重庆分公司,新征程启航

为企业提供网站建设、域名注册、服务器等服务

ASA防火墙上配置IPSEC_×××和SSL_×××

ASA防火墙上配置IPSEC ×××和SSL ×××

在百色等地区,都构建了全面的区域性战略布局,加强发展的系统性、市场前瞻性、产品创新能力,以专注、极致的服务理念,为客户提供成都网站建设、做网站 网站设计制作按需求定制网站,公司网站建设,企业网站建设,高端网站设计,全网营销推广,成都外贸网站建设公司,百色网站建设费用合理。

一:实验拓扑:

ASA防火墙上配置IPSEC_×××和SSL_×××

二:实验要求:

1:PC1属于上海分公司内网主机,PC2属于总公司主机.要求上海分公司的用户直接可以喝总公司的PC2通信.(Site-to-Site IPSEC ×××实现)

2:公网上用户可以访问总公司的OA服务器PC2.(SSL ×××实现)

三:配置过程:

1:基本配置:

ASA1(config)#int e0/1

ASA1(config-if)#nameif inside

INFO: Securitylevel for "inside" set to 100 by default.

ASA1(config-if)#ip add 172.16.1.254 255.255.255.0

ASA1(config-if)#no sh

ASA1(config-if)#int e0/0

ASA1(config-if)#nameif outside

INFO: Securitylevel for "outside" set to 0 by default.

ASA1(config-if)#ip add 12.0.0.1 255.255.255.0

ASA1(config-if)#no sh

ASA1(config-if)#

ASA1# ping172.16.1.1

Type escapesequence to abort.

Sending 5,100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:

!!!!!

Success rateis 100 percent (5/5), round-trip min/avg/max = 10/344/1670 ms

R1(config)#intf0/0

R1(config-if)#ipadd 12.0.0.2 255.255.255.0

R1(config-if)#nosh

R1(config-if)#intf1/0

R1(config-if)#ipadd 23.0.0.2 255.255.255.0

R1(config-if)#nosh

R1(config-if)#intf2/0

R1(config-if)#ipadd 1.1.1.254 255.255.255.0

R1(config-if)#nosh

ASA2(config)#int e0/0

ASA2(config-if)#nameif outside

INFO: Securitylevel for "outside" set to 0 by default.

ASA2(config-if)#ip add 23.0.0.3 255.255.255.0

ASA2(config-if)#no sh

ASA2(config-if)#int e0/1

ASA2(config-if)#nameif inside

INFO: Securitylevel for "inside" set to 100 by default.

ASA2(config-if)#ip add 192.168.1.254 255.255.255.0

ASA2(config-if)#no sh

配置路由,NAT,ACL

ASA1(config)#route outside 0 0 12.0.0.2

ASA1(config)#nat-control

ASA1(config)#nat (inside) 1 0 0

ASA1(config)#global (outside) 1 interface

INFO: outsideinterface address added to PAT pool

ASA1(config)#access-list haha permit icmp any any

ASA1(config)#access-group haha in interface outside

ASA2(config)#route outside 0 0 23.0.0.2

ASA2(config)#nat-con

ASA2(config)#nat-control

ASA2(config)#nat (inside) 1 0 0

ASA2(config)#global (outside) 1 interface

INFO: outsideinterface address added to PAT pool

ASA2(config)#access-list haha permit icmp any any

ASA2(config)#access-group haha in interface outside

私网上公网没问题,但两个私网无法互通

2:配置Site-to-Site ×××

ASA1(config)#access-list no-nat permit ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0

ASA1(config)#nat (inside) 0 access-list no-nat  

ASA2(config)#access-list no-nat permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0

ASA2(config)#nat (inside) 1 access-list no-nat

ASA1(config)#crypto isakmp enable outside

ASA1(config-isakmp-policy)#authentication pre-share

ASA1(config-isakmp-policy)#encryption des

ASA1(config-isakmp-policy)#hash md5

ASA1(config-isakmp-policy)#group 2

ASA1(config-isakmp-policy)#exit

ASA1(config)#isakmp key cisco address 23.0.0.3

ASA1(config)#crypto ipsec transform-set mytrans esp-des esp-md

ASA1(config)#crypto ipsec transform-set mytrans esp-des esp-md5-hmac

ASA1(config)#crypto map mymap 10 set peer 23.0.0.3

ASA1(config)#crypto map mymap 10 set transform-set mytrans

ASA1(config)#crypto map mymap 10 match address no-nat

ASA1(config)#crypto map mymap interface outside

ASA2(config)#crypto isakmp enable outside

ASA2(config-isakmp-policy)#authentication pre-share

ASA2(config-isakmp-policy)#encryption des

ASA2(config-isakmp-policy)#hash md5

ASA2(config-isakmp-policy)#group 2

ASA2(config-isakmp-policy)#exit

ASA2(config)#isakmp key cisco address 12.0.0.1

ASA2(config)#crypto ipsec transform-set mytrans esp-des esp-md

ASA2(config)#crypto ipsec transform-set mytrans esp-des esp-md5-hmac

ASA2(config)#crypto map mymap 10 set peer 12.0.0.1

ASA2(config)#crypto map mymap 10 set transform-set mytrans

ASA2(config)#crypto map mymap 10 match address no-nat

ASA2(config)#crypto map mymap interface outside

Site-to-SiteIPSEC配置完成.

ASA2(config)#web***

ASA2(config-web***)#enable outside

INFO: Web×××and DTLS are enabled on 'outside'.

ASA2(config-web***)#svc p_w_picpath disk0:/sslclient-win-1.1.3.173.pkg

ASA2(config-web***)#svc enable

ASA2(config-web***)#exit

ASA2(config)#username cisco password cisco

ASA2(config)#ip local pool *** 192.168.100.1-192.168.100.200

ASA2(config)#access-list 100 permit ip 192.168.1.0 255.255.255.0 any

ASA2(config)#group-policy my10 internal

ASA2(config)#group-policy my10 attributes

ASA2(config-group-policy)#***-tunnel-protocol web*** svc

ASA2(config-group-policy)#split-tunnel-policy tunnelspecified

ASA2(config-group-policy)#split-tunnel-network-list value 100

ASA2(config-group-policy)#web***

ASA2(config-group-web***)#svc ask enable

ASA2(config-group-web***)#exit

ASA2(config-group-policy)#exit

ASA2(config)#tunnel-group jishu type web***        

ASA2(config)#tunnel-group jishu general-attributes

ASA2(config-tunnel-general)#address-pool ***

ASA2(config-tunnel-general)#default-group-policy my10

ASA2(config-tunnel-general)#web***

ASA2(config-web***)#tunnel-group-list enable

ASA2(config-web***)#tunnel-group jishu web***-attributes

ASA2(config-tunnel-web***)#group-alias 2t39

SSL ×××配置完毕.

access-listssl*** extended permit ip 192.168.1.0 255.255.255.0 192.168.100.0 255.255.255.0

nat (inside) 0access-list ssl***


新闻名称:ASA防火墙上配置IPSEC_×××和SSL_×××
网址分享:http://cqcxhl.cn/article/iisggh.html

其他资讯

在线咨询
服务热线
服务热线:028-86922220
TOP