扫一扫
分享文章到微信
扫一扫
关注官方公众号
至顶头条
在本页阅读全文(共2页)
dis cu
#
sysname BM_BANGONWAN_P2
#
ike local-name p2
#
ip option source-routing
#
dialer-rule 1 ip permit
#
ike peer dk
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name zx
remote-address 60.0.0.1
nat traversal
#
ipsec proposal dk
#
ipsec policy dk 1 isakmp
security acl 3010
ike-peer dk
proposal dk
#
dhcp server ip-pool 1
network 10.70.65.112 mask 255.255.255.240
gateway-list 10.70.65.113
dns-list 202.99.224.8 202.99.224.68
#
interface Bri3/0
link-protocol ppp
#
interface Dialer0
link-protocol ppp
ppp pap local-user lhkdtxf123gs@service2m.nm password simple 8270054
mtu 1450
ip address ppp-negotiate
dialer user lhkdtxf123gs@service2m.nm
dialer-group 1
dialer bundle 1
nat outbound 3001
ipsec policy dk
#
interface Ethernet1/0
ip address 10.70.65.113 255.255.255.240
#
interface Atm2/0
pvc 0/32
map bridge Virtual-Ethernet0
#
interface Virtual-Ethernet0
pppoe-client dial-bundle-number 1
#
interface NULL0
#
interface LoopBack0
ip address 10.70.65.54 255.255.255.255
#
acl number 3001
rule 0 deny ip destination 10.70.64.0 0.0.0.255
rule 1 permit ip source 10.70.65.112 0.0.0.15
acl number 3010
rule 0 permit ip source 10.70.64.0 0.0.0.255 destination 10.70.65.112 0.0.0.15
rule 1 permit ip source 10.70.65.112 0.0.0.15 destination 10.70.64.0 0.0.0.255
#
ip route-static 0.0.0.0 0.0.0.0 Dialer 0 preference 60
#
user-interface con 0
user-interface vty 0 4
user privilege level 3
set authentication password cipher N`C55QK<`=/Q=^Q`MAF4<1!!
#
return
<BM_BANGONWAN_P2>
dis cu
#
sysname BM_BANGONGWAN_AR4640
#
super password level 3 cipher I=G>;ZJOROP3HC6>:*%XYA!!
#
l2tp enable
#
local-user root password cipher N`C55QK<`=/Q=^Q`MAF4<1!!
local-user root service-type telnet
local-user vpn@cnc.com password simple vpn
local-user vpn@cnc.com service-type ppp
local-user test password cipher =W6JJ`N_LBKQ=^Q`MAF4<1!!
local-user test service-type ppp
#
ip pool 1 192.168.0.2 192.168.0.254
#
aaa enable
#
ike local-name zx
#
nat address-group 0 60.0.0.1 60.0.0.6
#
ike peer cnc
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name cnc
nat traversal
max-connections 100
#
ike peer dk
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name dk
nat traversal
max-connections 100
#
ike peer hq
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name hq
nat traversal
max-connections 100
#
ike peer p1
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name p1
nat traversal
max-connections 100
#
ike peer p2
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name p2
nat traversal
max-connections 100
#
ike peer p3
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name p3
nat traversal
max-connections 100
#
ike peer p4
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name p4
nat traversal
max-connections 100
#
ike peer qq
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name qq
nat traversal
max-connections 100
#
ike peer sb
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name sb
nat traversal
max-connections 100
#
ike peer zq
exchange-mode aggressive
pre-shared-key cnc
id-type name
remote-name zq
nat traversal
max-connections 100
#
ipsec proposal cnc
#
ipsec policy zx 1 isakmp
security acl 3001
ike-peer cnc
proposal cnc
#
ipsec policy zx 2 isakmp
security acl 3001
ike-peer qq
proposal cnc
#
ipsec policy zx 3 isakmp
security acl 3001
ike-peer zq
proposal cnc
#
ipsec policy zx 4 isakmp
security acl 3001
ike-peer hq
proposal cnc
#
ipsec policy zx 5 isakmp
security acl 3001
ike-peer dk
proposal cnc
#
ipsec policy zx 6 isakmp
security acl 3001
ike-peer sb
proposal cnc
#
ipsec policy zx 7 isakmp
security acl 3001
ike-peer p1
proposal cnc
#
ipsec policy zx 8 isakmp
security acl 3001
ike-peer p2
proposal cnc
#
ipsec policy zx 9 isakmp
security acl 3001
ike-peer p3
proposal cnc
#
ipsec policy zx 10 isakmp
security acl 3001
ike-peer p4
proposal cnc
#
dhcp server ip-pool 10
network 10.70.64.0 mask 255.255.255.0
gateway-list 10.70.64.1
dns-list 2.99.224.8 202.99.224.68
#
interface Virtual-Template1
ppp authentication-mode pap
ip address 192.168.0.1 255.255.255.0
remote address pool 1
#
interface Aux0
async mode flow
link-protocol ppp
#
interface Ethernet0/0/0
speed 100
duplex full
description connect to S8016_E15/0/6
tcp mss 1024
ip address 60.0.0.1 255.255.255.248
firewall packet-filter 3500 inbound
firewall packet-filter 3500 outbound
nat outbound 3000 address-group 0
ipsec policy zx
#
interface Ethernet0/0/1
description connect to EUDEMON200e1/0/1
ip address 10.70.64.1 255.255.255.0
firewall packet-filter 3500 inbound
firewall packet-filter 3500 outbound
#
interface Ethernet1/0/0
#
interface Ethernet1/0/1
#
interface NULL0
#
interface Loopback0
ip address 10.70.64.99 255.255.255.255
#
acl number 3000
rule 0 deny ip destination 10.70.65.0 0.0.0.255
rule 1 permit ip source 10.70.64.0 0.0.0.255
acl number 3001
rule 0 permit ip source 10.70.65.0 0.0.0.255 destination 10.70.64.0 0.0.0.255
rule 1 permit ip source 10.70.64.0 0.0.0.255 destination 10.70.65.0 0.0.0.255
acl number 3500
rule 0 deny udp source-port eq tftpdestination-port eq tftp
rule 1 deny tcp source-port eq 135 destination-port eq 135
rule 2 deny udp source-port eq 135 destination-port eq 135
rule 3 deny udp source-port eq netbios-ns destination-port eq netbios-ns
rule 4 deny udp source-port eq netbios-dgm destination-port eq netbios-dgm
rule 5 deny udp source-port eq netbios-ssn destination-port eq netbios-ssn
rule 6 deny tcp source-port eq 139 destination-port eq 139
rule 7 deny tcp source-port eq 445 destination-port eq 445
rule 8 deny tcp source-port eq 593 destination-port eq 593
rule 9 deny tcp source-port eq 4444 destination-port eq 5444
rule 11 deny tcp destination-port eq 5554
rule 12 deny tcp destination-port eq 9995
rule 13 deny tcp destination-port eq 9996
rule 14 deny tcp destination-port eq 3127
rule 15 deny tcp destination-port eq 1025
rule 16 deny tcp destination-port eq 137
rule 17 deny tcp destination-port eq 138
rule 18 deny tcp destination-port eq 5800
rule 19 deny tcp destination-port eq 5900
rule 20 deny tcp destination-port eq 8998
#
l2tp-group 1
undo tunnel authentication
allow l2tp virtual-template 1
#
dhcp server forbidden-ip 10.70.64.240 10.70.64.254
#
ip route-static 0.0.0.0 0.0.0.0 60.0.0.6 preference 60
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
user privilege level 3
set authentication password cipher N`C55QK<`=/Q=^Q`MAF4<1!!
#
return
<BM_BANGONGWAN_AR4640>
如果您非常迫切的想了解IT领域最新产品与技术信息,那么订阅至顶网技术邮件将是您的最佳途径之一。
现场直击|2021世界人工智能大会
直击5G创新地带,就在2021MWC上海
5G已至 转型当时——服务提供商如何把握转型的绝佳时机
寻找自己的Flag
华为开发者大会2020(Cloud)- 科技行者