S397751#
*Mar 23 12:26:04.210: %SYS-5-CONFIG_I: Configured from console by americatel on
consolesh run
Building configuration...
Current configuration : 6485 bytes
!
! Last configuration change at 12:26:04 PERU Wed Mar 23 2022 by americatel
!
version 15.4
service tcp-keepalives-in
service timestamps debug datetime msec
service timestamps log datetime msec localtime
service password-encryption
!
hostname S397751
!
boot-start-marker
boot-end-marker
!
!
logging buffered 100000
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login CLEARPASS group tacacs+ local
aaa authorization console
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization configuration default group tacacs+
aaa authorization configuration CLEARPASS group tacacs+
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting network default start-stop group tacacs+
aaa accounting connection default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
!
!
!
!
!
aaa session-id common
clock timezone PERU -5 0
service-module wlan-ap 0 bootimage autonomous
!
crypto pki trustpoint TP-self-signed-836763939
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-836763939
revocation-check none
rsakeypair TP-self-signed-836763939
!
!
crypto pki certificate chain TP-self-signed-836763939
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 38333637 36333933 39301E17 0D313830 31323832 31323833
385A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3833 36373633
39333930 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
A1BFD215 0DEDD21E BB96424D 05175590 09493C70 73646D84 1715E13C 492DD662
937CEA77 E90C4144 070AF197 243AA04A 36FD8E55 45DA7F8C B1155765 BA41B570
AD6E8232 62FD5438 6043723D 77E37A09 D317A2FF CF2F065D B6D22E8D 6C1E858B
A05E1DA1 C383B78D E4CF4165 48916147 6A3C330C 0BDBFE97 3E32CA40 C947A663
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 16801446 9122602D 7E02FCA1 ECFD986E CFDFC5C3 FC5EA530 1D060355
1D0E0416 04144691 22602D7E 02FCA1EC FD986ECF DFC5C3FC 5EA5300D 06092A86
4886F70D 01010505 00038181 0023D704 46E4F9F9 6A74D47C 4165E83A 11BFA00C
00061482 5B3F0FE4 02DD9C6F F4141DF1 9C9B7075 599B3C82 DC5185F8 75842488
AA885FB3 E1F6250E F2591F1B E36DF66D 648AB465 5D783310 D623013B C8E04971
8603BBEA A933B687 BD52CE1B AAE445DE 8FF62DB2 FC7B9D07 D29CEC04 12919AB6
CCD8F28B ACCAD4C7 7367D62F 9B
quit
no ip source-route
!
!
!
!
!
!
!
!
!
ip dhcp excluded-address 10.10.10.1
!
ip dhcp pool ccp-pool
import all
network 10.10.10.0 255.255.255.128
default-router 10.10.10.1
lease 0 2
!
!
!
no ip bootp server
ip domain name americatelperu.red
ip name-server 200.31.108.106
ip name-server 200.31.108.107
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C881W-A-K9 sn FJC2205L056
!
!
username americatel privilege 15 password 7 130643185F0150382870
!
!
!
!
no cdp run
!
ip ssh version 2
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
no ip address
!
interface FastEthernet4
no ip address
ip accounting output-packets
load-interval 30
duplex auto
speed auto
!
interface FastEthernet4.903
description WAN
encapsulation dot1Q 903
ip address 10.28.75.86 255.255.255.252
ip nat outside
ip virtual-reassembly in
no cdp enable
!
interface Wlan-GigabitEthernet0
no ip address
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
!
interface Vlan1
description LAN
ip address 190.187.233.41 255.255.255.248 secondary
ip address 172.16.1.1 255.255.255.0
ip accounting output-packets
ip flow ingress
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1452
!
ip forward-protocol nd
no ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip flow-top-talkers
top 10
sort-by bytes
!
ip nat pool CLIENTE 190.187.233.41 190.187.233.41 netmask 255.255.255.248
ip nat inside source list 1 pool CLIENTE overload
ip route 0.0.0.0 0.0.0.0 10.28.75.85
ip tacacs source-interface Vlan1
!
!
snmp-server community Am3r1c4t3L.1577 RO
snmp-server location Independencia
tacacs-server host 190.187.252.88 key 7 051F520C754F5D283431464B5C5B
access-list 1 permit 172.16.1.0 0.0.0.255
access-list 23 permit 10.10.10.0 0.0.0.127
access-list 99 permit 200.31.103.32 0.0.0.31 log
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you
want to use.
-----------------------------------------------------------------------
^C
banner login ^C router_881W_Dimagesa_Independen^C
!
line con 0
session-timeout 5
password 7 0824425A0C1510041719
login authentication CLEARPASS
no modem enable
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
stopbits 1
line vty 0 4
session-timeout 5
access-class 99 in
privilege level 15
login authentication CLEARPASS
transport input ssh
line vty 5 15
access-class 23 in
privilege level 15
transport input telnet ssh
!
scheduler allocate 20000 1000
ntp server 198.72.72.10
!
!
!
end
S397751#
---------------------------------------
-----------------------------------------
S406409#sh run
Building configuration...
Current configuration : 5908 bytes
!
! Last configuration change at 11:24:24 PERU Fri Mar 25 2022 by americatel
!
version 15.4
service tcp-keepalives-in
service timestamps debug datetime msec
service timestamps log datetime msec localtime
service password-encryption
!
hostname S406409
!
boot-start-marker
boot-end-marker
!
!
logging buffered 100000
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login CLEARPASS group tacacs+ local
aaa authorization console
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization configuration default group tacacs+
aaa authorization configuration CLEARPASS group tacacs+
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting network default start-stop group tacacs+
aaa accounting connection default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
!
!
!
!
!
aaa session-id common
clock timezone PERU -5 0
service-module wlan-ap 0 bootimage autonomous
!
crypto pki trustpoint TP-self-signed-836763939
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-836763939
revocation-check none
rsakeypair TP-self-signed-836763939
!
!
crypto pki certificate chain TP-self-signed-836763939
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 38333637 36333933 39301E17 0D313830 31323832 31323833
385A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3833 36373633
39333930 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
A1BFD215 0DEDD21E BB96424D 05175590 09493C70 73646D84 1715E13C 492DD662
937CEA77 E90C4144 070AF197 243AA04A 36FD8E55 45DA7F8C B1155765 BA41B570
AD6E8232 62FD5438 6043723D 77E37A09 D317A2FF CF2F065D B6D22E8D 6C1E858B
A05E1DA1 C383B78D E4CF4165 48916147 6A3C330C 0BDBFE97 3E32CA40 C947A663
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 16801446 9122602D 7E02FCA1 ECFD986E CFDFC5C3 FC5EA530 1D060355
1D0E0416 04144691 22602D7E 02FCA1EC FD986ECF DFC5C3FC 5EA5300D 06092A86
4886F70D 01010505 00038181 0023D704 46E4F9F9 6A74D47C 4165E83A 11BFA00C
00061482 5B3F0FE4 02DD9C6F F4141DF1 9C9B7075 599B3C82 DC5185F8 75842488
AA885FB3 E1F6250E F2591F1B E36DF66D 648AB465 5D783310 D623013B C8E04971
8603BBEA A933B687 BD52CE1B AAE445DE 8FF62DB2 FC7B9D07 D29CEC04 12919AB6
CCD8F28B ACCAD4C7 7367D62F 9B
quit
no ip source-route
!
!
!
!
!
!
!
!
!
!
!
!
no ip bootp server
ip domain name americatelperu.red
ip name-server 200.31.108.106
ip name-server 200.31.108.107
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
cts logging verbose
license udi pid C881W-A-K9 sn FJC2205L056
!
!
username americatel privilege 15 password 7 130643185F0150382870
!
!
!
!
no cdp run
!
ip ssh version 2
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
no ip address
!
interface FastEthernet4
description WAN
ip address 10.28.80.182 255.255.255.252
ip accounting output-packets
load-interval 30
duplex auto
speed auto
!
interface Wlan-GigabitEthernet0
no ip address
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
!
interface Vlan1
description LAN
ip address 190.187.233.41 255.255.255.248
ip accounting output-packets
ip flow ingress
ip virtual-reassembly in
ip tcp adjust-mss 1452
!
ip forward-protocol nd
no ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip flow-top-talkers
top 10
sort-by bytes
!
ip route 0.0.0.0 0.0.0.0 10.28.80.181
!
!
snmp-server community Am3r1c4t3L.1577 RO
snmp-server location Independencia
tacacs-server host 190.187.252.88 key 7 051F520C754F5D283431464B5C5B
access-list 99 permit 200.31.103.32 0.0.0.31 log
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.
It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.
username <myuser> privilege 15 secret 0 <mypassword>
Replace <myuser> and <mypassword> with the username and password you
want to use.
-----------------------------------------------------------------------
^C
banner login ^C router_881W_Dimagesa_Independen^C
!
line con 0
session-timeout 5
password 7 0824425A0C1510041719
login authentication CLEARPASS
no modem enable
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
stopbits 1
line vty 0 4
session-timeout 5
access-class 99 in
privilege level 15
login authentication CLEARPASS
transport input ssh
line vty 5 15
access-class 23 in
privilege level 15
transport input telnet ssh
!
scheduler allocate 20000 1000
ntp server 198.72.72.10
!
!
!
end
S406409#sh ip int brief
Interface IP-Address OK? Method Status
Protocol
FastEthernet0 unassigned YES unset up up
FastEthernet1 unassigned YES unset up down
FastEthernet2 unassigned YES unset up down
FastEthernet3 unassigned YES unset up down
FastEthernet4 10.28.80.182 YES manual up up
FastEthernet4.903 unassigned YES manual deleted down
NVI0 unassigned NO unset up up
Vlan1 190.187.233.41 YES manual up up
Wlan-GigabitEthernet0 unassigned YES unset up up
wlan-ap0 190.187.233.41 YES TFTP up up
S406409#
S406409#
S406409#ping 10.28.80.181 repeat 1000 size 1500
Type escape sequence to abort.
Sending 1000, 1500-byte ICMP Echos to 10.28.80.181, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!
Success rate is 100 percent (1000/1000), round-trip min/avg/max = 1/1/16 ms
S406409#
S406409#
S406409#
S406409#ping 8.8.8.8 source 190.187.233.41
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:
Packet sent with a source address of 190.187.233.41
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/32 ms
S406409#