160;안녕Ȣ16;세요!~2cpu 회원님들
현1116; Cisco ASA5505 2대/196; VPN 터널링1012; Ȣ16;고 1080;lj16;데 터널1060; 형성.104;1648; 않아서 고수님들1032; 도움1060; 1208;실합니다.
ASA5505 6156;웨Ǻ12; 버1260;1008; 8.2 1077;니다.
현1116; 테스트 1473;1064; 설1221;값1077;니다.
asa5505 1번
ASA Version 8.2(1)160;
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
160;nameif inside
160;security-level 100
160;ip address 192.168.1.1 255.255.255.0160;
!
interface Vlan2
160;nameif outside
160;security-level 0
160;ip address 192.168.100.1 255.255.255.252160;
!
interface Ethernet0/0
160;switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
! 160; 160; 160; 160; 160; 160;160;
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
access-list VPN-ACL extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0160;
pager lines 24
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list VPN-ACL
route outside 192.168.2.0 255.255.255.0 192.168.100.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set MYSET esp-aes esp-sha-hmac160;
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map MYMAP 10 match address VPN-ACL
crypto map MYMAP 10 set peer 192.168.100.2160;
crypto map MYMAP 10 set transform-set MYSET
crypto map MYMAP interface outside
crypto isakmp enable outside
crypto isakmp policy 10
160;authentication pre-share
160;encryption aes
160;hash sha
160;group 2
160;lifetime 86400
crypto isakmp policy 65535
160;authentication pre-share
160;encryption 3des
160;hash sha 160; 160;160;
160;group 2
160;lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
tunnel-group 192.168.100.2 type ipsec-l2l
tunnel-group 192.168.100.2 ipsec-attributes
160;pre-shared-key *
!
class-map inspection_default
160;match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
160;parameters
160; message-length maximum 512
policy-map global_policy
160;class inspection_default
160; inspect dns preset_dns_map160;
160; inspect ftp160;
160; inspect h323 h225160;
160; inspect h323 ras160;
160; inspect netbios160;
160; inspect rsh160;
160; inspect rtsp160;
160; inspect skinny 160;
160; inspect esmtp160;
160; inspect sqlnet160;
160; inspect sunrpc160;
160; inspect tftp160;
160; inspect sip 160;
160; inspect xdmcp160;
!
service-policy global_policy global
prompt hostname context160;
Cryptochecksum:a9832c4ee44a0094481064e38465f0be
: end
ciscoasa(config)# 160;
---------------------------------------------------------------------
asa5505 2번
ASA Version 8.2(1)160;
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
160;nameif inside
160;security-level 100
160;ip address 192.168.2.1 255.255.255.0160;
!
interface Vlan2
160;nameif outside
160;security-level 0
160;ip address 192.168.100.2 255.255.255.252160;
!
interface Ethernet0/0
160;switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
! 160; 160; 160; 160; 160; 160;160;
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
access-list VPN-ACL extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0160;
pager lines 24
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list VPN-ACL
route outside 192.168.1.0 255.255.255.0 192.168.100.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set MYSET esp-aes esp-sha-hmac160;
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map MYMAP 10 match address VPN-ACL
crypto map MYMAP 10 set peer 192.168.100.1160;
crypto map MYMAP 10 set transform-set MYSET
crypto map MYMAP interface outside
crypto isakmp enable outside
crypto isakmp policy 10
160;authentication pre-share
160;encryption aes
160;hash sha
160;group 2
160;lifetime 86400
crypto isakmp policy 65535
160;authentication pre-share
160;encryption 3des
160;hash sha 160; 160;160;
160;group 2
160;lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
tunnel-group 192.168.100.1 type ipsec-l2l
tunnel-group 192.168.100.1 ipsec-attributes
160;pre-shared-key *
!
class-map inspection_default
160;match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
160;parameters
160; message-length maximum 512
policy-map global_policy
160;class inspection_default
160; inspect dns preset_dns_map160;
160; inspect ftp160;
160; inspect h323 h225160;
160; inspect h323 ras160;
160; inspect netbios160;
160; inspect rsh160;
160; inspect rtsp160;
160; inspect skinny 160;
160; inspect esmtp160;
160; inspect sqlnet160;
160; inspect sunrpc160;
160; inspect tftp160;
160; inspect sip 160;
160; inspect xdmcp160;
!
service-policy global_policy global
prompt hostname context160;
Cryptochecksum:e042bd486d274815d78c4f7b7acf880f
: end
ciscoasa(config)#160;
ciscoasa(config)# 160;ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
ciscoasa(config)# 160;ping 192.168.2.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.2.1, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
ciscoasa(config)# 160;ping 192.168.100
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.0.100, timeout is 2 seconds:
No route to host 192.168.0.100
Success rate is 0 percent (0/1)
ciscoasa(config)# 160;ping 192.168.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
ciscoasa(config)# 160;ping 192.168.100.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.100.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms