Question : Problem: Can the script for Cisco 827-4V router be changed to allow all traffic through

I wish to reconfigure my Cisco 827-4V router so as to allow all traffic through to my computer that is running Microsoft Small Business Server 2000 and then let ISA do all the security.

The current configuration was used when the router was connected directly to the switch on the internal LAN.  The router is now connected to the (new) second NIC of the SBS server for external traffic.  The other NIC handles the internal LAN.

Unsolicited Inbound traffic will consist of mail, FTP, and VPN type.

Follows is my current router script.  Could this be rewritten to allow all traffic through to the following addresses:

Router External ip address  = 215.215.215.215 (say)
Router Internal ip address  = 192.168.0.1
ISA ip address                     = 192.168.0.2

Also could you please confirm the procedure to erase the current configuration and install and save the new configuration.

Thanks



Current configuration:
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname
!
enable secret 5 123456789012345678901234567890
!
!
!
!
!
clock timezone NZST 12
clock summer-time NZST recurring 1 Sun Oct 2:00 3 Sun Mar 2:00
ip subnet-zero
!
!
!
!
interface Ethernet0
ip address S> 255.255.255.0
ip access-group 150 in
no ip directed-broadcast
no ip proxy-arp
ip nat inside
no cdp enable
!
interface ATM0
no ip address
no ip directed-broadcast
no atm ilmi-keepalive
pvc 0/100
 encapsulation aal5mux ppp dialer
 dialer pool-member 1
!
bundle-enable
hold-queue 224 in
!
interface Dialer0
ip address negotiated
ip access-group 100 in
no ip directed-broadcast
ip nat outside
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp pap sent-username password 7 123456789012345678901234
77
!
ip nat inside source list 1 interface Dialer0 overload
ip nat inside source static tcp 110 110 extendable
ip nat inside source static tcp 25 25 extendable
ip nat inside source static tcp DRESS> 20 20 extendable
ip nat inside source static tcp DRESS> 21 21 extendable
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
no ip http server
!
access-list 1 permit 192.168.???.0 0.0.0.255
access-list 100 permit tcp any host eq pop3
access-list 100 permit tcp any host eq smtp
access-list 100 permit tcp host host eq ftp
access-list 100 permit tcp host host eq ftp-data
access-list 100 permit tcp host NER> host eq ftp
access-list 100 permit tcp host NER> host eq ftp-data
access-list 100 permit udp any gt 1023 any eq domain
access-list 100 permit udp any eq domain any gt 1023
access-list 100 permit icmp any any echo-reply
access-list 100 permit icmp any any echo
access-list 100 permit icmp any any traceroute
access-list 100 permit icmp any any unreachable
access-list 100 permit tcp any any established
access-list 100 deny   ip 192.168.???.0 0.0.0.255 any
access-list 100 permit tcp any host eq ftp
access-list 100 permit tcp any host eq ftp-data
access-list 150 permit ip host any
access-list 150 permit tcp any any eq smtp
access-list 150 permit ip host DRESS> any
dialer-list 1 protocol ip permit
no cdp run
banner motd ^C
**********************************************************
**** Unauthorized Access To This System Is Prohibited ****
**********************************************************^C
!
line con 0
transport input none
stopbits 1
line vty 0 4
access-class 1 in
password 7 12345678901234567890123456
login
!
scheduler max-task-time 5000
end

Answer : Problem: Can the script for Cisco 827-4V router be changed to allow all traffic through

>It seems to require me to register
Yes, CCO requires you to have a valid maint contract (SmartNet) and a CCO login to download the software.


However, If you are passing the PPTP connection to an internal host (ISA server), then you do not need the upgrade.

Make it simple and setup a single static NAT over to the ISA and let it be your firewall and proxy:

Erase the current config:
Router# write erase
(confirm)
Router# reload
(If prompted to save, say No)

When the router reboots, you will have an opportunity to run an initial setup dialog. I would say No at the prompt.

Then you will have a brand-new blank config to start from scratch

Objectives will be to keep it simple and make it work
> and then let ISA do all the security


service timestamps debug datetime
service timestamps log datetime
service password-encryption
!
hostname
!
enable
!
!
!
!
!
clock timezone NZST 12
clock summer-time NZST recurring 1 Sun Oct 2:00 3 Sun Mar 2:00
ip subnet-zero
!
!
!
!
interface Ethernet0
ip address 192.168.0.1 255.255.255.0
no ip directed-broadcast
no ip proxy-arp
ip nat inside
no cdp enable
!
interface ATM0
no ip address
no ip directed-broadcast
no atm ilmi-keepalive
pvc 0/100
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
bundle-enable
hold-queue 224 in
!
interface Dialer0
ip address 215.215.215.215 255.255.255.248 <--whatever is appropriate (or 'negotiated')
no ip directed-broadcast
ip nat outside
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp pap sent-username password
!
! # make a single static NAT map to the ISA server
ip nat inside source static 192.168.0.2 215.215.215.215

ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
no ip http server
!
! # The only access-list is to trigger the dialer
access-list 1 permit 192.168.0.2

banner motd ^C
**********************************************************
**** Unauthorized Access To This System Is Prohibited ****
**********************************************************
^C
!
line vty 0 4
password
!
end


Random Solutions  
 
programming4us programming4us