设为首页收藏本站language 语言切换
查看: 2981|回复: 0
收起左侧

Cisco ASA 5510配置VPN,不知道哪里出现问题了,请大神帮忙看下

[复制链接]
发表于 2016-9-16 22:46:39 | 显示全部楼层 |阅读模式
WHKF# sho run
: Saved
:
ASA Version 8.2(5)
!
hostname WHKF
domain-name shc.com
enable password PJvzrj6sITvRu8L. encrypted
passwd PJvzrj6sITvRu8L. encrypted
names
!
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 119.97.143.66 255.255.255.0
!
interface GigabitEthernet0/1
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1.10
vlan 10
nameif APP
security-level 100
ip address 192.168.10.254 255.255.255.0
!            
interface GigabitEthernet0/1.20
vlan 20
nameif DB
security-level 100
ip address 192.168.20.254 255.255.255.0
!
interface GigabitEthernet0/2
nameif WEB
security-level 50
ip address 10.100.18.254 255.255.255.0
!
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
dns server-group DefaultDNS
domain-name shc.com
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list split extended permit ip 192.168.10.0 255.255.255.0 any
access-list nonat extended permit ip 192.168.10.0 255.255.255.0 192.168.110.0 255.255.255.0
access-list nonat extended permit ip 192.168.10.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list nonat extended permit ip 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0
access-list anyout extended permit ip any any
access-list APP-DB extended permit ip 192.168.10.0 255.255.255.0 host 192.168.20.100
access-list APP-DB extended permit tcp 192.168.10.0 255.255.255.0 host 192.168.20.102 eq ssh
access-list APP-DB extended deny ip any any
access-list WEB-Split extended permit ip 10.100.18.0 255.255.255.0 any
pager lines 24
mtu outside 1500
mtu APP 1500
mtu DB 1500
mtu WEB 1500
ip local pool vpnpool 192.168.110.100-192.168.110.150
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (APP) 0 access-list nonat
nat (APP) 1 192.168.10.0 255.255.255.0
static (APP,outside) tcp interface 16881 192.168.10.81 9888 netmask 255.255.255.255
static (APP,outside) tcp interface 16883 192.168.10.83 9888 netmask 255.255.255.255
static (APP,outside) tcp interface 16885 192.168.10.85 9888 netmask 255.255.255.255
static (APP,outside) tcp interface 16887 192.168.10.87 9888 netmask 255.255.255.255
static (APP,outside) tcp interface 16892 192.168.10.92 9899 netmask 255.255.255.255
static (APP,outside) tcp interface 16894 192.168.10.94 9899 netmask 255.255.255.255
static (APP,outside) tcp interface 16896 192.168.10.96 9899 netmask 255.255.255.255
static (APP,outside) tcp interface 16898 192.168.10.98 9899 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.67 10001 192.168.10.101 7888 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.67 10003 192.168.10.103 7899 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.67 10005 192.168.10.105 7899 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.68 11012 192.168.10.112 8899 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.68 11014 192.168.10.114 8888 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.68 11016 192.168.10.116 8888 netmask 255.255.255.255
static (APP,outside) tcp 119.97.143.67 ssh 192.168.10.252 ssh netmask 255.255.255.255
access-group anyout in interface outside
access-group APP-DB out interface DB
route outside 0.0.0.0 0.0.0.0 119.97.143.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set 1set esp-des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map dy 10 set transform-set 1set
crypto map mymap 10 ipsec-isakmp dynamic dy
crypto map mymap interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy web-split internal
group-policy web-split attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value WEB-Split
group-policy user-split internal
group-policy user-split attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split
username admin password TOyVyM6G6TXcuQ5w encrypted privilege 15
username admin attributes
vpn-group-policy user-split
service-type admin
username whkfadmin password 4QYVBi5RMyj9Is69 encrypted privilege 15
username whkfadmin attributes
vpn-group-policy web-split
service-type remote-access
username whkf.com password 1650Z03qSZjeCWfr encrypted privilege 15
username whkf password 4QYVBi5RMyj9Is69 encrypted privilege 15
username whkf attributes
vpn-group-policy user-split
service-type remote-access
tunnel-group vpn type remote-access
tunnel-group vpn general-attributes
address-pool vpnpool
tunnel-group vpn ipsec-attributes
pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect ip-options
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny  
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip  
  inspect xdmcp
  inspect icmp
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:e0ebe34061d66bffaf8bcfcfc82be96c
: end


您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-10 13:21 , Processed in 0.285020 second(s), 25 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表