе С-2960 (24-х портовом) сделать "коммутатор в коммутаторе"?
А именно:
например, первые 4 порта запрограммировать так, чтобы пакеты из них не уходили в транк. А только бы ходили между собой (т.е. с 1-ого по 4-й порт). К примеру - к этим портам будут подключены 4 компа с адресами 192.168.10.2-5. И эта адресация не привязана ни какой Vlan (т.е. полная автономность или изоляция этих 4-х портов от "внешнего мира"). А другие порты - с 5-ого по 23-й - будут работать в разных Vlan-ах. 24-й порт - транковый.
klyaksik
так вы укажите только те вланы на транковом порту, какие хотите транслировать
так вы укажите только те вланы на транковом порту, какие хотите транслировать
klyaksik Виланы - это по сути дела и есть "коммутатор в коммутаторе".
ildarU
>так вы укажите только те вланы на транковом порту, какие хотите транслировать
Как вариант - подойдёт. К нему "не лежит душа" по причине перечисления всех Vlan-ов на транке (мах=19).
А другой путь есть?
>так вы укажите только те вланы на транковом порту, какие хотите транслировать
Как вариант - подойдёт. К нему "не лежит душа" по причине перечисления всех Vlan-ов на транке (мах=19).
А другой путь есть?
LKRM
Цитата:
Цитата:
Я создавал динамическое правило нат, чтобы группа users982 транслировалась наружу через outside982,Используй policy routing и route-map'ы, и будет тебе щастье.
vlary
на асе pbr нет))
LKRM
показали бы конфиг асы.
помимо натирования, необходимо настроить и маршрутизацию..
на асе pbr нет))
LKRM
показали бы конфиг асы.
помимо натирования, необходимо настроить и маршрутизацию..
Добрый день.
На одном удаленном объекте есть необходимость регулярно перезагружать cisco aironet 1240.
планирую использовать ip rcmd remote-host
как выполнять reload без нажатия confirm ?
На одном удаленном объекте есть необходимость регулярно перезагружать cisco aironet 1240.
планирую использовать ip rcmd remote-host
как выполнять reload без нажатия confirm ?
zubastiy
Цитата:
Код: Router(config)#kron policy-list DailyReboot
Router(config-kron-policy)#cli reload
Router(config-kron-policy)# exit
Router(config)#
Router(config)#kron occurrence DailyReboot at 03:30 recurring
Router(config-kron-occurrence)#policy-list DailyReboot
Router(config)#end
Router#wri mem
Цитата:
планирую использовать ip rcmd remote-hostЗачем такие сложности? А если так?
Код: Router(config)#kron policy-list DailyReboot
Router(config-kron-policy)#cli reload
Router(config-kron-policy)# exit
Router(config)#
Router(config)#kron occurrence DailyReboot at 03:30 recurring
Router(config-kron-occurrence)#policy-list DailyReboot
Router(config)#end
Router#wri mem
Цитата:
zubastiy
Цитата:
планирую использовать ip rcmd remote-host
Зачем такие сложности? А если так?
похоже что нет такого функционала на aironet (
Код:
cisco1240-ozero(config)#kro?
% Unrecognized command
В ИОСах c1700-advsecurityk9-mz.124-25(a,b,c,d).bin присутствует в логах такая срань:
"Missing cef table for tableid 65535 during CEF samecable event"
Что за свинство? В версиях c1700-advsecurityk9-mz.124-23.bin и ниже такой батвы нет. Пришлось откатиться назад. Кто как обходится? Кто что может прокомментировать? Как с этой сранью бороться?
"Missing cef table for tableid 65535 during CEF samecable event"
Что за свинство? В версиях c1700-advsecurityk9-mz.124-23.bin и ниже такой батвы нет. Пришлось откатиться назад. Кто как обходится? Кто что может прокомментировать? Как с этой сранью бороться?
Нужен человек, который бы научил настраивать ASA5520 для создания site-to-site VPN tunnels.
Мой background - unix администрирование, общее понимание сетей имеется. нет времени изучать cisco os мануалы.
Человек которий всё делал ушел. Оплата по договоренности.
Если интересно пишите на danbiztalk@gmail.com ili ICQ 277599621.
Заранее спасибо.
Мой background - unix администрирование, общее понимание сетей имеется. нет времени изучать cisco os мануалы.
Человек которий всё делал ушел. Оплата по договоренности.
Если интересно пишите на danbiztalk@gmail.com ili ICQ 277599621.
Заранее спасибо.
zubastiy, на 4402 нашел только как весь контролер перегружать по времени. а чтоб отдельно точку хз, а через wcs нет такой воможности?
Цитата:
zubastiy, на 4402 нашел только как весь контролер перегружать по времени. а чтоб отдельно точку хз, а через wcs нет такой воможности?
wcs может и умеет, но у нас его нет )
как отключить того кто качает?
стоит 2611.настраивал не я, поэтому немного сложно рахзобраться
делаю s proc cpu h
и вижу что проц загружен на 100% значит кто-то качает
далее делаю
s ip ca fl (подскажите как расщифровыввается эта команда)
Код:
IP packet size distribution (396267768 total packets):
1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480
.002 .402 .040 .033 .018 .005 .004 .007 .003 .007 .003 .002 .003 .003 .002
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.002 .002 .005 .021 .425 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 278544 bytes
1936 active, 2160 inactive, 38811411 added
541294234 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
last clearing of statistics never
Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)
-------- Flows /Sec /Flow /Pkt /Sec /Flow /Flow
TCP-Telnet 669038 0.5 1 59 0.5 0.0 14.4
TCP-FTP 10773 0.0 6 66 0.0 3.2 14.3
TCP-FTPD 8 0.0 2 47 0.0 4.5 12.0
TCP-WWW 13383559 11.0 16 758 186.0 3.2 8.1
TCP-SMTP 339461 0.2 12 676 3.3 2.1 9.6
TCP-X 415563 0.3 1 40 0.3 0.0 15.5
TCP-BGP 3 0.0 3 40 0.0 6.2 15.3
TCP-NNTP 2 0.0 1 40 0.0 0.0 8.1
TCP-Frag 185 0.0 2 51 0.0 1.3 5.4
TCP-other 5932237 4.8 13 607 63.8 4.4 12.5
UDP-DNS 4445042 3.6 1 70 4.3 0.3 15.6
UDP-NTP 138035 0.1 1 76 0.1 0.0 15.5
UDP-TFTP 2 0.0 1 94 0.0 0.0 15.2
UDP-Frag 2763 0.0 924 73 2.1 66.3 15.4
UDP-other 9984145 8.2 7 709 58.4 1.5 15.6
ICMP 541767 0.4 1 82 0.7 4.0 15.5
IGMP 1 0.0 2 28 0.0 0.1 15.0
IPINIP 1 0.0 2 20 0.0 0.5 15.6
GRE 18 0.0 9726 496 0.1 550.9 15.2
IP-other 93690 0.0 76 177 5.9 46.0 15.2
Total: 35956293 29.6 11 691 326.1 2.6 12.2
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts
Fa0/1.1 192.168.200.95 Fa0/1.507 93.158.134.11 06 0A78 0050 18
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1351 0050 7
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1353 0050 12
Fa0/1.1 85.192.57.3 Fa0/1.1 192.168.200.2 11 0035 D68D 1
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1355 0050 5
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1357 0050 5
Fa0/1.507 208.78.70.12 Null 85.192.57.3 11 0035 1EFE 1
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1359 0050 5
Fa0/1.507 217.73.200.220 Null 85.192.56.253 06 0050 0D92 2
Fa0/1.1 194.84.242.98 Fa0/1.1 10.60.1.236 11 0035 C746 1
Fa0/1.507 173.194.69.83 Null 10.3.4.251 06 01BB 0955 4
Fa0/1.1 192.168.200.92 Fa0/1.507 109.124.195.24 11 7608 B61B 6320
Fa0/1.507 91.215.56.11 Null 85.192.56.180 11 6F82 B37E 1
Fa0/1.1 192.168.200.2 Fa0/1.1 192.168.100.7 11 0035 E036 1
Fa0/1.1 10.60.1.188 Null 114.26.45.159 11 E58E 6598 1
Fa0/1.507 94.100.184.14 Null 10.4.19.8 06 0050 1345 3
Fa0/1.507 209.85.173.105 Null 10.4.4.3 06 0050 06D0 1
Fa0/0 86.58.167.62 Null 10.60.1.188 11 C8D5 E58E 1
Fa0/1.1 10.4.4.14 Fa0/1.507 94.100.187.194 06 0FEC 0050 7
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 134F 0050 5
Fa0/1.1 85.192.57.3 Null 78.110.50.60 11 0E1C 0035 1
Fa0/1.507 213.180.204.167 Null 192.168.200.99 06 0050 0FCE 2
Fa0/1.507 221.11.124.224 Null 10.4.14.4 11 2E9F 8FAB 1
Fa0/1.1 192.168.200.84 Fa0/1.507 195.2.68.137 06 050C 0050 2
Fa0/1.507 217.69.129.195 Null 10.4.19.8 06 0050 1349 3
Fa0/1.507 213.180.204.167 Null 192.168.200.99 06 0050 0FCD 2
Fa0/1.507 95.58.150.142 Null 85.192.56.254 06 102D 7608 1
Fa0/1.1 85.192.57.3 Null 195.239.111.223 11 4033 0035 1
Fa0/1.507 151.82.96.144 Null 10.4.2.3 11 40E2 BB6F 43
Fa0/1.507 70.29.61.77 Null 10.60.1.188 11 E14C E58E 1
стоит 2611.настраивал не я, поэтому немного сложно рахзобраться
делаю s proc cpu h
и вижу что проц загружен на 100% значит кто-то качает
далее делаю
s ip ca fl (подскажите как расщифровыввается эта команда)
Код:
IP packet size distribution (396267768 total packets):
1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480
.002 .402 .040 .033 .018 .005 .004 .007 .003 .007 .003 .002 .003 .003 .002
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608
.002 .002 .005 .021 .425 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 278544 bytes
1936 active, 2160 inactive, 38811411 added
541294234 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
last clearing of statistics never
Protocol Total Flows Packets Bytes Packets Active(Sec) Idle(Sec)
-------- Flows /Sec /Flow /Pkt /Sec /Flow /Flow
TCP-Telnet 669038 0.5 1 59 0.5 0.0 14.4
TCP-FTP 10773 0.0 6 66 0.0 3.2 14.3
TCP-FTPD 8 0.0 2 47 0.0 4.5 12.0
TCP-WWW 13383559 11.0 16 758 186.0 3.2 8.1
TCP-SMTP 339461 0.2 12 676 3.3 2.1 9.6
TCP-X 415563 0.3 1 40 0.3 0.0 15.5
TCP-BGP 3 0.0 3 40 0.0 6.2 15.3
TCP-NNTP 2 0.0 1 40 0.0 0.0 8.1
TCP-Frag 185 0.0 2 51 0.0 1.3 5.4
TCP-other 5932237 4.8 13 607 63.8 4.4 12.5
UDP-DNS 4445042 3.6 1 70 4.3 0.3 15.6
UDP-NTP 138035 0.1 1 76 0.1 0.0 15.5
UDP-TFTP 2 0.0 1 94 0.0 0.0 15.2
UDP-Frag 2763 0.0 924 73 2.1 66.3 15.4
UDP-other 9984145 8.2 7 709 58.4 1.5 15.6
ICMP 541767 0.4 1 82 0.7 4.0 15.5
IGMP 1 0.0 2 28 0.0 0.1 15.0
IPINIP 1 0.0 2 20 0.0 0.5 15.6
GRE 18 0.0 9726 496 0.1 550.9 15.2
IP-other 93690 0.0 76 177 5.9 46.0 15.2
Total: 35956293 29.6 11 691 326.1 2.6 12.2
SrcIf SrcIPaddress DstIf DstIPaddress Pr SrcP DstP Pkts
Fa0/1.1 192.168.200.95 Fa0/1.507 93.158.134.11 06 0A78 0050 18
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1351 0050 7
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1353 0050 12
Fa0/1.1 85.192.57.3 Fa0/1.1 192.168.200.2 11 0035 D68D 1
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1355 0050 5
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1357 0050 5
Fa0/1.507 208.78.70.12 Null 85.192.57.3 11 0035 1EFE 1
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 1359 0050 5
Fa0/1.507 217.73.200.220 Null 85.192.56.253 06 0050 0D92 2
Fa0/1.1 194.84.242.98 Fa0/1.1 10.60.1.236 11 0035 C746 1
Fa0/1.507 173.194.69.83 Null 10.3.4.251 06 01BB 0955 4
Fa0/1.1 192.168.200.92 Fa0/1.507 109.124.195.24 11 7608 B61B 6320
Fa0/1.507 91.215.56.11 Null 85.192.56.180 11 6F82 B37E 1
Fa0/1.1 192.168.200.2 Fa0/1.1 192.168.100.7 11 0035 E036 1
Fa0/1.1 10.60.1.188 Null 114.26.45.159 11 E58E 6598 1
Fa0/1.507 94.100.184.14 Null 10.4.19.8 06 0050 1345 3
Fa0/1.507 209.85.173.105 Null 10.4.4.3 06 0050 06D0 1
Fa0/0 86.58.167.62 Null 10.60.1.188 11 C8D5 E58E 1
Fa0/1.1 10.4.4.14 Fa0/1.507 94.100.187.194 06 0FEC 0050 7
Fa0/1.1 10.4.19.8 Fa0/1.507 209.85.173.94 06 134F 0050 5
Fa0/1.1 85.192.57.3 Null 78.110.50.60 11 0E1C 0035 1
Fa0/1.507 213.180.204.167 Null 192.168.200.99 06 0050 0FCE 2
Fa0/1.507 221.11.124.224 Null 10.4.14.4 11 2E9F 8FAB 1
Fa0/1.1 192.168.200.84 Fa0/1.507 195.2.68.137 06 050C 0050 2
Fa0/1.507 217.69.129.195 Null 10.4.19.8 06 0050 1349 3
Fa0/1.507 213.180.204.167 Null 192.168.200.99 06 0050 0FCD 2
Fa0/1.507 95.58.150.142 Null 85.192.56.254 06 102D 7608 1
Fa0/1.1 85.192.57.3 Null 195.239.111.223 11 4033 0035 1
Fa0/1.507 151.82.96.144 Null 10.4.2.3 11 40E2 BB6F 43
Fa0/1.507 70.29.61.77 Null 10.60.1.188 11 E14C E58E 1
Jeison_M Конфиг бы для начала показал...
Если на циске поднят НАТ, командой sho ip nat tran смотри таблицу, кто там шибко резвый. А потом в акцесс-листе на НАТ делай ему укорот.
