本站已运行 14年358天0小时51分21秒

攻城狮论坛

作者: songqiang
查看: 1540|回复: 13

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集【新盟教育】2023最新华为HCIA全套视频合集【网工基础全覆盖】---国sir公开课合集
【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课【新盟教育】网工小白必看的!2023最新版华为认证HCIA Datacom零基础全套实战课
原创_超融合自动化运维工具cvTools原创_超融合自动化运维工具cvTools
重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享链接已失效【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器

[安全] 【讨论】PIX基本配置,为什么联众登陆不上?大家遇到过吗?

[复制链接]
查看: 1540|回复: 13
开通VIP 免金币+免回帖+批量下载+无广告
如题!9 ~# e$ P  _/ l2 M9 W6 q/ B/ W
PIX只是基本配置,联众登陆不上,很奇怪,没有限制什么啊.
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

举报

shmilytan [Lv4 初露锋芒] 发表于 2013-3-26 22:27:17 | 显示全部楼层
好像是fixup的问题,查查联众的端口是多少,再看看配置中的fixup
回复 支持 反对

举报

次子 [Lv4 初露锋芒] 发表于 2013-3-27 01:02:52 | 显示全部楼层
有可能,试试了。 frown.gif
回复 支持 反对

举报

ewanyang [Lv5 不断成长] 发表于 2013-3-27 04:01:13 | 显示全部楼层
no fixup protocol skinny 2000
回复 支持 反对

举报

Asan [Lv4 初露锋芒] 发表于 2013-3-27 04:10:58 | 显示全部楼层
联众登不上啊?那怎么炸40啊?把配置发上来我帮你看看!
回复 支持 反对

举报

lihailin3344 [Lv4 初露锋芒] 发表于 2013-3-27 07:03:17 | 显示全部楼层
......
回复 支持 反对

举报

swqing [Lv4 初露锋芒] 发表于 2013-3-27 07:44:36 | 显示全部楼层
引用:                                                                                                                                作者: karenzkk                                                                                                                                                                                                        no fixup protocol skinny 2000                                                                                                                就是这个。
回复 支持 反对

举报

dhsky [Lv4 初露锋芒] 发表于 2013-3-27 09:15:50 | 显示全部楼层
PIX Version 6.3(5)
9 C" d! b0 [3 E6 }interface ethernet0 auto7 d1 N6 w3 ?) p
interface ethernet1 auto
. O/ n& ?7 k( }' g+ Xnameif ethernet0 outside security0
; y: `% e) d" @% c0 Inameif ethernet1 inside security100
7 N: L9 Z+ Z& M3 K  K9 s) E9 renable password 0e53SZdxezxawxDG encrypted" A  e, X( X' y( j8 I
passwd 2KFQnbNIdI.2KYOU encrypted
+ f* O* z5 J+ z+ K3 I; Nhostname pixfirewall
: p1 ?5 q( q0 t  L  X" I6 Z+ bdomain-name ciscopix.com( x: x; J; \1 E, _* L0 M1 k2 [
fixup protocol dns maximum-length 512$ M- N6 _% A6 W8 y# `
fixup protocol ftp 21
7 M- Q  i& C0 w9 J6 s0 a/ ~fixup protocol h323 h225 1720. F3 f4 Z/ y1 O& K6 w2 [( b8 Z
fixup protocol h323 ras 1718-1719/ A% `" e9 F6 ]: F  L
fixup protocol http 80. e; G1 i8 B7 b7 U. R( I
fixup protocol rsh 5141 ]# \8 H6 S1 o8 U" u* o8 v; m" h
fixup protocol rtsp 554
8 I, e, J; ^2 f1 Q$ Lfixup protocol sip 5060
: k% e2 T) x  _+ K+ ~fixup protocol sip udp 5060
: M9 }/ v$ i) ufixup protocol skinny 2000: H3 ?" U; N( V/ D+ O. ~
fixup protocol smtp 25
" @) Q8 J* E/ Y6 X- V8 Ufixup protocol sqlnet 1521
- X; N( N0 S: i; A! m( bfixup protocol tftp 69  e, ?6 L7 e( p# O9 T
names' u5 p6 S: X2 e* f: @% J
access-list 102 permit tcp any host 222.191.123.6 eq www
5 Y1 K# E  |$ o% v. ]access-list 102 permit tcp any host 222.191.123.6 eq smtp3 z, Q9 I+ }" {# Z& J( b0 W
access-list 102 permit tcp any host 222.191.123.6 eq pop3
2 M1 A3 l8 L2 `8 v4 p" S- xaccess-list 102 permit tcp any host 222.191.123.6 eq 56789
+ S% F) p1 ^7 l5 g2 Waccess-list 102 permit icmp any any. X, Y# J5 a' M; ^7 E; q8 B' r
access-list 80 permit ip 192.168.11.0 255.255.255.0 192.168.11.0 255.255.255.0: I' ~7 V7 `; E; j) @+ [( m
access-list 80 permit ip 192.168.12.0 255.255.255.0 192.168.11.0 255.255.255.05 P% q; s5 p  D( A  C* q6 Z; T$ f
access-list 80 permit ip 192.168.13.0 255.255.255.0 192.168.11.0 255.255.255.0
# ~' s8 J, e6 e: Yaccess-list 80 permit ip 192.168.14.0 255.255.255.0 192.168.11.0 255.255.255.0
( I7 S1 ^0 g8 f2 S( U9 waccess-list 80 permit ip 192.168.15.0 255.255.255.0 192.168.11.0 255.255.255.0
7 c- T6 D; Z' H5 z' k9 Z) eaccess-list 80 permit ip 192.168.16.0 255.255.255.0 192.168.11.0 255.255.255.0  x4 U2 L% Z2 L6 K
access-list 80 permit ip 192.168.13.0 255.255.255.0 192.168.200.0 255.255.248.0
3 O- C3 U. ~5 B( ?) daccess-list 80 permit ip 192.168.14.0 255.255.255.0 192.168.200.0 255.255.248.0( E4 r7 |6 c. E" ^& i$ R
access-list 80 permit ip 192.168.12.0 255.255.255.0 192.168.200.0 255.255.248.0
' Y5 x5 i+ u  _0 daccess-list 120 permit ip 192.168.13.0 255.255.255.0 192.168.200.0 255.255.248.
; j1 o3 e6 P& m" r2 |% [% n
9 V# b8 ]9 v. V6 u9 f1 @- a* U1 _pager lines 24/ N! d6 d: n1 z) U2 K! ]# f
mtu outside 1500% @) z0 w% J' D. d- O$ @; ^
mtu inside 1500+ ~9 ]& ]5 |- K* k: c+ |
ip address outside 222.191.123.6 255.255.255.252
, u1 s, _4 h+ @$ t# ^- ~$ P$ x! jip address inside 192.168.11.254 255.255.255.0$ I: t" l1 H% k8 g* L
ip audit info action alarm
) y% h7 {' b8 i) c2 C! Y2 I+ Tip audit attack action alarm, l  _9 i3 n) i
ip local pool dialer 192.168.11.200-192.168.11.220" W& _2 c9 K; H
no failover1 r; e$ K' ?* C+ q& b- W; n' m2 p
failover timeout 0:00:00! g5 w5 A1 {3 @, m" V0 G
failover poll 15
' }0 t" h& J" wno failover ip address outside
' H7 Q1 S- J+ `2 Z$ d: Jno failover ip address inside
  N4 V0 `# M2 `pdm location 192.168.12.0 255.255.255.0 inside
0 Q% Q4 @1 Q0 D, ?pdm location 192.168.13.0 255.255.255.0 inside. J) w; u$ _. j1 q0 `
pdm location 192.168.14.0 255.255.255.0 inside
* ?/ L4 U" x5 B* Ypdm location 192.168.15.0 255.255.255.0 inside
9 K) B/ T6 M+ r  Z/ A8 xpdm location 192.168.16.0 255.255.255.0 inside8 L2 Z" d/ r' [1 l" r
pdm location 192.168.18.0 255.255.255.0 outside
+ q' V5 X& G( k$ P7 Z$ z! C( Rpdm location 192.168.11.0 255.255.255.0 inside2 G3 z! N$ Y6 [) m5 y/ Z- c5 I2 F
pdm location 192.168.18.0 255.255.255.0 inside
' m* B1 Q% f! l! Wpdm location 192.168.12.3 255.255.255.255 inside' ]1 e& K4 o# r3 V# _
pdm location 0.0.0.0 255.0.0.0 inside
  \- C7 z, `2 w: O! dpdm location 192.168.11.0 255.255.255.0 outside
0 z& u1 D% H4 O$ Npdm location 192.168.12.4 255.255.255.255 inside- v2 c% c; P" A% B& k' M
pdm location 192.168.200.0 255.255.248.0 outside+ ~! y" g# e% X$ D
pdm history enable
2 [! J9 L8 p0 C* M+ e9 Qarp timeout 14400
, C. F5 i  }- Aglobal (outside) 1 interface
# G: q6 V+ \4 U) A8 `nat (inside) 0 access-list 80: e! I' J( J" N( l! b
nat (inside) 1 192.168.11.0 255.255.255.0 0 0- m- u$ A; R, q; _5 T
nat (inside) 1 192.168.12.0 255.255.255.0 0 0
; O0 g0 W* N8 l* fstatic (inside,outside) tcp interface ftp 192.168.12.3 ftp netmask 255.255.255.
& N- c3 k  \7 W" \8 v* ]. u55 0 0( a& Y6 H- F' c* P
static (inside,outside) tcp interface smtp 192.168.12.3 smtp netmask 255.255.25
+ k! K. k5 a, @6 g: b0 T.255 0 0
9 b2 I2 p( U7 e3 a2 y3 `. V6 gstatic (inside,outside) tcp interface www 192.168.12.3 www netmask 255.255.255.* ^: H+ _# i8 C, w
55 0 0
1 U) x3 N- g" @6 i6 A4 g+ }static (inside,outside) tcp interface pop3 192.168.12.3 pop3 netmask 255.255.25) c8 N7 E6 A( j" w# f' U
.255 0 0
' m% \- X& I$ f% O7 w" z, y0 ~static (inside,outside) tcp interface 56789 192.168.12.3 615 netmask 255.255.25
9 O$ a8 L; J$ v+ C3 K3 ?+ j2 O.255 0 0( [, A% U1 E) _+ |' r" J) j
access-group 102 in interface outside
( A4 r# B  F8 {: y9 ?$ G8 r8 proute outside 0.0.0.0 0.0.0.0 222.191.234.5 1
. A4 g* @: t8 g3 J5 {; s; V' }route inside 192.168.12.0 255.255.255.0 192.168.11.1 1
1 C& z, T3 ~) m0 c3 Y. c( l5 ]route inside 192.168.13.0 255.255.255.0 192.168.11.1 1/ P' _! f2 D" y' c* A
route inside 192.168.14.0 255.255.255.0 192.168.11.1 11 b9 ~: V0 V* M- ?; ?: V5 @! ^
route inside 192.168.15.0 255.255.255.0 192.168.11.1 1
+ N; h$ X1 C: g% g' I$ ?route inside 192.168.16.0 255.255.255.0 192.168.11.1 1# J& g' k) H6 E1 p- B- V% s
route inside 192.168.18.0 255.255.255.0 192.168.11.1 1
8 Z# S& Y- e" p/ T  _. P9 z  b2 q6 btimeout xlate 3:00:006 _8 e. P: w, s: w3 H" c; f
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:006 @2 J% B* g3 H( g3 G( Q
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
" N7 B9 Y0 A  Ftimeout sip-disconnect 0:02:00 sip-invite 0:03:00
# r8 H" t( k; H  }* O% ktimeout uauth 0:05:00 absolute- G6 o6 o* w  {: B% }2 _' F- g& n
aaa-server TACACS+ protocol tacacs+- M9 U& G  d+ k/ x% G
aaa-server TACACS+ max-failed-attempts 3+ p0 V" H5 l* ]
aaa-server TACACS+ deadtime 10
' j' P4 s' `+ n6 P# R* saaa-server RADIUS protocol radius' K& `8 l  V! ~) u; e0 F' N
aaa-server RADIUS max-failed-attempts 3
4 J2 O0 m; q  N3 M* Yaaa-server RADIUS deadtime 10( ?& k0 t  g4 c, J; P% R! F; N1 ^& x
aaa-server LOCAL protocol local
: `2 P( v9 ~( R7 u  Dhttp server enable
, p$ p8 G; E. e; _: M! t" A, Lhttp 0.0.0.0 0.0.0.0 inside4 z9 r; S0 l- y, Q* V2 c
no snmp-server location& n: N3 k' Q- Q- J% v( k) |
no snmp-server contact
  g- ^4 P" e. A* |+ }4 p! [1 isnmp-server community public3 }' E$ R( b4 B- S
no snmp-server enable traps& u8 S, m0 X( o5 C# i
floodguard enable) }- t6 i% b9 y1 {  i
sysopt connection permit-ipsec( r7 B$ x. `  O& p
crypto ipsec transform-set aaades esp-des esp-md5-hmac9 q5 f6 ^- [6 l
crypto ipsec transform-set myset esp-3des esp-md5-hmac3 x" @5 n' H0 n
crypto dynamic-map dynomap 10 set transform-set aaades1 @9 x( \/ ?4 i" t, |& r
crypto map vpnpeer 20 ipsec-isakmp dynamic dynomap
7 H5 @7 Y7 o  I1 W( ]/ _crypto map vpnpeer 40 ipsec-isakmp8 Y! @- A( R* d! C
crypto map vpnpeer 40 match address 120
: l, E$ x0 W7 b& J0 L. ccrypto map vpnpeer 40 set peer 222.191.232.34! m/ h$ e3 Y' y+ Q, f% x/ y
crypto map vpnpeer 40 set transform-set myset7 _0 Z( L6 r" X5 s0 D
crypto map vpnpeer client configuration address initiate
# e# s! T9 t! Rcrypto map vpnpeer client configuration address respond
6 X9 M. H6 D! o- ]/ T/ M, Q5 Acrypto map vpnpeer client authentication LOCAL
; B+ r7 v5 ~" Kcrypto map vpnpeer interface outside
* r+ A: N9 b! Q1 N, X% fisakmp enable outside- [8 @- k6 y) u3 ]0 T6 u
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
3 B5 ~; _+ ^" H/ risakmp key ******** address 222.191.232.34 netmask 255.255.255.255$ H, D1 s, W/ ~! o- f% u0 a
isakmp client configuration address-pool local dialer outside
; ]4 g6 Z" S9 d' Zisakmp policy 10 authentication pre-share
2 c7 ]: v- _; {isakmp policy 10 encryption des
+ g, z. @3 L# Misakmp policy 10 hash md5- d2 A6 j6 M$ s. s0 ^
isakmp policy 10 group 2
+ P! K* {  t: s  g& a# Aisakmp policy 10 lifetime 86400
% Z' N# {5 e8 s' L4 i+ Rvpngroup weifu103user address-pool dialer
5 u: d8 O3 Z% U6 w) `4 S/ `) `* yvpngroup weifu103user idle-time 1800  D" g" V: l% Z4 K
vpngroup weifu103user password ********
$ i1 i9 P: q: t1 Htelnet 0.0.0.0 0.0.0.0 outside1 h; c* P; k9 w0 }4 L
telnet 0.0.0.0 0.0.0.0 inside; F$ B5 p6 T9 }9 W/ @$ t6 K5 O
telnet timeout 5
3 {  J: X& p5 ussh timeout 52 ~- y5 ^7 K1 \! w
console timeout 0# w3 ^9 E8 @4 M5 W, q
username weifu103 password 0KczsG6c9C2DHNWX encrypted privilege 2. Q2 ]7 ]0 U1 n* L$ p& T3 w
username weifu password ObN5By5VruQxn1Fr encrypted privilege 2
0 u: [; w* a. gusername vpnuser password tAtXXvCxpjX0dUEC encrypted privilege 2% h6 G2 P  c. t6 B( F5 N" ?( f. Z
terminal width 80
, i0 v7 r6 x1 ZCryptochecksum:9c994cccc5b7fcc843383017fd2e4c69+ D& g3 z- y6 A* ?% u9 {
: end
/ I2 Z( U4 c8 k: R+ n9 apixfirewall(config)# quit
7 p' P% X' v3 [$ C: B) ^2 l8 Ipixfirewall# quit
6 r' n# [7 c% h! i: v+ E% Z6 ~/ F& c$ b$ Y: ?3 I$ b
Logoff
+ G/ S  R) c' V, h: D( f5 O5 H, s* g+ Z+ h' N/ P( _( R! S
+ O3 o% |# b2 b2 a
0 r6 d% ~* n' ~) t7 S5 m
失去了跟主机的连接。
回复 支持 反对

举报

渺峰绝剑 [Lv4 初露锋芒] 发表于 2013-3-27 11:00:59 | 显示全部楼层
no fixup protocol skinny 2000是什么意思?
回复 支持 反对

举报

chinahope [Lv5 不断成长] 发表于 2013-3-27 11:12:40 | 显示全部楼层
连种用的是2000端口,而pix吧2000用做其他一个协议(skinny),你no一下就可以了。就这样简单
回复 支持 反对

举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2025-7-9 00:47 , Processed in 0.109355 second(s), 17 queries , Gzip On, MemCache On.

Powered by Discuz! X3.4 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn