Cisco IOS – Provisioning Router Script di configurazione

()

Cisco IOS – Provisioning Router Professionale

Obiettivi: VLAN, Inter-VLAN Routing, DHCP, NAT, ACL, SSH, VPN (IPsec), sicurezza


! === Impostazioni di base ===
hostname Router-Core
no ip domain-lookup
ip domain-name azienda.local
username admin privilege 15 secret Sup3rSicuro456
crypto key generate rsa modulus 2048

! === Interfacce e VLAN ===
interface GigabitEthernet0/0
description WAN
ip address dhcp
no shutdown

interface GigabitEthernet0/1
description TRUNK LAN
switchport mode trunk
no shutdown

interface Vlan10
ip address 192.168.10.1 255.255.255.0
interface Vlan20
ip address 192.168.20.1 255.255.255.0

! === DHCP Server ===
ip dhcp pool VLAN10
network 192.168.10.0 255.255.255.0
default-router 192.168.10.1
dns-server 8.8.8.8

ip dhcp pool VLAN20
network 192.168.20.0 255.255.255.0
default-router 192.168.20.1
dns-server 8.8.4.4

! === NAT ===
ip access-list standard NAT_LIST
permit 192.168.0.0 0.0.255.255
ip nat inside source list NAT_LIST interface GigabitEthernet0/0 overload

! === Sicurezza ===
line vty 0 4
transport input ssh
login local
banner motd ^CUnauthorized Access Prohibited^C

! === VPN IPsec ===
crypto isakmp policy 10
encryption aes
hash sha
authentication pre-share
group 2
crypto isakmp key StrongSecret123 address 198.51.100.1

crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac
crypto map VPN-MAP 10 ipsec-isakmp
set peer 198.51.100.1
set transform-set VPN-SET
match address 101

access-list 101 permit ip 192.168.10.0 0.0.0.255 192.168.30.0 0.0.0.255

interface GigabitEthernet0/0
crypto map VPN-MAP
[19:46, 04/05/2025] Luca Angeli: Ubiquiti EdgeRouter Script.Ubiquiti EdgeRouter (EdgeOS) – Provisioning Avanzato
Obiettivi: VLAN, NAT, Firewall, DHCP, SSH, IPsec VPN, hardening

=== Identità e accesso ===

set system host-name Router-Core
set system login user admin authentication plaintext-password ‘Sup3rSicuro456’
set service ssh port 2222

=== Interfacce VLAN ===

set interfaces ethernet eth1 vif 10 address 192.168.10.1/24
set interfaces ethernet eth1 vif 20 address 192.168.20.1/24

=== DHCP Server ===

set service dhcp-server shared-network-name VLAN10 subnet 192.168.10.0/24 default-router 192.168.10.1
set service dhcp-server shared-network-name VLAN10 subnet 192.168.10.0/24 range 0 start 192.168.10.100 end 192.168.10.200
set service dhcp-server shared-network-name VLAN20 subnet 192.168.20.0/24 default-router 192.168.20.1
set service dhcp-server shared-network-name VLAN20 subnet 192.168.20.0/24 range 0 start 192.168.20.100 end 192.168.20.200

=== NAT ===

set service nat rule 5000 type masquerade
set service nat rule 5000 outbound-interface eth0

=== Firewall Base ===

set firewall name LAN-LOCAL default-action drop
set firewall name LAN-LOCAL rule 10 action accept
set interfaces ethernet eth1 firewall in name LAN-LOCAL

=== IPsec VPN ===

set vpn ipsec esp-group VPN-ESP proposal 1 encryption aes128
set vpn ipsec esp-group VPN-ESP proposal 1 hash sha1
set vpn ipsec ike-group VPN-IKE proposal 1 dh-group 2
set vpn ipsec ike-group VPN-IKE proposal 1 encryption aes128
set vpn ipsec ike-group VPN-IKE proposal 1 hash sha1

set vpn ipsec site-to-site peer 198.51.100.1 authentication mode pre-shared-secret
set vpn ipsec site-to-site peer 198.51.100.1 authentication pre-shared-secret StrongSecret123
set vpn ipsec site-to-site peer 198.51.100.1 default-esp-group VPN-ESP
set vpn ipsec site-to-site peer 198.51.100.1 ike-group VPN-IKE
set vpn ipsec site-to-site peer 198.51.100.1 local-address 203.0.113.2
set vpn ipsec site-to-site peer 198.51.100.1 tunnel 1 local prefix 192.168.10.0/24
set vpn ipsec site-to-site peer 198.51.100.1 tunnel 1 remote prefix 192.168.30.0/24

commit
save


/ 5
Grazie per aver votato!

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

As you found this post useful...

Follow us on social media!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?