Cisco ASA 之 Easy 虚拟专用网(cisco packet tracer)

网友投稿 351 2022-10-08


Cisco ASA 之 Easy 虚拟专用网(cisco packet tracer)

ciscoasa> en Password: ciscoasa# conf t ciscoasa(config)# int e 0/0 ciscoasa(config-if)# nameif inside INFO: Security level for "inside" set to 100 by default. ciscoasa(config-if)# ip add 192.168.0.1 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit ciscoasa(config)# int e 0/1 ciscoasa(config-if)# nameif outside INFO: Security level for "outside" set to 0 by default. ciscoasa(config-if)# ip add 200.0.0.2 ciscoasa(config-if)# no shutdown ciscoasa(config)# route outside 0 0 200.0.0.1 # 0代表0.0.0.0 # ASA中的AAA默认开启,所以不需要手动开启了 ciscoasa(config)# username zhangsan password 123123 # 配置AAA认证用户 ciscoasa(config)# crypto isakmp enable outside # 开启IKE协商功能 # 阶段一:指定管理连接的相关参数,加密算法等 ciscoasa(config)# crypto isakmp policy 10 ciscoasa(config-isakmp-policy)# encryption 3des ciscoasa(config-isakmp-policy)# hash sha ciscoasa(config-isakmp-policy)# authentication pre-share ciscoasa(config-isakmp-policy)# group 2 ciscoasa(config-isakmp-policy)# exit ciscoasa(config)# ip local pool test-pool 192.168.1.200-192.168.1.210 # 创建地址池 ciscoasa(config)# access-list split-acl permit ip 192.168.0.0 255.255.255.0 any # 编写ACl ciscoasa(config)# group-policy test-group internal ciscoasa(config)# group-policy test-group attributes ciscoasa(config-group-policy)# split-tunnel-policy tunnelspecified ciscoasa(config-group-policy)# split-tunnel-network-list value split-acl ciscoasa(config-group-policy)# exit ciscoasa(config)# tunnel-group test1-group type ipsec-ra ciscoasa(config)# tunnel-group test1-group general-attributes ciscoasa(config-tunnel-general)# address-pool test-pool # 应用所创建的地址池 ciscoasa(config-tunnel-general)# default-group-policy test-group ciscoasa(config-tunnel-general)# exit ciscoasa(config)# tunnel-group test1-group ipsec-attributes ciscoasa(config-tunnel-ipsec)# pre-shared-key 321321 # 配置组密钥 ciscoasa(config-tunnel-ipsec)# exit ciscoasa(config)# crypto ipsec transform-set test-set esp-3des esp-sha-hmac ciscoasa(config)# crypto dynamic-map test-dymap 1 set transform-set test-set ciscoasa(config)# crypto map test-stamap 1000 ipsec-isakmp dynamic test-dymap ciscoasa(config)# crypto map test-stamap int outside # 应用到接口


版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:Java之类加载机制案例讲解
下一篇:Cisco 路由器之Easy虚拟专用网(解决出差员工访问公司内网)(cisco思科官网)
相关文章

 发表评论

暂时没有评论,来抢沙发吧~