Если на циске поднят НАТ, командой sho ip nat tran смотри таблицу, кто там шибко резвый. А потом в акцесс-листе на НАТ делай ему укорот.
vlary
вот что дает на команду. как тут понять кто качает?
[more=s ip nat tran]#s ip nat tran
Pro Inside global Inside local Outside local Outside global
tcp 85.192.56.175:1136 10.4.18.8:1136 85.15.193.7:55050 85.15.193.7:55050
tcp 85.192.56.129:20085 10.60.1.220:20085 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.167:3612 10.4.4.14:3612 217.20.146.26:80 217.20.146.26:80
tcp 85.192.56.129:20086 10.60.1.220:20086 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.175:2916 10.4.18.8:2916 94.153.197.143:57861 94.153.197.143:57861
tcp 85.192.56.129:20087 10.60.1.220:20087 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.254:3664 192.168.200.48:3664 93.186.236.233:80 93.186.236.233:80
udp 85.192.56.129:45356 10.60.1.208:45356 95.29.183.173:10699 95.29.183.173:10699
tcp 85.192.56.129:20088 10.60.1.220:20088 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.176:1084 10.4.19.8:1084 205.188.11.85:5190 205.188.11.85:5190
udp 85.192.56.254:30216 192.168.200.92:30216 178.93.167.77:55697 178.93.167.77:55697
udp 85.192.56.129:48313 10.60.1.24:48313 186.176.237.6:3410 186.176.237.6:3410
tcp 85.192.56.196:1754 10.3.4.251:1754 87.250.250.90:80 87.250.250.90:80
tcp 85.192.56.254:1041 192.168.200.69:3238 205.188.11.51:5190 205.188.11.51:5190
tcp 85.192.56.129:20089 10.60.1.220:20089 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.172:36779 10.4.14.4:36779 130.204.78.80:47312 130.204.78.80:47312
tcp 85.192.56.137:11449 10.1.8.2:11449 188.40.16.138:80 188.40.16.138:80
tcp 85.192.56.175:4710 10.4.18.8:4710 93.94.234.126:38738 93.94.234.126:38738
tcp 85.192.56.180:52500 10.4.23.235:52500 74.125.232.67:443 74.125.232.67:443
tcp 85.192.56.129:20090 10.60.1.220:20090 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.180:17529 10.4.23.128:17529 218.164.192.55:12860 218.164.192.55:12860
udp 85.192.56.175:23188 10.4.18.8:23188 80.71.223.6:49075 80.71.223.6:49075
tcp 85.192.56.129:20091 10.60.1.220:20091 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.175:23188 10.4.18.8:23188 31.43.34.112:28007 31.43.34.112:28007
tcp 85.192.56.129:49557 10.60.1.24:49557 78.26.218.114:26531 78.26.218.114:26531
tcp 85.192.56.129:20092 10.60.1.220:20092 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:58766 10.60.1.188:58766 78.181.26.191:25283 78.181.26.191:25283
udp 85.192.56.180:17529 10.4.23.128:17529 157.55.235.160:40001 157.55.235.160:40001
tcp 85.192.56.129:55630 10.60.1.234:55630 209.85.173.103:443 209.85.173.103:443
tcp 85.192.56.129:20093 10.60.1.220:20093 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.129:48447 10.60.1.215:48447 74.125.232.79:443 74.125.232.79:443
tcp 85.192.56.129:20094 10.60.1.220:20094 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.180:45950 10.4.23.2:45950 218.65.241.227:16881 218.65.241.227:16881
udp 85.192.56.129:58766 10.60.1.188:58766 60.231.48.43:38695 60.231.48.43:38695
tcp 85.192.56.149:58658 10.2.3.26:58658 87.240.180.81:80 87.240.180.81:80
tcp 85.192.56.129:20095 10.60.1.220:20095 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.254:3303 192.168.200.99:3303 93.158.134.119:80 93.158.134.119:80
udp 85.192.56.129:48313 10.60.1.24:48313 93.157.41.193:44466 93.157.41.193:44466
tcp 85.192.56.129:52409 10.60.1.224:52409 87.240.131.101:443 87.240.131.101:443
tcp 85.192.56.129:20097 10.60.1.220:20097 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:48313 10.60.1.24:48313 46.72.183.69:63363 46.72.183.69:63363
tcp 85.192.56.175:2419 10.4.18.8:2419 193.160.224.7:63105 193.160.224.7:63105
tcp 85.192.56.129:20098 10.60.1.220:20098 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.129:44915 10.60.1.249:44915 80.68.241.196:80 80.68.241.196:80
udp 85.192.56.175:23188 10.4.18.8:23188 94.137.200.248:44935 94.137.200.248:44935
tcp 85.192.56.129:33108 10.60.1.225:33108 209.85.173.103:443 209.85.173.103:443
tcp 85.192.56.129:20099 10.60.1.220:20099 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:58766 10.60.1.188:58766 96.52.148.56:45009 96.52.148.56:45009
udp 85.192.56.172:36779 10.4.14.4:36779 175.197.218.98:57294 175.197.218.98:57294
udp 85.192.56.175:23188 10.4.18.8:23188 46.162.20.253:35691 46.162.20.253:35691
tcp 85.192.56.254:2224 192.168.200.112:2224 217.69.135.12:80 217.69.135.12:80
udp 85.192.56.129:58766 10.60.1.188:58766 84.240.11.47:21536 84.240.11.47:21536
tcp 85.192.56.254:1461 192.168.200.106:1461 173.194.69.138:80 173.194.69.138:80
tcp 85.192.56.167:3620 10.4.4.14:3620 217.20.146.33:80 217.20.146.33:80
udp 85.192.56.180:45950 10.4.23.2:45950 60.209.103.151:33205 60.209.103.151:33205
tcp 85.192.56.129:53404 10.60.1.224:53404 93.191.11.35:80 93.191.11.35:80
udp 85.192.56.129:58766 10.60.1.188:58766 24.137.90.226:51413 24.137.90.226:51413
tcp 85.192.56.180:3817 10.4.23.235:3817 213.248.36.108:80 213.248.36.108:80
tcp 85.192.56.129:20103 10.60.1.220:20103 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:48313 10.60.1.24:48313 94.252.7.143:3724 94.252.7.143:3724
tcp 85.192.56.176:1835 10.4.19.5:1835 217.73.200.221:80 217.73.200.221:80
tcp 85.192.56.129:54845 10.60.1.21:54845 217.20.154.48:80 217.20.154.48:80
[/more]
вот конфиг.
[more=config]
!
! Last configuration change at 17:50:04 MSK Tue Dec 27 2011 by jeison
! NVRAM config last updated at 14:57:15 MSK Mon Aug 29 2011 by kazakov
!
version 12.2
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service compress-config
service sequence-numbers
!
hostname c2611-gw.hcm.ru
!
logging buffered 4096 warnings
no logging console
aaa new-model
aaa authentication login HCM group tacacs+ local
aaa authorization exec HCM group tacacs+ local
aaa accounting exec default start-stop group tacacs+
enable secret 5 $1$hZ3C$QBqm54Yo7pBYmYaJ0gCOG.
!
username admin privilege 15 password 7 04025C515D761D1F
username traffic privilege 8 password 7 110D1C0311415915
username root privilege 9 password 7 111F150419000403107B79
username kazakov password 7 0046361F1D190E16
clock timezone MSK 4
ip subnet-zero
no ip rcmd domain-lookup
ip rcmd rsh-enable
ip rcmd remote-host root 194.84.242.37 root enable
ip rcmd remote-host root 194.84.242.34 root enable
ip rcmd remote-host root 194.84.242.98 root enable
ip rcmd remote-host root 85.192.57.3 ipacct enable
ip rcmd source-interface FastEthernet0/1
!
!
ip dhcp excluded-address 10.2.6.2
!
ip dhcp pool 192.168.100.0
network 192.168.100.0 255.255.255.0
bootfile pxelinux.0
next-server 192.168.100.125
default-router 192.168.100.1
dns-server 192.168.200.2 85.192.57.3
!
ip dhcp pool Printer
host 192.168.100.2 255.255.255.0
hardware-address 0017.0890.64ae
!
ip dhcp pool 10.2.6.0
network 10.2.6.0 255.255.255.0
domain-name clients.hcm.ru
dns-server 85.192.57.3 194.84.242.98
default-router 10.2.6.1
lease 15
!
no ip bootp server
ip cef
ip accounting-threshold 32768
call rsvp-sync
!
!
!
!
!
!
!
!
interface Loopback0
ip address 10.200.0.1 255.255.255.0
ip accounting output-packets
ip nat inside
ip route-cache policy
!
interface Loopback1
ip address 10.201.0.1 255.255.255.0
ip accounting output-packets
ip nat inside
ip route-cache policy
ip policy route-map RMT-NEXT-HOP
!
interface Loopback2
ip address 10.202.0.1 255.255.255.0
ip route-cache flow
!
interface FastEthernet0/0
description Equant channel
ip address 195.151.244.169 255.255.255.252
ip access-group EQUANT_IN in
ip access-group EQUANT_OUT out
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip nat outside
ip route-cache flow
no ip mroute-cache
ip policy route-map FLOW
speed 10
full-duplex
no cdp enable
no mop enabled
!
interface FastEthernet0/1
description MMK Molodegnaya LAN
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip route-cache flow
no ip mroute-cache
speed auto
full-duplex
no cdp enable
no mop enabled
!
interface FastEthernet0/1.1
description MMK Managment VLAN
encapsulation dot1Q 1 native
ip address 194.84.242.225 255.255.255.224 secondary
ip address 10.100.0.1 255.255.255.0 secondary
ip address 192.168.100.1 255.255.255.0 secondary
ip address 85.192.57.1 255.255.255.224 secondary
ip address 194.67.179.131 255.255.255.248 secondary
ip address 194.84.242.97 255.255.255.224
no ip redirects
no ip proxy-arp
ip accounting output-packets
ip nat inside
no ip mroute-cache
ip policy route-map OUT-2
no cdp enable
!
interface FastEthernet0/1.118
description vlan118
encapsulation dot1Q 118
ip address 194.84.242.1 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.120
description vlan120
encapsulation dot1Q 120
ip address 10.1.20.1 255.255.255.0
ip access-group Vlan120 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.122
description vlan122
encapsulation dot1Q 122
ip address 194.84.242.21 255.255.255.252
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.206
description vlan206
encapsulation dot1Q 206
ip address 10.2.6.1 255.255.255.0
ip access-group Vlan206 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.219
description vlan219
encapsulation dot1Q 219
ip address 10.2.19.1 255.255.255.0
ip access-group Vlan219 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.220
description vlan220
encapsulation dot1Q 220
ip address 194.84.242.29 255.255.255.252
ip access-group Vlan220 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.223
description vlan223
encapsulation dot1Q 223
ip address 194.84.242.41 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.405
description vlan405
encapsulation dot1Q 405
ip address 10.4.5.1 255.255.255.0
ip access-group Vlan405 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.411
description vlan411
encapsulation dot1Q 411
ip address 194.84.242.73 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.421
description vlan421
encapsulation dot1Q 421
ip address 10.4.21.1 255.255.255.0
ip access-group Vlan421 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.446
description vlan446
encapsulation dot1Q 446
ip address 194.84.242.81 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.501
description VLAN0501 for clients with own routers
encapsulation dot1Q 501
ip address 194.84.242.65 255.255.255.252 secondary
ip address 194.84.242.61 255.255.255.252 secondary
ip address 194.84.242.57 255.255.255.252 secondary
ip address 194.84.242.53 255.255.255.252 secondary
ip address 85.192.56.97 255.255.255.224 secondary
ip address 194.84.242.193 255.255.255.224
ip access-group 2501 in
ip accounting output-packets
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.502
description MMK-RMT
encapsulation dot1Q 502
ip address 194.67.160.242 255.255.255.252
ip access-group 2005 in
ip access-group 2010 out
ip accounting output-packets
ip nat outside
ip policy route-map FLOW
shutdown
no cdp enable
!
interface FastEthernet0/1.504
encapsulation dot1Q 504
ip address 85.192.57.33 255.255.255.252
ip accounting output-packets
ip nat outside
no cdp enable
!
interface FastEthernet0/1.507
description Di-Net channel
encapsulation dot1Q 507
ip address 213.219.206.86 255.255.255.252
ip access-group DI-NET_IN in
ip access-group DI-NET_OUT out
no ip redirects
no ip proxy-arp
ip accounting output-packets
ip nat outside
no ip mroute-cache
ip policy route-map FLOW
no cdp enable
!
router rip
version 2
passive-interface default
no passive-interface FastEthernet0/1.1
network 10.0.0.0
network 192.168.0.0
neighbor 10.100.0.20
no auto-summary
!
router bgp 39165
no synchronization
bgp log-neighbor-changes
network 85.192.56.0 mask 255.255.254.0
neighbor 85.192.57.34 remote-as 39165
neighbor 195.151.244.170 remote-as 2854
neighbor 195.151.244.170 distribute-list EQUANT_BGP in
neighbor 195.151.244.170 route-map PREPEND out
neighbor 213.219.206.85 remote-as 12695
neighbor 213.219.206.85 prefix-list BGP-default in
!
ip default-gateway 195.151.244.170
ip nat pool TEST 85.192.56.129 85.192.56.129 prefix-length 25
ip nat pool POOL-10.1.1.0 85.192.56.130 85.192.56.130 prefix-length 25
ip nat pool POOL-10.1.2.0 85.192.56.131 85.192.56.131 prefix-length 25
ip nat pool POOL-10.1.3.0 85.192.56.132 85.192.56.132 prefix-length 25
ip nat pool POOL-10.1.4.0 85.192.56.133 85.192.56.133 prefix-length 25
ip nat pool POOL-10.1.5.0 85.192.56.134 85.192.56.134 prefix-length 25
ip nat pool POOL-10.1.6.0 85.192.56.135 85.192.56.135 prefix-length 25
ip nat pool POOL-10.1.7.0 85.192.56.136 85.192.56.136 prefix-length 25
ip nat pool POOL-10.1.8.0 85.192.56.137 85.192.56.137 prefix-length 25
ip nat pool POOL-10.1.9.0 85.192.56.138 85.192.56.138 prefix-length 25
ip nat pool POOL-10.1.10.0 85.192.56.139 85.192.56.139 prefix-length 25
ip nat pool POOL-10.1.12.0 85.192.56.140 85.192.56.140 prefix-length 25
ip nat pool POOL-10.1.14.0 85.192.56.141 85.192.56.141 prefix-length 25
ip nat pool POOL-10.1.15.0 85.192.56.142 85.192.56.142 prefix-length 25
ip nat pool POOL-10.1.16.0 85.192.56.143 85.192.56.143 prefix-length 25
ip nat pool POOL-10.1.17.0 85.192.56.144 85.192.56.144 prefix-length 25
ip nat pool POOL-10.1.21.0 85.192.56.145 85.192.56.145 prefix-length 25
ip nat pool POOL-10.1.23.0 85.192.56.146 85.192.56.146 prefix-length 25
ip nat pool POOL-10.2.1.0 85.192.56.147 85.192.56.147 prefix-length 25
ip nat pool POOL-10.2.2.0 85.192.56.148 85.192.56.148 prefix-length 25
ip nat pool POOL-10.2.3.0 85.192.56.149 85.192.56.149 prefix-length 25
ip nat pool POOL-10.2.4.0 85.192.56.150 85.192.56.150 prefix-length 25
ip nat pool POOL-10.2.5.0 85.192.56.151 85.192.56.151 prefix-length 25
ip nat pool POOL-10.2.6.0 85.192.56.152 85.192.56.152 prefix-length 25
ip nat pool POOL-10.2.7.0 85.192.56.153 85.192.56.153 prefix-length 25
ip nat pool POOL-10.2.9.0 85.192.56.154 85.192.56.154 prefix-length 25
ip nat pool POOL-10.2.10.0 85.192.56.155 85.192.56.155 prefix-length 25
ip nat pool POOL-10.2.11.0 85.192.56.156 85.192.56.156 prefix-length 25
ip nat pool POOL-10.2.12.0 85.192.56.157 85.192.56.157 prefix-length 25
ip nat pool POOL-10.2.14.0 85.192.56.158 85.192.56.158 prefix-length 25
ip nat pool POOL-10.2.15.0 85.192.56.159 85.192.56.159 prefix-length 25
ip nat pool POOL-10.2.52.0 85.192.56.160 85.192.56.160 prefix-length 25
ip nat pool POOL-10.2.56.0 85.192.56.161 85.192.56.161 prefix-length 25
ip nat pool POOL-10.2.67.0 85.192.56.162 85.192.56.162 prefix-length 25
ip nat pool POOL-10.3.1.0 85.192.56.163 85.192.56.163 prefix-length 25
ip nat pool POOL-10.4.1.0 85.192.56.164 85.192.56.164 prefix-length 25
ip nat pool POOL-10.4.2.0 85.192.56.165 85.192.56.165 prefix-length 25
ip nat pool POOL-10.4.3.0 85.192.56.166 85.192.56.166 prefix-length 25
ip nat pool POOL-10.4.4.0 85.192.56.167 85.192.56.167 prefix-length 25
ip nat pool POOL-10.4.6.0 85.192.56.168 85.192.56.168 prefix-length 25
ip nat pool POOL-10.4.7.0 85.192.56.169 85.192.56.169 prefix-length 25
ip nat pool POOL-10.4.8.0 85.192.56.170 85.192.56.170 prefix-length 25
ip nat pool POOL-10.4.9.0 85.192.56.171 85.192.56.171 prefix-length 25
ip nat pool POOL-10.4.14.0 85.192.56.172 85.192.56.172 prefix-length 25
ip nat pool POOL-10.4.16.0 85.192.56.173 85.192.56.173 prefix-length 25
ip nat pool POOL-10.4.17.0 85.192.56.174 85.192.56.174 prefix-length 25
ip nat pool POOL-10.4.18.0 85.192.56.175 85.192.56.175 prefix-length 25
ip nat pool POOL-10.4.19.0 85.192.56.176 85.192.56.176 prefix-length 25
ip nat pool POOL-10.4.20.0 85.192.56.177 85.192.56.177 prefix-length 25
ip nat pool POOL-10.4.21.0 85.192.56.178 85.192.56.178 prefix-length 25
ip nat pool POOL-10.4.22.0 85.192.56.179 85.192.56.179 prefix-length 25
ip nat pool POOL-10.4.23.0 85.192.56.180 85.192.56.180 prefix-length 25
ip nat pool POOL-10.4.52.0 85.192.56.181 85.192.56.181 prefix-length 25
ip nat pool POOL-10.4.53.0 85.192.56.182 85.192.56.182 prefix-length 25
ip nat pool HCM 85.192.56.254 85.192.56.254 prefix-length 25
ip nat pool POOL-10.4.12.0 85.192.56.183 85.192.56.183 prefix-length 25
ip nat pool POOL-192.168.101.0 85.192.56.184 85.192.56.184 prefix-length 25
ip nat pool POOL-192.168.104.0 85.192.56.185 85.192.56.185 prefix-length 25
ip nat pool POOL-192.168.106.0 85.192.56.186 85.192.56.186 prefix-length 25
ip nat pool POOL-192.168.108.0 85.192.56.187 85.192.56.187 prefix-length 25
ip nat pool POOL-192.168.109.0 85.192.56.188 85.192.56.188 prefix-length 25
ip nat pool POOL-192.168.110.0 85.192.56.189 85.192.56.189 prefix-length 25
ip nat pool POOL-192.168.111.0 85.192.56.190 85.192.56.190 prefix-length 25
ip nat pool POOL-192.168.112.0 85.192.56.191 85.192.56.191 prefix-length 25
ip nat pool POOL-192.168.114.0 85.192.56.192 85.192.56.192 prefix-length 25
ip nat pool POOL-10.2.13.0 85.192.56.193 85.192.56.193 prefix-length 25
ip nat pool POOL-10.4.55.0 85.192.56.194 85.192.56.194 prefix-length 25
ip nat pool POOL-10.3.4.0 85.192.56.196 85.192.56.196 prefix-length 25
ip nat pool HCM-192.168.201.0 85.192.56.253 85.192.56.253 prefix-length 25
ip nat inside source list NAT-POOL-10.1.1.0 pool POOL-10.1.1.0 overload
ip nat inside source list NAT-POOL-10.1.10.0 pool POOL-10.1.10.0 overload
ip nat inside source list NAT-POOL-10.1.12.0 pool POOL-10.1.12.0 overload
ip nat inside source list NAT-POOL-10.1.14.0 pool POOL-10.1.14.0 overload
ip nat inside source list NAT-POOL-10.1.15.0 pool POOL-10.1.15.0 overload
ip nat inside source list NAT-POOL-10.1.16.0 pool POOL-10.1.16.0 overload
ip nat inside source list NAT-POOL-10.1.17.0 pool POOL-10.1.17.0 overload
ip nat inside source list NAT-POOL-10.1.2.0 pool POOL-10.1.2.0 overload
ip nat inside source list NAT-POOL-10.1.21.0 pool POOL-10.1.21.0 overload
ip nat inside source list NAT-POOL-10.1.23.0 pool POOL-10.1.23.0 overload
ip nat inside source list NAT-POOL-10.1.3.0 pool POOL-10.1.3.0 overload
ip nat inside source list NAT-POOL-10.1.4.0 pool POOL-10.1.4.0 overload
ip nat inside source list NAT-POOL-10.1.5.0 pool POOL-10.1.5.0 overload
ip nat inside source list NAT-POOL-10.1.6.0 pool POOL-10.1.6.0 overload
ip nat inside source list NAT-POOL-10.1.7.0 pool POOL-10.1.7.0 overload
ip nat inside source list NAT-POOL-10.1.8.0 pool POOL-10.1.8.0 overload
ip nat inside source list NAT-POOL-10.1.9.0 pool POOL-10.1.9.0 overload
ip nat inside source list NAT-POOL-10.2.1.0 pool POOL-10.2.1.0 overload
ip nat inside source list NAT-POOL-10.2.10.0 pool POOL-10.2.10.0 overload
ip nat inside source list NAT-POOL-10.2.11.0 pool POOL-10.2.11.0 overload
ip nat inside source list NAT-POOL-10.2.12.0 pool POOL-10.2.12.0 overload
ip nat inside source list NAT-POOL-10.2.13.0 pool POOL-10.2.13.0 overload
ip nat inside source list NAT-POOL-10.2.14.0 pool POOL-10.2.14.0 overload
ip nat inside source list NAT-POOL-10.2.15.0 pool POOL-10.2.15.0 overload
ip nat inside source list NAT-POOL-10.2.2.0 pool POOL-10.2.2.0 overload
ip nat inside source list NAT-POOL-10.2.3.0 pool POOL-10.2.3.0 overload
ip nat inside source list NAT-POOL-10.2.4.0 pool POOL-10.2.4.0 overload
ip nat inside source list NAT-POOL-10.2.5.0 pool POOL-10.2.5.0 overload
ip nat inside source list NAT-POOL-10.2.52.0 pool POOL-10.2.52.0 overload
ip nat inside source list NAT-POOL-10.2.56.0 pool POOL-10.2.56.0 overload
ip nat inside source list NAT-POOL-10.2.6.0 pool POOL-10.2.6.0 overload
ip nat inside source list NAT-POOL-10.2.67.0 pool POOL-10.2.67.0 overload
ip nat inside source list NAT-POOL-10.2.7.0 pool POOL-10.2.7.0 overload
ip nat inside source list NAT-POOL-10.2.9.0 pool POOL-10.2.9.0 overload
ip nat inside source list NAT-POOL-10.3.1.0 pool POOL-10.3.1.0 overload
ip nat inside source list NAT-POOL-10.3.4.0 pool POOL-10.3.4.0 overload
ip nat inside source list NAT-POOL-10.4.1.0 pool POOL-10.4.1.0 overload
ip nat inside source list NAT-POOL-10.4.12.0 pool POOL-10.4.12.0 overload
ip nat inside source list NAT-POOL-10.4.14.0 pool POOL-10.4.14.0 overload
ip nat inside source list NAT-POOL-10.4.16.0 pool POOL-10.4.16.0 overload
ip nat inside source list NAT-POOL-10.4.17.0 pool POOL-10.4.17.0 overload
ip nat inside source list NAT-POOL-10.4.18.0 pool POOL-10.4.18.0 overload
ip nat inside source list NAT-POOL-10.4.19.0 pool POOL-10.4.19.0 overload
ip nat inside source list NAT-POOL-10.4.2.0 pool POOL-10.4.2.0 overload
ip nat inside source list NAT-POOL-10.4.20.0 pool POOL-10.4.20.0 overload
ip nat inside source list NAT-POOL-10.4.21.0 pool POOL-10.4.21.0 overload
ip nat inside source list NAT-POOL-10.4.22.0 pool POOL-10.4.22.0 overload
ip nat inside source list NAT-POOL-10.4.23.0 pool POOL-10.4.23.0 overload
ip nat inside source list NAT-POOL-10.4.3.0 pool POOL-10.4.3.0 overload
ip nat inside source list NAT-POOL-10.4.4.0 pool POOL-10.4.4.0 overload
ip nat inside source list NAT-POOL-10.4.52.0 pool POOL-10.4.52.0 overload
ip nat inside source list NAT-POOL-10.4.53.0 pool POOL-10.4.53.0 overload
ip nat inside source list NAT-POOL-10.4.55.0 pool POOL-10.4.55.0 overload
ip nat inside source list NAT-POOL-10.4.6.0 pool POOL-10.4.6.0 overload
ip nat inside source list NAT-POOL-10.4.7.0 pool POOL-10.4.7.0 overload
ip nat inside source list NAT-POOL-10.4.8.0 pool POOL-10.4.8.0 overload
ip nat inside source list NAT-POOL-10.4.9.0 pool POOL-10.4.9.0 overload
ip nat inside source list NAT-POOL-192.168.101.0 pool POOL-192.168.101.0 overload
ip nat inside source list NAT-POOL-192.168.104.0 pool POOL-192.168.104.0 overload
ip nat inside source list NAT-POOL-192.168.106.0 pool POOL-192.168.106.0 overload
ip nat inside source list NAT-POOL-192.168.108.0 pool POOL-192.168.108.0 overload
ip nat inside source list NAT-POOL-192.168.109.0 pool POOL-192.168.109.0 overload
ip nat inside source list NAT-POOL-192.168.110.0 pool POOL-192.168.110.0 overload
ip nat inside source list NAT-POOL-192.168.111.0 pool POOL-192.168.111.0 overload
ip nat inside source list NAT-POOL-192.168.112.0 pool POOL-192.168.112.0 overload
ip nat inside source list NAT-POOL-192.168.114.0 pool POOL-192.168.114.0 overload
ip nat inside source list NAT-POOL-HCM pool HCM overload
ip nat inside source list NAT-POOL-HCM-192.168.201.0 pool HCM-192.168.201.0 overload
ip nat inside source list NAT-POOL-TEST pool TEST overload
ip nat inside source static 10.4.8.2 85.192.56.170
ip nat inside source static 10.4.8.3 85.192.56.195
ip nat inside source static 10.4.2.3 85.192.56.165
ip nat inside source static 10.2.6.2 85.192.56.152
ip nat inside source static 10.2.5.2 85.192.56.151
ip nat inside source static 10.1.23.3 85.192.56.146
ip nat inside source static 10.1.8.2 85.192.56.137
ip classless
ip route 0.0.0.0 0.0.0.0 195.151.244.170 210
ip route 85.192.56.0 255.255.254.0 Null0
ip route 85.192.56.98 255.255.255.255 FastEthernet0/1.206
ip route 85.192.56.99 255.255.255.255 FastEthernet0/1.405
ip route 85.192.56.100 255.255.255.255 FastEthernet0/1.120
ip route 85.192.56.101 255.255.255.255 FastEthernet0/1.120
ip route 85.192.56.103 255.255.255.255 FastEthernet0/1.220
ip route 85.192.56.104 255.255.255.255 FastEthernet0/1.421
ip route 85.192.56.105 255.255.255.255 FastEthernet0/1.219
ip route 192.168.254.0 255.255.255.0 85.192.57.3
ip route 194.84.242.0 255.255.255.0 Null0
ip route 194.84.242.32 255.255.255.248 10.2.8.2
ip route 194.84.242.216 255.255.255.255 FastEthernet0/1.405
ip flow-export source FastEthernet0/1.1
ip flow-export version 5
ip flow-export destination 10.100.0.254 3000
no ip http server
!
!
ip prefix-list BGP-default seq 5 permit 0.0.0.0/0
ip prefix-list BGP-default seq 10 deny 0.0.0.0/0 le 32
!
ip access-list standard AS39165
permit 85.192.56.0 0.0.1.255
ip access-list standard DI-NET_BGP
remark List for filtering incoming BGP advertisement
deny any
ip access-list standard EQUANT-194-84-242
remark Addresses for net 194.84.242.0/24
permit 194.84.242.0 0.0.0.255
ip access-list standard EQUANT_BGP
remark List for filtering incoming BGP advertisement
deny any
ip access-list standard FROM-PRIVATE
remark Addresses from private networks
permit 10.0.0.0 0.255.255.255
permit 192.168.0.0 0.0.255.255
ip access-list standard NAT-POOL-10.1.1.0
permit 10.1.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.10.0
permit 10.1.10.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.12.0
permit 10.1.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.14.0
permit 10.1.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.15.0
permit 10.1.15.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.16.0
permit 10.1.16.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.17.0
permit 10.1.17.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.2.0
permit 10.1.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.21.0
permit 10.1.21.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.23.0
permit 10.1.23.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.3.0
permit 10.1.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.4.0
permit 10.1.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.5.0
permit 10.1.5.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.6.0
permit 10.1.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.7.0
permit 10.1.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.8.0
permit 10.1.8.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.9.0
permit 10.1.9.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.1.0
permit 10.2.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.10.0
permit 10.2.10.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.11.0
permit 10.2.11.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.12.0
permit 10.2.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.13.0
permit 10.2.13.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.14.0
permit 10.2.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.15.0
permit 10.2.15.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.2.0
permit 10.2.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.3.0
permit 10.2.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.4.0
permit 10.2.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.5.0
permit 10.2.5.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.52.0
permit 10.2.52.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.56.0
permit 10.2.56.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.6.0
permit 10.2.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.67.0
permit 10.2.67.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.7.0
permit 10.2.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.9.0
permit 10.2.9.0 0.0.0.255
ip access-list standard NAT-POOL-10.3.1.0
permit 10.3.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.3.4.0
permit 10.3.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.1.0
permit 10.4.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.12.0
permit 10.4.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.14.0
permit 10.4.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.16.0
permit 10.4.16.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.17.0
permit 10.4.17.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.18.0
permit 10.4.18.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.19.0
permit 10.4.19.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.2.0
permit 10.4.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.20.0
permit 10.4.20.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.21.0
permit 10.4.21.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.22.0
permit 10.4.22.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.23.0
permit 10.4.23.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.3.0
permit 10.4.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.4.0
permit 10.4.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.52.0
permit 10.4.52.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.53.0
permit 10.4.53.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.55.0
permit 10.4.55.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.6.0
permit 10.4.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.7.0
permit 10.4.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.8.0
deny 10.4.8.3
permit 10.4.8.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.9.0
permit 10.4.9.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.101.0
permit 192.168.101.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.104.0
permit 192.168.104.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.106.0
permit 192.168.106.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.108.0
permit 192.168.108.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.109.0
permit 192.168.109.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.110.0
permit 192.168.110.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.111.0
permit 192.168.111.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.112.0
permit 192.168.112.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.114.0
permit 192.168.114.0 0.0.0.255
ip access-list standard NAT-POOL-HCM
permit 192.168.200.0 0.0.0.255
permit 192.168.255.0 0.0.0.255
ip access-list standard NAT-POOL-HCM-192.168.201.0
permit 192.168.201.0 0.0.0.255
permit 192.168.100.0 0.0.0.255
ip access-list standard NAT-POOL-TEST
permit 10.60.1.0 0.0.0.255
ip access-list standard SNMP_ACCESS_RO
permit 192.168.100.19
!
ip access-list extended DI-NET_IN
remark List for filtering incoming traffic from Di-Net
remark Prevent spoofing
deny ip 10.0.0.0 0.255.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 194.84.242.0 0.0.0.255 any
deny ip 85.192.56.0 0.0.1.255 any
remark Some common entries
permit icmp any any
permit udp any any
permit gre any any
permit tcp any any established
remark Allow BGP peering with Di-Net
permit tcp host 213.218.206.85 host 213.218.206.86 eq bgp
remark Allow incoming SMTP and SMTPS traffic to bigblue
deny tcp host 213.33.130.10 host 85.192.57.3 eq 465
deny tcp host 213.33.130.10 host 85.192.57.5 eq 465
permit tcp any host 85.192.57.3 eq smtp
permit tcp any host 85.192.57.3 eq 465
permit tcp any host 85.192.57.5 eq smtp
permit tcp any host 85.192.57.5 eq 465
remark Allow incoming IMAPS and POP3S traffic to bigblue
permit tcp any host 85.192.57.3 eq 993
permit tcp any host 85.192.57.3 eq 995
permit tcp any host 85.192.57.5 eq 993
permit tcp any host 85.192.57.5 eq 995
remark Allow incoming HTTP and HTTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq www
permit tcp any host 85.192.57.3 eq 22
permit tcp any host 85.192.57.3 eq 443
permit tcp any host 85.192.57.4 eq www
permit tcp any host 85.192.57.4 eq 443
permit tcp any host 85.192.57.5 eq www
permit tcp any host 85.192.57.5 eq 443
remark Allow transfer of DNS zones from bigblue
permit tcp any host 85.192.57.3 eq domain
remark Allow incoming FTP traffic to bigblue
permit tcp any host 85.192.57.3 eq ftp
permit tcp any host 85.192.57.3 range 49152 65534
remark Allow HTTP traffic to www.hcm.ru
remark Allow PPTP connection to vpn.hcm.ru
permit tcp any host 85.192.57.6 eq 1723
permit gre any host 85.192.57.6
remark Allow any trafic to clients with real addresses
deny ip any host 85.192.56.97
permit ip any 85.192.56.96 0.0.0.31
permit ip any host 85.192.56.170
permit ip any host 85.192.56.195
permit ip any host 85.192.56.165
permit ip any host 85.192.56.152
permit ip any host 85.192.56.146
permit ip any host 85.192.56.151
permit ip any host 85.192.56.137
deny ip any any
ip access-list extended DI-NET_OUT
remark List for filtering outgoing traffic to Di-Net
remark Disallow destinations with our networks
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 194.84.242.0 0.0.0.255
deny ip any 85.192.56.0 0.0.1.255
remark Allow any ip from 85.192.56.0/23
permit gre host 85.192.57.6 any
permit ip 85.192.56.0 0.0.1.255 any
deny ip any any
ip access-list extended EQUANT_IN
remark List for filtering incoming traffic from Equant
remark Prevent spoofing
deny ip 10.0.0.0 0.255.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 194.84.242.0 0.0.0.255 any
deny ip 85.192.56.0 0.0.1.255 any
remark Some common entries
permit icmp any any
permit udp any any
permit gre any any
permit tcp any any established
remark Allow BGP peering with EQUANT
permit tcp host 195.151.244.170 host 195.151.244.169 eq bgp
remark Allow incoming SMTP and SMTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq smtp
permit tcp any host 85.192.57.3 eq 465
permit tcp any host 85.192.57.5 eq smtp
permit tcp any host 85.192.57.5 eq 465
remark Allow incoming IMAPS and POP3S traffic to bigblue
permit tcp any host 85.192.57.3 eq 993
permit tcp any host 85.192.57.3 eq 995
permit tcp any host 85.192.57.5 eq 993
permit tcp any host 85.192.57.5 eq 995
remark Allow incoming HTTP and HTTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq www
permit tcp any host 85.192.57.3 eq 22
permit tcp any host 85.192.57.3 eq 443
permit tcp any host 85.192.57.4 eq www
permit tcp any host 85.192.57.4 eq 443
permit tcp any host 85.192.57.5 eq www
permit tcp any host 85.192.57.5 eq 443
remark Allow transfer of DNS zones from bigblue
permit tcp any host 85.192.57.3 eq domain
remark Allow incoming FTP traffic to bigblue
permit tcp any host 85.192.57.3 eq ftp
permit tcp any host 85.192.57.3 range 49152 65534
remark Allow HTTP traffic to www.hcm.ru
remark Allow PPTP connection to vpn.hcm.ru
permit tcp any host 85.192.57.6 eq 1723
permit gre any host 85.192.57.6
remark Allow any trafic to clients with real addresses
deny ip any host 85.192.56.97
permit ip any 85.192.56.96 0.0.0.31
permit ip any host 85.192.56.170
permit ip any host 85.192.56.195
permit ip any host 85.192.56.165
permit ip any host 85.192.56.152
permit ip any host 85.192.56.146
permit ip any host 85.192.56.151
permit ip any host 85.192.56.137
deny ip any host 194.84.242.1
permit ip any 194.84.242.0 0.0.0.7
deny ip any host 194.84.242.9
permit ip any 194.84.242.8 0.0.0.7
deny ip any host 194.84.242.33
permit ip any 194.84.242.32 0.0.0.7
deny ip any host 194.84.242.41
permit ip any 194.84.242.40 0.0.0.7
deny ip any host 194.84.242.73
permit ip any 194.84.242.72 0.0.0.7
deny ip any host 194.84.242.81
permit ip any 194.84.242.80 0.0.0.7
deny ip any host 194.84.242.21
permit ip any 194.84.242.20 0.0.0.3
deny ip any host 194.84.242.25
permit ip any 194.84.242.24 0.0.0.3
deny ip any host 194.84.242.29
permit ip any 194.84.242.28 0.0.0.3
deny ip any host 194.84.242.53
permit ip any 194.84.242.52 0.0.0.3
deny ip any host 194.84.242.57
permit ip any 194.84.242.56 0.0.0.3
deny ip any host 194.84.242.61
permit ip any 194.84.242.60 0.0.0.3
deny ip any host 194.84.242.65
permit ip any 194.84.242.64 0.0.0.3
deny ip any host 194.84.242.69
permit ip any 194.84.242.68 0.0.0.3
deny ip any host 194.84.242.193
permit ip any 194.84.242.192 0.0.0.31
deny ip any any
ip access-list extended EQUANT_OUT
remark List for filtering outgoing traffic to Equant
remark Disallow destinations with our networks
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 194.84.242.0 0.0.0.255
deny ip any 85.192.56.0 0.0.1.255
permit gre host 85.192.57.6 any
remark Allow any ip from 85.192.56.0/23
permit ip 85.192.56.0 0.0.1.255 any
remark Allow any ip from 194.84.242.0/24
permit ip 194.84.242.0 0.0.0.255 any
deny ip any any
ip access-list extended TO-PRIVATE
remark Traffic to private networks
permit ip any 10.0.0.0 0.255.255.255
permit ip any 192.168.0.0 0.0.255.255
ip access-list extended Vlan120
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.100 any
permit ip host 85.192.56.101 any
deny ip any any
ip access-list extended Vlan205
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.106 any
permit ip host 194.84.242.197 any
deny ip any any
ip access-list extended Vlan206
deny ip host 10.2.6.1 any
permit udp any host 255.255.255.255 eq bootps
permit udp any host 10.2.6.1 eq bootps
permit icmp 10.2.6.0 0.0.0.255 host 10.2.6.1
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
permit ip 10.2.6.0 0.0.0.255 any
permit ip host 85.192.56.98 any
ip access-list extended Vlan219
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.105 any
deny ip any any
ip access-list extended Vlan220
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.103 any
deny ip any any
ip access-list extended Vlan405
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.98 any
permit ip host 85.192.56.99 any
permit ip host 194.84.242.216 any
deny ip any any
ip access-list extended Vlan421
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.104 any
deny ip any any
logging trap debugging
logging 194.84.242.125
access-list 1300 permit 10.0.0.0 0.255.255.255
access-list 1300 permit 192.168.0.0 0.0.255.255
access-list 1300 permit 85.192.56.0 0.0.1.255
access-list 1302 permit 194.67.179.130
access-list 1302 permit 194.67.179.132
access-list 1302 permit 192.168.255.0 0.0.0.255
access-list 1302 permit 192.168.200.0 0.0.0.255
access-list 1302 permit 192.168.100.0 0.0.0.255
access-list 1303 permit 194.67.179.130
access-list 2001 remark Filter for private networks
access-list 2001 deny ip any 10.0.0.0 0.255.255.255
access-list 2001 deny ip any 192.168.0.0 0.0.255.255
access-list 2001 permit ip any any
access-list 2005 remark Input filter for our net
access-list 2005 deny ip 194.84.242.0 0.0.0.255 any
access-list 2005 deny ip 10.0.0.0 0.255.255.255 any
access-list 2005 deny ip 192.168.0.0 0.0.255.255 any
access-list 2005 permit ip host 194.67.179.130 10.1.7.0 0.0.0.255
access-list 2005 deny ip any 10.0.0.0 0.255.255.255
access-list 2005 deny ip any 192.168.0.0 0.0.255.255
access-list 2005 permit icmp any any
access-list 2005 permit udp any any
access-list 2005 permit gre any any
access-list 2005 permit tcp any any established
access-list 2005 permit tcp any host 194.67.179.130 eq www
access-list 2005 permit tcp any host 194.67.179.130 eq domain
access-list 2005 permit udp any host 194.67.179.130 eq domain
access-list 2005 deny ip any host 194.84.242.1
access-list 2005 permit ip any 194.84.242.0 0.0.0.7
access-list 2005 deny ip any host 194.84.242.9
access-list 2005 permit ip any 194.84.242.8 0.0.0.7
access-list 2005 deny ip any host 194.84.242.33
access-list 2005 permit ip any 194.84.242.32 0.0.0.7
access-list 2005 deny ip any host 194.84.242.41
access-list 2005 permit ip any 194.84.242.40 0.0.0.7
access-list 2005 deny ip any host 194.84.242.73
access-list 2005 permit ip any 194.84.242.72 0.0.0.7
access-list 2005 deny ip any host 194.84.242.81
access-list 2005 permit ip any 194.84.242.80 0.0.0.7
access-list 2005 deny ip any host 194.84.242.21
access-list 2005 permit ip any 194.84.242.20 0.0.0.3
access-list 2005 deny ip any host 194.84.242.25
access-list 2005 permit ip any 194.84.242.24 0.0.0.3
access-list 2005 deny ip any host 194.84.242.29
access-list 2005 permit ip any 194.84.242.28 0.0.0.3
access-list 2005 deny ip any host 194.84.242.53
access-list 2005 permit ip any 194.84.242.52 0.0.0.3
access-list 2005 deny ip any host 194.84.242.57
access-list 2005 permit ip any 194.84.242.56 0.0.0.3
access-list 2005 deny ip any host 194.84.242.61
access-list 2005 permit ip any 194.84.242.60 0.0.0.3
access-list 2005 deny ip any host 194.84.242.65
access-list 2005 permit ip any 194.84.242.64 0.0.0.3
access-list 2005 deny ip any host 194.84.242.69
access-list 2005 permit ip any 194.84.242.68 0.0.0.3
access-list 2005 deny ip any host 194.84.242.193
access-list 2005 permit ip any 194.84.242.192 0.0.0.31
access-list 2005 permit ip any host 194.84.242.251
access-list 2005 deny ip any any
access-list 2010 remark Filter for outbound trafic
access-list 2010 deny ip 10.0.0.0 0.255.255.255 any
access-list 2010 deny ip 192.168.0.0 0.0.255.255 any
access-list 2010 deny ip any 10.0.0.0 0.255.255.255 log
access-list 2010 deny ip any 192.168.0.0 0.0.255.255 log
access-list 2010 deny ip any 194.84.242.0 0.0.0.255 log
access-list 2010 deny tcp host 194.84.242.214 any eq smtp
access-list 2010 permit ip any any
access-list 2015 remark Filter for outbound trafic of MMK network
access-list 2015 permit ip any 194.84.242.0 0.0.0.255
access-list 2015 permit ip any 85.192.57.0 0.0.0.255
access-list 2015 permit ip any 194.67.179.128 0.0.0.7
access-list 2015 permit ip 192.168.200.192 0.0.0.63 host 217.14.48.50
access-list 2015 permit tcp host 192.168.200.29 host 194.186.207.162 eq 670
access-list 2015 permit icmp host 192.168.200.29 host 194.186.207.162
access-list 2015 deny ip host 192.168.200.29 any
access-list 2015 deny ip any 10.0.0.0 0.255.255.255
access-list 2015 deny ip 192.168.200.192 0.0.0.63 any
access-list 2015 deny tcp any any eq smtp
access-list 2015 permit ip any any
access-list 2501 remark Filter for unused addresses on int fa0/1.501
access-list 2501 permit tcp any 10.0.0.0 0.255.255.255 established
access-list 2501 deny ip any 10.0.0.0 0.255.255.255
access-list 2501 permit tcp any 192.168.0.0 0.0.255.255 established
access-list 2501 deny ip any 192.168.0.0 0.0.255.255
access-list 2501 permit ip host 194.84.242.195 any
access-list 2501 permit ip host 194.84.242.197 any
access-list 2501 permit ip host 194.84.242.199 any
access-list 2501 permit ip host 194.84.242.203 any
access-list 2501 permit ip host 194.84.242.201 any
access-list 2501 permit ip host 194.84.242.221 any
access-list 2501 permit ip host 194.84.242.222 any
access-list 2501 permit ip host 194.84.242.66 any
access-list 2501 permit ip host 194.84.242.62 any
access-list 2501 permit ip host 194.84.242.58 any
access-list 2501 permit ip host 194.84.242.54 any
access-list 2501 permit ip host 194.84.242.207 any
access-list 2501 permit ip host 194.84.242.209 any
access-list 2501 permit ip host 194.84.242.212 any
access-list 2501 permit ip host 194.84.242.214 any
access-list 2501 permit ip host 85.192.56.102 any
access-list 2501 deny ip any any log
access-list 2502 remark Accounting for private addresses filter
access-list 2502 permit ip 10.0.0.0 0.255.255.255 host 194.84.23.125
access-list 2502 permit ip 192.168.0.0 0.0.255.255 host 194.84.23.125
access-list 2502 permit ip 10.0.0.0 0.255.255.255 host 193.232.88.17
access-list 2502 permit ip 192.168.0.0 0.0.255.255 host 193.232.88.17
access-list 2502 deny ip any 10.0.0.0 0.255.255.255
access-list 2502 deny ip any 192.168.0.0 0.0.255.255
access-list 2502 deny ip any 194.84.242.0 0.0.0.255
access-list 2502 deny ip any 85.192.56.0 0.0.1.255
access-list 2502 permit ip host 10.4.12.2 any
access-list 2503 permit ip any 10.0.0.0 0.255.255.255
access-list 2503 permit ip any 192.168.0.0 0.0.255.255
dialer-list 1 protocol ip permit
arp 194.84.242.66 000f.3d0f.9086 ARPA
arp 194.84.242.54 0050.1809.f865 ARPA
arp 194.84.242.62 0008.a16e.fbbc ARPA
arp 194.84.242.58 0080.ad09.9aef ARPA
arp 194.84.242.195 0016.e09e.004b ARPA
arp 194.84.242.207 0050.da76.2130 ARPA
arp 194.84.242.201 00d0.b7d5.087c ARPA
arp 194.84.242.203 0004.ac38.75e4 ARPA
arp 194.84.242.212 0050.2287.fb6b ARPA
arp 194.84.242.214 4c00.1061.0e24 ARPA
arp 85.192.56.102 0002.b319.859f ARPA
no cdp run
route-map FLOW permit 10
match ip address 2503
set interface Loopback2
!
