关于CISCO PIX515E VPN问题
哈哈,看了半天,找了半天,找过QQ群,看过以前的网站帖子,专门介绍,CCSP教程,但是问题还是没有解决,还是发到这里吧感觉比较亲切.下面是所有的配置.希望能有朝一日帮我解决.interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password pix515 encrypted
passwd pix515 encrypted
hostname pixfirewall
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol telnet 23
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list no-nat permit ip 192.168.0.0 255.255.255.0 192.168.10.0 255.255.255.0
access-list no-nat permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0
!定义不进行NAT的传输
pager line 24
ip address outside 218.28.105.x 255.255.255.0
!定义PIX的outside口IP
ip address inside 192.168.1.1 255.255.255.0
!定义PIX的inside口IP
ip audit info action alarm
ip audit attack action alarm
ip local pool dialer 192.168.10.1-192.168.10.200
!定义VPN地址池分配IP地址
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list no-nat
nat (inside) 1 0 0
conduit permit icmp any any
conduit permit ip any any
conduit permit tcp any any
route outside 0.0.0.0 0.0.0.0 218.28.105.x 1
route inside 192.168.0.0 255.255.255.0 192.168.0.1 1
static (inside,outside) tcp 218.28.105.x 21 192.168.0.2 21 netmask 255.255.255.255 0 0
!新添加21FTP端口映射。。。。。
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 192.168.0.0 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
!对于所有IPSec流量不检测允许其通过,如果不加这个命令的话,需要加上ACL到outside口以允许特定的IPSce流量通过,但会控制更加灵活。
no sysopt route dnat
crypto ipsec transform-set aaades esp-des esp-md5-hmac
!定义一个变换集aaades
crypto dynamic-map dynomap 10 set transform-set aaades
!把变换集aaades添加到动态加密策略dynomap
crypto map vpnpeer 20 ipsec-isakmp dynamic dynomap
!把动态加密策略绑定到vpnpeer 加密图
crypto map vpnpeer client authentication LOCAL
!定义不需要验证服务器 ,使用的是PIX自己的用户验证。
crypto map vpnpeer client configuration address initiate
!定义给每个客户端分配IP地址
crypto map vpnpeer client configuration address respond
!定义PIX防火墙接受来自任何IP的请求
crypto map vpnpeer interface outside
!把动态加密图vpnpeer绑定到outside口
isakmp enable outside
!在outside口启用isakmp
isakmp key 1234 address 0.0.0.0 netmask 0.0.0.0
!定义共享密匙,并接受任何地址的请求。
isakmp client configuration address-pool local dialer outside
!将VPN client地址池绑定到isakmp
isakmp policy 10 authentication pre-share
!定义phase 1使用pre-shared key进行认证
isakmp policy 10 encryption des
!定义phase 1协商用DES加密算法
isakmp policy 10 hash md5
!定义phase 1协商用MD5散列算法
isakmp policy 10 group 2
!定义phase 1进行IKE协商使用DH group 2
isakmp policy 10 lifetime 86400
!定义IKE SA生存时间
vpngroup lbdl address-pool dialer
!定义VPN client拨入使用的vpngroup所分配的IP地址池
vpngroup lbdl idle-time 1800
!定义vpngroup的空闲时间
vpngroup lbdl password 1234
!定义vpngroup的pre-shared key
telnet 192.168.0.0 255.255.255.0 inside
telnet 218.28.19.0 255.255.255.0 outside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh 218.28.19.0 255.255.255.0 outside
ssh timeout 20
terminal width 80
username vpnuser password vpnuser
!在PIX上创建一个用户,用户名密码都为vpnuser
!
!
!
!VPN client版本为4.0.7,先在Connection Entries里创建一个连接,在最上面填入。
!
!Connection Entry:vpnpeer1(随便添写)
!Description:test
!Host:218.218.105.94
!
!在Authentication里的GROUP Authentication里填入。
!Name:lbdl #就是vpngroup name
!Password:1234 #就是vpngroup password
!Confirm Password:1234
!
!name和password要和PIX中的vpngroup和key一致。
!
!在vpn client进行连接的时候会有一个窗口弹出,要输入用户名和密码,输入vpnuser就可以了。
!
!
以上是所有的配置:
问题有3处
1 fixup protocol telnet 23 此出添加不上提示格式错误
2 static 21端口时,如果该命令添加上的话,NAT就不通
3 VPN配置不通.
谨以此文献给有志青年^^ PIX Version 6.3(1)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password XFjDfTh5ZbjEZqUb encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname PIX515E
domain-name ciscopix.com
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
names
access-list inside_outbound_nat0_acl permit ip host 10.66.166.1 192.168.1.0 255.
255.255.0
access-list inside_outbound_nat0_acl permit ip host 10.66.166.2 192.168.1.0 255.
255.255.0
access-list xcldj_splitTunnelAcl permit ip host 10.66.166.1 any
access-list outside_cryptomap_dyn_20 permit ip any 192.168.1.0 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 221.14.132.* 255.255.255.248
ip address inside 10.66.170.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool xcldj 192.168.1.1-192.168.1.254
pdm location 10.66.0.0 255.255.0.0 inside
pdm location 192.168.0.0 255.255.0.0 inside
pdm location 10.66.166.1 255.255.255.255 inside
pdm location 10.66.166.2 255.255.255.255 inside
pdm location 10.66.166.0 255.255.255.0 inside
pdm location 10.66.167.0 255.255.255.0 inside
pdm location 10.66.168.0 255.255.255.0 inside
pdm location 10.66.169.0 255.255.255.0 inside
pdm location 10.66.170.0 255.255.255.0 inside
pdm location 10.66.171.0 255.255.255.0 inside
pdm location 192.168.1.0 255.255.255.0 outside
pdm location 0.0.0.0 0.0.0.0 outside
pdm history enable
arp timeout 14400
global (outside) 1 221.14.132.*-221.14.132.* netmask 255.255.255.248
global (outside) 1 interface
global (outside) 1 221.14.132.* netmask 255.255.255.248
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
conduit permit tcp any any
conduit permit ip any any
route outside 0.0.0.0 0.0.0.0 221.14.132.185 1
route inside 10.66.0.0 255.255.0.0 10.66.170.253 1
route inside 10.66.166.0 255.255.255.0 10.66.170.253 1
route inside 10.66.167.0 255.255.255.0 10.66.170.253 1
route inside 10.66.168.0 255.255.255.0 10.66.170.253 1
route inside 10.66.169.0 255.255.255.0 10.66.170.253 1
route inside 10.66.171.0 255.255.255.0 10.66.170.253 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 outside
http 192.168.0.0 255.255.240.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map outside_dyn_map_1 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map_1 20 set transform-set ESP-DES-MD5
crypto map outside_map_1 65535 ipsec-isakmp dynamic outside_dyn_map_1
crypto map outside_map_1 interface outside
isakmp enable outside
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup xcldj address-pool xcldj
vpngroup xcldj dns-server 202.102.227.68
vpngroup xcldj split-tunnel xcldj_splitTunnelAcl
vpngroup xcldj idle-time 1800
vpngroup xcldj password ********
vpngroup XCLDJ idle-time 1800
telnet 10.66.0.0 255.255.0.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn enable outside
terminal width 80
Cryptochecksum:2b99ce26d37339a5d1bba47a9217144a
: end
页:
[1]