本站已运行

攻城狮论坛

作者: cankudewenrou
查看: 3481|回复: 14

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] pix做vpn,vpn client拨入后不能访问内网

[复制链接]
查看: 3481|回复: 14
开通VIP 免金币+免回帖+批量下载+无广告
现在的问题是内网地址可以ping通vpn client地址,可以ping通outside地址,但vpn client 不能ping通内网地址,outside地址不能ping通内网地址
( l' k: b; g, [8 J: H下面是配置:
# D9 z0 X1 L& X' v& u4 cpix520(config)# sh run& v/ H# ]' N5 L8 k' y" a  s
: Saved
+ r  ?1 n9 c7 ^, t. h9 @:  b; z/ E- H! y: G5 w3 s
PIX Version 6.3(5)+ v2 W- m9 z3 G6 A7 D
interface ethernet0 auto0 c+ I& I& K- D
interface ethernet1 auto/ g% V: d0 O, C% v
interface ethernet2 auto
9 {' J3 p) Z5 U% r8 a+ m/ N9 fnameif ethernet0 outside security0$ D% u- G- l3 c
nameif ethernet1 inside security100
! Z' X+ y4 _$ ]' [' anameif ethernet2 dmz security50
5 e, \8 y5 U# _enable password KtzYd.GV6Ee0dpHi encrypted
( `4 K( h/ a9 _8 Ppasswd KtzYd.GV6Ee0dpHi encrypted) _# ]4 I6 K' y  o
hostname pix520
3 u6 N( b( I) W+ \) M/ p. h5 Afixup protocol dns maximum-length 512
8 w( o, w2 T3 p  o( X1 `" E' U! J5 Tfixup protocol ftp 21
: L5 I/ T# @0 w( wfixup protocol h323 h225 17202 [* n: t4 ?3 o0 [
fixup protocol h323 ras 1718-1719
6 I+ G8 n$ _  m% g* m$ `* ]fixup protocol http 80  p7 O/ m2 C$ X+ l; T; g' U
fixup protocol rsh 514" i) A/ q1 p8 u; |
fixup protocol rtsp 5542 U( i- y: F0 X0 M8 U; X5 O
fixup protocol sip 5060
# I+ L- y" J) rfixup protocol sip udp 5060
8 J: M6 c1 ^3 _7 K+ T4 N, Z/ N  Qfixup protocol skinny 20006 q9 X( w( a9 `3 J6 z  ~
fixup protocol smtp 25  D+ l) N/ P" T
fixup protocol sqlnet 1521
  R( m$ J0 u; z6 z. A9 s# xfixup protocol tftp 69
/ I6 l( o& t3 d! r' Y1 n& Onames+ {; P1 o8 c5 M/ M3 }6 O& Q7 w6 s
access-list 100 permit icmp any any & t0 x% I+ m& @* x8 I8 o* L
access-list 110 permit ip host 192.168.1.2 172.16.16.0 255.255.255.0
( z' ]# }& s  N" c# Taccess-list 110 permit ip host 192.168.1.1 172.16.16.0 255.255.255.0 6 `. n/ {" L$ t3 Z
pager lines 24
( G2 ~! }! Q  N( p8 Alogging on
  Y& V) d- U5 ]9 ~$ u3 ~! amtu outside 1500- O0 q" w/ B/ ?  {
mtu inside 1500
: B/ O9 T- M% ]% D2 W: ymtu dmz 15009 q4 e+ ~) y9 n8 G/ n& T0 L
ip address outside 10.166.17.24 255.255.255.224+ `; V" r& [7 [7 j$ O% X' i
ip address inside 192.168.1.1 255.255.255.248
& r  x/ ?0 o% S# n2 ~1 i9 B: m6 f- n6 uip address dmz 192.168.2.254 255.255.255.0
  G/ y% t9 x* O+ m/ Tip audit info action alarm9 T" R. P! ]+ T4 F8 P: M
ip audit attack action alarm
5 W8 l* E" D& ~4 j. w* g. i  vip local pool vpn 172.16.16.1-172.16.16.10# C8 @4 ]3 R+ b( I" u3 b5 }
no failover
% @3 e) x5 Z7 i( K, o& b. D) Mfailover timeout 0:00:00, k; l4 j- v2 W
failover poll 155 T- e3 q( x( _3 t
no failover ip address outside
5 g0 `% O% h, ~. d0 R" C( D1 o" Ano failover ip address inside- ~) ]  C1 E+ i0 U; }
no failover ip address dmz& |  g: z) }0 _6 D6 h+ ^  V
pdm history enable+ Y/ k  `: e1 I' g# H
arp timeout 14400" m- w+ V4 D1 v. g- z2 a/ R
global (outside) 1 interface
0 R1 S! T" I5 f) pnat (inside) 0 access-list 110
1 j9 A( U" `; Jnat (inside) 1 10.166.21.197 255.255.255.255 0 0
2 J: C, B* z: X8 j; vnat (inside) 1 10.166.21.229 255.255.255.255 0 0
% @+ T" y3 ~' e* l5 O# p6 Vnat (inside) 1 10.166.21.231 255.255.255.255 0 0/ h+ q7 u* @+ [1 }! v) K4 S4 S* M+ d  a
nat (inside) 1 192.168.1.0 255.255.255.248 0 0
5 f; a* G$ _/ X& enat (inside) 1 10.166.17.0 255.255.255.224 0 0) e# ~+ Y+ Z; Y# K/ E! P0 [
nat (dmz) 1 192.168.2.0 255.255.255.0 0 0' J" N$ V4 `+ Q" ?: L: O
access-group 100 in interface outside
- [8 Z2 @- j5 x7 I; s  G0 z; p: Rconduit permit icmp any any * x8 m* W2 N2 S/ [
conduit permit ip 172.16.1.0 255.255.255.0 any : n8 M/ v) r4 O/ X8 Z
route outside 0.0.0.0 0.0.0.0 222.171.24.161 1
7 y% t. A) Z: Y6 l5 l8 @route outside 10.166.0.0 255.255.0.0 10.166.17.30 1. g, [3 J0 k2 z" q4 B- l1 y
route inside 10.166.21.197 255.255.255.255 192.168.1.6 13 [# n5 ~+ Y) ^6 Q! x6 z
route inside 10.166.21.229 255.255.255.255 192.168.1.6 16 r& |# q$ V" p$ s3 w7 @0 B
route inside 10.166.21.231 255.255.255.255 192.168.1.6 1
' {' X0 [0 B8 _( z' G0 w. Ntimeout xlate 3:00:00
$ R( M3 }/ a1 V" O1 O* d! l$ ]timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00) X* L4 e% v# g
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00% Z5 f/ c5 L8 S- g: Y" U' x
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
8 F5 G+ ]4 A8 E& w% e0 n: |timeout uauth 0:05:00 absolute% z2 h  A4 u% }2 w, I/ ?0 I- @8 E
aaa-server TACACS+ protocol tacacs+ % F  G. x8 ~% \' X0 a/ ^' i
aaa-server TACACS+ max-failed-attempts 3
% I' u. q& Q, b0 Q& zaaa-server TACACS+ deadtime 10 . i1 g7 n$ `  U2 H% x: ]
aaa-server RADIUS protocol radius
( l/ v* L- [  r$ @& Yaaa-server RADIUS max-failed-attempts 3
; A1 c& `8 h, C4 p& x: uaaa-server RADIUS deadtime 10
, K+ C, m3 h- haaa-server LOCAL protocol local
( C: w2 A) R1 P/ Y4 Y( Cno snmp-server location6 t: W9 c4 P' u  n  E
no snmp-server contact9 R1 v: h3 L5 p8 a" P* |! @
snmp-server community public' E8 b+ U7 y% Q$ j7 `
snmp-server enable traps2 k& Q. L8 C2 t; F( K7 Y
floodguard enable% k! I, ~+ v$ L* I  b! J1 k0 L
sysopt connection permit-pptp
5 j% K4 }4 a5 Y1 M3 Atelnet 10.166.17.0 255.255.255.224 inside
' l+ B1 U, U( P: l! S6 ~! ^- etelnet 192.168.1.0 255.255.255.248 inside) P$ K. O, i. Y4 r' @
telnet 172.16.16.0 255.255.255.0 inside
: u  y. K1 e- S( Qtelnet timeout 5
# I% E% J' T9 g6 Xssh timeout 5
' S# ?  k& C% g4 ~console timeout 10' Z* e2 f6 R& E
vpdn group vpn accept dialin pptp9 T$ f$ l( p/ t2 C3 J2 L7 z" d
vpdn group vpn ppp authentication chap( }. ^$ r8 J6 G8 d, H
vpdn group vpn ppp authentication mschap4 S+ f7 e* b9 e8 {
vpdn group vpn client configuration address local vpn+ U' M" U/ }' u% Q9 j$ p' @8 n
vpdn group vpn pptp echo 60
: x! M' D0 i- s& m+ Avpdn group vpn client authentication local
4 y" q: t  `- q( N1 f! z" svpdn username hrbbvpn password ********* 0 M* X+ W  }# }0 N6 f. ?, A+ I
vpdn enable outside
7 b: n8 R. `7 E2 F# Cterminal width 80
7 B; }2 b, R( d9 ^) BCryptochecksum:fe58163e929e292f23b07d8e0e890ac3
$ L9 R# v) b6 s2 o0 a: end
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

yqboss [Lv4 初露锋芒] 发表于 2013-8-6 10:11:03 | 显示全部楼层
顶上去,帮我解决问题呀,都好几天了,还没解决。
回复 支持 反对

使用道具 举报

雪中送炭 [Lv4 初露锋芒] 发表于 2013-8-6 11:39:18 | 显示全部楼层
ip local pool vpn 172.16.16.1-172.16.16.109 y/ [; L8 P% ~  f% k: t6 x" }, x" t2 f
用pptp做vpn,地址池应和内网在同一个网段,而ipsec vpn则不存在这种问题,试试看行么.$ z- M& S6 w: p. G7 U, N3 @
( q) B7 I/ y; {
qq:365238063
回复 支持 反对

使用道具 举报

sea_star [Lv4 初露锋芒] 发表于 2013-8-6 12:33:19 | 显示全部楼层
楼上的,别误引人家.
回复 支持 反对

使用道具 举报

chen135124 [Lv4 初露锋芒] 发表于 2013-8-6 12:34:41 | 显示全部楼层
[QUOTE=yqmqk123;1552253]ip local pool vpn 172.16.16.1-172.16.16.10  U) B2 u( z" |0 P5 O+ ^
用pptp做vpn,地址池应和内网在同一个网段,而ipsec vpn则不存在这种问题,试试看行么.
) `9 j0 I3 v' G1 ]. r, K, f9 [1 W; o& [5 Q" W( \: R
qq:365238063[/( D8 x: Y, O) q0 {: t
# d9 }8 A0 T' n/ {; r

; {' t  h( l$ L8 T) p% B" KVPN地址池的地址无论跟内网地址在同一网段或不同网段都不行
回复 支持 反对

使用道具 举报

thomaslts [Lv4 初露锋芒] 发表于 2013-8-6 13:04:50 | 显示全部楼层
: Saved; E5 D: _! b: X+ k; @. R
: Written by enable_15 at 05:21:42.610 UTC Fri Jan 1 1993
4 X: d/ ?- Z% T( D6 z8 T  KPIX Version 6.3(1)4 D3 F) \% G% G
interface ethernet0 auto
( `3 X% u! d! d! Y( pinterface ethernet1 auto
( c" V% v1 t2 f! Y1 einterface ethernet2 auto3 A: [7 ^. ^$ k+ g/ F7 i
nameif ethernet0 outside security06 R, p$ H1 Y, N& P2 J7 O. b/ B
nameif ethernet1 inside security100! B; X, q/ E4 z: `4 ?, B
nameif ethernet2 intf2 security4
, s( T$ [! J% P1 \& B3 Tenable password BBW5rMAbR8M/iSky encrypted
3 ~' ?" L0 S: g4 ~' kpasswd BBW5rMAbR8M/iSky encrypted
* \* [% f6 ?! p$ S, Ohostname pix515
1 i8 M0 J' @0 V, x8 q  Ffixup protocol ftp 219 k3 k! @& m7 G4 y
fixup protocol h323 h225 1720
2 s  p- G' P4 t9 t7 _fixup protocol h323 ras 1718-17195 z* {6 W. L  h  @% r- ]1 ]  c7 h
fixup protocol http 80
8 y  r$ v6 Y+ v1 W0 k8 W! O7 Kfixup protocol ils 389
. r1 X5 y0 a7 u' Wfixup protocol rsh 514
, ]9 T- [( g6 s3 Vfixup protocol rtsp 554
6 ~! |$ A$ f9 V* _fixup protocol sip 5060, t/ j  ]: g8 V
fixup protocol sip udp 5060
  [) s5 q6 W6 w# B; _$ }$ y! j' R( Cfixup protocol skinny 20009 P& c* G% z; S. Q* w! W$ w, J
fixup protocol smtp 25
, }$ \" @/ ?/ y: ]fixup protocol sqlnet 15210 b: l$ k# V: }7 g% O1 f0 T, ?
names
( Z; _* r5 n+ R% ^access-list 101 permit ip 192.168.188.0 255.255.255.0 192.168.1.0 255.255.255.0 - w# _' ?# V8 n1 X1 B; ~' I$ o6 [
pager lines 24  x" R, @  I2 \3 P3 W1 r
mtu outside 1500
8 A: @' M* [" H- }; |$ \mtu inside 1500
6 K5 P$ r: y, Emtu intf2 1500
/ N0 T( N! h8 j" Y* ]0 K# y3 tip address outside 192.18.121.251 255.255.255.0
" c$ ~/ a5 L6 zip address inside 192.168.188.50 255.255.255.0
& X& M, H6 B$ H) xno ip address intf21 g0 M" d6 l# k
ip audit info action alarm" `) J- g: v( t8 v1 O2 U" f- l
ip audit attack action alarm3 @, n1 s( ~, M! w& r! W
ip local pool bigpool 192.168.1.1-192.168.1.254
/ u2 Z) i' k! y4 T- b+ Zpdm history enable- ]1 r8 L9 L2 _* {
arp timeout 14400
. j1 d; ~4 r/ l0 K2 D, Gglobal (outside) 1 192.18.121.80-192.18.121.90 netmask 255.255.255.0
5 J0 V2 w. o8 r5 w- o8 k! C3 Qnat (inside) 0 access-list 101+ K2 E/ d) @6 v- |6 F- Z& u* v. |
nat (inside) 1 192.168.188.0 255.255.255.0 0 02 b+ I3 z& H5 j$ d2 f/ N
conduit permit tcp any any & y( l! ^& L/ Z* J
conduit permit icmp any any 6 s+ B- X; f0 i
conduit permit ip any any * y7 c' d* S7 N  u2 ^1 E
route outside 0.0.0.0 0.0.0.0 192.18.121.251 17 h1 p, D4 R+ b) D  e/ z0 U( q. h
timeout xlate 3:00:001 o4 W( v2 ?0 q4 L! |/ U
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00) I& f+ m! n" Q, O& E
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
$ `/ Y' x2 w  Y' j# ^timeout uauth 0:05:00 absolute+ ~+ V+ {4 v+ {
aaa-server TACACS+ protocol tacacs+
, r4 {. N) P0 u7 @* b* _aaa-server RADIUS protocol radius ( c! X) L; C8 Q1 @  W9 ]; y
aaa-server LOCAL protocol local
/ h1 V& ~+ u% J' S- j! Q% Q; @1 G% bhttp server enable0 @! M8 {" Z5 I% V, F3 A
no snmp-server location
; ]# V2 j2 b' Mno snmp-server contact
9 m8 A# D  q7 Z5 usnmp-server community public0 A" @  e9 @: n
no snmp-server enable traps, R& s1 [; C& t8 R9 `7 H
floodguard enable9 H6 _9 N& v9 [0 L+ \7 _0 i8 }& w8 T
telnet 0.0.0.0 0.0.0.0 inside$ Q- D  C) a+ ]1 V) O! I7 @! ?
telnet timeout 5
$ {' h6 U5 t2 ^' U9 q, r1 Hssh timeout 5
" \& ]1 f1 Z0 Bconsole timeout 0
3 A$ p/ {0 s2 k& v& bvpdn group 1 accept dialin pptp8 b# m& [. @9 U, p; |
vpdn group 1 ppp authentication pap( o2 q5 w! Z" x. n
vpdn group 1 ppp authentication chap( T5 @+ q% m0 z* a, k1 f  L! c" k& V
vpdn group 1 ppp authentication mschap6 I$ [, X# O. V0 W! e
vpdn group 1 ppp encryption mppe auto ' I" F' K: ~5 ~" Y
vpdn group 1 client configuration address local bigpool
9 X  d+ ]* E; n3 p: m9 }vpdn group 1 pptp echo 60- K! G7 O6 h$ X
vpdn group 1 client authentication local, @& N! h" D6 v9 @  n6 W' Q/ x
vpdn username cisco password cisco
; G2 \0 o7 X* G4 w6 Z* f/ G7 B( uvpdn enable outside
5 o8 Q' @  k5 J8 L5 I  p. L1 Tterminal width 809 i+ N6 Q* O! _0 p
Cryptochecksum:fa58cbeb1dd1dc3d2681a13b218aab885 e. z! A- U" \* _6 h( j  g
: end
" H6 w, I% [1 a& f这是我在pix515E上做成功的实验.) L4 Q' c% |' b
外网:192.18.121.x2 [7 _/ o+ ?  T6 H
内网:192.168.188.x
0 ^$ ^- P0 }; [) N  g' |  BVPDN:192.168.1.X
1 x0 r& @& P4 r  PPIX:内网口接PC- \( J7 A& x( |! G- ^
PC:LAN IP 192.168.188.x; V- X9 |. k; x% H3 h
       网关:192.168.188.50
& D$ U! F6 u. b7 n/ Z: d/ k       DNS:当地的DNS( n4 [" P2 t2 |7 `, x0 f
说明:把192.18.121.x网段当外网段,因为这个网段接另一个路由器可以上网的。你看看有没有帮助吧
回复 支持 反对

使用道具 举报

udpink [Lv4 初露锋芒] 发表于 2013-8-6 13:32:04 | 显示全部楼层
vpdn group 1 ppp encryption mppe auto # m9 E- u" v" T4 b5 C- z/ v
兄弟,这句话在show run的时候能显示出来吗?我条设置我确实做过,但在show run中没有显示出来。
回复 支持 反对

使用道具 举报

111222 [Lv4 初露锋芒] 发表于 2013-8-6 13:41:30 | 显示全部楼层
今天我把配置做了改动,改了配置后,vpn拨入后能访问dmz里的主机,不能访问inside里的主机。dmz里的主机能访问外网和vpn client,但不能访问inside里的主机。inside里的主机可以对dmz里的主机和vpn client访问。
% p2 f" c( g4 w& B/ Y  Q, P$ `. A% i7 B/ @
我的目的:想让vpn client拨入后能访问inside里的主机,或dmz里的主机能访问inside里的主机,都可以。' D% v- a( ~7 h) u3 W
* N- U9 l6 N( b: [, D
注:外网、dmz里的主机、inside里的主机都是直连到pix520上的,pix520的os是6.3(5)版本。& m6 c9 S! C! {7 o- Q( M8 K
: L2 C* g7 m0 h2 G
附配置:
- P+ c1 J, Q- zpix520# sh run
  g0 A; j; t7 C/ @, ?4 z: Saved
; ~. K' ?8 W* E:
: v# h" F  h4 N: MPIX Version 6.3(5)
4 n5 j% V3 y" e  Y# yinterface ethernet0 auto
8 ], ?5 i9 q2 J( E9 j% `# F( einterface ethernet1 auto
; x! f0 e. k! Einterface ethernet2 auto
+ O4 P, o- E4 \' Z, J% lnameif ethernet0 outside security02 [' o3 E& S$ ~& b( x$ w# ?
nameif ethernet1 inside security1002 j0 e. v  u- n3 P0 K
nameif ethernet2 dmz security503 R2 y9 H: s" `; T( s6 g; i
enable password KtzYd.GV6Ee0dpHi encrypted# w/ Z, C7 ?' g) b7 w
passwd KtzYd.GV6Ee0dpHi encrypted4 ]9 F; w% W6 `
hostname pix520- ~* q, L- j! a9 L! r
fixup protocol dns maximum-length 512
- K$ A1 H  B# xfixup protocol ftp 21& e7 l9 M* ~3 `/ R8 E, Q
fixup protocol h323 h225 1720
* ^' `3 W! F3 H* k! c7 g8 k' }fixup protocol h323 ras 1718-1719/ Y$ S! u/ R6 T4 D( d+ e$ l& k
fixup protocol http 80
' j3 p3 V! L3 r, Ffixup protocol pptp 1723
0 A# c6 N6 M# N/ I8 W* ffixup protocol rsh 5145 G$ K, p7 ?+ _! \2 u+ Q
fixup protocol rtsp 554
( v) R9 |) U" kfixup protocol sip 5060
" w# p& A- A4 N% D" ofixup protocol sip udp 5060
- i, h( p8 s/ C- J% M3 \fixup protocol skinny 2000$ T) [1 {" i  r$ |9 @$ p, F
fixup protocol smtp 25
, K3 Z6 Y' Y2 g: {0 y9 Wfixup protocol sqlnet 1521
, i9 B' G. a4 Y$ N& ~' y2 ?fixup protocol tftp 69
; B: z6 e0 b: @8 ^1 R! Ynames
3 A: g1 F+ G4 u9 Z' ?access-list 101 permit icmp any any
4 R% _; H" f# d) _- `access-list 101 permit tcp any any eq 3389
3 J& ]; q% X" P0 X* d7 A3 {1 Baccess-list 101 permit ip any any 8 P+ U6 y/ ~2 `! D3 p; n
access-list 100 permit icmp any any ' c# C! P; J% s& ~: A/ ?. i
access-list 100 permit tcp any any eq 3389 * O5 f4 e4 L6 O  s7 M2 A
access-list 110 permit ip 192.168.2.0 255.255.255.0 192.192.192.0 255.255.255.0 1 G9 H1 D( V4 ?2 R. T8 h! Q: @3 ^; U
access-list 110 permit ip 192.168.2.0 255.255.255.0 172.16.16.0 255.255.255.0 $ T1 Z. r5 A! W$ B
access-list 111 permit ip 192.192.192.0 255.255.255.0 192.168.2.0 255.255.255.0 ) X# J' @# F# r8 }" l
access-list 111 permit ip 192.192.192.0 255.255.255.0 172.16.16.0 255.255.255.0 0 i" ^% s4 W2 \: H6 k
pager lines 24
% }( }1 G! m4 {: p" j4 klogging on
' G2 r5 U! o" Elogging monitor notifications- w+ Y- l7 X6 s* \" o
logging buffered errors3 ?$ \) I7 _2 w. r7 A3 J
logging history informational0 O4 k& O5 q/ M3 H0 y( k* Q& i' N+ z
mtu outside 1500$ h$ K! Y& o+ X" m
mtu inside 1500
: y+ ~  H: V5 ?# b9 C# z' smtu dmz 1500
" B5 _# h! j4 _, Xip address outside 10.166.17.24 255.255.255.224
; r9 ?/ |4 p6 ]ip address inside 192.192.192.1 255.255.255.0* L% S# t; j' J/ \0 `7 Y: ]4 q
ip address dmz 192.168.2.254 255.255.255.06 Q5 O! x: v# l4 H0 }( e5 t+ N
ip audit info action alarm3 V2 p' [" f8 X. g
ip audit attack action alarm
- z' U+ q0 r3 E8 bip local pool vpn 172.16.16.1-172.16.16.254
  ?; `# v0 E9 ?$ X$ Nno failover: v5 U' ]4 p. d# Y
failover timeout 0:00:00
( |3 H) r( s% x+ Xfailover poll 15
7 i: c) k! ?* }2 ~+ r' O$ F3 x" H8 Ano failover ip address outside
' Y$ A" k. i9 M# Zno failover ip address inside
  R* I- g! V8 \no failover ip address dmz
  W, z0 }  _0 e+ R5 b6 dpdm history enable
5 m* k: t0 B0 X( }; F' Barp timeout 14400- r9 w+ F! P) J& N' J
global (outside) 1 interface5 ]( L9 O4 G; S6 T
nat (inside) 0 access-list 111/ K8 o! l( F1 F. U
nat (inside) 1 192.192.192.0 255.255.255.0 0 0
2 F1 J1 S/ R0 S- M' w9 }8 bnat (dmz) 0 access-list 1101 L3 G- d4 s( j- V$ d) Q
nat (dmz) 1 192.168.2.0 255.255.255.0 0 0
; }! r6 a/ X! L- Vstatic (inside,dmz) 192.192.192.2 192.192.192.2 netmask 255.255.255.255 0 0
7 S1 w4 ~6 N2 o' M) waccess-group 100 in interface outside& e0 f; X7 j4 E
access-group 101 in interface dmz
: s$ v( G  ^, T4 d; a. ]6 nroute outside 0.0.0.0 0.0.0.0 10.166.17.30 1
/ c4 O/ o0 P( Z5 s/ B+ Atimeout xlate 3:00:00
/ i& H# \4 z$ X- Q7 stimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:001 `2 m7 t8 L1 U( u9 r  n/ `" G
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00" @( p# s" z* R+ ~- c
timeout sip-disconnect 0:02:00 sip-invite 0:03:002 I; m  u( w9 A5 d2 p. v. |
timeout uauth 0:05:00 absolute: S7 A9 b' Y- z) {0 z8 I
aaa-server TACACS+ protocol tacacs+ 2 @/ ?+ G3 L- |5 i
aaa-server TACACS+ max-failed-attempts 3 3 Q( g2 S, H% X3 U
aaa-server TACACS+ deadtime 10 # m+ j3 H) ~5 \& t
aaa-server RADIUS protocol radius . l1 D3 U; F" _9 C2 C# v3 g
aaa-server RADIUS max-failed-attempts 3
4 `3 a' ^  t2 g3 j1 k1 {* a3 e! Laaa-server RADIUS deadtime 10 . z6 `/ o2 g2 ]% c- Y
aaa-server LOCAL protocol local
+ b* @+ |1 x* l3 c  W/ Qno snmp-server location
9 G& ~% w& U+ i, N, P$ p0 `/ x) p! ^* gno snmp-server contact
- ^9 s) _. _* bsnmp-server community public2 \2 X3 f1 N9 @" m- |+ J  r
no snmp-server enable traps; d! q; y$ E  E7 W0 q
floodguard enable& A/ G7 d, O, Q0 g+ M% G
sysopt connection permit-pptp
; S7 x: v3 q7 ksysopt noproxyarp outside0 M9 Q* A2 |0 r( ^# L% }3 [: K
sysopt noproxyarp inside8 J$ b- T. i7 z# f0 H
telnet 192.192.192.0 255.255.255.0 inside% ?8 A3 n$ F2 L5 O
telnet timeout 5# y# v- {- |9 a1 d1 x' [1 N
ssh timeout 5: C, r. ^* P; l
console timeout 0
( K$ ~8 z! b( A: Hvpdn group xxzx accept dialin pptp/ @6 c% e4 o) x0 X! Q- D* l2 }1 T6 ]
vpdn group xxzx ppp authentication chap
3 L, ^  X8 @6 o0 l  ^vpdn group xxzx ppp authentication mschap
6 ~) P! N/ d: E8 V' A0 l, \5 i2 fvpdn group xxzx client configuration address local vpn( w$ C! T0 I4 J% y
vpdn group xxzx pptp echo 60
" B6 i3 E9 j) i8 ]2 {vpdn group xxzx client authentication local
6 E: s0 W6 ~, [4 A; p; dvpdn username hrbbxxzx password *********
( w3 k% t, {  h& b3 ^" Rvpdn enable outside
, h0 ]: t, R1 B2 sterminal width 80
! }: h% O9 G- ?7 K1 aCryptochecksum:ca107db971e827731294bffc5e00dc392 T/ o$ w, s* p1 o
: end% C" L2 u  j! _0 B
pix520#
回复 支持 反对

使用道具 举报

bbbbbbbbb [Lv5 不断成长] 发表于 2013-8-6 14:26:30 | 显示全部楼层
顶上去
回复 支持 反对

使用道具 举报

unreal [Lv4 初露锋芒] 发表于 2013-8-6 15:04:10 | 显示全部楼层
帮顶.  同样的问题
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-4-18 23:15 , Processed in 0.120357 second(s), 15 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn