给你一个例子:
+ Y+ y4 B I: J- J
X2 d% B/ ?) }) p1 W5 HASA Version 8.2(1) * ~% }5 [2 y* f; `. r3 b; R' i I
!
$ j9 {3 [$ S$ f u( _3 x* Mhostname ciscoasa
' M0 U" X/ I) ]/ j* Tenable password rNbKiTOk0JO4x8Zm encrypted6 C$ |0 k6 u" O k
passwd rNbKiTOk0JO4x8Zm encrypted
5 M& x: Y. |* M5 ^/ C" @. u2 j$ G @names
8 `. K3 ^' f+ }% p' Q!
5 Z! V$ ?* _7 S$ s& W; U# @interface GigabitEthernet0/0" U7 S) ?" h6 r, {, g2 i
nameif inside/ w& x2 {5 s) `6 h) Z
security-level 100
# m v! L( l" P$ |7 ? ip address 172.168.200.1 255.255.255.0
# b" A: Y% J* p, ^) }6 D. g. N( B!6 [& X$ p8 K# f& y, g
interface GigabitEthernet0/1
0 g3 c5 v* b9 t, S nameif outside/ h4 X; j8 K. Z. S: `4 V! ~
security-level 0
2 _$ F e8 n9 Z' i) x( Y ip address 218.×.×.× 255.255.255.192 8 Q+ c# q1 [( ]9 i. C9 j8 A
!
+ a. ^3 h& ]+ P# Y8 `- ?interface GigabitEthernet0/2
2 k" @2 t& k9 q( @" K% O3 d shutdown
9 U7 G2 l9 Y% A# q no nameif6 i$ d6 Q/ @3 W9 h' R
no security-level' z( L5 N0 |6 [
no ip address
" d* A# T) A( e7 K! V( `7 Q1 T!4 _5 y2 ]* e. `' f0 Z2 r6 K7 ^6 b+ b7 z
interface GigabitEthernet0/3) l/ @( H: [/ W
shutdown
, M4 d* c8 W) A4 u5 Q' J# ` no nameif
+ j1 C4 V2 x @, r no security-level
- C8 L$ n; D O# h: P$ U1 F6 F; x no ip address( O6 y8 t! Q: l9 K
!
. c/ `" q3 j8 t# }* `6 vinterface Management0/0
& u" ^- t y4 L. W1 ~4 K+ C# e nameif management `4 x+ j7 C" \& L8 G
security-level 1004 T! d: O5 |0 l$ b
no ip address
4 d0 O: F' e% [) U8 @/ z management-only
" q* P0 e" h9 k!
( G% {# H, u8 h! S& k3 Qftp mode passive$ m: a, | `. Y9 t
access-list 100 extended permit ip any any 8 R8 T$ f z. ^' W
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 192.168.6.0 255.255.255.0
: Z1 [. O, b1 w: ^% r" G1 h4 laccess-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 192.168.6.0 255.255.255.0
: y! ^# M/ f/ @ X Zaccess-list nonatvpn1 extended permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0 : m% [7 b9 [. \3 b+ P4 N' f f
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 192.168.221.0 255.255.255.0 9 ?/ d! y5 r6 z* E
access-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 192.168.221.0 255.255.255.0
& K W% _8 D6 \9 N4 z' m5 Naccess-list nonatvpn1 extended permit ip 192.168.3.0 255.255.255.0 192.168.221.0 255.255.255.0 : H" O2 g$ C. W
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 11.11.11.0 255.255.255.0 5 P" ^$ `4 e3 k4 X
access-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 11.11.11.0 255.255.255.0 0 w, O# ?( K% E& [
access-list nonatvpn1 extended permit ip 172.16.3.0 255.255.255.0 11.11.11.0 255.255.255.0
+ O5 [, |. y% }$ X; L9 `access-list vpn extended permit ip 192.168.1.0 255.255.255.0 192.168.6.0 255.255.255.0 " u0 q8 U, W& r+ u6 y, d$ D
access-list vpn extended permit ip 192.168.2.0 255.255.255.0 192.168.6.0 255.255.255.0
) y, A o9 o6 N0 V/ Zaccess-list vpn extended permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0 * M4 Q" @1 R6 r7 ? F
access-list vpn extended permit ip 192.168.1.0 255.255.255.0 192.168.221.0 255.255.255.0 - j6 c$ p; r2 _: w- Y& t+ a
access-list vpn extended permit ip 192.168.2.0 255.255.255.0 192.168.221.0 255.255.255.0 3 j1 J& l6 I# |7 I1 E X/ E
access-list vpn extended permit ip 192.168.3.0 255.255.255.0 192.168.221.0 255.255.255.0
, A2 R; x3 O. h" ^8 Iaccess-list soft extended permit ip 192.168.1.0 255.255.255.0 11.11.11.0 255.255.255.0
/ j+ B6 q2 E N# faccess-list soft extended permit ip 192.168.2.0 255.255.255.0 11.11.11.0 255.255.255.0
, V2 f! L# ^% maccess-list soft extended permit ip 192.168.3.0 255.255.255.0 11.11.11.0 255.255.255.0
0 [# ^. W+ o, ~pager lines 242 b {* j- k- q: [( T
logging enable, |' {' V+ R9 Q8 @; o
logging asdm informational
7 ~! |& v3 l' A4 j% r7 a$ b: v0 e2 gmtu inside 1500' N/ G+ L( _$ x$ {4 [, j* x
mtu outside 1500
! ~, z9 N% c5 U; G& j2 Rmtu management 1500* _) l- u1 L; |1 ^1 T7 ?7 d
ip local pool softvpn 11.11.11.1-11.11.11.254 mask 255.255.255.0
! U+ N7 E" P! Tno failover
4 J5 }5 ]7 G9 f3 ^icmp unreachable rate-limit 1 burst-size 11 U9 L9 d; X( A) r3 u5 \
icmp permit any inside0 F5 }# ?+ y6 d3 V% g5 U4 x# J+ y
icmp permit any outside4 _0 i' h! j' r* v
no asdm history enable/ y7 v7 U& O- C% P
arp timeout 14400
$ T9 R! T4 p3 v9 ~- Gglobal (outside) 1 interface
i& D$ ?! j: Fnat (inside) 0 access-list nonatvpn1% ~! a) D+ p7 i' E( t: m p
nat (inside) 1 0.0.0.0 0.0.0.04 d0 \9 m2 u- p, h9 [0 k# g
static (outside,outside) 218.249.167.68 172.30.100.2 netmask 255.255.255.255 ; _) d& v* b* G+ f* {+ _
access-group 100 in interface outside6 @9 d+ _5 x X& I, {3 x' ^
access-group 100 out interface outside
* e: c7 B7 m: B: Y( M2 Hroute outside 0.0.0.0 0.0.0.0 218.*.*.* 10 N I3 f$ J b8 H
route inside 172.168.201.0 255.255.255.0 172.168.200.2 1+ L+ P: d& q5 q/ _0 N1 W
route inside 192.168.1.0 255.255.255.0 172.168.200.2 1
+ Z3 i$ P2 B. P6 p9 {7 Eroute inside 192.168.2.0 255.255.255.0 172.168.200.2 1
; f$ ]: k, A* \* T# Xroute inside 192.168.3.0 255.255.255.0 172.168.200.2 1
, P1 g I. K1 N- _# B Ztimeout xlate 3:00:00
) j* V9 r' I' h+ B1 P8 w8 {: Atimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:022 Y( o/ T& }, b8 E. W' h
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
/ @: V4 ~ Q3 i" n8 ^3 ntimeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
8 o* q [6 i. K- x7 Y6 Stimeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute; |' a2 K: i7 ^9 j* J5 I9 I% D; K0 J2 v
timeout tcp-proxy-reassembly 0:01:001 l. ]! y7 m! i$ c, y
dynamic-access-policy-record DfltAccessPolicy
2 F0 P$ c4 S2 \( d+ `+ khttp server enable
' W$ z0 g6 j. D( R- hhttp 0.0.0.0 0.0.0.0 outside& H% O9 D9 A" T0 b8 m, F# n
no snmp-server location( ^ c2 M% C& c, G
no snmp-server contact
, F" \0 B7 B4 M( K& o( e6 |snmp-server enable traps snmp authentication linkup linkdown coldstart
/ i. L9 S, J" M O* ncrypto ipsec transform-set cisco esp-des esp-sha-hmac % R6 B2 T* D+ T# N
crypto ipsec transform-set SOFT esp-des esp-md5-hmac + T- K: H: j9 |' r. M- T" |1 \0 g
crypto ipsec security-association lifetime seconds 28800
( c% l( P: @8 @$ o/ kcrypto ipsec security-association lifetime kilobytes 46080004 [' [/ A. D: F9 r e8 M# J# K
crypto dynamic-map softvpn 10 set transform-set SOFT
2 r( S5 v6 e, Bcrypto dynamic-map softvpn 10 set security-association lifetime seconds 28800
9 | i6 k8 W6 M: ^+ ~crypto dynamic-map softvpn 10 set security-association lifetime kilobytes 4608000
; O- Y% |/ E: I) t M9 j# wcrypto dynamic-map softvpn 10 set reverse-route, |- e# f" }( A! B
crypto map IPSec_map 1 match address vpn t% @9 V/ n/ h; P c
crypto map IPSec_map 1 set peer 124.*.*.*
- V4 M# q. e1 m* a. @' ?crypto map IPSec_map 1 set transform-set cisco' v/ w) s4 {7 q4 D, C
crypto map IPSec_map 10 ipsec-isakmp dynamic softvpn
1 h% \, Z, m8 I1 T) Mcrypto map IPSec_map interface outside5 I- Z; Q; n n5 k) R6 ]
crypto isakmp enable outside
% l0 Z8 G4 V3 q7 b% _, F& G8 Mcrypto isakmp policy 10
% O& \2 ^3 q. D3 e4 k' ^ authentication pre-share2 m4 w p4 t/ c; i5 R2 @
encryption des) ^* I: r3 E4 Z( P( M
hash sha6 l1 u6 ~; j' f2 m8 P8 l; C
group 1
2 ^0 B* `3 X/ r! n lifetime 86400) Y, I$ Z7 U1 a1 q% i; ?- I
crypto isakmp policy 20 h9 E! v1 q8 }! w
authentication pre-share8 `6 p! j9 S; ^ E/ I7 v S
encryption des
0 K5 `, @6 r& E7 A; X# j) \: G; z* D hash md5
/ P' b; P: Q# ]+ L group 27 L6 v3 I& `! e) T
lifetime 86400
0 y2 j- }, {* G. U3 ktelnet 0.0.0.0 0.0.0.0 inside
3 a- i6 Y1 b- A( t% g1 C5 ftelnet timeout 30
+ e2 \" Q; u$ j8 _ssh 0.0.0.0 0.0.0.0 inside$ q" Z$ B: V) y5 y
ssh 0.0.0.0 0.0.0.0 outside! i. |0 [& s' Q& l
ssh timeout 30
/ D9 u( S, P5 u+ _7 J+ c4 [/ R: hconsole timeout 0' s4 Q; C H7 ]. h! s: |3 S
threat-detection basic-threat
6 O+ h8 X2 p- |6 ^threat-detection statistics access-list) J. U! r2 u# o9 i! a
no threat-detection statistics tcp-intercept
, P' h( v0 k$ h- k/ X5 Sssl encryption des-sha1" A: a% y/ Q7 d" {" n+ X! C% T, |
webvpn3 a: A2 s1 t& U
group-policy softvpn internal) p7 l4 c$ C1 W) v
group-policy softvpn attributes
+ k+ H0 p* ^ O+ V) g/ E" a0 i split-tunnel-policy tunnelspecified- Q8 ~; o' v* r* ^' y' ~
split-tunnel-network-list value soft3 W9 e2 A% Q; e1 _! n
username vpn1 password Qr9Uo2I.DinqQ9V/ encrypted privilege 0
& I- k1 }" G& e9 s+ j* S6 Iusername cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15! Z! M9 ?6 r9 b, f
tunnel-group 124.*.*.* type ipsec-l2l" B ^8 H( `. {! P$ c! S
tunnel-group 124.*.*.* ipsec-attributes- M6 j( P4 g. |5 ^# z
pre-shared-key *5 _. @% F9 J& D, B' J( O
tunnel-group softvpn type remote-access
* A" H( \# n* ~! ?$ T/ p( R4 Htunnel-group softvpn general-attributes2 r! s; b4 T, X0 G( T$ O
address-pool softvpn: T% g& m1 q% o! A
default-group-policy softvpn% X6 D+ e2 {9 j8 l$ \+ i$ q( N
tunnel-group softvpn ipsec-attributes6 r7 I0 z o! M, G( V" s$ [
pre-shared-key *
, }6 B9 F& N. l& W- m, P0 q* Q!
+ p8 f' N5 F# F* ]class-map inspection_default
8 N, D: i) h/ w/ } S/ y match default-inspection-traffic% `2 w# t3 D+ s
!
+ k" b! G% M0 b- h1 g c1 F7 o!9 ^* H. s+ D. F, Q2 j( W0 U
policy-map type inspect dns preset_dns_map
/ v" W q. Q. c* [: _, q parameters6 u: V. x* H2 k i1 U
message-length maximum 512
; p& E; B0 L- b' ?policy-map global_policy* C( l( q' ^& Y
class inspection_default
3 h% H* P, l6 H! d inspect dns preset_dns_map
/ n9 q7 Y7 T& f' E# ~/ d+ J/ ` inspect ftp ; Q# ^9 _5 ]0 a; e5 T* B6 J
inspect h323 h225
/ [% g6 [. C+ m inspect h323 ras & Q+ X; X; a, R: V. E/ z) H
inspect rsh ~- I" @! ^8 G& \
inspect rtsp
5 l" A) X( j% c" H( I/ b inspect esmtp
+ H' ?: {( O- a5 Q, _; Z7 C3 L inspect sunrpc
/ m! K) a; w' j! u inspect xdmcp 0 T' M) Z8 h9 s
inspect sip
; ^4 e+ ~9 S* y0 p inspect netbios
6 k8 t( m/ C q! a3 I9 I4 R- g inspect tftp ) r; K( c4 _/ p; c" O
inspect sqlnet
' ^0 H7 S; o3 n5 b! H3 M!
3 c# G" R" x& O0 u/ D- Jservice-policy global_policy global
; G+ @2 s) ~- Y. Z- X5 Oprompt hostname context 7 A' _. w5 z0 Z; X2 z" |; L D/ l
Cryptochecksum:3a4e5a02c3417e203a37894b6f3aacdb
8 _( h5 i0 O7 `' J" L, \: end
/ C0 i- I/ A& ?/ `8 R: Y9 Q2 |ciscoasa(config)# |