!

!
version 12.4
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime
service timestamps log datetime localtime
service password-encryption
no service dhcp
!
hostname border
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$jXfg$3OY1xeyi4OoLarvTw10AN1
!
aaa new-model
!
!
aaa authentication attempts login 2
aaa authentication fail-message C
The password error,Please try_again

aaa authentication password-prompt Password-Error,try-again!
aaa authentication username-prompt Password:
aaa authentication login manage_access local
!
!
aaa session-id common
memory-size iomem 5
clock timezone gmt 8
!
!
ip cef
no ip domain lookup
ip domain name xiaohe.com
!
!
no ip bootp server
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
!
!
!
username xiaohe privilege 15 secret 5 $1$jXfg$3OY1xeyi4OoLarvTw10AN1
archive
 log config
  hidekeys
!
!
!
!
!
track 1 rtr 1 reachability
!
track 2 rtr 2 reachability
!
class-map match-any down-2M
 match access-group name to-vlan10
 match access-group name to-vlan20
class-map match-any down-1M
 match access-group name to-vlan30
class-map match-any 1M
 match access-group name to-vlan30
class-map match-any 2M
 match access-group name to-vlan10
 match access-group name to-vlan20
!
!
policy-map traffic-control-down
 class down-2M
    police 2000000 2500000 conform-action transmit  exceed-action drop
 class down-1M
    police 1000000 1250000 conform-action transmit  exceed-action drop
policy-map traffic-control
 class 2M
    police 2000000 2500000 conform-action transmit  exceed-action drop
 class 1M
    police 1000000 1250000 conform-action transmit  exceed-action drop
!
!
!
!
!
interface Loopback0
 ip address 1.1.1.1 255.255.255.0
!
interface FastEthernet0/0
 ip address 192.168.0.1 255.255.255.0
 ip access-group DefenceVirus in
 ip nat inside
 ip virtual-reassembly
 ip ospf cost 100
 duplex auto
 speed auto
 priority-group 1
 service-policy input traffic-control
 service-policy output traffic-control-down
!
interface FastEthernet0/1
 ip address 192.168.1.1 255.255.255.0
 ip access-group DefenceVirus in
 ip nat inside
 ip virtual-reassembly
 ip ospf cost 200
 duplex auto
 speed auto
 priority-group 1
 service-policy input traffic-control
 service-policy output traffic-control-down
!
interface FastEthernet1/0
 ip address 222.xx.xx.4 255.255.255.240 secondary
 ip address 222.xx.xx.3 255.255.255.240
 ip access-group 110 in
 ip nat outside
 ip virtual-reassembly
 duplex auto
 speed auto
!
interface FastEthernet2/0
!
interface FastEthernet2/1
!
interface FastEthernet2/2
!
interface FastEthernet2/3
!
interface FastEthernet2/4
!
interface FastEthernet2/5
!
interface FastEthernet2/6
!
interface FastEthernet2/7
!
interface FastEthernet2/8
!
interface FastEthernet2/9
!
interface FastEthernet2/10
!
interface FastEthernet2/11
!
interface FastEthernet2/12
!
interface FastEthernet2/13
!
interface FastEthernet2/14
!
interface FastEthernet2/15
!
interface Vlan1
 no ip address
!
router ospf 1
 log-adjacency-changes
 redistribute connected subnets
 network 1.1.1.0 0.0.0.255 area 0
 network 192.168.0.0 0.0.0.255 area 0
 network 192.168.1.0 0.0.0.255 area 0
 network 222.xx.xx.0 0.0.0.255 area 0
!
no ip http server
no ip http secure-server
!
ip forward-protocol nd
ip route 172.16.1.0 255.255.255.0 192.168.0.2 track 1
ip route 172.16.10.0 255.255.255.0 192.168.0.2 track 1
ip route 172.16.20.0 255.255.255.0 192.168.0.2 track 1
ip route 172.16.30.0 255.255.255.0 192.168.0.2 track 1
ip route 172.16.40.0 255.255.255.0 192.168.0.2 track 1
ip route 172.16.1.0 255.255.255.0 192.168.1.2 track 2
ip route 172.16.10.0 255.255.255.0 192.168.1.2 track 2
ip route 172.16.20.0 255.255.255.0 192.168.1.2 track 2
ip route 172.16.30.0 255.255.255.0 192.168.1.2 track 2
ip route 172.16.40.0 255.255.255.0 192.168.1.2 track 2
ip route 0.0.0.0 0.0.0.0 FastEthernet1/0
!
ip nat pool web 222.xx.xx.4 222.xx.xx.4 netmask 255.255.255.240
ip nat pool internet 222.xx.xx.3 222.xx.xx.3 netmask 255.255.255.240
ip nat inside source list 1 pool internet overload
ip nat inside source list 2 pool internet overload
ip nat inside source list 3 pool internet overload
ip nat inside source list 4 pool internet overload
ip nat inside source list 5 pool internet overload
ip nat inside source list 6 pool internet overload
ip nat inside source list web pool web overload
ip nat inside source static tcp 172.16.40.200 8080 222.xx.xx.4 8080 extendable
ip nat inside source static tcp 172.16.40.200 2700 222.xx.xx.4 2700 extendable
ip nat inside source static tcp 172.16.40.201 21 222.xx.xx.4 21 extendable
ip nat inside source static tcp 172.16.40.201 80 222.xx.xx.4 80 extendable
ip nat inside source static tcp 172.16.40.201 3389 222.xx.xx.4 3389 extendable
!
!
ip access-list standard web
 permit 172.16.40.0 0.0.0.255
ip access-list extended DefenceVirus
 deny   tcp any any eq 27665
 deny   tcp any any eq 16660
 deny   tcp any any eq 65000
 deny   tcp any any eq 33270
 deny   tcp any any eq 39168
 deny   tcp any any eq 6711
 deny   tcp any any eq 6712
 deny   tcp any any eq 6776
 deny   tcp any any eq 6669
 deny   tcp any any eq 2222
 deny   tcp any any eq 7000
 deny   tcp any any eq 135
 deny   tcp any any eq 136
 deny   tcp any any eq 137
 deny   tcp any any eq 138
 deny   tcp any any eq 139
 deny   tcp any any eq 445
 deny   tcp any any eq 4444
 deny   tcp any any eq 5554
 deny   tcp any any eq 9996
 deny   tcp any any eq 3332
 deny   tcp any any eq 1068
 deny   tcp any any eq 455
 deny   udp any any eq 31335
 deny   udp any any eq 27444
 deny   udp any any eq 135
 deny   udp any any eq 136
 deny   udp any any eq 445
 deny   udp any any eq 4444
 permit ip any any
ip access-list extended to-vlan10
 permit ip any 172.16.10.0 0.0.0.255
ip access-list extended to-vlan20
 permit ip any 172.16.20.0 0.0.0.255
ip access-list extended to-vlan30
 permit ip any 172.16.30.0 0.0.0.255
ip sla 1
 icmp-echo 192.168.0.2 source-interface FastEthernet0/0
 timeout 999
 frequency 3
ip sla schedule 1 life forever start-time now
ip sla 2
 icmp-echo 192.168.1.2 source-interface FastEthernet0/1
 timeout 999
 frequency 3
ip sla schedule 2 life forever start-time now
access-list 1 permit 172.16.1.0 0.0.0.255
access-list 2 permit 172.16.10.0 0.0.0.255
access-list 3 permit 172.16.20.0 0.0.0.255
access-list 4 permit 172.16.30.0 0.0.0.255
access-list 5 permit 192.168.0.0 0.0.0.255
access-list 6 permit 192.168.1.0 0.0.0.255
access-list 110 deny   udp any any eq snmptrap
access-list 110 deny   udp any any eq snmp
access-list 110 permit ip any any
access-list 110 deny   tcp any any eq telnet
access-list 110 deny   tcp any any range exec cmd
access-list 110 deny   tcp any any eq sunrpc
access-list 110 deny   udp any any eq sunrpc
access-list 110 deny   tcp any any range 135 445
access-list 110 deny   tcp any any eq ftp
access-list 110 deny   icmp any any echo log
access-list 110 deny   icmp any any redirect log
access-list 110 deny   icmp any any mask-request log
access-list 110 permit icmp any any
access-list 110 permit icmp any any echo
access-list 110 deny   udp any any eq 33400
access-list 110 permit udp any any eq 33400
access-list 110 deny   ip 127.0.0.0 0.255.255.255 any log
access-list 110 deny   ip 192.168.0.0 0.0.255.255 any log
access-list 110 deny   ip 172.16.0.0 0.15.255.255 any log
access-list 110 deny   ip 10.0.0.0 0.255.255.255 any log
access-list 110 deny   ip 192.168.2.0 0.0.0.255 any
access-list 110 deny   ip 224.0.0.0 0.255.255.255 any
access-list 110 deny   ip 1.0.0.0 0.255.255.255 any
access-list 110 deny   ip 2.0.0.0 0.255.255.255 any
access-list 110 deny   ip 5.0.0.0 0.255.255.255 any
access-list 110 deny   ip 14.0.0.0 0.255.255.255 any
access-list 110 deny   ip 23.0.0.0 0.255.255.255 any
access-list 110 deny   ip 27.0.0.0 0.255.255.255 any
access-list 110 deny   ip 31.0.0.0 0.255.255.255 any
access-list 110 deny   ip 36.0.0.0 0.255.255.255 any
access-list 110 deny   ip 37.0.0.0 0.255.255.255 any
access-list 110 deny   ip 39.0.0.0 0.255.255.255 any
access-list 110 deny   ip 42.0.0.0 0.255.255.255 any
access-list 110 deny   ip 46.0.0.0 0.255.255.255 any
access-list 110 deny   ip 49.0.0.0 0.255.255.255 any
access-list 110 deny   ip 50.0.0.0 0.255.255.255 any
access-list 110 deny   ip 100.0.0.0 0.255.255.255 any
access-list 110 deny   ip 101.0.0.0 0.255.255.255 any
access-list 110 deny   ip 102.0.0.0 0.255.255.255 any
access-list 110 deny   ip 103.0.0.0 0.255.255.255 any
access-list 110 deny   ip 104.0.0.0 0.255.255.255 any
access-list 110 deny   ip 105.0.0.0 0.255.255.255 any
access-list 110 deny   ip 106.0.0.0 0.255.255.255 any
access-list 110 deny   ip 107.0.0.0 0.255.255.255 any
access-list 110 deny   ip 175.0.0.0 0.255.255.255 any
access-list 110 deny   ip 176.0.0.0 0.255.255.255 any
access-list 110 deny   ip 177.0.0.0 0.255.255.255 any
access-list 110 deny   ip 179.0.0.0 0.255.255.255 any
access-list 110 deny   ip 181.0.0.0 0.255.255.255 any
access-list 110 deny   ip 182.0.0.0 0.255.255.255 any
access-list 110 deny   ip 185.0.0.0 0.255.255.255 any
access-list 110 deny   ip 198.18.0.0 0.1.255.255 any
access-list 110 deny   ip 223.0.0.0 0.255.255.255 any
access-list 110 deny   ip 172.16.0.0 0.0.255.255 any
access-list 110 remark Other bogons deny ip 224.0.0.0 15.255.255.255 any
access-list 110 remark Other bogons deny ip 240.0.0.0 15.255.255.255 any
access-list 110 remark Other bogons deny ip 0.0.0.0 0.255.255.255 any
access-list 110 remark Other bogons deny ip 169.254.0.0 0.0.255.255 any
access-list 110 remark Other bogons deny ip 192.0.2.0 0.0.0.255 any
access-list 110 remark permit all other traffic permit ip any any
priority-list 1 protocol ip high tcp telnet
priority-list 1 protocol ip low tcp ftp
no cdp run
!
!
!
!
control-plane
!
!
!
!
!
!
!
!
banner motd C
This Router is for xiaohe and thank you again!

!
line con 0
 logging synchronous
 login authentication manage_access
line aux 0
line vty 0 4
 login authentication manage_access
 transport input telnet
!
ntp clock-period 17207853
ntp source FastEthernet1/0
ntp server 129.6.15.28
!
end