把Chicago的ASA换成Router2811也测试通过。" m; T i- _& U, l
' Q9 ^+ ^* ~. n' k
!. K9 d3 H+ z/ A
version 12.4
/ Z7 ^' Q) @8 W; O( h( xservice timestamps debug datetime msec
, b9 g' C* z% y1 H$ fservice timestamps log datetime msec
& u* p/ z! w& h/ {no service password-encryption
0 R f3 G+ B9 T% P; b!
9 ^4 J2 N& @' ]$ z5 C# ^8 M% Bhostname Chicago2 G% h5 h3 x1 L
!
. t6 H! [ `- C' Sboot-start-marker
3 q7 p/ Y3 k. d+ {" F; y9 bboot system flash c2800nm-adventerprisek9-mz.124-22.T.bin
2 z# H% Y T- k2 h7 h: j5 i1 a* aboot-end-marker6 Z( i7 N- {1 j d8 P
!8 \. H4 M1 ]# c7 ~ q) \# E
logging message-counter syslog
: c0 e- ?3 p$ q1 ~0 C* `& G! Nenable secret 5 $1$iG6R$6L/igglma1qBU30KG7YOM0( h k+ `! V' E$ E' R
!
2 k0 }8 k, u1 V$ K* h; H' hno aaa new-model
$ l' ` I/ I. F- \. f+ ]8 H8 X!& h/ [& V F$ E- }, p
dot11 syslog
4 [3 N6 B5 E) Mip source-route
& W( b! k. s% e ]- W( Z, W- q!
+ f; L6 x( y+ h2 i+ }' |* ?!
3 u$ t; L1 C+ j9 Q3 O- a$ c3 J% Pip cef6 m9 E$ U1 Z2 q2 U. P
!
( {+ U( p3 |9 u!
, t( b4 Q" K1 W: t$ ?no ipv6 cef D; M+ x2 _) H% N
!
# ]2 P, ]9 v D. Q$ @8 q1 zmultilink bundle-name authenticated
# p9 I& `; K7 w; ~' e6 i# z: V1 X!* t( Y& F" ~6 m$ e, w% T
!
' g# [2 C9 J# ^- V!
' E. b& s0 I9 X" g. a# Y!; k& |" q" S; q* S( i
!- q4 h9 u& ~+ n, |6 l( @
!+ h! t- ?' Y4 X2 D4 s1 S1 ^& e" w
!
. ~- C* g2 c% I6 X) K& B!
V) E; W- T2 ?9 k5 n!
% |1 y' H0 \' z" Z% X' }& L. }!
/ m: c. P$ c9 Z: Q! t6 g* S!: I. P! A$ t4 {5 f
!: X& N$ @1 {4 b; F' ?$ k5 u7 N9 C) s
!" p( k2 [, R. m! X* f2 y
!! a% Z! K- w# c% \) y4 D- o
!# |, Y2 R" j U; \5 l. _ q L/ q
!+ W2 _% K: T3 `3 @* W" L: T* {
!
) [( d- q5 k! Z$ K!
0 L. E, c: o8 B6 s0 b/ S% f!" Y% v& V9 L* F2 v: Q
!3 a# ~: o6 p$ i- {7 Y
!
1 S* X3 e% p* e. v" F; ]!
: O: J6 V& c$ N) Qvoice-card 0
9 o( P& S, _/ X5 S7 K1 t7 Q!
; P- M( o) t6 K9 c" V9 {6 r!
8 n$ |+ t9 [) _4 Q( _!& m8 w' e3 y9 d& r% @; y& V
!
7 _" ^1 B9 Y8 x!
3 G; ? o6 u9 H" [vtp mode transparent
2 ?0 N- Z C; Narchive2 H; o! P) Q# b4 _7 `7 v' N4 h( Q
log config
7 m1 C" g5 r6 c- }! b' F hidekeys
4 X% B% c7 h' N# x6 O; z9 h! J- A) O! 9 @: U/ l. g v9 @2 u
!
$ I) @- {- X3 Q0 ]& F7 k3 Wcrypto isakmp policy 17 _9 q+ G8 V1 D# T
encr 3des
' S$ p( B8 j) k0 t( o5 { authentication pre-share
) P _; m5 e- e' C' ~4 h+ Q group 2
c$ Q5 P$ q3 U. Ccrypto isakmp key cisco123 address 120.90.11.218+ k3 z; o$ V- n2 @
crypto isakmp key cisco123 address 140.206.34.178
6 k8 T; g3 V( ` t$ u( {!
# J, \. W, V: j" e!
8 P& p; o0 C0 F3 S+ q0 \crypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac * J6 s. f/ {: P) q( {
!1 u: d# w+ [& P2 A
crypto map outside_map 1 ipsec-isakmp
+ y7 u+ @4 k; Q' P3 o% G; R set peer 120.90.11.218
6 d, B3 `4 t# f! R" P$ F set transform-set 3DES-SHA , K% F+ m: u2 G& P" ?0 E4 o9 B
match address outside_cryptomap_1
( D/ q" X& T, jcrypto map outside_map 2 ipsec-isakmp 7 D) m5 d% C A5 _; s" T
set peer 140.206.34.1788 {2 s4 O: U! A/ B
set transform-set 3DES-SHA
: Q# ~, [; C; w9 H match address outside_cryptomap_2
% |, e, y! J8 d0 u!4 Y7 E' T @( t
!3 U& a: A; W3 F: m: h
!
; u$ k6 R. d$ l) d. m# F* |!
' ~3 k, s; _! ~1 e!9 V4 P7 G+ `, _) s
!
& }) W) `0 K, T) g% ]!4 w, q3 H- Y( A9 e+ w
interface FastEthernet0/0
# b7 c; E/ Z) s$ F$ b& h9 S ip address 116.247.91.98 255.255.255.248
7 v0 p5 H% k5 B ~$ _" b# ` ip nat outside! Y9 g6 X3 s6 {5 a
ip virtual-reassembly5 h: ^& e! e; I$ \9 F" A8 O; ^
duplex auto2 M8 j7 K1 H/ p4 S7 s5 R
speed auto
. h0 E8 v4 ~% i( K5 B8 v2 A crypto map outside_map
$ r- ]4 y4 g# f- P! K" Z2 l4 T) z5 y
interface FastEthernet0/1) o" U9 i' d$ i: [6 L
ip address 10.131.126.51 255.255.255.240
- y$ H1 o8 G+ K9 k8 S ip nat inside- v) L6 O j2 X: W3 ~3 A
ip virtual-reassembly- I9 I" s. z4 w1 z& C- O
duplex auto; {- ^/ a" T* K3 t
speed auto( j# k, P* b# P6 R% E1 ~# x
!8 s. K$ ]3 V0 S
ip forward-protocol nd& v5 c) I) f2 i1 [0 V8 W5 J& n% r
ip route 0.0.0.0 0.0.0.0 116.247.91.975 z7 K8 f3 b# |. I6 I+ W9 ? C/ N
ip route 10.131.0.0 255.255.128.0 10.131.126.57$ A# e5 R0 S R4 L; g% G
no ip http server
8 Y M# k5 T7 c ~- y! a' U( kno ip http secure-server; S( @6 Q2 ? K- z5 @/ o" ?
!% T. u+ @$ O v8 k1 g" m Z
!
% Q0 k3 F/ e9 ~) y5 i7 N# m/ @ip nat inside source list inside_nat_outbound interface FastEthernet0/0 overload# J- c) B. t4 Y$ `, i5 ~, g
!+ x% I+ h) h% N$ K! P
ip access-list extended inside_nat_outbound
, D! k$ X/ @: R5 z0 y deny ip 10.131.0.0 0.0.127.255 10.131.200.0 0.0.0.2555 c9 R" N2 C7 ?8 M$ _
deny ip 10.131.0.0 0.0.127.255 10.131.201.0 0.0.0.255
/ c. @" l$ ?8 V permit ip any any* L* w( w" U! r9 F
ip access-list extended outside_cryptomap_12 n& s: H0 h: Z: x! q2 X0 {1 |
permit ip 10.131.0.0 0.0.127.255 10.131.200.0 0.0.0.255+ ?* B7 l7 @; ~) d c+ u" j
ip access-list extended outside_cryptomap_2+ f) o) J2 [% Y. M
permit ip 10.131.0.0 0.0.127.255 10.131.201.0 0.0.0.255
. Y5 o& k% o7 Y, _!/ l2 C+ z: A5 ~
!, {4 | C& {0 }( ?7 k- [. G
! i7 t( o% }0 i; ~: s k* w
!
. f0 J% w3 d5 N7 q!
+ f3 s) v, y* ^5 Z a!% j5 G7 X ]- N6 l* {# P7 d* l
!
8 P$ R! r0 K1 s3 @' u: j; W, q!
& E% k5 Z* C* u/ @2 K" rcontrol-plane; F& v; Y0 U( D
!
* d7 J# E* E* _!* E- N7 Z) e1 {" I% c" J
!
% N1 ~6 h- _& a+ ~ccm-manager fax protocol cisco
6 @* b. t9 i d!
; n- V7 _/ Q9 X; O2 i: l( lmgcp fax t38 ecm% ]2 H6 i/ `2 n( ]4 H3 S0 l$ D: V/ f
!: r9 W: ~8 ?- ]3 `
!1 ]0 j3 W* p% L8 w z9 U
!
_& q. e6 @/ Y1 ]/ b. n$ ^ h!
7 E9 H1 O2 Z1 g1 Q" g* P, c!2 c) V7 X- _" n3 s0 _2 q- d/ }; ]
!
5 n2 K# ]; _( ]/ W8 Nline con 0( R% V) L8 j# i3 R0 B
line aux 0
) H1 Z3 Z% x5 Y- R- \- F) E" tline vty 0 4! ?3 G }, n& `8 b1 o! A- g1 Q F
password cisco, Z- y* [7 m3 T
login& t: \$ }; a% c) I* ^
line vty 5 15
4 C( Q" e* S, L$ I7 H password cisco/ C6 K) T& i q" z' P; W, v
login+ j+ W5 ^; ~0 C" g
!) Q2 y7 B6 u/ M: r: x
scheduler allocate 20000 1000- B4 b, K5 g& k/ R4 U
end
]- z( P$ N8 u1 q0 X* E6 i2 E" Y) M
8 Z ?, i9 I+ q" oNew York 防火墙配置:
1 F( G* p( Q. `0 o) o& r+ i( Y: Saved* f1 d3 g3 E' r) \
: Written by enable_15 at 01:56:33.414 UTC Tue Jan 8 2013
7 `8 } [9 |8 Q' k) I!
1 s% V9 j2 w, z, @; ~1 FASA Version 8.2(5) 3 a6 Q( H0 s( o! q1 c
!
8 B) m$ q7 [% W# zhostname NewYork1 } q: r; t. x
enable password WrXP9uZExEcEnNI3 encrypted
( ?6 L) n* e. |. D8 gpasswd rk6YkHwBJrlS0iX4 encrypted
; |7 [- ], k% t& Enames
/ @2 [0 H2 n( g9 K: U4 R `!7 V* H' C2 f( i3 _
interface Ethernet0/03 R% a P' z! U
nameif outside
y, s3 W+ e6 ~1 Gsecurity-level 0( v. ^ Q# B n3 E K: X. ~
ip address 120.90.11.218 255.255.255.248
4 J, `0 |% i, A0 C!3 E" B" C( ]+ q) w. w; m
interface Ethernet0/1
5 x, _" B& b1 n2 M9 [3 Knameif inside/ w( W! D% H$ s" S6 ~5 G& v
security-level 1005 G {9 H* n- l; X) ^5 F
ip address 10.131.200.254 255.255.255.0
M1 Q% \) F! D3 V, \7 o( K!) U7 P1 G% ~$ Q3 G+ }
interface Ethernet0/2) E, i3 D+ I. T8 [% X0 a
shutdown. o4 l5 Z! ]/ K. g
no nameif) U7 s- u" T) V+ E# f# _0 m
no security-level
! F+ s) o4 H, T6 Nno ip address4 |, R; T5 ^8 X7 {' ^" m# ^$ K
!4 W6 O* h$ `2 F: ^' _2 U4 U
interface Ethernet0/3
. P1 N1 H- U, z6 C- c# P2 Cshutdown
9 s& g$ [' M/ n, n$ B \# ]: R0 Gno nameif( {% U- P0 t8 j* N# r3 o/ p" ^2 i$ U
no security-level
9 N! V: K# ]1 V: ino ip address
- {0 J4 I: Z7 y/ w!
# Q; E% [" r8 r: K; g# y6 \1 ?interface Management0/0
2 c2 Q7 Y9 K$ d: F* ?2 P% D' lshutdown5 U0 Z+ k) u* f, d: k, K
nameif mgmt& N8 n7 A* ]3 G% p6 z
security-level 0) Q& E1 y( T, m% s/ i7 h
no ip address
% X( n4 X5 M7 R5 p!
7 P* w0 N0 [. s* z2 pinterface GigabitEthernet1/0
- `. f* ], @( K. t8 H& l' X# M- @7 \shutdown
6 v t4 U# A' sno nameif# s' X G( {: R1 }
no security-level
3 r( q+ O& A' w* Q9 }3 P8 Wno ip address
" M! e. r0 W5 Y! ]# m; V: p$ l!
0 `1 V' i9 v, h6 @' y5 z) W! a, minterface GigabitEthernet1/1
! f: C) y! P+ U3 `9 d3 d+ K0 Ushutdown
! W: o2 z! n) K( Q2 Z! h) G0 Zno nameif$ m+ _$ V( D2 X/ o6 N! ?: ~( I
no security-level. y! v7 A0 b7 Z2 |
no ip address" c+ E! O3 x9 L+ M
!
$ w9 h6 x3 [5 R8 m4 x" g1 l7 `interface GigabitEthernet1/2
% ]& O4 U/ N+ H! J& U- ^0 P0 W9 _( P9 yshutdown5 ^( X/ v+ y$ l2 h( T# H; C# h
no nameif! Y, `" \% b9 r7 ?( _6 H( N
no security-level; h" f- b. [) f% ^
no ip address/ Q3 B# W/ v% N; z
!
3 ]3 F% x9 H' |7 y, iinterface GigabitEthernet1/3/ a) X! j( G j4 H
shutdown
% c. P, {5 K: B8 M) ]/ B, zno nameif d' X$ Q3 _. L, I- o3 t
no security-level
0 J' s+ h& [9 U' C4 `( @no ip address
" \( V9 e0 Y. C0 d$ A0 N!
5 D3 C0 o+ x# Yftp mode passive3 R6 j y% L' L8 Y8 _' q+ s" \
access-list inside_nat0_outbound extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
) I( C: b0 A/ h- I' Waccess-list outside_cryptomap_1 extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
$ t7 \) N3 Y. Bpager lines 24/ I+ Y0 A' ? t6 ?
mtu outside 1500$ z8 J3 s# H4 m
mtu inside 1500
2 T& s0 i6 x7 v# N3 B' T1 dmtu mgmt 1500. q2 M1 ^% d& c& W8 X% R3 a
no failover
7 Y3 ?& g; U' V) yicmp unreachable rate-limit 1 burst-size 1* T+ z& ^* ] W% t# n3 N
no asdm history enable: q; o! s1 Z% p
arp timeout 14400
% V/ D7 U6 u Gnat (inside) 0 access-list inside_nat0_outbound, `1 M5 W" W2 y% K. a$ L( a- b
route outside 0.0.0.0 0.0.0.0 120.90.11.217 1" g5 ?& \$ O* g/ u) {- P
timeout xlate 3:00:00# ~$ w5 l$ W+ X' j- i
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
; \1 q/ R2 u2 F5 k$ ?& itimeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00( i; p0 Z# q! d9 V( t
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00+ G4 X1 G9 u8 b/ M7 X
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
5 L. g* F+ J2 R$ [! P) ntimeout tcp-proxy-reassembly 0:01:00: G2 h( |2 \! v9 K- D; ]- j. A
timeout floating-conn 0:00:00
/ w( M$ ?3 D! C5 B. Zdynamic-access-policy-record DfltAccessPolicy
, g! }" L# ?! [http server enable4 s% Q9 D! F2 r. P8 @1 \& |; J
http 10.131.0.0 255.255.0.0 inside4 ` U7 q, d( l# O3 m/ _7 G# k
http 0.0.0.0 0.0.0.0 outside6 {0 e# r* u7 _" m; V; h
no snmp-server location
0 }7 w3 ?; F$ N/ U" S/ ?3 ^$ G) H) Uno snmp-server contact B) ]. q8 ]8 `7 l( x
snmp-server enable traps snmp authentication linkup linkdown coldstart
4 ]0 t- k2 m& ]: y& Scrypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac 7 v+ a7 o3 `; r; {7 C3 Q
crypto ipsec security-association lifetime seconds 288006 P! g. k( |7 F
crypto ipsec security-association lifetime kilobytes 4608000
5 J. s0 w1 \1 @: T; R( r+ Scrypto map outside_map 1 match address outside_cryptomap_1
2 R/ u8 r6 ~* j P5 Qcrypto map outside_map 1 set peer 116.247.91.98
3 i8 ]7 n' `" k# Ocrypto map outside_map 1 set transform-set 3DES-SHA
- O6 u# _/ E; x) G9 jcrypto map outside_map interface outside0 B5 R. B0 v$ p! i* z+ z3 ^
crypto isakmp enable outside' `' t# @4 q1 y) I2 E6 f0 o
crypto isakmp policy 14 j2 Y4 z! `, ]* |1 T
authentication pre-share Q5 e+ T" t9 {) I2 g* V& |, ~/ V
encryption 3des
' [4 y" ?, ]7 j2 {hash sha; v. @1 D2 F: x
group 2+ l8 _. |* Z# G a( w V
lifetime 86400
( W, a' n/ ^* c5 T7 O/ X1 gcrypto isakmp nat-traversal 50
+ T G/ l L, r0 C+ Etelnet 10.131.0.0 255.255.0.0 inside$ W8 { R* K; c1 V- {1 g0 f+ @$ H
telnet timeout 5
/ |0 E: p1 z& t9 l. ?) E+ C, Gssh 0.0.0.0 0.0.0.0 outside0 m; I6 W* T9 M1 P
ssh timeout 51 x4 W! q- R% {( s' Q
console timeout 0; m) ]; w5 O; N+ O5 ?. q& S& U
threat-detection basic-threat7 w* S7 `( R% T! t/ v; A
threat-detection statistics access-list+ ?, O' w! K5 Y4 W; O- m, Y
no threat-detection statistics tcp-intercept, \2 b+ L% o! | r1 y6 ]
webvpn" O, [) C0 W% Q# _ U0 V
tunnel-group 116.247.91.98 type ipsec-l2l1 h9 M8 ]" n4 I# t9 _- v
tunnel-group 116.247.91.98 ipsec-attributes
, B2 }2 V5 `( q- X. [pre-shared-key cisco123% X% q9 k0 M2 S3 C
!' F0 I0 u" \' u3 s, `
class-map inspection_default
+ `: S* A i- hmatch default-inspection-traffic
" P% \1 C0 w! |% a+ |!1 D: J% S- ?: l) r, W# X
!
! u8 t1 `. l9 M7 _* ?* opolicy-map type inspect dns preset_dns_map
& e7 u8 T7 w+ v; R. e. ?! P$ ]parameters1 a0 l6 {& [0 m
message-length maximum client auto
9 Q: }: _1 Q x* u8 _0 gmessage-length maximum 5128 Q0 z- m1 |- i+ A& z1 J( S
policy-map global_policy& I2 E/ T ]4 F/ Z
class inspection_default; o2 l4 l( s1 l, @0 c* D
inspect dns preset_dns_map & X. u8 b: ?) P
inspect ftp & a3 o8 T' o1 \5 e) ^- s
inspect h323 h225
Y8 M1 W! H! V4 G W* f2 E W; zinspect h323 ras
! o$ I2 e, w5 m8 a3 E3 ?inspect ip-options
3 d( W, O9 O% J7 u# v* [. \2 T- J6 [inspect netbios
- J! {& P) J4 b: N* Uinspect rsh 2 ]. M4 I `' [" M" v; }. q* b
inspect rtsp
0 }3 K, D) Z' b2 ?inspect skinny 5 e- X; j. G# |
inspect esmtp $ n/ _* S$ M1 T' _% F
inspect sqlnet 6 m( Q- A: q5 Z! B' K) m
inspect sunrpc
x) ^* t+ ~! Z! {inspect tftp
: A6 J2 S5 M9 q. ~inspect sip $ k5 U, ?/ @! T: ?- L u8 M
inspect xdmcp 9 ^7 \' k4 x' [0 V/ @
!$ y) S, g' |' M- V% N
service-policy global_policy global# [6 X* Z8 C7 w, j# ~
prompt hostname context
8 N2 D) ` |9 U- bcall-home reporting anonymous prompt 2+ o) k. S, J; u/ F
call-home, X" i- ^! D8 ^9 @% @- j% T
profile CiscoTAC-1
% S& I+ o' `; W7 ~# ?; eno active8 b3 G/ M1 Y S! [; D, R7 i
destination address http
- K( ]- k" {# R; s& Gdestination address email
- m: ~: Y k3 ] o8 fdestination transport-method http- b' a$ H# @8 B& [ { W$ r
subscribe-to-alert-group diagnostic
! F8 F K" c/ R9 asubscribe-to-alert-group environment, K2 Z, s: q: B
subscribe-to-alert-group inventory periodic monthly! J! N+ G& S) N% d6 J9 F' p
subscribe-to-alert-group configuration periodic monthly0 U( H. y" \% Z- G. j/ n
subscribe-to-alert-group telemetry periodic daily
# W5 K: u+ ]7 r ^! q7 cCryptochecksum:afe923d8c20d3f2ffa7361be2ff94624
# k+ Y6 _( P7 |) u: end
' J9 ^- J. W0 N# O9 k1 D; {3 T" }( a4 r
Tokyo防火墙配置:" ^0 _; P* p8 _* ^. j
set clock timezone 04 s9 @; Q" y7 v0 ^, R
set vrouter trust-vr sharable
! [6 s% S: D* Xset vrouter "untrust-vr"
$ a1 X8 R4 r6 k1 f( J x; Dexit
k% a: \3 B. k" j w. R2 nset vrouter "trust-vr"
; ]9 V5 m2 w3 zunset auto-route-export$ L; w* ^& G% g+ s5 e
exit
* Q8 L% e; ~: B" p: uset auth-server "Local" id 0
& a6 H( q* }8 v' F3 w4 Oset auth-server "Local" server-name "Local"
5 Z p( Z; g& i# C9 x' mset auth default auth server "Local"+ s. ]+ l1 o+ J' B
set auth radius accounting port 1646% l c. X7 b; f' Y0 f u
set admin name "netscreen"
. w1 T1 v5 \4 a! Q4 E9 x+ b8 q$ Lset admin password "nFWvH6rLAaPKcedPuslBexMtM8P5yn"
( Y6 R u& l, r/ E: ]set admin auth timeout 10# k# x* e( Q) ]& x- t
set admin auth server "Local"
8 {# l. p, `/ l. oset admin format dos
, o" E7 O. V E$ Fset zone "Trust" vrouter "trust-vr"
5 Q- Q6 ?! n8 N$ oset zone "Untrust" vrouter "trust-vr"
: ~# j7 F- x+ ^" A F. e0 j% P& Sset zone "DMZ" vrouter "trust-vr"6 H7 L1 F7 f% p: l! C) m
set zone "VLAN" vrouter "trust-vr"
, c$ n8 K! b' U3 J6 h0 ]* Uset zone "Untrust-Tun" vrouter "trust-vr"- P5 N9 M8 p/ U) {& f& `, F
set zone "Trust" tcp-rst
, w1 A G+ u& a2 gset zone "Untrust" block 2 P1 G7 p& \) x
unset zone "Untrust" tcp-rst
4 t8 F o% E7 f5 t& }* ?, qset zone "MGT" block
6 Y/ `+ k( e6 A7 lset zone "DMZ" tcp-rst
3 b6 y% V u) _+ g6 H5 ^3 @( Mset zone "VLAN" block ! K$ }$ T1 C/ C
unset zone "VLAN" tcp-rst + y( l% f# [, w! x! w
set zone "Untrust" screen tear-drop
* ^ ] Y' `2 }2 w3 hset zone "Untrust" screen syn-flood& V0 S) k! O; m! W
set zone "Untrust" screen ping-death
* K1 x0 [$ y3 K; {2 Uset zone "Untrust" screen ip-filter-src
5 \+ Q8 d) |, N5 W& tset zone "Untrust" screen land
( J7 y' m, E" {. Y, C7 C9 Dset zone "V1-Untrust" screen tear-drop
: N$ m" K: T# A2 I8 k" W, N' H- Uset zone "V1-Untrust" screen syn-flood
M5 A% S/ i$ v. h8 Hset zone "V1-Untrust" screen ping-death
4 w( I% `6 C! w( w) v: Tset zone "V1-Untrust" screen ip-filter-src
( [: Z( C5 B2 B" y! r0 c3 Oset zone "V1-Untrust" screen land- J( [3 g; l0 P, O% \ G
set interface "ethernet1" zone "Trust"
]# m- m! n+ Fset interface "ethernet2" zone "DMZ"7 O( l+ }: O; f/ a8 N6 z6 d
set interface "ethernet3" zone "Untrust"
! S* u/ Y9 w1 H' _/ `set interface "tunnel.1" zone "Untrust"* |8 K: d) w2 j) k% h- h% t
unset interface vlan1 ip
6 ^* |, v% w% @1 [" P; sset interface ethernet1 ip 10.131.201.254/247 q/ A7 q0 }- i- c
set interface ethernet1 nat7 l+ M9 s/ Z T2 d9 O
set interface ethernet3 ip 140.206.34.178/30; S- d- o: Q# ]9 A
set interface ethernet3 route
j6 C6 s3 D+ b. x& |3 [set interface tunnel.1 ip unnumbered interface ethernet3
9 c( G: V5 G% x% H: h/ wunset interface vlan1 bypass-others-ipsec& \! ?' S# ^8 @7 i
unset interface vlan1 bypass-non-ip
1 f9 P6 _* i& \: ^* pset interface ethernet1 ip manageable
. }0 J9 c/ @& f0 U$ Vset interface ethernet3 ip manageable" @# X- [7 o1 y: Z( }7 N" r
set interface ethernet1 manage mtrace: g! ]. C) i& d: @" \1 P
set interface ethernet3 manage ping0 t- t- V, Y' L E7 X
set interface ethernet3 manage ssh
1 @1 A- y" k6 e q0 q$ i6 rset interface ethernet3 manage telnet" Q( `2 ?6 S, V A K- E9 l
set interface ethernet3 manage snmp
" L k& A Q, b! y2 |) H; U& rset interface ethernet3 manage ssl
' k+ p* n- Q; s7 vset interface ethernet3 manage web$ \" n3 Y. |' h# `2 i; ~7 b5 K
set interface vlan1 manage mtrace5 R& @/ p- c4 q( `
unset flow no-tcp-seq-check
% w6 J% v2 _4 M9 y: Eset flow tcp-syn-check8 ~' f2 a7 k4 O, ^
set pki authority default scep mode "auto"5 j2 K+ X* _) ? ?2 _8 N2 ?" S
set pki x509 default cert-path partial
5 {# I p H7 I8 lset dns host dns1 210.22.70.3& z1 n9 M2 o& M1 j3 z! O- R b
set dns host dns2 8.8.8.8
3 x( z; y8 P7 H7 _; V/ O6 Mset dns host dns3 0.0.0.0
S9 d7 ?' W* L- cset address "Trust" "Trust_LAN" 10.131.201.0 255.255.255.0
- g* `% A( `3 Z8 Tset address "Untrust" "Chicago_Office" 10.131.0.0 255.255.128.01 `) ? w6 h4 ]/ O
set ike gateway "To_Chicago" address 116.247.91.98 Main outgoing-interface "ethernet3" preshare "Bx6bVuxrNEq2qBsVGyCJ3mFx53nxEKiYVg==" proposal "pre-g2-3des-sha"
- Y* i( d9 K3 F* n6 A, bset ike gateway "To_Chicago" nat-traversal
8 i' y/ D- n7 i- i; ~+ Munset ike gateway "To_Chicago" nat-traversal udp-checksum
2 A$ K" J6 o/ i4 tset ike gateway "To_Chicago" nat-traversal keepalive-frequency 0
/ _% }2 I$ u0 C) G/ k/ H, qset ike respond-bad-spi 1
, c- t' ^% ~/ J/ {+ ounset ike ikeid-enumeration
$ N4 R5 O' V; a3 t s! y- Z8 w" Xunset ike dos-protection7 Q* o m9 e- D* d1 t+ ]
unset ipsec access-session enable- Q/ `6 o6 n( }# D# f3 Z
set ipsec access-session maximum 50008 A: `6 Y4 f* P- ^$ w
set ipsec access-session upper-threshold 0
' H7 A! q* d& t/ iset ipsec access-session lower-threshold 0
# Q* ~% K7 e, t/ a3 }2 Mset ipsec access-session dead-p2-sa-timeout 0
& M* @) E( O: punset ipsec access-session log-error6 {# I2 {7 F! S! r: D
unset ipsec access-session info-exch-connected! f2 S% F8 X. p% l
unset ipsec access-session use-error-log
: ~3 w* J0 _9 Y nset vpn "Tokyo_Chicago" gateway "To_Chicago" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-sha" ' W* }; `* h# o' n5 l) m8 i, @# O
set vpn "Tokyo_Chicago" monitor. q/ F1 P4 f" Y/ e1 N
set url protocol websense& E. s( f1 ^+ M$ e! {: y5 d ~- i
exit" a7 J0 @- V3 ] V& A6 v4 Q
set policy id 2 name "To Chicago" from "Trust" to "Untrust" "Trust_LAN" "Chicago_Office" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 4 log & @- f# V6 E W, A. }8 N) J
set policy id 22 l2 c3 c" |: v% z
exit
( z* j4 ^# m1 U+ Nset policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
& y2 }8 I1 G i& [set policy id 1
9 @# W& p) v4 |2 V% pexit2 _( x, S* u$ m! V
set policy id 4 name "To Chicago" from "Untrust" to "Trust" "Chicago_Office" "Trust_LAN" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 2 log
, B8 Z7 j, q2 }7 [. m% U! oset policy id 4
/ {9 b5 {; Y1 }. n) [exit) d/ R/ ^# Z: t, d9 ^
set nsmgmt bulkcli reboot-timeout 60
. |* p' J1 s- ?2 Gset nsmgmt bulkcli reboot-wait 0
, s8 f! ?& m4 X) h$ J$ y: v+ lset ssh version v2* o! P. D! M/ e7 w+ _0 K
set ssh enable1 O! f9 Y# l, ]' j# R3 D
set config lock timeout 5- v$ ^$ D0 G6 d' e' S6 I, G
set license-key auto-update+ h8 ]6 a7 r4 y( {0 V2 x( N
set snmp port listen 161
0 Q0 r4 k9 ~# C9 p: w7 @" Cset snmp port trap 162; ^( S/ ^# d# ?' [: D) s
set vrouter "untrust-vr"# a2 w. {' K8 G- e" V7 h
exit
9 F; T/ L) p& X0 K0 O# T$ nset vrouter "trust-vr" |3 I0 w* K+ J* T8 q. h
unset add-default-route
3 d# R; F7 \; z$ Q gset route 0.0.0.0/0 interface ethernet3 gateway 140.206.34.177
2 L) d: g: ~% V$ k0 ^3 ?0 {! T! mexit
2 C( [( ~/ [- S. B; E# t4 H2 g" Uset vrouter "untrust-vr"
& x5 G( q- x( u, u" s0 r+ J( lexit
" F# ^+ P$ o, }set vrouter "trust-vr"5 h7 y" q% p' ]9 _( P U
exit |