本站已运行

攻城狮论坛

作者: 端午
查看: 4649|回复: 53

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] 请教asa 5540 L2L和remote access vpn怎么共存?

  [复制链接]
查看: 4649|回复: 53
开通VIP 免金币+免回帖+批量下载+无广告
crypto map mymap 1 ipsec-isakmp dynamic dyn1/ V- Y% \. l" P7 q
crypto map mymap interface outside  a/ z# y' f9 B
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
, |1 M. q( `+ B9 Wcrypto map vpnpeer 60 set peer 1.1.1.1) h# a. T' s0 S9 r' N+ J6 M
crypto map vpnpeer 60 set transform-set idctofordtrans& W7 b" o6 I& B4 S- R0 o7 `/ ^
crypto map vpnpeer 60 set security-association lifetime seconds 3600
& ?0 G* R, I3 Zcrypto map vpnpeer 60 set security-association lifetime kilobytes 4608000
4 S  W' o( k- f" acrypto map vpnpeer interface outside
; n4 |7 D5 ?. E9 ^" o1 p
' e; N! X3 j3 v9 k( ?红色的两句不能共存,( m" c2 g! ~& g- Y$ H
crypto map mymap interface outside,remote正常0 ]2 U+ \( p2 U: u, X
crypto map vpnpeer interface outside,L2L正常
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

bont [Lv4 初露锋芒] 发表于 2013-6-8 21:59:23 | 显示全部楼层
把vpnpeer改成mymap试试呢,这个interface上应该只能绑一条MAP,
/ H( R! i. c0 ], Amap名称后面不一样就可以了,比如说mymap 后面是1,而vpnpeer后面是60,把vpnpeer改成mymap应该不会有影响。
回复 支持 反对

使用道具 举报

琦琦 [Lv4 初露锋芒] 发表于 2013-6-8 22:58:08 | 显示全部楼层
来看一看。。。有些看不懂哦。
回复 支持 反对

使用道具 举报

qiangshen [Lv5 不断成长] 发表于 2013-6-9 01:05:51 | 显示全部楼层
crypto map mymap 1 ipsec-isakmp dynamic dyn1$ |' c8 e7 Q, S% u6 Z( _
crypto map mymap 60 set peer 1.1.1.1
3 J  q$ L7 d0 S, \* gcrypto map mymap 60 set transform-set idctofordtrans0 D9 h3 @# Y% H
crypto map mymap 60 set security-association lifetime seconds 3600
( U2 m3 E4 `' m0 ]. d( Y; Ucrypto map mymap 60 set security-association lifetime kilobytes 4608000$ n: b  P! R. t9 P5 i$ Z, V
crypto map mymap interface outside
$ @( g2 U5 f! ^' j( c" f  x7 d7 ^是改成这样吗?
回复 支持 反对

使用道具 举报

sexylion [Lv4 初露锋芒] 发表于 2013-6-9 02:08:22 | 显示全部楼层
了解了解1 |, U4 D+ x3 f/ l$ D' D: e, W1 [
森林舞会遥控器, [7 \0 c1 P1 X# K& {1 \
大金鲨遥控器' P+ C9 a+ V6 u) _+ g
金鲨银鲨遥控器
& a' i( @6 }# k8 _1 U飞禽走兽遥控器
/ S8 ]8 s0 o. A* J$ ?) n# G龙机遥控器6 J6 J0 z( h; {( [- ^
大白鲨遥控器! B( ^+ N" H( n! n+ v6 ?
万能鲨鱼遥控器
回复 支持 反对

使用道具 举报

qhack [Lv5 不断成长] 发表于 2013-6-9 04:45:04 | 显示全部楼层
你试试呢,结果怎么样?我们这边建立多条VPN是这么做的,当时问过工程师的,说只能绑一个map
回复 支持 反对

使用道具 举报

wING [Lv4 初露锋芒] 发表于 2013-6-9 06:28:58 | 显示全部楼层
crypto map mymap 65535 ipsec-isakmp dynamic dyn1
回复 支持 反对

使用道具 举报

Turbop [Lv4 初露锋芒] 发表于 2013-6-9 09:07:23 | 显示全部楼层
给你一个例子:
+ Y+ y4 B  I: J- J
  X2 d% B/ ?) }) p1 W5 HASA Version 8.2(1) * ~% }5 [2 y* f; `. r3 b; R' i  I
!
$ j9 {3 [$ S$ f  u( _3 x* Mhostname ciscoasa
' M0 U" X/ I) ]/ j* Tenable password rNbKiTOk0JO4x8Zm encrypted6 C$ |0 k6 u" O  k
passwd rNbKiTOk0JO4x8Zm encrypted
5 M& x: Y. |* M5 ^/ C" @. u2 j$ G  @names
8 `. K3 ^' f+ }% p' Q!
5 Z! V$ ?* _7 S$ s& W; U# @interface GigabitEthernet0/0" U7 S) ?" h6 r, {, g2 i
nameif inside/ w& x2 {5 s) `6 h) Z
security-level 100
# m  v! L( l" P$ |7 ? ip address 172.168.200.1 255.255.255.0
# b" A: Y% J* p, ^) }6 D. g. N( B!6 [& X$ p8 K# f& y, g
interface GigabitEthernet0/1
0 g3 c5 v* b9 t, S nameif outside/ h4 X; j8 K. Z. S: `4 V! ~
security-level 0
2 _$ F  e8 n9 Z' i) x( Y ip address 218.×.×.× 255.255.255.192 8 Q+ c# q1 [( ]9 i. C9 j8 A
!
+ a. ^3 h& ]+ P# Y8 `- ?interface GigabitEthernet0/2
2 k" @2 t& k9 q( @" K% O3 d shutdown
9 U7 G2 l9 Y% A# q no nameif6 i$ d6 Q/ @3 W9 h' R
no security-level' z( L5 N0 |6 [
no ip address
" d* A# T) A( e7 K! V( `7 Q1 T!4 _5 y2 ]* e. `' f0 Z2 r6 K7 ^6 b+ b7 z
interface GigabitEthernet0/3) l/ @( H: [/ W
shutdown
, M4 d* c8 W) A4 u5 Q' J# ` no nameif
+ j1 C4 V2 x  @, r no security-level
- C8 L$ n; D  O# h: P$ U1 F6 F; x no ip address( O6 y8 t! Q: l9 K
!
. c/ `" q3 j8 t# }* `6 vinterface Management0/0
& u" ^- t  y4 L. W1 ~4 K+ C# e nameif management  `4 x+ j7 C" \& L8 G
security-level 1004 T! d: O5 |0 l$ b
no ip address
4 d0 O: F' e% [) U8 @/ z management-only
" q* P0 e" h9 k!
( G% {# H, u8 h! S& k3 Qftp mode passive$ m: a, |  `. Y9 t
access-list 100 extended permit ip any any 8 R8 T$ f  z. ^' W
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 192.168.6.0 255.255.255.0
: Z1 [. O, b1 w: ^% r" G1 h4 laccess-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 192.168.6.0 255.255.255.0
: y! ^# M/ f/ @  X  Zaccess-list nonatvpn1 extended permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0 : m% [7 b9 [. \3 b+ P4 N' f  f
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 192.168.221.0 255.255.255.0 9 ?/ d! y5 r6 z* E
access-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 192.168.221.0 255.255.255.0
& K  W% _8 D6 \9 N4 z' m5 Naccess-list nonatvpn1 extended permit ip 192.168.3.0 255.255.255.0 192.168.221.0 255.255.255.0 : H" O2 g$ C. W
access-list nonatvpn1 extended permit ip 192.168.1.0 255.255.255.0 11.11.11.0 255.255.255.0 5 P" ^$ `4 e3 k4 X
access-list nonatvpn1 extended permit ip 192.168.2.0 255.255.255.0 11.11.11.0 255.255.255.0 0 w, O# ?( K% E& [
access-list nonatvpn1 extended permit ip 172.16.3.0 255.255.255.0 11.11.11.0 255.255.255.0
+ O5 [, |. y% }$ X; L9 `access-list vpn extended permit ip 192.168.1.0 255.255.255.0 192.168.6.0 255.255.255.0 " u0 q8 U, W& r+ u6 y, d$ D
access-list vpn extended permit ip 192.168.2.0 255.255.255.0 192.168.6.0 255.255.255.0
) y, A  o9 o6 N0 V/ Zaccess-list vpn extended permit ip 192.168.3.0 255.255.255.0 192.168.6.0 255.255.255.0 * M4 Q" @1 R6 r7 ?  F
access-list vpn extended permit ip 192.168.1.0 255.255.255.0 192.168.221.0 255.255.255.0 - j6 c$ p; r2 _: w- Y& t+ a
access-list vpn extended permit ip 192.168.2.0 255.255.255.0 192.168.221.0 255.255.255.0 3 j1 J& l6 I# |7 I1 E  X/ E
access-list vpn extended permit ip 192.168.3.0 255.255.255.0 192.168.221.0 255.255.255.0
, A2 R; x3 O. h" ^8 Iaccess-list soft extended permit ip 192.168.1.0 255.255.255.0 11.11.11.0 255.255.255.0
/ j+ B6 q2 E  N# faccess-list soft extended permit ip 192.168.2.0 255.255.255.0 11.11.11.0 255.255.255.0
, V2 f! L# ^% maccess-list soft extended permit ip 192.168.3.0 255.255.255.0 11.11.11.0 255.255.255.0
0 [# ^. W+ o, ~pager lines 242 b  {* j- k- q: [( T
logging enable, |' {' V+ R9 Q8 @; o
logging asdm informational
7 ~! |& v3 l' A4 j% r7 a$ b: v0 e2 gmtu inside 1500' N/ G+ L( _$ x$ {4 [, j* x
mtu outside 1500
! ~, z9 N% c5 U; G& j2 Rmtu management 1500* _) l- u1 L; |1 ^1 T7 ?7 d
ip local pool softvpn 11.11.11.1-11.11.11.254 mask 255.255.255.0
! U+ N7 E" P! Tno failover
4 J5 }5 ]7 G9 f3 ^icmp unreachable rate-limit 1 burst-size 11 U9 L9 d; X( A) r3 u5 \
icmp permit any inside0 F5 }# ?+ y6 d3 V% g5 U4 x# J+ y
icmp permit any outside4 _0 i' h! j' r* v
no asdm history enable/ y7 v7 U& O- C% P
arp timeout 14400
$ T9 R! T4 p3 v9 ~- Gglobal (outside) 1 interface
  i& D$ ?! j: Fnat (inside) 0 access-list nonatvpn1% ~! a) D+ p7 i' E( t: m  p
nat (inside) 1 0.0.0.0 0.0.0.04 d0 \9 m2 u- p, h9 [0 k# g
static (outside,outside) 218.249.167.68 172.30.100.2 netmask 255.255.255.255 ; _) d& v* b* G+ f* {+ _
access-group 100 in interface outside6 @9 d+ _5 x  X& I, {3 x' ^
access-group 100 out interface outside
* e: c7 B7 m: B: Y( M2 Hroute outside 0.0.0.0 0.0.0.0 218.*.*.* 10 N  I3 f$ J  b8 H
route inside 172.168.201.0 255.255.255.0 172.168.200.2 1+ L+ P: d& q5 q/ _0 N1 W
route inside 192.168.1.0 255.255.255.0 172.168.200.2 1
+ Z3 i$ P2 B. P6 p9 {7 Eroute inside 192.168.2.0 255.255.255.0 172.168.200.2 1
; f$ ]: k, A* \* T# Xroute inside 192.168.3.0 255.255.255.0 172.168.200.2 1
, P1 g  I. K1 N- _# B  Ztimeout xlate 3:00:00
) j* V9 r' I' h+ B1 P8 w8 {: Atimeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:022 Y( o/ T& }, b8 E. W' h
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
/ @: V4 ~  Q3 i" n8 ^3 ntimeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
8 o* q  [6 i. K- x7 Y6 Stimeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute; |' a2 K: i7 ^9 j* J5 I9 I% D; K0 J2 v
timeout tcp-proxy-reassembly 0:01:001 l. ]! y7 m! i$ c, y
dynamic-access-policy-record DfltAccessPolicy
2 F0 P$ c4 S2 \( d+ `+ khttp server enable
' W$ z0 g6 j. D( R- hhttp 0.0.0.0 0.0.0.0 outside& H% O9 D9 A" T0 b8 m, F# n
no snmp-server location( ^  c2 M% C& c, G
no snmp-server contact
, F" \0 B7 B4 M( K& o( e6 |snmp-server enable traps snmp authentication linkup linkdown coldstart
/ i. L9 S, J" M  O* ncrypto ipsec transform-set cisco esp-des esp-sha-hmac % R6 B2 T* D+ T# N
crypto ipsec transform-set SOFT esp-des esp-md5-hmac + T- K: H: j9 |' r. M- T" |1 \0 g
crypto ipsec security-association lifetime seconds 28800
( c% l( P: @8 @$ o/ kcrypto ipsec security-association lifetime kilobytes 46080004 [' [/ A. D: F9 r  e8 M# J# K
crypto dynamic-map softvpn 10 set transform-set SOFT
2 r( S5 v6 e, Bcrypto dynamic-map softvpn 10 set security-association lifetime seconds 28800
9 |  i6 k8 W6 M: ^+ ~crypto dynamic-map softvpn 10 set security-association lifetime kilobytes 4608000
; O- Y% |/ E: I) t  M9 j# wcrypto dynamic-map softvpn 10 set reverse-route, |- e# f" }( A! B
crypto map IPSec_map 1 match address vpn  t% @9 V/ n/ h; P  c
crypto map IPSec_map 1 set peer 124.*.*.*
- V4 M# q. e1 m* a. @' ?crypto map IPSec_map 1 set transform-set cisco' v/ w) s4 {7 q4 D, C
crypto map IPSec_map 10 ipsec-isakmp dynamic softvpn
1 h% \, Z, m8 I1 T) Mcrypto map IPSec_map interface outside5 I- Z; Q; n  n5 k) R6 ]
crypto isakmp enable outside
% l0 Z8 G4 V3 q7 b% _, F& G8 Mcrypto isakmp policy 10
% O& \2 ^3 q. D3 e4 k' ^ authentication pre-share2 m4 w  p4 t/ c; i5 R2 @
encryption des) ^* I: r3 E4 Z( P( M
hash sha6 l1 u6 ~; j' f2 m8 P8 l; C
group 1
2 ^0 B* `3 X/ r! n lifetime 86400) Y, I$ Z7 U1 a1 q% i; ?- I
crypto isakmp policy 20  h9 E! v1 q8 }! w
authentication pre-share8 `6 p! j9 S; ^  E/ I7 v  S
encryption des
0 K5 `, @6 r& E7 A; X# j) \: G; z* D hash md5
/ P' b; P: Q# ]+ L group 27 L6 v3 I& `! e) T
lifetime 86400
0 y2 j- }, {* G. U3 ktelnet 0.0.0.0 0.0.0.0 inside
3 a- i6 Y1 b- A( t% g1 C5 ftelnet timeout 30
+ e2 \" Q; u$ j8 _ssh 0.0.0.0 0.0.0.0 inside$ q" Z$ B: V) y5 y
ssh 0.0.0.0 0.0.0.0 outside! i. |0 [& s' Q& l
ssh timeout 30
/ D9 u( S, P5 u+ _7 J+ c4 [/ R: hconsole timeout 0' s4 Q; C  H7 ]. h! s: |3 S
threat-detection basic-threat
6 O+ h8 X2 p- |6 ^threat-detection statistics access-list) J. U! r2 u# o9 i! a
no threat-detection statistics tcp-intercept
, P' h( v0 k$ h- k/ X5 Sssl encryption des-sha1" A: a% y/ Q7 d" {" n+ X! C% T, |
webvpn3 a: A2 s1 t& U
group-policy softvpn internal) p7 l4 c$ C1 W) v
group-policy softvpn attributes
+ k+ H0 p* ^  O+ V) g/ E" a0 i split-tunnel-policy tunnelspecified- Q8 ~; o' v* r* ^' y' ~
split-tunnel-network-list value soft3 W9 e2 A% Q; e1 _! n
username vpn1 password Qr9Uo2I.DinqQ9V/ encrypted privilege 0
& I- k1 }" G& e9 s+ j* S6 Iusername cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15! Z! M9 ?6 r9 b, f
tunnel-group 124.*.*.* type ipsec-l2l" B  ^8 H( `. {! P$ c! S
tunnel-group 124.*.*.* ipsec-attributes- M6 j( P4 g. |5 ^# z
pre-shared-key *5 _. @% F9 J& D, B' J( O
tunnel-group softvpn type remote-access
* A" H( \# n* ~! ?$ T/ p( R4 Htunnel-group softvpn general-attributes2 r! s; b4 T, X0 G( T$ O
address-pool softvpn: T% g& m1 q% o! A
default-group-policy softvpn% X6 D+ e2 {9 j8 l$ \+ i$ q( N
tunnel-group softvpn ipsec-attributes6 r7 I0 z  o! M, G( V" s$ [
pre-shared-key *
, }6 B9 F& N. l& W- m, P0 q* Q!            
+ p8 f' N5 F# F* ]class-map inspection_default
8 N, D: i) h/ w/ }  S/ y match default-inspection-traffic% `2 w# t3 D+ s
!
+ k" b! G% M0 b- h1 g  c1 F7 o!9 ^* H. s+ D. F, Q2 j( W0 U
policy-map type inspect dns preset_dns_map
/ v" W  q. Q. c* [: _, q parameters6 u: V. x* H2 k  i1 U
  message-length maximum 512
; p& E; B0 L- b' ?policy-map global_policy* C( l( q' ^& Y
class inspection_default
3 h% H* P, l6 H! d  inspect dns preset_dns_map
/ n9 q7 Y7 T& f' E# ~/ d+ J/ `  inspect ftp ; Q# ^9 _5 ]0 a; e5 T* B6 J
  inspect h323 h225
/ [% g6 [. C+ m  inspect h323 ras & Q+ X; X; a, R: V. E/ z) H
  inspect rsh   ~- I" @! ^8 G& \
  inspect rtsp
5 l" A) X( j% c" H( I/ b  inspect esmtp
+ H' ?: {( O- a5 Q, _; Z7 C3 L  inspect sunrpc
/ m! K) a; w' j! u  inspect xdmcp 0 T' M) Z8 h9 s
  inspect sip  
; ^4 e+ ~9 S* y0 p  inspect netbios
6 k8 t( m/ C  q! a3 I9 I4 R- g  inspect tftp ) r; K( c4 _/ p; c" O
  inspect sqlnet
' ^0 H7 S; o3 n5 b! H3 M!
3 c# G" R" x& O0 u/ D- Jservice-policy global_policy global
; G+ @2 s) ~- Y. Z- X5 Oprompt hostname context 7 A' _. w5 z0 Z; X2 z" |; L  D/ l
Cryptochecksum:3a4e5a02c3417e203a37894b6f3aacdb
8 _( h5 i0 O7 `' J" L, \: end
/ C0 i- I/ A& ?/ `8 R: Y9 Q2 |ciscoasa(config)#
回复 支持 反对

使用道具 举报

asd0001 [Lv4 初露锋芒] 发表于 2013-6-9 09:58:24 | 显示全部楼层
L2L和REMOTE VPN共用一个策略就可以。
回复 支持 反对

使用道具 举报

fucking [Lv8 技术精悍] 发表于 2013-12-7 17:34:33 | 显示全部楼层
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2026-5-1 20:53 , Processed in 0.105705 second(s), 15 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn