ASA5505 + vpn, rer, 30-Июн-10, 12:08 [смотреть все]ASA Version 7.2(4) ! hostname sccc domain-name mynet.local enable password encrypted passwd encrypted names ! interface Vlan1 nameif inside security-level 0 ip address 192.168.1.1 255.255.255.0 ! interface Vlan2 mac-address 00e0.4c39.70d2 nameif outside security-level 0 ip address 1.1.1.1 255.255.255.240 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive dns domain-lookup inside dns domain-lookup outside dns server-group DefaultDNS domain-name mynet.local same-security-traffic permit inter-interface access-list inside_access_in extended permit tcp any any eq www access-list inside_access_in extended permit tcp any host 192.168.1.2 eq 52222 access-list inside_access_in extended permit tcp any host 192.168.1.3 eq 51270 access-list inside_access_in extended permit tcp any host 192.168.1.2 eq ftp access-list inside_access_in extended permit tcp any host 192.168.1.2 eq 4899 access-list outside_access_in extended permit tcp any any eq www access-list inside_nat0_outbound extended permit ip any 192.168.11.0 255.255.255.248 pager lines 24 logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool vpn 192.168.11.1-192.168.11.5 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 icmp permit any inside icmp permit any outside asdm image disk0:/asdm-524.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 52222 192.168.1.2 52222 netmask 255.255.255.255 static (inside,outside) tcp interface 51270 192.168.1.3 51270 netmask 255.255.255.255 static (inside,outside) tcp interface ftp 192.168.1.2 ftp netmask 255.255.255.255 static (inside,outside) tcp interface ftp-data 192.168.1.2 ftp-data netmask 255.255.255.255 static (inside,outside) tcp interface 4899 192.168.1.2 4899 netmask 255.255.255.255 access-group inside_access_in in interface inside per-user-override access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 195.208.157.49 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute http server enable http 192.168.1.2 255.255.255.255 inside http 192.168.1.0 255.255.255.0 inside http redirect inside 80 http redirect outside 80 no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_SHA crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd auto_config outside !group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes dns-server value 192.168.1.1 vpn-tunnel-protocol IPSec l2tp-ipsec username asdasd password nt-encrypted privilege 0 username asdasd attributes vpn-group-policy DefaultRAGroup username admin password encrypted privilege 15 tunnel-group DefaultRAGroup general-attributes address-pool vpn default-group-policy DefaultRAGroup tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * tunnel-group DefaultRAGroup ppp-attributes authentication ms-chap-v2 ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp ! service-policy global_policy global prompt hostname context Cryptochecksum:a81382d631e84e0be7d1fa56508c144e : end
Не подключается,не могу понять в чем причина
|
- ASA5505 + vpn, rer, 14:08 , 30-Июн-10 (1)
# debug cryp isa 128 # show debug debug l2tp event enabled at level 1 debug l2tp data enabled at level 1 debug crypto isakmp enabled at level 128
- ASA5505 + vpn, rer, 22:26 , 03-Июл-10 (2)
Соедниение есть,проблема что впн-клиент при подключение не имеет доступа во внутрению сеть
hostname sccc domain-name mynet.local enable password encrypted passwd encrypted names ! interface Vlan1 nameif inside security-level 0 ip address 192.168.1.1 255.255.255.0 ! interface Vlan2 mac-address 00e0.4c39.70d2 nameif outside security-level 0 ip address xxx.xxx.xxx.61 255.255.255.240 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive dns domain-lookup inside dns domain-lookup outside dns server-group DefaultDNS domain-name mynet.local same-security-traffic permit inter-interface access-list inside_access_in extended permit tcp any any eq www access-list inside_access_in extended permit tcp any host 192.168.1.2 eq 52222 access-list inside_access_in extended permit tcp any host 192.168.1.3 eq 51270 access-list inside_access_in extended permit tcp any host 192.168.1.2 eq ftp access-list inside_access_in extended permit tcp any host 192.168.1.2 eq 4899 access-list outside_access_in extended permit ip any any access-list outside_access_in extended permit tcp any any eq www access-list inside_nat0_outbound extended permit ip any 192.168.198.0 255.255.255.240 access-list test_splitTunnelAcl standard permit any pager lines 24 logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool VPNPOOL 192.168.198.1-192.168.198.11 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 icmp permit any inside icmp permit any outside asdm image disk0:/asdm-524.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 52222 192.168.1.2 52222 netmask 255.255.255.255 static (inside,outside) tcp interface 51270 192.168.1.3 51270 netmask 255.255.255.255 static (inside,outside) tcp interface ftp 192.168.1.2 ftp netmask 255.255.255.255 static (inside,outside) tcp interface ftp-data 192.168.1.2 ftp-data netmask 255.255.255.255 static (inside,outside) tcp interface 4899 192.168.1.2 4899 netmask 255.255.255.255 access-group inside_access_in in interface inside per-user-override access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.49 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute http server enable http 192.168.1.0 255.255.255.0 inside http redirect inside 80 http redirect outside 80 no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_SHA crypto dynamic-map outside_dyn_map 40 set pfs crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA crypto dynamic-map outside_dyn_map0 20 set transform-set ESP-3DES-MD5 crypto dynamic-map outside_dyn_map0 40 set pfs crypto dynamic-map outside_dyn_map0 40 set transform-set TRANS_ESP_3DES_SHA crypto dynamic-map outside_dyn_map0 60 set transform-set ESP-3DES-MD5 crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map0 65535 ipsec-isakmp dynamic outside_dyn_map0 crypto map outside_map0 interface outside crypto isakmp enable outside crypto isakmp policy 30 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 crypto isakmp policy 50 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd auto_config outside !group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes dns-server value 195.208.145.18 vpn-tunnel-protocol l2tp-ipsec split-tunnel-policy tunnelspecified split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl_2 group-policy 456 internal group-policy 456 attributes dns-server value 195.208.145.18 vpn-tunnel-protocol IPSec username admin password encrypted privilege 15 tunnel-group DefaultRAGroup general-attributes address-pool VPNPOOL default-group-policy DefaultRAGroup strip-realm authorization-dn-attributes use-entire-name tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * peer-id-validate nocheck tunnel-group DefaultRAGroup ppp-attributes no authentication chap authentication ms-chap-v2 tunnel-group 456 type ipsec-ra tunnel-group 456 general-attributes address-pool VPNPOOL default-group-policy 456 tunnel-group 456 ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp inspect pptp inspect ipsec-pass-thru ! service-policy global_policy global prompt hostname context no compression svc http-comp Cryptochecksum:f1a3e02780856092076c6df676d2f66f
- ASA5505 + vpn, rer, 22:39 , 03-Июл-10 (3)
решилось, не было crypto isakmp nat-traversal
|