route-map ACCT permit 20
match ip address 1300
set ip default next-hop 194.84.242.99
!
route-map RMT-NEXT-HOP permit 10
match ip address 1302
set ip default next-hop 194.67.160.241
!
route-map TO-DI-NET permit 10
match ip address AS39165
set ip default next-hop 194.84.242.99
!
route-map RMT permit 10
match ip address 2502
set interface Loopback1
!
route-map OUT permit 10
match ip address FROM-PRIVATE
set default interface Loopback0
!
route-map OUT permit 20
match ip address EQUANT-194-84-242
set ip default next-hop 195.151.244.170
!
route-map OUT-2 permit 10
match ip address EQUANT-194-84-242
set ip default next-hop 195.151.244.170
!
route-map PREPEND permit 10
set as-path prepend 39165 39165 39165 39165 39165 39165 39165 39165 39165 39165
!
route-map NAT permit 10
match ip address 1302
set ip next-hop 10.202.0.2
!
!
snmp-server community public RO
snmp-server enable traps tty
tacacs-server host 192.168.100.3
tacacs-server timeout 60
tacacs-server directed-request
tacacs-server key 7 065658771F190A485D4116590E067B2F75706234754B51415B52075D0804045E54
!
dial-peer cor custom
!
!
!
privilege exec level 8 show ip accounting
privilege exec level 8 clear ip accounting
privilege exec level 8 clear ip accounting checkpoint
privilege exec level 8 show ip accounting checkpoint
!
line con 0
transport output telnet
line aux 0
transport output telnet
line vty 0 4
password 7 121D0011000A0B
authorization exec HCM
login authentication HCM
transport input telnet
line vty 5 16
authorization exec HCM
login authentication HCM
!
ntp clock-period 17208510
ntp server 85.192.57.3
ntp server 80.240.109.22
end
[/more]
вот что дает на команду. как тут понять кто качает?
[more=s ip nat tran]#s ip nat tran
Pro Inside global Inside local Outside local Outside global
tcp 85.192.56.175:1136 10.4.18.8:1136 85.15.193.7:55050 85.15.193.7:55050
tcp 85.192.56.129:20085 10.60.1.220:20085 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.167:3612 10.4.4.14:3612 217.20.146.26:80 217.20.146.26:80
tcp 85.192.56.129:20086 10.60.1.220:20086 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.175:2916 10.4.18.8:2916 94.153.197.143:57861 94.153.197.143:57861
tcp 85.192.56.129:20087 10.60.1.220:20087 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.254:3664 192.168.200.48:3664 93.186.236.233:80 93.186.236.233:80
udp 85.192.56.129:45356 10.60.1.208:45356 95.29.183.173:10699 95.29.183.173:10699
tcp 85.192.56.129:20088 10.60.1.220:20088 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.176:1084 10.4.19.8:1084 205.188.11.85:5190 205.188.11.85:5190
udp 85.192.56.254:30216 192.168.200.92:30216 178.93.167.77:55697 178.93.167.77:55697
udp 85.192.56.129:48313 10.60.1.24:48313 186.176.237.6:3410 186.176.237.6:3410
tcp 85.192.56.196:1754 10.3.4.251:1754 87.250.250.90:80 87.250.250.90:80
tcp 85.192.56.254:1041 192.168.200.69:3238 205.188.11.51:5190 205.188.11.51:5190
tcp 85.192.56.129:20089 10.60.1.220:20089 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.172:36779 10.4.14.4:36779 130.204.78.80:47312 130.204.78.80:47312
tcp 85.192.56.137:11449 10.1.8.2:11449 188.40.16.138:80 188.40.16.138:80
tcp 85.192.56.175:4710 10.4.18.8:4710 93.94.234.126:38738 93.94.234.126:38738
tcp 85.192.56.180:52500 10.4.23.235:52500 74.125.232.67:443 74.125.232.67:443
tcp 85.192.56.129:20090 10.60.1.220:20090 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.180:17529 10.4.23.128:17529 218.164.192.55:12860 218.164.192.55:12860
udp 85.192.56.175:23188 10.4.18.8:23188 80.71.223.6:49075 80.71.223.6:49075
tcp 85.192.56.129:20091 10.60.1.220:20091 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.175:23188 10.4.18.8:23188 31.43.34.112:28007 31.43.34.112:28007
tcp 85.192.56.129:49557 10.60.1.24:49557 78.26.218.114:26531 78.26.218.114:26531
tcp 85.192.56.129:20092 10.60.1.220:20092 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:58766 10.60.1.188:58766 78.181.26.191:25283 78.181.26.191:25283
udp 85.192.56.180:17529 10.4.23.128:17529 157.55.235.160:40001 157.55.235.160:40001
tcp 85.192.56.129:55630 10.60.1.234:55630 209.85.173.103:443 209.85.173.103:443
tcp 85.192.56.129:20093 10.60.1.220:20093 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.129:48447 10.60.1.215:48447 74.125.232.79:443 74.125.232.79:443
tcp 85.192.56.129:20094 10.60.1.220:20094 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.180:45950 10.4.23.2:45950 218.65.241.227:16881 218.65.241.227:16881
udp 85.192.56.129:58766 10.60.1.188:58766 60.231.48.43:38695 60.231.48.43:38695
tcp 85.192.56.149:58658 10.2.3.26:58658 87.240.180.81:80 87.240.180.81:80
tcp 85.192.56.129:20095 10.60.1.220:20095 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.254:3303 192.168.200.99:3303 93.158.134.119:80 93.158.134.119:80
udp 85.192.56.129:48313 10.60.1.24:48313 93.157.41.193:44466 93.157.41.193:44466
tcp 85.192.56.129:52409 10.60.1.224:52409 87.240.131.101:443 87.240.131.101:443
tcp 85.192.56.129:20097 10.60.1.220:20097 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:48313 10.60.1.24:48313 46.72.183.69:63363 46.72.183.69:63363
tcp 85.192.56.175:2419 10.4.18.8:2419 193.160.224.7:63105 193.160.224.7:63105
tcp 85.192.56.129:20098 10.60.1.220:20098 77.91.229.158:80 77.91.229.158:80
tcp 85.192.56.129:44915 10.60.1.249:44915 80.68.241.196:80 80.68.241.196:80
udp 85.192.56.175:23188 10.4.18.8:23188 94.137.200.248:44935 94.137.200.248:44935
tcp 85.192.56.129:33108 10.60.1.225:33108 209.85.173.103:443 209.85.173.103:443
tcp 85.192.56.129:20099 10.60.1.220:20099 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:58766 10.60.1.188:58766 96.52.148.56:45009 96.52.148.56:45009
udp 85.192.56.172:36779 10.4.14.4:36779 175.197.218.98:57294 175.197.218.98:57294
udp 85.192.56.175:23188 10.4.18.8:23188 46.162.20.253:35691 46.162.20.253:35691
tcp 85.192.56.254:2224 192.168.200.112:2224 217.69.135.12:80 217.69.135.12:80
udp 85.192.56.129:58766 10.60.1.188:58766 84.240.11.47:21536 84.240.11.47:21536
tcp 85.192.56.254:1461 192.168.200.106:1461 173.194.69.138:80 173.194.69.138:80
tcp 85.192.56.167:3620 10.4.4.14:3620 217.20.146.33:80 217.20.146.33:80
udp 85.192.56.180:45950 10.4.23.2:45950 60.209.103.151:33205 60.209.103.151:33205
tcp 85.192.56.129:53404 10.60.1.224:53404 93.191.11.35:80 93.191.11.35:80
udp 85.192.56.129:58766 10.60.1.188:58766 24.137.90.226:51413 24.137.90.226:51413
tcp 85.192.56.180:3817 10.4.23.235:3817 213.248.36.108:80 213.248.36.108:80
tcp 85.192.56.129:20103 10.60.1.220:20103 77.91.229.158:80 77.91.229.158:80
udp 85.192.56.129:48313 10.60.1.24:48313 94.252.7.143:3724 94.252.7.143:3724
tcp 85.192.56.176:1835 10.4.19.5:1835 217.73.200.221:80 217.73.200.221:80
tcp 85.192.56.129:54845 10.60.1.21:54845 217.20.154.48:80 217.20.154.48:80
[/more]
вот конфиг.
[more=config]
!
! Last configuration change at 17:50:04 MSK Tue Dec 27 2011 by jeison
! NVRAM config last updated at 14:57:15 MSK Mon Aug 29 2011 by kazakov
!
version 12.2
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service compress-config
service sequence-numbers
!
hostname c2611-gw.hcm.ru
!
logging buffered 4096 warnings
no logging console
aaa new-model
aaa authentication login HCM group tacacs+ local
aaa authorization exec HCM group tacacs+ local
aaa accounting exec default start-stop group tacacs+
enable secret 5 $1$hZ3C$QBqm54Yo7pBYmYaJ0gCOG.
!
username admin privilege 15 password 7 04025C515D761D1F
username traffic privilege 8 password 7 110D1C0311415915
username root privilege 9 password 7 111F150419000403107B79
username kazakov password 7 0046361F1D190E16
clock timezone MSK 4
ip subnet-zero
no ip rcmd domain-lookup
ip rcmd rsh-enable
ip rcmd remote-host root 194.84.242.37 root enable
ip rcmd remote-host root 194.84.242.34 root enable
ip rcmd remote-host root 194.84.242.98 root enable
ip rcmd remote-host root 85.192.57.3 ipacct enable
ip rcmd source-interface FastEthernet0/1
!
!
ip dhcp excluded-address 10.2.6.2
!
ip dhcp pool 192.168.100.0
network 192.168.100.0 255.255.255.0
bootfile pxelinux.0
next-server 192.168.100.125
default-router 192.168.100.1
dns-server 192.168.200.2 85.192.57.3
!
ip dhcp pool Printer
host 192.168.100.2 255.255.255.0
hardware-address 0017.0890.64ae
!
ip dhcp pool 10.2.6.0
network 10.2.6.0 255.255.255.0
domain-name clients.hcm.ru
dns-server 85.192.57.3 194.84.242.98
default-router 10.2.6.1
lease 15
!
no ip bootp server
ip cef
ip accounting-threshold 32768
call rsvp-sync
!
!
!
!
!
!
!
!
interface Loopback0
ip address 10.200.0.1 255.255.255.0
ip accounting output-packets
ip nat inside
ip route-cache policy
!
interface Loopback1
ip address 10.201.0.1 255.255.255.0
ip accounting output-packets
ip nat inside
ip route-cache policy
ip policy route-map RMT-NEXT-HOP
!
interface Loopback2
ip address 10.202.0.1 255.255.255.0
ip route-cache flow
!
interface FastEthernet0/0
description Equant channel
ip address 195.151.244.169 255.255.255.252
ip access-group EQUANT_IN in
ip access-group EQUANT_OUT out
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip nat outside
ip route-cache flow
no ip mroute-cache
ip policy route-map FLOW
speed 10
full-duplex
no cdp enable
no mop enabled
!
interface FastEthernet0/1
description MMK Molodegnaya LAN
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip route-cache flow
no ip mroute-cache
speed auto
full-duplex
no cdp enable
no mop enabled
!
interface FastEthernet0/1.1
description MMK Managment VLAN
encapsulation dot1Q 1 native
ip address 194.84.242.225 255.255.255.224 secondary
ip address 10.100.0.1 255.255.255.0 secondary
ip address 192.168.100.1 255.255.255.0 secondary
ip address 85.192.57.1 255.255.255.224 secondary
ip address 194.67.179.131 255.255.255.248 secondary
ip address 194.84.242.97 255.255.255.224
no ip redirects
no ip proxy-arp
ip accounting output-packets
ip nat inside
no ip mroute-cache
ip policy route-map OUT-2
no cdp enable
!
interface FastEthernet0/1.118
description vlan118
encapsulation dot1Q 118
ip address 194.84.242.1 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.120
description vlan120
encapsulation dot1Q 120
ip address 10.1.20.1 255.255.255.0
ip access-group Vlan120 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.122
description vlan122
encapsulation dot1Q 122
ip address 194.84.242.21 255.255.255.252
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.206
description vlan206
encapsulation dot1Q 206
ip address 10.2.6.1 255.255.255.0
ip access-group Vlan206 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.219
description vlan219
encapsulation dot1Q 219
ip address 10.2.19.1 255.255.255.0
ip access-group Vlan219 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.220
description vlan220
encapsulation dot1Q 220
ip address 194.84.242.29 255.255.255.252
ip access-group Vlan220 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.223
description vlan223
encapsulation dot1Q 223
ip address 194.84.242.41 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.405
description vlan405
encapsulation dot1Q 405
ip address 10.4.5.1 255.255.255.0
ip access-group Vlan405 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.411
description vlan411
encapsulation dot1Q 411
ip address 194.84.242.73 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.421
description vlan421
encapsulation dot1Q 421
ip address 10.4.21.1 255.255.255.0
ip access-group Vlan421 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.446
description vlan446
encapsulation dot1Q 446
ip address 194.84.242.81 255.255.255.248
ip access-group 2001 in
ip accounting output-packets
no ip mroute-cache
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.501
description VLAN0501 for clients with own routers
encapsulation dot1Q 501
ip address 194.84.242.65 255.255.255.252 secondary
ip address 194.84.242.61 255.255.255.252 secondary
ip address 194.84.242.57 255.255.255.252 secondary
ip address 194.84.242.53 255.255.255.252 secondary
ip address 85.192.56.97 255.255.255.224 secondary
ip address 194.84.242.193 255.255.255.224
ip access-group 2501 in
ip accounting output-packets
ip policy route-map OUT
no cdp enable
!
interface FastEthernet0/1.502
description MMK-RMT
encapsulation dot1Q 502
ip address 194.67.160.242 255.255.255.252
ip access-group 2005 in
ip access-group 2010 out
ip accounting output-packets
ip nat outside
ip policy route-map FLOW
shutdown
no cdp enable
!
interface FastEthernet0/1.504
encapsulation dot1Q 504
ip address 85.192.57.33 255.255.255.252
ip accounting output-packets
ip nat outside
no cdp enable
!
interface FastEthernet0/1.507
description Di-Net channel
encapsulation dot1Q 507
ip address 213.219.206.86 255.255.255.252
ip access-group DI-NET_IN in
ip access-group DI-NET_OUT out
no ip redirects
no ip proxy-arp
ip accounting output-packets
ip nat outside
no ip mroute-cache
ip policy route-map FLOW
no cdp enable
!
router rip
version 2
passive-interface default
no passive-interface FastEthernet0/1.1
network 10.0.0.0
network 192.168.0.0
neighbor 10.100.0.20
no auto-summary
!
router bgp 39165
no synchronization
bgp log-neighbor-changes
network 85.192.56.0 mask 255.255.254.0
neighbor 85.192.57.34 remote-as 39165
neighbor 195.151.244.170 remote-as 2854
neighbor 195.151.244.170 distribute-list EQUANT_BGP in
neighbor 195.151.244.170 route-map PREPEND out
neighbor 213.219.206.85 remote-as 12695
neighbor 213.219.206.85 prefix-list BGP-default in
!
ip default-gateway 195.151.244.170
ip nat pool TEST 85.192.56.129 85.192.56.129 prefix-length 25
ip nat pool POOL-10.1.1.0 85.192.56.130 85.192.56.130 prefix-length 25
ip nat pool POOL-10.1.2.0 85.192.56.131 85.192.56.131 prefix-length 25
ip nat pool POOL-10.1.3.0 85.192.56.132 85.192.56.132 prefix-length 25
ip nat pool POOL-10.1.4.0 85.192.56.133 85.192.56.133 prefix-length 25
ip nat pool POOL-10.1.5.0 85.192.56.134 85.192.56.134 prefix-length 25
ip nat pool POOL-10.1.6.0 85.192.56.135 85.192.56.135 prefix-length 25
ip nat pool POOL-10.1.7.0 85.192.56.136 85.192.56.136 prefix-length 25
ip nat pool POOL-10.1.8.0 85.192.56.137 85.192.56.137 prefix-length 25
ip nat pool POOL-10.1.9.0 85.192.56.138 85.192.56.138 prefix-length 25
ip nat pool POOL-10.1.10.0 85.192.56.139 85.192.56.139 prefix-length 25
ip nat pool POOL-10.1.12.0 85.192.56.140 85.192.56.140 prefix-length 25
ip nat pool POOL-10.1.14.0 85.192.56.141 85.192.56.141 prefix-length 25
ip nat pool POOL-10.1.15.0 85.192.56.142 85.192.56.142 prefix-length 25
ip nat pool POOL-10.1.16.0 85.192.56.143 85.192.56.143 prefix-length 25
ip nat pool POOL-10.1.17.0 85.192.56.144 85.192.56.144 prefix-length 25
ip nat pool POOL-10.1.21.0 85.192.56.145 85.192.56.145 prefix-length 25
ip nat pool POOL-10.1.23.0 85.192.56.146 85.192.56.146 prefix-length 25
ip nat pool POOL-10.2.1.0 85.192.56.147 85.192.56.147 prefix-length 25
ip nat pool POOL-10.2.2.0 85.192.56.148 85.192.56.148 prefix-length 25
ip nat pool POOL-10.2.3.0 85.192.56.149 85.192.56.149 prefix-length 25
ip nat pool POOL-10.2.4.0 85.192.56.150 85.192.56.150 prefix-length 25
ip nat pool POOL-10.2.5.0 85.192.56.151 85.192.56.151 prefix-length 25
ip nat pool POOL-10.2.6.0 85.192.56.152 85.192.56.152 prefix-length 25
ip nat pool POOL-10.2.7.0 85.192.56.153 85.192.56.153 prefix-length 25
ip nat pool POOL-10.2.9.0 85.192.56.154 85.192.56.154 prefix-length 25
ip nat pool POOL-10.2.10.0 85.192.56.155 85.192.56.155 prefix-length 25
ip nat pool POOL-10.2.11.0 85.192.56.156 85.192.56.156 prefix-length 25
ip nat pool POOL-10.2.12.0 85.192.56.157 85.192.56.157 prefix-length 25
ip nat pool POOL-10.2.14.0 85.192.56.158 85.192.56.158 prefix-length 25
ip nat pool POOL-10.2.15.0 85.192.56.159 85.192.56.159 prefix-length 25
ip nat pool POOL-10.2.52.0 85.192.56.160 85.192.56.160 prefix-length 25
ip nat pool POOL-10.2.56.0 85.192.56.161 85.192.56.161 prefix-length 25
ip nat pool POOL-10.2.67.0 85.192.56.162 85.192.56.162 prefix-length 25
ip nat pool POOL-10.3.1.0 85.192.56.163 85.192.56.163 prefix-length 25
ip nat pool POOL-10.4.1.0 85.192.56.164 85.192.56.164 prefix-length 25
ip nat pool POOL-10.4.2.0 85.192.56.165 85.192.56.165 prefix-length 25
ip nat pool POOL-10.4.3.0 85.192.56.166 85.192.56.166 prefix-length 25
ip nat pool POOL-10.4.4.0 85.192.56.167 85.192.56.167 prefix-length 25
ip nat pool POOL-10.4.6.0 85.192.56.168 85.192.56.168 prefix-length 25
ip nat pool POOL-10.4.7.0 85.192.56.169 85.192.56.169 prefix-length 25
ip nat pool POOL-10.4.8.0 85.192.56.170 85.192.56.170 prefix-length 25
ip nat pool POOL-10.4.9.0 85.192.56.171 85.192.56.171 prefix-length 25
ip nat pool POOL-10.4.14.0 85.192.56.172 85.192.56.172 prefix-length 25
ip nat pool POOL-10.4.16.0 85.192.56.173 85.192.56.173 prefix-length 25
ip nat pool POOL-10.4.17.0 85.192.56.174 85.192.56.174 prefix-length 25
ip nat pool POOL-10.4.18.0 85.192.56.175 85.192.56.175 prefix-length 25
ip nat pool POOL-10.4.19.0 85.192.56.176 85.192.56.176 prefix-length 25
ip nat pool POOL-10.4.20.0 85.192.56.177 85.192.56.177 prefix-length 25
ip nat pool POOL-10.4.21.0 85.192.56.178 85.192.56.178 prefix-length 25
ip nat pool POOL-10.4.22.0 85.192.56.179 85.192.56.179 prefix-length 25
ip nat pool POOL-10.4.23.0 85.192.56.180 85.192.56.180 prefix-length 25
ip nat pool POOL-10.4.52.0 85.192.56.181 85.192.56.181 prefix-length 25
ip nat pool POOL-10.4.53.0 85.192.56.182 85.192.56.182 prefix-length 25
ip nat pool HCM 85.192.56.254 85.192.56.254 prefix-length 25
ip nat pool POOL-10.4.12.0 85.192.56.183 85.192.56.183 prefix-length 25
ip nat pool POOL-192.168.101.0 85.192.56.184 85.192.56.184 prefix-length 25
ip nat pool POOL-192.168.104.0 85.192.56.185 85.192.56.185 prefix-length 25
ip nat pool POOL-192.168.106.0 85.192.56.186 85.192.56.186 prefix-length 25
ip nat pool POOL-192.168.108.0 85.192.56.187 85.192.56.187 prefix-length 25
ip nat pool POOL-192.168.109.0 85.192.56.188 85.192.56.188 prefix-length 25
ip nat pool POOL-192.168.110.0 85.192.56.189 85.192.56.189 prefix-length 25
ip nat pool POOL-192.168.111.0 85.192.56.190 85.192.56.190 prefix-length 25
ip nat pool POOL-192.168.112.0 85.192.56.191 85.192.56.191 prefix-length 25
ip nat pool POOL-192.168.114.0 85.192.56.192 85.192.56.192 prefix-length 25
ip nat pool POOL-10.2.13.0 85.192.56.193 85.192.56.193 prefix-length 25
ip nat pool POOL-10.4.55.0 85.192.56.194 85.192.56.194 prefix-length 25
ip nat pool POOL-10.3.4.0 85.192.56.196 85.192.56.196 prefix-length 25
ip nat pool HCM-192.168.201.0 85.192.56.253 85.192.56.253 prefix-length 25
ip nat inside source list NAT-POOL-10.1.1.0 pool POOL-10.1.1.0 overload
ip nat inside source list NAT-POOL-10.1.10.0 pool POOL-10.1.10.0 overload
ip nat inside source list NAT-POOL-10.1.12.0 pool POOL-10.1.12.0 overload
ip nat inside source list NAT-POOL-10.1.14.0 pool POOL-10.1.14.0 overload
ip nat inside source list NAT-POOL-10.1.15.0 pool POOL-10.1.15.0 overload
ip nat inside source list NAT-POOL-10.1.16.0 pool POOL-10.1.16.0 overload
ip nat inside source list NAT-POOL-10.1.17.0 pool POOL-10.1.17.0 overload
ip nat inside source list NAT-POOL-10.1.2.0 pool POOL-10.1.2.0 overload
ip nat inside source list NAT-POOL-10.1.21.0 pool POOL-10.1.21.0 overload
ip nat inside source list NAT-POOL-10.1.23.0 pool POOL-10.1.23.0 overload
ip nat inside source list NAT-POOL-10.1.3.0 pool POOL-10.1.3.0 overload
ip nat inside source list NAT-POOL-10.1.4.0 pool POOL-10.1.4.0 overload
ip nat inside source list NAT-POOL-10.1.5.0 pool POOL-10.1.5.0 overload
ip nat inside source list NAT-POOL-10.1.6.0 pool POOL-10.1.6.0 overload
ip nat inside source list NAT-POOL-10.1.7.0 pool POOL-10.1.7.0 overload
ip nat inside source list NAT-POOL-10.1.8.0 pool POOL-10.1.8.0 overload
ip nat inside source list NAT-POOL-10.1.9.0 pool POOL-10.1.9.0 overload
ip nat inside source list NAT-POOL-10.2.1.0 pool POOL-10.2.1.0 overload
ip nat inside source list NAT-POOL-10.2.10.0 pool POOL-10.2.10.0 overload
ip nat inside source list NAT-POOL-10.2.11.0 pool POOL-10.2.11.0 overload
ip nat inside source list NAT-POOL-10.2.12.0 pool POOL-10.2.12.0 overload
ip nat inside source list NAT-POOL-10.2.13.0 pool POOL-10.2.13.0 overload
ip nat inside source list NAT-POOL-10.2.14.0 pool POOL-10.2.14.0 overload
ip nat inside source list NAT-POOL-10.2.15.0 pool POOL-10.2.15.0 overload
ip nat inside source list NAT-POOL-10.2.2.0 pool POOL-10.2.2.0 overload
ip nat inside source list NAT-POOL-10.2.3.0 pool POOL-10.2.3.0 overload
ip nat inside source list NAT-POOL-10.2.4.0 pool POOL-10.2.4.0 overload
ip nat inside source list NAT-POOL-10.2.5.0 pool POOL-10.2.5.0 overload
ip nat inside source list NAT-POOL-10.2.52.0 pool POOL-10.2.52.0 overload
ip nat inside source list NAT-POOL-10.2.56.0 pool POOL-10.2.56.0 overload
ip nat inside source list NAT-POOL-10.2.6.0 pool POOL-10.2.6.0 overload
ip nat inside source list NAT-POOL-10.2.67.0 pool POOL-10.2.67.0 overload
ip nat inside source list NAT-POOL-10.2.7.0 pool POOL-10.2.7.0 overload
ip nat inside source list NAT-POOL-10.2.9.0 pool POOL-10.2.9.0 overload
ip nat inside source list NAT-POOL-10.3.1.0 pool POOL-10.3.1.0 overload
ip nat inside source list NAT-POOL-10.3.4.0 pool POOL-10.3.4.0 overload
ip nat inside source list NAT-POOL-10.4.1.0 pool POOL-10.4.1.0 overload
ip nat inside source list NAT-POOL-10.4.12.0 pool POOL-10.4.12.0 overload
ip nat inside source list NAT-POOL-10.4.14.0 pool POOL-10.4.14.0 overload
ip nat inside source list NAT-POOL-10.4.16.0 pool POOL-10.4.16.0 overload
ip nat inside source list NAT-POOL-10.4.17.0 pool POOL-10.4.17.0 overload
ip nat inside source list NAT-POOL-10.4.18.0 pool POOL-10.4.18.0 overload
ip nat inside source list NAT-POOL-10.4.19.0 pool POOL-10.4.19.0 overload
ip nat inside source list NAT-POOL-10.4.2.0 pool POOL-10.4.2.0 overload
ip nat inside source list NAT-POOL-10.4.20.0 pool POOL-10.4.20.0 overload
ip nat inside source list NAT-POOL-10.4.21.0 pool POOL-10.4.21.0 overload
ip nat inside source list NAT-POOL-10.4.22.0 pool POOL-10.4.22.0 overload
ip nat inside source list NAT-POOL-10.4.23.0 pool POOL-10.4.23.0 overload
ip nat inside source list NAT-POOL-10.4.3.0 pool POOL-10.4.3.0 overload
ip nat inside source list NAT-POOL-10.4.4.0 pool POOL-10.4.4.0 overload
ip nat inside source list NAT-POOL-10.4.52.0 pool POOL-10.4.52.0 overload
ip nat inside source list NAT-POOL-10.4.53.0 pool POOL-10.4.53.0 overload
ip nat inside source list NAT-POOL-10.4.55.0 pool POOL-10.4.55.0 overload
ip nat inside source list NAT-POOL-10.4.6.0 pool POOL-10.4.6.0 overload
ip nat inside source list NAT-POOL-10.4.7.0 pool POOL-10.4.7.0 overload
ip nat inside source list NAT-POOL-10.4.8.0 pool POOL-10.4.8.0 overload
ip nat inside source list NAT-POOL-10.4.9.0 pool POOL-10.4.9.0 overload
ip nat inside source list NAT-POOL-192.168.101.0 pool POOL-192.168.101.0 overload
ip nat inside source list NAT-POOL-192.168.104.0 pool POOL-192.168.104.0 overload
ip nat inside source list NAT-POOL-192.168.106.0 pool POOL-192.168.106.0 overload
ip nat inside source list NAT-POOL-192.168.108.0 pool POOL-192.168.108.0 overload
ip nat inside source list NAT-POOL-192.168.109.0 pool POOL-192.168.109.0 overload
ip nat inside source list NAT-POOL-192.168.110.0 pool POOL-192.168.110.0 overload
ip nat inside source list NAT-POOL-192.168.111.0 pool POOL-192.168.111.0 overload
ip nat inside source list NAT-POOL-192.168.112.0 pool POOL-192.168.112.0 overload
ip nat inside source list NAT-POOL-192.168.114.0 pool POOL-192.168.114.0 overload
ip nat inside source list NAT-POOL-HCM pool HCM overload
ip nat inside source list NAT-POOL-HCM-192.168.201.0 pool HCM-192.168.201.0 overload
ip nat inside source list NAT-POOL-TEST pool TEST overload
ip nat inside source static 10.4.8.2 85.192.56.170
ip nat inside source static 10.4.8.3 85.192.56.195
ip nat inside source static 10.4.2.3 85.192.56.165
ip nat inside source static 10.2.6.2 85.192.56.152
ip nat inside source static 10.2.5.2 85.192.56.151
ip nat inside source static 10.1.23.3 85.192.56.146
ip nat inside source static 10.1.8.2 85.192.56.137
ip classless
ip route 0.0.0.0 0.0.0.0 195.151.244.170 210
ip route 85.192.56.0 255.255.254.0 Null0
ip route 85.192.56.98 255.255.255.255 FastEthernet0/1.206
ip route 85.192.56.99 255.255.255.255 FastEthernet0/1.405
ip route 85.192.56.100 255.255.255.255 FastEthernet0/1.120
ip route 85.192.56.101 255.255.255.255 FastEthernet0/1.120
ip route 85.192.56.103 255.255.255.255 FastEthernet0/1.220
ip route 85.192.56.104 255.255.255.255 FastEthernet0/1.421
ip route 85.192.56.105 255.255.255.255 FastEthernet0/1.219
ip route 192.168.254.0 255.255.255.0 85.192.57.3
ip route 194.84.242.0 255.255.255.0 Null0
ip route 194.84.242.32 255.255.255.248 10.2.8.2
ip route 194.84.242.216 255.255.255.255 FastEthernet0/1.405
ip flow-export source FastEthernet0/1.1
ip flow-export version 5
ip flow-export destination 10.100.0.254 3000
no ip http server
!
!
ip prefix-list BGP-default seq 5 permit 0.0.0.0/0
ip prefix-list BGP-default seq 10 deny 0.0.0.0/0 le 32
!
ip access-list standard AS39165
permit 85.192.56.0 0.0.1.255
ip access-list standard DI-NET_BGP
remark List for filtering incoming BGP advertisement
deny any
ip access-list standard EQUANT-194-84-242
remark Addresses for net 194.84.242.0/24
permit 194.84.242.0 0.0.0.255
ip access-list standard EQUANT_BGP
remark List for filtering incoming BGP advertisement
deny any
ip access-list standard FROM-PRIVATE
remark Addresses from private networks
permit 10.0.0.0 0.255.255.255
permit 192.168.0.0 0.0.255.255
ip access-list standard NAT-POOL-10.1.1.0
permit 10.1.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.10.0
permit 10.1.10.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.12.0
permit 10.1.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.14.0
permit 10.1.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.15.0
permit 10.1.15.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.16.0
permit 10.1.16.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.17.0
permit 10.1.17.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.2.0
permit 10.1.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.21.0
permit 10.1.21.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.23.0
permit 10.1.23.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.3.0
permit 10.1.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.4.0
permit 10.1.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.5.0
permit 10.1.5.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.6.0
permit 10.1.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.7.0
permit 10.1.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.8.0
permit 10.1.8.0 0.0.0.255
ip access-list standard NAT-POOL-10.1.9.0
permit 10.1.9.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.1.0
permit 10.2.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.10.0
permit 10.2.10.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.11.0
permit 10.2.11.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.12.0
permit 10.2.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.13.0
permit 10.2.13.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.14.0
permit 10.2.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.15.0
permit 10.2.15.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.2.0
permit 10.2.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.3.0
permit 10.2.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.4.0
permit 10.2.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.5.0
permit 10.2.5.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.52.0
permit 10.2.52.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.56.0
permit 10.2.56.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.6.0
permit 10.2.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.67.0
permit 10.2.67.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.7.0
permit 10.2.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.2.9.0
permit 10.2.9.0 0.0.0.255
ip access-list standard NAT-POOL-10.3.1.0
permit 10.3.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.3.4.0
permit 10.3.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.1.0
permit 10.4.1.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.12.0
permit 10.4.12.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.14.0
permit 10.4.14.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.16.0
permit 10.4.16.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.17.0
permit 10.4.17.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.18.0
permit 10.4.18.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.19.0
permit 10.4.19.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.2.0
permit 10.4.2.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.20.0
permit 10.4.20.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.21.0
permit 10.4.21.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.22.0
permit 10.4.22.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.23.0
permit 10.4.23.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.3.0
permit 10.4.3.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.4.0
permit 10.4.4.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.52.0
permit 10.4.52.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.53.0
permit 10.4.53.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.55.0
permit 10.4.55.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.6.0
permit 10.4.6.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.7.0
permit 10.4.7.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.8.0
deny 10.4.8.3
permit 10.4.8.0 0.0.0.255
ip access-list standard NAT-POOL-10.4.9.0
permit 10.4.9.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.101.0
permit 192.168.101.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.104.0
permit 192.168.104.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.106.0
permit 192.168.106.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.108.0
permit 192.168.108.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.109.0
permit 192.168.109.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.110.0
permit 192.168.110.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.111.0
permit 192.168.111.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.112.0
permit 192.168.112.0 0.0.0.255
ip access-list standard NAT-POOL-192.168.114.0
permit 192.168.114.0 0.0.0.255
ip access-list standard NAT-POOL-HCM
permit 192.168.200.0 0.0.0.255
permit 192.168.255.0 0.0.0.255
ip access-list standard NAT-POOL-HCM-192.168.201.0
permit 192.168.201.0 0.0.0.255
permit 192.168.100.0 0.0.0.255
ip access-list standard NAT-POOL-TEST
permit 10.60.1.0 0.0.0.255
ip access-list standard SNMP_ACCESS_RO
permit 192.168.100.19
!
ip access-list extended DI-NET_IN
remark List for filtering incoming traffic from Di-Net
remark Prevent spoofing
deny ip 10.0.0.0 0.255.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 194.84.242.0 0.0.0.255 any
deny ip 85.192.56.0 0.0.1.255 any
remark Some common entries
permit icmp any any
permit udp any any
permit gre any any
permit tcp any any established
remark Allow BGP peering with Di-Net
permit tcp host 213.218.206.85 host 213.218.206.86 eq bgp
remark Allow incoming SMTP and SMTPS traffic to bigblue
deny tcp host 213.33.130.10 host 85.192.57.3 eq 465
deny tcp host 213.33.130.10 host 85.192.57.5 eq 465
permit tcp any host 85.192.57.3 eq smtp
permit tcp any host 85.192.57.3 eq 465
permit tcp any host 85.192.57.5 eq smtp
permit tcp any host 85.192.57.5 eq 465
remark Allow incoming IMAPS and POP3S traffic to bigblue
permit tcp any host 85.192.57.3 eq 993
permit tcp any host 85.192.57.3 eq 995
permit tcp any host 85.192.57.5 eq 993
permit tcp any host 85.192.57.5 eq 995
remark Allow incoming HTTP and HTTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq www
permit tcp any host 85.192.57.3 eq 22
permit tcp any host 85.192.57.3 eq 443
permit tcp any host 85.192.57.4 eq www
permit tcp any host 85.192.57.4 eq 443
permit tcp any host 85.192.57.5 eq www
permit tcp any host 85.192.57.5 eq 443
remark Allow transfer of DNS zones from bigblue
permit tcp any host 85.192.57.3 eq domain
remark Allow incoming FTP traffic to bigblue
permit tcp any host 85.192.57.3 eq ftp
permit tcp any host 85.192.57.3 range 49152 65534
remark Allow HTTP traffic to www.hcm.ru
remark Allow PPTP connection to vpn.hcm.ru
permit tcp any host 85.192.57.6 eq 1723
permit gre any host 85.192.57.6
remark Allow any trafic to clients with real addresses
deny ip any host 85.192.56.97
permit ip any 85.192.56.96 0.0.0.31
permit ip any host 85.192.56.170
permit ip any host 85.192.56.195
permit ip any host 85.192.56.165
permit ip any host 85.192.56.152
permit ip any host 85.192.56.146
permit ip any host 85.192.56.151
permit ip any host 85.192.56.137
deny ip any any
ip access-list extended DI-NET_OUT
remark List for filtering outgoing traffic to Di-Net
remark Disallow destinations with our networks
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 194.84.242.0 0.0.0.255
deny ip any 85.192.56.0 0.0.1.255
remark Allow any ip from 85.192.56.0/23
permit gre host 85.192.57.6 any
permit ip 85.192.56.0 0.0.1.255 any
deny ip any any
ip access-list extended EQUANT_IN
remark List for filtering incoming traffic from Equant
remark Prevent spoofing
deny ip 10.0.0.0 0.255.255.255 any
deny ip 192.168.0.0 0.0.255.255 any
deny ip 194.84.242.0 0.0.0.255 any
deny ip 85.192.56.0 0.0.1.255 any
remark Some common entries
permit icmp any any
permit udp any any
permit gre any any
permit tcp any any established
remark Allow BGP peering with EQUANT
permit tcp host 195.151.244.170 host 195.151.244.169 eq bgp
remark Allow incoming SMTP and SMTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq smtp
permit tcp any host 85.192.57.3 eq 465
permit tcp any host 85.192.57.5 eq smtp
permit tcp any host 85.192.57.5 eq 465
remark Allow incoming IMAPS and POP3S traffic to bigblue
permit tcp any host 85.192.57.3 eq 993
permit tcp any host 85.192.57.3 eq 995
permit tcp any host 85.192.57.5 eq 993
permit tcp any host 85.192.57.5 eq 995
remark Allow incoming HTTP and HTTPS traffic to bigblue
permit tcp any host 85.192.57.3 eq www
permit tcp any host 85.192.57.3 eq 22
permit tcp any host 85.192.57.3 eq 443
permit tcp any host 85.192.57.4 eq www
permit tcp any host 85.192.57.4 eq 443
permit tcp any host 85.192.57.5 eq www
permit tcp any host 85.192.57.5 eq 443
remark Allow transfer of DNS zones from bigblue
permit tcp any host 85.192.57.3 eq domain
remark Allow incoming FTP traffic to bigblue
permit tcp any host 85.192.57.3 eq ftp
permit tcp any host 85.192.57.3 range 49152 65534
remark Allow HTTP traffic to www.hcm.ru
remark Allow PPTP connection to vpn.hcm.ru
permit tcp any host 85.192.57.6 eq 1723
permit gre any host 85.192.57.6
remark Allow any trafic to clients with real addresses
deny ip any host 85.192.56.97
permit ip any 85.192.56.96 0.0.0.31
permit ip any host 85.192.56.170
permit ip any host 85.192.56.195
permit ip any host 85.192.56.165
permit ip any host 85.192.56.152
permit ip any host 85.192.56.146
permit ip any host 85.192.56.151
permit ip any host 85.192.56.137
deny ip any host 194.84.242.1
permit ip any 194.84.242.0 0.0.0.7
deny ip any host 194.84.242.9
permit ip any 194.84.242.8 0.0.0.7
deny ip any host 194.84.242.33
permit ip any 194.84.242.32 0.0.0.7
deny ip any host 194.84.242.41
permit ip any 194.84.242.40 0.0.0.7
deny ip any host 194.84.242.73
permit ip any 194.84.242.72 0.0.0.7
deny ip any host 194.84.242.81
permit ip any 194.84.242.80 0.0.0.7
deny ip any host 194.84.242.21
permit ip any 194.84.242.20 0.0.0.3
deny ip any host 194.84.242.25
permit ip any 194.84.242.24 0.0.0.3
deny ip any host 194.84.242.29
permit ip any 194.84.242.28 0.0.0.3
deny ip any host 194.84.242.53
permit ip any 194.84.242.52 0.0.0.3
deny ip any host 194.84.242.57
permit ip any 194.84.242.56 0.0.0.3
deny ip any host 194.84.242.61
permit ip any 194.84.242.60 0.0.0.3
deny ip any host 194.84.242.65
permit ip any 194.84.242.64 0.0.0.3
deny ip any host 194.84.242.69
permit ip any 194.84.242.68 0.0.0.3
deny ip any host 194.84.242.193
permit ip any 194.84.242.192 0.0.0.31
deny ip any any
ip access-list extended EQUANT_OUT
remark List for filtering outgoing traffic to Equant
remark Disallow destinations with our networks
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
deny ip any 194.84.242.0 0.0.0.255
deny ip any 85.192.56.0 0.0.1.255
permit gre host 85.192.57.6 any
remark Allow any ip from 85.192.56.0/23
permit ip 85.192.56.0 0.0.1.255 any
remark Allow any ip from 194.84.242.0/24
permit ip 194.84.242.0 0.0.0.255 any
deny ip any any
ip access-list extended TO-PRIVATE
remark Traffic to private networks
permit ip any 10.0.0.0 0.255.255.255
permit ip any 192.168.0.0 0.0.255.255
ip access-list extended Vlan120
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.100 any
permit ip host 85.192.56.101 any
deny ip any any
ip access-list extended Vlan205
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.106 any
permit ip host 194.84.242.197 any
deny ip any any
ip access-list extended Vlan206
deny ip host 10.2.6.1 any
permit udp any host 255.255.255.255 eq bootps
permit udp any host 10.2.6.1 eq bootps
permit icmp 10.2.6.0 0.0.0.255 host 10.2.6.1
deny ip any 10.0.0.0 0.255.255.255
deny ip any 192.168.0.0 0.0.255.255
permit ip 10.2.6.0 0.0.0.255 any
permit ip host 85.192.56.98 any
ip access-list extended Vlan219
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.105 any
deny ip any any
ip access-list extended Vlan220
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.103 any
deny ip any any
ip access-list extended Vlan405
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.98 any
permit ip host 85.192.56.99 any
permit ip host 194.84.242.216 any
deny ip any any
ip access-list extended Vlan421
permit tcp any 10.0.0.0 0.255.255.255 established
deny ip any 10.0.0.0 0.255.255.255
permit tcp any 192.168.0.0 0.0.255.255 established
deny ip any 192.168.0.0 0.0.255.255
permit ip host 85.192.56.104 any
deny ip any any
logging trap debugging
logging 194.84.242.125
access-list 1300 permit 10.0.0.0 0.255.255.255
access-list 1300 permit 192.168.0.0 0.0.255.255
access-list 1300 permit 85.192.56.0 0.0.1.255
access-list 1302 permit 194.67.179.130
access-list 1302 permit 194.67.179.132
access-list 1302 permit 192.168.255.0 0.0.0.255
access-list 1302 permit 192.168.200.0 0.0.0.255
access-list 1302 permit 192.168.100.0 0.0.0.255
access-list 1303 permit 194.67.179.130
access-list 2001 remark Filter for private networks
access-list 2001 deny ip any 10.0.0.0 0.255.255.255
access-list 2001 deny ip any 192.168.0.0 0.0.255.255
access-list 2001 permit ip any any
access-list 2005 remark Input filter for our net
access-list 2005 deny ip 194.84.242.0 0.0.0.255 any
access-list 2005 deny ip 10.0.0.0 0.255.255.255 any
access-list 2005 deny ip 192.168.0.0 0.0.255.255 any
access-list 2005 permit ip host 194.67.179.130 10.1.7.0 0.0.0.255
access-list 2005 deny ip any 10.0.0.0 0.255.255.255
access-list 2005 deny ip any 192.168.0.0 0.0.255.255
access-list 2005 permit icmp any any
access-list 2005 permit udp any any
access-list 2005 permit gre any any
access-list 2005 permit tcp any any established
access-list 2005 permit tcp any host 194.67.179.130 eq www
access-list 2005 permit tcp any host 194.67.179.130 eq domain
access-list 2005 permit udp any host 194.67.179.130 eq domain
access-list 2005 deny ip any host 194.84.242.1
access-list 2005 permit ip any 194.84.242.0 0.0.0.7
access-list 2005 deny ip any host 194.84.242.9
access-list 2005 permit ip any 194.84.242.8 0.0.0.7
access-list 2005 deny ip any host 194.84.242.33
access-list 2005 permit ip any 194.84.242.32 0.0.0.7
access-list 2005 deny ip any host 194.84.242.41
access-list 2005 permit ip any 194.84.242.40 0.0.0.7
access-list 2005 deny ip any host 194.84.242.73
access-list 2005 permit ip any 194.84.242.72 0.0.0.7
access-list 2005 deny ip any host 194.84.242.81
access-list 2005 permit ip any 194.84.242.80 0.0.0.7
access-list 2005 deny ip any host 194.84.242.21
access-list 2005 permit ip any 194.84.242.20 0.0.0.3
access-list 2005 deny ip any host 194.84.242.25
access-list 2005 permit ip any 194.84.242.24 0.0.0.3
access-list 2005 deny ip any host 194.84.242.29
access-list 2005 permit ip any 194.84.242.28 0.0.0.3
access-list 2005 deny ip any host 194.84.242.53
access-list 2005 permit ip any 194.84.242.52 0.0.0.3
access-list 2005 deny ip any host 194.84.242.57
access-list 2005 permit ip any 194.84.242.56 0.0.0.3
access-list 2005 deny ip any host 194.84.242.61
access-list 2005 permit ip any 194.84.242.60 0.0.0.3
access-list 2005 deny ip any host 194.84.242.65
access-list 2005 permit ip any 194.84.242.64 0.0.0.3
access-list 2005 deny ip any host 194.84.242.69
access-list 2005 permit ip any 194.84.242.68 0.0.0.3
access-list 2005 deny ip any host 194.84.242.193
access-list 2005 permit ip any 194.84.242.192 0.0.0.31
access-list 2005 permit ip any host 194.84.242.251
access-list 2005 deny ip any any
access-list 2010 remark Filter for outbound trafic
access-list 2010 deny ip 10.0.0.0 0.255.255.255 any
access-list 2010 deny ip 192.168.0.0 0.0.255.255 any
access-list 2010 deny ip any 10.0.0.0 0.255.255.255 log
access-list 2010 deny ip any 192.168.0.0 0.0.255.255 log
access-list 2010 deny ip any 194.84.242.0 0.0.0.255 log
access-list 2010 deny tcp host 194.84.242.214 any eq smtp
access-list 2010 permit ip any any
access-list 2015 remark Filter for outbound trafic of MMK network
access-list 2015 permit ip any 194.84.242.0 0.0.0.255
access-list 2015 permit ip any 85.192.57.0 0.0.0.255
access-list 2015 permit ip any 194.67.179.128 0.0.0.7
access-list 2015 permit ip 192.168.200.192 0.0.0.63 host 217.14.48.50
access-list 2015 permit tcp host 192.168.200.29 host 194.186.207.162 eq 670
access-list 2015 permit icmp host 192.168.200.29 host 194.186.207.162
access-list 2015 deny ip host 192.168.200.29 any
access-list 2015 deny ip any 10.0.0.0 0.255.255.255
access-list 2015 deny ip 192.168.200.192 0.0.0.63 any
access-list 2015 deny tcp any any eq smtp
access-list 2015 permit ip any any
access-list 2501 remark Filter for unused addresses on int fa0/1.501
access-list 2501 permit tcp any 10.0.0.0 0.255.255.255 established
access-list 2501 deny ip any 10.0.0.0 0.255.255.255
access-list 2501 permit tcp any 192.168.0.0 0.0.255.255 established
access-list 2501 deny ip any 192.168.0.0 0.0.255.255
access-list 2501 permit ip host 194.84.242.195 any
access-list 2501 permit ip host 194.84.242.197 any
access-list 2501 permit ip host 194.84.242.199 any
access-list 2501 permit ip host 194.84.242.203 any
access-list 2501 permit ip host 194.84.242.201 any
access-list 2501 permit ip host 194.84.242.221 any
access-list 2501 permit ip host 194.84.242.222 any
access-list 2501 permit ip host 194.84.242.66 any
access-list 2501 permit ip host 194.84.242.62 any
access-list 2501 permit ip host 194.84.242.58 any
access-list 2501 permit ip host 194.84.242.54 any
access-list 2501 permit ip host 194.84.242.207 any
access-list 2501 permit ip host 194.84.242.209 any
access-list 2501 permit ip host 194.84.242.212 any
access-list 2501 permit ip host 194.84.242.214 any
access-list 2501 permit ip host 85.192.56.102 any
access-list 2501 deny ip any any log
access-list 2502 remark Accounting for private addresses filter
access-list 2502 permit ip 10.0.0.0 0.255.255.255 host 194.84.23.125
access-list 2502 permit ip 192.168.0.0 0.0.255.255 host 194.84.23.125
access-list 2502 permit ip 10.0.0.0 0.255.255.255 host 193.232.88.17
access-list 2502 permit ip 192.168.0.0 0.0.255.255 host 193.232.88.17
access-list 2502 deny ip any 10.0.0.0 0.255.255.255
access-list 2502 deny ip any 192.168.0.0 0.0.255.255
access-list 2502 deny ip any 194.84.242.0 0.0.0.255
access-list 2502 deny ip any 85.192.56.0 0.0.1.255
access-list 2502 permit ip host 10.4.12.2 any
access-list 2503 permit ip any 10.0.0.0 0.255.255.255
access-list 2503 permit ip any 192.168.0.0 0.0.255.255
dialer-list 1 protocol ip permit
arp 194.84.242.66 000f.3d0f.9086 ARPA
arp 194.84.242.54 0050.1809.f865 ARPA
arp 194.84.242.62 0008.a16e.fbbc ARPA
arp 194.84.242.58 0080.ad09.9aef ARPA
arp 194.84.242.195 0016.e09e.004b ARPA
arp 194.84.242.207 0050.da76.2130 ARPA
arp 194.84.242.201 00d0.b7d5.087c ARPA
arp 194.84.242.203 0004.ac38.75e4 ARPA
arp 194.84.242.212 0050.2287.fb6b ARPA
arp 194.84.242.214 4c00.1061.0e24 ARPA
arp 85.192.56.102 0002.b319.859f ARPA
no cdp run
route-map FLOW permit 10
match ip address 2503
set interface Loopback2
!
route-map ACCT permit 20
match ip address 1300
set ip default next-hop 194.84.242.99
!
route-map RMT-NEXT-HOP permit 10
match ip address 1302
set ip default next-hop 194.67.160.241
!
route-map TO-DI-NET permit 10
match ip address AS39165
set ip default next-hop 194.84.242.99
!
route-map RMT permit 10
match ip address 2502
set interface Loopback1
!
route-map OUT permit 10
match ip address FROM-PRIVATE
set default interface Loopback0
!
route-map OUT permit 20
match ip address EQUANT-194-84-242
set ip default next-hop 195.151.244.170
!
route-map OUT-2 permit 10
match ip address EQUANT-194-84-242
set ip default next-hop 195.151.244.170
!
route-map PREPEND permit 10
set as-path prepend 39165 39165 39165 39165 39165 39165 39165 39165 39165 39165
!
route-map NAT permit 10
match ip address 1302
set ip next-hop 10.202.0.2
!
!
snmp-server community public RO
snmp-server enable traps tty
tacacs-server host 192.168.100.3
tacacs-server timeout 60
tacacs-server directed-request
tacacs-server key 7 065658771F190A485D4116590E067B2F75706234754B51415B52075D0804045E54
!
dial-peer cor custom
!
!
!
privilege exec level 8 show ip accounting
privilege exec level 8 clear ip accounting
privilege exec level 8 clear ip accounting checkpoint
privilege exec level 8 show ip accounting checkpoint
!
line con 0
transport output telnet
line aux 0
transport output telnet
line vty 0 4
password 7 121D0011000A0B
authorization exec HCM
login authentication HCM
transport input telnet
line vty 5 16
authorization exec HCM
login authentication HCM
!
ntp clock-period 17208510
ntp server 85.192.57.3
ntp server 80.240.109.22
end
[/more]
Jeison_M Да, по таблице можно только понять, кто куда ходит, но сколько он там скачал, таких данных нет.
Простых вариантов решения проблемы нет. Можно шейпить исходящий трафик на внутренних интерфейсах. Можно заставить циску передавать netflow, но это плохо отразится на ее умственных способностях. Можно зазеркалить порт на коммутаторе с тем, который идет к циске, на отдельной машине организовать пакетный сниффер и собирать статистику.
Простых вариантов решения проблемы нет. Можно шейпить исходящий трафик на внутренних интерфейсах. Можно заставить циску передавать netflow, но это плохо отразится на ее умственных способностях. Можно зазеркалить порт на коммутаторе с тем, который идет к циске, на отдельной машине организовать пакетный сниффер и собирать статистику.
zubastiy
точка доступа живет сама по себе или работает в паре с контроллером?
перегружать можно отдельную точку доступа в обоих случаях.
Добавлено:
Jeison_M
1. поддерживает ли софт функционал nbar?
2. включите netflow.
точка доступа живет сама по себе или работает в паре с контроллером?
перегружать можно отдельную точку доступа в обоих случаях.
Добавлено:
Jeison_M
1. поддерживает ли софт функционал nbar?
2. включите netflow.
ESX091 перегружать можно отдельную точку доступа в обоих случаях.
Интересно каким образом???
Интересно каким образом???
Jeison_M
включить нетфлоу и, как вариант, добавить в конфиг:
ip flow-top-talkers
top 100
sort-by bytes
cache-timeout 200
и смотреть топ-толкеров:
sh ip f t
включить нетфлоу и, как вариант, добавить в конфиг:
ip flow-top-talkers
top 100
sort-by bytes
cache-timeout 200
и смотреть топ-толкеров:
sh ip f t
skliz
что именно Вам интересно?
что именно Вам интересно?
ESX091
как по времени вы собираетесь перегружать точку доступа????
как по времени вы собираетесь перегружать точку доступа????
skliz
на самой точке доступа:
1. reload at
с ближайшего оборудования cisco:
1. eem
2. kron
с компьютера:
1. скрипты
2. securecrt
зачем перегружать оборудование???
на самой точке доступа:
1. reload at
с ближайшего оборудования cisco:
1. eem
2. kron
с компьютера:
1. скрипты
2. securecrt
зачем перегружать оборудование???
Страницы: 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
Предыдущая тема: Не могу побороть вирус Nimda
Форум Ru-Board.club — поднят 15-09-2016 числа. Цель - сохранить наследие старого Ru-Board, истории становления российского интернета. Сделано для людей.