VPN
VPN
VPN
Ro_Paresa-VPN2911#sh runn
Building configuration...
Current configuration : 46791 bytes
!
! Last configuration change at 16:48:17 GMT Mon Jul 25 2016 by delucal
version 15.1
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime localtime show-timezone
service password-encryption
service linenumber
service sequence-numbers
!
hostname Ro_Paresa-VPN2911
!
boot-start-marker
boot-end-marker
!
!
card type e1 0 0
security authentication failure rate 3 log
security passwords min-length 6
logging buffered informational
logging console informational
logging monitor informational
enable secret 4 gu.xqKHXtxgZlwlDPpkto1HTrtJphuI4krg6rO2Hdmk
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login userauthen local
aaa authentication enable default group tacacs+ enable
aaa authorization commands 2 default group tacacs+ local
aaa authorization commands 3 default group tacacs+ local
aaa authorization commands 4 default group tacacs+ local
aaa authorization commands 5 default group tacacs+ local
aaa authorization commands 6 default group tacacs+ local
aaa authorization commands 7 default group tacacs+ local
aaa authorization commands 8 default group tacacs+ local
aaa authorization commands 9 default group tacacs+ local
aaa authorization commands 11 default group tacacs+ local
aaa authorization commands 12 default group tacacs+ local
aaa authorization commands 13 default group tacacs+ local
aaa authorization commands 14 default group tacacs+ local
aaa authorization network groupauthor local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 2 default start-stop group tacacs+
aaa accounting commands 3 default start-stop group tacacs+
aaa accounting commands 4 default start-stop group tacacs+
aaa accounting commands 5 default start-stop group tacacs+
aaa accounting commands 6 default start-stop group tacacs+
aaa accounting commands 7 default start-stop group tacacs+
aaa accounting commands 8 default start-stop group tacacs+
aaa accounting commands 9 default start-stop group tacacs+
05050030
43657274
34333535
1325494F
31323433
02818100
5EA87A57
E5C5E262
4D631430
67BB4047
0603551D
1D060355
06092A86
08477A71
2AA109AF
4CF256A5
53775E26
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
username
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 40
encr 3des
hash md5
authentication pre-share
!
crypto isakmp policy 50
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 60
hash md5
authentication pre-share
!
crypto isakmp policy 100
encr aes 256
authentication pre-share
group 5
!
crypto isakmp policy 300
lifetime 28800
crypto isakmp key buenosairesparaguay001 address 200.32.101.217 no-xauth
crypto isakmp key chile101paraguay address 200.42.174.178 no-xauth
crypto isakmp key onondivemi-paresa address 190.128.128.146 no-xauth
crypto isakmp key 123prueba321pY@@jojo address 200.85.39.254 no-xauth
crypto isakmp key CI1d93$%SD7tV$% address 201.217.17.78 no-xauth
crypto isakmp key p@r3s4_PuNt0.pY&t3ch-2012 address 190.128.232.122 no-xauth
crypto isakmp key S3p5@#P@R35@_2012 address 181.40.81.34 no-xauth
crypto isakmp key S3p5@#P@R35@_2012 address 201.222.53.218
crypto isakmp key buenosairesparaguay001 address 200.27.136.158
crypto isakmp keepalive 10
crypto isakmp client configuration address-pool local vpnpool
!
crypto isakmp client configuration group Soporte
key Aratei27+
dns 10.24.89.60 10.24.88.28
domain paresa.net
pool vpnpool2
acl paresa-crypto
!
crypto isakmp client configuration group Soporte2
key Apy105+
dns 10.24.88.28
domain paresa.com.py
pool vpnpool
acl paresa-crypto2
!
crypto isakmp client configuration group Usuarios
key Aratei28+
dns 10.24.89.60 10.24.88.28
domain paresa.net
pool vpnpool
acl paresa-crypto
!
crypto isakmp client configuration group PHElectronica
key Elect21!
frame-relay interface-dlci 17
service-policy output QoS_shape_out
!
router bgp 65019
bgp log-neighbor-changes
neighbor 192.168.240.2 remote-as 10834
!
address-family ipv4
redistribute connected route-map redistribute-connected
redistribute static
neighbor 192.168.240.2 activate
neighbor 192.168.240.2 soft-reconfiguration inbound
distribute-list filter-bgp-e1 in
exit-address-family
!
ip local pool vpnpool 192.168.40.63 192.168.40.88
ip local pool vpnpool2 192.168.40.20 192.168.40.23
ip local pool vpnpool2 192.168.40.28 192.168.40.35
ip local pool vpnpoolPH 192.168.40.24 192.168.40.27
ip local pool vpnpoolEF 192.168.80.33 192.168.80.38
ip local pool vpnpoolCEXSAP 192.168.40.57 192.168.40.62
ip local pool vpnpoolWS 192.168.40.36 192.168.40.39
ip forward-protocol nd
!
no ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 600 life 86400 requests 10000
!
ip nat inside source list internet interface GigabitEthernet0/1.434 overload
ip nat inside source static tcp 192.168.50.11 25 200.85.45.98 25 route-map SDM_R
MAP_1 extendable
ip nat inside source static tcp 192.168.50.123 80 200.85.45.98 80 extendable
ip nat inside source static tcp 192.168.50.123 443 200.85.45.98 443 extendable
ip nat inside source static tcp 10.24.88.31 515 200.85.45.98 515 extendable
ip nat inside source static tcp 192.168.10.1 443 200.85.45.98 1122 extendable
ip nat inside source static tcp 192.168.50.50 2222 200.85.45.98 2222 extendable
ip nat inside source static tcp 192.168.50.50 3299 200.85.45.98 3299 route-map S
extendable
ip nat inside source static tcp 192.168.50.123 8080 200.85.45.98 8080 extendable
ip nat inside source static tcp 10.24.88.37 9100 200.85.45.98 9100 extendable
ip route 0.0.0.0 0.0.0.0 200.85.45.97
ip route 10.24.88.0 255.255.252.0 192.168.10.1 name Inside_networks
ip route 138.35.0.0 255.255.0.0 192.168.10.1 name HPE
ip route 151.162.165.15 255.255.255.255 200.85.45.97 name PAG_COCA_COLA
ip route 151.162.165.91 255.255.255.255 200.85.45.97 name PAG_COCA_COLA
ip route 172.18.80.0 255.255.255.252 10.10.1.1 name LAN_SEPSA
ip route 180.182.0.0 255.255.0.0 192.168.10.1
ip route 180.183.0.0 255.255.0.0 192.168.10.1
ip route 181.40.16.19 255.255.255.255 200.85.45.97 name google.com.py
ip route 181.40.16.57 255.255.255.255 200.85.45.97 name google.com.py
ip route 181.40.64.235 255.255.255.255 200.85.45.97 name tbo.tigo.py
ip route 181.40.65.16 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.20 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.24 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.26 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.27 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.31 255.255.255.255 200.85.45.97 name maps.google.com
ip route 181.40.65.35 255.255.255.255 200.85.45.97 name maps.google.com
logging 138.35.216.13
access-list 15 permit 207.169.88.57
access-list 15 permit 207.169.88.55
access-list 15 permit 207.169.88.52
access-list 15 permit 207.169.88.49
access-list 15 permit 199.42.77.131
access-list 15 permit 207.169.88.18
access-list 15 permit 207.169.85.8
access-list 15 permit 207.169.88.100
access-list 15 permit 207.169.88.67
access-list 15 permit 207.169.88.190
access-list 15 permit 207.169.88.134
access-list 15 permit 207.169.88.135
access-list 15 permit 207.169.88.251
access-list 15 permit 207.169.88.220
access-list 15 permit 207.169.88.203
access-list 15 permit 207.169.82.207
access-list 15 permit 138.35.0.0 0.0.255.255
access-list 23 permit 190.128.219.210
access-list 23 permit 192.168.10.0 0.0.0.255
access-list 23 permit 10.24.88.0 0.0.1.255
access-list 99 remark GNTA SNMP Access
access-list 99 permit 138.35.216.0 0.0.7.255
access-list 104 remark SDM_ACL Category=2
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 deny ip host 192.168.50.11
access-list 104 permit ip host 192.168.50.11
!
!
!
log
host 192.168.80.38
host 192.168.80.37
192.168.80.32 0.0.0.7
host 192.168.80.36
host 192.168.80.35
host 192.168.80.34
host 192.168.80.33
host 192.168.80.32
host 192.168.80.31
host 192.168.80.30
192.168.40.24 0.0.0.3
host 192.168.40.19
host 192.168.40.18
host 192.168.40.17
host 192.168.40.16
host 192.168.40.15
host 192.168.40.14
host 192.168.40.13
host 192.168.40.12
host 192.168.40.11
host 192.168.40.10
host 192.168.40.9
host 192.168.40.8
host 192.168.40.7
host 192.168.40.6
host 192.168.40.5
host 192.168.40.4
host 192.168.40.3
host 192.168.40.2
host 192.168.40.1
192.168.40.20 0.0.0.3
192.168.40.0 0.0.0.63
any
!
route-map e1-frame permit 10
match ip address e1-frame
set ip next-hop verify-availability 192.168.240.2 10 track 10
!
route-map Internet permit 10
match ip address internet
!
route-map redistribute-connected permit 10
match ip address redistribute-connected
!
route-map SDM_RMAP_1 permit 1
match ip address 104
!
!
snmp-server community ParESa2010pY RO
snmp-server community 4nd1n4_RO RO 15
snmp-server community GN0CR3AD RO 99
snmp-server community mgmtgn0c RW 99
snmp-server ifindex persist
snmp-server trap-source GigabitEthernet0/0
snmp-server contact HPE Operations
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vrrp
snmp-server enable traps transceiver all
snmp-server enable traps ds1
snmp-server enable traps call-home message-send-fail server-fail
snmp-server enable traps tty
snmp-server enable traps eigrp
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server enable traps license
snmp-server enable traps envmon
snmp-server enable traps ethernet cfm cc mep-up mep-down cross-connect loop conf
ig
snmp-server enable traps ethernet cfm crosscheck mep-missing mep-unknown service
-up
snmp-server enable traps flash insertion removal
snmp-server enable traps c3g
snmp-server enable traps ds3
snmp-server enable traps adslline
snmp-server enable traps vdsl2line
snmp-server enable traps icsudsu
snmp-server enable traps isdn call-information
snmp-server enable traps isdn layer2
snmp-server enable traps isdn chan-not-avail
snmp-server enable traps isdn ietf
snmp-server enable traps ds0-busyout
snmp-server enable traps ds1-loopback
snmp-server enable traps energywise
snmp-server enable traps vstack
snmp-server enable traps mac-notification
!
control-plane
!
!
privilege exec level 1 dir
privilege exec level 1 traceroute
privilege exec level 1 ping
privilege exec level 1 terminal monitor
privilege exec level 1 terminal
privilege exec level 7 show snmp
privilege exec level 1 show ip eigrp vrf
privilege exec level 1 show ip eigrp
privilege exec level 10 show ip interface brief
privilege exec level 10 show ip interface
privilege exec level 1 show ip
privilege exec level 7 show clock
privilege exec level 1 show running-config
privilege exec level 1 show configuration
privilege exec level 1 show logging
privilege exec level 7 show interfaces
privilege exec level 1 show
banner motd ^C
*******************************************************************
Access to this computer system and associated network, computer
resources, or data is restricted to those authorized by HPE.
This computer and related networks, resources or data may only be
used for business purposes of HPE and its customers. Use by
unauthorized individual or for an unauthorized purpose is a
violation of Federal and/or State law. Violators will be prosecuted.
For technical assistance contact HPE Operations.
********************************************************************^C
!
line con 0
exec-timeout 30 0
password 7 080C4340080B061F43
transport preferred none
stopbits 1
line aux 0
exec-timeout 30 0
line 2
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
access-class 15 in
exec-timeout 30 0
password 7 0539091A74185A0C0B
logging synchronous
transport input telnet
transport output telnet
line vty 5 15
access-class 15 in
exec-timeout 30 0
password 7 122B0A02475F180138
logging synchronous
transport input telnet
!
B
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
S
S
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
S
S
S
S
S
S
S
C
L
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S
S