pix 2611的ADSL VPN配置
2008-02-23 04:53:43来源:互联网 阅读 ()
分支部门:2611(2ETHERNET口),ADSL猫,非固定IP地址。
配置如下:中心点
User Access Verification
Password:
Type help or '?' for a list of available commands.
pixfirewall> ena
Password: *********
pixfirewall# sh run
: Saved
:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password HM/y0e4AWPiGT691 encrypted
passwd Wgu.mxsstcG42LLg encrypted
hostname pixfirewall
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
no fixup protocol skinny 2000
no fixup protocol smtp 25
names
access-list 130 permit ip 10.15.0.0 255.255.255.0 10.15.1.0 255.255.255.0
pager lines 24
logging buffered warnings
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside 61.131. 54.22 255.255.255.248
ip address inside 10.15.0.1 255.255.255.252
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 interface netmask 255.255.255.248
nat (inside) 0 access-list 130
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
conduit permit icmp any any
route outside 0.0.0.0 0.0.0.0 61.131.54.21 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS protocol tacacs
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set xp esp-des esp-md5-hmac
crypto dynamic-map dymap 10 set transform-set xp
crypto map mymap 10 ipsec-isakmp dynamic dymap
crypto map mymap interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp policy 9 authentication pre-share
isakmp policy 9 encryption des
isakmp policy 9 hash sha
isakmp policy 9 group 2
isakmp policy 9 lifetime 86400
telnet 10.15.0.0 255.255.255.0 inside
telnet timeout 15
ssh timeout 5
terminal width 80
Cryptochecksum:fa3fa252ac3694a8546869120e7eb1a9
: end
pixfirewall#
分支部门:
Building configuration...
Current configuration : 2073 bytes
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Router
!
boot system tftp c2600-ik8o3s-mz.122-11.T.bin 10.15.1.131
logging buffered 4096 debugging
no logging console
!
ip subnet-zero
!
!
!
ip audit notify log
ip audit po max-events 100
vpdn enable
!
vpdn-group pppoe
request-dialin
protocol pppoe
!
!
crypto isakmp policy 1
authentication pre-share
group 2
lifetime 28800
crypto isakmp key 123456 address 61.131. 54.22
!
!
crypto ipsec transform-set xp esp-des esp-md5-hmac
!
crypto map 515e 100 ipsec-isakmp
set peer 61.131. 54.22
set security-association lifetime seconds 28800
set transform-set xp
match address 131
!
!
!
voice call carrier capacity active
!
!
!
!
!
!
!
!
!
mta receive maximum-recipients 0
!
!
!
!
interface Ethernet0/0
ip address 10.15.1.251 255.255.255.0
ip nat inside
no ip route-cache
no ip mroute-cache
full-duplex
!
interface Serial0/0
no ip address
shutdown
!
interface Ethernet0/1
no ip address
no ip route-cache
no ip mroute-cache
full-duplex
pppoe enable
pppoe-client dial-pool-number 1
crypto map 515e
!
interface Serial0/1
no ip address
shutdown
!
interface Serial0/2
no ip address
shutdown
!
interface Serial0/3
no ip address
shutdown
!
interface Dialer1
ip address negotiated
ip mtu 1492
ip nat outside
encapsulation ppp
no ip route-cache
no ip mroute-cache
dialer pool 1
dialer-group 1
ppp authentication pap callin
ppp pap sent-username 123456 password 0 123456
crypto map 515e
!
ip nat inside source list 132 interface Dialer1 overload
ip classless
ip route 0.0.0.0 0.0.0.0 Dialer1
ip http server
ip pim bidir-enable
!
!
access-list 1 permit 10.15.1.0 0.0.0.255
access-list 131 permit ip 10.15.1.0 0.0.0.255 10.15.0.0 0.0.0.255
access-list 132 deny ip 10.15.1.0 0.0.0.255 10.15.0.0 0.0.0.255
access-list 132 permit ip 10.15.1.0 0.0.0.255 any
dialer-list 1 protocol ip permit
!
call rsvp-sync
!
!
mgcp profile default
!
dial-peer cor custom
!
!
!
!
!
line con 0
line aux 0
line vty 0 4
login
!
!
end
Router#
实验中因为对ADSL不是很清楚,我用的是中兴831ADSL猫,支持路由和NAT,当地网通拿来时已经配好,我接在路由器上怎么也用不成,查资料才知道一定要用桥接模式,找个大头针在猫的RESET口上一捅,整个世界清净了,一切OK!
标签:
版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有
上一篇:网络专业人士笔记
下一篇:VPN实例配置方案-中文注解
IDC资讯: 主机资讯 注册资讯 托管资讯 vps资讯 网站建设
网站运营: 建站经验 策划盈利 搜索优化 网站推广 免费资源
网络编程: Asp.Net编程 Asp编程 Php编程 Xml编程 Access Mssql Mysql 其它
服务器技术: Web服务器 Ftp服务器 Mail服务器 Dns服务器 安全防护
软件技巧: 其它软件 Word Excel Powerpoint Ghost Vista QQ空间 QQ FlashGet 迅雷
网页制作: FrontPages Dreamweaver Javascript css photoshop fireworks Flash