本站已运行

攻城狮论坛

作者: dw1217
查看: 3113|回复: 40

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] ASA、juniper、Router 站点到站点的 VPN

  [复制链接]
查看: 3113|回复: 40
开通VIP 免金币+免回帖+批量下载+无广告
ASA、juniper、Router 站点到站点的 VPN经过测试通过。7 {# a9 X/ X+ N6 c
, e/ Q) Q6 u! G: d- U
Chicago 防火墙配置:
  @+ x# B3 _5 ~$ j: Saved3 U/ }& B3 ~7 Y$ H
: Written by enable_15 at 00:44:56.802 UTC Fri Jan 4 20135 \) L" Q$ i! F- W8 s
!- F. R" c. w1 L) Q. g
ASA Version 8.2(5) ; S) C8 x, ^7 x& w
!8 L# f  S8 ?- }
hostname Chicago% `: |) s9 G, |* w: y
enable password WrXP9uZExEcEnNI3 encrypted
; j% p" o7 z/ Zpasswd rk6YkHwBJrlS0iX4 encrypted; j  a' U3 v  ^9 {
names
2 B; f8 A0 i! }) i  B! l5 L!  y+ d. S  H- h2 k8 N% b  O
interface Ethernet0/0+ q  o/ d( D$ c& H1 B
nameif outside" [  Z5 w8 V- Z8 i7 s3 }
security-level 0- H! S$ {2 a, C+ G) R3 b' G7 a* C, h
ip address 116.247.91.98 255.255.255.248 4 D3 x: [0 K2 k
!0 O% E+ F/ b2 I6 }
interface Ethernet0/1. S; K( |* o  g8 b' \
nameif inside
  h. i0 G+ ?2 U& C) `+ F1 t8 m security-level 100
" C/ P' y. {3 m2 K0 n ip address 10.131.126.51 255.255.255.240
& B1 O  ~0 K3 J- j5 U1 T" R; Z( V!
4 v. ~/ h" c8 J+ a( Hinterface Ethernet0/2" w3 ^( ?' C9 l1 _: [- `! `; p
shutdown
7 d; R8 n( R8 R* ~9 v! G0 I1 H no nameif
; j& G! A# }- p no security-level! c" Q2 {7 ^0 o7 F
no ip address
  v' L* n$ i" u) Z!, w$ ^: B$ u; F5 m) X* y
interface Ethernet0/3- \( [/ r$ x! n$ v. Y( h& q
shutdown1 D. w7 w- @# x* D
no nameif, z9 F* w" i+ p" I
no security-level$ U& a8 \3 Q5 b
no ip address+ U. i5 J0 {+ H: n% F% u
!
7 [- X) V* d  `: b  t0 ^interface Management0/0
1 s$ M- _* u3 A& h  f shutdown& T1 w" o; x- A8 Q3 V
no nameif- i* D' Z6 D- R) l3 u
no security-level
8 K6 G' D8 Y5 V$ r9 k no ip address& L+ k( t, v6 F, J0 ]% p" T0 ~! g2 F
!
; @* u1 [6 ]  S3 A0 Kinterface GigabitEthernet1/04 p7 A+ |6 z; N/ Y( S
shutdown. D! ~% F  k- W6 R; ?& ~. \2 h; |
no nameif
& ~6 L  V+ r' [4 Y; I- Z, _# p no security-level8 b: t4 C: m2 D/ f8 w& W4 m* u% Q$ @
no ip address
+ O6 p, _8 t( I2 ?( `; k" |2 |0 u!
( Q, O! `: c% L! Tinterface GigabitEthernet1/1  r$ l; _% H) j6 }
shutdown5 ^5 B$ \% T& z4 T8 C0 I& N
no nameif! U3 {. ?' b, q+ \' q# v& H9 ~
no security-level  j6 x" R/ I7 t2 }9 o
no ip address
% Y! D8 s$ W0 m* Z: h% P, ^!
1 T& T4 }% l# G; x4 X  v0 }! Q+ uinterface GigabitEthernet1/2
& r: t  w. Z# a shutdown
1 u# u9 U6 J. z4 g# H( |' U, d* M7 [% D no nameif, s7 {6 D' }: z- K: I) [1 `
no security-level
8 t2 O7 N! N% Z no ip address
6 g4 H- u! v/ W. d. b( N! e!% i" m- w& A) m4 ~$ e, f
interface GigabitEthernet1/3! }* V5 y- g- K+ f$ G: L8 i2 R3 H: `
shutdown
& O8 M- R+ G( u( J5 q( }. b& s no nameif5 A5 A& o0 G2 |$ v
no security-level  B, f# T: M+ ?( ~7 ^+ p  D& S
no ip address
& z! v% B, b" Y7 E9 ~! I% u; f!9 Z; }7 R9 m7 O' |: a/ S+ t( S( m
ftp mode passive
( t+ r" w4 Y% k: \4 T6 h3 R2 g7 Yaccess-list inside_nat0_outbound extended permit ip 10.131.0.0 255.255.128.0 10.131.200.0 255.255.255.0
- T4 X0 z: h# X* I+ v) d9 @access-list inside_nat0_outbound extended permit ip 10.131.0.0 255.255.128.0 10.131.201.0 255.255.255.0 7 f2 U3 x! r* g$ @9 `( x9 h
access-list outside_cryptomap_1 extended permit ip 10.131.0.0 255.255.128.0 10.131.200.0 255.255.255.0 ; |/ v% X* g6 p1 z* G- t
access-list outside_cryptomap_2 extended permit ip 10.131.0.0 255.255.128.0 10.131.201.0 255.255.255.0
4 ?9 z& p9 T3 l; Xpager lines 244 y: P: C" d) G* M2 _
logging enable
1 L' i  h9 S5 g7 D( {+ q2 ylogging asdm informational2 C$ G+ G. M* @& D, R. v: w7 t; Q8 g- }
mtu outside 15000 U6 L6 P6 k# c3 }4 N
mtu inside 1500' X! ^  w( ^( M
no failover
( I( O- q: G& a4 ~1 ficmp unreachable rate-limit 1 burst-size 17 h: P1 w. I5 x+ p
no asdm history enable1 N, k- V" V; f. n) N; U& F
arp timeout 14400) P% L+ r# C. C5 @: N; V
nat (inside) 0 access-list inside_nat0_outbound  m) j3 E" ^% |* w
route outside 0.0.0.0 0.0.0.0 116.247.91.97 17 u( u# I; ^) O. A* u! X
route inside 10.131.0.0 255.255.128.0 10.131.126.57 1
, j, P/ v; e5 P, k: ~( }timeout xlate 3:00:00
) X9 R8 ~& R2 i$ Ctimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
6 f# D3 z: Y/ w, h5 wtimeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00/ H: B8 E' D# T( w
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:003 ?# H2 J- m+ i
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute8 Z3 |5 ^* A! M, O7 d+ f/ a
timeout tcp-proxy-reassembly 0:01:00
' u. r* A" r2 X! }7 N& F' Itimeout floating-conn 0:00:00
1 P  h1 }" ?3 k7 fdynamic-access-policy-record DfltAccessPolicy( u9 |; ^" I0 v% H% P+ s
http server enable3 @9 z6 @3 i$ y/ W7 b! F" r9 @" ~
http 10.131.0.0 255.255.0.0 inside
1 s1 s& b0 B: Uhttp 0.0.0.0 0.0.0.0 outside
' k! |5 F; p  \no snmp-server location
; F9 [5 a+ h: `8 f! Ono snmp-server contact6 ]: k7 U/ ?2 v' _0 \$ a( F! X. c
snmp-server enable traps snmp authentication linkup linkdown coldstart
- r4 E- c  \9 k& ~# b8 Icrypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac
. s5 U* g# a% H" g! G* U+ hcrypto ipsec security-association lifetime seconds 28800
1 X& W& W- o3 F9 Acrypto ipsec security-association lifetime kilobytes 4608000
; g2 K- x6 `" f/ q3 b5 C) ecrypto map outside_map 1 match address outside_cryptomap_1
) ]( W5 O7 U3 ?( B4 h4 `$ ocrypto map outside_map 1 set peer 120.90.11.218
4 M' X) y; G  U: b3 v* M7 I3 S) ^crypto map outside_map 1 set transform-set 3DES-SHA- `2 o% P. @3 k# W
crypto map outside_map 2 match address outside_cryptomap_2# w1 e5 B8 s9 _% ^5 b! H
crypto map outside_map 2 set peer 140.206.34.178 & J+ H3 K5 B( p' I. W
crypto map outside_map 2 set transform-set 3DES-SHA% Y$ B* k9 i7 A$ r
crypto map outside_map interface outside6 U) b8 l0 B6 t" D$ ^/ U  q
crypto isakmp enable outside9 ]3 A# J3 Y4 G+ b0 d0 m2 u. b
crypto isakmp policy 1
' ]1 J  F. f. j9 A  L( k& k& i3 ] authentication pre-share3 m# F) S% K# B" C3 ?( m
encryption 3des
: w9 o% m7 i" I/ X! Z( p2 ^ hash sha
) \$ C5 H1 \0 m, }' O group 2
" S" ?* X; \7 v2 O6 | lifetime 86400; b( a9 c' j9 h! C  [$ I! V, a5 S7 p
crypto isakmp nat-traversal 50  K0 A  c+ Z7 _, A
telnet 10.131.0.0 255.255.0.0 inside
" f1 M, b! Z( p6 l$ Itelnet timeout 5
( y9 n+ }. r2 t" d9 sssh 0.0.0.0 0.0.0.0 outside* J5 ]3 F: k6 \7 C
ssh timeout 53 ?+ g% j7 B) r+ D( s5 v
console timeout 0
7 }. E0 p  k, |$ K$ Fthreat-detection basic-threat: ], o2 J1 Z; s  ]$ ~
threat-detection statistics access-list: W$ g* U. H& }) ~3 ^% t% A: }' w
no threat-detection statistics tcp-intercept
$ m3 O1 {5 W  |8 Qwebvpn
+ d9 [5 k: H8 W. jtunnel-group 120.90.11.218 type ipsec-l2l
5 h$ R% H2 D3 I- v- ]- ]tunnel-group 120.90.11.218 ipsec-attributes
: |* ]- N: w" Z  ? pre-shared-key cisco123
' l9 B& z  H& j5 ~7 L3 E: C, Utunnel-group 140.206.34.178 type ipsec-l2l" X$ q2 V; t: Y5 R
tunnel-group 140.206.34.178 ipsec-attributes& q7 L$ q6 \7 s, O* A" a" s- U
pre-shared-key cisco123
6 m( H7 ~  _+ O% h- s!
* t' u! D1 I5 bclass-map inspection_default
/ k$ z4 C6 e4 y) `3 O. w8 a# p& ] match default-inspection-traffic
4 x2 K  I; |/ [( n" ^8 l. L7 |6 k!$ ^( }; O9 `; j5 _9 }
!
3 T# d6 x7 h' X2 Tpolicy-map type inspect dns preset_dns_map
' A, B; p! |8 n& s6 ?4 y7 ` parameters
+ S, D/ @; S- h6 ^2 {& Q3 X message-length maximum client auto
" x4 ]! m" q) q message-length maximum 512$ H. _4 W: X9 @7 U
policy-map global_policy
& l4 y2 @2 B% N2 L( ? class inspection_default
9 b% t, l8 R+ @1 T. f2 k inspect dns preset_dns_map
- T# F8 {9 r# i0 C inspect ftp . e9 ]8 E& H/ v; T
inspect h323 h225 7 G& l; n* ^2 q& @/ m# z
inspect h323 ras
5 {& a" y7 V4 p: k! M. i inspect ip-options
2 I* U  O, U* o' ` inspect netbios * y! t0 v8 C" X# z. D
inspect rsh $ b) ]& P0 [+ T
inspect rtsp
' V$ i, @% b' z& h9 U0 C( p) v) @ inspect skinny
) {( D4 K7 O, z! Q4 B2 n! i inspect esmtp ' Q7 S  T6 j3 L; P# n, ~$ z
inspect sqlnet $ h4 {9 U5 H7 L. C% P. m9 V$ l& m
inspect sunrpc
0 s4 M+ T# p: d" b  Z inspect tftp
; e: Z2 ^8 k8 h inspect sip & ~0 V( y5 z" |- R8 X7 n: F
inspect xdmcp
6 L% A4 _" R$ y6 V- [!
& e' g$ C& q$ K+ Uservice-policy global_policy global1 {5 P8 s8 c5 ]& H$ Q; y0 P
prompt hostname context . N; Z( E' o& p, E  H+ T
no call-home reporting anonymous
' G/ W5 Q- o6 z* q3 ycall-home2 y6 h6 w& n7 Q4 u& d
profile CiscoTAC-1
! g5 X1 ]6 j+ M- o( P. u6 q9 A9 f no active2 @( v9 u. f3 {5 N% m2 I2 Q; ]
destination address http https://tools.cisco.com/its/service/...es/DDCEService
6 S" @) G6 G9 s' h9 u7 ` destination address email callhome@cisco.com* o& D& l) e( H+ ^/ B" x: t
destination transport-method http" T0 Z! ~+ Z: s" s, ^# N
subscribe-to-alert-group diagnostic; `( I0 F6 p/ x+ ]2 ~( e: A" `
subscribe-to-alert-group environment
2 a1 y8 v! y6 \ subscribe-to-alert-group inventory periodic monthly
+ _' m7 {% F: {8 d! c1 h subscribe-to-alert-group configuration periodic monthly
, L$ T9 Y2 C, A  q2 L subscribe-to-alert-group telemetry periodic daily  j7 r3 [! H% f2 D0 S
Cryptochecksum:132539f889b0ae80d42d176608fd9726, F% O( m5 _( E, \$ C
: end) j" I& r" m! n4 k8 t+ r, K" h  R/ d
* H) F% M: }# E; T
New York 防火墙配置:; s8 B+ T# b4 v) j/ T
: Saved
0 d6 v( k! D8 T4 H2 W: Written by enable_15 at 01:56:33.414 UTC Tue Jan 8 2013
/ X% j1 _7 w1 |% v) a8 e!" l: F5 Q. M; d
ASA Version 8.2(5) # E2 L7 P: ~  o6 w9 q
!" a! h8 j) @: U
hostname NewYork
& v5 P5 V/ G2 H4 o; T+ @$ eenable password WrXP9uZExEcEnNI3 encrypted- c: T4 |0 I% S9 v3 \
passwd rk6YkHwBJrlS0iX4 encrypted
" c5 S/ m& }5 p: K( Znames
" B+ N3 u  V3 g! q; T!' q! m3 r# v% e( Z. x2 G/ x; v
interface Ethernet0/01 K9 o$ d& s0 X" e2 y7 A& y
nameif outside* K  \. H: T# |8 T! C, l' S
security-level 0( V) l  D; t* X& Q" X6 p9 g
ip address 120.90.11.218 255.255.255.248 - R, t1 x3 x! g
!" [1 E: J" [$ W, b6 y  G3 d' U' b* z, K
interface Ethernet0/1! w. ?8 S  f( R5 |: S8 K5 e& i! y
nameif inside
7 {9 f. a4 I4 H, H0 P1 j/ ~2 D security-level 100/ l4 J  Z: E9 f) F" z8 Y! U3 E1 A5 ~/ U
ip address 10.131.200.254 255.255.255.0
! q0 J) T$ ]6 w9 A& v!
) q0 ]- R1 _# Q; z4 ^interface Ethernet0/2" z" l3 [8 l8 \# D
shutdown
6 v+ }! b3 O( C. N( v% P) \9 X no nameif6 \) W0 K, k6 C8 {% A
no security-level6 s4 g1 |+ Y: X. G5 z
no ip address
* l1 @6 L" Z3 w. i! B!2 C) r3 Q/ q; M& p, ?
interface Ethernet0/36 D3 z  C% A: F# Z- `& O) v
shutdown9 b: y8 X8 ~. H$ O9 A/ U2 L
no nameif1 g$ m( x6 ~: h
no security-level
  r& _+ `) ^- ^7 O0 ~% Z1 w; i4 Q; R: P no ip address" |) S" E% Y+ p0 h
!
9 n6 L/ i8 c7 a  f& f. e8 y/ Rinterface Management0/0! w9 _/ Y" i) {+ c) R- X1 [7 K: e
shutdown
9 i9 T  P+ z, x8 M8 M4 @ nameif mgmt* ~2 Z7 b- M8 V& j8 B
security-level 0
9 {7 i& w6 W" K8 C" `1 I5 V: i no ip address' Z5 t6 o# O5 `7 @
!- j% B+ n; x; \7 C* k  w
interface GigabitEthernet1/05 }' r) ^+ D" l, J  f3 Z
shutdown
6 y$ W" J$ L' h7 V$ o8 _ no nameif
) h$ U1 D& J% p no security-level
0 M# V) n. g7 v# W  j4 o. V no ip address4 R0 S5 h8 E% Z. U  n* [
!
/ f! ]# _, b* j# m0 c' I& ointerface GigabitEthernet1/1
' _3 i7 H8 v) S shutdown
# S' w- X3 E2 a) o' A& Z' Q7 c% a no nameif2 _. X; [( s& }1 N% ?  D# v
no security-level
8 O( H/ b! U& i% d& f# Z* t: ` no ip address
8 \) j4 p( ?7 T4 j+ A" G!
: s8 |1 ^1 b' A; n$ Yinterface GigabitEthernet1/2
% G9 ~5 L- G  q2 E shutdown
0 v9 [4 _+ A/ B. D* s3 d no nameif
0 `' r8 o& A0 z7 g) y3 N no security-level0 w5 O1 _' E) i
no ip address
0 `  {& P# |2 G/ ~0 `8 R!
6 E% z( C) \! ~# M) ]interface GigabitEthernet1/3
- k5 D# i# A1 ~$ p8 w' R3 ^5 C: q shutdown" V* n+ q/ p" s4 ?7 R0 m7 F- c
no nameif6 W- o! m# Q% ~+ \# c. K
no security-level
4 G" F2 G0 u& n1 _ no ip address
/ v' s. [8 j% D9 y: E+ K!
( p& A+ ?8 J0 k5 ^ftp mode passive
+ u5 N; W; f# X7 ?6 f2 paccess-list inside_nat0_outbound extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
$ k% \) c7 t% A& faccess-list outside_cryptomap_1 extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
' X! ]3 p/ S: g1 r: fpager lines 244 F# m. ^" s3 Q! z! Z
mtu outside 1500" c( v8 i& {; j
mtu inside 1500
4 z* p. d: x+ jmtu mgmt 15003 N6 ?, o1 ]1 M3 F6 p2 _6 w
no failover
& y0 K) N+ ~! f& F' \5 u# ?9 A/ Xicmp unreachable rate-limit 1 burst-size 1
! I7 S. S: s0 E4 k- |, V* R% k# @no asdm history enable
- N1 ]/ s1 S# J, j! `6 zarp timeout 14400
% W) A+ b8 j4 _0 D! H2 lnat (inside) 0 access-list inside_nat0_outbound8 \9 S4 t- [3 R
route outside 0.0.0.0 0.0.0.0 120.90.11.217 1
, j; I# B! h& K* R. Dtimeout xlate 3:00:00
. ^7 m0 X: b( b4 \timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02: H! d. U4 I0 D  U
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00+ s7 Z* [; X' i/ R! E
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
2 _9 [+ _3 p1 U# b6 ptimeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
3 O: ^& e4 D; o4 V' b3 s% ]( ztimeout tcp-proxy-reassembly 0:01:004 m' {6 b0 O& V3 h; I
timeout floating-conn 0:00:00
: O& h0 O9 C7 _0 K6 m5 W8 u/ Edynamic-access-policy-record DfltAccessPolicy
0 C5 U! ?! r' h2 s! X6 [, yhttp server enable
( i5 `5 M7 y* ihttp 10.131.0.0 255.255.0.0 inside
; n1 A6 z0 c. B2 b7 Chttp 0.0.0.0 0.0.0.0 outside
  H) Q% d) y: N& i- D- c' X/ b, r8 sno snmp-server location  T, B3 B9 e4 @# h; z" R$ Q: B) |7 e
no snmp-server contact  T$ R8 \! {  V: `4 b
snmp-server enable traps snmp authentication linkup linkdown coldstart
% n5 n" D2 T1 U2 Bcrypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac
: L) {: g$ z/ wcrypto ipsec security-association lifetime seconds 28800" ]+ `+ Q: X  f
crypto ipsec security-association lifetime kilobytes 4608000
/ w' a7 D, G& z5 M; L# fcrypto map outside_map 1 match address outside_cryptomap_17 ^& y' H( k0 l$ z
crypto map outside_map 1 set peer 116.247.91.98 / ^( C9 J. T2 K8 F
crypto map outside_map 1 set transform-set 3DES-SHA
( h, f% s) T+ t2 I$ _* P' {/ t5 H8 icrypto map outside_map interface outside2 P) Q" r' o: X3 K+ X  C& Q/ u
crypto isakmp enable outside
& y$ W% z# o( V; q7 d) E4 Gcrypto isakmp policy 1
0 e% T# [) u% ^+ O. T2 u authentication pre-share
, l! K  V; c; Y6 e4 S! y& \/ K encryption 3des0 g9 z' t  \* R. l3 ]" r' l
hash sha" t) s. x+ R( T$ l3 Q0 ?+ [$ n
group 2
  U& |; o- {- P+ P. [: A0 q( x lifetime 86400" \+ T) Y! D! [) G& N; v
crypto isakmp nat-traversal 50
( _  M8 y1 f* e8 ]: V" ytelnet 10.131.0.0 255.255.0.0 inside
: W4 @& ^# v% }6 w' `/ h$ `: ?& Ntelnet timeout 5' @9 ]) Q7 z/ Z) ~! U
ssh 0.0.0.0 0.0.0.0 outside/ c) W  T; a# N. y, D
ssh timeout 5
) K( n1 G3 U% }( H  B9 }console timeout 0* i% y4 u6 E  \  Q
threat-detection basic-threat
8 M) Q( Y% b: d# `2 j. Athreat-detection statistics access-list1 M) K0 B6 j$ n8 I* {! R9 `* R. B
no threat-detection statistics tcp-intercept( H2 w" x! ?4 p1 |, i. G
webvpn9 \# K; L$ b+ \4 p
tunnel-group 116.247.91.98 type ipsec-l2l
% ~! X7 G3 i. q  A% Utunnel-group 116.247.91.98 ipsec-attributes
; h# p. ?' Q7 Z! n8 x( v5 ~  h pre-shared-key cisco123
% N+ n) ]4 A1 J" L: h!
! ^1 c6 t6 V( Fclass-map inspection_default1 M2 |' p( G  p( ]2 @9 ~
match default-inspection-traffic% s; V6 n! x+ V# i
!, |9 m. |$ @/ h
!
! J9 j; |( C. E2 v2 i) {4 V' \9 Npolicy-map type inspect dns preset_dns_map
) X" E$ V! S) f6 h0 x  b# u, J parameters
% s/ t6 }: A$ o% H$ i; O message-length maximum client auto- M. @" g3 F, i$ p  D( L
message-length maximum 512/ M% F4 b4 f# G! f+ m( V
policy-map global_policy
# X$ ?7 n1 L) b& C class inspection_default0 G1 I# m& W, \4 {2 o  ^' _0 d& a
inspect dns preset_dns_map
; D1 P, j- k: w. y inspect ftp
/ y2 [" p# X1 u2 _8 O3 F inspect h323 h225
  H8 M( l8 t9 Y- p/ i inspect h323 ras
8 [3 p& H4 ?( C' [% U: R  w inspect ip-options
: e9 U' |3 n' A# R; S inspect netbios
2 `* `6 W7 v+ }. F% c inspect rsh 8 J9 D) s* K- v5 n
inspect rtsp
6 Q0 L3 c+ V, d' r inspect skinny   r6 z. x# @. A, U
inspect esmtp 0 a3 X( g, Z3 ?+ x# [( t
inspect sqlnet
6 q- N$ e2 g+ ~2 G% \ inspect sunrpc 9 v( n4 z) ?0 F2 V1 W, k0 R* w
inspect tftp : a9 L# {) y8 ~4 k/ o7 K
inspect sip + d% X" x: o, K8 B) b* o3 V* ]& ~
inspect xdmcp
2 f- E+ Z% i8 O, C# m' ^!
$ W4 ^6 R$ r) A/ kservice-policy global_policy global4 D) u6 T) @) j+ h: w
prompt hostname context
9 Y2 q3 ^* q- h/ ccall-home reporting anonymous prompt 21 b' K* g3 \4 B) ^' L
call-home
' z# [- X9 ~5 Y, k6 P0 G5 g9 s profile CiscoTAC-1
1 n1 a$ }! k; G' g2 Z# j# C no active# |# |* x# j8 N6 P# r9 `+ ]3 |! L5 R
destination address http https://tools.cisco.com/its/service/...es/DDCEService& E1 }  t, |7 l( X& f: e7 n( W
destination address email callhome@cisco.com
8 t0 B- n, N! Y; ]- N! y destination transport-method http1 R/ z: {9 G& S6 \
subscribe-to-alert-group diagnostic( U; }2 `* Z6 ]
subscribe-to-alert-group environment+ \; t' e* W2 h: D1 p2 M
subscribe-to-alert-group inventory periodic monthly2 j2 f/ M5 p8 h
subscribe-to-alert-group configuration periodic monthly
* U6 i$ ^8 a  S0 f subscribe-to-alert-group telemetry periodic daily
# a1 X  r, U: F. a. e- pCryptochecksum:afe923d8c20d3f2ffa7361be2ff946246 w: Z) Q9 U0 D. r# v8 z. f5 @
: end
  n" |+ R' p  A( f/ b& l
' l$ k+ @, l- [+ G7 c% a4 {6 S2 qTokyo防火墙配置:
& U& L! _" i$ v! x, e+ gset clock timezone 0
8 L3 a1 z0 ~1 m3 uset vrouter trust-vr sharable
/ M- M# V& T& [  S9 I% O4 Yset vrouter "untrust-vr"
4 f6 J4 b" r" l+ Jexit
* h. S3 w5 P) ]+ O7 ?set vrouter "trust-vr"8 _1 `- t- C5 \3 q" R5 h+ z
unset auto-route-export
6 b4 D0 J. _/ ?0 A+ k) o5 L$ D7 Kexit8 A' B0 W- Q& ^1 T' I) A
set auth-server "Local" id 06 `0 z# j0 Q" t- @9 H5 |8 T
set auth-server "Local" server-name "Local"% _9 |- g4 z: F( O) m
set auth default auth server "Local"
. u2 @; K& p5 U6 q! y' o7 o) Wset auth radius accounting port 1646
1 M8 N& _& S7 ]/ ^9 kset admin name "netscreen"& Z& j. z/ [' m
set admin password "nFWvH6rLAaPKcedPuslBexMtM8P5yn"! R+ q0 L# _0 x" M, _' `$ H
set admin auth timeout 10
$ t% q3 Y8 t6 q! xset admin auth server "Local"
3 T* f& i2 E/ a* c) g* jset admin format dos
9 C7 v/ @/ d: l7 r: Eset zone "Trust" vrouter "trust-vr"
* j0 D% V% L- O: ]1 Zset zone "Untrust" vrouter "trust-vr"
' p$ V: V# w- C/ a. g6 eset zone "DMZ" vrouter "trust-vr"- S& d9 D( ~$ J! ^) f$ D
set zone "VLAN" vrouter "trust-vr"9 u7 ^5 n. |& t( j# _' i
set zone "Untrust-Tun" vrouter "trust-vr") b7 \+ Q4 ?, ~$ F1 I
set zone "Trust" tcp-rst 8 H# w0 f! ]7 Q+ x. Q' T' e% }
set zone "Untrust" block + z  K6 [& i' m% {
unset zone "Untrust" tcp-rst
7 h  v" i! ^) n* m! ]6 X  aset zone "MGT" block
3 ]$ O( D2 ?; u, k; v" y4 mset zone "DMZ" tcp-rst - a+ b5 l1 |: N" e/ H
set zone "VLAN" block * M2 b# Z% w8 E3 {+ o+ m1 ?$ }
unset zone "VLAN" tcp-rst
% R% `$ F+ z& T% @+ Zset zone "Untrust" screen tear-drop
9 n) q" i! D9 l' U! y2 t1 rset zone "Untrust" screen syn-flood5 \" X" C* T; h) f1 B8 R' g
set zone "Untrust" screen ping-death
2 G$ }2 c$ u7 D3 ~7 w8 N* C7 Fset zone "Untrust" screen ip-filter-src( }% r0 R9 Q) A$ U% E
set zone "Untrust" screen land
) @3 H- A7 d% aset zone "V1-Untrust" screen tear-drop6 R" @- Q7 X* |
set zone "V1-Untrust" screen syn-flood; B, }2 a! o2 U  g9 O0 }
set zone "V1-Untrust" screen ping-death
8 K! X; s. u) Z( D! \- u& nset zone "V1-Untrust" screen ip-filter-src
. |, C& z6 |. E- v* N( p" U6 ?set zone "V1-Untrust" screen land
/ ~% |! t( m( p9 l2 qset interface "ethernet1" zone "Trust"
9 h0 D9 f- d! F3 C& ]; _+ qset interface "ethernet2" zone "DMZ"; ~( R* s9 ~1 e" ^0 c1 s& K
set interface "ethernet3" zone "Untrust"
& y6 a( d: i% V' T! A% p8 `set interface "tunnel.1" zone "Untrust"
  j- }! T3 ^& a7 Z/ h& b' `unset interface vlan1 ip
+ V$ a" B5 o8 a3 X) Q7 mset interface ethernet1 ip 10.131.201.254/24, S- B! \/ }/ O1 k
set interface ethernet1 nat* D0 M% {: X2 e4 N/ T) u, N
set interface ethernet3 ip 140.206.34.178/30
  o$ ~! C; u& Uset interface ethernet3 route
# u  X: k* t. `% ?set interface tunnel.1 ip unnumbered interface ethernet3+ {0 s, u1 }! m3 B7 @
unset interface vlan1 bypass-others-ipsec
( Z' {5 C" H; h5 y/ [% qunset interface vlan1 bypass-non-ip, `; ?+ G- y" A) R( e6 y
set interface ethernet1 ip manageable
+ `2 N1 E! b  oset interface ethernet3 ip manageable
* W7 |7 ]% ~; L7 Uset interface ethernet1 manage mtrace
! }- y; a. B8 g& Pset interface ethernet3 manage ping
, J' ^3 G# R9 o  h1 F$ g' e/ Oset interface ethernet3 manage ssh. C5 g  [. ]4 z8 h5 i" G( R& j% O$ G8 @4 ^
set interface ethernet3 manage telnet
8 v& ]) a( A( E, W4 Q" g5 E- r7 wset interface ethernet3 manage snmp
, ~- H, h8 T2 W( A* A0 }2 Dset interface ethernet3 manage ssl
7 `* h" p. \+ n+ Oset interface ethernet3 manage web$ X9 y% m" A3 I8 w# d+ f+ `
set interface vlan1 manage mtrace
, u3 b* ]2 I2 s. Aunset flow no-tcp-seq-check! m/ {2 i6 p; E. Y5 g
set flow tcp-syn-check, J: c. s) t- R8 K7 t5 W+ _
set pki authority default scep mode "auto"/ b: A# V# _9 z) f
set pki x509 default cert-path partial
9 I( {3 u/ z5 [1 _( s5 l; h* y; xset dns host dns1 210.22.70.3
) Q1 s/ K; C# e. H) m, ~, v' aset dns host dns2 8.8.8.8# u( v, |, |( u, u  X1 C: ]- J
set dns host dns3 0.0.0.0
8 D( q, S  w9 c( O4 T+ ~set address "Trust" "Trust_LAN" 10.131.201.0 255.255.255.0
5 D# ~8 Y! E$ _  P9 E; p# _( gset address "Untrust" "Chicago_Office" 10.131.0.0 255.255.128.0
- v2 K7 V$ P# N( a8 B' Rset ike gateway "To_Chicago" address 116.247.91.98 Main outgoing-interface "ethernet3" preshare "Bx6bVuxrNEq2qBsVGyCJ3mFx53nxEKiYVg==" proposal "pre-g2-3des-sha"
' t. T6 U6 o; C9 C0 @3 `- _  Z. Cset ike gateway "To_Chicago" nat-traversal* z9 f( n/ ^* I: P: k
unset ike gateway "To_Chicago" nat-traversal udp-checksum5 m2 h3 P- \1 I4 @' F/ j
set ike gateway "To_Chicago" nat-traversal keepalive-frequency 0
9 P$ B1 t6 w. i0 D5 B1 P4 H% jset ike respond-bad-spi 1
* N6 u& M- P. Tunset ike ikeid-enumeration
0 O$ N4 j4 V% c( X1 Y& yunset ike dos-protection1 t) C% R* M; U' l- t
unset ipsec access-session enable
: d; ]8 S. S  d5 A! A% \set ipsec access-session maximum 5000' P2 \/ n- G  Q6 a
set ipsec access-session upper-threshold 0
. j3 r. |- _$ @: d; }" |) Iset ipsec access-session lower-threshold 0
" c" X) W) r3 |. r4 v6 Iset ipsec access-session dead-p2-sa-timeout 0. Y! [2 l0 t- M8 l6 f
unset ipsec access-session log-error  \5 ^+ ~0 j7 {, ~# b/ u8 I
unset ipsec access-session info-exch-connected
1 a; n" n% B3 ?+ U+ uunset ipsec access-session use-error-log' ^- O. i; H  g9 H, ]
set vpn "Tokyo_Chicago" gateway "To_Chicago" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-sha"
) M, N+ e& h7 p$ j6 {; H8 uset vpn "Tokyo_Chicago" monitor
' o# V3 A7 l# [$ e) `7 Kset url protocol websense2 C& c2 n9 ~# u( u/ E
exit
. w$ m* a' L8 F. T* Bset policy id 2 name "To Chicago" from "Trust" to "Untrust" "Trust_LAN" "Chicago_Office" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 4 log # s2 X' X# }' p$ C: {
set policy id 2
* H$ P9 m; A3 Z+ t5 A7 Y# p2 n( iexit! u) X& }. I; i  o
set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit - y' e5 P& j+ D# N6 |
set policy id 1
5 B% o: |7 z5 K5 }8 [/ O2 Gexit
2 r. [' }6 _" V$ rset policy id 4 name "To Chicago" from "Untrust" to "Trust" "Chicago_Office" "Trust_LAN" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 2 log : Q6 a; s3 _4 v$ f9 k
set policy id 49 M! v. F' i# x" w  q+ Q+ z  M' b9 Y
exit# s* Q) Y7 R2 m- c% U: c
set nsmgmt bulkcli reboot-timeout 609 u/ G6 a$ P, J. g6 x
set nsmgmt bulkcli reboot-wait 0" f* G9 x: t1 E3 g$ P
set ssh version v20 Z: ]$ x1 n9 I7 ?; p  m9 @5 G& j
set ssh enable
6 [7 ?0 F+ s' V" S6 q$ {1 n4 u* xset config lock timeout 5
9 ^5 q. Z- [! |: j' ^set license-key auto-update6 V& Z! O8 N4 j- S+ |1 y* C
set snmp port listen 161% g0 q& e1 M" ~/ ?+ Z1 ^
set snmp port trap 162
5 g5 w. v; c' J& N1 Q' u& L7 @! L: cset vrouter "untrust-vr"
* M7 ^1 T  d* y0 Gexit
$ U' g/ Q4 f2 i$ Z" I) {8 Y: dset vrouter "trust-vr"
0 S1 _1 r7 j/ }5 a) V* d& Lunset add-default-route
% W! t' d# Y. |; j( G3 u  Zset route 0.0.0.0/0 interface ethernet3 gateway 140.206.34.177( _' K: Z1 {* E/ K
exit: c3 X0 W. M) M* e. Z7 O3 R
set vrouter "untrust-vr"
. p0 K& }2 L" ]8 \3 R/ k+ iexit
" [  L  x% Y0 y2 A0 cset vrouter "trust-vr": g/ l4 w) D8 z+ Z+ ^/ r2 t$ D: F5 k
exit
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

hongwei [Lv4 初露锋芒] 发表于 2013-6-15 00:49:06 | 显示全部楼层
把Chicago的ASA换成Router2811也测试通过。" m; T  i- _& U, l
' Q9 ^+ ^* ~. n' k
!. K9 d3 H+ z/ A
version 12.4
/ Z7 ^' Q) @8 W; O( h( xservice timestamps debug datetime msec
, b9 g' C* z% y1 H$ fservice timestamps log datetime msec
& u* p/ z! w& h/ {no service password-encryption
0 R  f3 G+ B9 T% P; b!
9 ^4 J2 N& @' ]$ z5 C# ^8 M% Bhostname Chicago2 G% h5 h3 x1 L
!
. t6 H! [  `- C' Sboot-start-marker
3 q7 p/ Y3 k. d+ {" F; y9 bboot system flash c2800nm-adventerprisek9-mz.124-22.T.bin
2 z# H% Y  T- k2 h7 h: j5 i1 a* aboot-end-marker6 Z( i7 N- {1 j  d8 P
!8 \. H4 M1 ]# c7 ~  q) \# E
logging message-counter syslog
: c0 e- ?3 p$ q1 ~0 C* `& G! Nenable secret 5 $1$iG6R$6L/igglma1qBU30KG7YOM0( h  k+ `! V' E$ E' R
!
2 k0 }8 k, u1 V$ K* h; H' hno aaa new-model
$ l' `  I/ I. F- \. f+ ]8 H8 X!& h/ [& V  F$ E- }, p
dot11 syslog
4 [3 N6 B5 E) Mip source-route
& W( b! k. s% e  ]- W( Z, W- q!
+ f; L6 x( y+ h2 i+ }' |* ?!
3 u$ t; L1 C+ j9 Q3 O- a$ c3 J% Pip cef6 m9 E$ U1 Z2 q2 U. P
!
( {+ U( p3 |9 u!
, t( b4 Q" K1 W: t$ ?no ipv6 cef  D; M+ x2 _) H% N
!
# ]2 P, ]9 v  D. Q$ @8 q1 zmultilink bundle-name authenticated
# p9 I& `; K7 w; ~' e6 i# z: V1 X!* t( Y& F" ~6 m$ e, w% T
!
' g# [2 C9 J# ^- V!
' E. b& s0 I9 X" g. a# Y!; k& |" q" S; q* S( i
!- q4 h9 u& ~+ n, |6 l( @
!+ h! t- ?' Y4 X2 D4 s1 S1 ^& e" w
!
. ~- C* g2 c% I6 X) K& B!
  V) E; W- T2 ?9 k5 n!
% |1 y' H0 \' z" Z% X' }& L. }!
/ m: c. P$ c9 Z: Q! t6 g* S!: I. P! A$ t4 {5 f
!: X& N$ @1 {4 b; F' ?$ k5 u7 N9 C) s
!" p( k2 [, R. m! X* f2 y
!! a% Z! K- w# c% \) y4 D- o
!# |, Y2 R" j  U; \5 l. _  q  L/ q
!+ W2 _% K: T3 `3 @* W" L: T* {
!
) [( d- q5 k! Z$ K!
0 L. E, c: o8 B6 s0 b/ S% f!" Y% v& V9 L* F2 v: Q
!3 a# ~: o6 p$ i- {7 Y
!
1 S* X3 e% p* e. v" F; ]!
: O: J6 V& c$ N) Qvoice-card 0
9 o( P& S, _/ X5 S7 K1 t7 Q!
; P- M( o) t6 K9 c" V9 {6 r!
8 n$ |+ t9 [) _4 Q( _!& m8 w' e3 y9 d& r% @; y& V
!
7 _" ^1 B9 Y8 x!
3 G; ?  o6 u9 H" [vtp mode transparent
2 ?0 N- Z  C; Narchive2 H; o! P) Q# b4 _7 `7 v' N4 h( Q
log config
7 m1 C" g5 r6 c- }! b' F  hidekeys
4 X% B% c7 h' N# x6 O; z9 h! J- A) O! 9 @: U/ l. g  v9 @2 u
!
$ I) @- {- X3 Q0 ]& F7 k3 Wcrypto isakmp policy 17 _9 q+ G8 V1 D# T
encr 3des
' S$ p( B8 j) k0 t( o5 { authentication pre-share
) P  _; m5 e- e' C' ~4 h+ Q group 2
  c$ Q5 P$ q3 U. Ccrypto isakmp key cisco123 address 120.90.11.218+ k3 z; o$ V- n2 @
crypto isakmp key cisco123 address 140.206.34.178
6 k8 T; g3 V( `  t$ u( {!
# J, \. W, V: j" e!
8 P& p; o0 C0 F3 S+ q0 \crypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac * J6 s. f/ {: P) q( {
!1 u: d# w+ [& P2 A
crypto map outside_map 1 ipsec-isakmp
+ y7 u+ @4 k; Q' P3 o% G; R set peer 120.90.11.218
6 d, B3 `4 t# f! R" P$ F set transform-set 3DES-SHA , K% F+ m: u2 G& P" ?0 E4 o9 B
match address outside_cryptomap_1
( D/ q" X& T, jcrypto map outside_map 2 ipsec-isakmp 7 D) m5 d% C  A5 _; s" T
set peer 140.206.34.1788 {2 s4 O: U! A/ B
set transform-set 3DES-SHA
: Q# ~, [; C; w9 H match address outside_cryptomap_2
% |, e, y! J8 d0 u!4 Y7 E' T  @( t
!3 U& a: A; W3 F: m: h
!
; u$ k6 R. d$ l) d. m# F* |!
' ~3 k, s; _! ~1 e!9 V4 P7 G+ `, _) s
!
& }) W) `0 K, T) g% ]!4 w, q3 H- Y( A9 e+ w
interface FastEthernet0/0
# b7 c; E/ Z) s$ F$ b& h9 S ip address 116.247.91.98 255.255.255.248
7 v0 p5 H% k5 B  ~$ _" b# ` ip nat outside! Y9 g6 X3 s6 {5 a
ip virtual-reassembly5 h: ^& e! e; I$ \9 F" A8 O; ^
duplex auto2 M8 j7 K1 H/ p4 S7 s5 R
speed auto
. h0 E8 v4 ~% i( K5 B8 v2 A crypto map outside_map
$ r- ]4 y4 g# f- P!  K" Z2 l4 T) z5 y
interface FastEthernet0/1) o" U9 i' d$ i: [6 L
ip address 10.131.126.51 255.255.255.240
- y$ H1 o8 G+ K9 k8 S ip nat inside- v) L6 O  j2 X: W3 ~3 A
ip virtual-reassembly- I9 I" s. z4 w1 z& C- O
duplex auto; {- ^/ a" T* K3 t
speed auto( j# k, P* b# P6 R% E1 ~# x
!8 s. K$ ]3 V0 S
ip forward-protocol nd& v5 c) I) f2 i1 [0 V8 W5 J& n% r
ip route 0.0.0.0 0.0.0.0 116.247.91.975 z7 K8 f3 b# |. I6 I+ W9 ?  C/ N
ip route 10.131.0.0 255.255.128.0 10.131.126.57$ A# e5 R0 S  R4 L; g% G
no ip http server
8 Y  M# k5 T7 c  ~- y! a' U( kno ip http secure-server; S( @6 Q2 ?  K- z5 @/ o" ?
!% T. u+ @$ O  v8 k1 g" m  Z
!
% Q0 k3 F/ e9 ~) y5 i7 N# m/ @ip nat inside source list inside_nat_outbound interface FastEthernet0/0 overload# J- c) B. t4 Y$ `, i5 ~, g
!+ x% I+ h) h% N$ K! P
ip access-list extended inside_nat_outbound
, D! k$ X/ @: R5 z0 y deny   ip 10.131.0.0 0.0.127.255 10.131.200.0 0.0.0.2555 c9 R" N2 C7 ?8 M$ _
deny   ip 10.131.0.0 0.0.127.255 10.131.201.0 0.0.0.255
/ c. @" l$ ?8 V permit ip any any* L* w( w" U! r9 F
ip access-list extended outside_cryptomap_12 n& s: H0 h: Z: x! q2 X0 {1 |
permit ip 10.131.0.0 0.0.127.255 10.131.200.0 0.0.0.255+ ?* B7 l7 @; ~) d  c+ u" j
ip access-list extended outside_cryptomap_2+ f) o) J2 [% Y. M
permit ip 10.131.0.0 0.0.127.255 10.131.201.0 0.0.0.255
. Y5 o& k% o7 Y, _!/ l2 C+ z: A5 ~
!, {4 |  C& {0 }( ?7 k- [. G
!  i7 t( o% }0 i; ~: s  k* w
!
. f0 J% w3 d5 N7 q!
+ f3 s) v, y* ^5 Z  a!% j5 G7 X  ]- N6 l* {# P7 d* l
!
8 P$ R! r0 K1 s3 @' u: j; W, q!
& E% k5 Z* C* u/ @2 K" rcontrol-plane; F& v; Y0 U( D
!
* d7 J# E* E* _!* E- N7 Z) e1 {" I% c" J
!
% N1 ~6 h- _& a+ ~ccm-manager fax protocol cisco
6 @* b. t9 i  d!
; n- V7 _/ Q9 X; O2 i: l( lmgcp fax t38 ecm% ]2 H6 i/ `2 n( ]4 H3 S0 l$ D: V/ f
!: r9 W: ~8 ?- ]3 `
!1 ]0 j3 W* p% L8 w  z9 U
!
  _& q. e6 @/ Y1 ]/ b. n$ ^  h!
7 E9 H1 O2 Z1 g1 Q" g* P, c!2 c) V7 X- _" n3 s0 _2 q- d/ }; ]
!
5 n2 K# ]; _( ]/ W8 Nline con 0( R% V) L8 j# i3 R0 B
line aux 0
) H1 Z3 Z% x5 Y- R- \- F) E" tline vty 0 4! ?3 G  }, n& `8 b1 o! A- g1 Q  F
password cisco, Z- y* [7 m3 T
login& t: \$ }; a% c) I* ^
line vty 5 15
4 C( Q" e* S, L$ I7 H password cisco/ C6 K) T& i  q" z' P; W, v
login+ j+ W5 ^; ~0 C" g
!) Q2 y7 B6 u/ M: r: x
scheduler allocate 20000 1000- B4 b, K5 g& k/ R4 U
end
  ]- z( P$ N8 u1 q0 X* E6 i2 E" Y) M

8 Z  ?, i9 I+ q" oNew York 防火墙配置:
1 F( G* p( Q. `0 o) o& r+ i( Y: Saved* f1 d3 g3 E' r) \
: Written by enable_15 at 01:56:33.414 UTC Tue Jan 8 2013
7 `8 }  [9 |8 Q' k) I!
1 s% V9 j2 w, z, @; ~1 FASA Version 8.2(5) 3 a6 Q( H0 s( o! q1 c
!
8 B) m$ q7 [% W# zhostname NewYork1 }  q: r; t. x
enable password WrXP9uZExEcEnNI3 encrypted
( ?6 L) n* e. |. D8 gpasswd rk6YkHwBJrlS0iX4 encrypted
; |7 [- ], k% t& Enames
/ @2 [0 H2 n( g9 K: U4 R  `!7 V* H' C2 f( i3 _
interface Ethernet0/03 R% a  P' z! U
nameif outside
  y, s3 W+ e6 ~1 Gsecurity-level 0( v. ^  Q# B  n3 E  K: X. ~
ip address 120.90.11.218 255.255.255.248
4 J, `0 |% i, A0 C!3 E" B" C( ]+ q) w. w; m
interface Ethernet0/1
5 x, _" B& b1 n2 M9 [3 Knameif inside/ w( W! D% H$ s" S6 ~5 G& v
security-level 1005 G  {9 H* n- l; X) ^5 F
ip address 10.131.200.254 255.255.255.0
  M1 Q% \) F! D3 V, \7 o( K!) U7 P1 G% ~$ Q3 G+ }
interface Ethernet0/2) E, i3 D+ I. T8 [% X0 a
shutdown. o4 l5 Z! ]/ K. g
no nameif) U7 s- u" T) V+ E# f# _0 m
no security-level
! F+ s) o4 H, T6 Nno ip address4 |, R; T5 ^8 X7 {' ^" m# ^$ K
!4 W6 O* h$ `2 F: ^' _2 U4 U
interface Ethernet0/3
. P1 N1 H- U, z6 C- c# P2 Cshutdown
9 s& g$ [' M/ n, n$ B  \# ]: R0 Gno nameif( {% U- P0 t8 j* N# r3 o/ p" ^2 i$ U
no security-level
9 N! V: K# ]1 V: ino ip address
- {0 J4 I: Z7 y/ w!
# Q; E% [" r8 r: K; g# y6 \1 ?interface Management0/0
2 c2 Q7 Y9 K$ d: F* ?2 P% D' lshutdown5 U0 Z+ k) u* f, d: k, K
nameif mgmt& N8 n7 A* ]3 G% p6 z
security-level 0) Q& E1 y( T, m% s/ i7 h
no ip address
% X( n4 X5 M7 R5 p!
7 P* w0 N0 [. s* z2 pinterface GigabitEthernet1/0
- `. f* ], @( K. t8 H& l' X# M- @7 \shutdown
6 v  t4 U# A' sno nameif# s' X  G( {: R1 }
no security-level
3 r( q+ O& A' w* Q9 }3 P8 Wno ip address
" M! e. r0 W5 Y! ]# m; V: p$ l!
0 `1 V' i9 v, h6 @' y5 z) W! a, minterface GigabitEthernet1/1
! f: C) y! P+ U3 `9 d3 d+ K0 Ushutdown
! W: o2 z! n) K( Q2 Z! h) G0 Zno nameif$ m+ _$ V( D2 X/ o6 N! ?: ~( I
no security-level. y! v7 A0 b7 Z2 |
no ip address" c+ E! O3 x9 L+ M
!
$ w9 h6 x3 [5 R8 m4 x" g1 l7 `interface GigabitEthernet1/2
% ]& O4 U/ N+ H! J& U- ^0 P0 W9 _( P9 yshutdown5 ^( X/ v+ y$ l2 h( T# H; C# h
no nameif! Y, `" \% b9 r7 ?( _6 H( N
no security-level; h" f- b. [) f% ^
no ip address/ Q3 B# W/ v% N; z
!
3 ]3 F% x9 H' |7 y, iinterface GigabitEthernet1/3/ a) X! j( G  j4 H
shutdown
% c. P, {5 K: B8 M) ]/ B, zno nameif  d' X$ Q3 _. L, I- o3 t
no security-level
0 J' s+ h& [9 U' C4 `( @no ip address
" \( V9 e0 Y. C0 d$ A0 N!
5 D3 C0 o+ x# Yftp mode passive3 R6 j  y% L' L8 Y8 _' q+ s" \
access-list inside_nat0_outbound extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
) I( C: b0 A/ h- I' Waccess-list outside_cryptomap_1 extended permit ip 10.131.200.0 255.255.255.0 10.131.0.0 255.255.128.0
$ t7 \) N3 Y. Bpager lines 24/ I+ Y0 A' ?  t6 ?
mtu outside 1500$ z8 J3 s# H4 m
mtu inside 1500
2 T& s0 i6 x7 v# N3 B' T1 dmtu mgmt 1500. q2 M1 ^% d& c& W8 X% R3 a
no failover
7 Y3 ?& g; U' V) yicmp unreachable rate-limit 1 burst-size 1* T+ z& ^* ]  W% t# n3 N
no asdm history enable: q; o! s1 Z% p
arp timeout 14400
% V/ D7 U6 u  Gnat (inside) 0 access-list inside_nat0_outbound, `1 M5 W" W2 y% K. a$ L( a- b
route outside 0.0.0.0 0.0.0.0 120.90.11.217 1" g5 ?& \$ O* g/ u) {- P
timeout xlate 3:00:00# ~$ w5 l$ W+ X' j- i
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
; \1 q/ R2 u2 F5 k$ ?& itimeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00( i; p0 Z# q! d9 V( t
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00+ G4 X1 G9 u8 b/ M7 X
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
5 L. g* F+ J2 R$ [! P) ntimeout tcp-proxy-reassembly 0:01:00: G2 h( |2 \! v9 K- D; ]- j. A
timeout floating-conn 0:00:00
/ w( M$ ?3 D! C5 B. Zdynamic-access-policy-record DfltAccessPolicy
, g! }" L# ?! [http server enable4 s% Q9 D! F2 r. P8 @1 \& |; J
http 10.131.0.0 255.255.0.0 inside4 `  U7 q, d( l# O3 m/ _7 G# k
http 0.0.0.0 0.0.0.0 outside6 {0 e# r* u7 _" m; V; h
no snmp-server location
0 }7 w3 ?; F$ N/ U" S/ ?3 ^$ G) H) Uno snmp-server contact  B) ]. q8 ]8 `7 l( x
snmp-server enable traps snmp authentication linkup linkdown coldstart
4 ]0 t- k2 m& ]: y& Scrypto ipsec transform-set 3DES-SHA esp-3des esp-sha-hmac 7 v+ a7 o3 `; r; {7 C3 Q
crypto ipsec security-association lifetime seconds 288006 P! g. k( |7 F
crypto ipsec security-association lifetime kilobytes 4608000
5 J. s0 w1 \1 @: T; R( r+ Scrypto map outside_map 1 match address outside_cryptomap_1
2 R/ u8 r6 ~* j  P5 Qcrypto map outside_map 1 set peer 116.247.91.98
3 i8 ]7 n' `" k# Ocrypto map outside_map 1 set transform-set 3DES-SHA
- O6 u# _/ E; x) G9 jcrypto map outside_map interface outside0 B5 R. B0 v$ p! i* z+ z3 ^
crypto isakmp enable outside' `' t# @4 q1 y) I2 E6 f0 o
crypto isakmp policy 14 j2 Y4 z! `, ]* |1 T
authentication pre-share  Q5 e+ T" t9 {) I2 g* V& |, ~/ V
encryption 3des
' [4 y" ?, ]7 j2 {hash sha; v. @1 D2 F: x
group 2+ l8 _. |* Z# G  a( w  V
lifetime 86400
( W, a' n/ ^* c5 T7 O/ X1 gcrypto isakmp nat-traversal 50
+ T  G/ l  L, r0 C+ Etelnet 10.131.0.0 255.255.0.0 inside$ W8 {  R* K; c1 V- {1 g0 f+ @$ H
telnet timeout 5
/ |0 E: p1 z& t9 l. ?) E+ C, Gssh 0.0.0.0 0.0.0.0 outside0 m; I6 W* T9 M1 P
ssh timeout 51 x4 W! q- R% {( s' Q
console timeout 0; m) ]; w5 O; N+ O5 ?. q& S& U
threat-detection basic-threat7 w* S7 `( R% T! t/ v; A
threat-detection statistics access-list+ ?, O' w! K5 Y4 W; O- m, Y
no threat-detection statistics tcp-intercept, \2 b+ L% o! |  r1 y6 ]
webvpn" O, [) C0 W% Q# _  U0 V
tunnel-group 116.247.91.98 type ipsec-l2l1 h9 M8 ]" n4 I# t9 _- v
tunnel-group 116.247.91.98 ipsec-attributes
, B2 }2 V5 `( q- X. [pre-shared-key cisco123% X% q9 k0 M2 S3 C
!' F0 I0 u" \' u3 s, `
class-map inspection_default
+ `: S* A  i- hmatch default-inspection-traffic
" P% \1 C0 w! |% a+ |!1 D: J% S- ?: l) r, W# X
!
! u8 t1 `. l9 M7 _* ?* opolicy-map type inspect dns preset_dns_map
& e7 u8 T7 w+ v; R. e. ?! P$ ]parameters1 a0 l6 {& [0 m
message-length maximum client auto
9 Q: }: _1 Q  x* u8 _0 gmessage-length maximum 5128 Q0 z- m1 |- i+ A& z1 J( S
policy-map global_policy& I2 E/ T  ]4 F/ Z
class inspection_default; o2 l4 l( s1 l, @0 c* D
inspect dns preset_dns_map & X. u8 b: ?) P
inspect ftp & a3 o8 T' o1 \5 e) ^- s
inspect h323 h225
  Y8 M1 W! H! V4 G  W* f2 E  W; zinspect h323 ras
! o$ I2 e, w5 m8 a3 E3 ?inspect ip-options
3 d( W, O9 O% J7 u# v* [. \2 T- J6 [inspect netbios
- J! {& P) J4 b: N* Uinspect rsh 2 ]. M4 I  `' [" M" v; }. q* b
inspect rtsp
0 }3 K, D) Z' b2 ?inspect skinny 5 e- X; j. G# |
inspect esmtp $ n/ _* S$ M1 T' _% F
inspect sqlnet 6 m( Q- A: q5 Z! B' K) m
inspect sunrpc
  x) ^* t+ ~! Z! {inspect tftp
: A6 J2 S5 M9 q. ~inspect sip $ k5 U, ?/ @! T: ?- L  u8 M
inspect xdmcp 9 ^7 \' k4 x' [0 V/ @
!$ y) S, g' |' M- V% N
service-policy global_policy global# [6 X* Z8 C7 w, j# ~
prompt hostname context
8 N2 D) `  |9 U- bcall-home reporting anonymous prompt 2+ o) k. S, J; u/ F
call-home, X" i- ^! D8 ^9 @% @- j% T
profile CiscoTAC-1
% S& I+ o' `; W7 ~# ?; eno active8 b3 G/ M1 Y  S! [; D, R7 i
destination address http
- K( ]- k" {# R; s& Gdestination address email
- m: ~: Y  k3 ]  o8 fdestination transport-method http- b' a$ H# @8 B& [  {  W$ r
subscribe-to-alert-group diagnostic
! F8 F  K" c/ R9 asubscribe-to-alert-group environment, K2 Z, s: q: B
subscribe-to-alert-group inventory periodic monthly! J! N+ G& S) N% d6 J9 F' p
subscribe-to-alert-group configuration periodic monthly0 U( H. y" \% Z- G. j/ n
subscribe-to-alert-group telemetry periodic daily
# W5 K: u+ ]7 r  ^! q7 cCryptochecksum:afe923d8c20d3f2ffa7361be2ff94624
# k+ Y6 _( P7 |) u: end
' J9 ^- J. W0 N# O9 k1 D; {3 T" }( a4 r
Tokyo防火墙配置:" ^0 _; P* p8 _* ^. j
set clock timezone 04 s9 @; Q" y7 v0 ^, R
set vrouter trust-vr sharable
! [6 s% S: D* Xset vrouter "untrust-vr"
$ a1 X8 R4 r6 k1 f( J  x; Dexit
  k% a: \3 B. k" j  w. R2 nset vrouter "trust-vr"
; ]9 V5 m2 w3 zunset auto-route-export$ L; w* ^& G% g+ s5 e
exit
* Q8 L% e; ~: B" p: uset auth-server "Local" id 0
& a6 H( q* }8 v' F3 w4 Oset auth-server "Local" server-name "Local"
5 Z  p( Z; g& i# C9 x' mset auth default auth server "Local"+ s. ]+ l1 o+ J' B
set auth radius accounting port 1646% l  c. X7 b; f' Y0 f  u
set admin name "netscreen"
. w1 T1 v5 \4 a! Q4 E9 x+ b8 q$ Lset admin password "nFWvH6rLAaPKcedPuslBexMtM8P5yn"
( Y6 R  u& l, r/ E: ]set admin auth timeout 10# k# x* e( Q) ]& x- t
set admin auth server "Local"
8 {# l. p, `/ l. oset admin format dos
, o" E7 O. V  E$ Fset zone "Trust" vrouter "trust-vr"
5 Q- Q6 ?! n8 N$ oset zone "Untrust" vrouter "trust-vr"
: ~# j7 F- x+ ^" A  F. e0 j% P& Sset zone "DMZ" vrouter "trust-vr"6 H7 L1 F7 f% p: l! C) m
set zone "VLAN" vrouter "trust-vr"
, c$ n8 K! b' U3 J6 h0 ]* Uset zone "Untrust-Tun" vrouter "trust-vr"- P5 N9 M8 p/ U) {& f& `, F
set zone "Trust" tcp-rst
, w1 A  G+ u& a2 gset zone "Untrust" block 2 P1 G7 p& \) x
unset zone "Untrust" tcp-rst
4 t8 F  o% E7 f5 t& }* ?, qset zone "MGT" block
6 Y/ `+ k( e6 A7 lset zone "DMZ" tcp-rst
3 b6 y% V  u) _+ g6 H5 ^3 @( Mset zone "VLAN" block ! K$ }$ T1 C/ C
unset zone "VLAN" tcp-rst + y( l% f# [, w! x! w
set zone "Untrust" screen tear-drop
* ^  ]  Y' `2 }2 w3 hset zone "Untrust" screen syn-flood& V0 S) k! O; m! W
set zone "Untrust" screen ping-death
* K1 x0 [$ y3 K; {2 Uset zone "Untrust" screen ip-filter-src
5 \+ Q8 d) |, N5 W& tset zone "Untrust" screen land
( J7 y' m, E" {. Y, C7 C9 Dset zone "V1-Untrust" screen tear-drop
: N$ m" K: T# A2 I8 k" W, N' H- Uset zone "V1-Untrust" screen syn-flood
  M5 A% S/ i$ v. h8 Hset zone "V1-Untrust" screen ping-death
4 w( I% `6 C! w( w) v: Tset zone "V1-Untrust" screen ip-filter-src
( [: Z( C5 B2 B" y! r0 c3 Oset zone "V1-Untrust" screen land- J( [3 g; l0 P, O% \  G
set interface "ethernet1" zone "Trust"
  ]# m- m! n+ Fset interface "ethernet2" zone "DMZ"7 O( l+ }: O; f/ a8 N6 z6 d
set interface "ethernet3" zone "Untrust"
! S* u/ Y9 w1 H' _/ `set interface "tunnel.1" zone "Untrust"* |8 K: d) w2 j) k% h- h% t
unset interface vlan1 ip
6 ^* |, v% w% @1 [" P; sset interface ethernet1 ip 10.131.201.254/247 q/ A7 q0 }- i- c
set interface ethernet1 nat7 l+ M9 s/ Z  T2 d9 O
set interface ethernet3 ip 140.206.34.178/30; S- d- o: Q# ]9 A
set interface ethernet3 route
  j6 C6 s3 D+ b. x& |3 [set interface tunnel.1 ip unnumbered interface ethernet3
9 c( G: V5 G% x% H: h/ wunset interface vlan1 bypass-others-ipsec& \! ?' S# ^8 @7 i
unset interface vlan1 bypass-non-ip
1 f9 P6 _* i& \: ^* pset interface ethernet1 ip manageable
. }0 J9 c/ @& f0 U$ Vset interface ethernet3 ip manageable" @# X- [7 o1 y: Z( }7 N" r
set interface ethernet1 manage mtrace: g! ]. C) i& d: @" \1 P
set interface ethernet3 manage ping0 t- t- V, Y' L  E7 X
set interface ethernet3 manage ssh
1 @1 A- y" k6 e  q0 q$ i6 rset interface ethernet3 manage telnet" Q( `2 ?6 S, V  A  K- E9 l
set interface ethernet3 manage snmp
" L  k& A  Q, b! y2 |) H; U& rset interface ethernet3 manage ssl
' k+ p* n- Q; s7 vset interface ethernet3 manage web$ \" n3 Y. |' h# `2 i; ~7 b5 K
set interface vlan1 manage mtrace5 R& @/ p- c4 q( `
unset flow no-tcp-seq-check
% w6 J% v2 _4 M9 y: Eset flow tcp-syn-check8 ~' f2 a7 k4 O, ^
set pki authority default scep mode "auto"5 j2 K+ X* _) ?  ?2 _8 N2 ?" S
set pki x509 default cert-path partial
5 {# I  p  H7 I8 lset dns host dns1 210.22.70.3& z1 n9 M2 o& M1 j3 z! O- R  b
set dns host dns2 8.8.8.8
3 x( z; y8 P7 H7 _; V/ O6 Mset dns host dns3 0.0.0.0
  S9 d7 ?' W* L- cset address "Trust" "Trust_LAN" 10.131.201.0 255.255.255.0
- g* `% A( `3 Z8 Tset address "Untrust" "Chicago_Office" 10.131.0.0 255.255.128.01 `) ?  w6 h4 ]/ O
set ike gateway "To_Chicago" address 116.247.91.98 Main outgoing-interface "ethernet3" preshare "Bx6bVuxrNEq2qBsVGyCJ3mFx53nxEKiYVg==" proposal "pre-g2-3des-sha"
- Y* i( d9 K3 F* n6 A, bset ike gateway "To_Chicago" nat-traversal
8 i' y/ D- n7 i- i; ~+ Munset ike gateway "To_Chicago" nat-traversal udp-checksum
2 A$ K" J6 o/ i4 tset ike gateway "To_Chicago" nat-traversal keepalive-frequency 0
/ _% }2 I$ u0 C) G/ k/ H, qset ike respond-bad-spi 1
, c- t' ^% ~/ J/ {+ ounset ike ikeid-enumeration
$ N4 R5 O' V; a3 t  s! y- Z8 w" Xunset ike dos-protection7 Q* o  m9 e- D* d1 t+ ]
unset ipsec access-session enable- Q/ `6 o6 n( }# D# f3 Z
set ipsec access-session maximum 50008 A: `6 Y4 f* P- ^$ w
set ipsec access-session upper-threshold 0
' H7 A! q* d& t/ iset ipsec access-session lower-threshold 0
# Q* ~% K7 e, t/ a3 }2 Mset ipsec access-session dead-p2-sa-timeout 0
& M* @) E( O: punset ipsec access-session log-error6 {# I2 {7 F! S! r: D
unset ipsec access-session info-exch-connected! f2 S% F8 X. p% l
unset ipsec access-session use-error-log
: ~3 w* J0 _9 Y  nset vpn "Tokyo_Chicago" gateway "To_Chicago" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-sha" ' W* }; `* h# o' n5 l) m8 i, @# O
set vpn "Tokyo_Chicago" monitor. q/ F1 P4 f" Y/ e1 N
set url protocol websense& E. s( f1 ^+ M$ e! {: y5 d  ~- i
exit" a7 J0 @- V3 ]  V& A6 v4 Q
set policy id 2 name "To Chicago" from "Trust" to "Untrust" "Trust_LAN" "Chicago_Office" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 4 log & @- f# V6 E  W, A. }8 N) J
set policy id 22 l2 c3 c" |: v% z
exit
( z* j4 ^# m1 U+ Nset policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit
& y2 }8 I1 G  i& [set policy id 1
9 @# W& p) v4 |2 V% pexit2 _( x, S* u$ m! V
set policy id 4 name "To Chicago" from "Untrust" to "Trust" "Chicago_Office" "Trust_LAN" "ANY" tunnel vpn "Tokyo_Chicago" id 1 pair-policy 2 log
, B8 Z7 j, q2 }7 [. m% U! oset policy id 4
/ {9 b5 {; Y1 }. n) [exit) d/ R/ ^# Z: t, d9 ^
set nsmgmt bulkcli reboot-timeout 60
. |* p' J1 s- ?2 Gset nsmgmt bulkcli reboot-wait 0
, s8 f! ?& m4 X) h$ J$ y: v+ lset ssh version v2* o! P. D! M/ e7 w+ _0 K
set ssh enable1 O! f9 Y# l, ]' j# R3 D
set config lock timeout 5- v$ ^$ D0 G6 d' e' S6 I, G
set license-key auto-update+ h8 ]6 a7 r4 y( {0 V2 x( N
set snmp port listen 161
0 Q0 r4 k9 ~# C9 p: w7 @" Cset snmp port trap 162; ^( S/ ^# d# ?' [: D) s
set vrouter "untrust-vr"# a2 w. {' K8 G- e" V7 h
exit
9 F; T/ L) p& X0 K0 O# T$ nset vrouter "trust-vr"  |3 I0 w* K+ J* T8 q. h
unset add-default-route
3 d# R; F7 \; z$ Q  gset route 0.0.0.0/0 interface ethernet3 gateway 140.206.34.177
2 L) d: g: ~% V$ k0 ^3 ?0 {! T! mexit
2 C( [( ~/ [- S. B; E# t4 H2 g" Uset vrouter "untrust-vr"
& x5 G( q- x( u, u" s0 r+ J( lexit
" F# ^+ P$ o, }set vrouter "trust-vr"5 h7 y" q% p' ]9 _( P  U
exit
回复 支持 反对

使用道具 举报

jshyxlz [Lv4 初露锋芒] 发表于 2013-6-15 00:58:14 | 显示全部楼层
這么好的東西,難道真的沒有人需要。
回复 支持 反对

使用道具 举报

blakis [Lv4 初露锋芒] 发表于 2013-6-15 01:24:09 | 显示全部楼层
其实配置是其次, 特别是这么完整的配置不用全贴出来。6 G( Y7 m, S: D* T% |, @" z
关键是理解IPSec VPN的关键点,phase1, phase2,transform set,ACL的作用,NAT等等。
; }: B1 j. N% X2 c, ^
1 r6 A( B. P! ~) ^还有就是异品牌间的调试,故障处理。往往还有专有名词上的差异要注意。
回复 支持 反对

使用道具 举报

西北风 [Lv4 初露锋芒] 发表于 2013-6-15 01:26:45 | 显示全部楼层
请问一下Cisco ASA与Juniper SSG支持DMVPN吗?
回复 支持 反对

使用道具 举报

wj_abc [Lv4 初露锋芒] 发表于 2013-6-15 01:27:25 | 显示全部楼层
請問一下有誰成功配過其中路由器端是動態IP地址的嗎?
回复 支持 反对

使用道具 举报

ainiyibeizi [Lv4 初露锋芒] 发表于 2013-6-15 01:42:29 | 显示全部楼层
net130什麽情況啊?發一個貼幾天都沒有人回啊?以前都非常快的啊!
回复 支持 反对

使用道具 举报

woshizhanwei [Lv4 初露锋芒] 发表于 2013-6-15 01:52:45 | 显示全部楼层
这是非常好的经验贴!
回复 支持 反对

使用道具 举报

serve [Lv4 初露锋芒] 发表于 2013-6-15 02:51:10 | 显示全部楼层
不耻下问
回复 支持 反对

使用道具 举报

wesson [Lv8 技术精悍] 发表于 2013-10-17 17:21:00 | 显示全部楼层
找到好贴不容易,我顶你了,谢了
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2025-6-14 23:36 , Processed in 0.126884 second(s), 17 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn