achtungbaby
Technical User
All,
I decided to replace my linksys router with a cisco 2800 router. The router is currently configure as my dhcp server and internal dns. I am able to connect to the internet with my laptop fine. My problem is that my download is a lot slower on the 2800 router than the linksys. I also notice that it takes a long time to connect to a site.
Below is my config. Please tell me what I am doing wrong. thanks.
Current configuration : 8718 bytes
!
version 12.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
service udp-small-servers
service tcp-small-servers
service sequence-numbers
!
!
boot-start-marker
boot system flash:c2800nm-adventerprisek9_ivs-mz.124-25b.bin
boot system flash:c2800nm-adventerprisek9_ivs-mz.123-14.T7.bin
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 debugging
logging console critical
enable secret 5 $1$EAFP$gy7MTWTzkEyxcxBSQ8px./
!
aaa new-model
!
!
aaa authentication login local_authen local
aaa authorization exec local_author local
!
aaa session-id common
ip gratuitous-arps
!
!
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.10.1 192.168.10.15
!
ip dhcp pool Home_client
import all
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 24.197.160.17 24.197.160.18 192.168.10.1
!
!
ip dhcp update dns both
ip name-server 24.197.160.17
ip name-server 24.197.160.18
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW dns
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW https
ip inspect name SDM_LOW icmp
ip inspect name SDM_LOW imap
ip inspect name SDM_LOW pop3
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW rtsp
ip inspect name SDM_LOW esmtp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW vdolive
ip inspect name SDM_HIGH dns
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
ip ips sdf location flash://128MB.sdf autosave
ip ips notify SDEE
ip ips name sdm_ips_rule
!
!
voice-card 0
no dspfarm
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-602688795
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-602688795
revocation-check none
rsakeypair TP-self-signed-602688795
!
!
crypto pki certificate chain TP-self-signed-602688795
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 36303236 38383739 35301E17 0D303930 38303332 30333531
325A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3630 32363838
37393530 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
C3C73FDE 6C06C5D1 39D9EBE0 F051AF60 C3AAD783 7ABC2D79 ADE26E6E 88F5746C
5D5A0380 3DEBE8DC 78604069 76F98F93 A0C2D40B A0FB64CA F09BE4B2 2A957495
B5D8D73C 48934BDB 593588DD B5730718 E794274C F01BFE84 C687E223 47193F67
536D6B8A 732CA1C0 C78F0F51 044A0AC3 8602ABE4 02A197A4 7326FE38 8D4E1A1B
02030100 01A36930 67300F06 03551D13 0101FF04 05300301 01FF3014 0603551D
11040D30 0B820945 6E666961 6E63652E 301F0603 551D2304 18301680 14B35FBA
E7283F4E D2C3480E E79F94BD FABC5CBE D0301D06 03551D0E 04160414 B35FBAE7
283F4ED2 C3480EE7 9F94BDFA BC5CBED0 300D0609 2A864886 F70D0101 04050003
8181000F 493F448B 9932D1B4 CD230769 CFB08264 26A27BAC 35CFE23B AEDE019F
52801F5E D97F1779 5F5D4F61 C5F8F71B FEE91464 8756D912 D2CF2EB2 3098D3F3
1D23E4C3 340B3EB6 E6D98464 73C7D1E1 47616228 CA0E9FAA BC2C0704 8EBC9AD4
B6D65B2D 9E2A67E3 8DC008CD D9B2CE00 29772A9E 84D3F208 CA4354D3 588F8DB3 3B6AF7
quit
!
ip finger
ip tcp synwait-time 10
!
!
!
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1
connect auto
group xxxxx key xxxxxx
mode client
peer 192.168.10.1
username xxxxx password xxxxxx
xauth userid mode local
!
!
!
!
interface GigabitEthernet0/0
description $FW_OUTSIDE$
ip address dhcp
ip access-group 104 in
ip mask-reply
ip directed-broadcast
ip nat outside
ip inspect SDM_LOW out
ip ips sdm_ips_rule in
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1
!
interface GigabitEthernet0/1
description $FW_INSIDE$
ip address 192.168.10.1 255.255.255.224
ip access-group 100 in
ip mask-reply
ip directed-broadcast
ip nat inside
ip ips sdm_ips_rule in
ip virtual-reassembly
ip route-cache flow
duplex full
speed 1000
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1 inside
!
ip default-gateway 97.81.116.1
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0
!
!
ip http server
ip http access-class 1
ip http secure-server
ip nat inside source list 101 interface GigabitEthernet0/0 overload
ip identd
!
logging trap debugging
logging 192.168.10.13
access-list 1 remark HTTP Access-class list
access-list 1 remark SDM_ACL Category=1
access-list 1 permit 192.168.10.0 0.0.0.31
access-list 1 deny any
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark SDM_ACL Category=1
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 permit ip 192.168.10.0 0.0.0.255 any
access-list 101 permit ip 10.64.60.0 0.0.0.255 any
access-list 102 remark auto generated by SDM firewall configuration
access-list 102 remark SDM_ACL Category=1
access-list 102 permit udp host 24.197.160.18 eq domain any
access-list 102 permit udp host 24.197.160.17 eq domain any
access-list 102 deny ip 192.168.10.0 0.0.0.31 any
access-list 102 permit udp any eq bootps any eq bootpc
access-list 102 permit icmp any any echo-reply
access-list 102 permit icmp any any time-exceeded
access-list 102 permit icmp any any unreachable
access-list 102 deny ip 10.0.0.0 0.255.255.255 any
access-list 102 deny ip 172.16.0.0 0.15.255.255 any
access-list 102 deny ip 192.168.0.0 0.0.255.255 any
access-list 102 deny ip 127.0.0.0 0.255.255.255 any
access-list 102 deny ip host 255.255.255.255 any
access-list 102 deny ip any any log
access-list 103 remark VTY Access-class list
access-list 103 remark SDM_ACL Category=1
access-list 103 permit ip 192.168.10.0 0.0.0.31 any
access-list 103 deny ip any any
access-list 104 remark auto generated by SDM firewall configuration
access-list 104 remark SDM_ACL Category=1
access-list 104 remark Auto generated by SDM for EzVPN (udp-10000) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq 10000
access-list 104 remark Auto generated by SDM for EzVPN (non500-isakmp) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq non500-isakmp
access-list 104 remark Auto generated by SDM for EzVPN (isakmp) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq isakmp
access-list 104 remark Auto generated by SDM for EzVPN (ahp) SDM_EZVPN_CLIENT_1
access-list 104 permit esp host 192.168.10.1 any
access-list 104 remark Auto generated by SDM for EzVPN (esp) SDM_EZVPN_CLIENT_1
access-list 104 permit ahp host 192.168.10.1 any
access-list 104 permit udp host 24.197.160.18 eq domain any
access-list 104 permit udp host 24.197.160.17 eq domain any
access-list 104 deny ip 192.168.10.0 0.0.0.31 any
access-list 104 permit udp any eq bootps any eq bootpc
access-list 104 permit icmp any any echo-reply
access-list 104 permit icmp any any time-exceeded
access-list 104 permit icmp any any unreachable
access-list 104 deny ip 10.0.0.0 0.255.255.255 any
access-list 104 deny ip 172.16.0.0 0.15.255.255 any
access-list 104 deny ip 192.168.0.0 0.0.255.255 any
access-list 104 deny ip 127.0.0.0 0.255.255.255 any
access-list 104 deny ip host 255.255.255.255 any
access-list 104 deny ip any any log
no cdp run
!
!
!
control-plane
!
!
!
!
mgcp behavior g729-variants static-pt
!
!
!
!
!
!
gatekeeper
shutdown
!
!
telephony-service
max-ephones 3
max-dn 16
ip source-address 192.168.10.1 port 2000
create cnf-files version-stamp Jan 01 2002 00:00:00
max-conferences 8 gain -6
moh music-on-hold.au
!
line con 0
login authentication local_authen
transport output telnet
line aux 0
login authentication local_authen
transport output telnet
line vty 0 4
access-class 103 in
password 7 xxxxxxxx
transport input telnet ssh
transport output none
line vty 5 15
access-class 103 in
password 7 xxxxxxxx
transport input telnet ssh
transport output none
!
scheduler allocate 20000 1000
!
end
I decided to replace my linksys router with a cisco 2800 router. The router is currently configure as my dhcp server and internal dns. I am able to connect to the internet with my laptop fine. My problem is that my download is a lot slower on the 2800 router than the linksys. I also notice that it takes a long time to connect to a site.
Below is my config. Please tell me what I am doing wrong. thanks.
Current configuration : 8718 bytes
!
version 12.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
service udp-small-servers
service tcp-small-servers
service sequence-numbers
!
!
boot-start-marker
boot system flash:c2800nm-adventerprisek9_ivs-mz.124-25b.bin
boot system flash:c2800nm-adventerprisek9_ivs-mz.123-14.T7.bin
boot-end-marker
!
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 debugging
logging console critical
enable secret 5 $1$EAFP$gy7MTWTzkEyxcxBSQ8px./
!
aaa new-model
!
!
aaa authentication login local_authen local
aaa authorization exec local_author local
!
aaa session-id common
ip gratuitous-arps
!
!
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.10.1 192.168.10.15
!
ip dhcp pool Home_client
import all
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 24.197.160.17 24.197.160.18 192.168.10.1
!
!
ip dhcp update dns both
ip name-server 24.197.160.17
ip name-server 24.197.160.18
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW dns
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW https
ip inspect name SDM_LOW icmp
ip inspect name SDM_LOW imap
ip inspect name SDM_LOW pop3
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW rtsp
ip inspect name SDM_LOW esmtp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW vdolive
ip inspect name SDM_HIGH dns
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
ip ips sdf location flash://128MB.sdf autosave
ip ips notify SDEE
ip ips name sdm_ips_rule
!
!
voice-card 0
no dspfarm
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-602688795
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-602688795
revocation-check none
rsakeypair TP-self-signed-602688795
!
!
crypto pki certificate chain TP-self-signed-602688795
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 36303236 38383739 35301E17 0D303930 38303332 30333531
325A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3630 32363838
37393530 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
C3C73FDE 6C06C5D1 39D9EBE0 F051AF60 C3AAD783 7ABC2D79 ADE26E6E 88F5746C
5D5A0380 3DEBE8DC 78604069 76F98F93 A0C2D40B A0FB64CA F09BE4B2 2A957495
B5D8D73C 48934BDB 593588DD B5730718 E794274C F01BFE84 C687E223 47193F67
536D6B8A 732CA1C0 C78F0F51 044A0AC3 8602ABE4 02A197A4 7326FE38 8D4E1A1B
02030100 01A36930 67300F06 03551D13 0101FF04 05300301 01FF3014 0603551D
11040D30 0B820945 6E666961 6E63652E 301F0603 551D2304 18301680 14B35FBA
E7283F4E D2C3480E E79F94BD FABC5CBE D0301D06 03551D0E 04160414 B35FBAE7
283F4ED2 C3480EE7 9F94BDFA BC5CBED0 300D0609 2A864886 F70D0101 04050003
8181000F 493F448B 9932D1B4 CD230769 CFB08264 26A27BAC 35CFE23B AEDE019F
52801F5E D97F1779 5F5D4F61 C5F8F71B FEE91464 8756D912 D2CF2EB2 3098D3F3
1D23E4C3 340B3EB6 E6D98464 73C7D1E1 47616228 CA0E9FAA BC2C0704 8EBC9AD4
B6D65B2D 9E2A67E3 8DC008CD D9B2CE00 29772A9E 84D3F208 CA4354D3 588F8DB3 3B6AF7
quit
!
ip finger
ip tcp synwait-time 10
!
!
!
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1
connect auto
group xxxxx key xxxxxx
mode client
peer 192.168.10.1
username xxxxx password xxxxxx
xauth userid mode local
!
!
!
!
interface GigabitEthernet0/0
description $FW_OUTSIDE$
ip address dhcp
ip access-group 104 in
ip mask-reply
ip directed-broadcast
ip nat outside
ip inspect SDM_LOW out
ip ips sdm_ips_rule in
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1
!
interface GigabitEthernet0/1
description $FW_INSIDE$
ip address 192.168.10.1 255.255.255.224
ip access-group 100 in
ip mask-reply
ip directed-broadcast
ip nat inside
ip ips sdm_ips_rule in
ip virtual-reassembly
ip route-cache flow
duplex full
speed 1000
crypto ipsec client ezvpn SDM_EZVPN_CLIENT_1 inside
!
ip default-gateway 97.81.116.1
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0
!
!
ip http server
ip http access-class 1
ip http secure-server
ip nat inside source list 101 interface GigabitEthernet0/0 overload
ip identd
!
logging trap debugging
logging 192.168.10.13
access-list 1 remark HTTP Access-class list
access-list 1 remark SDM_ACL Category=1
access-list 1 permit 192.168.10.0 0.0.0.31
access-list 1 deny any
access-list 100 remark auto generated by SDM firewall configuration
access-list 100 remark SDM_ACL Category=1
access-list 100 deny ip host 255.255.255.255 any
access-list 100 deny ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip any any
access-list 101 permit ip 192.168.10.0 0.0.0.255 any
access-list 101 permit ip 10.64.60.0 0.0.0.255 any
access-list 102 remark auto generated by SDM firewall configuration
access-list 102 remark SDM_ACL Category=1
access-list 102 permit udp host 24.197.160.18 eq domain any
access-list 102 permit udp host 24.197.160.17 eq domain any
access-list 102 deny ip 192.168.10.0 0.0.0.31 any
access-list 102 permit udp any eq bootps any eq bootpc
access-list 102 permit icmp any any echo-reply
access-list 102 permit icmp any any time-exceeded
access-list 102 permit icmp any any unreachable
access-list 102 deny ip 10.0.0.0 0.255.255.255 any
access-list 102 deny ip 172.16.0.0 0.15.255.255 any
access-list 102 deny ip 192.168.0.0 0.0.255.255 any
access-list 102 deny ip 127.0.0.0 0.255.255.255 any
access-list 102 deny ip host 255.255.255.255 any
access-list 102 deny ip any any log
access-list 103 remark VTY Access-class list
access-list 103 remark SDM_ACL Category=1
access-list 103 permit ip 192.168.10.0 0.0.0.31 any
access-list 103 deny ip any any
access-list 104 remark auto generated by SDM firewall configuration
access-list 104 remark SDM_ACL Category=1
access-list 104 remark Auto generated by SDM for EzVPN (udp-10000) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq 10000
access-list 104 remark Auto generated by SDM for EzVPN (non500-isakmp) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq non500-isakmp
access-list 104 remark Auto generated by SDM for EzVPN (isakmp) SDM_EZVPN_CLIENT_1
access-list 104 permit udp host 192.168.10.1 any eq isakmp
access-list 104 remark Auto generated by SDM for EzVPN (ahp) SDM_EZVPN_CLIENT_1
access-list 104 permit esp host 192.168.10.1 any
access-list 104 remark Auto generated by SDM for EzVPN (esp) SDM_EZVPN_CLIENT_1
access-list 104 permit ahp host 192.168.10.1 any
access-list 104 permit udp host 24.197.160.18 eq domain any
access-list 104 permit udp host 24.197.160.17 eq domain any
access-list 104 deny ip 192.168.10.0 0.0.0.31 any
access-list 104 permit udp any eq bootps any eq bootpc
access-list 104 permit icmp any any echo-reply
access-list 104 permit icmp any any time-exceeded
access-list 104 permit icmp any any unreachable
access-list 104 deny ip 10.0.0.0 0.255.255.255 any
access-list 104 deny ip 172.16.0.0 0.15.255.255 any
access-list 104 deny ip 192.168.0.0 0.0.255.255 any
access-list 104 deny ip 127.0.0.0 0.255.255.255 any
access-list 104 deny ip host 255.255.255.255 any
access-list 104 deny ip any any log
no cdp run
!
!
!
control-plane
!
!
!
!
mgcp behavior g729-variants static-pt
!
!
!
!
!
!
gatekeeper
shutdown
!
!
telephony-service
max-ephones 3
max-dn 16
ip source-address 192.168.10.1 port 2000
create cnf-files version-stamp Jan 01 2002 00:00:00
max-conferences 8 gain -6
moh music-on-hold.au
!
line con 0
login authentication local_authen
transport output telnet
line aux 0
login authentication local_authen
transport output telnet
line vty 0 4
access-class 103 in
password 7 xxxxxxxx
transport input telnet ssh
transport output none
line vty 5 15
access-class 103 in
password 7 xxxxxxxx
transport input telnet ssh
transport output none
!
scheduler allocate 20000 1000
!
end