本站已运行

攻城狮论坛

作者: 当当
查看: 5422|回复: 58

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] 请求帮助:思科ASA 5520和华为eudemon 300建立L2L vpn不通

  [复制链接]
peinile [Lv4 初露锋芒] 发表于 2013-6-19 04:37:41 | 显示全部楼层
开通VIP 免金币+免回帖+批量下载+无广告
如何确认ipsec sa建立起来了?
CCNA考试 官方正规报名 仅需1500元
回复 支持 反对

使用道具 举报

gyf200311 [Lv5 不断成长] 发表于 2013-6-19 05:33:34 | 显示全部楼层
这是华为的配置:2 l' |9 a+ A/ r6 g  Y; c
#
, h9 ]7 m  ?0 y9 ~- w" D2 |" Vacl number 20008 \$ t0 g% B$ W2 G) H' x8 C2 y
rule 0 permit source 172.16.14.1 0
$ e* M  V# D. y rule 1 permit source 172.16.1.0 0.0.0.255
( ^, y, Y! ^# r, |  f0 r rule 3 permit source 172.16.2.1 0* _, E; f9 S! E) J( L% a( _/ Z! ~
rule 4 permit source 172.16.2.13 07 [2 X1 J, f# D
rule 5 permit source 172.16.10.0 0.0.0.255" g* R$ f) R) @2 b% o$ {& @
rule 6 permit source 172.16.16.2 0' y- F& h8 o8 W) ~: j% v  |4 }
rule 7 permit source 172.16.2.2 0
4 h' [. o6 z' |* ?3 ~" C* O rule 8 permit source 172.16.14.50 0
& E0 l, ?# @8 w* X$ t rule 10 deny
( f( b% E0 R0 O  K  `9 ]acl number 2001
# p& j* e% f* l( a/ h9 c rule 0 permit source 172.16.12.51 0% N& Q( a  g+ b4 L; d
rule 5 deny2 }( e/ j( h. m6 G% z, K$ B4 Q  w
acl number 20024 U: h4 U7 `, t
rule 0 permit source 172.16.12.61 0
. P( e7 P" P! {; Y8 g rule 5 deny
0 x7 D5 P, q" w$ Kacl number 2003: k2 s. r8 f- \% F
rule 0 permit source 172.15.10.4 0% [3 f0 R& ~. \0 `5 v9 u
rule 5 deny6 P3 I7 o0 ]  ]$ t& @7 @+ ^
#" K% a6 L  c" u& n- X$ X2 u2 @
acl number 3000
/ F3 V8 I' ?3 G description dmz-trust
8 R' }  ]( q/ H7 b1 n rule 0 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 4008
7 m' {! F4 D& ?5 u7 c* P) O rule 1 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8898
/ x5 o+ X# K; ^ rule 2 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8868% _6 i. Z5 e) t( C" H( v3 K
rule 3 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8858
7 P/ V7 l; r. l) m- _% C; t0 u rule 4 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 4008
5 r$ e5 Y) v: R! J2 l rule 5 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8898+ W& B0 ]8 M/ y9 E2 Y9 k/ z3 U
rule 6 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8868. R2 t5 ?- c1 l6 w" a3 }3 O
rule 7 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8858: \5 ?$ i/ y  W$ L
rule 8 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq 4003# i6 s  t, z+ }2 n. L, G
rule 9 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq ftp
- B* M- l& ^! G/ M7 S rule 10 permit tcp source 172.16.12.61 0 destination 172.16.10.51 0 destination-port eq ftp
5 ]9 ^9 ^  G+ C. N; D- t4 _ rule 11 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq ftp
5 E$ E9 D  o5 V rule 12 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq ftp* ^4 V) [# i' c6 r, J: J
rule 13 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq ftp0 x% C0 T/ u8 b# Q9 z5 O
rule 14 permit tcp source 172.16.12.51 0 destination 172.16.10.51 0 destination-port eq ftp" g, q( a4 X9 Z; i0 Y% L7 Y
rule 15 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq 4003
! l% q1 o. x! W1 q( C& P rule 16 permit ospf
; r2 V7 E- g$ H' o- [$ T- y0 e7 f; v/ k rule 17 permit tcp source 172.16.12.51 0 destination 172.16.10.101 0 destination-port eq 8
! b7 _# g! e7 v$ \8 f rule 18 deny tcp; C& \0 B% c, d0 ^
acl number 3001
# ~: r! d0 K7 M- L description For Untrust-dmz) y& e' d$ {/ }6 f3 O
rule 0 permit tcp source 172.16.20.0 0.0.0.255 destination 172.16.12.51 0 destination-port eq 50009 Q# i0 O/ G& I0 S# w
rule 5 permit icmp
3 o* _% ]! W. ]0 S+ ~/ K rule 10 permit ospf                      ; U" R  a: `' M
rule 15 deny tcp source 172.16.20.0 0.0.0.255" m6 [$ E2 i4 ]
acl number 3002
/ o5 Y; z; ?6 |% o description To_Yinlian2 e. ^1 |) F9 J; I0 N, @
rule 0 permit ip source 9.234.21.63 0 destination 144.234.97.33 0- d# p" ~, [) h0 u$ m6 E' q
rule 5 permit ip source 9.234.21.64 0 destination 144.234.97.33 0
5 `- E' N8 n$ A/ y# G: m rule 10 permit ip source 9.234.21.66 0 destination 144.234.97.33 0
$ X; d3 `/ }- H# q rule 15 deny ip8 E' |; [, I: X3 M$ ?9 {' O8 N
acl number 30033 f8 ^/ d, ~/ e0 \
description for Untrust-Trust0 O' m+ {1 }2 ?* ~! C( k. s
rule 0 permit ip source 10.78.72.70 0 destination 172.15.10.4 0
. h) M  p& K7 v5 |. ~2 M0 Y9 Z, f rule 1 permit ip source 172.16.2.26 0 destination 172.16.10.111 0& |/ J9 e! a* w; Z; _1 ~( W
rule 2 permit ip source 172.16.2.26 0 destination 172.16.14.1 09 ^$ z: P# }+ d/ S
rule 3 permit ip source 10.78.72.153 0 destination 172.15.10.4 0
" s; l4 w0 K9 M/ A' M; O- w" P  O rule 4 permit ip source 10.78.72.157 0 destination 172.15.10.4 05 y, W/ n( {. N, D5 H6 P, z
rule 5 permit ip source 192.168.100.43 0 destination 172.15.10.4 0: b8 M" }. S. ?, C" |
rule 6 permit ip source 10.16.2.7 0 destination 172.15.10.4 0
3 _/ S; m3 h7 ^3 U- ~, T3 M: ^ rule 7 permit ip source 10.16.2.5 0 destination 172.15.10.4 0% N5 r. S* y, ^  y# @
rule 8 permit ip source 10.16.2.6 0 destination 172.15.10.4 0
9 I: h4 e0 v0 Z8 i* F rule 9 permit ip source 10.16.2.8 0 destination 172.15.10.4 0
+ B+ A  c0 j: |1 R4 x rule 11 permit ip source 10.139.25.26 0 destination 172.15.10.4 0$ z* Y8 E1 a! T* E& g" g& t0 f) L8 ~8 A
rule 13 permit ip source 10.143.10.183 0 destination 172.15.10.4 01 |# E) u5 B( L% s
rule 50 deny ip
1 Z$ l. x9 g9 ~+ ^acl number 3004                           
) }3 b0 P  m: i/ t- h# S! q+ p( v rule 0 permit ip source 172.16.1.7 0 destination 172.16.10.111 0! Q  ^- P7 j" G* a) ?3 J9 n; \; h
acl number 30058 i+ V- J& Z- ?. \8 X8 G, H2 Y8 E
description TO_dudubao
$ C2 P* }4 D9 `3 y" u+ K$ h) K/ ] rule 0 permit tcp destination 172.15.10.4 0 destination-port eq 6868
: v" o5 h4 b: u2 o# g5 U2 G/ B: | rule 1 permit tcp destination 172.15.10.4 0 destination-port eq ftp-data/ t! {- g7 S4 g5 T0 x: Q% e
rule 2 permit tcp destination 172.15.10.4 0 destination-port eq ftp' F7 f: R$ u3 {/ L- K8 |
acl number 3006
7 \% C. L( M* T( Z) _ rule 0 permit ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.2555 t1 V4 G# X) ^3 H2 Q' ]1 V
acl number 3007
+ Q7 x& ]3 n) }& c rule 0 deny ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255
9 ]0 x2 W8 B* }- v& S( `$ b rule 1 permit ip source 172.16.12.0 0.0.0.255, R( L1 D* A+ M. l- ~
#
7 k5 \3 F/ k: E2 @: g' a+ B9 J sysname NB_Eudemon300-A! e4 I, ?& L/ x5 e5 r# Y; `- }
#
" U/ c4 a) Y# C. C, M super password level 3 cipher '._1D9P1YCQ=^Q`MAF4<1!!) Z9 X( a6 o/ h' X! r
#; A% |/ u2 u2 p, L' P) c
info-center loghost 172.16.10.192. c4 {9 i/ a( N, m& P+ o8 F
info-center loghost 172.16.10.111* }' y& ?& y) I# A3 |1 y
## k  H" w: M3 M: f" X0 X
hrp enable
3 L8 F/ D. ~& U0 E8 ?$ J. `& ^$ Y# E hrp interface Ethernet2/0/7/ ~1 _: L7 G" J8 p+ ^
#
: J. _5 Y$ l: {' s5 f router id 172.16.1.3                     $ F' m9 J' M$ X$ h9 u
#7 m% a# }# f. w& B- a/ |9 _! ?
firewall packet-filter default permit interzone local trust direction inbound
0 E3 g: B8 y4 P; I' [ firewall packet-filter default permit interzone local trust direction outbound  A/ L# S, p4 O1 |2 ~1 r( M
firewall packet-filter default permit interzone local untrust direction inbound1 q4 L3 I" j8 @3 g8 m6 \
firewall packet-filter default permit interzone local untrust direction outbound
0 S. B0 |+ h% Z- f firewall packet-filter default permit interzone local dmz direction inbound' G/ ~, ?' k% v8 |' o. P
firewall packet-filter default permit interzone local dmz direction outbound
( w& D4 X: i# W: b firewall packet-filter default permit interzone local hrp direction inbound
9 j5 J, _- L9 ?) ~' v, \& O firewall packet-filter default permit interzone local hrp direction outbound8 s! b1 v( ?& a% \/ v
firewall packet-filter default permit interzone local gprs direction inbound
& j, H+ M1 a, v* Z3 t3 h firewall packet-filter default permit interzone local gprs direction outbound
" l, q" y0 o& \0 d  g& a, s2 F firewall packet-filter default permit interzone local dudubao direction inbound
2 L* k9 _/ S8 }6 o; |3 Z firewall packet-filter default permit interzone local dudubao direction outbound
! z+ O9 Q& ~6 u5 h/ m firewall packet-filter default permit interzone trust untrust direction outbound
! y8 i: j1 i: v) s, e+ o( z* T# y firewall packet-filter default permit interzone trust dmz direction inbound
5 M! o  T/ l3 x% E firewall packet-filter default permit interzone trust dmz direction outbound0 q; _* t& S$ c9 \  A8 h
firewall packet-filter default permit interzone trust gprs direction inbound. x1 P" t5 r) w6 }  h; J& K
firewall packet-filter default permit interzone trust gprs direction outbound
/ B5 O( ?( `2 X3 T! A firewall packet-filter default permit interzone trust dudubao direction inbound2 a2 I. \  p+ j
firewall packet-filter default permit interzone trust dudubao direction outbound! x* M: c% Q: S* l$ T
firewall packet-filter default permit interzone dmz untrust direction inbound4 j( f+ }$ p" F% Q: Z4 P6 B
firewall packet-filter default permit interzone dmz untrust direction outbound
" E: s7 N0 f. ]! N6 c5 z firewall packet-filter default permit interzone dmz gprs direction inbound2 ]% c# z$ t3 P7 i
firewall packet-filter default permit interzone dmz gprs direction outbound
1 Y+ R7 z; y( Y& l$ s; m! D  a firewall packet-filter default permit interzone dmz dudubao direction inbound
3 K2 u0 o  b  p( j9 Y firewall packet-filter default permit interzone dmz dudubao direction outbound
. @! P: e4 A' _8 ]7 b#/ X6 {# u7 p. H2 J
nat address-group 3 145.234.97.33 145.234.97.33
" m' B3 }3 C, R& u+ Y+ q7 `$ v nat address-group 5 144.234.97.33 144.234.97.33, \" o9 p- r0 k
nat server zone gprs  global 144.234.97.33 inside 172.16.12.61
1 ~3 e( l2 Y1 C#3 X' n9 V- U$ }
bypass switch-back auto
/ S; T* E5 B2 v$ }#
2 p( E- h6 m4 `2 p firewall mode route; o4 p0 k6 I0 g3 f6 ]$ I3 m# x
#, S/ R9 i  {5 l4 l4 ~  \
firewall defend ip-spoofing enable
6 @- f( _7 E9 [ firewall defend land enable
/ b: }. Z2 U4 Z" O firewall defend smurf enable* @0 o2 I! _7 X, J' V9 A* m# i% y
firewall defend fraggle enable
" N/ q% D5 a5 t# Q firewall defend winnuke enable$ a7 G3 r( T1 \) ]- E* N
firewall defend syn-flood enable5 r5 w3 [; Z) t% a; J
firewall defend udp-flood enable
' k  C. q: M0 r. ]/ [ firewall defend icmp-redirect enable3 K, _. g7 H8 z" t5 I+ a& ?
firewall defend icmp-unreachable enable5 _3 [5 ~/ ]) ^; r5 E; U4 M
firewall defend ip-sweep enable          * h& P( t& Y7 h2 d3 N. u6 H
firewall defend port-scan enable) q) z' f" P; J: n
firewall defend route-record enable0 n9 r9 I; b7 t% b. v
firewall defend ping-of-death enable
8 V- Q. O& A; N+ [2 s firewall defend teardrop enable
$ |6 a$ ?4 G% ~  g' x firewall defend tcp-flag enable4 y4 y& L6 ?0 T# {
firewall defend large-icmp enable, ?8 o) A4 m8 c+ V" |
#
- r4 v( f3 k9 O8 o firewall statistic system enable' ^1 ^3 w7 j9 ^5 c$ \
#
6 G, y# a+ P! w* ^4 wike proposal 1
/ y/ |  e7 H. W& P0 q9 V! u8 c$ Z#
6 h* }# ]5 r+ F) G  dike peer a7 K& P7 d3 G% C1 B' p( k
pre-shared-key cnnbtk
! m9 L9 ?/ M/ n, r7 v  p& Z3 @9 l ike-proposal 11 L6 `" f5 V. s: _# O; ~
remote-address 119.57.5.5: B6 {" T# z* k$ s- Y
#
( j+ Q: K! h8 I$ x  @# u  kipsec proposal tran1
8 F/ V. }+ J0 k0 q#6 J; T! j: G, p9 x! y7 g4 F1 `6 j
ipsec policy map1 1 isakmp
) H5 G" n6 g1 l5 ? security acl 3006
9 |  H( O" R2 f4 P! w pfs dh-group25 S% F! n) c3 ]3 l/ J" A' P7 |- N8 m/ P
ike-peer a
: {7 e+ R$ Q6 p# y& I% Q proposal tran1                           - v7 k: f; ?$ F5 {9 H
local-address 60.12.194.14
* R- k. {" U, x. A& F  c#
- M* ^/ X0 V" U3 Pinterface Aux0
- u* `/ u9 ?6 V. K async mode flow
  h. `- R, @/ t5 U link-protocol ppp: F1 [$ y7 g0 l9 w
#" z! F4 B7 Q) R3 d+ L$ O
interface Ethernet0/0/0
, B2 ]  f( S* V* `6 m2 ^#
. M8 D$ Z! l) Y$ Q( O0 t7 ~/ }interface Ethernet0/0/13 u& q* m  g6 B  s9 Q
#
5 n9 s! N7 e; `! ?$ Pinterface Ethernet2/0/08 a8 z; o) G0 ^6 }8 h
description To_S5624-A(1/0/24)
' Y) A; g9 I0 }* [( D7 {( A ip address 172.16.2.9 255.255.255.252; n$ j9 _6 S$ q3 J
ospf cost 100) E. z( ~! n( @& U( M
#
6 t5 E& h4 r$ w+ j* Ainterface Ethernet2/0/15 [7 @5 r; p+ L: J" w5 p
description To_Yinlian
7 P2 r  r  o8 }) e; [+ D4 I" Z# [. s ip address 145.234.132.154 255.255.255.252
& y& U2 `* K, g/ |#
: h, q* w# W2 \; N& pinterface Ethernet2/0/2
" w; A( y; c# x6 L4 O" c description To_S6506R_A(7/0/48)
* n; P  I, N4 m7 { ip address 172.16.2.2 255.255.255.252$ y! c5 z4 R( `9 L/ c, {. ~
ospf cost 100                           
$ n7 B$ D3 H# i# J1 c#1 o, F* R4 X) p. ^
interface Ethernet2/0/3: N$ t, N( L/ \+ H1 U0 _
description To-dudubao; Y$ c4 J- c# N7 j  H
ip address 60.12.194.14 255.255.255.240
4 H6 C  D7 e3 I- e7 R1 ? ipsec policy map1
. Y* O) o) X. X) ~- L#
" D! y. \( }& R; e$ X- Z6 h# ^; Sinterface Ethernet2/0/43 d9 H5 [% E/ o: n) S, q+ @2 I
#
- L% o3 l- [0 K; K8 c6 J0 tinterface Ethernet2/0/5
* }4 r4 }3 I; {# c& p/ e/ ~$ b0 v7 C#2 b) Q( g, X9 ~+ N5 B6 p
interface Ethernet2/0/6
8 C, G2 v4 `8 E9 V#6 A6 D% f8 @5 U1 L
interface Ethernet2/0/7
3 X% e: b" B2 x5 X4 m4 N description To_Eudemon300-B_E2/0/7
0 c) z1 ~" J/ s, W ip address 172.16.2.201 255.255.255.248
- M, d, ~* f0 M% A$ T& K vrrp vrid 1 virtual-ip 172.16.2.2030 o. N: u; ?, h$ i
vrrp vrid 1 priority 150
" g0 s- J8 h1 m vrrp vrid 1 preempt-mode timer delay 60
/ D  E/ ]: Q$ Z+ ?& s vrrp vrid 2 virtual-ip 172.16.2.204
' \* |4 u, k" F# W2 I#! {* `7 Y7 a' i* ?: b5 V
interface GigabitEthernet1/0/0
" N1 B9 m1 p* X0 v shutdown                                   Q& \" D8 X2 \
#
" d6 f2 v" l2 a$ f* \; [interface GigabitEthernet1/0/1
2 N9 n- F' @  l" R3 ] description To_S5624-B(1/0/25)
" ^/ j$ u! i- @3 d. J ip address 172.16.2.25 255.255.255.2522 {/ T+ L7 @* [$ T& D8 b& U5 ]# I
ospf cost 5008 v  Y, y* x9 S# j. Y5 `
#
3 Q! A0 {. d9 Z/ q: Jinterface NULL0- K5 y) \1 j9 O7 @5 ^
#
( b* ]) ~' `! e* [" b9 k/ D% ]) ?interface LoopBack0
1 B, F2 d% t& W ip address 172.16.1.3 255.255.255.2553 y; t% r- v9 E5 j" r' n/ `
#
) ~) {- S& ]% I3 e6 ?# ^1 Nfirewall zone local) U- g# @# B% c2 g
set priority 100
% @- n8 M5 \9 c. e$ d#- u# D( f( g# U& c7 [+ T0 x* z/ |+ [
firewall zone trust
2 E, ]. [* L. C1 @& a- ]. Q" }: S set priority 851 Q+ T9 b1 }  z/ I# [0 n4 b* U
detect ftp2 v8 o% s0 t" {! z& b
add interface Ethernet2/0/2
# S5 y7 t! Z' O. P) \#2 z: \# y4 v# w* K
firewall zone untrust' M/ q7 r1 Z- R* j: d7 f
set priority 52 ]5 @$ C7 r3 V! K
detect ftp                              
) n1 E9 M) Z; _" h% s! v add interface GigabitEthernet1/0/1) K/ J6 J% O2 c7 N
#
2 H* R1 A  d; Y8 ^firewall zone dmz5 E1 m  h+ }! t. b& D
set priority 50
7 l( N8 L: K) M* f) V8 W, ~2 d; Y add interface Ethernet2/0/0
' y* @: F. N- [5 G+ ^, u#/ k: F1 I  E8 F+ S, C( E" n
firewall zone name hrp8 m2 t, O) q$ Z
set priority 40* Y" H0 ?9 U% I9 j
add interface Ethernet2/0/76 w3 m$ S7 E$ S- p' \
#
" E+ T2 o( _8 K4 Kfirewall zone name gprs# p3 J: ]1 x6 x, P% w1 n8 H( c
set priority 45 Q& n- G3 e' q- L( z; i, v
detect ftp9 Z9 @% O- e+ _1 A/ s
add interface Ethernet2/0/1
6 m. q4 N( p. a% x: B#
3 K9 Z) c- {' W& Z- G* Afirewall zone name dudubao4 ?0 Z! ]( P4 \) I: q( h3 m
set priority 3  U  ]0 \3 P, e3 \5 f7 }, L. @  f# S, K
detect ftp
7 K. ^/ G) C9 j! y) h add interface Ethernet2/0/38 `$ k( g9 R. |. ~
#
- s1 _4 @/ P1 V8 }" Afirewall interzone local trust- O2 {. j% \( A: n+ k: `1 y8 u
#
& H; C+ f! Y+ |) Mfirewall interzone local untrust          + k; K/ @" @0 Y" D
#
9 P5 ~' P% f2 S8 B  Q4 vfirewall interzone local dmz% v  n! V9 O+ b  x
#
/ R  c: K1 U4 B& Y/ ^firewall interzone local hrp  \3 T* D/ Y, k  A, Q
#
# @. r, X  G6 S$ t5 Lfirewall interzone local gprs: g$ t, v# x, `
#
3 c0 R' ?( `8 v8 j! a1 {+ Hfirewall interzone local dudubao
2 {5 F8 q; R  O. T+ @#
* R9 f& @. w" C1 _5 L% G! O% y0 H1 jfirewall interzone trust untrust' u, w: S% O8 h4 c9 H4 D0 I5 l5 H
packet-filter 3003 inbound
6 q* |. m2 t( ]* N: B detect ftp
7 |$ G$ v5 L' G( n#5 {0 d6 ?+ _! e8 q1 X3 X! G1 Z5 S
firewall interzone trust dmz  L9 h; I( M9 C% v( Z& i8 c6 L
#
; G$ ^) u" J% b! }5 M) a; hfirewall interzone trust hrp- j  E- n* t' G
#) u% ?6 }" m' R9 p: ]
firewall interzone trust gprs
9 C4 O# t' ~  r9 I0 A2 N" `, C, ^# e5 U nat outbound 2003 address-group 3
) L# K7 m% ?* \% A4 N5 q detect ftp
4 u" ^' K8 M4 P3 o  u5 a1 U4 [- u#8 o5 e( H5 n: L7 D4 }. i) b8 X
firewall interzone trust dudubao
' Z# M! L* C; h% f packet-filter 3005 inbound               # r- y1 E7 y, X9 J0 O- R
detect ftp
, @0 s6 k0 U3 X4 O; i' E#
! B. j* p$ Z8 a+ w3 b& tfirewall interzone dmz untrust
* a, c2 W4 r$ `% U' H#
- f. q9 H% }" ifirewall interzone hrp untrust5 V& p' m- L2 N% s* Q
#% Z5 M# ^" g) ^
firewall interzone untrust gprs' F0 l+ |1 f& G5 {. o( u) w" ^/ G1 D
#) b9 t. |" Y! w4 h3 S" j6 G
firewall interzone untrust dudubao
" S3 `# {) X/ d& a2 Q: }+ @#1 \- h' h, g* Z
firewall interzone dmz hrp
$ S3 H' |- N$ {) i! ~0 X8 h#
2 i7 U; i1 X; p" v# o) f/ h' ffirewall interzone dmz gprs7 p& ^% }. B! d) o$ ]
packet-filter 3002 inbound
9 v/ p1 h& H7 \; r9 m nat outbound 2002 address-group 58 y) _2 P% E7 |% S
detect ftp
1 E+ ^* n. ]  T, B1 t9 f! ?9 L#
- P9 M( w! B, F1 W1 s2 Lfirewall interzone dmz dudubao" \( H7 t: t* C% _. Z( d
packet-filter 3006 outbound
$ W" B3 S6 @% l3 N#( U) p1 t; Q% b% X- O
firewall interzone hrp gprs
" [- Z$ r& z! T# y#
4 f% S% p+ y5 ?4 b8 W0 g5 ?firewall interzone hrp dudubao            
3 ]1 B) u/ I8 D& o6 g#: {' x* X% g+ G; b/ m% W
firewall interzone gprs dudubao
, s; H; Y% j: G+ h- P0 O#% U" R/ e; F  k: }1 E6 T
vrrp group 1' E9 l$ k9 Y% Y  ]; _! U0 {. O
add interface Ethernet2/0/7 vrrp vrid 1 data
- g2 W4 g) ^! ~" x% g vrrp-group enable
* i6 S. R7 w- s) M vrrp-group priority 105  |# `5 l1 `6 }8 C1 Q! W) f# [
vrrp-group preempt delay 60/ U& Y% K7 W; z# Y
undo vrrp-group group-send$ O' j6 q/ E: e9 g7 P. D
vrrp group 20 j* l$ R) V$ S* G% |$ f6 ?; y9 Z
add interface Ethernet2/0/7 vrrp vrid 2 data$ U9 |8 N- M* y$ n( o
vrrp-group enable
9 j# O& a: A# \" ~6 \ undo vrrp-group preempt
& C8 r/ u7 x1 I5 ~5 } undo vrrp-group group-send) I* l; A4 z5 M$ `& s+ F
#" f2 A2 ?4 x6 D. Z* Q
aaa
, r& c! [% M( Y+ t8 M6 K local-user huawei password cipher 1_`%CO&$8@7&quot;+C5`;6XL!!!( v3 _/ {: Y9 t* E' Z
local-user huawei service-type terminal telnet ssh
" v& S6 S2 n/ ?" J, p8 P/ C7 n6 a local-user huawei level 1
+ ~# ~( V! B$ ?8 R9 l/ v1 o authentication-scheme default
  s, u/ x6 Y. v3 ^#  {0 {- d& K% Z6 v
authorization-scheme default
, {6 d$ m- P: m" x#                                         
8 X' d1 m+ B# N) ~9 O( u9 V accounting-scheme default
9 Q' i- a% a! l! p. G#$ U6 O+ a6 X6 w% r: A
domain default/ f3 s! Z4 N. u- E% {! b
#2 o' R* {" j) E# I! Q7 v
#
  x4 {- y. q, |9 ]% S" s' Q6 tospf 1
0 R7 _, u) P3 j; k4 F import-route static
; P! B) O+ N* [2 D- S# F( t4 R& { area 0.0.0.0" x( M) \* u5 V# U. F6 \' F
  network 172.16.1.3 0.0.0.0
3 e8 R, p7 @0 G- B3 e& l* V  network 172.16.2.0 0.0.0.39 v7 J4 k% Z, S2 d5 h
  network 172.16.2.8 0.0.0.3
! z& a5 _0 N+ K/ c  network 172.16.2.24 0.0.0.3
3 @. i0 e  P* z9 P* q+ s: j6 t#7 Q! U* h0 R9 W
ip route-static 9.234.21.0 255.255.255.0 145.234.132.1535 F, s0 Y% Q+ @6 B+ d: Q& {
ip route-static 10.0.1.0 255.255.255.0 60.12.194.129
6 e: t( A9 P- a' q* ]& f/ K% n ip route-static 61.14.10.218 255.255.255.255 60.12.194.129& W2 V: h- e2 z" ^9 R
ip route-static 119.57.5.0 255.255.255.0 60.12.194.129
2 N$ s- y, U! Q$ I6 ~ ip route-static 172.15.10.4 255.255.255.255 172.16.2.1
# N+ r0 U# s9 [, C ip route-static 221.136.75.25 255.255.255.255 60.12.194.129
3 s- H; o8 Y4 V#
; G* J% k6 I+ {# z/ A- S snmp-agent! ^; p7 T. a1 S  ^
snmp-agent local-engineid 000007DB7F00000100001BEE/ h' L  S  s* g' l, b+ l
snmp-agent community read  nbcardro      
1 P3 e% u$ w. Z snmp-agent sys-info version all
8 d0 w' d, G& w( {* A6 [4 V$ l3 @#
7 x2 @0 ]: Y/ m ssh server timeout 30+ P& l8 h0 p& e" ]. P3 ?& C8 l
ssh server rekey-interval 24
, n1 ]* _+ t8 x/ B) w ssh user huawei authentication-type password& _5 A; s( F7 m- z5 v9 z7 D
#3 P. Q# B. i" T3 d
user-interface con 0
! q& i/ `6 Z& ]" S authentication-mode aaa* ~" b3 X; t6 Z+ i# p% d
user-interface aux 0
! n; U% m5 B3 x$ m8 M authentication-mode none, W3 R  K3 f$ o4 ]( e: s
user-interface vty 0 4
2 W/ a- d& p  N; c' Z) A acl 2000 inbound
" ~5 r0 W3 R6 h  g authentication-mode aaa" g$ d+ q$ M# e0 Y" K5 V: i: ]: S
idle-timeout 5 0
( R* K3 a5 K4 [# m- u#0 N, V+ w- D5 e6 K
return
回复 支持 反对

使用道具 举报

honey8064 [Lv8 技术精悍] 发表于 2013-6-19 06:24:03 | 显示全部楼层
帮看看
回复 支持 反对

使用道具 举报

bumingxin [Lv4 初露锋芒] 发表于 2013-6-19 07:29:47 | 显示全部楼层
帮看看172.16.12.71到达60.12.194.140的路由有什么问题?
回复 支持 反对

使用道具 举报

xsdlng [Lv4 初露锋芒] 发表于 2013-6-19 07:31:32 | 显示全部楼层
sh crypto ipsec sa detail
, l  r. v6 D4 f% U1 m
1 B. i7 e( }1 n6 v1 f1 H- V+ j) p9 } Crypto map tag: mymap, seq num: 20, local addr: 119.57.5.5, z* E( P6 P* J) f4 p
7 ]/ m2 O$ W: w  P  M
      access-list outside_20_cryptomap permit ip host 10.0.1.17 172.16.12.0 255.255.255.0 % o( A3 k; _8 e" _( K' s5 `
      local ident (addr/mask/prot/port): (10.0.1.17/255.255.255.255/0/0)9 q$ L. x% G9 C. s
      remote ident (addr/mask/prot/port): (172.16.12.0/255.255.255.0/0/0)
: P* c5 {, Q3 p9 q      current_peer: 60.12.194.14
1 T3 u: }; M: l  j- t( Z8 q              . h  o- L4 P5 c  j6 g0 Z" ], A
      #pkts encaps: 18, #pkts encrypt: 18, #pkts digest: 18
- T1 }7 d+ `5 y2 E* R$ l# w      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0      #pkts compressed: 0, #pkts decompressed: 07 m) u2 i. E. ^5 `8 W' [
      #pkts not compressed: 18, #pkts comp failed: 0, #pkts decomp failed: 0
8 j, [4 F' }7 B  |      #pkts no sa (send): 0, #pkts invalid sa (rcv): 0
5 M. ^4 s- l3 r( M- Q( {      #pkts encaps failed (send): 0, #pkts decaps failed (rcv): 0- a/ S2 }; Q; F$ @
      #pkts invalid prot (rcv): 0, #pkts verify failed: 0
0 C1 k' \5 c7 W$ J! d, K) Y: s2 z      #pkts invalid identity (rcv): 0, #pkts invalid len (rcv): 0
  j& ?1 P$ V" c5 f, q      #pkts replay rollover (send): 0, #pkts replay rollover (rcv): 0
+ Y, o! M% j: w  Y      #pkts replay failed (rcv): 0( [9 ^  b$ T* r7 ]" |, ]% v9 Q
      #pkts min mtu frag failed (send): 0, #pkts bad frag offset (rcv): 0
; K& m( e- r6 J2 I      #pkts internal err (send): 0, #pkts internal err (rcv): 0- z  Q, L! ]* |0 x/ ~6 C

# ?) y! A6 f  f* R      local crypto endpt.: 119.57.5.5, remote crypto endpt.: 60.12.194.14# S2 I8 c' R) C9 R! K% j
$ H& }- R. E$ V! R6 j
      path mtu 1500, ipsec overhead 58, media mtu 1500
" c% H3 t' D3 x: P0 l6 q/ L      current outbound spi: ED424D37$ l( g8 Z0 T- h5 K, l

, F# R6 H& r6 k. V% j    inbound esp sas:
9 N& h# W3 k2 T) S. W      spi: 0xFE26B574 (4263949684); H/ Q7 `5 V7 ^& a/ ]" }
         transform: esp-des esp-md5-hmac none , z) m2 g+ e' R8 W: e6 D- r2 H( l
         in use settings ={L2L, Tunnel, PFS Group 2, }$ F* `0 J' s8 O
         slot: 0, conn_id: 26, crypto-map: mymap0 e3 H. w; M. P+ m+ }7 |* J
         sa timing: remaining key lifetime (kB/sec): (1710000/3582)
/ J$ n6 \4 E% p, |# i% X         IV size: 8 bytes
. @" [: }' M+ m8 P/ R9 k         replay detection support: Y
$ c- ], o# a' d( V! M! _' u    outbound esp sas:  E8 ^/ @9 g2 s2 P. p. u0 L- N( M
      spi: 0xED424D37 (3980545335)6 b4 V8 O5 K! B
         transform: esp-des esp-md5-hmac none 7 M1 I8 b9 Y- ]/ f8 h* R
         in use settings ={L2L, Tunnel, PFS Group 2, }0 ^: |7 m& e4 m4 j4 \
         slot: 0, conn_id: 26, crypto-map: mymap9 q9 e  s- G' m( t( \& F
         sa timing: remaining key lifetime (kB/sec): (1709998/3580): q/ }& f6 @! K, W  P. q9 T. N1 b/ _
         IV size: 8 bytes  K" U2 m0 _- Q$ o4 U/ G) o
         replay detection support: Y
回复 支持 反对

使用道具 举报

mjf1125 [Lv8 技术精悍] 发表于 2014-3-22 20:49:39 | 显示全部楼层
真是 收益 匪浅
回复 支持 反对

使用道具 举报

isslee [Lv8 技术精悍] 发表于 2014-3-25 13:12:46 | 显示全部楼层
看帖回帖是美德!:lol
回复 支持 反对

使用道具 举报

润土 [Lv8 技术精悍] 发表于 2014-3-26 10:05:32 | 显示全部楼层
这是什么东东啊
回复 支持 反对

使用道具 举报

该用户不存在 [VIP@钻石] 发表于 2014-3-26 12:04:40 | 显示全部楼层
我抢、我抢、我抢沙发~
回复 支持 反对

使用道具 举报

dtdonald [Lv8 技术精悍] 发表于 2014-3-26 22:35:41 | 显示全部楼层
好好 学习了 确实不错
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-5-2 13:06 , Processed in 0.107671 second(s), 9 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn