You are on page 1of 89

MANUAL INSTRUCTIVO CONFIGURACION ENRUTADORES CISCO Y

HUAWEI

CPES
PUESTA EN MARCHA

BOGOTA 1 DE FEBRERO DE 2008


EMPRESA DE TELECOMUNICACIONES DE BOGOTA ETB
INTRODUCCION

La siguiente es una cartilla instructiva de configuracin de enrutadores Cisco y Huawei,


en la cual se podr encontrar los diferentes escenarios posibles que requieran se peueden
configurar en los equipos, para dar solucin de conectividad a los clientes que adquieren
productos con la ETB.

Los diferentes escenarios que se pueden encontrar, son accesos Ethernet (MPLS),
Accesos Seriales (Frame Relay), VOIP, entre otros.

En este documento encontraran algunas plantillas tiles en el momento de configurar


dichos enrutadores.
TABLA DE CONTENIDO
1. ESTANDAR EN ENRUTADORES
2. PLANTILLAS CISCO
PLANTILLA INTERNET ACCESO ETHERNET

service password-encryption
!
hostname CLIENTE_CIUDAD_SERVICIO
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
ip cef
!
interface FastEthernet0/0
description CONEXION LAN
ip address IP VALIDA
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed auto
duplex auto
ntp disable
no cdp enable
no shutdown
!

interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
fullduplex
ntp disable
no shutdown
!
interface FastEthernet0/1.100
description GESTION ETB
bandwidth 8
encapsulation dot1Q 100
ip address X.X.X.X X.X.X.X
!
interface FastEthernet0/1.101
description CONEXION MPLS INTERNET
bandwidth XXX
encapsulation dot1Q XXX VLAN INTERNA
ip address X.X.X.X X.X.X.X DIRECCION WAN PAR
ip access-group 110 in
ip access-group 110 out
no cdp enable
!
ip route 0.0.0.0 0.0.0.0 X.X.X.X DIRECCION WAN IMPAR
ip route 192.168.100.3 255.255.255.255 X.X.X.X IP WAN GESTION IMPAR
ip route 192.168.100.170 255.255.255.255 X.X.X.X IP WAN GESTION IMPAR
ip route 192.168.100.221 255.255.255.255 X.X.X.X IP WAN GESTION IMPAR
ip route 192.168.168.203 255.255.255.255 X.X.X.X IP WAN GESTION IMPAR
!
no ip http server

access-list 97 permit 192.168.168.203 SERVIDORES GESTION


access-list 97 permit 192.168.100.221
access-list 97 permit 192.168.100.170
access-list 98 permit 192.168.100.3

LISTAS DE ACCESO PARA SEGURIDAD

access-list 110 deny tcp any any eq 27665


access-list 110 deny udp any any eq 31335
access-list 110 deny udp any any eq 27444
access-list 110 deny tcp any any eq 16660
access-list 110 deny tcp any any eq 65000
access-list 110 deny tcp any any eq 33270
access-list 110 deny tcp any any eq 39168
access-list 110 deny tcp any any range 6711 6712
access-list 110 deny tcp any any eq 6776
access-list 110 deny tcp any any eq 6669
access-list 110 deny tcp any any eq 2222
access-list 110 deny tcp any any eq 7000
access-list 110 deny udp any any eq 135
access-list 110 deny udp any any eq netbios-ns
access-list 110 deny udp any any eq netbios-ss
access-list 110 deny udp any any eq 445
access-list 110 deny tcp any any eq 135
access-list 110 deny tcp any any eq 3128
access-list 110 deny tcp any any eq 4480
access-list 110 deny tcp any any eq 6588
access-list 110 deny tcp any any eq 4444
access-list 110 deny tcp any any eq 593
access-list 110 deny tcp any any eq 445
access-list 110 deny tcp any any eq 137
access-list 110 deny tcp any any eq 139
access-list 110 deny tcp any eq 1214 any
access-list 110 deny udp any eq 1214 any
access-list 110 deny udp any any eq 1214
access-list 110 deny tcp any any eq 1214
access-list 110 deny udp any eq netbios-ns any
access-list 110 deny tcp any eq 137 any
access-list 110 deny udp any eq netbios-ss any
access-list 110 deny tcp any eq 139 any
access-list 110 deny tcp any eq 1433 any
access-list 110 deny udp any eq 1433 any
access-list 110 deny udp any any eq 1433
access-list 110 deny tcp any any eq 1433
access-list 110 deny tcp any eq 1434 any
access-list 110 deny udp any eq 1434 any
access-list 110 deny udp any any eq 1434
access-list 110 deny tcp any any eq 1434
access-list 110 deny tcp any eq 4661 any
access-list 110 deny udp any eq 4661 any
access-list 110 deny tcp any any eq 4661
access-list 110 deny udp any any eq 4661
access-list 110 deny tcp any eq 4662 any
access-list 110 deny udp any eq 4662 any
access-list 110 deny tcp any any eq 4662
access-list 110 deny udp any any eq 4662
access-list 110 deny tcp any eq 4665 any
access-list 110 deny udp any eq 4665 any
access-list 110 deny tcp any any eq 4665
access-list 110 deny udp any any eq 4665
access-list 110 deny udp any any eq 8998
access-list 110 deny udp any any eq 995
access-list 110 deny udp any any eq 996
access-list 110 deny udp any any eq 997
access-list 110 deny udp any any eq 998
access-list 110 deny udp any any eq 999
access-list 110 permit ip any any
cisXXXXXX COMUNIDAD SNMP NO MAS DE 9 LETRAS
snmp-server community cisXXXXXX RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisXXXXXX
snmp-server host 192.168.100.221 cisXXXXXX
snmp-server host 192.168.168.203 cisXXXXXX
no cdp run
!
control-plane
!
banner motd ^CCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
scheduler allocate 20000 1000
end
INTERNET ACCESO FRAME RELAY

service password-encryption
!
hostname Cliente_Ciudad_Servicio
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
!
!
aaa new-model
!
! AUTENTICACION LOCAL Y SERVIDORES RADIUS
aaa authentication login default group radius local
aaa authentication enable default group radius enable
!
aaa session-id common
!
resource policy
!
memory-size iomem 25
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
ip cef
!
!
no ip dhcp use vrf connected
!
!
no ip bootp server
no ip domain lookup
!
username cpes password cpes

!
interface fastEthernet0/0
description CONEXION LAN
ip address IP VALIDA
no ip redirects
no ip unreachables
no ip proxy-arp
duplex auto
speed auto
no shutdown
!
interface Serial0/0/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
fair-queue
clockrate 2000000
frame-relay lmi-type ansi
no shutdown
!
interface Serial0/0/0.1 point-to-point
description CONEXION FRAME RELAY INTERNET
bandwidth XXXX
ip address IP WAN PAR
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 16
!
!
!
interface Serial0/0/0.100 point-to-point
description GESTION ETB
bandwidth 8
ip address IP DE GESTION SACADA DEL POOL DE GESTION
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 100
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.248.3.1

ip route 192.168.100.3 255.255.255.255 10.251.X.1


ip route 192.168.100.221 255.255.255.255 10.251.X.1
ip route 192.168.168.203 255.255.255.255 10.251.X.1
ip route 192.168.173.4 255.255.255.255 10.251.X.1
ip route 192.168.173.5 255.255.255.255 10.251.6X.1
!
no ip http server

!
access-list 97 permit 192.168.168.203 SERVIDORES GESTION
access-list 97 permit 192.168.100.221
access-list 97 permit 192.168.100.170
access-list 98 permit 192.168.100.3
access-list 98 permit 10.248.3.1
access-list 98 permit 63.171.232.67
access-list 98 permit 63.171.232.52
access-list 98 permit 208.30.41.148 0.0.0.3

LISTAS DE ACCESO PARA SEGURIDAD

access-list 110 deny tcp any any eq 27665


access-list 110 deny udp any any eq 31335
access-list 110 deny udp any any eq 27444
access-list 110 deny tcp any any eq 16660
access-list 110 deny tcp any any eq 65000
access-list 110 deny tcp any any eq 33270
access-list 110 deny tcp any any eq 39168
access-list 110 deny tcp any any range 6711 6712
access-list 110 deny tcp any any eq 6776
access-list 110 deny tcp any any eq 6669
access-list 110 deny tcp any any eq 2222
access-list 110 deny tcp any any eq 7000
access-list 110 deny udp any any eq 135
access-list 110 deny udp any any eq netbios-ns
access-list 110 deny udp any any eq netbios-ss
access-list 110 deny udp any any eq 445
access-list 110 deny tcp any any eq 135
access-list 110 deny tcp any any eq 3128
access-list 110 deny tcp any any eq 4480
access-list 110 deny tcp any any eq 6588
access-list 110 deny tcp any any eq 4444
access-list 110 deny tcp any any eq 593
access-list 110 deny tcp any any eq 445
access-list 110 deny tcp any any eq 137
access-list 110 deny tcp any any eq 139
access-list 110 deny tcp any eq 1214 any
access-list 110 deny udp any eq 1214 any
access-list 110 deny udp any any eq 1214
access-list 110 deny tcp any any eq 1214
access-list 110 deny udp any eq netbios-ns any
access-list 110 deny tcp any eq 137 any
access-list 110 deny udp any eq netbios-ss any
access-list 110 deny tcp any eq 139 any
access-list 110 deny tcp any eq 1433 any
access-list 110 deny udp any eq 1433 any
access-list 110 deny udp any any eq 1433
access-list 110 deny tcp any any eq 1433
access-list 110 deny tcp any eq 1434 any
access-list 110 deny udp any eq 1434 any
access-list 110 deny udp any any eq 1434
access-list 110 deny tcp any any eq 1434
access-list 110 deny tcp any eq 4661 any
access-list 110 deny udp any eq 4661 any
access-list 110 deny tcp any any eq 4661
access-list 110 deny udp any any eq 4661
access-list 110 deny tcp any eq 4662 any
access-list 110 deny udp any eq 4662 any
access-list 110 deny tcp any any eq 4662
access-list 110 deny udp any any eq 4662
access-list 110 deny tcp any eq 4665 any
access-list 110 deny udp any eq 4665 any
access-list 110 deny tcp any any eq 4665
access-list 110 deny udp any any eq 4665
access-list 110 deny udp any any eq 8998
access-list 110 deny udp any any eq 995
access-list 110 deny udp any any eq 996
access-list 110 deny udp any any eq 997
access-list 110 deny udp any any eq 998
access-list 110 deny udp any any eq 999
access-list 110 permit ip any any

cisXXXXXX COMUNIDAD SNMP NO MAS DE 9 LETRAS

snmp-server community cisXXXXXX RW 97


snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.221 cisXXXXXX
snmp-server host 192.168.100.170 cisXXXXXX
snmp-server host 192.168.168.203 cisXXXXXX
no cdp run
!

AUTENTICACION SERVIDORES RADIUS

radius-server host 192.168.173.4 auth-port 1645 acct-port 1646


radius-server host 192.168.173.5 auth-port 1645 acct-port 1646
radius-server key 7 0441003F5C670F742E

!
!
control-plane
!
banner motd ^CCCCCCCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXX

^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
scheduler allocate 20000 1000
end
CONFIGURACION DE DHCP

Estos son los pasos para configuracin de un DHCP

CISCO(Config)# ip dhcp excluded-address X.X.X.X X.X.X.X

Direcciones IP que se excluyen, Generalmente se excluye la direccin ip se deje en la


interfaz Ethernet de ROUTER y si es un pool se estipula hasta que direccin se va a
excluir

CISCO(Config)# ip dhcp pool sbnet2


CISCO(Config)# network X.X.X.X MASCARA
CISCO(Config)# default-router 10.81.4.1
CISCO(Config)# DNS 200.75.52.132 200.75.52.133

Se Crea un Pool con cualquier nombre, se nombra la red, se coloca la direccin de


Router. Generalmente se acostumbra a colocar los DNS
PATH

El path se realiza cuando se necesita, que muchas direcciones ip o un POOL de


direcciones de la LAN del cliente, se encausen por una sola direccin IP Valida,
generalmente se usa cuando se hace un NAT

service password-encryption
!
hostname Indus_Ivor_Bog_Int
!
boot-start-marker
boot-end-marker
!
enable secret (password)
!
!
!
aaa new-model
!
!
aaa authentication login default group radius local
aaa authentication enable default group radius enable
!
aaa session-id common
!
resource policy
!
memory-size iomem 25
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
ip cef
!
!
no ip dhcp use vrf connected
!
!
no ip bootp server
no ip domain lookup
!
username cpes password cpes
interface Loopback0
ip address "IP LAN VALIDA" 255.255.255.255
!
interface fastEthernet0/0
description CONEXION LAN
ip address "IP LAN" 192.168.1.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
duplex auto
speed auto
no shutdown
!
interface Serial0/0/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
fair-queue
clockrate 2000000
frame-relay lmi-type ansi
no shutdown
!
interface Serial0/0/0.1 point-to-point
description CONEXION FRAME RELAY INTERNET
bandwidth 1024
ip address "IP WAN PAR" 255.255.255.252
ip access-group 110 in
ip access-group 110 out
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 16
!
interface Serial0/0/0.100 point-to-point
description GESTION ETB
bandwidth 8
ip address "IP POOL DE GESTION" 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 100
!
ip classless
ip route 0.0.0.0 0.0.0.0 "IP WAN IMPAR"
ip route 192.168.100.3 255.255.255.255 10.251.X.1
ip route 192.168.100.221 255.255.255.255 10.251.X.1
ip route 192.168.168.203 255.255.255.255 10.251.X.1
ip route 192.168.173.4 255.255.255.255 10.251.X.1
ip route 192.168.173.5 255.255.255.255 10.251.X.1
!
no ip http server

ip nat inside source list 100 interface Loopback0 overload

!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.221
access-list 97 permit 192.168.100.170
access-list 98 permit 192.168.100.3
access-list 98 permit 10.247.116.1
access-list 98 permit 63.171.232.67
access-list 98 permit 63.171.232.52
access-list 98 permit 208.30.41.148 0.0.0.3
access-list 100 deny tcp any any eq 2000
access-list 100 deny tcp any any eq 2001
access-list 100 deny tcp any any eq 6000
access-list 100 deny tcp any any eq 6001
access-list 100 deny tcp any any eq 27665
access-list 100 deny udp any any eq 31335
access-list 100 deny udp any any eq 27444
access-list 100 deny tcp any any eq 16660
access-list 100 deny tcp any any eq 65000
access-list 100 deny tcp any any eq 33270
access-list 100 deny tcp any any eq 39168
access-list 100 deny tcp any any range 6711 6712
access-list 100 deny tcp any any eq 6776
access-list 100 deny tcp any any eq 6669
access-list 100 deny tcp any any eq 2222
access-list 100 deny tcp any any eq 7000
access-list 100 deny udp any any eq 135
access-list 100 deny udp any any eq netbios-ns
access-list 100 deny udp any any eq netbios-ss
access-list 100 deny udp any any eq 445
access-list 100 deny tcp any any eq 135
access-list 100 deny tcp any any eq 3128
access-list 100 deny tcp any any eq 4480
access-list 100 deny tcp any any eq 6588
access-list 100 deny tcp any any eq 4444
access-list 100 deny tcp any any eq 593
access-list 100 deny tcp any any eq 445
access-list 100 deny tcp any any eq 137
access-list 100 deny tcp any any eq 139
access-list 100 deny tcp any eq 1214 any
access-list 100 deny udp any eq 1214 any
access-list 100 deny udp any any eq 1214
access-list 100 deny tcp any any eq 1214
access-list 100 deny udp any eq netbios-ns any
access-list 100 deny tcp any eq 137 any
access-list 100 deny udp any eq netbios-ss any
access-list 100 deny tcp any eq 139 any
access-list 100 deny tcp any eq 1433 any
access-list 100 deny udp any eq 1433 any
access-list 100 deny udp any any eq 1433
access-list 100 deny tcp any any eq 1433
access-list 100 deny tcp any eq 1434 any
access-list 100 deny udp any eq 1434 any
access-list 100 deny udp any any eq 1434
access-list 100 deny tcp any any eq 1434
access-list 100 deny tcp any eq 4661 any
access-list 100 deny udp any eq 4661 any
access-list 100 deny tcp any any eq 4661
access-list 100 deny udp any any eq 4661
access-list 100 deny tcp any eq 4662 any
access-list 100 deny udp any eq 4662 any
access-list 100 deny tcp any any eq 4662
access-list 100 deny udp any any eq 4662
access-list 100 deny tcp any eq 4665 any
access-list 100 deny udp any eq 4665 any
access-list 100 deny tcp any any eq 4665
access-list 100 deny udp any any eq 4665
access-list 100 deny udp any any eq 8998
access-list 100 deny udp any any eq 995
access-list 100 deny udp any any eq 996
access-list 100 deny udp any any eq 997
access-list 100 deny udp any any eq 998
access-list 100 deny udp any any eq 999

access-list 100 permit ip "RED LAN" "MASCARA WILCARD" any

access-list 110 deny tcp any any eq 27665


access-list 110 deny udp any any eq 31335
access-list 110 deny udp any any eq 27444
access-list 110 deny tcp any any eq 16660
access-list 110 deny tcp any any eq 65000
access-list 110 deny tcp any any eq 33270
access-list 110 deny tcp any any eq 39168
access-list 110 deny tcp any any range 6711 6712
access-list 110 deny tcp any any eq 6776
access-list 110 deny tcp any any eq 6669
access-list 110 deny tcp any any eq 2222
access-list 110 deny tcp any any eq 7000
access-list 110 deny udp any any eq 135
access-list 110 deny udp any any eq netbios-ns
access-list 110 deny udp any any eq netbios-ss
access-list 110 deny udp any any eq 445
access-list 110 deny tcp any any eq 135
access-list 110 deny tcp any any eq 3128
access-list 110 deny tcp any any eq 4480
access-list 110 deny tcp any any eq 6588
access-list 110 deny tcp any any eq 4444
access-list 110 deny tcp any any eq 593
access-list 110 deny tcp any any eq 445
access-list 110 deny tcp any any eq 137
access-list 110 deny tcp any any eq 139
access-list 110 deny tcp any eq 1214 any
access-list 110 deny udp any eq 1214 any
access-list 110 deny udp any any eq 1214
access-list 110 deny tcp any any eq 1214
access-list 110 deny udp any eq netbios-ns any
access-list 110 deny tcp any eq 137 any
access-list 110 deny udp any eq netbios-ss any
access-list 110 deny tcp any eq 139 any
access-list 110 deny tcp any eq 1433 any
access-list 110 deny udp any eq 1433 any
access-list 110 deny udp any any eq 1433
access-list 110 deny tcp any any eq 1433
access-list 110 deny tcp any eq 1434 any
access-list 110 deny udp any eq 1434 any
access-list 110 deny udp any any eq 1434
access-list 110 deny tcp any any eq 1434
access-list 110 deny tcp any eq 4661 any
access-list 110 deny udp any eq 4661 any
access-list 110 deny tcp any any eq 4661
access-list 110 deny udp any any eq 4661
access-list 110 deny tcp any eq 4662 any
access-list 110 deny udp any eq 4662 any
access-list 110 deny tcp any any eq 4662
access-list 110 deny udp any any eq 4662
access-list 110 deny tcp any eq 4665 any
access-list 110 deny udp any eq 4665 any
access-list 110 deny tcp any any eq 4665
access-list 110 deny udp any any eq 4665
access-list 110 deny udp any any eq 8998
access-list 110 deny udp any any eq 995
access-list 110 deny udp any any eq 996
access-list 110 deny udp any any eq 997
access-list 110 deny udp any any eq 998
access-list 110 deny udp any any eq 999
access-list 110 permit ip any any
snmp-server community cisindivo RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.221 cisindivo
snmp-server host 192.168.100.170 cisindivo
snmp-server host 192.168.168.203 cisindivo
no cdp run
!
radius-server host 192.168.173.4 auth-port 1645 acct-port 1646
radius-server host 192.168.173.5 auth-port 1645 acct-port 1646
radius-server key 7 0441003F5C670F742E
control-plane
!
banner motd ^CCCCCCCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXX

^C
!
line con 0
password (password)
login
line aux 0
password (password)
login
line vty 0 4
password (password)
login
!
scheduler allocate 20000 1000
end
NAT

service password-encryption
!
hostname Cliente_Ciudad_Direccion
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
!
resource policy
!
memory-size iomem 20
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
no ip dhcp use vrf connected
!
!
no ip bootp server
no ip domain lookup
no ip ips deny-action ips-interface
!
no ftp-server write-enable
!
!
no crypto isakmp ccm
!
!
!
!
interface FastEthernet0/0
description CONEXION LAN
ip address IP LAN MASCARA
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat inside SENTIDO EN EL QUE VA EL NAT
ip virtual-reassembly
duplex auto
speed auto
ntp disable
no cdp enable
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface Serial0/0/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
ntp disable
no fair-queue
clockrate 2000000
frame-relay lmi-type ansi
!
interface Serial0/0/0.1 point-to-point
description CONEXION FRAME RELAY PPAL
bandwidth 64
ip address IP WAN PAR
no ip redirects
no ip unreachables
no ip proxy-arp
ip nat outside INTERFAZ POR LA QUE SALE EL NAT
ip virtual-reassembly
no ip mroute-cache
ntp disable
no cdp enable
frame-relay interface-dlci 16
!
ip classless
ip route 0.0.0.0 0.0.0.0 IP WAN IMPAR
no ip http server

no ip http secure-server
ip nat pool avantel 172.17.1.1 172.17.1.1 netmask 255.255.255.0
ip nat inside source list 100 pool avantel
!
SE DEFINE EL POOL AL CUAL SE VA A NATEAR

SE DEFINE UNA LISTA DE ACCESO EN LA CUAL SE DEFINEN LAS REDES O


HOST A LOS QUE SE LES PERMITIRA HACER EL NAT

access-list 97 permit 192.168.168.203


access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3
access-list 100 permit ip 10.2.0.0 0.0.0.63 any
access-list 100 permit ip 10.9.0.0 0.0.255.255 any
access-list 100 permit ip 10.3.0.0 0.0.255.255 any
access-list 100 permit ip 10.20.0.0 0.0.255.255 any
access-list 100 permit ip 10.6.0.0 0.0.255.255 any
access-list 100 permit ip 10.4.0.0 0.0.255.255 any
access-list 100 permit ip 10.7.0.0 0.0.255.255 any
access-list 100 permit ip 10.100.0.0 0.0.255.255 any
access-list 100 permit ip 172.16.100.0 0.0.0.255 any
snmp-server community cisXXXXXX RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisXXXXXX
snmp-server host 192.168.100.221 cisXXXXXX
snmp-server host 192.168.168.203 cisXXXXXX
no cdp run
!
!
!
!
control-plane
!
!
!
!
!
!
!
!
banner motd ^CCCCCCCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(hostname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
DATOS FRAME RELAY PRINCIPAL

Cuando se tiene un canal punto a punto, se acostumbra a configurar en el router


Principal la direccin imparm en la interfaz WAN y en el router Sucursal la direccion
IPWAM PAR en la interfaz WAN

EJEMPLO

service password-encryption
!
hostname xxxx_Bog_xxx
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
aaa new-model
!
!
aaa authentication login default group radius local
aaa authentication enable default group radius enable
!
aaa session-id common
!
resource policy
!
memory-size iomem 25
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
ip cef
!
!
no ip dhcp use vrf connected
!
!
no ip bootp server
no ip domain lookup
!
username cpes password cpes
!
interface FastEthernet0/0
description CONEXION LAN
ip address x.x.x.x 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp x.x.x.x
duplex auto
speed auto
no shutdown
!
interface Serial0/0/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
fair-queue
clockrate 2000000
frame-relay lmi-type ansi
no shutdawn
!
interface Serial0/0/0.1 point-to-point
description CONEXION FRAME DATOS
bandwidth xxx
ip address IP WAN IMPAR 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 16
!
interface Serial0/0/0.100 point-to-point
description GESTION ETB
bandwidth 8
ip address 10.251.x.x 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 100
!
ip classless
ip route xxxxxxxxxxxxxxxxxxxxxxxxxx DIRECCION IP WAN PAR
ip route 192.168.100.3 255.255.255.255 10.251.x.1
ip route 192.168.100.221 255.255.255.255 10.251.x.1
ip route 192.168.168.203 255.255.255.255 10.251.x.1
ip route 192.168.173.4 255.255.255.255 10.251.x.1
ip route 192.168.173.5 255.255.255.255 10.251.x.1
!
no ip http server

!
snmp-server community cisxxxxxx RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
no cdp run
radius-server host 192.168.173.4 auth-port 1645 acct-port 1646
radius-server host 192.168.173.5 auth-port 1645 acct-port 1646
radius-server key 7 0441003F5C670F742E
!
control-plane
!
banner motd ^CCCCCCCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXX

^C
!
line con 0
password (PASSWORD)
line aux 0
password (PASSWORD)
line vty 0 4
password (PASSWORD)
login
!
end
DATOS FRAME RELAY SUCURSAL

service password-encryption
!
hostname Nombre_Ciudad_Direccion EJ: Cliente_Bog_K1C1
!
boot-start-marker
boot-end-marker
!
enable secret (SU PASSWORD)
!
no aaa new-model
memory-size iomem 20
ip cef
!
no ip bootp server
no ip domain lookup
!
!
!
interface FastEthernet0/0
description CONEXION LAN
ip address x.x.x.x 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
duplex auto
speed auto
ntp disable
no cdp enable
!
interface Serial0/0/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
ntp disable
no fair-queue
clock rate 2000000
frame-relay lmi-type ansi
!
interface Serial0/0/0.1 point-to-point
description CONEXION FRAME RELAY PPAL
bandwidth x
ip address x.x.x.PAR 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
ntp disable
no cdp enable
frame-relay interface-dlci 16
!
ip route 0.0.0.0 0.0.0.0 X.X.X.IMPAR
!
no ip http server
!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3
snmp-server community cisXXXXXX RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisXXXXXX
snmp-server host 192.168.100.221 cisXXXXXX
snmp-server host 192.168.168.203 cisXXXXXX
no cdp run
!
control-plane
!
banner motd ^CCCCCCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(hostname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (SU PASSWORD)
line aux 0
password (SU PASSWORD)
line vty 0 4
password (SU PASSWORD)
login
!
scheduler allocate 20000 1000
end
MPLS PPAL

service password-encryption
!
hostname Cliente_Ciudad_PPal
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
ip cef
!
interface FastEthernet0/0
description CONEXION LAN
ip address IP LAN Y MASCARA
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed auto
duplex auto
ntp disable
no cdp enable
no shutdown
!

interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
no shutdown
!
interface FastEthernet0/1.100
description GESTION ETB
bandwidth 8
encapsulation dot1Q 100
ip address IP WAN GESTION PAR Y MASCARA
!
interface FastEthernet0/1.101
description CONEXION MPLS DATOS
bandwidth XXX
encapsulation dot1Q XXX
ip address IP WAN PAR Y MASCARA

no cdp enable
!
ip route x.x.x.x x.x.x.x IP WAN GESTION IMPAR
ip route 192.168.100.3 255.255.255.255 IP WAN GESTION IMPAR
ip route 192.168.100.170 255.255.255.255 IP WAN GESTION IMPAR
ip route 192.168.100.221 255.255.255.255 IP WAN GESTION IMPAR
ip route 192.168.168.203 255.255.255.255 IP WAN GESTION IMPAR
!
no ip http server

access-list 97 permit 192.168.168.203


access-list 97 permit 192.168.100.221
access-list 97 permit 192.168.100.170
access-list 98 permit 192.168.100.3

snmp-server community cisxxxxxx RW 97


snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisxxxxxx
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
no cdp run
!
control-plane
!
banner motd ^CCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
scheduler allocate 20000 1000
end
MPLS SUCURSAL

service password-encryption
!
hostname Cliente_Ciudad_Dire
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
ip cef
!
interface FastEthernet0/0
description CONEXION LAN
ip address DIRECCION IP LAN
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
no shutdown
!
interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
speed 100
full-duplex
no snmp trap link-status
ntp disable
no cdp enable
no shutdown
!
interface FastEthernet0/1.101
description CONEXION MPLS DATOS PPAL
bandwidth XXX
encapsulation dot1Q XXX
ip address IP WAN PAR MASCARA
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
ntp disable
!
ip route 0.0.0.0 0.0.0.0 IP WAN IMPAR
!
no ip http server
!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
snmp-server community cisxxxxxx RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisxxxxxx
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
no cdp run
!
control-plane
!
banner motd ^CCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
end
ACCESO ADSL

service compress-config
!
hostname Cliente_Ciudad_Direccion
!
enable secret (PASSWORD)
!
ip subnet-zero
no ip source-route
no ip domain-lookup
!
no ip bootp server
!
interface Ethernet0
description CONEXION LAN
ip address DIRECCION IP LAN 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
no keepalive
no cdp enable
hold-queue 100 out
NO SHUTDOWN
!
interface ATM0
description CONEXION ATM
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
no atm ilmi-keepalive

dsl operating-mode itu-dmt


no shutdown
!
interface ATM0.1 point-to-point
description CONEXION ATM PPAL
bandwidth xxx
ip address Direccion IP Wan Par 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
pvc 0/33
vbr-nrt 64 64 188 NUMERO DE CELDAS DE ACUERDO AL BW
encapsulation aal5snap
!
!
interface ATM0.100 point-to-point
description GESTION ETB
bandwidth 8
ip address 10.251.5.4 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
pvc 0/100
encapsulation aal5snap
!
!
no ip classless
ip route 0.0.0.0 0.0.0.0 Direccion IP Wan impar
no ip http server
!
!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3
no cdp run
snmp-server community cisxxxxxx RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server host 192.168.100.170 cisxxxxxx
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
banner motd ^C

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX

!Atencion:

Esta conectado al equipo $(hostname) de ETB,


el acceso y cambios al mismo esta restringido
a personal autorizado !

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXX

^C
!
line con 0
password (PASSWORD)
login
stopbits 1
line vty 0 4
password (PASSWORD)
login
!
scheduler max-task-time 5000
end
OIP PARA ACCESO FRAME RELAY

service password-encryption
!
hostname XXX_XXX_XXX
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
!
!
aaa new-model
!
!
aaa authentication login default group radius local
aaa authentication enable default group radius enable
!
aaa session-id common
!
resource policy
!
memory-size iomem 25
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
ip cef
!
no ip dhcp use vrf connected
!
!
no ip bootp server
no ip domain lookup
!
username cpes password cpes
!
!
class-map match-all DATOS
match any
class-map match-all voice
match ip precedence 5
!
!
policy-map xxxkvoice
class voice
priority xxx
policy-map LAN
class DATOS
set precedence 1
!

Tanto el class-map, como el Policy-mp, se configuran para darle una prioridad a la voz,
y una prioridad a los datos. Estos paquetes se etiquetan en el router a la voz se le da una
prioridad de 5 que es una prioridad alta ya que al ser en tiempo real no se puede perder
ningn paquete. Los datos se le da una prioridad baja.

Cuando el canal es solo para voz, se le asigna todo el ancho de banda para la voz.
Cuando es compartido, es decir voz y datos los 2 primeros puertos de voz se le asigna
un BW de 32 y a los canales restantes se le van sumando 8K por canal de voz.
El priority define el BW asignado para el policy-Map.

no voice hpi capture buffer


no voice hpi capture destination
!
!
mta receive maximum-recipients 0
!
!
!
interface FastEthernet0/0
description CONEXION LAN
ip address DIRECCION IP LAN 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
speed auto
ntp disable
service-policy input LAN
no cdp enable
no shutdown
!
interface serial0/1/0
description CONEXION FRAME RELAY
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
encapsulation frame-relay IETF
load-interval 30
ntp disable
frame-relay traffic-shaping
frame-relay lmi-type ansi
no shutdown
!
interface Serial0/1/0.1 point-to-point
description CONEXION FRAME RELAY VOZ
bandwidth xxx
ip address x.x.x.x 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
ntp disable
no cdp enable
frame-relay interface-dlci 16
class mlp512kvoz
!
!
!
interface Serial0/1/0.100 point-to-point
description GESTION ETB
bandwidth 8
ip address x.x.x.x 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
no cdp enable
frame-relay interface-dlci 100
!
!
!
ip classless
ip route x.x.x.x x.x.x.x x.x.x.x
no ip http server
!
!
ip route 192.168.100.3 255.255.255.255 10.251.x.1
ip route 192.168.100.221 255.255.255.255 10.251.x.1
ip route 192.168.168.203 255.255.255.255 10.251.x.1
ip route 192.168.173.4 255.255.255.255 10.251.x.1
ip route 192.168.173.5 255.255.255.255 10.251.x.1

!
map-class frame-relay mlp512kvoz
frame-relay cir xxx000
frame-relay bc xxx0
frame-relay be 0
frame-relay mincir xxx000
service-policy output xxkvoice BW ASIGNADO EN EL policy-map
frame-relay fragment 640

Parametros para garantizar el BW, tipico para un canal Frame-Relay

El Freagment depende del BW, que son por cada 64 Kbps se le coloca de
fragmentacion 80

access-list 97 permit 192.168.168.203


access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3
no cdp run
!
!
radius-server host 192.168.173.4 auth-port 1645 acct-port 1646
radius-server host 192.168.173.5 auth-port 1645 acct-port 1646
radius-server key 7 0441003F5C670F742E
!
snmp-server community cisxxxxxx RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps frame-relay
snmp-server enable traps frame-relay subif
snmp-server enable traps syslog
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
call rsvp-sync
!
!
!
mgcp profile default
!
dial-peer cor custom
!
!
El dial-peer voice x pots indica el numero que tiene asociado el puerto de la tarjeta

!
dial-peer voice 1 pots
destination-pattern 12
port 0/0/0
!
dial-peer voice 2 pots
destination-pattern 12
port 0/0/1
!
!
dial-peer voice 3 pots
destination-pattern 12
port 0/0/2
!
dial-peer voice 4 pots
destination-pattern 12
port 0/0/3
!

El dial-peer voice 100 voip indica al nume,ro que se debe marcar para llegar a un
destino y su direccin IP asociada al destino, que en su mayoria de casos es la direccion
IP Wan de la interfaz del ROUTER.

!
dial-peer voice 100 voip
description CONEXION PRINCIPAL
destination-pattern 2
session target ipv4:10.252.230.10
expect-factor 20
ip qos dscp cs5 media
no vad
!
!
dial-peer voice 101 voip
description CONEXION NEIVA
destination-pattern 810
session target ipv4:10.252.230.6
expect-factor 20
ip qos dscp cs5 media
no vad
!
!

dial-peer voice 102 voip


description CONEXION BARRANCA
destination-pattern 810
session target ipv4:10.252.230.26
expect-factor 20
ip qos dscp cs5 media
no vad
!

!
!
banner motd ^C

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXX

!Atencion:

Esta conectado al equipo $(hostname) de ETB,


el acceso y cambios al mismo esta restringido
a personal autorizado !

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXX

^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
no scheduler allocate
!
end
VOZ MPLS

service password-encryption
!
hostname CLIENTE_CIUDAD_K26C26
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
ip cef
!

!
class-map match-all DATOS
match any
class-map match-all voice
match ip precedence 5
!
!
policy-map XXkvoice
class voice
priority XX
policy-map LAN
class DATOS
set precedence 1
!
!
!
!
interface FastEthernet0/0
description CONEXION LAN
ip address 10.5.20.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
NO CDP ENABLE
service-policy input LAN
no shutdown
!
interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
service-policy output xxkvoice
no shutdown
!

!
interface FastEthernet0/1.101
description CONEXION MPLS DATOS
bandwidth xxx
encapsulation dot1Q xxx
ip address IPA WAN PAR 255.255.255.252
NO CDP ENABLE
!

ip route 0.0.0.0 0.0.0.0 IP WAN IMPAR

!
no ip http server
!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3

snmp-server community cisxxxxxx RW 97


snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisxxxxxx
snmp-server host 192.168.100.221 cisxxxxxx
snmp-server host 192.168.168.203 cisxxxxxx
no cdp run
!
control-plane
!

El dial-peer voice x pots indica el numero que tiene asociado el puerto de la tarjeta

!
dial-peer voice 1 pots
destination-pattern 501
port 0/0/0
!
dial-peer voice 2 pots
destination-pattern 501
port 0/0/1
!
dial-peer voice 3 pots
destination-pattern 502
port 0/0/2
!
dial-peer voice 4 pots
destination-pattern 502
port 0/0/3
!

El dial-peer voice 100 voip indica al nume,ro que se debe marcar para llegar a un
destino y su direccin IP asociada al destino, que en su mayoria de casos es la direccion
IP Wan de la interfaz del ROUTER.

!
dial-peer voice 100 voip
description CONEXION PRINCIPAL
destination-pattern 2
session target ipv4:10.252.230.10
expect-factor 20
ip qos dscp cs5 media
no vad
!
!
dial-peer voice 101 voip
description CONEXION NEIVA
destination-pattern 810
session target ipv4:10.252.230.6
expect-factor 20
ip qos dscp cs5 media
no vad
!
!
dial-peer voice 102 voip
description CONEXION BARRANCA
destination-pattern 810
session target ipv4:10.252.230.26
expect-factor 20
ip qos dscp cs5 media
no vad
!

!
banner motd ^CCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
scheduler allocate 20000 1000
end
OSPF

service password-encryption
!
hostname Redeb_Surtimax_Mos_Av19C6
!
boot-start-marker
boot-end-marker
!
enable secret (PASSWORD)
!
no aaa new-model
ip cef
!
!
!
!
!
!
!
interface FastEthernet0/0
description CONEXION LAN
ip address 10.15.32.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
no shutdown
!
interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
speed 100
full-duplex
no snmp trap link-status
ntp disable
no cdp enable
no shutdown
!
interface FastEthernet0/1.101
description CONEXION MPLS DATOS PPAL
bandwidth 64
encapsulation dot1Q 101
ip address 10.247.41.50 255.255.255.252
no ip redirects
no ip unreachables
no ip proxy-arp
no ip mroute-cache
ntp disable
!

router ospf 1

log-adjacency-changes
redistribute connected subnets
redistribute static subnets
passive-interface FastEthernet0/0
network 10.15.32.0 0.0.0.255 area 9 RED LAN
network 10.247.41.48 0.0.0.3 area 9 RED WAN

!
no ip http server
!
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
snmp-server community cisredeba RW 97
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 192.168.100.170 cisredeba
snmp-server host 192.168.100.221 cisredeba
snmp-server host 192.168.168.203 cisredeba
no cdp run
!
control-plane
!
banner motd ^CCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password (PASSWORD)
login
line aux 0
password (PASSWORD)
login
line vty 0 4
password (PASSWORD)
login
!
scheduler allocate 20000 1000
end
BGP

service password-encryption
!
hostname Conta_GNacion_Bog_Int
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$VK6A$CBycs2k3hgEm7Sco/Mmse1
!
no aaa new-model
ip cef
!
!
voice-card 0
!
interface FastEthernet0/0
description CONEXION LAN
ip address 190.24.136.113 255.255.255.240
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
no shutdown
!
interface FastEthernet0/1
description CONEXION MPLS
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
load-interval 30
speed 100
full-duplex
ntp disable
no shutdown
!
interface FastEthernet0/1.100
description GESTION ETB
bandwidth 8
encapsulation dot1Q 100
ip address 201.244.1.250 255.255.255.252
!
interface FastEthernet0/1.101
description CONEXION MPLS INTERNET
bandwidth 5120
encapsulation dot1Q 101
ip access-group 110 in
ip access-group 110 out
ip address 201.244.1.74 255.255.255.252
!
router bgp 64987 SISTEMA AUTONOMO
no synchronization
bgp log-neighbor-changes
network 190.24.136.112 mask 255.255.255.240 RED LAN
neighbor 201.244.1.73 remote-as 19429 SISTEMA AUTONOMO ETB
neighbor 201.244.1.73 version 4 NEXT HOP WAN
neighbor 201.244.1.73 soft-reconfiguration inbound
no auto-summary
!
ip route 192.168.100.3 255.255.255.255 201.244.1.249
ip route 192.168.100.170 255.255.255.255 201.244.1.249
ip route 192.168.100.221 255.255.255.255 201.244.1.249
ip route 192.168.168.203 255.255.255.255 201.244.1.249
!
!
no ip http server
no ip http secure-server
!
access-list 96 permit 172.18.80.222
access-list 97 permit 192.168.168.203
access-list 97 permit 192.168.100.170
access-list 97 permit 192.168.100.221
access-list 98 permit 192.168.100.3
access-list 110 deny tcp any any eq 27665
access-list 110 deny udp any any eq 31335
access-list 110 deny udp any any eq 27444
access-list 110 deny tcp any any eq 16660
access-list 110 deny tcp any any eq 65000
access-list 110 deny tcp any any eq 33270
access-list 110 deny tcp any any eq 39168
access-list 110 deny tcp any any range 6711 6712
access-list 110 deny tcp any any eq 6776
access-list 110 deny tcp any any eq 6669
access-list 110 deny tcp any any eq 2222
access-list 110 deny tcp any any eq 7000
access-list 110 deny udp any any eq 135
access-list 110 deny udp any any eq netbios-ns
access-list 110 deny udp any any eq netbios-ss
access-list 110 deny udp any any eq 445
access-list 110 deny tcp any any eq 135
access-list 110 deny tcp any any eq 3128
access-list 110 deny tcp any any eq 4480
access-list 110 deny tcp any any eq 6588
access-list 110 deny tcp any any eq 4444
access-list 110 deny tcp any any eq 593
access-list 110 deny tcp any any eq 445
access-list 110 deny tcp any any eq 137
access-list 110 deny tcp any any eq 139
access-list 110 deny tcp any eq 1214 any
access-list 110 deny udp any eq 1214 any
access-list 110 deny udp any any eq 1214
access-list 110 deny tcp any any eq 1214
access-list 110 deny udp any eq netbios-ns any
access-list 110 deny tcp any eq 137 any
access-list 110 deny udp any eq netbios-ss any
access-list 110 deny tcp any eq 139 any
access-list 110 deny tcp any eq 1433 any
access-list 110 deny udp any eq 1433 any
access-list 110 deny udp any any eq 1433
access-list 110 deny tcp any any eq 1433
access-list 110 deny tcp any eq 1434 any
access-list 110 deny udp any eq 1434 any
access-list 110 deny udp any any eq 1434
access-list 110 deny tcp any any eq 1434
access-list 110 deny tcp any eq 4661 any
access-list 110 deny udp any eq 4661 any
access-list 110 deny tcp any any eq 4661
access-list 110 deny udp any any eq 4661
access-list 110 deny tcp any eq 4662 any
access-list 110 deny udp any eq 4662 any
access-list 110 deny tcp any any eq 4662
access-list 110 deny udp any any eq 4662
access-list 110 deny tcp any eq 4665 any
access-list 110 deny udp any eq 4665 any
access-list 110 deny tcp any any eq 4665
access-list 110 deny udp any any eq 4665
access-list 110 deny udp any any eq 8998
access-list 110 deny udp any any eq 995
access-list 110 deny udp any any eq 996
access-list 110 deny udp any any eq 997
access-list 110 deny udp any any eq 998
access-list 110 deny udp any any eq 999
access-list 110 permit ip any any
snmp-server community cisxxxxxx RW 97
snmp-server community CGN_Admin RO 96
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 172.18.80.222 CGN_Admin
snmp-server host 192.168.100.170 cisxxxxx
snmp-server host 192.168.100.221 cisxxxxx
snmp-server host 192.168.168.203 cisxxxxx
no cdp run
!
!
!
!
control-plane
!
!

banner motd ^CCCC

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recursos tecnologico de ETB $(hostname), no ingrese
si no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.
Toda actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
^C
!
line con 0
password 7 02090B0C061301251C
login
line aux 0
password 7 045404510234424A59
login
line vty 0 4
password 7 12160A401F1E02007A
login
!
scheduler allocate 20000 1000
end
PASSWORD RECOVERY

"Lo primero que hay que hacer es conectarse al Router con el Hyperterminal usando
esta configuracin:

- Protocol: Serial
- Port: Com1
- Baud Rates: 9600
- Data Bits: 8
- Parity: None
- Stop Bits: 1
- Flow Control: None

Una vez conectados al router, tenemos que hacerle un break durante la carga de la IOS.
Para ello apaga y enciende el
Router. Empezar la carga de la Flash. Tienes que impedir que se cargue y para ello,
ejecutamos la combinacin de teclas
[Control] + [Pause] en los primeros segundos repetidas veces, para entrar en modo:

Rommon 1>
Rommon 2>
Rommon 3>

Este es el modo de recuperacin de emergencia y tiene varias utilidades; entre ellas la


de hacer una recuperacin de las
Passwords.

Tenemos ahora que cambiar la opcin del registro que hace que al encender el router se
cargue la configuracin de
arranque (la startup-config) que es la que contiene las contraseas. Para ello escribimos
en la consola:

Rommon 4>
Rommon 5> confreg 0x2142

Una vez hecho esto reiniciamos el Router con el comando "reset"

Rommon 6>
Rommon 7> reset

El router entonces se reinicia normalmente pero sin cargar la configuracin. Lo dejas


terminar y se detendr en algn momento para preguntarte si deseas crear una
configuracin bsica con el Auto-Setup. Dile a todo que NO o presiona directamente
[Control] + C hasta que te quedes en la consola del Router.

Router>
Router>
Una vez aqu ya puedes entrar directamente en modo privilegiado con el comando
enable

Router>
Router> enable
Router#
Router#

En este punto te encuentras en modo privilegiado habindote saltado las Passwords que
estn guardadas en la configuracin del arranque. Ahora lo que nos interesa es cargar la
configuracin del arranque en la memoria para poder cambiarle las contraseas. Con
este comando cargamos la configuracin que el router tiene guardada en la NVRAM a
la RAM:

Router#
Router# copy startup-config running-config

Hecho esto te encuentras dentro del modo privilegiado del router con la configuracin
que traa, pero aun no hemos terminado, tienes que cambiarle las passwords, volver a
configurar correctamente el registro y guardar los cambios para que no se borren al
apagar el router. Para ello lo primero que vas a hacer es guardar la configuracin actual
a un txt; para ello haz un "show run" y copia la salida a un archivo.txt

Router#
Router# show run

Hecho esto entramos en modo configuracin para realizar los cambios anteriormente
comentados.

Router#
Router# configure terminal
Router(config)#

Ahora cambiamos las contraseas sustituyendo los parntesis por lo que queramos

Router(config)#
Router(config)# line console 0
Router(config-line)# password (tucontrasea)
Router(config-line)# login
Router(config-line)# exit
Router(config)#
Router(config)# line vty 0 4
Router(config-line)# password (tucontrasea)
Router(config-line)# login
Router(config-line)# exit
Router(config)#
Router(config)# enable secret (tucontrasea)

Volvemos a poner el registro con su valor original para que cargue la startup-config
cada vez que se encienda
Router(config)#
Router(config)# config-register 0x2102

Con esto, le hemos indicado al router que queremos que la prxima vez que se reinicie,
cargue la configuracin que traa
con los cambios que le hemos realizado.

Para terminar no te olvides de guardar la configuracin del router para que todos los
cambios se queden guardados y se
apliquen cada vez que reinicies el router.

Router(config)#
Router(config)# exit
Router#
Router# write
Router#
SRP

El hsrp es un protocolo propietario Cisco, Al implementar HSRP, los routers redundantes


pueden tener 2 estados: primario (Router 1) y standby (Router 2).

Si el router primario no enva paquetes hello al router standby por un determinado perodo de
tiempo, el router standby asume que el primario est fuera de servicio por algn motivo y pasa
a estar activo.

La configuracion es la siguiente:

ROUTER PRINCIPAL: COLOCAR LO SIGUIENTE EN LA INTERFAZ LAN

standby 100 ip 192.168.1.110


standby 100 preempt

ROUTER BACKUP: COLOCAR LO SIGUIENTE EN LA INTERFAZ LAN

standby 100 ip 192.168.1.110


standby 100 priority 99
standby 100 preempt

La prioridad se define en un router Principal y uno sucursal, cuando no se define


prioridad, el router toma la prioridad ms alta, y para el back-up se le define una
prioridad mas baja que la del principal. Cuando no se le coloca prioridad el router toma
una prioridad de 100.
PROCEDIMIENTO PARA GUARDAR CONFIGURACION DE EQUIPOS CISCO

Objetivo:

Tener la configuracin actualizada en hoja de vida de cada uno de los equipos de ETB
en los clientes y con la fecha de actualizacin, para tenerla disponible en el momento
que se requiera (por ejemplo por dao de equipo y que tenga inaccesible su
configuracin) o cuando se requiera conocer a partir de qu fecha se realiz
determinado cambio.

1. Siempre que se realice algn cambio de configuracin (cualquier cambio) y


luego de estar seguro de que la configuracin es definitiva se debe guardar la
configuracin en el enrutador #wr.
2. Copiar y pegar en un archivo de texto este #wr para comprobar que la
configuracin se guard, junto con #show running-config y #show version.
3. Guardar el archivo en \\Snmulp02\d_ld_tecnica\DATOS &
INTERNET\CLIENTES\NOMBRE_DEL_CLIENTE\APROVISIONAMIEN
TO\Configuracin de CPEs.
4. Se debe guardar con el nombre : hostname_fecha siendo hostname el
hostname completo que tenga el enrutador y la fecha relacionada con dos dgitos
para cada item por ejemplo 11 de enero de 2005 quedara 110105.
3. ENRUTADORES HUAWEI
3.1 PLANTILLAS BRI Y VOIP

router principal

detect-group x
detect-list 1 ip address B.B.B.B
q

*B.B.B.B es la ip de la interface bri de cada sede*

ip route-static C.C.C.C 255.255.255.0 D.D.D.D preference 60 detect-group x


description BACKUP (NOMBRE DE LA SUCURSAL)

C.C.C.C es la ip LAN sucursal

D.D.D.D es la ip BRI sucursal

**********************************************************************
******************************************
**********************************************************************
*****************************************
para configurar bri ISDN en las sucursales

dialer-rule 1 ip permit

detect-group 1
detect-list 1 ip address 172.21.0.1 nexthop A.A.A.A
q

(A.A.A.A esta ip tiene que ser la impar que pega contra la ip wan del router de cada
sede ej: sede sergio alrboleda tiene la interface serial wan 10.247.148.26 por lo tanto
A.A.A.A es 10.247.148.25)

interface Bri2/0
link-protocol ppp
standby detect-group 1
ip address B.B.B.B 255.255.255.0
dialer enable-circular
dialer-group 1
dialer route ip 192.168.10.1 3820360 (ojo)******
q
*B.B.B.B es la ip de la interface bri de cada sede*

OJO: hay que tener en cuenta cuando se configure el numero telefonico, verificar que si
es una sede fuera de Bogota colocarle el indicativo ej cali : dialer route ip 192.168.10.1
0713820360

ip route-static 10.247.147.4 255.255.255.252 A.A.A.A


undo ip route-static 0.0.0.0 0.0.0.0 A.A.A.A

ip route-static 0.0.0.0 0.0.0.0 A.A.A.A preference 60 detect-group 1


ip route-static 0.0.0.0 0.0.0.0 192.168.10.1 preference 100
undo ip route-static 10.247.147.4 255.255.255.252 A.A.A.A

**********************************************************************
**********************************************************************
**********************************************************************
********************
configuracion Voip

voice-setup
vqa data-statistic enable

dial-program
default entity payload-size g729 40

***************************************************
entity 1 pots
match-template AAAA(ext de la sucursal)
line 1/0
send-number all

entity 2 pots
match-template AAAA(ext de la sucursal)
line 1/1
priority 1
send-number all

ejemplos :

entity 1 pots
match-template 1101
line 1/0
send-number all

entity 2 pots
match-template 1101
line 1/1
send-number all
entity BBBB voip
description (direccion y nombre de la sede remota)
match-template B.B.B.B (ext sede remota)
address ip x.x.x.x (wan sede remota)
fast-connect

ejemplos:

NOTA : HAY QUE CONFIGURAR LA SIGUIENTE PLANTILLA PARA TODAS


LAS SUCURSALES, PERO HAY QUE QUITARLE EL entity QUE TIENE EL
NOMBRE DE LA MISMA SUCUSAL

POR EJEMPLO: se va a configurar la sucursal de B/MGA CLL 48 # 28-81

primero se le omite la cofiguracion "entity xxxx voip " de la misma sucursal:

*****************************************
entity 7101 voip
description B/MGA CLL 48 # 28-81
match-template 7101
address ip 10.247.147.10
fast-connect
q

****************************************

luego se aplica toda la plantilla

voice-setup
vqa data-statistic enable

dial-program
default entity payload-size g729 40

entity 7201 voip


description B/MGA ALCADIA Kr 11 # 34-10
match-template 7201
address ip 10.247.147.14
fast-connect
q

entity 7301 voip


description B/MGA PARQUE STDER CLL 35 # 20-01
match-template 7301
address ip 10.247.147.18
fast-connect
q

entity 5301 voip


description B/QUILLA PIMSA KM 3 SABANAGRANDE
match-template 5301
address ip 10.247.147.58
fast-connect
q

entity 5201 voip


description B/QUILLA CLL 76 # 56-71
match-template 5201
address ip 10.247.147.62
fast-connect
q

entity 8101 voip


description CTGENA CENTRO CONVENCIONES KR 8B #24-38
match-template 8101
address ip 10.247.147.66
fast-connect
q

entity 2201 voip


description CALI Paso del comercio cll 44 # 1-02
match-template 2201
address ip 10.247.147.82
fast-connect
q

entity 2101 voip


description CALI CLL 11 # 6-36
match-template 2101
address ip 10.247.147.86
fast-connect
q

entity 2301 voip


description CALI PASTO ANCHO CLL 13 # 78-54 LOC 1-02
match-template 2301
address ip 10.247.147.90
fast-connect
q

entity 4101 voip


description MEDELLIN EL POBLADO KR 43A # 1A SUR-35 LOC 1-02
match-template 4101
address ip 10.247.147.98
fast-connect
q

entity 4101 voip


description MEDELLIN EL POBLADO KR 43A # 1A SUR-35 LOC 1-02
match-template 4101
address ip 10.247.147.98
fast-connect
q

entity 4201 voip


description MEDELLIN ORIENTAL KR 46 # 52-46
match-template 4201
address ip 10.247.147.106
fast-connect
q

entity 4301 voip


description MEDELLIN KR 43A # 14-27
match-template 4301
address ip 10.247.147.110
fast-connect
q

entity 6101 voip


description MANIZALES CLL 21 # 22-40
match-template 6101
address ip 10.247.147.114
fast-connect
q

entity 6201 voip


description PEREIRA KR 7 # 19-26
match-template 6201
address ip 10.247.147.118
fast-connect
q

entity 1201 voip


description BOG KR 65 # 11-83
match-template 1201
address ip 10.247.147.146
fast-connect
q

entity 1211 voip


description BOG PARQUE IND SAN CARLOS KM 3 VIA FUNZA
match-template 1211
address ip 10.247.147.150
fast-connect
q

entity 1221 voip


description BOG GRANJAS cll 13 # 66-20
match-template 1221
address ip 10.247.147.154
fast-connect
q

entity 1231 voip


description BOG KR 11 # 94A-03
match-template 1231
address ip 10.247.147.158
fast-connect
q

entity 1241 voip


description BOG AV AMERICAS # 39A-91
match-template 1241
address ip 10.247.147.162
fast-connect
q

entity 1251 voip


description BOG CLL 71 # 11-02
match-template 1251
address ip 10.247.147.170
fast-connect
q

entity 1261 voip


description BOG AV SUBA # 108-58 LOC 106
match-template 1261
address ip 10.247.147.174
fast-connect
q

entity 1271 voip


description BOG KR 25 # 17-83
match-template 1271
address ip 10.247.147.178
fast-connect
q

entity 1281 voip


description cll 122 # 25A-51
match-template 1281
address ip 10.247.147.182
fast-connect
q
entity 1291 voip
description BOG AV 82 # 10-64
match-template 1291
address ip 10.247.147.186
fast-connect
q

entity 1301 voip


description BOG AV SUBA # 96-66
match-template 1301
address ip 10.247.147.190
fast-connect
q

entity 1311 voip


description BOG KR 15 # 88-97
match-template 1311
address ip 10.247.148.6
fast-connect
q

entity 1321 voip


description BOG CASTILLO Kr7 # 72-74
match-template 1321
address ip 10.247.148.10
fast-connect
q

entity 1331 voip


description BOG CASTILLO CLL 100 # 11A-51
match-template 1331
address ip 10.247.148.14
fast-connect
q

entity 1110 voip


description BOG Kr7 # 71-52
match-template 1110
address ip 10.247.148.58
fast-connect
q

entity 1120 voip


description BOG DIG 27 # 6-70
match-template 1120
address ip 10.247.148.62
fast-connect
q
entity 1101 voip
description BOG principal K8 15-42
match-template 1101
address ip 10.247.147.6
fast-connect
q

entity 1102 voip


description BOG principal K8 # 15-42
match-template 1102
address ip 10.247.148.2
fast-connect
q

**********************************************************************
*************************
palntilla completa sin omitir sucursales:

entity 7101 voip


description B/MGA CLL 48 # 28-81
match-template 7101
address ip 10.247.147.10
fast-connect
q

entity 7201 voip


description B/MGA ALCADIA Kr 11 # 34-10
match-template 7201
address ip 10.247.147.14
fast-connect
q

entity 7301 voip


description B/MGA PARQUE STDER CLL 35 # 20-01
match-template 7301
address ip 10.247.147.18
fast-connect
q
3.2 QOS ETHERNET

voice-setup
vqa dscp media ef
vqa dscp signal ef

traffic classifier voip


if-match dscp ef

traffic behavior voip


queue ef bandwidth 24

qos policy voip


classifier voip behavior voip

interface Ethernet0/0
qos max-bandwidth 512 ++++++++++++++ se aplica este comado a la interface
wan
qos apply policy voip outbound ++++++++++++++++++++se aplica este comado a la
interface wan

traffic shaping

para ethernet

interface eth 0/0


qos lr cir 128000 cbs 15000 ebs 0 limitar bw de la interface para 128K

qos lr cir 512000 cbs 51200 ebs 0 para 512 K

dis qos gts int ]para verificar traffic shaping


3.3 QOS FRAME RELAY

configuracion de Qos (calidad de servicio) sobre Frame relay

traffic classifier voip operator and


if-match dscp ef
q

traffic behavior voip


queue ef bandwidth 24 cbs 1500
q

qos policy voip


classifier voip behavior voip
q

en la interface serial aplicar:

interface Serial5/0
baudrate 128000 (aplicar este comado, ancho de banda canal)

crear fr class:

fr class voip
cir allow 128000 (ancho de banda canal)
cbs 1280 (ancho de banda dividido 100)
cir 128000 (ancho de banda canal)
apply policy voip outbound
q

en la sub interface, dentro del fr dlci aplicar, fr-class voip

#
interface Serial5/0.16 p2p
fr dlci 16
fr-class voip (aplicar este comando)

ejemplo: este canal tiene ancho de banda de 128 kbps

traffic classifier voip operator and


if-match dscp ef
q

traffic behavior voip


queue ef bandwidth 24 cbs 1500
q

qos policy voip


classifier voip behavior voip
q

interface Serial0/0
baudrate 128000
link-protocol fr
fr interface-type dce
fr lmi type ansi
fr traffic-shaping
undo ip fast-forwarding
q

fr class voip
cir allow 128000
cbs 1280
cir 128000
apply policy voip outbound
q

#
interface Serial0/0.1 p2p
fr dlci 16
fr-class voip
q
3.4 INTERNET ENRUTADORES HUAWEI ACCESO ETHERNET

System

sysname XXX_XXX_XXX_Int

local-user etb
password cipher (PASSWORD)
service-type telnet
level 3
service-type ftp
quit

UNDO LOCAL-USER admin

ftp server enable

interface Ethernet 0/0


description CONEXION LAN
ip address 190.25.249.97 255.255.255.240
speed 100
duplex FULL
UNDO arp-proxy enable
undo shutdown
quit

interface Ethernet 0/1


description CONEXION MPLS
UNDO ip address
speed 100
duplex FULL
UNDO arp-proxy enable
undo shutdown
quit

interface Ethernet 0/0.101


description CONEXION MPLS INTERNET
ip address 10.248.88.2 255.255.255.252
vlan dot1q vid 101
quit
interface Ethernet 0/0.100
description CONEXION MPLS GESTION
ip address 10.248.88.250 255.255.255.252
vlan dot1q vid 100
quit

ip route-static 0.0.0.0 0.0.0.0 10.248.88.1


ip route 192.168.100.3 255.255.255.255 10.248.88.249
ip route 192.168.100.221 255.255.255.255 10.248.88.249
ip route 192.168.168.203 255.255.255.255 10.248.88.249
ip route 192.168.173.4 255.255.255.255 10.248.88.249
ip route 192.168.173.5 255.255.255.255 10.248.88.249

acl number 2097


rule permit source 192.168.168.203 0
rule permit source 192.168.100.170 0
rule permit source 192.168.100.221 0

acl number 2098


rule permit source 192.168.100.3 0

snmp-agent
snmp-agent local-engineid 000007DB7F000001000040E9
snmp-agent community write cisaglomi acl 2097
snmp-agent sys-info version all
snmp-agent target-host trap address udp-domain 192.168.100.170 params securityname
cisaglomi
snmp-agent target-host trap address udp-domain 192.168.100.221 params securityname
cisaglomi
snmp-agent target-host trap address udp-domain 192.168.168.203 params securityname
cisaglomi
#
header shell
Input banner text, and quit with the character 's'.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(hostname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.Toda
actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs

s
user-interface vty 0 4
authentication-mode scheme
quit
user-interface con 0
authentication-mode password
set authentication password cipher (PASSWORD)
quit
save
3.5 CANAL DE INTERNET ACCESO FRAME RELAY

system

sysname XXX_XXX_XXX_Int

local-user etb
password cipher (PASSWORD)
service-type telnet
level 3
service-type ftp
quit

UNDO LOCAL-USER admin

ftp server enable

interface Ethernet 0/0


description CONEXION LAN
ip address 200.93.164.89 29
speed 100
duplex FULL
UNDO arp-proxy enable
undo shutdown
quit

interface Serial0/0
description CONEXION FRAME RELAY
UNDO IP address
link-protocol fr
fr lmi type ansi
link-protocol fr ietf
fr traffic-shaping
undo ip fast-forwarding
undo shutdown
quit
interface Serial 0/0.1 p2p
description CONEXION FRAME RELAY PRINCIPAL
fr dlci 16
ip address 10.253.111.2 30
quit

interface Serial 0/0.100 p2p


description CONEXION FRAME RELAY GESTION
fr dlci 100
ip address 10.251.7.16 24
quit

ip route-static 0.0.0.0 0.0.0.0 10.253.111.1

ip route 192.168.100.3 255.255.255.255 10.251.7.1


ip route 192.168.100.221 255.255.255.255 10.251.7.1
ip route 192.168.168.203 255.255.255.255 10.251.7.1
ip route 192.168.173.4 255.255.255.255 10.251.7.1
ip route 192.168.173.5 255.255.255.255 10.251.7.1
acl number 2097
rule permit source 192.168.168.203 0
rule permit source 192.168.100.170 0
rule permit source 192.168.100.221 0

acl number 2098


rule permit source 192.168.100.3 0

snmp-agent
snmp-agent local-engineid 000007DB7F000001000040E9
snmp-agent community write ciszonlin acl 2097
snmp-agent sys-info version all
snmp-agent target-host trap address udp-domain 192.168.100.170 params securityname
ciszonlin
snmp-agent target-host trap address udp-domain 192.168.100.221 params securityname
ciszonlin
snmp-agent target-host trap address udp-domain 192.168.168.203 params securityname
ciszonlin
#
header shell
Input banner text, and quit with the character 's'.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(hostname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.Toda
actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs

s
user-interface vty 0 4
authentication-mode scheme
quit
user-interface con 0
authentication-mode password
set authentication password cipher (PASSWORD)
quit
save
3.6 NAT Y DHCP ROUTERS HUAWEI

system

sysname XXX_XXX_Int

local-user etb
password cipher (PASSWORD)
service-type telnet
level 3
service-type ftp
quit

UNDO LOCAL-USER admin

ftp server enable

nat address-group 1 190.24.8.19 190.24.8.19

#
dhcp server ip-pool cchl
network 192.168.252.0 mask 255.255.255.0
gateway-list 192.168.252.1
dns-list 200.75.51.132 200.75.51.133
#

interface Ethernet 0/0


description CONEXION LAN
ip address 192.168.252.1 255.255.255.248
speed 100
duplex FULL
UNDO arp-proxy enable
undo shutdown
quit
interface Serial0/0
description CONEXION FRAME RELAY
UNDO IP address
link-protocol fr
fr lmi type ansi
link-protocol fr ietf
fr traffic-shaping
undo ip fast-forwarding
ip address dhcp-alloc
undo shutdown
quit

interface Serial 0/0.1 p2p


description CONEXION FRAME RELAY PRINCIPAL
fr dlci 16
nat outbound 2000 address-group 1
ip address 10.248.54.2 255.255.255.252
quit

interface Serial 0/0.100 p2p


description CONEXION FRAME RELAY GESTION
fr dlci 100
ip address 10.251.6.37 255.255.255.0
quit

dhcp server forbidden-ip 192.168.252.1 192.168.252.20


dhcp server forbidden-ip 192.168.252.171 192.168.252.224

ip route-static 0.0.0.0 0.0.0.0 10.248.54.1

ip route 192.168.100.3 255.255.255.255 10.251.6.1


ip route 192.168.100.221 255.255.255.255 10.251.6.1
ip route 192.168.168.203 255.255.255.255 10.251.6.1
ip route 192.168.173.4 255.255.255.255 10.251.6.1
ip route 192.168.173.5 255.255.255.255 10.251.6.1

#
acl number 2000
rule 0 permit source 192.168.252.0 0.0.0.255
acl number 2097
rule permit source 192.168.168.203 0
rule permit source 192.168.100.170 0
rule permit source 192.168.100.221 0

acl number 2098


rule permit source 192.168.100.3 0

#
acl number 3001
rule 0 deny tcp destination-port eq 27665
rule 1 deny udp destination-port eq 31335
rule 2 deny udp destination-port eq 27444
rule 3 deny tcp destination-port eq 16660
rule 4 deny tcp destination-port eq 1434
rule 5 deny udp destination-port eq 1434
rule 6 deny tcp destination-port eq 4661
rule 7 deny udp destination-port eq 4661
rule 8 deny tcp destination-port eq 4662
rule 9 deny udp destination-port eq 4662
rule 10 deny tcp destination-port eq 4665
rule 11 deny udp destination-port eq 4665
rule 12 deny udp destination-port eq 8998
rule 13 deny udp destination-port eq 995
rule 14 deny udp destination-port eq 996
rule 15 deny udp destination-port eq 997
rule 16 deny udp destination-port eq 998
rule 17 deny udp destination-port eq 999
rule 18 permit ip
#

snmp-agent
snmp-agent local-engineid 000007DB7F000001000040E9
snmp-agent community write cisamaril acl 2097
snmp-agent sys-info version all
snmp-agent target-host trap address udp-domain 192.168.100.170 params securityname
cisamaril
snmp-agent target-host trap address udp-domain 192.168.100.221 params securityname
cisamaril
snmp-agent target-host trap address udp-domain 192.168.168.203 params securityname
cisamaril
#
header shell
Input banner text, and quit with the character 's'.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(sysname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.Toda
actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs

s
user-interface vty 0 4
authentication-mode scheme
quit
user-interface con 0
authentication-mode password
set authentication password cipher (PASSWORD)
quit
save

Aclarciones:

Para el DHCP SE CONFIGURA LO SIGUIENTE:

#
dhcp server ip-pool cchl
network 192.168.252.0 mask 255.255.255.0
gateway-list 192.168.252.1
dns-list 200.75.51.132 200.75.51.133
#

Para excluir un rango de direcciones ip se realiza de la siguiente manera:


dhcp server forbidden-ip 192.168.252.1 192.168.252.20
dhcp server forbidden-ip 192.168.252.171 192.168.252.224

Para el nat se debe crear

#
nat address-group 1 190.24.8.19 190.24.8.19
#

La direccion a la cual se va a natear o el rango de direcciones.


#
#

interface Serial 0/0.1 p2p


description CONEXION FRAME RELAY PRINCIPAL
fr dlci 16
nat outbound 2000 address-group 1
ip address 10.248.54.2 255.255.255.252
quit
#
#

Se aplica el nat sobre la interfaz de salida, no es necesario aplicarlo en la interfaz de


entrada.

#
acl number 2000
rule 0 permit source 192.168.252.0 0.0.0.255
#

Se crea un lista de acceso y se le especifica el pool de direciones privadas que se le va a


permitir realizar el path.
3.7 DATOS PUNTO PRINCIPAL ENRUTADORES HUAWEI

system

sysname XXX_XXX_XXX_Ppal

local-user etb
password cipher (PASSWORD)
service-type telnet
level 3
service-type ftp
quit

UNDO LOCAL-USER admin

ftp server enable

interface Ethernet 0/0


description CONEXION LAN
ip address 192.168.1.3 24
speed 100
duplex FULL
UNDO arp-proxy enable
undo shutdown
quit

interface Serial0/0
description CONEXION FRAME RELAY
UNDO IP address
link-protocol fr
fr lmi type ansi
link-protocol fr ietf
fr traffic-shaping
undo ip fast-forwarding
undo shutdown
quit
interface Serial 0/0.1 p2p
description CONEXION FRAME RELAY PRINCIPAL
fr dlci 16
ip address 10.245.240.26 30
quit

interface Serial 0/0.100 p2p


description CONEXION FRAME RELAY GESTION
fr dlci 100
ip address 10.251.6.180 24
quit

ip route-static 0.0.0.0 0.0.0.0 10.245.240.25

ip route 192.168.100.3 255.255.255.255 10.251.6.1


ip route 192.168.100.221 255.255.255.255 10.251.6.1
ip route 192.168.168.203 255.255.255.255 10.251.6.1
ip route 192.168.173.4 255.255.255.255 10.251.6.1
ip route 192.168.173.5 255.255.255.255 10.251.6.1

acl number 2097


rule permit source 192.168.168.203 0
rule permit source 192.168.100.170 0
rule permit source 192.168.100.221 0

acl number 2098


rule permit source 192.168.100.3 0

snmp-agent
snmp-agent local-engineid 000007DB7F000001000040E9
snmp-agent community write ciscolame acl 2097
snmp-agent sys-info version all
snmp-agent target-host trap address udp-domain 192.168.100.170 params securityname
ciscolame
snmp-agent target-host trap address udp-domain 192.168.100.221 params securityname
ciscolame
snmp-agent target-host trap address udp-domain 192.168.168.203 params securityname
ciscolame
#
header shell
Input banner text, and quit with the character 's'.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

!Atencion:
Usted esta a punto de utilizar un recurso tecnologico de ETB $(hostname), no ingrese si
no esta autorizado. Recuerde que su clave de acceso es personal e intransferible. La
divulgacion de la clave puede afectar la seguridad de nuestra red.
En caso de sospecha de divulgacion de su clave proceda a cambiarla de inmediato.Toda
actividad sera monitoreada por razones de seguridad.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXs

s
user-interface vty 0 4
authentication-mode scheme
quit
user-interface con 0
authentication-mode password
set authentication password cipher (PASSWORD)
quit
save

You might also like