|
Компьютерный форум OSzone.net » Железо » Сетевое оборудование » Cisco - Cisco 800 серии. Требуется с аналогичной циски загрузить конфиг! |
|
Cisco - Cisco 800 серии. Требуется с аналогичной циски загрузить конфиг!
|
Пользователь Сообщения: 88 |
Доброго времени!
Исходные данные: Есть Cisco 800 серии территорильно удаленная, есть доступ по telnet. Есть 20 локации с такими же цисками, с аналогичной конфигурацией, отличающейся только логином/паролем на Интернет, ip и mac адресами устройств, всё остальное в принципе идентично! Конфиг с рабочей циски: =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2012.09.09 17:35:29 =~=~=~=~=~=~=~=~=~=~=~= login as: Hr.admin Using keyboard-interactive authentication. Password: hall_kruno#en hall_kruno#terminal length 0 hall_kruno#sh conf Using 5393 out of 131072 bytes, uncompressed size = 11573 bytes Uncompressed configuration from 5393 bytes to 11573 bytes ! version 12.4 configuration mode exclusive auto no service pad service timestamps debug datetime msec localtime show-timezone year service timestamps log datetime msec localtime show-timezone year service password-encryption service compress-config ! hostname hall_kruno ! boot-start-marker boot-end-marker ! logging message-counter syslog no logging buffered no logging console enable secret 5 $1$MIj0$E1wq.2fcoQavyN3/d795c/ ! aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication enable default group tacacs+ enable aaa authorization console aaa authorization exec default group tacacs+ local aaa authorization commands 15 default group tacacs+ none aaa accounting update newinfo periodic 120 aaa accounting exec default action-type start-stop group tacacs+ ! aaa accounting commands 0 default action-type start-stop group tacacs+ ! aaa accounting commands 1 default action-type start-stop group tacacs+ ! aaa accounting commands 2 default action-type start-stop group tacacs+ ! aaa accounting commands 3 default action-type start-stop group tacacs+ ! aaa accounting commands 4 default action-type start-stop group tacacs+ ! aaa accounting commands 5 default action-type start-stop group tacacs+ ! aaa accounting commands 6 default action-type start-stop group tacacs+ ! aaa accounting commands 7 default action-type start-stop group tacacs+ ! aaa accounting commands 8 default action-type start-stop group tacacs+ ! aaa accounting commands 9 default action-type start-stop group tacacs+ ! aaa accounting commands 10 default action-type start-stop group tacacs+ ! aaa accounting commands 11 default action-type start-stop group tacacs+ ! aaa accounting commands 12 default action-type start-stop group tacacs+ ! aaa accounting commands 13 default action-type start-stop group tacacs+ ! aaa accounting commands 14 default action-type start-stop group tacacs+ ! aaa accounting commands 15 default action-type start-stop group tacacs+ ! aaa accounting network default action-type start-stop group tacacs+ ! aaa accounting network IPSec_tun_accounting action-type start-stop group IPSec_tun_aaa_server ! aaa accounting connection default action-type start-stop group tacacs+ ! aaa accounting system default action-type start-stop group tacacs+ ! aaa accounting resource default action-type start-stop group tacacs+ ! ! ! aaa session-id common clock timezone CET 1 clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 3:00 ! ! dot11 syslog no ip source-route ! ! ! ip dhcp pool Hall_Users network 172.28.1.0 255.255.255.248 default-router 172.28.1.1 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 option 150 ip 172.17.254.1 lease 0 0 5 ! ip dhcp pool Hall_PC host 172.28.1.2 255.255.255.248 client-identifier 0100.2264.4ed5.a8 default-router 172.28.1.1 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 lease 0 0 5 ! ip dhcp pool Hall_Video_recorder host 172.28.1.3 255.255.255.248 client-identifier 0100.115f.024f.06 default-router 172.28.1.1 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 lease 0 0 5 ! ip dhcp pool Hall_GameNet host 172.28.1.4 255.255.255.248 client-identifier 0100.1cc4.91e1.0e default-router 172.28.1.1 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 lease 0 0 5 ! ip dhcp pool Hall_Hattrick host 192.168.2.2 255.255.255.248 client-identifier 0100.1999.6239.12 default-router 192.168.2.1 domain-name domain.com dns-server 195.29.166.118 195.29.149.196 195.29.149.197 lease 0 0 5 ! ip dhcp pool Hall_Dreambox host 192.168.2.3 255.255.255.248 client-identifier 0100.8888.8888.89 default-router 192.168.2.1 domain-name domain.com dns-server 195.29.166.118 195.29.149.196 195.29.149.197 lease 0 0 5 ! ! ip cef ip domain name domain.com no ipv6 cef ntp server 172.17.184.1 ! multilink bundle-name authenticated ! ! ! file verify auto ! no spanning-tree vlan 1 no spanning-tree vlan 10 no spanning-tree vlan 102 no spanning-tree vlan 103 no spanning-tree vlan 1002 no spanning-tree vlan 1003 username cisco-lomaster privilege 0 user-maxlinks 1 secret 5 xxxxx username hr.admin privilege 15 user-maxlinks 1 secret 5 xxxxx ! crypto keyring 4_Static_IPSec_clients description ============== Preshared key 4 leased IPSec's tunnel ============ pre-shared-key address x.x.x.x key 7R3Pfo17iRcTZ2DM3uwZlLR0wg4svDcJGGscrAzcVizDt1EZHJatRFbLVRHkEWSm7SwuediTW3EncGZT eBpQPWR7OH3Hb73OOnY4uarwXhUI4HEiBxaixj1hXH ! crypto isakmp policy 1 encr aes 256 authentication pre-share group 5 crypto isakmp keepalive 10 periodic crypto isakmp profile Static_IPSec_profiles description ==================== 4 Static IPSec's tunnel =================== keyring 4_Static_IPSec_clients match identity address x.x.x.x 255.255.255.255 ! crypto ipsec security-association idle-time 60 ! crypto ipsec transform-set Name esp-aes 256 esp-sha-hmac crypto ipsec df-bit clear ! crypto map static_IPSec_VPN 10 ipsec-isakmp description =================== Name IPSec tunnel ================== set peer x.x.x.x set transform-set Name set pfs group5 set isakmp-profile Static_IPSec_profiles match address 110 reverse-route ! archive log config hidekeys ! ! ip ssh version 2 ! track 1 ip sla 1 ! track 2 ip sla 2 ! bridge irb ! ! interface BRI0 no ip address encapsulation hdlc shutdown ! interface ATM0 no ip address no atm ilmi-keepalive pvc 0/33 encapsulation aal5snap pppoe-client dial-pool-number 1 ! hold-queue 4096 in ! interface ATM0.40 point-to-point pvc 0/40 encapsulation aal5snap ! bridge-group 102 bridge-group 102 spanning-disabled ! interface FastEthernet0 hold-queue 4096 in hold-queue 4096 out ! interface FastEthernet1 switchport access vlan 10 hold-queue 4096 in hold-queue 4096 out ! interface FastEthernet2 switchport access vlan 10 hold-queue 4096 in hold-queue 4096 out ! interface FastEthernet3 switchport access vlan 10 hold-queue 4096 in hold-queue 4096 out ! interface Vlan1 description ======================== Restricted subnet ======================= ip address 192.168.2.1 255.255.255.248 ip access-group 120 in no ip redirects no ip proxy-arp ip flow ingress ip nat inside ip virtual-reassembly ip route-cache policy no ip mroute-cache load-interval 30 hold-queue 4096 in hold-queue 4096 out ! interface Vlan10 ip address 172.28.1.1 255.255.255.248 ip mtu 1400 ip nat inside ip virtual-reassembly ip tcp adjust-mss 1400 no autostate ! interface Vlan102 no ip address bridge-group 102 bridge-group 102 spanning-disabled ! interface Vlan103 ip address 10.216.2.254 255.255.255.0 shutdown no autostate ! interface Dialer1 description ===================== PPPoE DoD WAN interface ==================== mtu 1492 ip address negotiated no ip redirects no ip proxy-arp ip flow ingress ip nat outside ip virtual-reassembly encapsulation ppp ip route-cache policy ip tcp adjust-mss 1452 no ip mroute-cache load-interval 30 dialer pool 1 dialer remote-name htnet-dsl dialer-group 1 peer ip address forced peer match aaa-pools ppp chap hostname htnet-dsl ppp chap password 7 xxxxx ppp pap sent-username htnet-dsl password 7 xxxxx ppp ipcp dns request ppp ipcp wins request crypto map static_IPSec_VPN hold-queue 4096 in hold-queue 4096 out ! interface Dialer0 no ip address ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 Dialer1 no ip http server no ip http secure-server ! ! ip nat inside source list 100 interface Dialer1 overload ip nat inside source static tcp 192.168.2.2 21 interface Dialer1 1021 ip nat inside source static tcp 192.168.2.2 23 interface Dialer1 1023 ip nat inside source static tcp 192.168.2.3 21 interface Dialer1 21 ip nat inside source static tcp 192.168.2.3 23 interface Dialer1 23 ! ip sla 1 icmp-echo 172.17.184.1 source-ip 172.28.1.1 timeout 4000 verify-data tag probe_CO frequency 20 ip sla schedule 1 life forever start-time now logging source-interface Vlan10 logging 172.17.32.24 logging 172.17.5.18 access-list 5 remark ================== Management VTY Access ================ access-list 5 permit 172.17.184.1 access-list 5 permit 172.17.184.69 access-list 5 permit xxx.xx.xxx.xx access-list 5 permit yyy.yy.yy.yy access-list 5 permit 172.28.1.3 access-list 5 permit 172.28.1.2 access-list 5 permit 172.17.5.0 0.0.0.255 access-list 5 permit 213.247.244.248 0.0.0.3 access-list 5 remark ===================================================== access-list 6 remark =================== Maintenance Services ================= access-list 6 permit 172.17.32.24 access-list 6 permit 172.17.32.97 access-list 6 permit 172.17.5.0 0.0.0.255 access-list 6 remark ===================================================== access-list 11 remark ==================== Distribute list ===================== access-list 11 permit 10.0.0.0 0.255.255.255 access-list 11 permit 172.16.0.0 0.15.255.255 access-list 11 remark ==================================================== access-list 100 remark ========================== NAT ===================== access-list 100 remark deny ip 10.216.2.0 0.0.0.255 172.16.0.0 0.15.255.255 access-list 100 deny ip 172.28.1.0 0.0.0.7 172.16.0.0 0.15.255.255 access-list 100 deny ip 192.168.2.0 0.0.0.7 172.17.184.0 0.0.0.128 access-list 100 permit ip 192.168.2.0 0.0.0.7 any access-list 100 permit ip 172.28.1.0 0.0.0.7 any access-list 100 remark =================================================== access-list 110 remark ================== IPSec Name ================ access-list 110 remark permit ip 10.216.2.0 0.0.0.255 172.16.0.0 0.15.255.255 access-list 110 permit ip 192.168.2.0 0.0.0.7 172.17.184.0 0.0.0.128 access-list 110 permit ip 172.28.1.0 0.0.0.7 172.16.0.0 0.15.255.255 access-list 110 remark =================================================== access-list 120 remark ======================= Guest ACL =================== access-list 120 permit udp host 0.0.0.0 eq bootpc host 255.255.255.255 eq bootps access-list 120 permit ip 192.168.2.0 0.0.0.7 172.17.184.0 0.0.0.128 access-list 120 permit ip 192.168.2.0 0.0.0.7 192.168.2.0 0.0.0.7 access-list 120 deny ip 192.168.2.0 0.0.0.7 172.16.0.0 0.15.255.255 access-list 120 deny ip 192.168.2.0 0.0.0.7 192.168.0.0 0.0.255.255 access-list 120 deny ip 192.168.2.0 0.0.0.7 10.0.0.0 0.255.255.255 access-list 120 permit ip 192.168.2.0 0.0.0.7 any access-list 120 deny ip any any log-input access-list 120 remark =================================================== dialer-list 1 protocol ip permit ! ! ! ! ! control-plane ! bridge 102 protocol ieee bridge 102 route ip ! line con 0 exec-timeout 60 0 timeout login response 60 no modem enable transport preferred none transport output ssh stopbits 1 line aux 0 access-class 5 in exec-timeout 60 0 timeout login response 60 transport preferred ssh transport input ssh transport output telnet ssh stopbits 1 line vty 0 4 access-class 5 in exec-timeout 60 0 timeout login response 60 transport preferred ssh transport input ssh transport output telnet ssh ! scheduler max-task-time 5000 end hall_kruno#ee xit Конфиг циски, которую надо донастроить: =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2012.10.18 19:34:14 =~=~=~=~=~=~=~=~=~=~=~= User Access Verification Username: ciscoadmin Password: hall_hvar>en Password: hall_hvar#ter hall_hvar#terminal le hall_hvar#terminal length 0 hall_hvar#sh run Building configuration... Current configuration : 3601 bytes ! version 12.4 no service pad service timestamps debug datetime msec localtime show-timezone year service timestamps log datetime msec localtime show-timezone year service password-encryption service compress-config ! hostname hall_hvar ! boot-start-marker boot-end-marker ! logging message-counter syslog enable secret 5 $1$h0L.$0jLEox78AfL.iZZP79hGX/ ! aaa new-model ! ! aaa authentication login default local ! ! aaa session-id common clock timezone CET 1 clock summer-time CET recurring last Sun Mar 2:00 last Sun Oct 3:00 ! ! dot11 syslog ip source-route ! ! ! ip dhcp pool Hall_PC host 172.28.1.36 255.255.255.248 client-identifier 0100.1e0b.24b7.c9 default-router 172.28.1.33 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 option 150 ip 172.17.254.1 ! ip dhcp pool TEMP host 172.28.1.37 255.255.255.248 client-identifier 0100.2264.556e.5c default-router 172.28.1.33 domain-name domain.com dns-server 172.17.184.20 172.17.184.21 195.29.166.118 195.29.149.196 195.29.149.197 option 150 ip 172.17.254.1 ! ! ip cef ip domain name domain.com no ipv6 cef ntp server 172.17.184.1 ! multilink bundle-name authenticated ! ! ! username xxxxx privilege 15 password 7 xxxxx username ciscoadmin privilege 15 password 7 xxxxx ! ! ! archive log config hidekeys ! ! ip ssh version 2 ! bridge irb ! ! interface BRI0 no ip address encapsulation hdlc shutdown ! interface ATM0 no ip address load-interval 30 no atm ilmi-keepalive pvc 0/33 encapsulation aal5snap pppoe-client dial-pool-number 1 ! hold-queue 4096 in ! interface FastEthernet0 ! interface FastEthernet1 switchport access vlan 10 ! interface FastEthernet2 ! interface FastEthernet3 switchport access vlan 10 ! interface Vlan1 ip address 192.168.1.100 255.255.255.248 no ip redirects no ip proxy-arp ip flow ingress ip nat inside ip virtual-reassembly ip route-cache policy no ip mroute-cache ! interface Vlan10 ip address 172.28.1.33 255.255.255.248 ip nat inside ip virtual-reassembly ip tcp adjust-mss 1400 no autostate ! interface Dialer1 mtu 1492 ip address negotiated no ip redirects no ip proxy-arp ip flow ingress ip nat outside ip virtual-reassembly encapsulation ppp ip route-cache policy ip tcp adjust-mss 1452 no ip mroute-cache load-interval 30 dialer pool 1 dialer-group 1 peer ip address forced peer match aaa-pools ppp chap hostname htnet-dsl ppp chap password 7 121D240210281E5C2C ppp pap sent-username htnet-dsl password 7 03007A1E042C331448 ppp ipcp dns request ppp ipcp wins request hold-queue 4096 in hold-queue 4096 out ! ip forward-protocol nd ip route 0.0.0.0 0.0.0.0 Dialer1 no ip http server no ip http secure-server ! ! ip nat inside source list 100 interface Dialer1 overload ! access-list 5 remark ================== Management VTY Access ================ access-list 5 permit 172.17.184.1 access-list 5 permit 212.233.69.95 access-list 5 permit 172.28.1.155 access-list 5 permit 172.17.184.69 access-list 5 permit xxx.xx.xxx.xx access-list 5 permit yyy.yy.yyy.yy access-list 5 permit 195.162.9.226 access-list 5 permit 212.111.69.95 access-list 5 permit 172.28.1.32 0.0.0.7 access-list 5 permit 172.17.5.0 0.0.0.255 access-list 5 permit 213.247.244.248 0.0.0.3 access-list 100 permit ip 192.168.1.96 0.0.0.7 any access-list 100 permit ip 172.28.1.32 0.0.0.7 any ! ! ! ! ! control-plane ! ! line con 0 no modem enable line aux 0 line vty 0 4 access-class 5 in ! scheduler max-task-time 5000 end hall_hvar#exit Можете подсказать как записать остальные настройки кроме инета, Hall_PC и Temp в циску и если можно рассписать поподробнее т.к. я не шарю в цисках??? With Best Regards Brainiacs |
|
Отправлено: 02:29, 27-10-2012 |
Ветеран Сообщения: 2029
|
Профиль | Отправить PM | Цитировать Насколько я понял, Вам надо просто скопировать файл конфигурации с одного маршрутизатора на другой и немного изменить его при этом?
Причем, судя по тому, что эту конфигурацию Вы уже опубликовали, команду "copy running-config <протокол>:" Вы уже выполнили. Тогда не совсем понятна проблема - исправить (проще всего сценарием) нужные строки (имена учетных записей, пароли, при необходимости ip-адреса интерфейсов) и скопировать на маршрутизаторы аналогичной же командой: "copy <протокол>: startup-config". Или я что-то не так понял в Вашем вопросе? |
------- Отправлено: 20:54, 27-10-2012 | #2 |
Для отключения данного рекламного блока вам необходимо зарегистрироваться или войти с учетной записью социальной сети. Если же вы забыли свой пароль на форуме, то воспользуйтесь данной ссылкой для восстановления пароля. |
Пользователь Сообщения: 88
|
Профиль | Отправить PM | Цитировать 2 AMDBulldozer
Первый человек, кто ответил на двух форумах, спасибо! Цитата:
Команду эту я не делал, это из putty sh conf, вторую cisco вручную настраивал! Сценарием не подойдет, я не знаю всех паролей! Цитата:
Нужно подготовить конфиг и записать его на эту cisco чтобы всё было как и на остальных (исключая Интернет и устройства). With Best Regards Brainiacs |
||
Отправлено: 13:20, 28-10-2012 | #3 |
Ветеран Сообщения: 2029
|
Профиль | Отправить PM | Цитировать Цитата Brainiacs:
Удобнее вводить команды в режиме конфигурации (conf t) по одной на самом устройстве. Так, по крайней мере, Вы всегда сразу получите сообщение об ошибке, с указанием места ошибки в строке и подсказку (по нажатию "?"). А когда настроите свой маршрутизатор, тогда уже сможете сохранить файл конфигурации на ПК (обычно с использованием tftp или ssh). |
|
------- Отправлено: 15:26, 28-10-2012 | #4 |
Пользователь Сообщения: 88
|
Профиль | Отправить PM | Цитировать 2 AMDBulldozer
С конфигурацией нужна помощь, нужно подготовить конфиг, tftp я настроил можно залить! Самое главное изменить в конфиге настройки инета и устройств и не перепутать по портам, вот с этим у меня проблема!! With Best Regards Brainiacs |
|
Отправлено: 16:33, 10-12-2012 | #5 |
![]() |
Участник сейчас на форуме |
![]() |
Участник вне форума |
![]() |
Автор темы |
![]() |
Сообщение прикреплено |
| |||||
Название темы | Автор | Информация о форуме | Ответов | Последнее сообщение | |
Конфиг на 15 тыс.рэ | Dyadka_Le | Выбор отдельных компонентов компьютера и конфигурации в целом | 2 | 27-08-2012 16:04 | |
Cisco - управление cisco <Cisco PIX 515 Firewall> | oren_yastreb | Сетевое оборудование | 18 | 24-06-2010 21:59 | |
VPN - Cisco PIX - Internet - ISA Server - Cisco PIX VPN | rrew | Сетевое оборудование | 0 | 26-09-2008 09:31 | |
Управление Cisco PIX и Cisco IDS | Bugs | Сетевые технологии | 4 | 25-05-2005 10:41 | |
Защита сетки с реальными айпишниками с помощью циски | Guest | Сетевые технологии | 1 | 15-01-2004 21:50 |
|