Cisco PPPOA Configuration Guide
service timestamps debug datetime msec service timestamps log datetime msec ip subnet-zero ! !--- For DHCP: ip dhcp excluded-address <ip address of ethernet0> ip dhcp pool <dhcp pool name> network <ip network address of ethernet0> <subnet mask> default-router <ip address of ethernet0> dns-server <ip address of dns server> ! interface ethernet0 no shut ip address <ip address> <subnet mask> ip nat inside no ip directed-broadcast ! interface atm0 no shut no ip address no ip directed-broadcast no ip mroute-cache pvc <vpi/vci> encapsulation aal5mux ppp dialer dialer pool-member 1 !--- Common PVC values supported by ISPs are 0/35 or 8/35. !--- Confirm your PVC values with your ISP. ! interface dialer1 ip address negotiated no ip directed-broadcast !--- For NAT: ip nat outside encapsulation ppp dialer pool 1 ppp chap hostname <username> ppp chap password <password> ppp pap sent-username <username> password <password> ! !--- For NAT: ip nat inside source list 1 interface dialer1 overload !--- If you have a pool (a range) of public IP addresses provided !--- by your ISP, you can use a NAT Pool. Replace !--- ip nat inside source list 1 interface dialer1 overload !--- with these two configuration statements: !--- ip nat inside source list 1 pool <nat pool name> overload !--- ip nat pool <nat pool name> <first ip address> <last ip address> !--- netmask <subnet mask> !--- If Internet users require access to an internal server, you can !--- add this static NAT configuration statement: !--- ip nat inside source static tcp <inside ip address of server> {80 or 25} !--- <outside well-known ip address of server> {80 or 25} extendable !--- Note: TCP port 80 (HTTP/web) and TCP port 25 (SMTP/mail) are used !--- for this example. You can open other TCP or UDP ports, if needed. ! ip classless ip route 0.0.0.0 0.0.0.0 dialer1 !--- For NAT: access-list 1 permit <ip network address of ethernet0> <wildcard mask> !--- In this configuration, access-list 1 defines a standard access list !--- that permits the addresses that NAT translates. For example, if !--- your private IP network is 10.10.10.0, configure !--- access-list 1 permit 10.10.10.0 0.0.0.255 in order to allow NAT to translate !--- packets with source addresses between 10.10.10.0 and 10.10.10.255. ! end