why 发表于 2018-7-15 16:23:50

cisco asa 5505 *** pppoe配置

  ciscoasa# sh run
  : Saved
  :
  ASA Version 7.2(4)
  !
  hostname ciscoasa
  domain-name default.domain.invalid
  enable password 8Ry2YjIyt7RRXU24 encrypted
  passwd 2KFQnbNIdI.2KYOU encrypted
  names
  ddns update method aaa
  ddns both
  !
  !
  interface Vlan1
  nameif inside
  security-level 100
  ip address 192.168.1.1 255.255.255.0
  !
  interface Vlan2
  nameif outside
  security-level 0
  pppoe client vpdn group adsl
  ip address pppoe setroute
  !
  interface Vlan3
  no nameif
  no security-level
  no ip address
  !
  interface Ethernet0/0
  switchport access vlan 2
  !
  interface Ethernet0/1
  !
  interface Ethernet0/2
  !
  interface Ethernet0/3
  !
  interface Ethernet0/4
  !
  interface Ethernet0/5
  !
  interface Ethernet0/6
  !
  interface Ethernet0/7
  !
  ftp mode passive
  dns server-group DefaultDNS
  domain-name default.domain.invalid
  access-list outside-int extended permit icmp any any
  access-list outside-int extended permit ip any any
  access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.2.0 255.255.255.0
  access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.255.0
  access-list inside_nat0_outbound extended permit ip 172.16.0.0 255.255.255.0 any
  access-list split standard permit 192.168.1.0 255.255.255.0
  access-list ez*** extended permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.255.0
  pager lines 24
  logging asdm informational
  mtu inside 1500
  mtu outside 1500
  ip local pool cangku 172.16.2.0-172.16.2.10
  icmp unreachable rate-limit 1 burst-size 1
  asdm image disk0:/asdm-524.bin
  no asdm history enable
  arp timeout 14400
  global (outside) 1 interface
  nat (inside) 0 access-list inside_nat0_outbound
  nat (inside) 1 0.0.0.0 0.0.0.0
  access-group outside-int in interface outside
  timeout xlate 3:00:00
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
  timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
  timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
  timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
  http server enable
  http 0.0.0.0 0.0.0.0 outside
  http 192.168.1.0 255.255.255.0 inside
  no snmp-server location
  no snmp-server contact
  snmp-server enable traps snmp authentication linkup linkdown coldstart
  crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
  crypto dynamic-map outside_dyn_map 20 set pfs group1
  crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
  crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
  crypto map outside_map interface outside
  crypto isakmp enable outside
  crypto isakmp policy 10
  authentication pre-share
  encryption des
  hash md5
  group 2
  lifetime 86400
  telnet 0.0.0.0 0.0.0.0 inside
  telnet timeout 5
  ssh timeout 5
  console timeout 0
  vpdn group adsl request dialout pppoe
  vpdn group adsl localname 051988137017
  vpdn group adsl ppp authentication pap
  vpdn username 051988137017 password *********
  dhcpd dns 221.228.255.1
  dhcpd auto_config outside
  !
  dhcpd address 192.168.1.2-192.168.1.33 inside
  dhcpd enable inside
  !
  group-policy czhz internal
  group-policy czhz attributes
  ***-simultaneous-logins 100
  ***-idle-timeout 100000
  ***-session-timeout 100000
  split-tunnel-policy tunnelspecified
  split-tunnel-network-list value ez***
  nem enable
  address-pools value cangku
  username easy password Ze0It9hlw.7EOMvw encrypted privilege 15
  username user5 password TTNKHqfM6YyTcEzA encrypted privilege 0
  username user4 password TTNKHqfM6YyTcEzA encrypted privilege 0
  username user1 password TTNKHqfM6YyTcEzA encrypted privilege 0
  username user1 attributes
  ***-group-policy czhz
  username user3 password TTNKHqfM6YyTcEzA encrypted privilege 0
  username user2 password TTNKHqfM6YyTcEzA encrypted privilege 0
  tunnel-group czhz type ipsec-ra
  tunnel-group czhz general-attributes
  default-group-policy czhz
  tunnel-group czhz ipsec-attributes
  pre-shared-key *
  !
  class-map inspection_default
  match default-inspection-traffic
  !
  !
  policy-map type inspect dns preset_dns_map
  parameters
  message-length maximum 512
  policy-map global_policy
  class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  !
  service-policy global_policy global
  prompt hostname context
  Cryptochecksum:3dfbcaa2ee0a79be868b5438fd150ebd
  : end
  ciscoasa#
页: [1]
查看完整版本: cisco asa 5505 *** pppoe配置