本站已运行

攻城狮论坛

作者: rockv
查看: 7442|回复: 57

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] ip sec vpn无法向内穿越nat,向高人求解

  [复制链接]
查看: 7442|回复: 57
开通VIP 免金币+免回帖+批量下载+无广告
1.网络拓扑如下图, t# t, W% d( O6 m* h" g

- r1 B. X  h" m% z" N2.CISCO pix515e使用PDM3.0配置如下2 G; z" U; R. z0 Z& H0 C

8 |! U' M8 t& _  I: z: r% i  F$ o+ @! U. a# @! x

! _% E0 x$ v6 S- r5 j( Y) k; ]2 |4 u# v

; v7 e4 X$ L. Y- y+ @# {2 ^7 w8 d

- P/ U: O0 @2 ?- c3 o3.拟实现的网络功能:公网计算机通过光纤、ADSL、WIFI、mobile等方式接入因特网,再通过windows自带的虚拟专用网拨号连接或者CISCO的VPN cilent拨入PIX515e内部的VpnServer,以实现接入VpnServer所在的局域网,共享局域网内的资源,VPN Server在内网测试通过。& o7 W+ J6 }; h# ~( r( Z: @. _, E
+ s. b% P4 U5 h# \4 T3 M3 B/ E
4.遇到的问题:公网计算机无法通过pix515e的公网地址向内穿越NAT拨入VPNserver。能否在pix515e上建立一条Vpn Tunnel以实现第3条的网络功能,该如何建立。1 C" J/ l5 o3 v  l- _; w, x
# n4 p4 s/ U3 _! t' y! J/ V  q# p! J
5.已失败的方法2 x; {, t; K4 y* u! R" ^- r7 ?

* M, }3 N- k- N$ p( o" E/ VA:端口映射,该思科设备通过NAT功能将内网IP转换为公网IP,不是路由器,无法做端口映射。1 j) u% F; ?; s! r

  m' J9 g1 s( f: l5 X; WB:在PDM3.0上尝试对PIX515e进行VPN的设置,未能凑效。
( k- `/ ]" z0 W% B
, L) ]( J& N% q0 XC:逆向NAT失败,PDM3.0不允许。
/ P* [) h% [& p; ^( I' G, {, P% C" @. \( Y; S  l8 i2 |% B
设备目前的配置列表- t) l5 z% ^+ a
1 s0 c5 |7 y4 p1 [7 C
Building configuration...
( C6 e! E* m! j- s1 ^8 O: Saved( S) t, u, b. }1 G( a) t/ H& y! M1 l; s
:
( B2 _' q- d4 R" [- \" Y' U, zPIX Version 6.3(3)
1 U' W2 {! S6 T& P, e* vinterface ethernet0 auto
7 @+ p% L3 r/ ]interface ethernet1 auto
, h2 c+ w; e/ [- r, t, P- \nameif ethernet0 outside security0
9 x: `: g6 D! B; @. I, e$ Z$ knameif ethernet1 inside security100
$ D9 [' s) x* l8 _: ]$ kenable password /NNcO2U/e4a3IAX3 encrypted; [  U) a; z/ p
passwd 2KFQnbNIdI.2KYOU encrypted
/ p/ W1 {5 J2 Zhostname huawei+ B8 }1 X( k% {7 W) h) Y
domain-name huawei.com( \( K6 P# {: H! {4 e0 P' m
fixup protocol dns maximum-length 512. P6 C' h. O  F+ n! D/ ^
fixup protocol ftp 21) [4 [& s" j0 e  z& b- z* s/ r# E
fixup protocol h323 h225 1720* Y3 m! x$ I! R6 T! I: u
fixup protocol h323 ras 1718-1719
: @0 }! R4 I" e" Kfixup protocol http 80* O  L# s* A) ^1 X( P9 s  N" n
fixup protocol rsh 514. k: x: e( h" |7 w$ z
fixup protocol rtsp 554
  J; m! [6 e+ Z) V- ~0 @fixup protocol sip 5060
! z0 a6 o! ]/ u% J  qfixup protocol sip udp 5060
9 _* R3 C7 Q, Q. dfixup protocol skinny 2000, A0 r; E- L. j8 o7 a% N
fixup protocol smtp 254 }) y( ?& X  N; ?; w; L
fixup protocol sqlnet 1521' P1 _8 R' o8 D8 M( {
fixup protocol tftp 69' y$ h8 d0 \% G+ K. z; E
names+ g) L/ E4 V/ H3 W! i9 s
access-list outside_inbound_nat0_acl permit ip interface outside 192.168.0.0 255.255.255.0 % B: |$ @0 I- Q! ]' X
pager lines 24* L* ]- V7 I4 X7 r  w7 M" n5 o2 b
mtu outside 15004 c! c! G' |2 a9 F6 I$ `% f4 w: t! T
mtu inside 1500
; I$ _2 e1 Z. aip address outside 221.XXX.138.250 255.255.255.252
! n& p0 H4 t+ W$ F7 Y9 gip address inside 192.168.0.254 255.255.255.06 N5 `7 Y. ~8 l
ip audit info action alarm6 ~9 I$ S8 X% N/ R
ip audit attack action alarm
/ U8 W& I; I) @) R; k  M4 z) Tpdm location 192.168.0.3 255.255.255.255 inside6 f% g/ q; S  A8 v1 T7 A7 ^* H. o
pdm location 192.168.0.24 255.255.255.255 inside. [, N" V  u( \. u2 N/ Y
pdm location 192.168.0.1 255.255.255.255 inside+ g& @) F: N$ ]1 {6 b, A
pdm location 192.168.0.2 255.255.255.255 inside$ |& P+ Z" S8 ~1 Y: E$ f0 ]
pdm location 192.168.0.12 255.255.255.255 inside1 S! ?5 C: K$ u9 h! b" a
pdm location 192.168.0.10 255.255.255.255 inside
1 h% J6 r1 |- d0 E( Y- cpdm location 192.168.0.16 255.255.255.255 inside7 U4 q) @( T$ S# }1 r# Q7 Z; v# r+ ?
pdm location 192.168.0.19 255.255.255.255 inside4 K& z( i" _3 |. b% E
pdm location 192.168.0.20 255.255.255.255 inside, r8 k$ Y8 X: \
pdm location 192.168.0.22 255.255.255.255 inside$ J' m6 B0 a$ w2 c, h; J
pdm location 192.168.0.23 255.255.255.255 inside
6 ^+ N* B  L7 b# y- |  ^4 Q6 q$ epdm location 192.168.0.34 255.255.255.255 inside
/ i! E  t' E& b; F! epdm location 192.168.0.38 255.255.255.255 inside( c+ k3 q% T7 l& I6 |; S; H0 v/ r
pdm location 192.168.0.40 255.255.255.255 inside
  \, l5 O7 P7 [; k1 ^* H' E% S  epdm location 192.168.0.58 255.255.255.255 inside8 C& c) k/ _! |, S
pdm location 192.168.0.17 255.255.255.255 inside
8 L4 J* Q; M, J8 Q0 ^( apdm location 192.168.0.39 255.255.255.255 inside
2 w, A( D/ a% `+ Wpdm location 192.168.0.41 255.255.255.255 inside
9 p( E" S1 Z* }2 z7 l8 e$ vpdm location 192.168.0.13 255.255.255.255 inside4 s- P& L# Z9 s2 n4 V# a
pdm location 192.168.0.42 255.255.255.255 inside
! g" c5 Z/ p6 \pdm location 192.168.0.45 255.255.255.255 inside* ^' k" @( j  V# B  C& x6 n4 g) U
pdm location 192.168.0.46 255.255.255.255 inside  W. t) v  i& v9 P3 s0 X
pdm location 192.168.0.47 255.255.255.255 inside
/ z% A: ?' K2 i+ P' x7 ?8 Apdm location 192.168.0.50 255.255.255.255 inside' L* N5 D2 F" X- a
pdm location 192.168.0.25 255.255.255.255 inside
* j, J! k8 `' m' l2 i$ spdm location 192.168.0.4 255.255.255.255 inside0 ?$ M1 D) O- k
pdm location 192.168.0.6 255.255.255.255 inside0 e1 X5 t: l6 `& c
pdm location 192.168.0.35 255.255.255.255 inside$ c) K8 {; m8 s' W8 w
pdm location 192.168.0.21 255.255.255.255 inside( k* C+ e& {' C0 c4 P6 ~
pdm location 192.168.0.200 255.255.255.255 inside, V6 K5 O; G: C* b5 g' t1 B  X
pdm location 192.168.0.48 255.255.255.255 inside
* M& x7 x5 g9 H0 _7 Lpdm location 192.168.0.60 255.255.255.255 inside
* X: x3 O$ s. |$ D6 |% m: N. G$ \pdm location 192.168.0.51 255.255.255.255 inside" {* ^2 q$ M$ O) b, u+ i
pdm location 192.168.0.32 255.255.255.255 inside# z$ S9 {/ Y. Y9 a# Z( M; t* y, g9 j
pdm location 192.168.0.18 255.255.255.255 inside
/ q' T( T0 F/ k5 v/ n- \pdm location 192.168.0.7 255.255.255.255 inside4 A5 z" ]1 [0 w' n1 }! }  o
pdm location 192.168.0.201 255.255.255.255 inside* i2 a' U2 Q5 Y0 _9 c  Y) l6 r
pdm location 192.168.0.36 255.255.255.255 inside+ c/ K5 c8 [& W. j3 B$ q1 _- w) Q- A
pdm location 192.168.0.100 255.255.255.255 inside
0 m4 D) M2 I. m% V3 t3 W  g; z  fpdm location 192.168.0.5 255.255.255.255 inside0 F9 ]4 W: c' B6 S5 z
pdm location 192.168.0.202 255.255.255.255 inside
$ j. O' A9 U, p3 s+ ]pdm location 192.168.0.26 255.255.255.255 inside
$ M; j  f( c0 I  `, X1 M# Rpdm location 192.168.0.203 255.255.255.255 inside
7 R. K9 H0 y, V- l, M* @: }5 Kpdm location 192.168.0.14 255.255.255.255 inside" m& ?3 H  p; H4 Q
pdm location 192.168.0.204 255.255.255.255 inside# n( B) _. O1 J$ Z# C' p% p- D* A, z, }
pdm location 192.168.0.251 255.255.255.255 inside
) i; s' K7 m( @pdm location 192.168.0.205 255.255.255.255 inside( A' I0 [7 B- `( l$ k
pdm location 192.168.0.206 255.255.255.255 inside
# S! v- }2 w+ o1 ?pdm location 192.168.0.207 255.255.255.255 inside" g1 d  f, W2 a, I/ Z2 I2 \* `; S
pdm location 192.168.0.208 255.255.255.255 inside
# V$ M+ r/ Y( e6 i# a$ N- o/ Bpdm location 192.168.0.209 255.255.255.255 inside
: W/ l! ?0 t1 M+ U) k- |. epdm location 192.168.0.108 255.255.255.255 inside2 E, s& `& g2 x+ f, [8 M' `, ~
pdm location 192.168.0.31 255.255.255.255 inside5 Z7 v3 Y  w! T3 W+ J
pdm location 192.168.0.30 255.255.255.255 inside
( `' H2 M8 P3 c6 N. B; h3 {% l, d7 bpdm location 192.168.0.210 255.255.255.255 inside
3 r) b" b# F" f, Spdm location 192.168.0.8 255.255.255.255 inside
' `; E& A7 j* O9 y. ^( _& ]pdm location 192.168.0.11 255.255.255.255 inside
- Q( v* l! t) B; }8 h0 k! vpdm location 192.168.0.29 255.255.255.255 inside; N7 m$ V, @' [
pdm location 192.168.0.109 255.255.255.255 inside. u- O1 d; S+ o9 H) u. f9 o
pdm location 192.168.0.111 255.255.255.255 inside& Y6 c2 l2 `; `7 z- k" L. Y
pdm location 192.168.0.116 255.255.255.255 inside$ W# s& y/ }' ~6 n; t, g$ J0 l+ d! @# L1 u. E
pdm location 192.168.0.113 255.255.255.255 inside% ]6 u0 e* l  J/ B. H& {; F
pdm location 192.168.0.107 255.255.255.255 inside
0 W' B/ ^& u( J2 t. R! ], cpdm location 192.168.0.240 255.255.255.255 inside3 o) d0 B: `( S
pdm location 192.168.0.241 255.255.255.255 inside
5 o0 x5 J3 X2 E. M5 q6 Ypdm location 192.168.0.233 255.255.255.255 inside- t& x* T9 P; c
pdm location 192.168.0.250 255.255.255.255 inside' [& v: H5 o; j) W8 W
pdm location 192.168.0.252 255.255.255.255 inside
: s0 J5 A5 k1 V3 y( wpdm location 192.168.0.253 255.255.255.255 inside4 u% u6 @+ {* H% _; d7 O5 X* t
pdm location 192.168.0.44 255.255.255.255 inside
  B0 n0 j1 N, W' K4 P1 Z1 Kpdm location 192.168.0.242 255.255.255.255 inside3 `. M% U' r! u7 Y9 M$ H
pdm location 192.168.0.239 255.255.255.255 inside
! `3 Q1 h" ^) _# A/ T* f, t# ?pdm location 192.168.0.27 255.255.255.255 inside" o' {4 |! o" H0 _6 q' z
pdm location 192.168.0.249 255.255.255.255 inside
* r* [9 y4 C% J" r! Qpdm location 192.168.0.61 255.255.255.255 inside5 F3 H4 |" T/ W0 y
pdm location 192.168.0.62 255.255.255.255 inside
. }- O& x  U" s3 mpdm location 192.168.0.63 255.255.255.255 inside
- z% s$ ]1 \, Z6 S( n1 z# U1 X' Tpdm location 192.168.0.64 255.255.255.255 inside  i: X. t7 z- L* Z  j
pdm location 192.168.0.68 255.255.255.255 inside) H: W% m. `" M/ I2 L2 l8 M
pdm location 192.168.0.211 255.255.255.255 inside
  N. {4 ~" r3 `+ Wpdm location 192.168.0.70 255.255.255.255 inside
& v6 T- }3 \- f% g$ C1 E4 C, |  lpdm location 192.168.0.65 255.255.255.255 inside
  d, z, n5 X9 ?5 Hpdm location 192.168.0.121 255.255.255.255 inside' m( e; k5 z2 S9 W' M
pdm location 192.168.0.247 255.255.255.255 inside, c' D+ O+ X# w" A' O1 A5 s+ n
pdm location 192.168.0.37 255.255.255.255 inside, n* O: Q& W% @% ~6 {& z# M
pdm location 192.168.0.73 255.255.255.255 inside
9 b/ e: u' J5 rpdm location 192.168.0.112 255.255.255.255 inside7 `3 A% g7 P1 T, ~- c" C% G' K5 r
pdm location 192.168.0.57 255.255.255.255 inside- y; m, q- y6 e, v8 |$ a1 M
pdm location 192.168.0.99 255.255.255.255 inside
- x9 e2 e: J5 C( r; C, bpdm location 192.168.0.124 255.255.255.255 inside
( [3 i/ K3 R8 i. Ppdm location 192.168.0.52 255.255.255.255 inside4 `  U3 m- g; `  n. }6 a& b# [
pdm location 192.168.0.118 255.255.255.255 inside% Y9 g, F, W: n: h/ b7 m2 |
pdm location 192.168.0.122 255.255.255.255 inside
9 Z7 \+ l; Z8 l9 B9 _pdm location 192.168.0.49 255.255.255.255 inside) ^* b" y6 Z% x! p5 Z0 X% c
pdm location 192.168.0.55 255.255.255.255 inside; `" C8 W8 J, y
pdm location 192.168.0.43 255.255.255.255 inside
* \) u1 c4 R% c' Vpdm location 192.168.0.103 255.255.255.255 inside
7 x. O& Y8 N3 f2 b1 t( Mpdm location 192.168.0.54 255.255.255.255 inside
. g* A% Y( [4 Q0 `" s/ n8 m: zpdm location 192.168.0.243 255.255.255.255 inside9 d: O) y% M( z9 C2 |  ~
pdm location 192.168.0.244 255.255.255.255 inside7 {2 u' O; c) v: `) s
pdm location 192.168.0.230 255.255.255.255 inside' E% M% S" Z, `( Z  J5 i
pdm location 192.168.0.135 255.255.255.255 inside
( A8 l% M, g( h* |. b  npdm location 192.168.0.115 255.255.255.255 inside2 P2 m3 g0 q( e. I! s* @5 c
pdm location 192.168.0.245 255.255.255.255 inside
2 a' w& |+ d3 P7 g0 I* epdm location 192.168.0.238 255.255.255.255 inside; w3 K1 h8 ~+ Z! ^- q/ {
pdm location 192.168.0.237 255.255.255.255 inside
& R( O& a/ P8 o: A$ A! Q6 Apdm location 192.168.0.231 255.255.255.255 inside
7 e$ ?9 P/ K# Q: D; Bpdm location 192.168.0.235 255.255.255.255 inside$ W( F3 G& M0 ~
pdm location 192.168.0.236 255.255.255.255 inside
/ o- p$ Q/ X1 I0 B; s/ J/ J1 g* U$ Spdm location 192.168.0.190 255.255.255.255 inside
1 x& x- {# u8 J; q# f2 O9 qpdm location 192.168.0.181 255.255.255.255 inside
0 J% K6 p( L7 K5 ~pdm location 192.168.0.9 255.255.255.255 inside- B0 d/ k9 ?8 z
pdm location 192.168.0.246 255.255.255.255 inside7 e. o* [6 c% s: u
pdm location 192.168.0.59 255.255.255.255 inside
3 B: K7 S. d! S0 |3 c1 \pdm location 192.168.0.191 255.255.255.255 inside6 l5 B! {  _% {! Q* w  L% W
pdm location 192.168.0.117 255.255.255.255 inside6 F) u( j2 |  a/ v
pdm location 192.168.0.171 255.255.255.255 inside
. E0 ?  |) T; q% ipdm location 192.168.0.53 255.255.255.255 inside+ @" m" F6 v! z" `- P
pdm location 192.168.0.130 255.255.255.255 inside
& h8 n% {9 h3 }' xpdm location 192.168.0.91 255.255.255.255 inside2 H& b. R& o6 |4 x. L: D+ T7 ^
pdm location 192.168.0.140 255.255.255.255 inside
, ~9 D3 k3 M2 O# M% K+ opdm location 192.168.0.220 255.255.255.255 inside9 [- M: j8 s" C0 q& d; b( k. r) j, R
pdm location 192.168.0.119 255.255.255.255 inside
) J" u2 R" C7 r* opdm location 192.168.0.223 255.255.255.255 inside
& f3 I" v% [$ }6 E7 u# qpdm location 192.168.0.106 255.255.255.255 inside$ b" @5 W$ l! e
pdm location 192.168.0.123 255.255.255.255 inside/ X' h0 A9 N; t, z
pdm location 192.168.0.67 255.255.255.255 inside0 Z% d" ^$ B9 r/ r/ Q
pdm location 192.168.0.219 255.255.255.255 inside# u9 N6 P( \' H" {' U# N
pdm location 192.168.0.56 255.255.255.255 inside
# j' Y9 m: Q* p1 E! h" C/ xpdm location 192.168.0.66 255.255.255.255 inside
* ^9 ~" l4 W$ A. N! b' tpdm location 192.168.0.76 255.255.255.255 inside+ N- r4 R( t; w8 c. t. o- E1 \
pdm location 192.168.0.102 255.255.255.255 inside
% y, d6 a% ]+ {  r9 b. Cpdm location 192.168.0.170 255.255.255.255 inside0 W( c/ G( b" Y+ l: g5 ?
pdm location 192.168.0.172 255.255.255.255 inside
; |+ d" g0 v7 Qpdm location 192.168.0.173 255.255.255.255 inside
/ z+ R8 x+ N) n' y9 s( [; V* vpdm location 192.168.0.174 255.255.255.255 inside' n3 B, Z1 H$ h! i6 P, }5 x
pdm location 192.168.0.175 255.255.255.255 inside
/ m  z* n/ {2 V* [  Cpdm location 192.168.0.160 255.255.255.255 inside" X6 I+ S% E$ `$ ]( `# @, J
pdm location 192.168.0.138 255.255.255.255 inside7 ^4 t" R6 x9 m  V$ l
pdm location 192.168.0.78 255.255.255.255 inside3 y* J, Q+ i9 B' l, ^6 n/ h6 b0 R
pdm location 192.168.0.69 255.255.255.255 inside9 @- j' p/ }  E5 @. w9 I/ I: {: g
pdm location 192.168.0.221 255.255.255.255 inside9 o5 s$ x8 |  o1 N; T$ x) \) C
pdm location 192.168.0.110 255.255.255.255 inside- u, E0 Q( K& @" j( x$ B% P
pdm location 192.168.0.232 255.255.255.255 inside
/ l) t% g9 g0 Updm location 192.168.0.80 255.255.255.255 inside4 l- \0 ?) |& z9 Y0 D: _+ }5 r( V
pdm location 192.168.0.81 255.255.255.255 inside
8 B! F; g) X! Y1 U6 Dpdm location 192.168.0.82 255.255.255.255 inside
- f& L1 g, B) O3 w5 [( dpdm location 192.168.0.83 255.255.255.255 inside
+ a* y6 Z& B& l' _  D/ l' u1 J  Vpdm location 192.168.0.84 255.255.255.255 inside- ?* w+ P( d9 R' O4 @5 L2 O
pdm location 192.168.0.85 255.255.255.255 inside2 L: |( P& w- j. O$ W# [% d" _
pdm location 192.168.0.86 255.255.255.255 inside
6 f* f4 w! F. X' E/ \; `  h3 d: f+ ypdm location 192.168.0.87 255.255.255.255 inside
5 k  e7 O9 Q7 E  ?4 L) l1 x4 e* i" v1 Fpdm location 192.168.0.88 255.255.255.255 inside
0 i& T4 X) K: i* Opdm location 192.168.0.89 255.255.255.255 inside
# c/ _' C* c1 y8 vpdm location 192.168.0.90 255.255.255.255 inside
9 r8 i( x9 O1 R4 x4 M6 `  Kpdm location 192.168.0.28 255.255.255.255 inside
: b2 u/ p( D) u2 p5 `) ?) ^- tpdm location 192.168.0.234 255.255.255.255 inside
# i2 F4 Q! n) rpdm location 192.168.0.222 255.255.255.255 inside: t) d) K# l0 \% I4 W3 Y$ w: ~) s
pdm location 192.168.0.150 255.255.255.255 inside
9 B4 ^" j+ N) _pdm location 192.168.0.151 255.255.255.255 inside
; W/ I' q5 ]9 a# Hpdm location 192.168.0.152 255.255.255.255 inside; M7 {4 }' A9 j3 @. L3 Q
pdm location 192.168.0.77 255.255.255.255 inside3 ^+ S7 W. h- [: ?& \. l
pdm location 192.168.0.72 255.255.255.255 inside3 t" M+ |5 o. U# c3 Q
pdm location 192.168.0.225 255.255.255.255 inside6 z# r3 p/ Y* B2 O3 ~$ F7 W, v
pdm location 192.168.0.161 255.255.255.255 inside
- c: K: f% J6 @$ \; Bpdm location 192.168.0.92 255.255.255.255 inside
( D7 T/ K- L- p' x4 Y1 Fpdm location 192.168.0.192 255.255.255.255 inside* k% `3 F7 D2 ~3 H! k
pdm location 192.168.0.193 255.255.255.255 inside
( `2 j4 `& ]" a5 s0 v8 y; ]6 tpdm location 192.168.0.15 255.255.255.255 inside
6 t0 h0 l1 P' v: [8 x- g/ n5 g$ s& mpdm location 192.168.0.33 255.255.255.255 inside9 L+ ?" M, v: d8 h& E, W
pdm location 192.168.0.79 255.255.255.255 inside5 q3 |$ X* t& a1 H* [+ V. x
pdm location 192.168.0.93 255.255.255.255 inside, k" k) B6 W+ e
pdm location 192.168.0.94 255.255.255.255 inside. f5 B$ U6 ^/ {* M# n  Y" n
pdm location 192.168.0.95 255.255.255.255 inside
: Q) W2 g/ |( l0 o3 Npdm location 192.168.0.96 255.255.255.255 inside
5 R8 \! v* |# Bpdm location 192.168.0.97 255.255.255.255 inside
2 x0 u# T3 X0 E( F0 I1 e- K/ kpdm location 192.168.0.98 255.255.255.255 inside
4 z3 E  F3 H2 L4 z% N- \pdm location 192.168.0.101 255.255.255.255 inside* }, `9 |! ?9 q, y5 @1 t1 E+ G
pdm location 192.168.0.104 255.255.255.255 inside0 {* X& H, p; u. Z+ t- _
pdm location 221.XXX.138.250 255.255.255.255 inside
  F4 ^/ o+ t9 |: ]( m: m1 `pdm location 192.168.0.71 255.255.255.255 inside
0 o  l$ u3 I  Wpdm location 192.168.0.185 255.255.255.255 inside
: O% V' d0 |$ W" I5 _* L  Zpdm location 192.168.0.75 255.255.255.255 inside/ L5 E, B6 L' a  Y0 G" s3 {
pdm location 192.168.0.120 255.255.255.255 inside
, c: R$ J9 Q4 Q) epdm location 192.168.0.212 255.255.255.255 inside. x" b5 `9 ^" G1 s
pdm location 192.168.0.213 255.255.255.255 inside0 C" d6 n7 \. ]9 N# ^  W  [5 D6 q
pdm location 192.168.0.214 255.255.255.255 inside
7 K, x7 ]; j+ I0 opdm location 192.168.0.215 255.255.255.255 inside* b1 `- T) p# K
pdm location 192.168.0.128 255.255.255.192 outside8 N& I; o, W3 Y# i3 B" m
pdm history enable- f+ g; K3 n( F
arp timeout 14400; ]- q5 B% k) m# l  ^7 z5 |1 R
global (outside) 10 interface
; R7 c8 \# Q7 H* Z$ D" S- Y9 snat (outside) 0 access-list outside_inbound_nat0_acl outside0 _+ R) H! H; ~1 m; S& L+ D$ i
nat (inside) 10 192.168.0.1 255.255.255.255 0 0- S' G$ C% z+ W5 j) j
nat (inside) 10 192.168.0.3 255.255.255.255 0 08 ?( e& f( H; e$ K3 N0 Z, k: O
nat (inside) 10 192.168.0.4 255.255.255.255 0 0
) W; L& B0 Q, w) V6 {nat (inside) 10 192.168.0.5 255.255.255.255 0 0  S$ b( C. w" W7 k9 K
nat (inside) 10 192.168.0.10 255.255.255.255 0 03 L7 F4 j$ w6 ^: I( z
nat (inside) 10 192.168.0.11 255.255.255.255 0 0& v" N; F" f* x: W& n/ n
nat (inside) 10 192.168.0.12 255.255.255.255 0 0* c- p! v' Y8 X  V. I
nat (inside) 10 192.168.0.13 255.255.255.255 0 0
# u( x8 S& x8 c9 u& H- N( mnat (inside) 10 192.168.0.14 255.255.255.255 0 0
& I* d/ a, [2 f, Knat (inside) 10 192.168.0.15 255.255.255.255 0 05 e5 M5 U1 T# ?& F6 A' G8 ]) p1 p( L
nat (inside) 10 192.168.0.16 255.255.255.255 0 08 h+ j' a3 {0 C8 O
nat (inside) 10 192.168.0.17 255.255.255.255 0 0% v5 Y5 b" A( H- H
nat (inside) 10 192.168.0.21 255.255.255.255 0 0
0 ]$ ?6 r) C& fnat (inside) 10 192.168.0.22 255.255.255.255 0 0# ?- A0 d6 H+ `' Y
nat (inside) 10 192.168.0.23 255.255.255.255 0 0: y- z" `5 I# Q0 ^4 u/ j1 Z
nat (inside) 10 192.168.0.24 255.255.255.255 0 0
8 P/ W; w% E. y4 _nat (inside) 10 192.168.0.25 255.255.255.255 0 0
: D. [" C# f3 N! u! n* Q$ F- i/ inat (inside) 10 192.168.0.26 255.255.255.255 0 0) r% k8 e0 J' ~. t7 r
nat (inside) 10 192.168.0.27 255.255.255.255 0 0  M0 I: ~' r3 }/ j' p
nat (inside) 10 192.168.0.29 255.255.255.255 0 0$ u( Z3 O2 A$ w  b5 Q7 h6 a) ?
nat (inside) 10 192.168.0.31 255.255.255.255 0 0: W; h& _4 J! z# u1 A, X: Q
nat (inside) 10 192.168.0.32 255.255.255.255 0 0
# @& I' E" {+ y% M/ v' H" n: wnat (inside) 10 192.168.0.33 255.255.255.255 0 0. r9 q% l$ R+ k: ?- m, X
nat (inside) 10 192.168.0.34 255.255.255.255 0 0
4 f% n7 U+ l2 O. R) l3 f+ V. Cnat (inside) 10 192.168.0.37 255.255.255.255 0 0$ {( n, Q* \( U# A( Q
nat (inside) 10 192.168.0.39 255.255.255.255 0 05 a9 m& ?$ h; |- B
nat (inside) 10 192.168.0.40 255.255.255.255 0 0# k8 n& f: N9 Q; d
nat (inside) 10 192.168.0.44 255.255.255.255 0 0. F& ^( r, H; ~. m) ?) V
nat (inside) 10 192.168.0.45 255.255.255.255 0 0; k3 M. T9 V) U# Y( b  X) X3 s
nat (inside) 10 192.168.0.47 255.255.255.255 0 02 J/ x3 x+ _+ C: V: I8 L7 _
nat (inside) 10 192.168.0.48 255.255.255.255 0 00 }1 A& r. Y- C4 ]: v( ~. b
nat (inside) 10 192.168.0.49 255.255.255.255 0 0
. u; t! Z1 z9 j3 t2 u7 Knat (inside) 10 192.168.0.50 255.255.255.255 0 0
# K. k( ?1 `1 y! bnat (inside) 10 192.168.0.51 255.255.255.255 0 0. i" f( E; ^% Q
nat (inside) 10 192.168.0.52 255.255.255.255 0 0) O' L5 N. g% E5 W' O
nat (inside) 10 192.168.0.53 255.255.255.255 0 0+ n' X) f6 D6 Q0 B' G$ T8 p
nat (inside) 10 192.168.0.54 255.255.255.255 0 0* i( X6 z( i* ^6 M
nat (inside) 10 192.168.0.55 255.255.255.255 0 0! C; c4 n. F) B& j. G+ _  Q
nat (inside) 10 192.168.0.56 255.255.255.255 0 09 g5 V4 M9 B( }+ a+ `
nat (inside) 10 192.168.0.57 255.255.255.255 0 0
8 _9 j0 v! |& cnat (inside) 10 192.168.0.58 255.255.255.255 0 0  A! n3 b. j8 K  S! q3 X
nat (inside) 10 192.168.0.59 255.255.255.255 0 0
$ _# g: G3 o2 N7 `3 bnat (inside) 10 192.168.0.62 255.255.255.255 0 0
' [( I8 G" p5 v( ]7 A+ jnat (inside) 10 192.168.0.63 255.255.255.255 0 0  w" R* q; }3 I. ]5 j: R; V8 x
nat (inside) 10 192.168.0.64 255.255.255.255 0 0" \/ q- v3 X. b
nat (inside) 10 192.168.0.65 255.255.255.255 0 0# n  K: K3 C; h' C4 x3 C- _
nat (inside) 10 192.168.0.66 255.255.255.255 0 06 Z6 N) b2 M& Z; U
nat (inside) 10 192.168.0.67 255.255.255.255 0 0
* ^8 R0 ~0 g1 S( B* p0 R# Fnat (inside) 10 192.168.0.68 255.255.255.255 0 0
+ U' g0 v, Z5 `3 ~$ rnat (inside) 10 192.168.0.69 255.255.255.255 0 0
# a) P; l) E, x1 qnat (inside) 10 192.168.0.71 255.255.255.255 0 0
( }! |$ H+ }& ?nat (inside) 10 192.168.0.73 255.255.255.255 0 0  Q% D! u8 b5 |- G7 ~
nat (inside) 10 192.168.0.76 255.255.255.255 0 0" _; }; C; D" B: a: [
nat (inside) 10 192.168.0.79 255.255.255.255 0 0
, r7 `7 v3 V& y/ b2 w$ T1 enat (inside) 10 192.168.0.80 255.255.255.255 0 0" n! {% F5 J( t* f+ C/ X
nat (inside) 10 192.168.0.81 255.255.255.255 0 04 @8 ?: n3 f/ v% S' X/ b3 t
nat (inside) 10 192.168.0.82 255.255.255.255 0 00 h! I5 C4 |2 }9 {  b
nat (inside) 10 192.168.0.83 255.255.255.255 0 0
) q9 h! _  ?3 T& I$ {( s; \5 v% ]nat (inside) 10 192.168.0.85 255.255.255.255 0 02 k4 q" ^# U2 T) b! V. E
nat (inside) 10 192.168.0.86 255.255.255.255 0 0
4 E; Y; K- d  Q# l# s# ^nat (inside) 10 192.168.0.87 255.255.255.255 0 0
; X3 c6 C5 [1 q9 L# hnat (inside) 10 192.168.0.89 255.255.255.255 0 0
+ W; C0 p. r- F8 Fnat (inside) 10 192.168.0.90 255.255.255.255 0 0
, e& w+ C% L/ e8 G# z: Unat (inside) 10 192.168.0.92 255.255.255.255 0 0$ t- F+ B) {0 C, T  z
nat (inside) 10 192.168.0.93 255.255.255.255 0 0
  c, ^$ ]+ F, r# U) U" r# `nat (inside) 10 192.168.0.94 255.255.255.255 0 0
" i/ z; k( m' c) q3 r0 T7 bnat (inside) 10 192.168.0.95 255.255.255.255 0 0
! o- _7 J1 S) `, ^nat (inside) 10 192.168.0.96 255.255.255.255 0 0
9 R/ n6 H3 ~' C1 s  w6 jnat (inside) 10 192.168.0.97 255.255.255.255 0 03 S2 e2 j& E) o) N9 Q9 m3 \& S
nat (inside) 10 192.168.0.99 255.255.255.255 0 0) Z# N. ]( q* M7 y' J
nat (inside) 10 192.168.0.101 255.255.255.255 0 0
* ?6 E$ j' M+ ]7 ^0 @2 a7 Fnat (inside) 10 192.168.0.102 255.255.255.255 0 09 j/ K3 p0 A1 W# h) U% Q
nat (inside) 10 192.168.0.103 255.255.255.255 0 0
9 A1 _9 ^! U0 H( \. Gnat (inside) 10 192.168.0.104 255.255.255.255 0 0/ A" j0 P. O9 w7 I1 @' r, g9 b3 P
nat (inside) 10 192.168.0.106 255.255.255.255 0 0
* g2 n" o3 `1 p! H& G3 a! p. z: Q/ inat (inside) 10 192.168.0.107 255.255.255.255 0 0
6 R) B9 Z3 w! inat (inside) 10 192.168.0.108 255.255.255.255 0 0
* f9 I4 J/ _9 J" k6 K1 a. K0 dnat (inside) 10 192.168.0.118 255.255.255.255 0 0
( v9 e0 |) ?6 Anat (inside) 10 192.168.0.119 255.255.255.255 0 0
/ ~6 d1 X* M0 ~nat (inside) 10 192.168.0.120 255.255.255.255 0 0- Z) h  k+ s# ~% {0 s* N6 Z" x# M
nat (inside) 10 192.168.0.121 255.255.255.255 0 0
0 k  o4 Z' }& K; M+ @* knat (inside) 10 192.168.0.200 255.255.255.255 0 0- j# r1 C4 y- P7 E
nat (inside) 10 192.168.0.201 255.255.255.255 0 02 _9 c% G  o6 e2 J+ x
nat (inside) 10 192.168.0.202 255.255.255.255 0 08 k/ S& U% T; n6 C0 C- k  c  I
nat (inside) 10 192.168.0.203 255.255.255.255 0 0
# n% F0 \$ Z& W6 {% T0 T" Q1 k& Inat (inside) 10 192.168.0.204 255.255.255.255 0 0& s. K% u' W8 `* U8 J; b; f7 Y! t: R
nat (inside) 10 192.168.0.205 255.255.255.255 0 0( _5 p' m. [  W2 ^, v% L
nat (inside) 10 192.168.0.206 255.255.255.255 0 0+ a  p7 ]/ F2 F1 r/ h  I
nat (inside) 10 192.168.0.207 255.255.255.255 0 06 A/ x0 a+ m1 {. E
nat (inside) 10 192.168.0.208 255.255.255.255 0 00 `1 c4 [) |4 l; _7 l+ z4 N
nat (inside) 10 192.168.0.209 255.255.255.255 0 09 r8 X/ t  r. o" R9 b0 T, m- I" l: g
nat (inside) 10 192.168.0.210 255.255.255.255 0 08 t9 `8 q; x5 F" z/ S& V
nat (inside) 10 192.168.0.211 255.255.255.255 0 0: z! P  A. d6 c7 h) l0 |
nat (inside) 10 192.168.0.212 255.255.255.255 0 0
& [; u: ]% ?% ~% onat (inside) 10 192.168.0.213 255.255.255.255 0 0  E% f3 C, _& m/ e7 L5 h
nat (inside) 10 192.168.0.214 255.255.255.255 0 0
$ D2 b4 A: X. t. P* {; Lnat (inside) 10 192.168.0.215 255.255.255.255 0 0
& I6 L% G# n' n! |nat (inside) 0 192.168.0.0 255.255.255.0 0 0  o5 `4 X; v- }+ d# y6 [
nat (inside) 10 0.0.0.0 0.0.0.0 0 05 ?# X; w- g2 n* R
route outside 0.0.0.0 0.0.0.0 221.XXX.138.249 1
  m/ L" R1 o/ t% H$ Ntimeout xlate 3:00:00
8 u  M' y2 f9 ~2 Y: w- Utimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
" E8 P- X7 ^7 gtimeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
" p1 K. z7 \+ d9 P, Stimeout uauth 0:05:00 absolute* M3 g; G6 G5 L" X4 W1 f6 D7 n8 b3 ?
aaa-server TACACS+ protocol tacacs+
$ q" D" H1 K$ Saaa-server RADIUS protocol radius
  q2 Y. {3 j! A9 p; z+ i* E" i7 Q. [# Jaaa-server LOCAL protocol local
0 |) @/ T# ]; ~! X6 j7 q7 o8 Whttp server enable$ n( ^" g6 _  }9 `
http 192.168.0.0 255.255.255.0 inside- z6 [  ~; V& a" ~  b: F. Y2 ]
no snmp-server location
. o5 g: T2 D( tno snmp-server contact) p$ U8 b3 ?6 I
snmp-server community public, D, K. ]9 C2 I! i$ E9 ^
no snmp-server enable traps
* k. `( [8 c1 C9 ]) mfloodguard enable
; \7 q7 w' i( s. `0 [4 @sysopt connection permit-ipsec1 Y  [1 U0 I! P$ ~
sysopt connection permit-l2tp
0 r6 @& l1 M, A+ R) H; P( gcrypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
6 Q* r  q7 U. W# e  ^. Wcrypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
- z$ O2 ]& a# n5 Visakmp enable outside
5 D6 \: R" r2 B. ]isakmp enable inside1 C. {& p$ H' @! O+ i" r# l
telnet timeout 5
1 t& p, R2 }5 t$ s: u- xssh 0.0.0.0 0.0.0.0 outside5 X: i$ ~  B" H! y3 l2 f3 {
ssh 0.0.0.0 0.0.0.0 inside3 u3 j- t2 ?- U* m7 {9 {/ i8 o
ssh timeout 5
1 i" S; _9 k4 w- _; E% w" r/ Oconsole timeout 0
9 W* k2 I5 p8 Jvpdn username wanhine password ********* ) H+ Y9 z0 _- C" ]' }# ~9 Y+ @5 ^, C
vpdn enable outside7 Y" Y1 {" C, H/ U- M; f
vpdn enable inside$ X1 B* [3 w5 [7 Q% H0 j- Y# u
dhcpd address 192.168.0.20-192.168.0.200 inside
9 j' ?$ @* \! udhcpd dns 202.103.24.68 202.103.0.117
" O, g$ f5 f9 L; f. ]dhcpd lease 3600
& I5 z: \1 e$ T' q. U& [! O" sdhcpd ping_timeout 7501 V1 M7 a, V! T5 W2 Z, y
terminal width 80% L& x( ]) o8 T* b+ j  T) W) p* A9 r; Q
Cryptochecksum:f40dc8963b7f456d60eac467e8c0ea87/ Q/ Z$ u5 t& ^+ z: n( I
: end
- z- e4 u8 O* n) {6 A; `[OK]! z7 g$ e# q5 a$ Q" L1 K
+ }, e/ ^; i! n6 q1 R& m

) A. {; ?. ]$ b3 W5 a
8 N( A9 {" [' N$ a请高人指点.
0 \, w" r  g1 B& c( Z6 ~6 w. s8 k* f如果PDM无法实现,请发下完整的配置表谢谢,万分感谢!
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

迷糊蓝调 [Lv4 初露锋芒] 发表于 2013-9-8 03:22:37 | 显示全部楼层
1.网络拓扑如下图9 M7 W9 y; Q3 S" a0 a
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/001.jpg')}}" />* t* g2 {# m/ U( R- }( U& w
2.CISCO pix515e使用PDM3.0配置如下% u, B; }' Y, l6 ^- ~
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/002.jpg')}}" />
% |, Q! M+ r& n9 qscreen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/003.jpg')}}" />: }5 d2 T, f3 [! s9 O5 F
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/004.jpg')}}" />8 d. t) U0 x$ G
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/005.jpg')}}" />6 `% \  k5 e  r# {$ `: J. p9 ^. G
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/006.jpg')}}" />( n3 x  d1 Y0 ]( s9 Y$ {( q
screen.width*0.6) {this.width=screen.width*0.6;this.alt='';this.onmouseover=this.style.cursor='pointer';this.onclick=function(){window.open('http://www.eask.tk/nat/007.jpg')}}" />
( k& ]9 c. g! d2 c$ ~6 S
2 r" w8 ~7 f9 R9 w1 k3.拟实现的网络功能:公网计算机通过光纤、ADSL、WIFI、mobile等方式接入因特网,再通过windows自带的虚拟专用网拨号连接或者CISCO的VPN cilent拨入PIX515e内部的VpnServer,以实现接入VpnServer所在的局域网,共享局域网内的资源,VPN Server在内网测试通过。: C: g6 X& Q- c0 N
7 g8 t* t" d( h3 B5 h, {; L1 K
4.遇到的问题:公网计算机无法通过pix515e的公网地址向内穿越NAT拨入VPNserver。能否在pix515e上建立一条Vpn Tunnel以实现第3条的网络功能,该如何建立。
3 `6 L9 ^" \- t* |; e2 b+ q0 m7 f: J
5.已失败的方法; A3 o' J% [( g0 c% g9 }- ^

' q  j; x2 B/ K4 s( qA:端口映射,该思科设备通过NAT功能将内网IP转换为公网IP,不是路由器,无法做端口映射。
1 w' L! ~4 Y: i  w' P% X
1 P% D, }- U/ A/ t9 G1 k4 gB:在PDM3.0上尝试对PIX515e进行VPN的设置,未能凑效。
3 W7 F* E1 v3 v& V2 R
( Q( [  T# X; g! y! _# L; Z1 pC:逆向NAT失败,PDM3.0不允许。7 w# {# _6 `! t7 ~/ h1 ^$ [& ~

! m& W6 j4 V: J2 w8 R设备目前的配置列表0 G" l1 J' O: ?5 k  d0 m

/ T* l" Q" v; T' ^Building configuration...8 Q" c3 |2 `: W6 i0 G( S
: Saved
$ n$ ]  H  K0 w, D7 T:  \, P* u: G& y9 s
PIX Version 6.3(3)" d# ~- R0 S( ^! c# c
interface ethernet0 auto% G9 O. |9 R( D; b+ b
interface ethernet1 auto
) E7 K; }( V- |7 v6 Tnameif ethernet0 outside security09 h6 K0 {1 H2 b7 P- l% S& @! I2 j
nameif ethernet1 inside security100
! p# z4 k& ^( R6 b3 a* O. s6 D* qenable password /NNcO2U/e4a3IAX3 encrypted" m/ s0 \1 y, W  e/ D) }+ e5 ~' m
passwd 2KFQnbNIdI.2KYOU encrypted4 ^0 v) E, I4 }7 ^, e4 \: e# h
hostname huawei
' {- Y! u" ?! R/ tdomain-name huawei.com. ~0 Z3 a# F* ]. `, Y* S
fixup protocol dns maximum-length 512" V, T. f+ E* L
fixup protocol ftp 21
+ D: P$ \& h4 R8 K$ v% x; X3 J, gfixup protocol h323 h225 1720
$ F) f$ u8 S! o8 u( `& |8 afixup protocol h323 ras 1718-1719
/ p& I" g# |; F, m' R/ z- hfixup protocol http 80( o' P4 i. `/ e; `; E
fixup protocol rsh 514
2 F$ g: w, A% ?2 y# G, {7 dfixup protocol rtsp 5540 i2 X3 r. Q/ E- ~7 b9 \# B5 J
fixup protocol sip 50604 n" D9 t. `/ v7 x9 x/ s( n
fixup protocol sip udp 5060: e4 K) D$ y$ G: X% a
fixup protocol skinny 2000! c+ \1 O1 ]) i. h5 e2 Q
fixup protocol smtp 25) M1 m& \2 L- m% j# n- [" l
fixup protocol sqlnet 1521
. M% _3 O" ~+ `" J/ dfixup protocol tftp 69
, D; w1 T8 j& x; bnames
. r/ `3 {2 p/ ~9 M/ o  U, ?access-list outside_inbound_nat0_acl permit ip interface outside 192.168.0.0 255.255.255.0
$ c+ l; b. r6 P, R( D3 q! _pager lines 24
' _; {1 ^* |) v" O3 emtu outside 1500
* o$ S) e5 v7 x2 |mtu inside 1500# @8 {" h0 y$ n  n0 Q. n" V
ip address outside 221.XXX.138.250 255.255.255.252& l1 |0 x9 I& `
ip address inside 192.168.0.254 255.255.255.07 C* ~# U# f, l9 M
ip audit info action alarm! V% R3 X# a* o7 m3 l+ H
ip audit attack action alarm$ m+ n3 s+ l4 K
pdm location 192.168.0.3 255.255.255.255 inside& s# y, t4 F0 ^; \# {
pdm location 192.168.0.24 255.255.255.255 inside+ F0 }& F+ k5 j0 |* _' R' V% A
pdm location 192.168.0.1 255.255.255.255 inside
) W* s1 g8 ]- w: |8 N. x# rpdm location 192.168.0.2 255.255.255.255 inside4 z2 v% }& R: X% F4 \
pdm location 192.168.0.12 255.255.255.255 inside
, _1 j7 g: Z3 ?# n( Ppdm location 192.168.0.10 255.255.255.255 inside
. d6 r' H0 D. x9 F6 y' mpdm location 192.168.0.16 255.255.255.255 inside' V8 |( Y" i6 w
pdm location 192.168.0.19 255.255.255.255 inside
7 B& S9 S$ \5 a3 C( i- G- e/ ^pdm location 192.168.0.20 255.255.255.255 inside
2 ]9 H$ G) Z5 h& N6 x! Npdm location 192.168.0.22 255.255.255.255 inside
: X" H& c8 H9 z. Xpdm location 192.168.0.23 255.255.255.255 inside. S# z+ @& N; _( T+ @4 A4 s( R2 X
pdm location 192.168.0.34 255.255.255.255 inside
/ a8 n+ `, B, G; V8 npdm location 192.168.0.38 255.255.255.255 inside
$ w  [* z1 _, S" h5 o/ [2 H! [pdm location 192.168.0.40 255.255.255.255 inside
7 D0 Z( a$ m$ Q  H' Fpdm location 192.168.0.58 255.255.255.255 inside
( f  v8 W. B% T2 m# f6 v# H% Npdm location 192.168.0.17 255.255.255.255 inside
8 p+ {) Q. N1 f. I; hpdm location 192.168.0.39 255.255.255.255 inside
, l, J( t3 P+ X1 ?* o: @( z4 kpdm location 192.168.0.41 255.255.255.255 inside) l% i7 i' f4 C! ]) C
pdm location 192.168.0.13 255.255.255.255 inside
) v' K! s8 @! O' \9 M1 cpdm location 192.168.0.42 255.255.255.255 inside' D( {& g* c6 \
pdm location 192.168.0.45 255.255.255.255 inside
$ B3 t" J4 {$ |  Vpdm location 192.168.0.46 255.255.255.255 inside
3 y9 m, ?- r7 f! @0 bpdm location 192.168.0.47 255.255.255.255 inside( o# V% I- A) ?; n9 N9 B0 h
pdm location 192.168.0.50 255.255.255.255 inside
- j5 y( J( Y7 W3 \pdm location 192.168.0.25 255.255.255.255 inside
, I: j0 t7 Z- A$ P( @' Z$ C3 Spdm location 192.168.0.4 255.255.255.255 inside2 Z) }( q1 b. v
pdm location 192.168.0.6 255.255.255.255 inside
: m% }2 n1 x+ A4 k" Kpdm location 192.168.0.35 255.255.255.255 inside: e3 @; r3 K. o5 P: ]
pdm location 192.168.0.21 255.255.255.255 inside  s1 \/ |( X: L" V% z& ^$ @
pdm location 192.168.0.200 255.255.255.255 inside
! h9 r4 K% x2 |# ^( hpdm location 192.168.0.48 255.255.255.255 inside# T% i8 v" q. @
pdm location 192.168.0.60 255.255.255.255 inside
6 W7 M0 \3 Z- |* U1 q& X! fpdm location 192.168.0.51 255.255.255.255 inside' m. N2 H- ~5 W) ~
pdm location 192.168.0.32 255.255.255.255 inside. y8 E7 P5 y& w" Z7 G0 w# J
pdm location 192.168.0.18 255.255.255.255 inside
. g8 Y& n3 e: Y- v8 B& Vpdm location 192.168.0.7 255.255.255.255 inside
6 z. i9 J( x1 ~  _( C( _) b( w8 n& p" L, `: ipdm location 192.168.0.201 255.255.255.255 inside
0 Q* O) X/ `4 b' Wpdm location 192.168.0.36 255.255.255.255 inside
9 w0 L$ \4 }" D& t2 D3 W% wpdm location 192.168.0.100 255.255.255.255 inside8 u9 s6 o2 w9 {5 v" }
pdm location 192.168.0.5 255.255.255.255 inside/ g9 o( i; }7 K3 j* J2 C
pdm location 192.168.0.202 255.255.255.255 inside
6 x" f% P5 R' @/ K' lpdm location 192.168.0.26 255.255.255.255 inside
1 W' @0 j3 ]$ k# D2 s" m: n# opdm location 192.168.0.203 255.255.255.255 inside+ g. v/ q6 f5 }1 m' ^) A
pdm location 192.168.0.14 255.255.255.255 inside' c% k7 y1 ]. ~  K
pdm location 192.168.0.204 255.255.255.255 inside
$ Z9 ~6 B, p% |. J- \1 r4 T7 ]pdm location 192.168.0.251 255.255.255.255 inside
% [4 t, U" _* E+ q3 K, h, f$ `! rpdm location 192.168.0.205 255.255.255.255 inside# d7 Y2 w3 e' {: i, q0 m5 z# z
pdm location 192.168.0.206 255.255.255.255 inside
$ ~- d9 Y' t; d7 `# o, s' Q$ qpdm location 192.168.0.207 255.255.255.255 inside
5 r& Z8 ~2 F+ o. r  lpdm location 192.168.0.208 255.255.255.255 inside0 a- ^3 {! I1 C" z5 w6 S5 ~
pdm location 192.168.0.209 255.255.255.255 inside
! e0 t; p" m$ B( w- rpdm location 192.168.0.108 255.255.255.255 inside; d8 m3 r% k5 L' V
pdm location 192.168.0.31 255.255.255.255 inside
" e& b6 ?/ u* h8 y+ N8 `& I( h8 Kpdm location 192.168.0.30 255.255.255.255 inside
) t. J" h( I4 |: S% ?pdm location 192.168.0.210 255.255.255.255 inside7 S, P* i' J3 U+ ~" w  Q9 L
pdm location 192.168.0.8 255.255.255.255 inside7 G! K# [: b% X" l5 s( q
pdm location 192.168.0.11 255.255.255.255 inside
: b2 C7 D  _7 C: V% e8 u* e* O4 Xpdm location 192.168.0.29 255.255.255.255 inside- [0 D/ g: m$ @  g8 r
pdm location 192.168.0.109 255.255.255.255 inside0 q' N$ B5 q* A/ \  t  W
pdm location 192.168.0.111 255.255.255.255 inside! q/ t/ ]! u. r. S  y4 i- ?
pdm location 192.168.0.116 255.255.255.255 inside
4 W, J! s/ p' H" s3 Jpdm location 192.168.0.113 255.255.255.255 inside
+ }* Y1 o# D" B# W" C+ apdm location 192.168.0.107 255.255.255.255 inside
$ v+ H$ M# b8 G0 ^$ cpdm location 192.168.0.240 255.255.255.255 inside
$ O; I, g; {4 e" {% Q; L3 Q1 ]pdm location 192.168.0.241 255.255.255.255 inside, i; b  Q4 _2 O" X& \; Q: {
pdm location 192.168.0.233 255.255.255.255 inside
1 ^  `- O- s" c; O- apdm location 192.168.0.250 255.255.255.255 inside
# b$ a; W7 `: u6 Epdm location 192.168.0.252 255.255.255.255 inside
1 L  q* b8 S" s8 `( |3 P% D) _3 Cpdm location 192.168.0.253 255.255.255.255 inside1 h4 y- ^8 N5 U& _! M1 B6 C) m
pdm location 192.168.0.44 255.255.255.255 inside
% s8 g. k9 C" _" H: |pdm location 192.168.0.242 255.255.255.255 inside
4 d- Y/ \4 u5 z+ V! R! G  spdm location 192.168.0.239 255.255.255.255 inside  M# o2 Q0 `7 R1 J4 h
pdm location 192.168.0.27 255.255.255.255 inside
% N' y  Q0 ^, s/ N- m/ _% v  [8 Opdm location 192.168.0.249 255.255.255.255 inside
& z; b8 V7 n* x; ]2 t$ ypdm location 192.168.0.61 255.255.255.255 inside: \$ d: d! s4 x7 Z$ ~  O
pdm location 192.168.0.62 255.255.255.255 inside4 [' v+ E8 k: V- ^9 Z9 ]0 x
pdm location 192.168.0.63 255.255.255.255 inside. {" p2 k  Q2 P+ ^- l) J- t
pdm location 192.168.0.64 255.255.255.255 inside
: K1 f3 [: Q0 i4 F' ?" g" Xpdm location 192.168.0.68 255.255.255.255 inside
. R9 `9 L& S9 A- L, ]. |pdm location 192.168.0.211 255.255.255.255 inside
8 R) m. ?3 W) C) A: K7 ]7 O" npdm location 192.168.0.70 255.255.255.255 inside
; K, m5 l8 [3 r* x1 Dpdm location 192.168.0.65 255.255.255.255 inside
: o9 A6 u; n2 O) h, ]- ypdm location 192.168.0.121 255.255.255.255 inside1 _) \4 Q5 L* z5 ?$ D8 u
pdm location 192.168.0.247 255.255.255.255 inside- b! @5 p0 T4 Y1 F- L; v
pdm location 192.168.0.37 255.255.255.255 inside
% H& h8 o8 I5 k- Y* T, C! npdm location 192.168.0.73 255.255.255.255 inside
) K6 y6 o9 P: opdm location 192.168.0.112 255.255.255.255 inside* u6 O% P% n( E3 \4 a: t2 k
pdm location 192.168.0.57 255.255.255.255 inside
  z' ~: O+ c# [, o: spdm location 192.168.0.99 255.255.255.255 inside
5 T2 D3 Z+ a1 w4 h3 R$ Kpdm location 192.168.0.124 255.255.255.255 inside6 d% b3 {7 g" `% I# c
pdm location 192.168.0.52 255.255.255.255 inside
* L, n8 {. w! t! A$ I. H* F5 `pdm location 192.168.0.118 255.255.255.255 inside
5 M0 o7 h# p+ ^. J9 E% l$ J1 B" ipdm location 192.168.0.122 255.255.255.255 inside
; J- c6 H. s4 S3 x" apdm location 192.168.0.49 255.255.255.255 inside
" L' P* X" z7 E6 p. epdm location 192.168.0.55 255.255.255.255 inside, ~0 w1 ]* z  ?( H
pdm location 192.168.0.43 255.255.255.255 inside% [9 a0 x6 n% L( X# J0 o4 `0 S" M# \
pdm location 192.168.0.103 255.255.255.255 inside
3 j5 x+ a* T3 N9 }& Qpdm location 192.168.0.54 255.255.255.255 inside& \. h% {8 v- ~& b: H3 Q4 N' i# o# g
pdm location 192.168.0.243 255.255.255.255 inside
( i5 t. T6 k) a+ Lpdm location 192.168.0.244 255.255.255.255 inside# P9 @. v; z& P
pdm location 192.168.0.230 255.255.255.255 inside
: y+ q; t  ^9 @pdm location 192.168.0.135 255.255.255.255 inside
% K5 K! P6 L7 A. b2 f# E" O! ]pdm location 192.168.0.115 255.255.255.255 inside' C0 Q: s; W. B* L6 Y; O
pdm location 192.168.0.245 255.255.255.255 inside
* W! A6 p2 h6 y) s4 S( o) |& [+ O2 Jpdm location 192.168.0.238 255.255.255.255 inside
- G" b: l( t! ]% Q% spdm location 192.168.0.237 255.255.255.255 inside
9 i0 n6 @* `( y) w5 w8 c) vpdm location 192.168.0.231 255.255.255.255 inside4 V  c* A7 o7 i2 ]1 @; @! z. L
pdm location 192.168.0.235 255.255.255.255 inside
& `3 A. H1 y8 x  X8 [pdm location 192.168.0.236 255.255.255.255 inside
1 f' J5 f/ D3 s/ zpdm location 192.168.0.190 255.255.255.255 inside" e; ^. Y* _8 W5 H" m" R
pdm location 192.168.0.181 255.255.255.255 inside$ v" I/ i. r7 v2 _
pdm location 192.168.0.9 255.255.255.255 inside4 Q' G! r- M  h! g$ N9 d7 T1 G
pdm location 192.168.0.246 255.255.255.255 inside
0 q/ @- \. O3 Z5 |) U- V! t3 @pdm location 192.168.0.59 255.255.255.255 inside# ?4 Q; F% y- V/ J! q
pdm location 192.168.0.191 255.255.255.255 inside% C8 C' Y! S/ d# _+ i& s
pdm location 192.168.0.117 255.255.255.255 inside
* D8 W7 y2 J- y+ {pdm location 192.168.0.171 255.255.255.255 inside( @5 ]4 r, {2 a" `+ _( F( ?& ]7 B
pdm location 192.168.0.53 255.255.255.255 inside
- u: b7 X7 z+ K" o# zpdm location 192.168.0.130 255.255.255.255 inside  n) G6 f9 I4 D
pdm location 192.168.0.91 255.255.255.255 inside) ^, Z- Y4 o7 R/ K  P
pdm location 192.168.0.140 255.255.255.255 inside4 A. o# N! F& N& \
pdm location 192.168.0.220 255.255.255.255 inside
- Q' Y" P" k" X0 X- zpdm location 192.168.0.119 255.255.255.255 inside
2 f  F, A: f% }. Spdm location 192.168.0.223 255.255.255.255 inside3 ~. \$ O7 [4 g; |' j
pdm location 192.168.0.106 255.255.255.255 inside
7 w/ i- J; t6 f) I1 lpdm location 192.168.0.123 255.255.255.255 inside/ v3 _2 [. I+ ?% A( H% A( V/ b4 y
pdm location 192.168.0.67 255.255.255.255 inside
( T& Z( v. ?0 @pdm location 192.168.0.219 255.255.255.255 inside
( ^" r6 e& E) Z0 Mpdm location 192.168.0.56 255.255.255.255 inside4 _$ h) q, u. u4 ^
pdm location 192.168.0.66 255.255.255.255 inside
% J0 ~0 l" ^% D" x, _  }/ s  epdm location 192.168.0.76 255.255.255.255 inside8 L: a& ?; h& A" `  c. B
pdm location 192.168.0.102 255.255.255.255 inside
' A. R) v, U( x8 {4 vpdm location 192.168.0.170 255.255.255.255 inside
% c1 G* b" K# ?0 Q1 }pdm location 192.168.0.172 255.255.255.255 inside& V. }. U7 z: a; ^" F
pdm location 192.168.0.173 255.255.255.255 inside
" \3 o  D( Y( g) Y% J7 Dpdm location 192.168.0.174 255.255.255.255 inside
. v( C% y! D  b- n, Wpdm location 192.168.0.175 255.255.255.255 inside8 F5 ?, x7 I) i! V% Y; N* Z+ M# C
pdm location 192.168.0.160 255.255.255.255 inside2 F; S# f: `& ]) x; Q! L5 i
pdm location 192.168.0.138 255.255.255.255 inside
  T- B8 H: `. \' opdm location 192.168.0.78 255.255.255.255 inside9 j! m0 _0 f# @  a" V
pdm location 192.168.0.69 255.255.255.255 inside$ y+ t5 r; u$ o" W
pdm location 192.168.0.221 255.255.255.255 inside, y% A# x) k. z9 q. R
pdm location 192.168.0.110 255.255.255.255 inside$ o0 r) o/ v1 f9 ~
pdm location 192.168.0.232 255.255.255.255 inside
6 I7 y" u8 d) I3 Y5 r" Npdm location 192.168.0.80 255.255.255.255 inside# }0 {0 P0 Z4 v; k) P& \& V
pdm location 192.168.0.81 255.255.255.255 inside: q3 X/ W) f$ U! W0 N/ F& u. q
pdm location 192.168.0.82 255.255.255.255 inside
" Z5 \& A: d0 F1 \! m5 j* C4 Wpdm location 192.168.0.83 255.255.255.255 inside
7 `5 Z+ Z  p0 opdm location 192.168.0.84 255.255.255.255 inside
7 Z7 I" c; Y& y6 rpdm location 192.168.0.85 255.255.255.255 inside  o$ ?$ }1 ?+ G6 }9 h0 S$ j
pdm location 192.168.0.86 255.255.255.255 inside/ u# C* b" C2 n# I6 ?8 ^5 W, D, N
pdm location 192.168.0.87 255.255.255.255 inside+ C1 r6 t8 Y8 t9 u' j5 a/ y
pdm location 192.168.0.88 255.255.255.255 inside3 c+ y0 y5 p0 ?
pdm location 192.168.0.89 255.255.255.255 inside* G" a$ z+ ?) ~% E  R! @) c  H
pdm location 192.168.0.90 255.255.255.255 inside4 I1 U2 b  w* Y9 P) s7 e- X: L* Q
pdm location 192.168.0.28 255.255.255.255 inside
1 J& E& b& ^* {8 G$ npdm location 192.168.0.234 255.255.255.255 inside
4 c: U- c- k9 D5 j" ?, d2 Rpdm location 192.168.0.222 255.255.255.255 inside
/ F- {  s4 K5 b1 n4 s% D+ L. ypdm location 192.168.0.150 255.255.255.255 inside
6 z2 I* S6 P* `* X9 Bpdm location 192.168.0.151 255.255.255.255 inside. Z2 {/ O& z  F8 m2 [. t" F7 P
pdm location 192.168.0.152 255.255.255.255 inside, x: }% B. m0 C6 K
pdm location 192.168.0.77 255.255.255.255 inside; }# _' d; M) S6 U" w, ?8 R) b4 x0 Z
pdm location 192.168.0.72 255.255.255.255 inside! m+ i, ]5 T3 N" W+ r
pdm location 192.168.0.225 255.255.255.255 inside2 u* K- p, d8 n- L
pdm location 192.168.0.161 255.255.255.255 inside* }% v# ?1 X/ z1 f8 R0 x) c* J
pdm location 192.168.0.92 255.255.255.255 inside
8 k$ H) l# T: P. A5 updm location 192.168.0.192 255.255.255.255 inside( V8 c0 S1 Q* ^: Y0 G" Q
pdm location 192.168.0.193 255.255.255.255 inside
% |! Z0 G* H: U: `pdm location 192.168.0.15 255.255.255.255 inside
* f- f) E& T* w) ypdm location 192.168.0.33 255.255.255.255 inside
% `- ~& D0 X8 Updm location 192.168.0.79 255.255.255.255 inside
4 V0 d8 V  u7 b7 |, Fpdm location 192.168.0.93 255.255.255.255 inside  @. A& l5 H/ _! D
pdm location 192.168.0.94 255.255.255.255 inside) @% Y  V' h1 M- D+ }
pdm location 192.168.0.95 255.255.255.255 inside. `5 k9 ^$ A" u$ L* e
pdm location 192.168.0.96 255.255.255.255 inside% y. S$ l; R- A
pdm location 192.168.0.97 255.255.255.255 inside# g+ \& f- m7 s6 a" H. L. U0 e
pdm location 192.168.0.98 255.255.255.255 inside
1 N9 m9 M9 R% G8 F( K. [. b+ ypdm location 192.168.0.101 255.255.255.255 inside$ o4 M3 l" q" Z' N$ V+ W; M
pdm location 192.168.0.104 255.255.255.255 inside+ \4 H/ q: n% L
pdm location 221.XXX.138.250 255.255.255.255 inside
8 I1 l) d# u1 o" `2 {& bpdm location 192.168.0.71 255.255.255.255 inside
7 j3 M5 H5 l. }) g3 s& [pdm location 192.168.0.185 255.255.255.255 inside
0 ]. c) }6 `; E- `' k0 ]7 v4 k; opdm location 192.168.0.75 255.255.255.255 inside8 |3 m6 n" p( d6 Y1 Q+ o
pdm location 192.168.0.120 255.255.255.255 inside
7 }7 \% ^+ r5 r3 P. N3 H7 Qpdm location 192.168.0.212 255.255.255.255 inside
" P( v$ W) j0 v) Z7 }/ epdm location 192.168.0.213 255.255.255.255 inside3 B* Y2 V+ U" Q- d2 f+ E
pdm location 192.168.0.214 255.255.255.255 inside
9 x' X; K9 |" E" @, Fpdm location 192.168.0.215 255.255.255.255 inside
2 ]1 Z( y6 E* Jpdm location 192.168.0.128 255.255.255.192 outside
& y. Z9 _) R  |# \9 ~, wpdm history enable
: M0 z+ k0 h: X" H0 jarp timeout 14400. \' a% c* a( G! {! d* c* z: Q
global (outside) 10 interface
, Q! J) v, X1 ]" V1 @: T. }nat (outside) 0 access-list outside_inbound_nat0_acl outside9 {3 K+ Q+ S0 C$ H
nat (inside) 10 192.168.0.1 255.255.255.255 0 0/ k0 `- X0 u7 I+ f- r) M9 Q/ E
nat (inside) 10 192.168.0.3 255.255.255.255 0 0; O* q) S6 @' J7 w% f$ D! Y
nat (inside) 10 192.168.0.4 255.255.255.255 0 0
" t. U$ t7 \( }" n' S, Pnat (inside) 10 192.168.0.5 255.255.255.255 0 0* Y+ x; U+ x) A
nat (inside) 10 192.168.0.10 255.255.255.255 0 0  M) @. C& \5 r  y$ `- w! D8 _
nat (inside) 10 192.168.0.11 255.255.255.255 0 0
$ ?) Y# {9 u1 L7 M# jnat (inside) 10 192.168.0.12 255.255.255.255 0 01 {( i2 x4 I6 }1 B7 H% u$ g
nat (inside) 10 192.168.0.13 255.255.255.255 0 0( |5 T# p6 |. W
nat (inside) 10 192.168.0.14 255.255.255.255 0 0
0 j% u9 n( T5 s* v0 H) m" ^nat (inside) 10 192.168.0.15 255.255.255.255 0 0
+ d  v: N0 z5 D1 z. k- H+ N0 v' Pnat (inside) 10 192.168.0.16 255.255.255.255 0 0- l" }9 P/ u! o* i3 T
nat (inside) 10 192.168.0.17 255.255.255.255 0 0
& c) i" S" i- Cnat (inside) 10 192.168.0.21 255.255.255.255 0 0
* l4 }  i6 R) ?9 V# ?nat (inside) 10 192.168.0.22 255.255.255.255 0 0
6 w. V1 J7 }" O/ r3 U( z5 `  snat (inside) 10 192.168.0.23 255.255.255.255 0 0. ?. O  N8 {. C% y" A( J
nat (inside) 10 192.168.0.24 255.255.255.255 0 0
% d4 }0 m  d) ]nat (inside) 10 192.168.0.25 255.255.255.255 0 0+ ?0 u: ~. I- p: U3 c
nat (inside) 10 192.168.0.26 255.255.255.255 0 0
- m4 Y* p# e) fnat (inside) 10 192.168.0.27 255.255.255.255 0 0
% d. v  T1 q* Pnat (inside) 10 192.168.0.29 255.255.255.255 0 0
' @0 k- F* Z& M7 ]  [nat (inside) 10 192.168.0.31 255.255.255.255 0 05 v  N1 X- j! P: ?# [- N  d
nat (inside) 10 192.168.0.32 255.255.255.255 0 0! _9 k+ c8 D( P
nat (inside) 10 192.168.0.33 255.255.255.255 0 07 ~( ?' c* v9 ~1 E
nat (inside) 10 192.168.0.34 255.255.255.255 0 0
) e: F, M8 d7 A) y* r* r1 `. dnat (inside) 10 192.168.0.37 255.255.255.255 0 06 _" l0 R) }, K. Z
nat (inside) 10 192.168.0.39 255.255.255.255 0 0
7 S9 t: p" Y$ |5 N0 wnat (inside) 10 192.168.0.40 255.255.255.255 0 0! j) ]5 |0 v- ]. S
nat (inside) 10 192.168.0.44 255.255.255.255 0 0
: _5 p, \( S; {nat (inside) 10 192.168.0.45 255.255.255.255 0 0' i# I+ l; U9 E- P
nat (inside) 10 192.168.0.47 255.255.255.255 0 03 Z  a( {4 J/ w. R
nat (inside) 10 192.168.0.48 255.255.255.255 0 03 k- F& O& z: ^% ]: Z& }- Q
nat (inside) 10 192.168.0.49 255.255.255.255 0 0% N9 P! Q+ D! y4 q- l+ S! ?+ g
nat (inside) 10 192.168.0.50 255.255.255.255 0 0
. P' x  p+ b9 s7 hnat (inside) 10 192.168.0.51 255.255.255.255 0 0
4 o. r7 f  A3 s' Y  @/ `  wnat (inside) 10 192.168.0.52 255.255.255.255 0 0
; U' c0 Y* @. C" ]# Unat (inside) 10 192.168.0.53 255.255.255.255 0 0
2 D/ r& Z* q+ `  h& r# lnat (inside) 10 192.168.0.54 255.255.255.255 0 0
" G0 T4 ~# J/ jnat (inside) 10 192.168.0.55 255.255.255.255 0 0% b4 S9 M) t/ p0 n# k6 `
nat (inside) 10 192.168.0.56 255.255.255.255 0 0
! `" \! _# Q& D, l. p+ \" [nat (inside) 10 192.168.0.57 255.255.255.255 0 0
8 M/ x) ^: _8 F8 n9 n2 J, dnat (inside) 10 192.168.0.58 255.255.255.255 0 0- }+ X9 Z) t/ P' ~; t8 T3 D8 Y
nat (inside) 10 192.168.0.59 255.255.255.255 0 0
% l; z8 Y2 S+ [3 Q, n8 Bnat (inside) 10 192.168.0.62 255.255.255.255 0 0+ K: p9 O2 G, t. R, O; r/ B% W9 y
nat (inside) 10 192.168.0.63 255.255.255.255 0 0
, X1 J# P( F( M3 vnat (inside) 10 192.168.0.64 255.255.255.255 0 06 D( ~9 G4 ~. e2 e9 n/ W7 o/ M+ B
nat (inside) 10 192.168.0.65 255.255.255.255 0 04 e; q) s7 A. n6 }% T5 u
nat (inside) 10 192.168.0.66 255.255.255.255 0 0
" @! v6 A% L0 h- X. Cnat (inside) 10 192.168.0.67 255.255.255.255 0 0
3 t# X% a0 R. H4 h7 Onat (inside) 10 192.168.0.68 255.255.255.255 0 0
$ ^$ ?. \5 _6 S% R: [& Xnat (inside) 10 192.168.0.69 255.255.255.255 0 0  y  h8 b& }" ?. x; S
nat (inside) 10 192.168.0.71 255.255.255.255 0 0
: D" S( H. @) @) ]- `+ r" Znat (inside) 10 192.168.0.73 255.255.255.255 0 0
8 x3 l2 ]% ~& N% a8 i. F4 P: {nat (inside) 10 192.168.0.76 255.255.255.255 0 0
5 a4 B& M7 o- x6 Z0 g4 fnat (inside) 10 192.168.0.79 255.255.255.255 0 0
( M2 R4 z: j! D" d3 A7 T) Qnat (inside) 10 192.168.0.80 255.255.255.255 0 0
8 }6 h0 l/ f2 T; r- `1 f, `nat (inside) 10 192.168.0.81 255.255.255.255 0 07 E( U- I1 t* J. w7 C/ I7 @3 c) l
nat (inside) 10 192.168.0.82 255.255.255.255 0 0! D$ g9 r# ?1 a, L2 }! W
nat (inside) 10 192.168.0.83 255.255.255.255 0 0
1 w7 }. [* u$ p3 I6 M: fnat (inside) 10 192.168.0.85 255.255.255.255 0 04 @/ v# Q  o# x7 n& q+ P
nat (inside) 10 192.168.0.86 255.255.255.255 0 0' d* n" n- k: n; O
nat (inside) 10 192.168.0.87 255.255.255.255 0 0
+ x- W8 o4 A" ]# a8 B& ynat (inside) 10 192.168.0.89 255.255.255.255 0 0
' o6 u- b2 h  p& M. znat (inside) 10 192.168.0.90 255.255.255.255 0 0
2 s: a! M" ~$ C2 {/ n3 Dnat (inside) 10 192.168.0.92 255.255.255.255 0 0# a9 Q, w) g( `% {  Z0 W1 f# C- r
nat (inside) 10 192.168.0.93 255.255.255.255 0 0# K. s2 ]% U$ V; M% B2 `0 {
nat (inside) 10 192.168.0.94 255.255.255.255 0 0
/ k, r/ M2 k" Dnat (inside) 10 192.168.0.95 255.255.255.255 0 0
* \  M( p3 d$ E4 W. j, [nat (inside) 10 192.168.0.96 255.255.255.255 0 0
% y8 }; W* I7 V5 Mnat (inside) 10 192.168.0.97 255.255.255.255 0 0
) d6 t- Q, H/ H) pnat (inside) 10 192.168.0.99 255.255.255.255 0 0
: Y" \3 o( W5 N# g: e6 \6 K9 F( ?; unat (inside) 10 192.168.0.101 255.255.255.255 0 0: y% b% Z: G# p  O( P" s8 C
nat (inside) 10 192.168.0.102 255.255.255.255 0 0
( r" S# B4 a" X; U! c8 ?6 Q: o5 f2 Rnat (inside) 10 192.168.0.103 255.255.255.255 0 0! E( h+ s' m" h* O
nat (inside) 10 192.168.0.104 255.255.255.255 0 0+ v3 p/ j4 o. C/ ~. R7 e! N/ @6 x, }
nat (inside) 10 192.168.0.106 255.255.255.255 0 0' T3 L* U8 \+ ]  Q
nat (inside) 10 192.168.0.107 255.255.255.255 0 0
! p2 p5 f$ n: ?  ^( Onat (inside) 10 192.168.0.108 255.255.255.255 0 0
! ?# N  Y* D2 l6 ^9 X& }nat (inside) 10 192.168.0.118 255.255.255.255 0 05 `9 r/ b# L+ u" H% O9 Y# {" I8 m. [
nat (inside) 10 192.168.0.119 255.255.255.255 0 0
! I6 D. G0 w2 j2 Wnat (inside) 10 192.168.0.120 255.255.255.255 0 0
1 o+ S+ c6 I) ~; Bnat (inside) 10 192.168.0.121 255.255.255.255 0 0% f( L- j+ m) A' w5 \5 h3 M
nat (inside) 10 192.168.0.200 255.255.255.255 0 0
5 r. p6 s9 n' [9 znat (inside) 10 192.168.0.201 255.255.255.255 0 01 N. u" ^1 y& B3 K" |
nat (inside) 10 192.168.0.202 255.255.255.255 0 0% \3 Z0 y& k* l6 I9 Q/ K
nat (inside) 10 192.168.0.203 255.255.255.255 0 0
- A7 u! B) E# m3 pnat (inside) 10 192.168.0.204 255.255.255.255 0 0
7 I) S+ G, ^; v0 Z/ I, h+ [nat (inside) 10 192.168.0.205 255.255.255.255 0 0
; ?) |7 |& J% p; ynat (inside) 10 192.168.0.206 255.255.255.255 0 0) n: }  c5 ~5 o* h! \8 V; C- Q: R
nat (inside) 10 192.168.0.207 255.255.255.255 0 0
7 d4 z( A+ |4 t' Wnat (inside) 10 192.168.0.208 255.255.255.255 0 0
  c* d) r1 _* ]# T1 R2 K1 Cnat (inside) 10 192.168.0.209 255.255.255.255 0 0& l4 [3 B& ^: a6 M$ l1 o
nat (inside) 10 192.168.0.210 255.255.255.255 0 0# s. x( J; d0 l4 t4 k
nat (inside) 10 192.168.0.211 255.255.255.255 0 0
) u) ?  s5 A3 I  U4 n/ L$ gnat (inside) 10 192.168.0.212 255.255.255.255 0 0
! N( [- M1 {& _0 B7 j' hnat (inside) 10 192.168.0.213 255.255.255.255 0 0
" J4 q! \. c6 W, Rnat (inside) 10 192.168.0.214 255.255.255.255 0 0" g; V  r4 p* L2 J" \8 w1 P1 K: |( Q2 y
nat (inside) 10 192.168.0.215 255.255.255.255 0 0
. L+ o' G" _7 R0 }1 k8 [4 Onat (inside) 0 192.168.0.0 255.255.255.0 0 0- O/ K3 q0 J0 Q8 Y2 v0 H/ @
nat (inside) 10 0.0.0.0 0.0.0.0 0 0* O' }. \. p" X: H; T( t; V6 f
route outside 0.0.0.0 0.0.0.0 221.XXX.138.249 1
& T. G+ E6 M1 O7 J! P  rtimeout xlate 3:00:004 r  e* |8 ^) _3 ~& s$ o+ _
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
: I( l: c3 k- m5 {# J+ C$ ~; x5 Itimeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
# _; c9 _' J) s* s# P( K7 y( Jtimeout uauth 0:05:00 absolute
7 K& b6 h& H" H- n2 Kaaa-server TACACS+ protocol tacacs+
( e; U8 O8 Z+ L5 C  H+ B! P' d+ raaa-server RADIUS protocol radius
6 l* n/ T! A. G0 d  m8 R. O0 yaaa-server LOCAL protocol local " ^5 U: b/ ?0 P
http server enable4 ~8 _7 V1 ^. a
http 192.168.0.0 255.255.255.0 inside
" f: t& ], J4 [0 kno snmp-server location
; p1 x, q0 s$ f: E2 ^. ]. Y$ kno snmp-server contact
2 y. u1 x! N) |3 dsnmp-server community public0 U7 q! k3 C: P8 g, G  q2 O
no snmp-server enable traps% u5 B$ w& i, k3 k" Z  G6 h
floodguard enable
+ {0 H- }$ u( O, d- Z6 U) V8 w' vsysopt connection permit-ipsec* T3 e$ L) Y" m' }: N
sysopt connection permit-l2tp$ _7 h# v/ a+ P' S) d( Q
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac $ c# I) r# }* ~) f6 M, x  B* W
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac * A4 k: V4 x) X0 m3 D, C& C
isakmp enable outside% f0 z2 X7 H; ^) g8 r% M* A2 t+ W
isakmp enable inside
& d$ y$ }/ ~' q8 Q, M& _# w% Ftelnet timeout 5# S+ n& Q. U6 P1 ?/ G
ssh 0.0.0.0 0.0.0.0 outside# I* m1 C4 x& w: V
ssh 0.0.0.0 0.0.0.0 inside7 F* P" q& q5 s9 [; B8 ?" y  d
ssh timeout 5" f( p) d9 Z+ k: [
console timeout 0
1 _3 b5 T5 n( x& k' E. Gvpdn username wanhine password ********* ; J- C9 E$ ^+ W6 K% f6 S/ `
vpdn enable outside
- Q* O( P. w1 a/ ovpdn enable inside
  K3 Z! q  G' qdhcpd address 192.168.0.20-192.168.0.200 inside) a; {$ C" h) I3 C0 S
dhcpd dns 202.103.24.68 202.103.0.117" O+ w* r) Q# ~
dhcpd lease 3600) C& r7 O( I# _' }8 b" r
dhcpd ping_timeout 7503 F. k9 i" w& s( s
terminal width 80$ h$ d* o( R2 ?6 L! @" i3 @
Cryptochecksum:f40dc8963b7f456d60eac467e8c0ea87
. E0 C- N. @( g  b: end. ~- K7 M& H! j
[OK]+ Y/ v, T3 ?$ U$ A
# s: n( H5 J$ c9 h
. @- U; u# G- `; ^/ m
8 |: m- w3 ~  u2 D# T. z
请高人指点.
! ~$ @- F7 W. k* `. f如果PDM无法实现,请发下完整的配置表谢谢,万分感谢!
回复 支持 反对

使用道具 举报

fondafo [Lv8 技术精悍] 发表于 2013-10-8 09:05:52 | 显示全部楼层
真是 收益 匪浅
回复 支持 反对

使用道具 举报

tlq888 [VIP@钻石] 发表于 2013-10-8 14:56:55 | 显示全部楼层
好好 学习了 确实不错
回复 支持 反对

使用道具 举报

jyb75820400 [Lv8 技术精悍] 发表于 2013-10-18 09:47:48 | 显示全部楼层
过来看看的,感谢攻城狮论坛
回复 支持 反对

使用道具 举报

roc8788 [Lv8 技术精悍] 发表于 2013-10-21 18:16:13 | 显示全部楼层
我是个凑数的。。。
回复 支持 反对

使用道具 举报

zlm888 [Lv8 技术精悍] 发表于 2013-10-21 21:18:44 | 显示全部楼层
回复 支持 反对

使用道具 举报

w10 [Lv8 技术精悍] 发表于 2013-10-24 21:45:30 | 显示全部楼层
谢谢楼主,共同发展
回复 支持 反对

使用道具 举报

时光后 [Lv8 技术精悍] 发表于 2013-10-25 09:29:59 | 显示全部楼层
谢谢楼主,共同发展
回复 支持 反对

使用道具 举报

我啊 [VIP@钻石] 发表于 2013-10-25 10:21:47 | 显示全部楼层
学习了,谢谢分享、、、
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-5-1 20:31 , Processed in 0.124658 second(s), 15 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn