gw1#sh ver Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(15)T7, RELEASE SOFTWARE (fc3) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2008 by Cisco Systems, Inc. Compiled Wed 13-Aug-08 15:37 by prod_rel_team ROM: System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1) gw1 uptime is 16 hours, 57 minutes System returned to ROM by power-on System image file is "flash:c1841-advsecurityk9-mz.124-15.T7.bin" This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. Cisco 1841 (revision 5.0) with 117760K/13312K bytes of memory. Processor board ID FCZ091322G6 2 FastEthernet interfaces 1 ATM interface 1 Virtual Private Network (VPN) Module DRAM configuration is 64 bits wide with parity disabled. 191K bytes of NVRAM. 62720K bytes of ATA CompactFlash (Read/Write) Configuration register is 0x2102 gw1#sh run Building configuration... Current configuration : 6381 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname gw1 ! boot-start-marker boot-end-marker ! logging buffered 8192 ! no aaa new-model clock timezone GMT 0 clock summer-time BST recurring last Sun Mar 1:00 last Sun Oct 1:00 dot11 syslog no ip source-route ip cef ! ! ! ! ip port-map user-protocol--2 port tcp 3389 ip port-map user-protocol--1 port tcp 7071 ip inspect name cbac_out tcp alert off audit-trail on router-traffic ip inspect name cbac_out udp alert off audit-trail on router-traffic ! ip name-server 208.67.222.222 ip name-server 208.67.220.220 ! login block-for 60 attempts 5 within 60 login on-success log ! ! crypto pki trustpoint TP-self-signed-2044246416 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-2044246416 revocation-check none rsakeypair TP-self-signed-2044246416 ! ! crypto pki certificate chain TP-self-signed-2044246416 certificate self-signed 01 3082024A 308201B3 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 32303434 32343634 3136301E 170D3038 30393038 31373133 34355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 30343432 34363431 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100CCAE B08710AA A51B7A77 ABA305DE 6E441E62 76A628ED EFF41DDD 12BD7DCE 156B7B44 8452A07B 9EA1847A 0DA78D4B 76C03B3A 5DCC5F74 10464F8D 711DB01D 00FA1BD6 31C360F9 DCF87F1E 3D7C4CD3 BF66FD15 81ED4807 3FAC06EC CB34F476 8E72A7CF 4565DD9E 0B3F477E 764512E3 065DE9A7 CDA874CA 647751F2 28B892A2 A7990203 010001A3 72307030 0F060355 1D130101 FF040530 030101FF 301D0603 551D1104 16301482 12677731 2E666C61 746D6169 6C2E636F 2E756B30 1F060355 1D230418 30168014 B265A987 15E9A5CB 89BBD418 812D2C20 38B80D66 301D0603 551D0E04 160414B2 65A98715 E9A5CB89 BBD41881 2D2C2038 B80D6630 0D06092A 864886F7 0D010104 05000381 81008EA8 F7C3B237 37BCE064 BC284C63 82A96D21 D0215673 38264613 AD5DC9BB F67907DD 914130DD 434D185B 450CA714 087F7293 9B5A3A59 595A049F 5FF1C45D FE1AD855 A05F7FFA F7C75828 E06E9969 DF81B084 5A826F43 BF932655 84003ED6 56FEAB5B 7BF5268F 23A12AD2 B0445C91 75853659 8465F048 FD111D88 DAD259B9 73DE quit ! ! username blah archive log config hidekeys ! ! ! ! ip ssh version 2 ! class-map type inspect match-any SDM_SSH match access-group name SDM_SSH class-map type inspect match-any SDM_HTTPS match access-group name SDM_HTTPS class-map type inspect match-any SDM_SHELL match access-group name SDM_SHELL ! ! ! ! interface FastEthernet0/0 description $FW_INSIDE$$ETH-LAN$ ip address 192.168.2.5 255.255.255.0 ip nbar protocol-discovery ip flow ingress ip flow egress ip nat inside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 no ip address shutdown duplex auto speed auto ! interface ATM0/0/0 mac-address 0014.7f82.79fb no ip address no ip redirects no atm auto-configuration no atm ilmi-keepalive no atm address-registration no atm ilmi-enable dsl operating-mode auto dsl enable-training-log ! interface ATM0/0/0.1 point-to-point description Connection to BE$FW_OUTSIDE$ ip address dhcp no ip proxy-arp ip nbar protocol-discovery ip flow ingress ip flow egress ip nat outside ip virtual-reassembly atm route-bridged ip pvc 0/101 no oam-pvc manage encapsulation aal5snap ! ! ip forward-protocol nd ! ip flow-top-talkers top 10 sort-by bytes ! no ip http server ip http authentication local ip http secure-server ip nat inside source list hide-nat interface ATM0/0/0.1 overload ip nat inside source static tcp 192.168.2.2 7071 interface ATM0/0/0.1 7071 ip nat inside source static tcp 192.168.2.2 3389 interface ATM0/0/0.1 3389 ! ip access-list extended SDM_HTTPS remark SDM_ACL Category=1 permit tcp any any eq 443 ip access-list extended SDM_SHELL remark SDM_ACL Category=1 permit tcp any any eq cmd ip access-list extended SDM_SSH remark SDM_ACL Category=1 permit tcp any any eq 22 ip access-list extended from-internet permit icmp any any echo-reply permit udp any any eq bootpc deny ip any any ip access-list extended hide-nat permit ip 192.168.2.0 0.0.0.255 any ! access-list 174 deny ip 192.168.2.0 0.0.0.255 any access-list 174 deny ip any 192.168.2.0 0.0.0.255 access-list 174 permit ip any any ! ! ! ! control-plane ! ! line con 0 logging synchronous line aux 0 line vty 0 4 logging synchronous login local transport input ssh transport output telnet ssh ! scheduler allocate 20000 1000 end gw1# ATM0/0/0 Alcatel 20190 chipset information ATU-R (DS) ATU-C (US) Modem Status: Showtime (DMTDSL_SHOWTIME) DSL Mode: ITU G.992.5 (ADSL2+) Annex A ITU STD NUM: 0x03 0x2 Chip Vendor ID: 'STMI' 'BDCM' Chip Vendor Specific: 0x0000 0x918F Chip Vendor Country: 0x0F 0xB5 Modem Vendor ID: 'CSCO' ' ' Modem Vendor Specific: 0x0000 0x0000 Modem Vendor Country: 0xB5 0x00 Serial Number Near: FOC10521WUPCISCO73993206 Serial Number Far: Chip ID: C196 (0) DFE BOM: DFE3.0 Annex A (1) Capacity Used: 95% 100% Noise Margin: 8.5 dB 9.0 dB Output Power: 19.0 dBm 12.0 dBm Attenuation: 37.0 dB 17.0 dB Defect Status: None None Last Fail Code: None Watchdog Counter: 0x2B Watchdog Resets: 0 Selftest Result: 0x00 Subfunction: 0x00 Interrupts: 22703 (0 spurious) PHY Access Err: 0 Activations: 3 LED Status: OFF LED On Time: 0 LED Off Time: 0 Init FW: init_AMR-3.0.014_no_bist.bin Operation FW: AMR-3.0.014.bin FW Source: embedded FW Version: 3.0.14 DS Channel1 DS Channel0 US Channel1 US Channel0 Speed (kbps): 0 7159 0 1048 Cells: 0 979032 0 46965783 Reed-Solomon EC: 0 3327 0 0 CRC Errors: 0 12 0 0 Header Errors: 0 12 0 0 Total BER: 0E-0 1018E-10 Leakage Average BER: 0E-0 5743E-11 Interleave Delay: 0 0 0 2 ATU-R (DS) ATU-C (US) Bitswap: enabled enabled Bitswap success: 0 0 Bitswap failure: 0 0