Current configuration : 8531 bytes ! version 12.4 no service pad service tcp-keepalives-in service tcp-keepalives-out service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service sequence-numbers ! hostname CPAME2 ! boot-start-marker boot-end-marker ! logging buffered 51200 debugging logging console critical enable secret 5 $1$R2cu$xyWP0MGAIT3VUVz2eVsQt0 ! no aaa new-model ! resource policy ! clock timezone PCTime 1 clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00 ip subnet-zero no ip source-route ip cef no ip dhcp use vrf connected ip dhcp excluded-address 192.168.29.1 192.168.29.9 ip dhcp excluded-address 192.168.29.251 192.168.29.254 ! ip dhcp pool sdm-pool1 import all network 192.168.29.0 255.255.255.0 default-router 192.168.29.1 ! ! ip tcp synwait-time 10 no ip bootp server ip domain name cpa.de ip ssh time-out 60 ip ssh authentication-retries 2 ip sla 1 icmp-echo 194.39.97.20 source-interface Dialer0 timeout 1000 threshold 2 frequency 3 ip sla schedule 1 life forever start-time now ! isdn switch-type basic-net3 ! crypto pki trustpoint TP-self-signed-1233674016 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-1233674016 revocation-check none rsakeypair TP-self-signed-1233674016 ! ! crypto pki certificate chain TP-self-signed-1233674016 certificate self-signed 01 30820245 308201AE A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 31323333 36373430 3136301E 170D3037 30323039 31373536 35345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 32333336 37343031 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100B376 A90F3ABF 5BA717D8 3B6C7AF0 A39A5855 35E6B7E8 3B77DD94 3EAAEA4B 052100D9 14C509AF DB4C9C69 A2DA732E E3432E47 8A3F445E D7F98870 23A474C9 60B887C8 A70F15FE C95E4098 CC841906 2F322EB6 D33E5091 133158CB 075BD1F0 76F06D55 0CFC611E B73BFD9D 15658915 6D613FB4 CC1801D9 80870E0F 96BDEA2D 70D30203 010001A3 6D306B30 0F060355 1D130101 FF040530 030101FF 30180603 551D1104 11300F82 0D435041 4D45322E 6370612E 6465301F 0603551D 23041830 168014A6 FC1E607D BD2CFB51 BE03F285 9867AD69 D93FB530 1D060355 1D0E0416 0414A6FC 1E607DBD 2CFB51BE 03F28598 67AD69D9 3FB5300D 06092A86 4886F70D 01010405 00038181 00218547 C5087A88 CE56F824 FF66AC82 869710AE 594E39C1 762F530F 2AAF3804 25D8940A 0DC6CD33 5EA75ACD 0CC32883 AFBB112D 933F3B2E DB382B66 A8396C30 21CD9259 ABF37ADA 3954BB7D 4E059EC8 1F9D2CA6 FEFBE79B 64EFB040 0FF6267B CD9F55BC 7C1F6A66 124E83E0 A951E9CC 66349177 69DF4EBF A199012F 2AA3C7B8 F9 quit username cpaadmin privilege 15 secret 5 $1$tSJM$8N4UQS3rFcOK/IKAcfIun/ ! ! track 1 rtr 1 reachability ! ! crypto isakmp policy 1 encr 3des authentication pre-share group 2 crypto isakmp key abcdefg1234567 address 212.110.123.98 ! ! crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac ! crypto ipsec client ezvpn cpa-messe-bkp connect auto group cpa-messe key abcd1234 mode network-plus peer 212.110.123.98 acl 106 username cpaadmin password apcy2k xauth userid mode local crypto ipsec client ezvpn cpa-messe connect auto group cpa-messe key abcd1234 backup cpa-messe-bkp track 1 mode network-plus peer 212.110.123.98 acl 105 username cpaadmin password apcy2k xauth userid mode local ! bridge irb ! ! interface BRI0 description $BACKUP_INTF_ATM0.1_TRACK_1$ no ip address no ip redirects no ip unreachables no ip proxy-arp encapsulation ppp ip route-cache flow dialer pool-member 2 isdn switch-type basic-net3 isdn point-to-point-setup ! interface ATM0 no ip address no ip redirects no ip unreachables no ip proxy-arp ip route-cache flow no atm ilmi-keepalive dsl operating-mode auto ! interface ATM0.1 point-to-point description $ES_WAN$$FW_OUTSIDE$ ip nat outside ip virtual-reassembly pvc 1/1 encapsulation aal5mux ppp dialer dialer pool-member 1 ! ! interface FastEthernet0 ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3 ! interface Dot11Radio0 no ip address ! ssid ARAMESSE1 authentication open ! speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 b asic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0 channel 2422 station-role root bridge-group 1 bridge-group 1 spanning-disabled ! interface Vlan1 description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$FW_INSIDE$ no ip address ip tcp adjust-mss 1452 bridge-group 1 ! interface Dialer0 ip address negotiated no ip redirects no ip unreachables no ip proxy-arp encapsulation ppp ip route-cache flow dialer pool 1 dialer-group 1 no cdp enable ppp authentication chap pap callin ppp chap hostname test ppp chap password 7 0010161510 ppp pap sent-username test password 7 0835495D1D crypto ipsec client ezvpn cpa-messe ! interface Dialer1 ip address negotiated encapsulation ppp dialer pool 2 dialer string 002116499962 dialer-group 2 no cdp enable ppp authentication chap pap callin ppp chap hostname arcor ppp chap password 7 141E1C1F0916242E30 ppp pap sent-username arcor password 7 011A08105E19080A35 crypto ipsec client ezvpn cpa-messe-bkp ! interface BVI1 description $ES_LAN$ ip address 192.168.29.1 255.255.255.0 ip nat inside ip virtual-reassembly ip tcp adjust-mss 1412 crypto ipsec client ezvpn cpa-messe-bkp inside crypto ipsec client ezvpn cpa-messe inside ! ip local policy route-map SDM_BACKUP_RMAP_1 ip classless ip route 0.0.0.0 0.0.0.0 Dialer0 track 1 ip route 0.0.0.0 0.0.0.0 Dialer1 2 ! ip http server ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ip nat inside source list 1 interface ATM0.1 overload ! logging trap debugging access-list 1 remark INSIDE_IF=BVI1 access-list 1 remark SDM_ACL Category=2 access-list 1 permit 192.168.29.0 0.0.0.255 access-list 100 remark SDM Backup Route-Map ACL access-list 100 remark SDM_ACL Category=1 access-list 100 permit icmp any host 194.39.97.20 echo access-list 106 remark SDM_ACL Category=4 access-list 106 permit ip 192.168.8.0 0.0.3.255 any access-list 106 permit ip 194.39.96.0 0.0.0.255 any dialer-list 1 protocol ip permit dialer-list 2 protocol ip permit no cdp run route-map SDM_BACKUP_RMAP_1 permit 1 match ip address 100 set interface Dialer0 Null0 ! ! control-plane ! bridge 1 protocol ieee bridge 1 route ip banner exec ^C % Password expiration warning. ----------------------------------------------------------------------- Cisco Router and Security Device Manager (SDM) is installed on this device and it provides the default username "cisco" for one-time use. If you have already used the username "cisco" to login to the router and your IOS image supports the "one-time" user option, then this username has already expired. You will not be able to login to the router with this username after you exit this session. It is strongly suggested that you create a new username with a privilege level of 15 using the following command. username privilege 15 secret 0 Replace and with the username and password you want to use. ----------------------------------------------------------------------- ^C banner login ^CAuthorized access only! Disconnect IMMEDIATELY if you are not an authorized user!^C ! line con 0 login local no modem enable transport output telnet line aux 0 login local transport output telnet line vty 0 4 privilege level 15 login local transport input telnet ssh ! scheduler max-task-time 5000 scheduler allocate 4000 1000 scheduler interval 500 end