Уффф....
Все, решил проблему.
Решилась она следующим образом:
1.Создал 2 access-list
access-list 100 permit ip 192.168.0.0 0.0.0.7 10.0.0.0 0.255.255.255
access-list 101 permit ip 192.168.0.0 0.0.0.7 any2.Применил их следующим образом
ip nat inside source list 100 interface FastEthernet0 overload
ip nat inside source list 101 interface Dialer0 overload
После данных манипуляций, инет пошел на компы, а так же заработали локальные ресурсы прова. Огромнейшее спасибо ВСЕМ тем, кто помогал мне в решении данной проблемы. Нижу привожу свой листинг. Тему можно закрывать. До свидания. И еще раз благодарю за участие.
yourname#sh run
Building configuration...
Current configuration : 6342 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service internal
!
hostname yourname
!
boot-start-marker
boot-end-marker
!
logging buffered 51200 warnings
!
no aaa new-model
!
resource policy
!
clock timezone PCTime 3
clock summer-time PCTime date Mar 30 2003 2:00 Oct 26 2003 3:00
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
no ip source-route
no ip gratuitous-arps
!
!
ip cef
no ip dhcp use vrf connected
ip dhcp excluded-address 192.168.0.1
!
ip dhcp pool sdm-pool
import all
network 192.168.0.0 255.255.255.248
default-router 192.168.0.1
dns-server 10.0.0.120 10.0.0.185
lease 0 2
!
!
ip domain name yourdomain.com
ip name-server 10.0.0.120
ip name-server 10.0.0.185
ip multicast-routing
vpdn enable
!
vpdn-group 1
request-dialin
protocol pptp
rotary-group 0
initiate-to ip 10.0.0.21
initiate-to ip 10.0.0.23
initiate-to ip 10.0.0.24
initiate-to ip 10.0.0.25
initiate-to ip 10.0.0.26
initiate-to ip 10.0.0.27
initiate-to ip 10.0.0.28
initiate-to ip 10.0.0.29
initiate-to ip 10.0.0.30
initiate-to ip 10.0.0.31
initiate-to ip 10.0.0.32
initiate-to ip 10.0.0.33
initiate-to ip 10.0.0.34
authen-before-forward
!
!
!
crypto pki trustpoint TP-self-signed-2588796006
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2588796006
revocation-check none
rsakeypair TP-self-signed-2588796006
!
!
crypto pki certificate chain TP-self-signed-2588796006
certificate self-signed 01
3082024F 308201B8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32353838 37393630 3036301E 170D3037 30393137 31363235
33385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 35383837
39363030 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B959 2A2E6CD7 6D81C285 D97004E5 D4348738 A5684D69 3423FED8 C22020B3
95516876 E7F40A89 BE29C198 4AA21E0B E0EDDD66 27EA0033 7ECFC1ED 1C369803
802AF3DA 53688FF0 BF8EDE6F 717F7048 8D863299 4182C232 E4C406F9 F61593A1
2FA4164B FD39B3C1 B3EC9818 A0E37307 CDB820C6 5456C6DA BDB643B1 27068F0B
3E610203 010001A3 77307530 0F060355 1D130101 FF040530 030101FF 30220603
551D1104 1B301982 17796F75 726E616D 652E796F 7572646F 6D61696E 2E636F6D
301F0603 551D2304 18301680 14457D20 6635F352 3718E960 990B584B E51CB839
E4301D06 03551D0E 04160414 457D2066 35F35237 18E96099 0B584BE5 1CB839E4
300D0609 2A864886 F70D0101 04050003 81810099 E2AC00BE E7B2DD84 DC26D258
327D6DBC A5E28EBC 7282D64B C6AD3283 92EE1ABB 0F9D3AF3 84B9D472 898EB71D
88522DFB E67D39B5 E5E751D9 7349465D 075F845C 42E99CC1 844D9346 F1E3F5BB
992BC6A9 E1FFF422 33ED66A5 5F93896D 4D1956C0 3681C55D A4AB6CD4 EE3C0E6F
F4D136E0 140DADD4 821FC48A F2A36586 92BD8C
quit
username cisco privilege 15 secret 5 $1$5EHM$5BNOLSkxNzUD5GyclLika/
username XXXXX privilege 15 password 0 XXXXX
!
!
controller DSL 0
line-term cpe
!
!
!
!
!
interface FastEthernet0
ip address dhcp
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
no cdp enable
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
!
interface FastEthernet5
!
interface FastEthernet6
!
interface FastEthernet7
!
interface FastEthernet8
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-FE 1$
ip address 192.168.0.1 255.255.255.248
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1452
!
interface Dialer0
mtu 1450
ip address negotiated
no ip proxy-arp
ip pim dense-mode
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer in-band
dialer idle-timeout 0
dialer string 123
dialer vpdn
dialer-group 1
no peer neighbor-route
no cdp enable
ppp pfc local request
ppp pfc remote apply
ppp encrypt mppe auto
ppp chap hostname XXXXX
ppp chap password 0 XXXXX
!
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer0
ip route 10.0.0.21 255.255.255.255 10.50.26.1
ip route 10.0.0.23 255.255.255.255 10.50.26.1
ip route 10.0.0.24 255.255.255.255 10.50.26.1
ip route 10.0.0.25 255.255.255.255 10.50.26.1
ip route 10.0.0.26 255.255.255.255 10.50.26.1
ip route 10.0.0.27 255.255.255.255 10.50.26.1
ip route 10.0.0.28 255.255.255.255 10.50.26.1
ip route 10.0.0.29 255.255.255.255 10.50.26.1
ip route 10.0.0.30 255.255.255.255 10.50.26.1
ip route 10.0.0.31 255.255.255.255 10.50.26.1
ip route 10.0.0.32 255.255.255.255 10.50.26.1
ip route 10.0.0.33 255.255.255.255 10.50.26.1
ip route 10.0.0.34 255.255.255.255 10.50.26.1
ip route 10.0.0.0 255.0.0.0 dhcp
!
ip dns server
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source list 100 interface FastEthernet0 overload
ip nat inside source list 101 interface Dialer0 overload
!
access-list 23 permit 192.168.0.0 0.0.0.7
access-list 100 permit ip 192.168.0.0 0.0.0.7 10.0.0.0 0.255.255.255
access-list 101 permit ip 192.168.0.0 0.0.0.7 any
dialer-list 1 protocol ip permit
no cdp run
!
!
!
!
control-plane
!
banner login ^C
-----------------------------------------------------------------------
Cisco Router and Security Device Manager (SDM) is installed on this device.
This feature requires the one-time use of the username "cisco"
with the password "cisco". The default username and password have a privilege level of 15.
Please change these publicly known initial credentials using SDM or the IOS CLI.
Here are the Cisco IOS commands.
username <myuser> privilege 15 secret 0 <mypassword>
no username cisco
Replace <myuser> and <mypassword> with the username and password you want to use.
For more information about SDM please follow the instructions in the QUICK START
GUIDE for your router or go to http://www.cisco.com/go/sdm
-----------------------------------------------------------------------
^C
!
line con 0
login local
line aux 0
line vty 0 4
access-class 23 in
privilege level 15
login local
transport input telnet ssh
line vty 5 15
access-class 23 in
privilege level 15
login local
transport input telnet ssh
!
no scheduler allocate
end