! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname par3 ! boot-start-marker boot-end-marker ! enable secret 5 $1$8950$xiNCScgh5eElWEgZc6VLr1 ! no aaa new-model ! resource policy ! memory-size iomem 10 ! ! ip cef ! ! no ip domain lookup ip inspect name dmzinspect tcp ip inspect name dmzinspect udp ip inspect name icmpaudit icmp alert on audit-trail on timeout 5 ! ! voice-card 0 no dspfarm ! ! ! ! ! ! ! ! ! ! ! ! ! crypto pki trustpoint TP-self-signed-903229507 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-903229507 revocation-check none rsakeypair TP-self-signed-903229507 ! ! crypto pki certificate chain TP-self-signed-903229507 certificate self-signed 01 3082023B 308201A4 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274 69666963 6174652D 39303332 32393530 37301E17 0D303631 30323332 33343734 375A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F 532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3930 33323239 35303730 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100 BBE5455F 8D770429 6EC99C77 EB1E47D3 026A2CDD B1C0A28F 465525CD 1E8195AB 12368908 B61BA6AE 8DC543E6 DED8EDCB AE5F8CAA E4A371F0 B8F8BBEB 4618C705 DE6E4899 56162F92 7B842F39 E782AB9D 3A794477 8C542B64 761AFCC6 34A76459 DFB5F21B BE74BE00 84504F6F E98B419C B2F2CE84 B96E1F10 5C91C74F FAFFA4B1 02030100 01A36530 63300F06 03551D13 0101FF04 05300301 01FF3010 0603551D 11040930 07820570 6172332E 301F0603 551D2304 18301680 14F34E60 756D30A4 F1D0513D 02F0DFD5 8258D56D 45301D06 03551D0E 04160414 F34E6075 6D30A4F1 D0513D02 F0DFD582 58D56D45 300D0609 2A864886 F70D0101 04050003 8181000C 607CE44F 86F434C0 ED6780D4 FFA23F50 AEF79CFF 328AD7BA 26F9B178 9E12B7F9 0D19B426 67C7E23F AA3EB90C 7D863EC0 66D8E040 38FB1243 4C9106D0 D2797538 117DC092 E51262F1 B7B54D07 DBD81C97 823F404D D39552F5 97926DDA 8CE4F674 780DE48F 0990CB8A 2F1CB14F C2935EAA E7CF4272 273D1538 D0A07BBF 1910C5 quit username ccie privilege 15 secret 5 $1$aXmO$GLssseZUsTHbOkru3ncNO. ! ! ! ! ! ! interface Loopback103 ip address 10.10.3.1 255.255.255.0 ! interface GigabitEthernet0/0 no ip address duplex auto speed auto ! interface GigabitEthernet0/0.10 description $FW_INSIDE$ encapsulation dot1Q 10 ip address 172.16.1.13 255.255.255.0 ip access-group 104 in no snmp trap link-status ! interface GigabitEthernet0/0.102 description $FW_OUTSIDE$ encapsulation dot1Q 102 ip address 172.16.12.3 255.255.255.0 ip access-group 108 in ip verify unicast reverse-path ip inspect icmpaudit in no snmp trap link-status ! interface GigabitEthernet0/0.202 description $FW_INSIDE$ encapsulation dot1Q 202 ip address 172.16.22.3 255.255.255.0 ip access-group 105 in no snmp trap link-status ! interface GigabitEthernet0/0.302 description $FW_INSIDE$ encapsulation dot1Q 302 ip address 172.16.32.3 255.255.255.0 ip access-group 106 in no snmp trap link-status ! interface GigabitEthernet0/1 no ip address shutdown duplex auto speed auto ! interface Serial0/0/0 description $FW_DMZ$ ip address 192.168.37.3 255.255.255.0 ip access-group 107 in ip inspect dmzinspect out ! interface Serial0/0/1 no ip address shutdown clock rate 2000000 ! interface Serial0/1/0 no ip address shutdown clock rate 2000000 ! interface Serial0/1/1 no ip address shutdown clock rate 2000000 ! router eigrp 65002 network 10.10.0.0 0.0.255.255 network 172.16.1.0 0.0.0.255 network 172.16.12.0 0.0.0.255 network 172.16.22.0 0.0.0.255 network 172.16.32.0 0.0.0.255 network 192.168.37.0 no auto-summary ! ! ! ip http server ip http authentication local ip http secure-server ip http timeout-policy idle 600 life 86400 requests 10000 ! access-list 100 remark auto generated by SDM firewall configuration access-list 100 remark SDM_ACL Category=1 access-list 100 deny ip 172.16.12.0 0.0.0.255 any access-list 100 deny ip 172.16.32.0 0.0.0.255 any access-list 100 deny ip 172.16.22.0 0.0.0.255 any access-list 100 deny ip host 255.255.255.255 any access-list 100 deny ip 127.0.0.0 0.255.255.255 any access-list 100 permit ip any any access-list 101 remark auto generated by SDM firewall configuration access-list 101 remark SDM_ACL Category=1 access-list 101 deny ip 172.16.12.0 0.0.0.255 any access-list 101 deny ip 172.16.32.0 0.0.0.255 any access-list 101 deny ip 172.16.1.0 0.0.0.255 any access-list 101 deny ip host 255.255.255.255 any access-list 101 deny ip 127.0.0.0 0.255.255.255 any access-list 101 permit ip any any access-list 102 remark auto generated by SDM firewall configuration access-list 102 remark SDM_ACL Category=1 access-list 102 deny ip 172.16.12.0 0.0.0.255 any access-list 102 deny ip 172.16.22.0 0.0.0.255 any access-list 102 deny ip 172.16.1.0 0.0.0.255 any access-list 102 deny ip host 255.255.255.255 any access-list 102 deny ip 127.0.0.0 0.255.255.255 any access-list 102 permit ip any any access-list 103 remark auto generated by SDM firewall configuration access-list 103 remark SDM_ACL Category=1 access-list 103 deny ip 172.16.32.0 0.0.0.255 any access-list 103 deny ip 172.16.22.0 0.0.0.255 any access-list 103 deny ip 172.16.1.0 0.0.0.255 any access-list 103 permit icmp any host 172.16.12.3 echo-reply access-list 103 permit icmp any host 172.16.12.3 time-exceeded access-list 103 permit icmp any host 172.16.12.3 unreachable access-list 103 permit eigrp any any access-list 103 deny ip 10.0.0.0 0.255.255.255 any access-list 103 deny ip 172.16.0.0 0.15.255.255 any access-list 103 deny ip 192.168.0.0 0.0.255.255 any access-list 103 deny ip 127.0.0.0 0.255.255.255 any access-list 103 deny ip host 255.255.255.255 any access-list 103 deny ip host 0.0.0.0 any access-list 103 deny ip any any log access-list 104 remark auto generated by SDM firewall configuration access-list 104 remark SDM_ACL Category=1 access-list 104 deny ip 192.168.37.0 0.0.0.255 any access-list 104 deny ip 172.16.12.0 0.0.0.255 any access-list 104 deny ip 172.16.32.0 0.0.0.255 any access-list 104 deny ip 172.16.22.0 0.0.0.255 any access-list 104 deny ip host 255.255.255.255 any access-list 104 deny ip 127.0.0.0 0.255.255.255 any access-list 104 permit ip any any access-list 105 remark auto generated by SDM firewall configuration access-list 105 remark SDM_ACL Category=1 access-list 105 deny ip 192.168.37.0 0.0.0.255 any access-list 105 deny ip 172.16.12.0 0.0.0.255 any access-list 105 deny ip 172.16.32.0 0.0.0.255 any access-list 105 deny ip 172.16.1.0 0.0.0.255 any access-list 105 deny ip host 255.255.255.255 any access-list 105 deny ip 127.0.0.0 0.255.255.255 any access-list 105 permit ip any any access-list 106 remark auto generated by SDM firewall configuration access-list 106 remark SDM_ACL Category=1 access-list 106 deny ip 192.168.37.0 0.0.0.255 any access-list 106 deny ip 172.16.12.0 0.0.0.255 any access-list 106 deny ip 172.16.22.0 0.0.0.255 any access-list 106 deny ip 172.16.1.0 0.0.0.255 any access-list 106 deny ip host 255.255.255.255 any access-list 106 deny ip 127.0.0.0 0.255.255.255 any access-list 106 permit ip any any access-list 107 remark auto generated by SDM firewall configuration access-list 107 remark SDM_ACL Category=1 access-list 107 deny ip any any log access-list 108 remark auto generated by SDM firewall configuration access-list 108 remark SDM_ACL Category=1 access-list 108 deny ip 192.168.37.0 0.0.0.255 any access-list 108 deny ip 172.16.32.0 0.0.0.255 any access-list 108 deny ip 172.16.22.0 0.0.0.255 any access-list 108 deny ip 172.16.1.0 0.0.0.255 any access-list 108 permit icmp any host 172.16.12.3 echo-reply access-list 108 permit icmp any host 172.16.12.3 time-exceeded access-list 108 permit icmp any host 172.16.12.3 unreachable access-list 108 permit icmp any host 192.168.37.7 echo log access-list 108 permit eigrp any any access-list 108 deny ip 10.0.0.0 0.255.255.255 any access-list 108 deny ip 172.16.0.0 0.15.255.255 any access-list 108 deny ip 192.168.0.0 0.0.255.255 any access-list 108 deny ip 127.0.0.0 0.255.255.255 any access-list 108 deny ip host 255.255.255.255 any access-list 108 deny ip host 0.0.0.0 any access-list 108 deny ip any any log ! ! ! ! control-plane ! ! ! ! ! ! ! ! ! banner motd ^CThis is Pod A Router 3. Unauthorized access is not permitted. All usage is logged.^C ! line con 0 exec-timeout 0 0 password 7 0007100F01 logging synchronous login line aux 0 line vty 0 4 privilege level 15 password 7 0307580203 login local transport input telnet ssh ! scheduler allocate 20000 1000 ! end