本站已运行

攻城狮论坛

作者: 國際婦女會
查看: 4828|回复: 53

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] ip sec vpn无法向内穿越nat,向高人求解

  [复制链接]
查看: 4828|回复: 53
开通VIP 免金币+免回帖+批量下载+无广告
1.网络拓扑如下图
0 O4 X( }( P5 U& D- V! l) I: L  M' c$ k; U. Q; u
2.CISCO pix515e使用PDM3.0配置如下4 g; E8 }* O* J
& ^$ B% G( Z7 E& e! n# q

* i" c2 s7 F. B/ i% v3 @& q$ H$ a/ I7 E  U
& K5 _8 t7 F( R: \- \9 k4 u' X

" {& W2 @2 C+ @  R: e' S
% g3 E( Q" r  h
0 P0 F* e# g) i8 J/ \0 [3.拟实现的网络功能:公网计算机通过光纤、ADSL、WIFI、mobile等方式接入因特网,再通过windows自带的虚拟专用网拨号连接或者CISCO的VPN cilent拨入PIX515e内部的VpnServer,以实现接入VpnServer所在的局域网,共享局域网内的资源,VPN Server在内网测试通过。
/ I% d/ M* r- c8 `: {
5 Z! A4 q& u/ v4.遇到的问题:公网计算机无法通过pix515e的公网地址向内穿越NAT拨入VPNserver。能否在pix515e上建立一条Vpn Tunnel以实现第3条的网络功能,该如何建立。& \% h9 _3 b' V& _8 P* {, e+ C

2 l: ~: o$ c* T& J$ n5.已失败的方法7 U" V* ]1 C9 v9 c( g9 f+ H# |- x
4 \' w0 L3 I6 _
A:端口映射,该思科设备通过NAT功能将内网IP转换为公网IP,不是路由器,无法做端口映射。% z* n9 A0 L/ R# X5 v, h0 K

$ r% i* o& R2 Q! H% u% RB:在PDM3.0上尝试对PIX515e进行VPN的设置,未能凑效。
# Q* e  S. h- Q: o2 v* c0 Q& i$ @8 q( u4 g2 a1 k% C
C:逆向NAT失败,PDM3.0不允许。
# h) L" h4 b$ C9 o* q- n! n
- F: b, C- [2 S$ }7 ^# c, c设备目前的配置列表* \! o" |% ?1 K! o
! t" d  r! p6 ]! S
Building configuration...& w9 y' G- I' C2 m; W* `
: Saved
. i% F1 o4 l1 X4 v2 R9 k( S:
0 Y% `8 L  ~0 g+ Q7 YPIX Version 6.3(3)+ H/ o: \( y' f; L4 A
interface ethernet0 auto
3 I4 V  n0 O4 X6 B/ Winterface ethernet1 auto+ Q* N; e! I6 ]8 u& C  k
nameif ethernet0 outside security0
3 G8 t, e+ u2 ^7 ^! _, S) Nnameif ethernet1 inside security100
+ g' |0 C! }" j0 m" aenable password /NNcO2U/e4a3IAX3 encrypted
; r6 y! N( f( a) Wpasswd 2KFQnbNIdI.2KYOU encrypted
( n* q+ @5 ^" Q2 v9 A. Chostname huawei
6 Z! o" L5 R4 S2 p2 V; ?2 W; tdomain-name huawei.com$ {0 J* d) m/ a# \+ x
fixup protocol dns maximum-length 512
7 p- A6 N; [: C$ H( e8 Z8 _fixup protocol ftp 213 C; W4 v) \  H5 \/ f5 X  ]/ }6 ~
fixup protocol h323 h225 1720
0 Y1 {. R1 Q% b% afixup protocol h323 ras 1718-17199 E- k9 w  A- F% @& b+ K  _% f. T
fixup protocol http 80
! J- G0 H4 P$ X) ~4 Wfixup protocol rsh 514
& T1 f/ a- ^5 l# G/ Afixup protocol rtsp 554. I+ A# d0 ~5 g. h" ?
fixup protocol sip 5060# f# z$ R. Q- a
fixup protocol sip udp 5060
7 [5 c# Y  o  s- F% }+ nfixup protocol skinny 2000
: ?/ j. P# V% Kfixup protocol smtp 257 O2 j% v- d! O5 o- r( K
fixup protocol sqlnet 1521, X& f* N: ~* K, m9 D
fixup protocol tftp 69
5 h" n; ^# Z% U: j9 j- Jnames
; O4 H0 s$ r2 S% s9 h4 maccess-list outside_inbound_nat0_acl permit ip interface outside 192.168.0.0 255.255.255.0 8 Z( Y' d- u9 F) i+ s
pager lines 24# ]- L( ~2 O' o$ W( [, U
mtu outside 1500
, G3 L  @7 n7 Dmtu inside 1500
' g' S0 r' r" f- G; j3 s1 kip address outside 221.XXX.138.250 255.255.255.252: s4 u, \( \# s, Y& t/ |
ip address inside 192.168.0.254 255.255.255.0
+ B  K  B5 P" \4 Cip audit info action alarm/ V  v; B# I9 }
ip audit attack action alarm/ g- Q/ R' c7 X* a7 U" y
pdm location 192.168.0.3 255.255.255.255 inside" x- ^! r# ]6 z8 R3 Z
pdm location 192.168.0.24 255.255.255.255 inside
9 Q0 a5 ?" q, h( ^$ g/ y7 ?pdm location 192.168.0.1 255.255.255.255 inside3 [2 x* R  a7 M! S# m( _2 T" c
pdm location 192.168.0.2 255.255.255.255 inside2 Q, J8 T7 w0 I5 v+ Z! l4 Z
pdm location 192.168.0.12 255.255.255.255 inside& @( X; n1 \+ m" a! r
pdm location 192.168.0.10 255.255.255.255 inside
% c5 f: @9 U% f5 epdm location 192.168.0.16 255.255.255.255 inside$ r9 Y  c( l# [1 E, p( |1 V
pdm location 192.168.0.19 255.255.255.255 inside
/ O. r; w; A1 epdm location 192.168.0.20 255.255.255.255 inside
$ X. i5 p! n$ \2 a( Xpdm location 192.168.0.22 255.255.255.255 inside9 D5 a! P+ ?1 W# B
pdm location 192.168.0.23 255.255.255.255 inside0 T! h! `/ R8 B% L
pdm location 192.168.0.34 255.255.255.255 inside
2 u6 f1 J2 U& i; u1 l4 Cpdm location 192.168.0.38 255.255.255.255 inside
% o, s1 s) w% z& d4 \& |- Q( k$ u( hpdm location 192.168.0.40 255.255.255.255 inside
6 N4 G- F' C: npdm location 192.168.0.58 255.255.255.255 inside
3 \2 g2 n5 Y/ m. r! U; B2 U% ~+ opdm location 192.168.0.17 255.255.255.255 inside
. B- J. z1 m$ Cpdm location 192.168.0.39 255.255.255.255 inside
$ T0 x$ `$ T9 d* {; {' Spdm location 192.168.0.41 255.255.255.255 inside6 Q3 v6 d5 i3 J; r  O$ v+ `2 a
pdm location 192.168.0.13 255.255.255.255 inside
1 N0 i  i! W7 y# L! @7 A+ Z1 gpdm location 192.168.0.42 255.255.255.255 inside, n, y& h! x# o. b2 z5 I
pdm location 192.168.0.45 255.255.255.255 inside
- J$ u, |7 @7 K/ U& z8 N- xpdm location 192.168.0.46 255.255.255.255 inside) c# L% [. O9 g7 \" T& T+ i$ m
pdm location 192.168.0.47 255.255.255.255 inside+ j  S5 J( ?# O( ~& a1 x
pdm location 192.168.0.50 255.255.255.255 inside3 C+ g9 g: J. q# Q7 r/ F6 b
pdm location 192.168.0.25 255.255.255.255 inside" b- H3 _+ s; J7 p* Z, S9 b
pdm location 192.168.0.4 255.255.255.255 inside
/ q5 @! U4 N  J8 C8 d/ |# _# ~pdm location 192.168.0.6 255.255.255.255 inside
1 J# X  h9 i3 a5 q* N6 \pdm location 192.168.0.35 255.255.255.255 inside) ~7 J) R5 Y+ J' c6 e
pdm location 192.168.0.21 255.255.255.255 inside
1 F$ J8 U, ?+ hpdm location 192.168.0.200 255.255.255.255 inside4 }4 V5 t1 ?) z7 C: P$ c/ V: i
pdm location 192.168.0.48 255.255.255.255 inside& x! r# I6 A' p+ j# W
pdm location 192.168.0.60 255.255.255.255 inside& q4 L+ i' g4 L
pdm location 192.168.0.51 255.255.255.255 inside
% l6 C/ }3 `4 Fpdm location 192.168.0.32 255.255.255.255 inside1 l3 u, J' n" \9 {
pdm location 192.168.0.18 255.255.255.255 inside
5 L( j  P! p( N: \2 r' n& [pdm location 192.168.0.7 255.255.255.255 inside3 W) W- r$ c/ h$ Q2 ?, e3 F$ A% X
pdm location 192.168.0.201 255.255.255.255 inside, [" {! x" K) T
pdm location 192.168.0.36 255.255.255.255 inside8 i0 J' V) ?4 G8 N# P' K* y3 n8 @
pdm location 192.168.0.100 255.255.255.255 inside
2 A  z' F/ M0 m; `pdm location 192.168.0.5 255.255.255.255 inside
9 x; @: @. h1 q" \+ Qpdm location 192.168.0.202 255.255.255.255 inside7 V0 ]/ {) ]# X7 ?% z1 ~9 l
pdm location 192.168.0.26 255.255.255.255 inside
9 `7 d( ]/ s0 C$ ?1 l3 Vpdm location 192.168.0.203 255.255.255.255 inside
0 e9 J% J+ z# s7 lpdm location 192.168.0.14 255.255.255.255 inside4 M  K* Z( {" x- @+ w
pdm location 192.168.0.204 255.255.255.255 inside
2 h7 @& ^! l' K0 v+ ipdm location 192.168.0.251 255.255.255.255 inside
2 @: w8 m1 A# F9 P* Opdm location 192.168.0.205 255.255.255.255 inside
/ h5 J0 J2 @. z5 A5 zpdm location 192.168.0.206 255.255.255.255 inside0 B8 H$ A9 W3 w0 E* G8 `1 |  v
pdm location 192.168.0.207 255.255.255.255 inside
6 n2 l% B% a8 b- }2 Epdm location 192.168.0.208 255.255.255.255 inside, ?6 M! i( L3 i) J9 u4 t) B
pdm location 192.168.0.209 255.255.255.255 inside
8 Z/ l! s* G5 w" ~1 n5 V3 Rpdm location 192.168.0.108 255.255.255.255 inside! s/ }) i* e9 u* H
pdm location 192.168.0.31 255.255.255.255 inside
- W) y3 ]' V6 gpdm location 192.168.0.30 255.255.255.255 inside
5 N7 j, I) N3 y( G2 f) A- |pdm location 192.168.0.210 255.255.255.255 inside
' z2 Y, f3 l: z( Q5 A; ?! Tpdm location 192.168.0.8 255.255.255.255 inside
; L2 j. F) p* u1 J1 y+ r! K8 tpdm location 192.168.0.11 255.255.255.255 inside1 k) {8 _5 E; T  t5 o, y
pdm location 192.168.0.29 255.255.255.255 inside
8 ]/ {6 C: c7 ^6 m- X- w, {6 s; ^pdm location 192.168.0.109 255.255.255.255 inside
- e& `2 y2 `1 ]2 y0 P0 ]pdm location 192.168.0.111 255.255.255.255 inside
( g2 H/ A8 m4 Epdm location 192.168.0.116 255.255.255.255 inside, c1 A0 [* w3 C/ {: S( s3 f, }
pdm location 192.168.0.113 255.255.255.255 inside
7 S: ]. _7 v- bpdm location 192.168.0.107 255.255.255.255 inside+ l& `. _5 @7 f1 S
pdm location 192.168.0.240 255.255.255.255 inside
- o& t- `+ x0 g9 O: Q& v) b6 Opdm location 192.168.0.241 255.255.255.255 inside+ Y, ^) L& O- d6 @! _6 B
pdm location 192.168.0.233 255.255.255.255 inside
7 D* ]0 y4 u$ U0 @: ~" `pdm location 192.168.0.250 255.255.255.255 inside
* Y, ^  y3 W/ g- \, K* vpdm location 192.168.0.252 255.255.255.255 inside
' X- M: e( k0 w0 ipdm location 192.168.0.253 255.255.255.255 inside  @& f& J+ h( q5 {: d4 e
pdm location 192.168.0.44 255.255.255.255 inside
3 U8 {7 j& J4 L4 H& t) l( o( Xpdm location 192.168.0.242 255.255.255.255 inside
/ G  L. S: v  Kpdm location 192.168.0.239 255.255.255.255 inside
1 p& n  D7 f/ ~* {pdm location 192.168.0.27 255.255.255.255 inside
/ I4 G$ K0 r5 p. y# O- @8 z* k9 wpdm location 192.168.0.249 255.255.255.255 inside( A/ ^7 B4 S$ o/ A7 f
pdm location 192.168.0.61 255.255.255.255 inside+ ^& `* J+ P( A  C3 m) H8 W! e
pdm location 192.168.0.62 255.255.255.255 inside! p4 H& ?$ d- w! J6 I/ `
pdm location 192.168.0.63 255.255.255.255 inside
) ^, w3 c$ K0 t2 I' w  xpdm location 192.168.0.64 255.255.255.255 inside7 k" p. Z6 M4 k6 u  |) z8 V/ A5 Y
pdm location 192.168.0.68 255.255.255.255 inside
" M# ^) i/ i) {& L* Dpdm location 192.168.0.211 255.255.255.255 inside( X/ ]! W" }+ e; X% c
pdm location 192.168.0.70 255.255.255.255 inside
, z+ c* k; ^% Cpdm location 192.168.0.65 255.255.255.255 inside
8 \2 `: n  Q& `1 a' j: S3 M) kpdm location 192.168.0.121 255.255.255.255 inside) E! t! b$ X+ B: O8 u( j1 C* E
pdm location 192.168.0.247 255.255.255.255 inside
* _! d/ Q5 \% l4 d2 t$ epdm location 192.168.0.37 255.255.255.255 inside
" H& b8 V; R& y, L5 L. Epdm location 192.168.0.73 255.255.255.255 inside- t8 ?9 C7 ?5 t" o! N3 @
pdm location 192.168.0.112 255.255.255.255 inside
$ C# t, Z: F6 Apdm location 192.168.0.57 255.255.255.255 inside: E6 t& K' N4 A+ @* J
pdm location 192.168.0.99 255.255.255.255 inside
) U* _' V/ x- r$ Opdm location 192.168.0.124 255.255.255.255 inside' o5 B- m! \/ T+ P
pdm location 192.168.0.52 255.255.255.255 inside
, j5 E" X1 ^4 j6 L+ P$ apdm location 192.168.0.118 255.255.255.255 inside
7 n# G$ ~% `9 p1 E. q6 q2 S# C/ v6 lpdm location 192.168.0.122 255.255.255.255 inside
! X" J# W* J% y! apdm location 192.168.0.49 255.255.255.255 inside
# H( n  o4 |6 d# Gpdm location 192.168.0.55 255.255.255.255 inside" i+ z9 B! Y* _0 L0 U* ]5 q, {
pdm location 192.168.0.43 255.255.255.255 inside, f& e: |# ]2 I
pdm location 192.168.0.103 255.255.255.255 inside
4 u) x7 C' @6 Zpdm location 192.168.0.54 255.255.255.255 inside# o7 L. E0 |+ y! R3 P: j
pdm location 192.168.0.243 255.255.255.255 inside
; k6 g# H3 i8 K( G* r* K7 O' s+ F+ jpdm location 192.168.0.244 255.255.255.255 inside8 M8 ~* f% o# A( X2 X' c" c
pdm location 192.168.0.230 255.255.255.255 inside; G* I; O3 g0 R  L1 P2 c
pdm location 192.168.0.135 255.255.255.255 inside0 ^9 }) `" m8 l3 _8 I
pdm location 192.168.0.115 255.255.255.255 inside
* u1 m# r. l( Z  L4 ]* t1 Mpdm location 192.168.0.245 255.255.255.255 inside: D2 o2 G2 `' F" {  v+ W3 M: T
pdm location 192.168.0.238 255.255.255.255 inside
4 q2 n# `4 y: y* dpdm location 192.168.0.237 255.255.255.255 inside
7 Z5 I- w' g6 ]pdm location 192.168.0.231 255.255.255.255 inside
1 w/ K! i2 r7 j4 q0 a5 u7 lpdm location 192.168.0.235 255.255.255.255 inside; ?6 u' N6 |8 s6 o) |
pdm location 192.168.0.236 255.255.255.255 inside" @+ s& p' z" i+ J5 a
pdm location 192.168.0.190 255.255.255.255 inside; G6 p; o! q! s0 l
pdm location 192.168.0.181 255.255.255.255 inside4 Q6 L1 @2 r7 q; R1 X" x! j
pdm location 192.168.0.9 255.255.255.255 inside- U. v& I! c0 N+ N2 s8 N  W1 t
pdm location 192.168.0.246 255.255.255.255 inside
( i, k+ V' F! R' j+ |* p+ f' m6 Fpdm location 192.168.0.59 255.255.255.255 inside
0 O# |$ w, l- D: V7 O+ o8 u$ mpdm location 192.168.0.191 255.255.255.255 inside
0 k0 I) T3 h& ~% kpdm location 192.168.0.117 255.255.255.255 inside8 |- e, ]/ W6 h
pdm location 192.168.0.171 255.255.255.255 inside
$ H. f8 X& P+ W1 B. M6 hpdm location 192.168.0.53 255.255.255.255 inside- E2 ^, y6 u9 m* ?: ]: U. D
pdm location 192.168.0.130 255.255.255.255 inside
9 W1 j$ j! Y, }8 p0 N2 W$ spdm location 192.168.0.91 255.255.255.255 inside
/ r. S, C6 d3 l+ S1 ?+ jpdm location 192.168.0.140 255.255.255.255 inside, S1 \$ f2 v& F+ M- A& B
pdm location 192.168.0.220 255.255.255.255 inside1 Z2 K7 y$ m( k' x7 }
pdm location 192.168.0.119 255.255.255.255 inside
! U1 h) [3 p0 Opdm location 192.168.0.223 255.255.255.255 inside
5 {, R6 i& l6 P- K8 o1 m) ]pdm location 192.168.0.106 255.255.255.255 inside
# z4 X/ N5 s5 s* Qpdm location 192.168.0.123 255.255.255.255 inside3 C) L  ]! @, [0 @2 b( m
pdm location 192.168.0.67 255.255.255.255 inside$ @, A  X1 u2 p; C) P" T& ^% d
pdm location 192.168.0.219 255.255.255.255 inside5 f) R8 j7 R6 M+ n( L, F) G
pdm location 192.168.0.56 255.255.255.255 inside
- A" o& H  I- Lpdm location 192.168.0.66 255.255.255.255 inside
& L1 v5 u: b8 Cpdm location 192.168.0.76 255.255.255.255 inside
9 N3 G  g0 z' X2 Qpdm location 192.168.0.102 255.255.255.255 inside
. o4 P( x2 p0 H9 U$ gpdm location 192.168.0.170 255.255.255.255 inside
( L- c# k6 x$ |4 ^: mpdm location 192.168.0.172 255.255.255.255 inside
7 c; F! N" ]8 \8 N. s  [pdm location 192.168.0.173 255.255.255.255 inside
' Q' h- N- T6 |) |) D" P8 s/ J9 O. tpdm location 192.168.0.174 255.255.255.255 inside
1 p4 P( V8 u6 rpdm location 192.168.0.175 255.255.255.255 inside+ F, y6 Y# w+ D2 y  ]2 u
pdm location 192.168.0.160 255.255.255.255 inside; r# W9 H( ^, U  D/ p5 [& F
pdm location 192.168.0.138 255.255.255.255 inside# t) P6 A0 n9 r
pdm location 192.168.0.78 255.255.255.255 inside0 p2 ?: i+ _3 j. x! S
pdm location 192.168.0.69 255.255.255.255 inside
& G4 |. U5 J: Z: Dpdm location 192.168.0.221 255.255.255.255 inside$ l/ `4 E' l, V; |; D
pdm location 192.168.0.110 255.255.255.255 inside
4 [7 J1 z  s/ v3 ipdm location 192.168.0.232 255.255.255.255 inside1 x, t) ]/ n3 y
pdm location 192.168.0.80 255.255.255.255 inside
6 {, H4 X+ X$ N& B4 O7 Xpdm location 192.168.0.81 255.255.255.255 inside; s0 |. d. v% O
pdm location 192.168.0.82 255.255.255.255 inside4 y& Z) X1 n0 G0 f0 P/ a
pdm location 192.168.0.83 255.255.255.255 inside( c5 V7 U& R7 K- d
pdm location 192.168.0.84 255.255.255.255 inside
. S) [" L/ u- O' I* opdm location 192.168.0.85 255.255.255.255 inside
( g7 K% ]+ ?# _2 x' V) {5 ]& B/ ipdm location 192.168.0.86 255.255.255.255 inside. z" n) D/ |1 u$ D- ?( k
pdm location 192.168.0.87 255.255.255.255 inside1 W/ A; V4 h$ M/ o( F
pdm location 192.168.0.88 255.255.255.255 inside
0 S& _; Z6 |; m* E9 B$ _( Y' Spdm location 192.168.0.89 255.255.255.255 inside
& E8 U0 e" j5 c* _6 X0 i5 wpdm location 192.168.0.90 255.255.255.255 inside
5 }% H' h, ^- H' G% zpdm location 192.168.0.28 255.255.255.255 inside
* s/ y+ V% H% q+ K8 ^7 k$ \1 Apdm location 192.168.0.234 255.255.255.255 inside
4 ?# [/ @) b, e! Qpdm location 192.168.0.222 255.255.255.255 inside4 u+ r# m/ m, ^  M3 Z0 e( E: R
pdm location 192.168.0.150 255.255.255.255 inside
0 I& s# S0 x, P2 mpdm location 192.168.0.151 255.255.255.255 inside1 b' Q$ [$ x) r) {2 E
pdm location 192.168.0.152 255.255.255.255 inside
$ h* ^7 |& r' M( D% ^9 updm location 192.168.0.77 255.255.255.255 inside8 ?6 v2 |+ G% A6 v7 a; q/ |
pdm location 192.168.0.72 255.255.255.255 inside9 g, T3 c. N: j. Y7 O( q
pdm location 192.168.0.225 255.255.255.255 inside9 d' x  \8 V2 `+ j* {
pdm location 192.168.0.161 255.255.255.255 inside
" A* ^+ w- o+ S& Apdm location 192.168.0.92 255.255.255.255 inside6 Y+ ^3 n2 n/ c9 s. F" u
pdm location 192.168.0.192 255.255.255.255 inside3 s6 ?- ?3 Z$ Z  I( z9 h
pdm location 192.168.0.193 255.255.255.255 inside: E( q7 v2 q4 U3 O2 A. ^
pdm location 192.168.0.15 255.255.255.255 inside
7 j% r4 c7 n5 ]pdm location 192.168.0.33 255.255.255.255 inside% v$ I$ n. b! f$ X
pdm location 192.168.0.79 255.255.255.255 inside
/ D+ e5 r1 A3 V+ Ypdm location 192.168.0.93 255.255.255.255 inside
+ b# `( b1 m' A/ H5 j& ^pdm location 192.168.0.94 255.255.255.255 inside. E* Z1 |# R+ f; b' S
pdm location 192.168.0.95 255.255.255.255 inside
: a% P/ d3 t  ?9 X, \% M/ spdm location 192.168.0.96 255.255.255.255 inside- P2 A, h4 p! ]. d5 f( w' z% C
pdm location 192.168.0.97 255.255.255.255 inside
5 _, k+ I) {" z6 N/ spdm location 192.168.0.98 255.255.255.255 inside0 u, |0 Z& ~* |0 W% Z; M
pdm location 192.168.0.101 255.255.255.255 inside: m6 n/ Z3 @4 Y: X7 x
pdm location 192.168.0.104 255.255.255.255 inside
  u+ n& D( z7 A' _pdm location 221.XXX.138.250 255.255.255.255 inside
" {/ O% j, h% O: Ipdm location 192.168.0.71 255.255.255.255 inside
6 Z% l/ S+ ^6 P6 i+ Hpdm location 192.168.0.185 255.255.255.255 inside
" O' I/ b7 q. Y/ B% z3 w# w* Ppdm location 192.168.0.75 255.255.255.255 inside
: d/ ~/ J# i) L& X; n6 b9 cpdm location 192.168.0.120 255.255.255.255 inside9 s# I1 _$ p$ u3 w6 W% X6 K
pdm location 192.168.0.212 255.255.255.255 inside0 A8 D4 G8 P' h, h4 P7 I
pdm location 192.168.0.213 255.255.255.255 inside9 F* ~3 O5 ?0 A( c4 `5 t1 E+ m
pdm location 192.168.0.214 255.255.255.255 inside5 h+ V# x( w8 D
pdm location 192.168.0.215 255.255.255.255 inside* d5 D, I1 q6 W! u% T
pdm location 192.168.0.128 255.255.255.192 outside; V8 p7 |0 E1 Z4 r9 V5 e
pdm history enable: u1 X6 y3 O( r, \
arp timeout 14400
( K. {* n1 q6 w/ U# t; C+ }global (outside) 10 interface% @0 L; F8 [: j! J1 E" M5 Z
nat (outside) 0 access-list outside_inbound_nat0_acl outside
" ]8 M+ G7 e/ u5 }2 y/ cnat (inside) 10 192.168.0.1 255.255.255.255 0 0! T# k7 ~  e- O! m9 c
nat (inside) 10 192.168.0.3 255.255.255.255 0 0! H8 Z7 d% K, D; p+ S7 t
nat (inside) 10 192.168.0.4 255.255.255.255 0 0
; H3 x- x7 _+ O9 j# anat (inside) 10 192.168.0.5 255.255.255.255 0 0
( n. ^4 p9 [  n& X( R6 a* _7 D; {1 bnat (inside) 10 192.168.0.10 255.255.255.255 0 04 V7 r+ t9 `% ?
nat (inside) 10 192.168.0.11 255.255.255.255 0 0
/ p. K. Q1 A! J) Nnat (inside) 10 192.168.0.12 255.255.255.255 0 0
" Z6 X3 x1 W/ X2 j% k% J: Anat (inside) 10 192.168.0.13 255.255.255.255 0 06 e) {% M" t- W3 |/ Z
nat (inside) 10 192.168.0.14 255.255.255.255 0 0
8 q1 K. m4 R* n! {nat (inside) 10 192.168.0.15 255.255.255.255 0 0
" `% [3 w! @/ M1 S( Znat (inside) 10 192.168.0.16 255.255.255.255 0 0
; U8 U; C" S4 ?6 v3 s" K' fnat (inside) 10 192.168.0.17 255.255.255.255 0 0
2 P3 B2 }( M; V$ b9 anat (inside) 10 192.168.0.21 255.255.255.255 0 0) P6 j: M' }) L3 w
nat (inside) 10 192.168.0.22 255.255.255.255 0 00 ?& d6 L4 r/ s1 R! O  n$ o
nat (inside) 10 192.168.0.23 255.255.255.255 0 0" ^% I$ ]# q6 m+ ]( B, u
nat (inside) 10 192.168.0.24 255.255.255.255 0 0
. J5 D0 _" V: Y. F; S( Bnat (inside) 10 192.168.0.25 255.255.255.255 0 01 q! h, p2 `7 Q6 o. s6 {$ T
nat (inside) 10 192.168.0.26 255.255.255.255 0 0# F/ {4 I; m) Q6 M# ^, I( M
nat (inside) 10 192.168.0.27 255.255.255.255 0 0; X9 e/ X. b+ y3 F  N! k
nat (inside) 10 192.168.0.29 255.255.255.255 0 0
/ M% i# ]+ s% w/ Q8 p" ?- L+ Jnat (inside) 10 192.168.0.31 255.255.255.255 0 0, P4 [+ s! S, \2 x" j1 F8 _3 S
nat (inside) 10 192.168.0.32 255.255.255.255 0 0# z4 j) `- O  E% @# o
nat (inside) 10 192.168.0.33 255.255.255.255 0 0
. V! r% G0 w0 ^; W) Enat (inside) 10 192.168.0.34 255.255.255.255 0 0$ I$ W! c( p) X6 a4 l& K! x$ U
nat (inside) 10 192.168.0.37 255.255.255.255 0 0
& I! M# p5 w1 d7 Qnat (inside) 10 192.168.0.39 255.255.255.255 0 0
' P" L5 [5 j9 Y$ }nat (inside) 10 192.168.0.40 255.255.255.255 0 0
  u6 Z5 D3 ^1 u- B$ d- k) `" qnat (inside) 10 192.168.0.44 255.255.255.255 0 04 W% {, E3 o* r& t: x- z2 z& O8 T
nat (inside) 10 192.168.0.45 255.255.255.255 0 0
, c: u% J' Q# w2 s: R! X& vnat (inside) 10 192.168.0.47 255.255.255.255 0 04 u% G& m3 o' E* }3 [5 f
nat (inside) 10 192.168.0.48 255.255.255.255 0 0
( {  D! U" R6 U! w1 Xnat (inside) 10 192.168.0.49 255.255.255.255 0 0. s- [5 U7 o5 s, ^0 ^- p4 S
nat (inside) 10 192.168.0.50 255.255.255.255 0 0- {- N" L; f( r* |
nat (inside) 10 192.168.0.51 255.255.255.255 0 0
8 P7 ]9 g* c# h5 p5 P) M& V: fnat (inside) 10 192.168.0.52 255.255.255.255 0 0
) ~+ T# ^- S8 Wnat (inside) 10 192.168.0.53 255.255.255.255 0 0+ i8 w/ a9 o, t0 Q
nat (inside) 10 192.168.0.54 255.255.255.255 0 0
' d4 {5 u$ n" I* F1 F& [8 Y. rnat (inside) 10 192.168.0.55 255.255.255.255 0 0
) |; S+ f  D2 @5 rnat (inside) 10 192.168.0.56 255.255.255.255 0 01 @% l+ c8 m* N; H  v; U
nat (inside) 10 192.168.0.57 255.255.255.255 0 0
" f7 n; I. S$ Y- L7 Anat (inside) 10 192.168.0.58 255.255.255.255 0 0
& }- m5 B4 o8 K2 R" Mnat (inside) 10 192.168.0.59 255.255.255.255 0 0! F# A' |" I2 L, ~
nat (inside) 10 192.168.0.62 255.255.255.255 0 0
" S( z* a( m  F; H6 tnat (inside) 10 192.168.0.63 255.255.255.255 0 0
! J7 B, F" r, l- ynat (inside) 10 192.168.0.64 255.255.255.255 0 05 e% m2 |0 P  X6 [9 `: i
nat (inside) 10 192.168.0.65 255.255.255.255 0 06 m  [' {4 k7 [# Q
nat (inside) 10 192.168.0.66 255.255.255.255 0 0
* G# X# p2 N$ Mnat (inside) 10 192.168.0.67 255.255.255.255 0 0
6 g/ E" A. n6 Rnat (inside) 10 192.168.0.68 255.255.255.255 0 0
$ h- p' J4 e3 w+ s6 d1 ^nat (inside) 10 192.168.0.69 255.255.255.255 0 0
$ [* @) |: H, b. Y$ q  Hnat (inside) 10 192.168.0.71 255.255.255.255 0 0
* i# U5 ~; E; m  ^. Z& [9 C( @8 cnat (inside) 10 192.168.0.73 255.255.255.255 0 0
, K6 _: p4 H- N5 u8 u, bnat (inside) 10 192.168.0.76 255.255.255.255 0 0
! ~' O& M9 m- I* h* Fnat (inside) 10 192.168.0.79 255.255.255.255 0 0* Y+ N% Y' M& M: S1 J
nat (inside) 10 192.168.0.80 255.255.255.255 0 0" x2 f8 f3 N# D/ h3 k) |8 G5 I
nat (inside) 10 192.168.0.81 255.255.255.255 0 0
/ p, K( R7 O' g: I$ k- d' tnat (inside) 10 192.168.0.82 255.255.255.255 0 0
: o, J5 w3 R; Z/ w- b7 s6 s+ ?nat (inside) 10 192.168.0.83 255.255.255.255 0 0
0 K, O, G3 s3 R( J) K4 ~nat (inside) 10 192.168.0.85 255.255.255.255 0 0# f! t$ t& v. j- G; |
nat (inside) 10 192.168.0.86 255.255.255.255 0 0
) L3 [4 w# E. X8 ?! K! ]7 S+ K$ T' _nat (inside) 10 192.168.0.87 255.255.255.255 0 0
7 Q7 B) A6 _' B. U# E: M! }, R) ~nat (inside) 10 192.168.0.89 255.255.255.255 0 0
: `! Z% x2 [2 t* U, nnat (inside) 10 192.168.0.90 255.255.255.255 0 0
/ Y# w* p' E5 V1 gnat (inside) 10 192.168.0.92 255.255.255.255 0 0
( a3 ?+ a$ D9 U) [, N: Unat (inside) 10 192.168.0.93 255.255.255.255 0 00 Z" C. ?" N! i( Q( v% [
nat (inside) 10 192.168.0.94 255.255.255.255 0 0
3 B, A: D3 o4 J# unat (inside) 10 192.168.0.95 255.255.255.255 0 0
. b/ M* J' @/ h0 g% ]2 a6 u, Vnat (inside) 10 192.168.0.96 255.255.255.255 0 0
' a# v- R( D$ Y( p2 J& ^nat (inside) 10 192.168.0.97 255.255.255.255 0 00 Z! H0 y4 ~* Q$ U$ Y1 P+ b
nat (inside) 10 192.168.0.99 255.255.255.255 0 0
