
第一次调asa,按照文档配完remote access ipsec vpn后客户端连不上,请调过的朋友指点一下,十分感谢4 H( p% k5 V' J/ R8 O; ^
设备:asa5505 sec-k8
* @7 n1 _/ h5 p版本:8.4.18 Q3 I) R8 e7 j1 R
客户端版本:5.0.073 G4 s6 S' i' `2 @8 u
拓扑:pc(ip add 192.168.21.207)--(e0/1 ip add192.168.21.1)router(e0/0 ip add 2.2.2.1)--(e0/1 ip add2.2.2.2)asa. N2 M) _: M0 r
报错:pc到2.2.2.2能ping通,客户端提示错误412,对端无应答
- `: e, G" b6 @( g0 k, e I客户端设置信息:
) `7 m( \# B1 f- F Q$ Nhost:2.2.2.2" ?+ p( ` U" {+ j; U% u1 H# ^
group authentication
% N4 _/ u$ R$ E- K# H" T7 r- Hname:testgroup password:1234567" h) u8 G2 k6 v
transport:ipsec/tcp(udp依然连不上,报错信息相同)
. J( d2 g" o! z5 L1 P以下是asa配置" ^1 f }: p, Q5 Y- ~: B
CR-FW# sh run
4 V) N/ r9 s) o2 Q; a' {4 C, g. V: Saved1 u. s4 L4 q, d2 I' a9 s0 k
:/ H0 _9 ~3 J" r* x& C/ ^6 j
ASA Version 8.4(1)
* |8 C# X+ s6 W. A!
" Q6 B/ _! k5 |3 l7 Vhostname CR-FW
* Y$ l, `, X' f% }1 R: oenable password D.LmdJJBxAq5/UlM encrypted
) l5 V" v4 l0 p! zpasswd D.LmdJJBxAq5/UlM encrypted7 b6 v5 w! c% d1 F+ h( @
names
, X. F* A0 e; @$ f: e+ h$ Y!
6 E( X A/ B5 j! b: C3 c3 i! yinterface Vlan2
8 G1 @4 i6 \; L8 Z3 C0 N9 U nameif outside
+ W! j5 w4 }; \* P s( A security-level 0
- O" V1 g# M, ^1 L2 y! P [ ip address 2.2.2.2 255.0.0.0
% k$ O6 R0 s1 a+ B+ [& j!( [; Z$ d3 s5 E9 ^2 n: w. E
interface Vlan65 W: i% E. \) `8 N( {8 O
nameif server& k% ?& ~, v4 S/ s7 n4 S
security-level 50, Y J8 K; `3 j! z6 ?" Y
ip address 192.168.0.254 255.255.255.0 ; J2 _3 V) d3 v. g9 S
!
0 N% }. `. I$ m% @1 N; ointerface Vlan102 T8 }8 r7 Q8 G* o5 S! V
nameif inside_10
. f0 W( ^3 C) u' b6 \9 Q security-level 80
3 j/ L u) s u3 ?! X# _4 Y. Z% N# o ip address 192.168.10.254 255.255.255.0 * ~4 s7 @, |& g: C/ ~( L) Z) ?+ l
!
9 b" ?3 H, u5 T( |8 A- Y$ |$ M1 r' Ninterface Vlan20
7 U" T* e9 S+ J* @ nameif inside_20
# I7 ~8 v; \6 {. n security-level 80; @: s0 J* r! g8 u
ip address 192.168.20.254 255.255.255.0
( h- M; L7 Z- V4 W% x( m!
+ b+ i; c+ I' R) L/ x; Ginterface Vlan30
4 |6 |/ P" |8 J* q" h( T nameif inside_30
# D0 }+ _# B4 |9 @9 h" T6 n security-level 80
0 R' Z/ C' Y% [& {+ a ip address 192.168.30.254 255.255.255.0
' G. C# E3 c- j; w/ A! ^!8 Y! i5 ]' v1 S' X+ W
interface Vlan40
! t2 T0 }4 s9 K) ^5 m" b nameif inside_40
. Z1 W# T6 \" B+ e3 X1 K security-level 80
6 B4 r! k6 u! d% V# G ip address 192.168.40.254 255.255.255.0 & `4 N" Z. W9 P2 b# Y
!
z4 I2 I5 Y$ c0 }6 dinterface Vlan50
' z* D, ]( G# { nameif inside_50
8 b- [9 m4 w7 j/ w) @4 V security-level 80- `% y) P& T' z5 }
ip address 192.168.50.254 255.255.255.0
: t' R d( _2 C9 v& i% k& p!& j4 o% U0 n2 y( ?! D3 ^$ M
interface Vlan60
5 A) z, ]/ u. U$ o9 U nameif inside_60
" C$ Q5 b! M- ]0 F2 C7 ] ], E security-level 80* c- P A1 B$ |5 H2 \/ ^7 O
ip address 192.168.60.254 255.255.255.0
8 C0 y/ `( K0 z2 g; U!; j6 K) E8 h0 ]' n6 S
interface Ethernet0/0- d5 e. Q4 d; ]
switchport trunk allowed vlan 1-6,10,20,30,40,50,60,70
: A. z4 \/ t- T% K, y switchport mode trunk
9 l4 a3 Y4 M9 Y speed 100& K0 h8 h/ r& F( f
duplex full9 m, H- X2 U6 R/ [; \# t& w
!
) ]6 |7 d+ ]( N4 `: ?interface Ethernet0/15 E! n6 M7 t* ~. V) P/ j- c. a3 H# `# K
switchport access vlan 2
$ K) E5 a P T ?* F( w. D7 e!
5 Y& ~8 B$ d/ ^$ V, X* U* g2 Ainterface Ethernet0/2: {# L4 r+ H* f' L7 n$ a7 ]! j! R' ?
shutdown
, { Y( D* H( e* G/ u1 p9 ^% g!4 s5 H! b# n5 a" h2 |4 S
interface Ethernet0/3
* i+ L1 {* w# w) J+ Y& }" T shutdown
' _7 C. q. i& Q. G# e!: v) r) v- d2 e O
interface Ethernet0/4
3 Z" b# h) [( f$ }' b9 V shutdown
0 f* y% h, }( v!% V7 U! P$ a6 _) |! ?
interface Ethernet0/52 A8 A' w% r1 u5 U! s/ s/ H
shutdown
) s2 L+ C) ~% n( I- Y2 l* D! \5 w( ]!
% p. C4 ^, P. ]: Y% Hinterface Ethernet0/66 l- G6 ~" ?4 W3 z( [
!
6 v+ C, p/ ?9 S; p6 q# Ainterface Ethernet0/7' z' w! k; ]+ m
switchport access vlan 6
$ V7 H. z K3 ]7 E; D5 G!" I4 j( g4 e$ h- I% j. q
ftp mode passive
1 c" u: n$ J9 Osame-security-traffic permit inter-interface
2 f5 }% |: G y( x$ _same-security-traffic permit intra-interface+ j7 i8 q6 l z# a5 X3 E, \% c
object network meinsnet 4 M4 ^; h8 Q; w6 U; h- I9 y
subnet 192.168.10.0 255.255.255.0
% ~ x. g( n- V* x Y# Wobject network 20-6
9 y' F; n/ q' r( p3 x subnet 192.168.20.0 255.255.255.09 V$ g7 J9 E: z) e5 a
object network 30-6 h8 T0 e% R4 O% ]/ e
subnet 192.168.30.0 255.255.255.0
' Q. i% r5 t5 ]" ]/ f0 |object network 40-6 6 {* z( e* V3 P" a
subnet 192.168.40.0 255.255.255.0
8 Q# \. z& x# `' h7 S( F. Y; v# Iobject network 50-6
, F! T; l+ i7 _0 l subnet 192.168.50.0 255.255.255.0
6 c9 C* A, Z) fobject network 60-6 9 r* R* @+ @3 l, Y$ J' o
subnet 192.168.60.0 255.255.255.0
6 x( {3 g5 _" `/ Pobject network 40-50
( @1 r) R, S: O# A, D/ r1 u- W subnet 192.168.40.0 255.255.255.04 y* b0 a3 T% v `) J/ ~+ m
access-list 101 extended permit ip any any * V3 A& F2 B! e) h; e
access-list 101 extended permit icmp any any ' i) n3 d: m8 |" F# _
pager lines 24
: b: E) u. _9 t: K4 l7 kmtu outside 1500% O1 x2 n' c8 h' M: T2 d
mtu server 1500
" g5 g8 n5 F/ U, G8 y1 vmtu inside_10 15005 a3 D3 o8 S1 C# p
mtu inside_20 1500, x- \' r/ @" o
mtu inside_30 1500- q: u/ K3 j8 E' B: q+ y
mtu inside_40 1500- V n* o8 u, w9 y3 m' X: e
mtu inside_50 15001 b% c! h4 @" `. e- e7 H
mtu inside_60 1500# X* v& }4 Q B' Y- A* Z: r) x$ b# h$ e
ip local pool testpool 192.168.50.220-192.168.50.240
9 \' N# c+ j# }2 p9 Rno failover, k! a% _; i9 C4 d' h
icmp unreachable rate-limit 1 burst-size 1
$ y# }- G+ P7 ?8 l* gno asdm history enable8 Y! ^+ u# `# E* L9 m4 I" p
arp timeout 14400" s: m6 p Z1 j k$ R
!
4 ?( t' s P' @, B) n# m) u+ Iobject network meinsnet
# F; M7 A1 y; ? p, }5 [4 N5 } nat (inside_10,server) dynamic interface
+ p0 x6 O# T4 a2 G' sobject network 20-6
- Q# `) l( V. A% y# u nat (inside_20,server) dynamic interface& e3 y: Y4 k3 Q3 p2 ^8 b8 J# _
object network 30-6+ \0 t1 H N- _2 B+ r+ k# o" N
nat (inside_30,server) dynamic interface
/ J7 X# O" y P3 E: b& _) Qobject network 40-6" i# k2 }5 d: a4 W7 p/ w4 M
nat (inside_40,server) dynamic interface
7 s. F) w9 s, W1 xobject network 50-6
9 n0 p* P; @# P+ m. G& C nat (inside_50,server) dynamic interface
" _; W% k0 G4 k, j( J5 y. O% @: {object network 60-6
5 G2 r# H9 b: K+ j6 [ nat (inside_60,server) dynamic interface
& ]7 Q# D: C; p3 D" Y3 G4 Y. yobject network 40-50
8 i ^) ?& Y) l, ] nat (inside_40,inside_50) dynamic interface
@5 p+ r: w. \4 C0 s) ?) @access-group 101 in interface server
1 ?8 |- m7 t D3 p/ B. ?" ~access-group 101 out interface server
3 L2 \3 X, j$ Q. Q+ A3 N. f5 x/ Jroute server 0.0.0.0 0.0.0.0 192.168.0.1 1
7 T; j7 x/ H4 c4 _timeout xlate 3:00:00; D* b- q* F( b3 q9 H
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:020 t. R4 ]! d" R+ L
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00) X# ^3 n8 {5 _6 w
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
7 N- R& P- Q: Z1 ]0 I* J& ?timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
/ D, ^, I' a* L# h& Btimeout tcp-proxy-reassembly 0:01:00
0 I9 o4 \, h6 \# j: idynamic-access-policy-record DfltAccessPolicy
3 c' e) f* y' o! v* z5 Z$ B3 Nno snmp-server location
; K w; i8 {9 J9 Y% ^% Hno snmp-server contact6 o% S O) q- \3 W, R; k
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart. A# f; [/ V: a8 v
crypto ipsec ikev1 transform-set firstset esp-des esp-md5-hmac
6 }1 R9 S9 E, R' H5 ccrypto dynamic-map dyn1 1 set ikev1 transform-set firstset0 ~! e# p7 h* M/ q+ m2 a
crypto dynamic-map dyn1 1 set reverse-route3 Z; U0 t' K+ Q# u
crypto map mymap 1 ipsec-isakmp dynamic dyn10 A$ B7 g: p( x8 J8 p7 q% g) t/ d
crypto map mymap interface outside
" E% c2 O8 H/ M* O* s- W( Ncrypto ikev1 enable outside
7 d2 A [5 |/ e9 Ycrypto ikev1 policy 10 r3 C5 G1 [# `! t$ G& u8 J
authentication pre-share5 B% M4 Y% N* Q& E) s
encryption des
( m7 K6 f' W$ n+ @1 h hash sha & _0 w5 I& _ S7 y
group 2
6 `/ e# I3 x4 B# ^ lifetime 43200
5 E! A' q4 s& |5 q% \$ u$ Rtelnet 0.0.0.0 0.0.0.0 inside_50
G% ]: O# Z' L% m! otelnet timeout 60
5 O6 u3 M: F5 m# g: S$ issh timeout 5
- W6 ~- D! g3 {; W/ H1 t) Dconsole timeout 0
, O9 H* r( @! u, Z, }* `: f7 [$ Z& i# V" F% D
threat-detection basic-threat
6 }" t. J( W7 R) {9 s1 C4 xthreat-detection statistics access-list0 r9 T0 i/ K8 F
no threat-detection statistics tcp-intercept
/ e+ _8 Q% k& h) r8 h7 }! husername testuser password 12345678 encrypted
$ I4 r/ \& V: D) N8 {tunnel-group testgroup type remote-access* u! @6 o& a2 w O3 e& J2 A
tunnel-group testgroup general-attributes% j: g" }0 n I& z5 R8 ?
address-pool testpool7 b5 S$ D2 Y9 f/ x/ }
tunnel-group testgroup ipsec-attributes
J1 E6 y/ w! A7 F+ B ikev1 pre-shared-key 1234567
# X( q9 ~' r; o1 Z6 w u!
- g1 Y6 w; ?& @) T! ?" mclass-map inspection_default! v6 W; G) d/ e9 r: V7 t
match default-inspection-traffic
+ W% _' \+ _2 F5 n!
, t* w3 c% h9 a7 Z" b+ W4 M$ Z!8 S' U$ |+ c- N! Y) d/ p% |- x
policy-map type inspect dns preset_dns_map% J0 [+ D2 T1 D# }- x9 V3 s* G
parameters, s) h- z" O* j3 g# D3 I9 v
message-length maximum client auto
& M" b0 D2 y \% ~' j$ @$ `' p+ `8 ? message-length maximum 512# r5 j! }( m3 Z R
policy-map global_policy" G8 y- W' Q$ E
class inspection_default
, s8 ~+ J- B: S+ [# S: W9 O inspect dns preset_dns_map ' j6 Z, q- r- ~2 _
inspect ftp
- c8 ~6 {4 {& ]: K, `$ ? inspect h323 h225 ; T1 H" {; d+ a8 z0 X) g6 z
inspect h323 ras ; w+ U4 e/ @' A! h; a
inspect rsh
. {. [$ @% z$ Y/ L7 a$ f- {/ t3 @% s inspect rtsp , m1 q% s3 ^+ ~* N5 |" Y8 F
inspect esmtp 2 f" e9 Z' P; L9 [$ S% c. W
inspect sqlnet 1 M2 s; S( s" r- ^1 l3 z& Y! [0 ~3 m/ T
inspect skinny & W! S; h) v/ m( \1 q5 y2 z
inspect sunrpc 1 q F9 L! ~% L U- i
inspect xdmcp
1 ?0 z2 y& ^' ? inspect sip + g# `- j, Y5 }2 u% Z
inspect netbios
' Z' z* k! M8 v- a inspect tftp . V' K `6 q2 S9 {4 n
inspect ip-options $ f/ p5 X! u4 H& m1 Q# C) V
!
/ M. l$ `7 A7 U( m8 M' A9 C6 [0 sservice-policy global_policy global
* c9 o4 M+ N# A- f& g/ Vprompt hostname context 0 Q- J! B" j6 f
call-home1 m3 [3 H. q3 x2 ^3 f, D( E0 R
profile CiscoTAC-1" }8 x: T" i o, _
no active
* K* f% P u! x' R4 s; j destination address http https://tools.cisco.com/its/service/...es/DDCEService. D; T$ c; ?& Z$ t$ {
destination address email callhome@cisco.com, m+ U: q* C5 X! u3 I! X
destination transport-method http, F" Q# q# C% N0 S' _
subscribe-to-alert-group diagnostic! F( B: {. G9 t0 w2 u5 V1 ]
subscribe-to-alert-group environment
" v9 m" J9 S: l+ I8 f1 W subscribe-to-alert-group inventory periodic monthly' U6 [' C5 J2 Z. c E! S
subscribe-to-alert-group configuration periodic monthly
- y, ^4 d$ H' v9 i. B subscribe-to-alert-group telemetry periodic daily
; a) m0 g6 Z6 t3 @Cryptochecksum:6fce6c1bd89ca8fbe0f2f82c6a92796e1 u0 M! A* D# b0 E4 E) Y& v$ S
: end |
|