2514 Router version 11.3.3.T ! no service tcp-small-servers no service udp-small-servers service passWord-encryption no cdp running no ip source-route enable secret ! !--- Here we have a syslog server. ! logging 192.168.27.131 ! !--- This command enables the logging of session information (addresses and bytes). ! ip inspect audit-trail ! !--- Sets the length of time a TCP session is still managed after no activity. ! ip inspect tcp idle-time 14400 ! !--- Sets the length of time a UDP session is still managed after no activity. ! ip inspect udp idle-time 1800 ! !--- Sets the length of time a DNS name lookup session is still managed !--- after no activity. ! ip inspect dns-timeout 7 ! !--- Sets up inspection list "standard" !--- to be used for inspection of inbound Ethernet 0 !--- and inbound serial (applied to both interfaces). ! ip inspect name standard cuseeme ip inspect name standard FTP ip inspect name standard h323 ip inspect name standard http ip inspect name standard rcmd ip inspect name standard realaudio ip inspect name standard smtp ip inspect name standard sqlnet ip inspect name standard streamworks ip inspect name standard tcp ip inspect name standard tftp ip inspect name standard udp ip inspect name standard vdolive
interface ethernet 0
ip address 192.168.27.129 255.255.255.128 ! !--- Apply access list to allow all legitimate traffic from inside network !--- but PRevent spoofing. ! ip access-group 101 in ! !--- Apply an access list to allow some ICMP traffic; deny all else. !--- The inspection list will add entries to this list to permit !--- return traffic for connections established from inside. ! ip access-group 102 out ! !--- Apply inspection list "standard" for !--- inspection of inbound Ethernet traffic. ! ip inspect standard in
no ip directed-broadcast no cdp enable
interface ethernet 1 ip address 192.168.27.1 255.255.255.128
! !--- Apply the access list to permit DMZ traffic (except spoofing) !--- DMZ interface inbound. ! ip access-group 111 in ! !--- Apply the access list to permit DNS, www, FTP, SMTP, POP3, Telnet !--- to DMZ interface outbound. ! !--- Inspection configured on other interfaces will add temporary entries !--- to this list. ! ip access-group 112 out
no ip directed-broadcast no cdp enable
interface serial 0
ip address 200.200.200.1 255.255.255.0
! !--- Apply the access list to prevent spoofing. ! ip access-group 121 in
! !--- Allow ping replies from inside or DMZ; permit inside traffic back out. !--- Inspection will add temporary entries to this list. ! ip access-group 122 out
! !--- Apply inspection list "standard" for !--- inspection of inbound serial traffic. ! ip inspect standard in
no ip directed-broadcast no cdp enable
! !--- Access list 20 will be used to control which !--- network management stations can access via SNMP. ! access-list 20 permit 192.168.27.5 ! !--- We use an access list to allow all legitimate traffic from !--- the inside network but prevent spoofing. ! access-list 101 permit ip 192.168.27.128 0.0.0.127 any access-list 101 deny ip any any ! !--- Allow some ICMP traffic; deny all else. !--- The inspection list will add entries to this list to permit !--- return traffic for connections established from inside. ! access-list 102 permit icmp any 192.168.27.128 0.0.0.127 administratively-prohibited access-list 102 permit icmp any 192.168.27.128 0.0.0.127 echo access-list 102 permit icmp any 192.168.27.128 0.0.0.127 echo-reply access-list 102 permit icmp any 192.168.27.128 0.0.0.127 packet-too-big access-list 102 permit icmp any 192.168.27.128 0.0.0.127 time-exceeded access-list 102 permit icmp any 192.168.27.128 0.0.0.127 traceroute access-list 102 permit icmp any 192.168.27.128 0.0.0.127 unreachable access-list 102 deny ip any any ! ! !--- The access list permits DMZ traffic (except spoofing) !--- on DMZ interface inbound. ! access-list 111 permit ip 192.168.27.0 0.0.0.127 any access-list 111 deny ip any any ! ! !--- This access list permits DNS, www, FTP, SMTP, POP3, Telnet to DMZ !--- interface outbound. Inspection configured on other interfaces !--- will add temporary entries to this list. ! access-list 112 permit udp any host 192.168.27.3 eq domain access-list 112 permit tcp any host 192.168.27.3 eq domain access-list 112 permit tcp any host 192.168.27.3 eq www access-list 112 permit tcp any host 192.168.27.3 eq ftp access-list 112 permit tcp any host 192.168.27.3 eq smtp access-list 112 permit tcp 192.168.27.128 0.0.0.127 host 192.168.27.3 eq pop3 access-list 112 permit tcp 192.168.27.128 0.0.0.127 any eq telnet access-list 112 permit icmp any 192.168.27.0 0.0.0.127 administratively-prohibited access-list 112 permit icmp any 192.168.27.0 0.0.0.127 echo access-list 112 permit icmp any 192.168.27.0 0.0.0.127 echo-reply access-list 112 permit icmp any 192.168.27.0 0.0.0.127 packet-too-big access-list 112 permit icmp any 192.169.27.0 0.0.0.127 time-exceeded access-list 112 permit icmp any 192.168.27.0 0.0.0.127 traceroute access-list 112 permit icmp any 192.168.27.0 0.0.0.127 unreachable access-list 112 deny ip any any ! !--- Access list to prevent spoofing. ! access-list 121 deny ip 192.168.27.0 0.0.0.255 any access-list 121 deny ip 127.0.0.0 0.255.255.255 any access-list 121 permit ip any any ! ! !--- Access list for ping replies from inside or DMZ; permit inside traffic back out. !--- Inspection will add temporary entries to this list. ! access-list 122 permit icmp 192.168.27.0 0.0.0.255 any echo-reply access-list 122 permit icmp 192.168.27.0 0.0.0.255 any time-exceeded access-list 122 deny ip 192.168.27.0 0.0.0.127 any access-list 122 permit ip 192.168.27.128 0.0.0.127 any ! !--- Apply access list 20 for SNMP process. ! snmp-server community secret RO 20 ! line con 0 exec-timeout 5 0 password 7 14191D1815023F2036 login local line vty 0 4 exec-timeout 5 0 password 7 14191D1815023F2036 login local length 35 end