设为首页 收藏本站
查看: 793|回复: 0

[经验分享] cisco asa5520配置

[复制链接]

尚未签到

发表于 2018-7-19 08:04:36 | 显示全部楼层 |阅读模式
  ciscoasa# show run
  : Saved
  :
  ASA Version 7.0(7)
  !
  hostname ciscoasa
  enable password 8Ry2YjIyt7RRXU24 encrypted
  names
  dns-guard
  !
  interface GigabitEthernet0/0
  nameif outside
  security-level 0
  ip address 124.254.46.X 255.255.255.240
  !
  interface GigabitEthernet0/1
  nameif inside
  security-level 100
  ip address 192.168.1.1 255.255.255.0
  !
  interface GigabitEthernet0/2
  shutdown
  no nameif
  no security-level
  no ip address
  !
  interface GigabitEthernet0/3
  shutdown
  no nameif
  no security-level
  no ip address
  !
  interface Management0/0
  no nameif
  security-level 100
  ip address 192.168.255.254 255.255.255.0
  management-only
  !
  passwd cisco12345678901 encrypted
  ftp mode passive
  same-security-traffic permit intra-interface
  access-list 100 extended permit icmp any any
  access-list Per_inside extended permit icmp any any
  access-list Per_inside extended permit ip any any
  pager lines 24
  mtu outside 1500
  mtu inside 1500
  ip local pool ***pool 192.168.168.2-192.168.168.254
  no failover
  icmp permit any outside
  no asdm history enable
  arp timeout 14400
  global (outside) 1 interface
  nat (outside) 1 192.168.168.0 255.255.255.0
  nat (inside) 1 0.0.0.0 0.0.0.0
  access-group 100 in interface outside
  access-group Per_inside in interface inside
  route outside 0.0.0.0 0.0.0.0 124.254.46.X 1
  route inside 192.168.0.0 255.255.0.0 192.168.1.254 1
  timeout xlate 3:00:00
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
  timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
  timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
  timeout uauth 0:05:00 absolute
  group-policy clientgroup internal
  group-policy clientgroup attributes
  ***-idle-timeout 20
  ipsec-udp enable
  ipsec-udp-port 10000
  split-tunnel-policy tunnelall
  web***
  username cisco123 password cisco12345678901 encrypted
  aaa authentication ssh console LOCAL
  http server enable
  http 0.0.0.0 0.0.0.0 inside
  no snmp-server location
  no snmp-server contact
  snmp-server enable traps snmp authentication linkup linkdown coldstart
  crypto ipsec transform-set myset esp-des esp-md5-hmac
  crypto dynamic-map rtpdynmap 20 set transform-set myset
  crypto map mymap 20 ipsec-isakmp dynamic rtpdynmap
  crypto map mymap interface outside

  isakmp>  isakmp enable outside
  isakmp policy 10 authentication pre-share
  isakmp policy 10 encryption 3des
  isakmp policy 10 hash sha
  isakmp policy 10 group 2
  isakmp policy 10 lifetime 86400
  isakmp policy 65535 authentication pre-share
  isakmp policy 65535 encryption 3des
  isakmp policy 65535 hash sha
  isakmp policy 65535 group 2
  isakmp policy 65535 lifetime 86400
  tunnel-group bonetwork type ipsec-ra
  tunnel-group bonetwork general-attributes
  address-pool ***pool
  authentication-server-group none
  authorization-server-group LOCAL
  default-group-policy clientgroup
  tunnel-group bonetwork ipsec-attributes
  pre-shared-key *
  telnet 0.0.0.0 0.0.0.0 inside
  telnet timeout 10
  ssh 0.0.0.0 0.0.0.0 outside
  ssh timeout 10
  ssh version 2
  console timeout 0
  management-access inside
  !
  class-map inspecti_de
  class-map inspection_default
  match default-inspection-traffic
  !
  !
  policy-map global_policy
  class inspection_default
  inspect dns maximum-length 512
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
  !
  service-policy global_policy global
  Cryptochecksum:26fbea9f791a526c8364195a7baa9e2c
  : end
  ciscoasa#

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-538542-1-1.html 上篇帖子: cisco ios检查命令 下篇帖子: Cisco 开启 Native vlan 打tag
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表