注册 登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

CCIE那点事-李萧明

博客已转移到www.jdccie.com CCIE那点事敬请期待

 
 
 

日志

 
 

Easy VPN with an PIX 515E as the Server and ASA 5505 as the Client (NEM) Configuration Example  

2012-02-16 12:28:00|  分类: Vpn |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |

Easy VPN with an PIX 515E as the Server and ASA 5505 as the Client (NEM) Configuration Example - dc31151 - 李萧明

 

 

 

ASA 5505 - Easy VPN Remote Hardware Client

ciscoasa#write terminal

:

ASA Version 8.0(2)

!

hostname ciscoasa

enable password 8Ry2YjIyt7RRXU24 encrypted

names

!

interface Vlan1

 nameif inside

 security-level 100

 ip address 172.16.1.1 255.255.255.0

!

interface Vlan2

 nameif outside

 security-level 0

 ip address 10.10.10.1 255.255.255.0

!

interface Ethernet0/0

 switchport access vlan 2

!

interface Ethernet0/1

!

 

 

!--- Output Suppressed

 

!

interface Ethernet0/7

 shutdown

!

passwd 2KFQnbNIdI.2KYOU encrypted

boot system disk0:/asa802-k8.bin

ftp mode passive

pager lines 24

mtu inside 1500

mtu outside 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-602.bin

no asdm history enable

arp timeout 14400

 

!--- Set the standard NAT configuration.  

!--- Easy VPN provides the NAT exceptions needed.

 

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

route outside 0.0.0.0 0.0.0.0 10.10.10.2 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout uauth 0:05:00 absolute

dynamic-access-policy-record DfltAccessPolicy

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

telnet timeout 5

ssh timeout 5

console timeout 0

 

 

!--- Easy VPN Client Configuration ---!

!--- Specify the IP address of the VPN server.

 

vpnclient server 10.20.20.1

 

!--- This example uses network extension mode.

 

vpnclient mode network-extension-mode

 

!--- Specify the group name and the pre-shared key.

 

vpnclient vpngroup mytunnel password ********

 

!--- Specify the authentication username and password.

 

vpnclient username cisco password ********

 

!--- In order to enable the device as hardware vpnclient, use this command.

 

vpnclient enable

 

threat-detection basic-threat

threat-detection statistics access-list

!

class-map inspection_default

 match default-inspection-traffic

!

 

!--- Output suppressed

 

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:dfcc004fbc2988e4370226f8d592b205

: end

 

  评论这张
 
阅读(7)| 评论(0)
推荐 转载

历史上的今天

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2018