Table Of Contents
Sample Configuration
Sample Configuration
This chapter collects the results of the Ethernet WAN interface, DHCP, VLAN, Easy VPN, and wireless interface configurations made in previous chapters. This allows you to view what a basic configuration provided by this guide looks like in a single sample, Example 10-1.
Note
Commands marked by "(default)" are generated automatically when you run the show running-config command.
Example 10-1 Sample Configuration
Router# show running-config
Building configuration...
Current configuration : 3781 bytes
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
username jsomeone password 0 cg6#107X
aaa group server radius rad_eap
server 10.0.1.1 auth-port 1812 acct-port 1813
aaa authentication login eap_methods group rad_eap
dialer-list 1 protocol ip permit
ip nat inside source list 1 interface dialer 0 overload
ip route 10.10.25.2 0.255.255.255 dialer 0
ip dhcp excluded-address 10.0.1.1 10.0.1.10
ip dhcp excluded-address 10.0.2.1 10.0.2.10
ip dhcp excluded-address 10.0.3.1 10.0.3.10
network 10.0.1.0 255.255.255.0
network 10.0.2.0 255.255.255.0
network 10.0.3.0 255.255.255.0
no ftp-server write-enable
ip address 192.1.12.2 255.255.255.0
no ip directed-broadcast (default)
crypto ipsec client ezvpn ezvpnclient outside
crypto isakmp client configuration group rtr-remote
dns 10.50.10.1 10.60.10.1
crypto ipsec transform-set vpn1 esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 86400
crypto dynamic-map dynmap 1
crypto map static-map 1 ipsec-isakmp dynamic dynmap
crypto map dynmap isakmp authorization list rtr-remote
crypto map dynmap client configuration address respond
crypto ipsec client ezvpn ezvpnclient
group 2 key secret-password
broadcast-key vlan 1 change 45
encryption vlan 1 mode ciphers tkip
authentication network-eap eap_methods
authentication key-management wpa optional
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
encapsulation dot1Q 1 native
bridge-group 1 subscriber-loop-control
bridge-group 1 spanning-disabled
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 2 subscriber-loop-control
bridge-group 2 spanning-disabled
bridge-group 2 block-unknown-source
no bridge-group 2 source-learning
no bridge-group 2 unicast-flooding
bridge-group 3 subscriber-loop-control
bridge-group 3 spanning-disabled
bridge-group 3 block-unknown-source
no bridge-group 3 source-learning
no bridge-group 3 unicast-flooding
ip address 192.168.1.1 255.255.255.0
no ip directed-broadcast (default)
crypto ipsec client ezvpn ezvpnclient inside
bridge-group 1 spanning-disabled
bridge-group 2 spanning-disabled
bridge-group 3 spanning-disabled
ip address 10.0.1.1 255.255.255.0
ip address 10.0.2.1 255.255.255.0
ip address 10.0.3.1 255.255.255.0
nas 10.0.1.1 key 0 cisco123
user jsomeone nthash 7 0529575803696F2C492143375828267C7A760E1113734624452725707C010B065B
user AMER\jsomeone nthash 7
0224550C29232E041C6A5D3C5633305D5D560C09027966167137233026580E0B0D
radius-server host 10.0.1.1 auth-port 1812 acct-port 1813 key cisco123
ip inspect name firewall tcp
ip inspect name firewall udp
ip inspect name firewall rtsp
ip inspect name firewall h323
ip inspect name firewall netshow
ip inspect name firewall ftp
ip inspect name firewall sqlnet
access-list 103 permit udp host 200.1.1.1 any eq isakmp
access-list 103 permit udp host 200.1.1.1 eq isakmp any
access-list 103 permit esp host 200.1.1.1 any
access-list 103 permit icmp any any
access-list 103 deny ip any any
access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255