Plantilla Cafam SSH Radius Cafam Cisco
Plantilla Cafam SSH Radius Cafam Cisco
Plantilla Cafam SSH Radius Cafam Cisco
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
==============================================================================
RADIUS
==============================================================================
1. crear rutas con el peer de la interfaz de gesti�n.
aaa new-model
!
aaa authentication login default group radius local
aaa authentication enable default group radius enable
aaa session-id common
ip cef
!
username cpes password cpes
archive
log config
hidekeys
5. Agregar comandos radius-server para los tres servidores + el key "tal y como
aparece�.
line vty 0 4
access-class 98 in
login local
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
==============================================================================
SSH
==============================================================================
ip ssh version 2
ip domain name etb.com.co
McDonals_Chipichape(config)#crypto key generate RSA
---------------------> caundo pregunta bloque se coloca 2048
!
ip domain name etb.com.co
!
username cpes privilege 15 password cpes
username etb privilege 15 password oo7mund0
!
ip ssh authentication-retries 2
ip ssh port 2222 rotary 1
ip ssh version 2
!
line vty 0 4
login local
transport input telnet ssh -------------------->
Probamos ingresos por ssh y luego quitamos el telnet asi.
!
line vty 0 4
login local
transport input ssh
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
==============================================================================
GRAFICACION GU
==============================================================================
snmp-server community cispresid RW 97
snmp-server enable traps entity
snmp-server enable traps syslog
snmp-server host 10.243.16.78 ciscafam -------------------------->SE MODIFICA
LA COMUNIDAD
snmp-server host 10.243.16.73 ciscafam -------------------------->SE MODIFICA
LA COMUNIDAD
snmp-server host 10.243.16.75 ciscafam -------------------------->SE MODIFICA
LA COMUNIDAD
snmp-server host 10.243.16.76 ciscafam -------------------------->SE MODIFICA
LA COMUNIDAD
snmp-server host 10.243.16.81 ciscafam -------------------------->SE MODIFICA
LA COMUNIDAD
!
access-list 97 permit 10.243.16.78
access-list 97 permit 10.243.16.73
access-list 97 permit 10.243.16.75
access-list 97 permit 10.243.16.76
access-list 97 permit 10.243.16.81
!
ip route 10.243.16.73 255.255.255.255 10.245.87.157 name GU
-------------------------->SE MODIFICA POR LA WAN DE GESTION DE MPLS
ip route 10.243.16.75 255.255.255.255 10.245.87.157 name GU
-------------------------->SE MODIFICA POR LA WAN DE GESTION DE MPLS
ip route 10.243.16.76 255.255.255.255 10.245.87.157 name GU
-------------------------->SE MODIFICA POR LA WAN DE GESTION DE MPLS
ip route 10.243.16.78 255.255.255.255 10.245.87.157 name GU
-------------------------->SE MODIFICA POR LA WAN DE GESTION DE MPLS
ip route 10.243.16.81 255.255.255.255 10.245.87.157 name GU
-------------------------->SE MODIFICA POR LA WAN DE GESTION DE MPLS
!
snmp-server enable traps syslog
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
==============================================================================
AP WIFI CISCO CAFAM
==============================================================================
CAFAM_PAS_K22DC2_PASTO#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
CAFAM_PAS_K22DC2_PAS(config)#inter Wlan-GigabitEthernet8
CAFAM_PAS_K22DC2_PAS(config-if)#inter wlan-ap0
The wlan-ap 0 interface is used for managing the embedded AP.
Please use the "service-module wlan-ap 0 session" command to console into the
embedded AP
CAFAM_PAS_K22DC2_PAS(config-if)#^Z
CAFAM_PAS_K22DC2_PASTO#service-module wlan-ap 0 session
IP address needs to be configured on interface wlan-ap0
CAFAM_PAS_K22DC2_PASTO#
CAFAM_PAS_K22DC2_PASTO#conf ter
Enter configuration commands, one per line. End with CNTL/Z.
CAFAM_PAS_K22DC2_PAS(config)#
CAFAM_PAS_K22DC2_PAS(config)#interface wlan-ap0
The wlan-ap 0 interface is used for managing the embedded AP.
Please use the "service-module wlan-ap 0 session" command to console into the
embedded AP
CAFAM_PAS_K22DC2_PAS(config-if)#ip add
CAFAM_PAS_K22DC2_PAS(config-if)#ip address 10.10.10.2 255.255.255.252
CAFAM_PAS_K22DC2_PAS(config-if)#^Z
CAFAM_PAS_K22DC2_PASTO#service-module wlan-ap 0 session
Trying 10.10.10.2, 2002 ... Open
ap>ena
===================================================================================
=====
CAFAM_MED_K66C49_I#
CAFAM_MED_K66C49_I#TELnet 10.241.245.18 2002 --------------->WAN DEL ROUTER
Trying 10.241.245.18, 2002 ... Open
===================================================================================
ap>ENA
ap>ENAble
Password: Cisco
ap#
interface FastEthernet0
no ip address
load-interval 30
duplex full
speed 100
!
interface FastEthernet0.100
description GESTION_MPLS
encapsulation dot1Q 100
ip address 10.245.87.158 255.255.255.252
!
interface FastEthernet0.101
description CONEXION_WAN
bandwidth 2048
encapsulation dot1Q 101
ip address 10.247.235.146 255.255.255.252
crypto map ETB
-------------------------------------------------------------->IMPORTANTE
PARA LEVANTAR LA VPN
service-policy output LIMIT ------------------------------->LIMITANTE DEL BW
!
2. CONFIGURAMOS LA IP PUBLICA Y LA GU
interface Loopback0
description IP_PUBLICA_NAT
ip address 190.27.170.97 255.255.255.248
!
interface Loopback20
description GRAFICACION GU
ip address 10.172.8.155 255.255.255.255
!
interface Vlan1
description LAN_CLIENTE
ip address 172.25.48.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
6. CONFIGURACION DE LA VPN
interface Loopback0
description NAT
ip address 190.27.168.105 255.255.255.248
!
interface Loopback1
description GESTION_AP
ip address 2.2.2.2 255.255.255.255
interface Vlan1
description LAN_CLIENTE
ip address 172.25.138.1 255.255.255.0
ip nat inside
ip virtual-reassembly in