
ASA1:" v# h0 `! i3 A/ L
object network test
* T& V8 y; M3 N l) U; c% s# ksubnet 192.168.101.32 255.255.255.224( m3 L ~* P% ~& {
object network ServerGroup ]* i2 Z O+ ^3 n" Q
subnet 172.16.48.0 255.255.255.0! v' a/ r7 ~, N1 Q
: S6 I% w/ d& V# S4 @1 H
object-group network VPN: z5 u6 {; k S* K$ Q
network-object object ServerGroup
1 W6 R% \2 M' d& P; xnetwork-object object test
% c8 C( ^6 ~1 [/ L7 X
1 E$ y3 Z5 r0 z% h4 `! Taccess-list l2l_list extended permit ip object-group VPN 192.168.3.0 255.255.255.0 , L$ u5 O$ I# L9 a, I6 R' b* f# P, Z
- ^4 g* F" M0 E/ ^
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 9 t- F3 E/ @9 O- }. d5 ~" G7 J
crypto ipsec security-association lifetime seconds 28800
8 B5 b7 c0 y9 z1 D6 X, m" O% Mcrypto ipsec security-association lifetime kilobytes 46080004 j) @0 d! H$ u
crypto map shtestmap 1 match address l2l_list5 h- T% h1 v5 N0 w
crypto map shtestmap 1 set peer 192.245.0.14
) `7 z4 V0 S+ ]- e$ U/ x( [8 a3 ]crypto map shtestmap 1 set transform-set ESP-DES-SHA
* {" ?) C# y; @7 l6 p5 B5 n& }% Z) Dcrypto map shtestmap interface outside5 w- o5 H; k0 k7 F* H3 _
crypto isakmp enable outside/ M! O U& N2 ^; o6 K: u' ]
crypto isakmp policy 1
! L* H; k' C0 i. kauthentication pre-share
! z9 V& c7 L- [- m9 z0 u' R# e/ y9 hencryption des9 \ G0 T M+ O. J+ k: C4 {
hash sha% ~. }4 B7 g& B1 r. N
group 2
, g$ o, F+ P5 E: I* H! ]lifetime 43200# k; s8 k, }$ C
no crypto isakmp nat-traversal' t5 e$ f. _2 D+ G: O) N7 q
3 k7 _9 f9 s+ @$ T) C2 W$ q( ? }; B- K( q7 q8 ] N- O c; g
tunnel-group 192.245.0.14 type ipsec-l2l
; d; R, f* v" Y/ V& A% G+ Ctunnel-group 192.245.0.14 ipsec-attributes% ?- W3 v/ ]' D5 V$ S
pre-shared-key *****
, |, [! C% ]; f# Ltunnel-group-map default-group 192.245.0.14
& Z! T, {3 K# U
/ @9 ^2 O' g6 W& r7 ^( Y+ s2 ^
# J/ b- u5 C' `) H) s( cASA2:- R2 E% u0 k1 y8 V
object network 192.168.3.0 * X6 |+ F& W: p4 G
subnet 192.168.3.0 255.255.255.0
" |" S8 w- m- [. g$ R& mobject network test 4 d$ H* u6 T5 u- s- M+ s
subnet 192.168.101.32 255.255.255.224; O& V( o9 K; w. M6 U5 F& r
) u+ G6 X `- `object-group network DM_INLINE_NETWORK_17 C# k6 Q, Z' Z% v# M7 w+ F
network-object 172.16.48.0 255.255.255.0# W7 H" u4 t- w! B7 a
network-object object test
. B% U1 @& ?) x, w0 w# h+ J) l# Z) q2 I/ G; Z& v2 f
access-list l2l_list extended permit ip object 192.168.3.0 object-group DM_INLINE_NETWORK_1 ! F% }8 g8 N4 j0 f2 h8 l, r
0 } ^% E$ w% S3 E2 [. }
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
/ D8 A# x5 A' lcrypto ipsec security-association lifetime seconds 288000 S$ n) S# n2 c, l" @: p/ ?
crypto ipsec security-association lifetime kilobytes 4608000+ B) |2 {% [: ?- c" m
crypto map shtestmap 1 match address l2l_list- e0 F' j4 D8 a, }8 [
crypto map shtestmap 1 set peer 192.245.0.10 % k% E8 ^9 b% B, v4 m% L
crypto map shtestmap 1 set transform-set ESP-DES-SHA
/ d8 t" k; h$ `- q8 _9 wcrypto map shtestmap interface outside V# f& }6 H# Z& B5 Q3 Z
crypto isakmp enable outside
4 j- X; u, o1 ]. B; c' ucrypto isakmp policy 1
/ ^3 m1 j- X }# Hauthentication pre-share
0 u6 |& T% N7 g+ T8 H$ iencryption des
3 \. l- Y; X3 P, W- fhash sha
; l# F) ?9 m' Y$ A8 f. S, c! ^+ Dgroup 2
0 ?7 a8 w; s, w0 h d7 I h% h. Clifetime 43200
9 X9 m- _5 w; v* K( R, i" Ano crypto isakmp nat-traversal. B% @9 Q' m: p% l7 X" t
9 O) f' e1 s/ H4 A
tunnel-group 192.245.0.10 type ipsec-l2l j0 a) H) c" C8 \7 u& Q4 V
tunnel-group 192.245.0.10 ipsec-attributes
# X. ^' h/ y0 y7 @( w4 {6 q! ?8 npre-shared-key *****
3 I8 J, y3 h( j' |tunnel-group-map default-group 192.245.0.10
# K8 N* I- S- g8 P- } M \( _) v' i7 G1 p/ v$ J+ ]- j/ b
. o+ o: F0 b# T( Cshow isakmp sa% c( H! ~7 a1 I3 [! ]
显示
* A7 m+ X0 B0 d E/ m! c3 zThere are no isakmp sas
! b6 ~* q) d6 u* `2 B
' N0 L' Z1 W3 T2 K+ c请教各位大大,如何解决; H0 x8 y$ p4 d# }. Y
% S2 N* e" P& r2 G$ i
网络结构如下- E( ^ Q: L. b5 K* N6 n. Q; ?
4 g: d0 @- _7 F3 Y
192.168.3.0/24 INSIDE----ASA---OUTSIDE 192.245.0.14/30--Internet--OUTSIDE 192.245.0.10/30----ASA---INSIDE 192.168.101.32/28--- Route 172.16.48.0/24 |
|