service timestamps debug datetime msec
service timestamps log datetime msec
vpdn enable
no vpdn logging
vpdn-group pppoe
request-dialin
protocol pppoe
!--- These commands are needed only on Cisco IOS Software earlier than than 12.2(13)T.
ip subnet-zero
!--- For DHCP:
ip dhcp excluded-address
ip dhcp pool
network
default-router
dns-server
interface ethernet0
no shut
ip address
ip tcp adjust-mss 1452
!--- If the ip tcp adjust-mss 1452 command is not supported, try this
!--- configuration statement: ip adjust-mss 1452. If this command is not
!--- supported in your current Cisco DSL Router software release, upgrade to the
!--- latest Cisco DSL Router software or follow the procedure in the
!--- "Possible Required Configuration Steps on the PC" section of this document.
!--- For NAT:
ip nat inside
no ip directed-broadcast
interface atm0
no ip address
bundle-enable
dsl operating-mode auto
interface atm0.1 point-to-point
no ip address
no ip directed-broadcast
no atm ilmi-keepalive
pvc
pppoe-client dial-pool-number 1
!--- Common PVC values supported by ISPs are 0/35 or 8/35.
!--- Confirm your PVC values with your ISP.
interface dialer1
ip address
mtu 1492
!--- For NAT:
ip nat outside
encapsulation ppp
dialer pool 1
ppp chap hostname
ppp chap password
ppp pap sent-username
!--- For NAT:
ip nat inside source list 1 interface dialer1 overload
!--- If you have a pool (a range) of public IP addresses provided
!--- by your ISP, you can use a NAT Pool. Replace
!--- ip nat inside source list 1 interface dialer1 overload
!--- with these two configuration statements:
!--- ip nat inside source list 1 pool
!--- ip nat pool
!--- netmask
!--- If Internet users require access to an internal server, you can
!--- add this static NAT configuration statement:
!--- ip nat inside source static tcp
!---
!--- Note: TCP port 80 (HTTP/web) and TCP port 25 (SMTP/mail) are used
!--- for this example. You can open other TCP or UDP ports, if needed.
ip classless
ip route 0.0.0.0 0.0.0.0 interface dialer1
!--- For NAT:
access-list 1 permit
!--- In this configuration, access-list 1 defines a standard access list
!--- that permits the addresses that NAT translates. For example, if
!--- your private IP network is 10.10.10.0, configure
!--- access-list 1 permit 10.10.10.0 0.0.0.255 in order to allow NAT to translate
!--- packets with source addresses between 10.10.10.0 and 10.10.10.255.