本站已运行

攻城狮论坛

作者: 当当
查看: 4691|回复: 58

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] 请求帮助:思科ASA 5520和华为eudemon 300建立L2L vpn不通

  [复制链接]
peinile [Lv4 初露锋芒] 发表于 2013-6-19 04:37:41 | 显示全部楼层
开通VIP 免金币+免回帖+批量下载+无广告
如何确认ipsec sa建立起来了?
CCNA考试 官方正规报名 仅需1500元
回复 支持 反对

使用道具 举报

gyf200311 [Lv5 不断成长] 发表于 2013-6-19 05:33:34 | 显示全部楼层
这是华为的配置:0 f# O" M  u' e& M
#) N7 s- g( [4 N
acl number 20008 i3 j% m$ d5 n6 k  W. Z
rule 0 permit source 172.16.14.1 0! B* E1 Y4 ^, m
rule 1 permit source 172.16.1.0 0.0.0.255- @  q, x' t- ?" l
rule 3 permit source 172.16.2.1 06 x6 A: Q+ B( V3 k
rule 4 permit source 172.16.2.13 0  ], o/ s$ L' e/ @$ G/ h" a
rule 5 permit source 172.16.10.0 0.0.0.255
" l' U$ A8 @! N2 ~$ e% { rule 6 permit source 172.16.16.2 0, M" L- b. H6 x* {
rule 7 permit source 172.16.2.2 0% J" z9 l2 ^. o8 _% J( _% V; {& ^
rule 8 permit source 172.16.14.50 0" D/ S! @0 i( e+ Z1 y
rule 10 deny) q1 U. ^9 X3 S! |2 q8 @9 B3 O- J
acl number 2001- M7 N! ]& r$ X2 Z
rule 0 permit source 172.16.12.51 0# P9 m" K3 O% o) k6 J% m
rule 5 deny
5 B" N* K7 m/ e$ h9 Y; eacl number 2002+ C8 l  Z9 z( R4 D3 @' @; t
rule 0 permit source 172.16.12.61 0
/ d5 Z9 Y* [3 ?0 f rule 5 deny
' t& \; p& ?5 c7 ]& b7 eacl number 2003# s3 c; d9 Z3 O/ D5 _
rule 0 permit source 172.15.10.4 0" L6 G6 Y! f0 [! ?# u& t
rule 5 deny( a* t5 e2 Q1 H9 ?! N
#! L& ?+ E, ~- `( u2 w& y
acl number 30004 `5 ]0 m: m, H
description dmz-trust
5 q0 P3 l. ]2 k' i6 s; B1 ~ rule 0 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 4008
4 {9 L7 q' T$ U/ C# J$ p% y. _ rule 1 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 88980 j5 q: C% O7 `# ?3 ~" P
rule 2 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8868
6 a4 q4 E3 c& [$ S* I% Z: W rule 3 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq 8858
- H' W9 @+ b8 }' y rule 4 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 4008) Z& D/ U; N  o$ W  a) K7 s
rule 5 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 88985 e: j! w& O/ ?. ^
rule 6 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8868
) P/ |3 R: b8 u1 T rule 7 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq 8858# ?( }( o3 [# O6 @: Y9 i, z- M2 \/ E
rule 8 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq 4003
2 l. \! a% R7 a( ~; O rule 9 permit tcp source 172.16.12.61 0 destination 172.16.10.71 0 destination-port eq ftp
0 ]# w# M: Y1 A* Q  S1 y7 Q rule 10 permit tcp source 172.16.12.61 0 destination 172.16.10.51 0 destination-port eq ftp
3 ^- ~* M* @) L4 O3 r5 X rule 11 permit tcp source 172.16.12.61 0 destination 172.16.14.155 0 destination-port eq ftp
& Q/ C9 B0 ?- g+ x( Y rule 12 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq ftp
: V! x: h% D5 i% f4 s& E0 B0 N rule 13 permit tcp source 172.16.12.51 0 destination 172.16.10.71 0 destination-port eq ftp) u: j  _1 l& m
rule 14 permit tcp source 172.16.12.51 0 destination 172.16.10.51 0 destination-port eq ftp2 P" Q0 k! k/ I4 v: A  c: t
rule 15 permit tcp source 172.16.12.51 0 destination 172.16.14.155 0 destination-port eq 4003* A* @) M5 W( i& f- i7 s) @4 u
rule 16 permit ospf
( y  w7 o; Q2 S' w- l5 q rule 17 permit tcp source 172.16.12.51 0 destination 172.16.10.101 0 destination-port eq 8$ Y) Z- p- X6 z: v$ F
rule 18 deny tcp
5 \' x' P( ?4 W# V. v! r; Oacl number 3001
+ `" D! @# @& ^' [* ~ description For Untrust-dmz, \6 B  X8 F( |4 h. E* E! Y3 P# K
rule 0 permit tcp source 172.16.20.0 0.0.0.255 destination 172.16.12.51 0 destination-port eq 5000
1 ?4 W6 n# m6 ?6 I0 c rule 5 permit icmp
3 n$ L# d5 {; ^8 i) W8 a* { rule 10 permit ospf                     
' D& t5 t( R$ ^& B0 l% M rule 15 deny tcp source 172.16.20.0 0.0.0.255$ [( T# Q3 u9 O
acl number 3002
7 N. C4 }1 Q5 e- P9 S- |8 ~ description To_Yinlian
8 @: j( L; ?- p7 p rule 0 permit ip source 9.234.21.63 0 destination 144.234.97.33 0; i* x: ?& u9 L8 Q
rule 5 permit ip source 9.234.21.64 0 destination 144.234.97.33 0/ l+ X( z3 Q" O& D8 i  l3 I5 K" ?
rule 10 permit ip source 9.234.21.66 0 destination 144.234.97.33 0
  P: i3 N6 G) Z4 T9 l; K$ y% F6 f rule 15 deny ip
% L. C3 c( l) p. Qacl number 30033 |6 A$ I& B2 a
description for Untrust-Trust3 D8 z2 T+ [  I: q" `/ p
rule 0 permit ip source 10.78.72.70 0 destination 172.15.10.4 0: Z" P) }6 @. x$ v
rule 1 permit ip source 172.16.2.26 0 destination 172.16.10.111 0- t) W" P1 w* G* R! Y  K% W8 h
rule 2 permit ip source 172.16.2.26 0 destination 172.16.14.1 0* ?$ f1 S' {* V7 d7 ^
rule 3 permit ip source 10.78.72.153 0 destination 172.15.10.4 0
+ r8 M4 q* L+ G8 ~ rule 4 permit ip source 10.78.72.157 0 destination 172.15.10.4 0
4 D2 x& l/ k, B2 a rule 5 permit ip source 192.168.100.43 0 destination 172.15.10.4 0  b6 r# ~- U" o% |! V+ k3 G
rule 6 permit ip source 10.16.2.7 0 destination 172.15.10.4 0
1 r- A2 n4 u  j! N2 z rule 7 permit ip source 10.16.2.5 0 destination 172.15.10.4 0, P7 y) Z5 O* p5 X. V
rule 8 permit ip source 10.16.2.6 0 destination 172.15.10.4 0
4 ^  c) e4 _* q- G rule 9 permit ip source 10.16.2.8 0 destination 172.15.10.4 04 S" K; x/ s1 O- e9 S
rule 11 permit ip source 10.139.25.26 0 destination 172.15.10.4 0
" n9 M; {& Z$ J% H+ y" G rule 13 permit ip source 10.143.10.183 0 destination 172.15.10.4 0
6 g% k7 y1 s! q! j8 Q  C rule 50 deny ip. D: ]0 q$ r8 w7 N
acl number 3004                           ; n3 u9 x1 m9 U3 h
rule 0 permit ip source 172.16.1.7 0 destination 172.16.10.111 0
. H7 k" N# {  V1 Xacl number 3005
6 |+ O5 H" W' d- r description TO_dudubao
2 Y/ ?' O" R' x; t rule 0 permit tcp destination 172.15.10.4 0 destination-port eq 68685 ?0 q) V7 J7 i1 m
rule 1 permit tcp destination 172.15.10.4 0 destination-port eq ftp-data
3 e7 j* d9 P2 v6 L. m rule 2 permit tcp destination 172.15.10.4 0 destination-port eq ftp
% I& \$ S) C7 g& iacl number 3006) N/ S1 A8 C+ c' U$ W7 B* A
rule 0 permit ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255
$ V# B' u1 a! }1 n+ G6 lacl number 3007. T7 r. _: m9 N1 c- o
rule 0 deny ip source 172.16.12.0 0.0.0.255 destination 10.0.1.0 0.0.0.255# r/ f, [( {6 `2 f# x
rule 1 permit ip source 172.16.12.0 0.0.0.255! n  F' u3 E, u: H$ r- _% i
#
+ ]: w& q# o2 L2 i sysname NB_Eudemon300-A; b0 l0 [: c2 m2 e
#) n  t* c% V; }* H% y7 b% w+ Z
super password level 3 cipher '._1D9P1YCQ=^Q`MAF4<1!!
, z% L0 S# E* c1 ]1 E#
! r  p: P: R4 o# r info-center loghost 172.16.10.1928 A$ h; P( g! }& G7 N
info-center loghost 172.16.10.111; S5 {- q& s# n& d
#& e+ _: d/ G) x. [( {0 K
hrp enable+ F: E! i8 f, b' u) N
hrp interface Ethernet2/0/7
) W+ _- x0 Q8 g#
# |5 z! \, ?& L5 Y( w router id 172.16.1.3                     " ~3 E, D4 M0 L6 D/ k! {1 `' C
#8 y1 Y5 }% M4 H: @# b, p5 k' j
firewall packet-filter default permit interzone local trust direction inbound
. ~* q% P2 X1 H: i firewall packet-filter default permit interzone local trust direction outbound) t+ ?  j; H0 Y' r
firewall packet-filter default permit interzone local untrust direction inbound3 {" c, @, K, i4 M3 f2 M
firewall packet-filter default permit interzone local untrust direction outbound
( ^8 {! B- K' H* t0 O" i. ^2 u firewall packet-filter default permit interzone local dmz direction inbound3 a6 @1 X3 D5 L6 k: @" a: r
firewall packet-filter default permit interzone local dmz direction outbound
2 `5 g( _% N+ f' s" k firewall packet-filter default permit interzone local hrp direction inbound- f! W% w8 @( S: b+ j. Q" A
firewall packet-filter default permit interzone local hrp direction outbound
, S* T" D" C$ A' q2 |" T: S firewall packet-filter default permit interzone local gprs direction inbound: y/ R+ ~. ]2 U0 l5 r! k: C# N
firewall packet-filter default permit interzone local gprs direction outbound1 M/ l/ D. g% H) P4 {& D
firewall packet-filter default permit interzone local dudubao direction inbound- b2 r5 h5 }  u& A3 v1 T
firewall packet-filter default permit interzone local dudubao direction outbound' K4 R' f' n/ T& K( b) s: k  s* c
firewall packet-filter default permit interzone trust untrust direction outbound
! V6 v& a. ], ~! U: i1 o firewall packet-filter default permit interzone trust dmz direction inbound
. E2 t. w. V1 R! {1 I firewall packet-filter default permit interzone trust dmz direction outbound
' H! P. m1 h; j+ |" ]$ w firewall packet-filter default permit interzone trust gprs direction inbound: Y' C6 p3 S* U9 f
firewall packet-filter default permit interzone trust gprs direction outbound
) c% i7 Z* [/ `/ ^3 J6 g3 C8 M firewall packet-filter default permit interzone trust dudubao direction inbound& Z: q; b$ d# s4 I) L! o
firewall packet-filter default permit interzone trust dudubao direction outbound1 P# l- c* {' |
firewall packet-filter default permit interzone dmz untrust direction inbound
& W# u, F. n0 Y2 l firewall packet-filter default permit interzone dmz untrust direction outbound% ^7 S9 f* l: R* _, P5 V. v
firewall packet-filter default permit interzone dmz gprs direction inbound) U, o6 R' U# z! e; V
firewall packet-filter default permit interzone dmz gprs direction outbound* s% g+ g9 t. I0 R
firewall packet-filter default permit interzone dmz dudubao direction inbound
% Y1 d4 |; c  L" `/ Y6 i  | firewall packet-filter default permit interzone dmz dudubao direction outbound  y# L& [: J  H' P
#
" R  x2 k3 W6 b! e# C* T nat address-group 3 145.234.97.33 145.234.97.335 A  o- a: z2 m( b5 i
nat address-group 5 144.234.97.33 144.234.97.33
* ^& e# s0 h' B: P; M- m nat server zone gprs  global 144.234.97.33 inside 172.16.12.61: W' N( C4 @" E7 l/ G  E- Q
#
5 C# n( I6 u( t1 ]' v bypass switch-back auto
. F" b; K/ w+ k) i#+ l3 M6 N; |# Q6 V, x0 U& Q
firewall mode route- `! d% W; U" J) I% t
#
- S. j" K- ?8 o4 u  m firewall defend ip-spoofing enable& o' ]7 {0 I" T/ e
firewall defend land enable* Q* {. A5 p) Y8 i8 d  M8 v
firewall defend smurf enable
. D9 a, ]$ X6 J- ]  O4 W firewall defend fraggle enable
4 W, V# W# V4 T! h0 {2 e firewall defend winnuke enable
* X. F. R4 \; A' c9 r  H; X6 H, c  ] firewall defend syn-flood enable# x4 V0 H3 J) ?, r: k+ E2 K9 Z& P
firewall defend udp-flood enable
# ~* \( t6 ~; J3 H9 x3 @" Q, B firewall defend icmp-redirect enable; g+ U4 N0 c0 x& t
firewall defend icmp-unreachable enable
! @7 v1 f% J* t% d5 B9 d" V firewall defend ip-sweep enable         
- N5 z" O% |8 y( G firewall defend port-scan enable
# R9 N2 n2 ^& N4 @5 O" s firewall defend route-record enable7 E$ u$ Q, ?5 h7 {1 J
firewall defend ping-of-death enable
& o/ b+ w( S4 m8 Y0 E firewall defend teardrop enable7 M6 Q+ I: e3 O5 Z* l4 t: O
firewall defend tcp-flag enable
+ R1 Q" E8 G& {4 e* ]) e firewall defend large-icmp enable
# d& n) O  {9 h; @9 o) k. {#, M; R& Q) H7 K8 l; s3 X
firewall statistic system enable
# y/ i5 T  l3 B#
, I' o  f+ K7 H& h: H# p4 ]ike proposal 13 U2 y. o5 n( d$ U) Z9 X
#0 f! n6 E0 _  ~- ?* o- B
ike peer a
' o3 z& i- ~0 U* F pre-shared-key cnnbtk
  `0 N3 ^9 {+ X2 q2 l& y ike-proposal 1
! ]. o- L- [  Z6 a1 `: _2 |7 s8 w remote-address 119.57.5.5
0 M+ W! G) q* N! ^#
; V1 \: o7 f6 v" ~5 m; D' fipsec proposal tran1
; Z. n1 V% `; p" {: G, s8 J# |#; L8 p: w' n0 {, b
ipsec policy map1 1 isakmp
; L/ j: c) c2 Z8 Z security acl 3006
& _1 {, q4 w8 I; H pfs dh-group2
" a$ E) s/ x# O" | ike-peer a
0 L. |2 _0 ]3 v proposal tran1                           
8 }/ j# ^1 w2 ^; ]. f% R5 U6 U local-address 60.12.194.14
; d- @% t4 j- g0 I  f#* P/ k- }- J, [0 A4 m: n$ a
interface Aux0
' f# [/ S3 L9 p4 S& \ async mode flow2 i( X' `+ h" T# i
link-protocol ppp1 o! U0 y" q& X
#
3 B( K$ Q$ g9 z: ]' ~, |+ x9 c* h7 V- Kinterface Ethernet0/0/0
9 ?4 V, t9 u4 v$ v; `& x) |#/ n! x6 Y. Q4 s0 X
interface Ethernet0/0/1* U) y& l6 o; N) i/ C: m$ R8 q: L
#+ [  p) j! ~; `: `
interface Ethernet2/0/00 b+ P& Y$ p, z
description To_S5624-A(1/0/24)
' W4 R$ }7 R# ?& O: _: u- N ip address 172.16.2.9 255.255.255.252
0 Q3 @+ `- O! k ospf cost 100+ K2 X; ]8 a8 n9 }; \# p
#6 R5 i' E  E# _" o7 ]
interface Ethernet2/0/19 p0 Y: u4 t% E0 {  H6 G0 r
description To_Yinlian
) i0 |+ z0 z  K ip address 145.234.132.154 255.255.255.252
/ @: }7 p- _( u3 P+ K6 h" T$ @0 Z#$ ]* A* b9 g2 E% ^+ F/ Q" p
interface Ethernet2/0/2! Y; C* f/ }" G0 I
description To_S6506R_A(7/0/48)
; |2 N; Q  C& y: p: ^, K ip address 172.16.2.2 255.255.255.252% C( x  _8 x( }! N* y" w7 j8 l
ospf cost 100                           
$ f) r8 Q# H' r, \. x% U#/ b8 D# L1 d/ |5 `1 H8 j9 A
interface Ethernet2/0/3
0 {5 u! V2 a) }0 T description To-dudubao% a1 @$ R% G5 C1 I& |: }8 A, T
ip address 60.12.194.14 255.255.255.240
+ z  l$ o3 I8 Q, Q ipsec policy map12 ?, |9 |6 P/ E, ^( q" Q5 U
#
+ _( `1 t! a! {. ]1 n5 Minterface Ethernet2/0/4( x, n+ T. E  E5 T
#
# e) u! c& s: X! J+ Xinterface Ethernet2/0/5& b1 `/ t4 X) J) L- Q2 t& B; x0 U
#
# ]7 I! W9 V0 }% v2 Minterface Ethernet2/0/6
4 P* X$ w3 ?! n  k5 D, p) m. t; V#
: _+ J$ a4 y2 t3 i% zinterface Ethernet2/0/7/ h! ]. i* b9 [; w8 W
description To_Eudemon300-B_E2/0/7
6 [  Y  [9 s. g! n ip address 172.16.2.201 255.255.255.248
: d8 s; ~* I9 b  v2 v vrrp vrid 1 virtual-ip 172.16.2.203
: e( Q) B8 c3 D  [! o8 O vrrp vrid 1 priority 150
! N( N( k1 P3 _! j; A# A% `' W. ^ vrrp vrid 1 preempt-mode timer delay 60
) c/ H" O4 f& \- h# j. @ vrrp vrid 2 virtual-ip 172.16.2.204
2 h2 m  |- q) n#
5 ?4 }6 R/ I$ N  U! u) \0 o! Pinterface GigabitEthernet1/0/0
! d$ s- p8 V& T shutdown                                 2 S* G1 i( k9 Z6 n. O
#9 b9 W8 ]+ g! P8 [: z
interface GigabitEthernet1/0/1
) T" ?6 X6 L; v/ z# r; F# `7 i9 h description To_S5624-B(1/0/25)
9 a" Z$ U; G+ ^  p ip address 172.16.2.25 255.255.255.252
- J$ {5 C) O8 Y" @% C ospf cost 500+ L- Y! m1 g, P+ D( h1 y% j; J: I: H
#1 \8 }5 R/ L, S& b5 O
interface NULL0
1 Y4 m( b" ~9 v6 {6 A#9 r7 t' I' s) r1 j3 w) N/ D
interface LoopBack09 I, p7 K. m) K  l' b# Q" ]
ip address 172.16.1.3 255.255.255.255& V; h& B- f8 t
#
* J, o. U# M) }# I$ Cfirewall zone local1 ^) v) g3 F3 z% O" o3 q1 a
set priority 100! d" `" ]. o3 y/ ^1 J
#
, J% ]6 {5 ?, Tfirewall zone trust1 d; b5 O' J* A; F
set priority 85
* i7 @. s2 F0 O8 }* c" F0 e# u detect ftp
! F: y7 [& y* `3 o! i/ x4 p3 Y add interface Ethernet2/0/24 e: v* n2 P( N; E
#$ m3 ~5 A& |9 P+ a" E7 r: Y, ?! ]
firewall zone untrust; ?1 q) S2 N9 Q. w3 t+ H
set priority 5
6 @" e, l$ {. B4 C) j detect ftp                              
  Y: t( B8 m7 I+ M add interface GigabitEthernet1/0/11 x9 z2 p4 g. v6 {8 p8 j
#
* z" D+ q$ g+ B+ m; ~: kfirewall zone dmz) I! V# A. o$ a# d& Z1 J
set priority 502 [9 r% y& }# z: A$ m
add interface Ethernet2/0/0
( C+ K0 x: }) X: z7 q/ x* H+ c#& A; Y7 ^, T1 ~2 ?: h' Q- O3 N
firewall zone name hrp  D2 r9 `9 r3 N$ e. K% @
set priority 405 i/ m* ~+ a. m# h* n( N
add interface Ethernet2/0/7
$ U, [: T+ o/ E$ y2 u#5 k+ Q& E2 B+ o+ p) i* j1 ?
firewall zone name gprs0 b+ [* q9 \; t. T# ^' H
set priority 4
" P) n$ `. p2 B# u  b detect ftp0 p4 h& X6 i" t7 h
add interface Ethernet2/0/1
, `2 r& R+ B1 Y' S#& U& y, }9 p( d* y3 Y9 `
firewall zone name dudubao* j0 j6 ^0 S+ X2 q& c
set priority 31 I0 B& a5 @9 A; l- P, ~) k* w! ?
detect ftp
1 L, Q# ]7 G* A) ]1 }6 J7 [) L add interface Ethernet2/0/3
1 N% e3 H( l6 e/ o) d#1 X4 ~) i2 m% q7 o
firewall interzone local trust
  `! ~9 a7 {' g+ P#1 b( O8 \9 F) t8 N0 \' Q
firewall interzone local untrust         
/ k/ P% _" h- U4 d) P6 o) n3 c6 x#! n% ]6 J# a! z' C7 @' R6 b; @8 }
firewall interzone local dmz
: `# O  O& {5 V! m+ s+ j: h# f#
$ d$ `- M% h* v$ o4 L1 Mfirewall interzone local hrp
( H5 }1 d5 j2 o6 u3 I#
, [0 e2 w' [$ T5 Ifirewall interzone local gprs- }. O5 I* u2 F
#
$ B- n; W1 s! d$ Ifirewall interzone local dudubao
1 Q- N/ H+ X9 e( h#, i7 G, }. a  V/ B) C* D
firewall interzone trust untrust- }$ b0 f- S% Z* V- l" y' a
packet-filter 3003 inbound" z8 j. h/ A& h9 P
detect ftp3 ?& B# [. _- K7 }  V
#4 i  J" e* E! T3 p" K% V/ C/ i9 ?
firewall interzone trust dmz
) D. X; \) e- I6 C; o7 c( ]#
& V+ P$ H% r, ^0 {firewall interzone trust hrp! p. r- _) F& W7 H0 l5 A/ q
#4 D! [9 Z& W  e: o7 v# U/ @
firewall interzone trust gprs
; ?  ~4 W. B3 Z nat outbound 2003 address-group 30 w' M" e6 R3 k- P- @7 K
detect ftp
3 h* ]: W/ A3 f#
& p2 j" a; n) Z# E! g+ N* Sfirewall interzone trust dudubao% h8 _* e" o, r
packet-filter 3005 inbound               
2 h0 L6 r% o* U1 ^# N' M detect ftp+ h1 p0 u% B* U, Q- a$ d. p: ?
#% ]; m) c0 J( B6 ]" A
firewall interzone dmz untrust6 k, e6 L9 v6 d+ `
#% Q. T! K; U/ H9 c' W; R
firewall interzone hrp untrust
2 m' w8 |* @* e! ?% D3 H/ p5 g#( s! }+ ]" q( [* F$ G% q$ L
firewall interzone untrust gprs
  i( Y8 P+ t0 X; q6 A, f) W9 T+ C9 X#
+ N: V) H, f* @6 Nfirewall interzone untrust dudubao
- b$ m+ J5 L1 U$ v: \#
, [: `. x" N$ k) j' g. U% Lfirewall interzone dmz hrp
8 m& [2 e+ e& E5 q( K3 o; n' }& `4 O#* {) Y8 n8 A( }) h5 H  ?3 V
firewall interzone dmz gprs
; p  |2 Z; O, Y( O# { packet-filter 3002 inbound
) I# }4 K$ {+ R: C( s& R nat outbound 2002 address-group 51 o7 R- \# D) i/ ~+ g# I" n, S
detect ftp
; u6 T5 h, {9 m3 C#
# X$ H$ j8 o9 U6 _+ h  u7 n+ D9 ufirewall interzone dmz dudubao
! u0 Y, O8 D1 m2 m9 w  t" n7 S packet-filter 3006 outbound5 n5 b: Q2 v8 f% N& O8 C7 q) B
#( K5 |' Y' C" U* T3 v( F" c' v
firewall interzone hrp gprs! t: e' ]) \# m# j& k% }5 ^# I/ ^
#
" j& d5 _/ P* O) w8 V, Afirewall interzone hrp dudubao            
! }1 ~/ Z: _* q#$ A) j  q; `( v* a
firewall interzone gprs dudubao2 j0 r( B. R& ^) J( b1 U
#
6 n+ H6 y5 C8 Mvrrp group 1
5 p% O  ~1 p, h7 J add interface Ethernet2/0/7 vrrp vrid 1 data
, P- t3 x/ R1 N' v" ^ vrrp-group enable) [1 E. `" Q& `- d- s6 j8 ~
vrrp-group priority 105
* g# k1 ~  U* B( l vrrp-group preempt delay 60
, R, [" ^# {0 h8 u7 Q* N% `$ W& r undo vrrp-group group-send
+ P* E  n: N* X+ ~! q4 q0 ivrrp group 2
& H+ S" D- ~" a) c, q( d$ L add interface Ethernet2/0/7 vrrp vrid 2 data1 W5 z0 A! C4 N, x
vrrp-group enable' i, S4 Q. S8 x! \2 e5 ]
undo vrrp-group preempt! T* N. ~4 H) K7 D" x
undo vrrp-group group-send2 `8 d' [1 S! q5 o
#5 f3 j$ f, x3 L$ D; j4 a. s6 f  N
aaa* R  k6 z" h! C! `) n$ _, M) k+ v
local-user huawei password cipher 1_`%CO&$8@7&quot;+C5`;6XL!!!
  K3 Q# v  A5 X local-user huawei service-type terminal telnet ssh  G8 u6 R. k8 r- Q
local-user huawei level 1- W4 F- D6 ~8 f8 u) a/ a5 P
authentication-scheme default7 v4 f* |% G1 t) _* m  [
#
7 J9 b5 v2 x' J0 C8 k* d7 Z( V, l authorization-scheme default
- F. M) A5 F2 y' q4 h" F#                                         
% }0 L& O- B' a5 c1 n accounting-scheme default6 q% i, i4 O) s3 g3 w- G  N
#* h, w9 p+ M7 v/ i
domain default, {9 ^0 v: Q9 c5 k5 G* |& a3 |) D( {
#
6 f, M, v6 O1 U' T#2 z4 M2 N# c: n; C/ r
ospf 1, h. d  T8 Y; l9 T
import-route static
* x" O8 A. K& h$ b area 0.0.0.0% n: M+ w9 P. i; w+ E8 d% P/ W& W
  network 172.16.1.3 0.0.0.0% L+ G* @! a% J
  network 172.16.2.0 0.0.0.34 b' l- {$ ^* A6 P/ N) {2 g4 p% q
  network 172.16.2.8 0.0.0.33 P  c6 c" E' q& _" Y; T4 q
  network 172.16.2.24 0.0.0.3
+ d5 w3 K( x1 s  g#
( l% g1 y' Z! d) }: ]8 }- ?% y ip route-static 9.234.21.0 255.255.255.0 145.234.132.153
# e3 b# T8 m, `. {" L4 w6 r ip route-static 10.0.1.0 255.255.255.0 60.12.194.129
# ~8 F" T0 q8 q; Q1 W ip route-static 61.14.10.218 255.255.255.255 60.12.194.129
4 `. B. L) z! W. s ip route-static 119.57.5.0 255.255.255.0 60.12.194.129
8 u( w: b% {. l% L: L' M+ ` ip route-static 172.15.10.4 255.255.255.255 172.16.2.1
7 s! T# x% J/ _! V7 ? ip route-static 221.136.75.25 255.255.255.255 60.12.194.129
9 G: [: a; c4 _7 K#
$ T! H$ w: z" P0 ?3 w8 M9 f: P7 ` snmp-agent3 D# T$ [* o* a+ P+ H
snmp-agent local-engineid 000007DB7F00000100001BEE
6 M( A/ G8 m9 c! s% t snmp-agent community read  nbcardro      . c9 Y& n1 [( y' Q  w, R4 M
snmp-agent sys-info version all
  y& A. V! j! h& X#& B; {9 K# t( E' H1 l3 E
ssh server timeout 30
* g/ A( c: I0 h9 H7 `5 t- m! Q4 ^ ssh server rekey-interval 24' p5 o4 {8 J. u0 `
ssh user huawei authentication-type password  e) Z" m* x& j
#
" p3 x( T) o4 D+ r+ luser-interface con 09 N) |7 s  B0 @
authentication-mode aaa
# B! f7 @  j5 l0 T! [user-interface aux 0
, M) ]1 l  a% V6 M% [1 o0 Z authentication-mode none3 I7 _! a" V6 U: n  V  c
user-interface vty 0 49 @1 \6 Z: g$ {! w* d) d( U3 q
acl 2000 inbound" ~$ D" d  l; A( g" o  k
authentication-mode aaa
8 s! {( N( c8 x: P# P; _ idle-timeout 5 0! l: O- Z: P1 l4 {3 Z/ x0 x! {& l, y
#
* b; ]4 ]4 Q3 o$ {* K$ m2 treturn
回复 支持 反对

使用道具 举报

honey8064 [Lv8 技术精悍] 发表于 2013-6-19 06:24:03 | 显示全部楼层
帮看看
回复 支持 反对

使用道具 举报

bumingxin [Lv4 初露锋芒] 发表于 2013-6-19 07:29:47 | 显示全部楼层
帮看看172.16.12.71到达60.12.194.140的路由有什么问题?
回复 支持 反对

使用道具 举报

xsdlng [Lv4 初露锋芒] 发表于 2013-6-19 07:31:32 | 显示全部楼层
sh crypto ipsec sa detail# b' J# U5 s& g) C' I

6 `% Q; e$ h6 \, `) _' X4 G Crypto map tag: mymap, seq num: 20, local addr: 119.57.5.5
% `! ^3 b& n, q( J: X+ f8 c
. X. B' n( I; E+ J* @      access-list outside_20_cryptomap permit ip host 10.0.1.17 172.16.12.0 255.255.255.0
* }; U4 ?) n0 y4 t      local ident (addr/mask/prot/port): (10.0.1.17/255.255.255.255/0/0)3 x, q/ z, @: y8 y
      remote ident (addr/mask/prot/port): (172.16.12.0/255.255.255.0/0/0)# ~( @. w; D- y6 b1 h' m
      current_peer: 60.12.194.14) W5 t7 r. D- a$ I
              " z3 ?* y" W5 N7 ]- j
      #pkts encaps: 18, #pkts encrypt: 18, #pkts digest: 18, ~) p: {0 J2 l4 r8 X! R
      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0      #pkts compressed: 0, #pkts decompressed: 0  h4 y( R2 x; K2 x7 w# a0 z
      #pkts not compressed: 18, #pkts comp failed: 0, #pkts decomp failed: 05 }  e, y  }7 x( U: }* W& @  B8 B! j: w4 f
      #pkts no sa (send): 0, #pkts invalid sa (rcv): 01 l$ q- w2 K" M/ E! R
      #pkts encaps failed (send): 0, #pkts decaps failed (rcv): 0  o) W* E; z" f, R* Q
      #pkts invalid prot (rcv): 0, #pkts verify failed: 0
$ i, T+ k8 b. K  g3 V/ F1 N      #pkts invalid identity (rcv): 0, #pkts invalid len (rcv): 0
. f: E6 \+ N6 `8 B      #pkts replay rollover (send): 0, #pkts replay rollover (rcv): 0
: Y0 n; ~, }+ a- f7 P  A      #pkts replay failed (rcv): 0
9 p3 m6 i. L  F5 R! ?9 Z3 ?      #pkts min mtu frag failed (send): 0, #pkts bad frag offset (rcv): 0
  {; m0 `  n2 d      #pkts internal err (send): 0, #pkts internal err (rcv): 0% t  A& G; d* ]4 p/ F/ W
# [: |( ^! r) G8 D( l3 W
      local crypto endpt.: 119.57.5.5, remote crypto endpt.: 60.12.194.14" P. `4 k0 P/ p' f5 f

. M- n" L! ~4 m0 L+ I      path mtu 1500, ipsec overhead 58, media mtu 1500" d0 m. s; h0 T; B5 Y$ i
      current outbound spi: ED424D37- T! W" s& J' h% x$ u$ A

! T/ O. Y4 Z6 e4 J0 b5 H+ l; f; B    inbound esp sas:: ]/ N9 |; J4 P5 r$ X; w" p8 Q! f, N
      spi: 0xFE26B574 (4263949684)
  v; O+ U9 K) Z4 n6 `! @         transform: esp-des esp-md5-hmac none 5 ^% }0 v4 [  z/ p0 ~. c
         in use settings ={L2L, Tunnel, PFS Group 2, }7 Y1 z* J: G; _
         slot: 0, conn_id: 26, crypto-map: mymap" I) U% ^0 R2 L" a* A
         sa timing: remaining key lifetime (kB/sec): (1710000/3582)# L9 x2 e7 ]8 d* H0 K8 p* w. N
         IV size: 8 bytes
, I* E7 f, z" ^         replay detection support: Y
* V- ~8 A4 s# C  n    outbound esp sas:
! t; _6 ^* p: |# `  E      spi: 0xED424D37 (3980545335)4 R, j, n" n8 v4 p3 C! Y* P4 z# r
         transform: esp-des esp-md5-hmac none
7 I- J" A/ x: C: a5 E6 t1 P1 K& ]         in use settings ={L2L, Tunnel, PFS Group 2, }
3 h/ J: o% z# j- Y0 s         slot: 0, conn_id: 26, crypto-map: mymap
5 u: m. i6 g7 H0 u: v         sa timing: remaining key lifetime (kB/sec): (1709998/3580)
4 R7 p- {" A  ~& h- g1 |% Y( ~3 G# J         IV size: 8 bytes
' h+ B( Q5 J5 C% ^* @         replay detection support: Y
回复 支持 反对

使用道具 举报

mjf1125 [Lv8 技术精悍] 发表于 2014-3-22 20:49:39 | 显示全部楼层
真是 收益 匪浅
回复 支持 反对

使用道具 举报

isslee [Lv8 技术精悍] 发表于 2014-3-25 13:12:46 | 显示全部楼层
看帖回帖是美德!:lol
回复 支持 反对

使用道具 举报

润土 [Lv8 技术精悍] 发表于 2014-3-26 10:05:32 | 显示全部楼层
这是什么东东啊
回复 支持 反对

使用道具 举报

该用户不存在 [VIP@钻石] 发表于 2014-3-26 12:04:40 | 显示全部楼层
我抢、我抢、我抢沙发~
回复 支持 反对

使用道具 举报

dtdonald [Lv8 技术精悍] 发表于 2014-3-26 22:35:41 | 显示全部楼层
好好 学习了 确实不错
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2025-10-25 02:48 , Processed in 0.117537 second(s), 9 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn