|
asa5520 双ISP做简单的备份 并通过outside口网通线路作vpn应用。
用cisco的client软件连不上请教?配置如下!谢谢!!!!!
show ver
Cisco Adaptive Security Appliance Software Version 7.0(6)
Device Manager Version 5.0(6)
Compiled on Tue 22-Aug-06 13:22 by builders
System image file is "disk0:/asa706-k8.bin"
Config file at boot was "startup-config"
ciscoasa up 33 mins 25 secs
Hardware: ASA5520-K8, 512 MB RAM, CPU Pentium 4 Celeron 2000 MHz
Internal ATA Compact Flash, 256MB
BIOS Flash AT49LW080 @ 0xffe00000, 1024KB
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)
Boot microcode : CNlite-MC-Boot-Cisco-1.2
SSL/IKE microcode: CNlite-MC-IPSEC-Admin-3.03
IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04
0: Ext: GigabitEthernet0/0 : address is 001a.6de9.2ac8, irq 9
1: Ext: GigabitEthernet0/1 : address is 001a.6de9.2ac9, irq 9
2: Ext: GigabitEthernet0/2 : address is 001a.6de9.2aca, irq 9
3: Ext: GigabitEthernet0/3 : address is 001a.6de9.2acb, irq 9
4: Ext: Management0/0 : address is 001a.6de9.2acc, irq 11
5: Int: Not licensed : irq 11
6: Int: Not licensed : irq 5
<--- More --->
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 100
Inside Hosts : Unlimited
Failover : Active/Active
VPN-DES : Enabled
VPN-3DES-AES : Disabled
Security Contexts : 2
GTP/GPRS : Disabled
VPN Peers : 750
This platform has an ASA 5520 VPN Plus license.
Serial Number: JMX1051K3T1
Running Activation Key: 0x411f0f45 0xdc0d9a28 0xe82155c8 0xa45c10e4 0xc818d480
Configuration register is 0x1
Configuration last modified by enable_15 at 01:18:23.520 UTC Sun Mar 18 2007
ciscoasa# show run
: Saved
:
ASA Version 7.0(6)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password kOnQwctX3GA7YBoq encrypted
names
dns-guard
!
interface GigabitEthernet0/0
nameif dianxin
security-level 0
ip address 222.89.175.210 255.255.255.224
!
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 61.154.188.12 255.255.255.248
!
interface GigabitEthernet0/2
nameif dmz
security-level 50
ip address 172.16.7.254 255.255.252.0
!
interface GigabitEthernet0/3
nameif inside
security-level 100
ip address 192.138.138.1 255.255.255.0
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
passwd 9jNfZuG3TC5tCVH0 encrypted
ftp mode passive
access-list 101 extended permit ip 192.138.138.0 255.255.255.0 192.138.138.0 255.255.255.0
pager lines 24
mtu dianxin 1500
mtu outside 1500
mtu dmz 1500
mtu inside 1500
ip local pool vpnpool 192.138.138.50-192.138.138.99
no failover
icmp permit any dianxin
icmp permit any outside
asdm image disk0:/asdm506.bin
<--- More --->
no asdm history enable
arp timeout 14400
global (dianxin) 1 interface
global (outside) 1 interface
global (dmz) 1 interface
nat (inside) 0 access-list 101
nat (inside) 1 0.0.0.0 0.0.0.0
route dianxin 59.42.0.0 255.255.0.0 222.89.175.193 1
route dianxin 0.0.0.0 0.0.0.0 222.89.175.193 254
route outside 0.0.0.0 0.0.0.0 61.154.188.9 1
route dmz 172.16.0.0 255.255.0.0 172.16.4.3 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
group-policy vpnclient internal
group-policy vpnclient attributes
vpn-idle-timeout 30
split-tunnel-policy tunnelspecified
split-tunnel-network-list value 101
webvpn
username kfdl password ADh2zndpjBZijVBB encrypted
http server enable
http 192.138.138.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set myset esp-des esp-sha-hmac
crypto dynamic-map vpnmap 10 set transform-set myset
crypto map mymap 10 ipsec-isakmp dynamic vpnmap
crypto map mymap interface outside
isakmp identity address
isakmp enable outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
tunnel-group kfdl type ipsec-ra
tunnel-group kfdl general-attributes
address-pool vpnpool
authentication-server-group none
authorization-server-group LOCAL
default-group-policy vpnclient
tunnel-group kfdl ipsec-attributes
pre-shared-key *
telnet 192.138.138.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 dianxin
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 60
console timeout 0
dhcpd address 192.138.138.100-192.138.138.254 inside
dhcpd dns 202.102.224.68 202.102.227.68
dhcpd lease 3600
dhcpd ping_timeout 50
dhcpd enable inside
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:d2481e9552601db5301308f682f95571
: end
ciscoasa# |
|