7 t5 Y% H0 Q3 enat (inside) 10 192.168.0.101 255.255.255.255 0 0
# H" r& d4 ?' K% w6 pnat (inside) 10 192.168.0.102 255.255.255.255 0 0
6 [' c9 q/ O( y* p* unat (inside) 10 192.168.0.103 255.255.255.255 0 0
' \2 N/ H5 h# M+ y0 E% W# O- d* Wnat (inside) 10 192.168.0.104 255.255.255.255 0 0
! x! j0 E2 B5 m# znat (inside) 10 192.168.0.106 255.255.255.255 0 0
2 N6 v, q) }, U, {nat (inside) 10 192.168.0.107 255.255.255.255 0 06 v+ ?  T" g! U4 Q7 I1 E( \2 z
nat (inside) 10 192.168.0.108 255.255.255.255 0 0
& c" _. M. J8 m4 x( j$ Vnat (inside) 10 192.168.0.118 255.255.255.255 0 0
( g$ C9 S2 l/ H5 J$ I; V( ^- Z4 C* Fnat (inside) 10 192.168.0.119 255.255.255.255 0 0
, K9 y, V# Z* |! h! g/ Enat (inside) 10 192.168.0.120 255.255.255.255 0 0
0 [. U, `' ~6 n; {5 S; {nat (inside) 10 192.168.0.121 255.255.255.255 0 0* u  Y6 |  y8 [
nat (inside) 10 192.168.0.200 255.255.255.255 0 0
6 ]; n9 _7 V+ m5 Fnat (inside) 10 192.168.0.201 255.255.255.255 0 0
8 V9 E- v7 {* u  I: o( ^  knat (inside) 10 192.168.0.202 255.255.255.255 0 0* k$ E6 d! N, N! r5 a/ @
nat (inside) 10 192.168.0.203 255.255.255.255 0 0# H$ v0 C1 ^" U! R$ p% R. I' p
nat (inside) 10 192.168.0.204 255.255.255.255 0 0; ^9 U$ b# j! x! a' L) E
nat (inside) 10 192.168.0.205 255.255.255.255 0 0
' \2 x" N& F/ e4 B" L' Bnat (inside) 10 192.168.0.206 255.255.255.255 0 0
3 O- Z9 _8 |# anat (inside) 10 192.168.0.207 255.255.255.255 0 0+ L1 m0 E1 q, }7 O# e
nat (inside) 10 192.168.0.208 255.255.255.255 0 0; w6 W+ K% G. o- P* @' g. J
nat (inside) 10 192.168.0.209 255.255.255.255 0 0. [7 V1 c( E) f6 _. o
nat (inside) 10 192.168.0.210 255.255.255.255 0 0  {6 r0 P$ S* I9 P  i" \) @
nat (inside) 10 192.168.0.211 255.255.255.255 0 0
1 K' M% B- ?; L& r4 [% u- ?nat (inside) 10 192.168.0.212 255.255.255.255 0 0" f9 i1 c$ e+ c% N+ f4 M
nat (inside) 10 192.168.0.213 255.255.255.255 0 0
' ]9 u5 }. N+ C( \4 xnat (inside) 10 192.168.0.214 255.255.255.255 0 06 t5 O( [% y# P/ n0 s. G5 w; e
nat (inside) 10 192.168.0.215 255.255.255.255 0 0- c  z" V- g1 {* c4 K6 k
nat (inside) 0 192.168.0.0 255.255.255.0 0 0
* Z; Q1 [2 {: d" w$ O6 [nat (inside) 10 0.0.0.0 0.0.0.0 0 0' w# y- J8 k6 x( @& e
route outside 0.0.0.0 0.0.0.0 221.XXX.138.249 1' ~. l0 b1 _# ~: r# x& `
timeout xlate 3:00:00
2 I4 k  O! @, Qtimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:002 F; x+ R! p/ m9 p
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
& w8 j+ Z/ N( Ftimeout uauth 0:05:00 absolute* R+ i9 j1 h- ?. ?) V- G
aaa-server TACACS+ protocol tacacs+
+ Q! L% G0 }) ~6 A* A0 `) H0 qaaa-server RADIUS protocol radius
% x8 i" X, l; N6 j6 a2 \) l  Yaaa-server LOCAL protocol local " B% N, L7 R  x$ R7 W
http server enable
( o9 @( S/ i0 s4 {7 P7 e; P# Ihttp 192.168.0.0 255.255.255.0 inside( K, q4 V2 }( Q( ^" M1 d" P  |5 V) Y
no snmp-server location
% T' E" A4 g; W" U4 C$ q9 ^: lno snmp-server contact
0 L) Z$ l2 F2 R5 C% }/ dsnmp-server community public  C: ]4 W6 |- x, V; q) `0 ^
no snmp-server enable traps
2 Y3 J9 q$ ~% z/ j0 E8 B6 Wfloodguard enable
! S- [; ^4 x* E1 W- t. P* Y# ysysopt connection permit-ipsec
5 [  s' z, X+ K2 S2 ], Y$ Q' q: t) ^sysopt connection permit-l2tp, Q3 N. q0 T" ^' n
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
  a0 t/ u; x( ucrypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac , }) F' s# k+ d6 U0 g6 T
isakmp enable outside
- d* L3 J7 P. y$ Disakmp enable inside
+ T  c* y, Q0 y5 v1 {9 b' jtelnet timeout 56 M+ Y: X* ?( N8 f9 ?
ssh 0.0.0.0 0.0.0.0 outside9 @5 S" u+ J) o# u6 @6 h+ W
ssh 0.0.0.0 0.0.0.0 inside
2 Q4 ^3 k7 V% E8 X! ^0 `  p' ossh timeout 5
' u" c& T) X) c: i) {console timeout 0
% G7 Z$ U( o5 E) ]% dvpdn username wanhine password ********* / i' F" i, Y; r6 @8 y# _" z
vpdn enable outside
, Y3 M7 [' d3 M9 n4 L' Tvpdn enable inside
$ |/ N3 S  A! T) e. q- h+ U" Gdhcpd address 192.168.0.20-192.168.0.200 inside. ?% S+ y% m: w1 Z3 N
dhcpd dns 202.103.24.68 202.103.0.117. F1 w1 n0 F0 `, R
dhcpd lease 3600
0 y9 b0 ]) r& v0 u1 `+ ]( wdhcpd ping_timeout 750
8 o4 F" S+ ?6 d( f! c: y3 dterminal width 80  D* p8 W- M& y& j- p- V$ B  G
Cryptochecksum:f40dc8963b7f456d60eac467e8c0ea87
- V) h7 ]) }0 K% J1 ^' P: end% z2 o& c+ l3 L- v
[OK]
! a  J: {. K" R
' F8 C9 u. I% v" X" ~) M0 B7 C& s& n1 m

8 h9 C: w* D. F. q& [% Y  n请高人指点.
( Q7 i: h# p5 J/ S2 t; f1 E如果PDM无法实现,请发下完整的配置表谢谢,万分感谢!
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

*浚浚* [Lv8 技术精悍] 发表于 2013-10-8 14:31:09 | 显示全部楼层
路过,支持一下啦
回复 支持 反对

使用道具 举报

zuown [Lv8 技术精悍] 发表于 2013-10-9 11:59:57 | 显示全部楼层
回复 支持 反对

使用道具 举报

海皇CHICBOY [Lv8 技术精悍] 发表于 2013-10-18 12:38:28 | 显示全部楼层
看帖回帖是美德!:lol
回复 支持 反对

使用道具 举报

shilling [Lv8 技术精悍] 发表于 2013-10-19 09:29:07 | 显示全部楼层
过来看看的,感谢攻城狮论坛
回复 支持 反对

使用道具 举报

scteam [Lv8 技术精悍] 发表于 2013-10-20 21:55:33 | 显示全部楼层
回复 支持 反对

使用道具 举报

syson [Lv8 技术精悍] 发表于 2013-10-21 13:17:46 | 显示全部楼层
支持一下:lol
回复 支持 反对

使用道具 举报

hulin70 [Lv8 技术精悍] 发表于 2013-10-22 16:05:54 | 显示全部楼层
没看完~~~~~~ 先顶,好同志
回复 支持 反对

使用道具 举报

fm830612 [Lv8 技术精悍] 发表于 2013-10-24 12:43:43 | 显示全部楼层
找到好贴不容易,我顶你了,谢了
回复 支持 反对

使用道具 举报

free88 [Lv8 技术精悍] 发表于 2013-12-6 10:12:14 | 显示全部楼层
不知该说些什么。。。。。。就是谢谢
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-5-1 20:32 , Processed in 0.140219 second(s), 14 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn