In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
IPSEC and SSL are configured on the ASA firewall.
One: experimental topology:
Second, the experimental requirements:
1:PC1 belongs to Shanghai Branch Intranet mainframe, PC2 belongs to head office mainframe. Users of the Shanghai branch are required to drink the PC2 communication of the head office directly. (Site-to-Site IPSEC × × implementation)
2: public network users can access the head office's OA server PC2. (SSL × × implementation)
Third, the configuration process:
1: basic configuration:
ASA1 (config) # int e0bin1
ASA1 (config-if) # nameif inside
INFO: Securitylevel for "inside" set to 100by default.
ASA1 (config-if) # ip add 172.16.1.254 255.255.255.0
ASA1 (config-if) # no sh
ASA1 (config-if) # int e0Universe 0
ASA1 (config-if) # nameif outside
INFO: Securitylevel for "outside" set to 0 by default.
ASA1 (config-if) # ip add 12.0.0.1 255.255.255.0
ASA1 (config-if) # no sh
ASA1 (config-if) #
ASA1# ping172.16.1.1
Type escapesequence to abort.
Sending 5100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:
!
Success rateis 100 percent (5amp 5), round-trip min/avg/max = 10 Universe 344 percent 1670 ms
R1 (config) # intf0/0
R1 (config-if) # ipadd 12.0.0.2 255.255.255.0
R1 (config-if) # nosh
R1 (config-if) # intf1/0
R1 (config-if) # ipadd 23.0.0.2 255.255.255.0
R1 (config-if) # nosh
R1 (config-if) # intf2/0
R1 (config-if) # ipadd 1.1.1.254 255.255.255.0
R1 (config-if) # nosh
ASA2 (config) # int e0Universe 0
ASA2 (config-if) # nameif outside
INFO: Securitylevel for "outside" set to 0 by default.
ASA2 (config-if) # ip add 23.0.0.3 255.255.255.0
ASA2 (config-if) # no sh
ASA2 (config-if) # int e0bin1
ASA2 (config-if) # nameif inside
INFO: Securitylevel for "inside" set to 100by default.
ASA2 (config-if) # ip add 192.168.1.254 255.255.255.0
ASA2 (config-if) # no sh
Configure routing, NAT,ACL
ASA1 (config) # route outside 0 0 12.0.0.2
ASA1 (config) # nat-control
ASA1 (config) # nat (inside) 1 0 0
ASA1 (config) # global (outside) 1 interface
INFO: outsideinterface address added to PAT pool
ASA1 (config) # access-list permit icmp any any
ASA1 (config) # access-group in interface outside
ASA2 (config) # route outside 0 0 23.0.0.2
ASA2 (config) # nat-con
ASA2 (config) # nat-control
ASA2 (config) # nat (inside) 1 0 0
ASA2 (config) # global (outside) 1 interface
INFO: outsideinterface address added to PAT pool
ASA2 (config) # access-list permit icmp any any
ASA2 (config) # access-group in interface outside
The public network is fine on the private network, but the two private networks cannot communicate with each other.
2: configure Site-to-Site × ×
ASA1 (config) # access-list no-nat permit ip 172.16.1.0 255.255.255.0 192.168.1.0255.255.255.0
ASA1 (config) # nat (inside) 0 access-list no-nat
ASA2 (config) # access-list no-nat permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.0
ASA2 (config) # nat (inside) 1 access-list no-nat
ASA1 (config) # crypto isakmp enable outside
ASA1 (config-isakmp-policy) # authentication pre-share
ASA1 (config-isakmp-policy) # encryption des
ASA1 (config-isakmp-policy) # hash md5
ASA1 (config-isakmp-policy) # group 2
ASA1 (config-isakmp-policy) # exit
ASA1 (config) # isakmp key cisco address 23.0.0.3
ASA1 (config) # crypto ipsec transform-set mytrans esp-des esp-md
ASA1 (config) # crypto ipsec transform-set mytrans esp-des esp-md5-hmac
ASA1 (config) # crypto map mymap 10 set peer 23.0.0.3
ASA1 (config) # crypto map mymap 10 set transform-set mytrans
ASA1 (config) # crypto map mymap 10 match address no-nat
ASA1 (config) # crypto map mymap interface outside
ASA2 (config) # crypto isakmp enable outside
ASA2 (config-isakmp-policy) # authentication pre-share
ASA2 (config-isakmp-policy) # encryption des
ASA2 (config-isakmp-policy) # hash md5
ASA2 (config-isakmp-policy) # group 2
ASA2 (config-isakmp-policy) # exit
ASA2 (config) # isakmp key cisco address 12.0.0.1
ASA2 (config) # crypto ipsec transform-set mytrans esp-des esp-md
ASA2 (config) # crypto ipsec transform-set mytrans esp-des esp-md5-hmac
ASA2 (config) # crypto map mymap 10 set peer 12.0.0.1
ASA2 (config) # crypto map mymap 10 set transform-set mytrans
ASA2 (config) # crypto map mymap 10 match address no-nat
ASA2 (config) # crypto map mymap interface outside
Site-to-SiteIPSEC configuration is complete.
ASA2 (config) # web***
ASA2 (config-web***) # enable outside
INFO: Web × × and DTLS are enabled on 'outside'.
ASA2 (config-web***) # svc p_w_picpath disk0:/sslclient-win-1.1.3.173.pkg
ASA2 (config-web***) # svc enable
ASA2 (config-web***) # exit
ASA2 (config) # username cisco password cisco
ASA2 (config) # ip local pool * * 192.168.100.1-192.168.100.200
ASA2 (config) # access-list 100 permit ip 192.168.1.0 255.255.255.0 any
ASA2 (config) # group-policy my10 internal
ASA2 (config) # group-policy my10 attributes
ASA2 (config-group-policy) # *-tunnel-protocol web*** svc
ASA2 (config-group-policy) # split-tunnel-policy tunnelspecified
ASA2 (config-group-policy) # split-tunnel-network-list value 100
ASA2 (config-group-policy) # web***
ASA2 (config-group-web***) # svc ask enable
ASA2 (config-group-web***) # exit
ASA2 (config-group-policy) # exit
ASA2 (config) # tunnel-group jishu type web***
ASA2 (config) # tunnel-group jishu general-attributes
ASA2 (config-tunnel-general) # address-pool * *
ASA2 (config-tunnel-general) # default-group-policy my10
ASA2 (config-tunnel-general) # web***
ASA2 (config-web***) # tunnel-group-list enable
ASA2 (config-web***) # tunnel-group jishu web***-attributes
ASA2 (config-tunnel-web***) # group-alias 2t39
SSL × × configuration is complete.
Access-listssl*** extended permit ip 192.168.1.0 255.255.255.0 192.168.100.0 255.255.255.0
Nat (inside) 0access-list ssl***
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.