PDA

Επιστροφή στο Forum : ΟΤΕ TV ΣΕ CISCO 877



arpas
05-12-13, 22:10
ΠΩΣ ΓΙΝΕΤΑΙ ΝΑ ΚΑΝΩ ΤΟΝ ΡΟΥΤΕΡ ΝΑ ΠΑΙΞΕΙ ΟΤΕ ΤV ΠΟΙΕΣ ΕΙΝΑΙ ΟΙ ΕΝΤΟΛΕΣ ΠΟΥ ΠΡΕΠΕΙ ΝΑ ΒΑΛΩ ΓΙΑ ΝΑ ΦΤΙΑΞΩ 2ο VLAN ΚΑΙ ΝΑ ΤΟ ΚΑΝΩ BRIDGE MODE??? ΑΝ ΞΕΡΕΙ ΚΑΠΟΙΟΣ ΑΣ ΒΟΗΘΗΣΕΙ!!!!

emeliss
05-12-13, 22:33
Μη γράφεις κεφαλαία.
Ψάξε λίγο πριν ανοίξεις θέμα.

Η απάντηση μάλλον βρίσκεται στο παρακάτω
http://www.adslgr.com/forum/threads/281249-Cisco-Router-for-Conn-X-TV-Quick-n-Dirty

arpas
06-12-13, 21:32
Ναι το εχω ψαξει φιλε μου το παρακατω απλα δεν ξερω πως να βαλω τις εντολες.

- - - Updated - - -

αυτο ειναι το config μου


Authorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!

User Access Verification

Username: mycisco
Password:
% Login invalid

Username: mycisco
Password:
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------

iptv#sh run
Building configuration...

Current configuration : 8174 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname iptv
!
boot-start-marker
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200
logging console critical
enable secret 5 $1$f8F1$Upowuev1G1uObIYstzOw60
!
no aaa new-model
clock timezone PCTime 2
clock summer-time PCTime date Mar 30 2003 3:00 Oct 26 2003 4:00
!
crypto pki trustpoint TP-self-signed-929877397
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-929877397
revocation-check none
rsakeypair TP-self-signed-929877397
!
!
crypto pki certificate chain TP-self-signed-929877397
certificate self-signed 01
30820249 308201B2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 39323938 37373339 37301E17 0D313331 30333031 33333930
395A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3932 39383737
33393730 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
C09539AF 0C2D7E4C 59A39241 A3D89D81 267C7E62 1CDC20E5 D765B5B9 D2DB5A57
3F13F0D4 A3232F9E 9C73EE28 3ABC6C1C C72AC927 D9DDBFCC 6EBA4316 2C1E42E4
7485E935 F8CB6D82 8BD12D5A 6370B4EA E7B18926 F8936BEC 23BE2D0F 62BC6727
E2F90CD6 96CF8FB8 288D1475 DE0957AF 0EEDED52 4AE96817 6EDEA009 9CFF1E1D
02030100 01A37330 71300F06 03551D13 0101FF04 05300301 01FF301E 0603551D
11041730 15821369 7074762E 796F7572 646F6D61 696E2E63 6F6D301F 0603551D
23041830 16801444 F242C390 FDFC7E68 E12B5E37 18A87FDE 34ACDA30 1D060355
1D0E0416 041444F2 42C390FD FC7E68E1 2B5E3718 A87FDE34 ACDA300D 06092A86
4886F70D 01010405 00038181 0081C4A1 D726E010 332192B6 D4311B64 35D3830D
DC218814 627DBB91 F211F8C8 D63231A4 00F8B283 029169B2 543EB5DF C0C64AC5
78214ABA 8C0865BA 0DF26CDA 1C6292DA 5D3D1DB0 BE24C976 A2D08899 09B9436F
02C1ED87 E10C05AE E727FBD1 0DCE3514 C9A98EF3 BDDBAB11 7721C3AB 5BB6F1A0
ACB991A5 049F1416 3BB3B4EF DC
quit
dot11 syslog
no ip source-route
ip cef
!
!
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.1.1 192.168.1.99
ip dhcp excluded-address 192.168.1.201 192.168.1.254
!
ip dhcp pool sdm-pool1
import all
network 192.168.1.0 255.255.255.0
dns-server 195.170.0.1 195.170.2.2
default-router 192.168.1.1
!
!
no ip bootp server
ip domain name yourdomain.com
ip name-server 195.170.2.2
ip name-server 195.170.0.1
ip multicast-routing
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
no ip igmp snooping
!
multilink bundle-name authenticated
!
!
username mycisco privilege 15 secret 5 $1$u4Qk$fr.goaMNvhxQ0jcOKN8Uu0
!
!
archive
log config
hidekeys
!
!
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
!
class-map type inspect match-any sdm-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol netshow
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp extended
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-insp-traffic
match class-map sdm-cls-insp-traffic
class-map type inspect match-any sdm-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-all sdm-invalid-src
match access-group 100
class-map type inspect match-all sdm-icmp-access
match class-map sdm-cls-icmp-access
class-map type inspect match-all sdm-protocol-http
match protocol http
!
!
policy-map type inspect sdm-permit-icmpreply
class type inspect sdm-icmp-access
inspect
class class-default
pass
policy-map type inspect sdm-inspect
class type inspect sdm-invalid-src
drop log
class type inspect sdm-insp-traffic
inspect
class type inspect sdm-protocol-http
inspect
class class-default
policy-map type inspect sdm-permit
class class-default
!
zone security out-zone
zone security in-zone
zone-pair security sdm-zp-self-out source self destination out-zone
service-policy type inspect sdm-permit-icmpreply
zone-pair security sdm-zp-out-self source out-zone destination self
service-policy type inspect sdm-permit
zone-pair security sdm-zp-in-out source in-zone destination out-zone
service-policy type inspect sdm-inspect
!
!
!
interface ATM0
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0.1 point-to-point
description $ES_WAN$$FW_OUTSIDE$
pvc 8/35
pppoe-client dial-pool-number 1
!
!
interface ATM0.2 point-to-point
ip pim sparse-dense-mode
ip igmp unidirectional-link
ip igmp proxy-service
atm route-bridged ip
pvc 8/36
encapsulation aal5snap
!
bridge-group 2
bridge-group 2 spanning-disabled
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
switchport access vlan 2
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 192.168.1.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip route-cache flow
ip tcp adjust-mss 1412
!
interface Vlan2
no ip address
ip tcp adjust-mss 1452
ip igmp helper-address udl ATM0.2
ip igmp mroute-proxy ATM0.2
ip igmp proxy-service
bridge-group 2
bridge-group 2 spanning-disabled
!
interface Dialer0
description $FW_OUTSIDE$
ip address negotiated
no ip redirects
no ip unreachables
no ip proxy-arp
ip mtu 1452
ip nat outside
ip virtual-reassembly
zone-member security out-zone
encapsulation ppp
ip route-cache flow
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap pap callin
ppp chap hostname arpas@otenet.gr
ppp chap password 7 password removed
ppp pap sent-username arpas@otenet.gr password 7 password removed
!
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer0
!
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 1 interface Dialer0 overload
!
logging trap debugging
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 100 remark SDM_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
dialer-list 1 protocol ip permit
no cdp run
!
!
!
!
control-plane
!
bridge 2 protocol ieee
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Router and Security Device Manager (SDM) is installed on this device and
it provides the default username "cisco" for one-time use. If you have already
used the username "cisco" to login to the router and your IOS image supports the
"one-time" user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

-----------------------------------------------------------------------
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
no modem enable
transport output telnet
speed 115200
line aux 0
login local
transport output telnet
line vty 0 4
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end

iptv#

@ ADSLgr.com All rights reserved.