The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]




Версия для распечатки Пред. тема | След. тема
Новые ответы [ Отслеживать ]
VPN на cisco ASA, !*! alterego2014, 27-Авг-14, 13:05  [смотреть все]
Доброго времени суток! Есть топология Cisco Router2911->Cisco ASA5515X (версия ОС 9.2 (2)). NAT и маршрутизация с 2-мя провайдерами осуществляется на Cisco 2911, VPN на ASA5515X. Вопрос при поднятии vpn внешние пользователи могут пользоваться ресурсами внутренней сети, но не виден интернет, соответственно, если отключить VPN соединение интернет появляется в чем может быть причина неработоспособности интернета? Построен VPN по следующему принципу:  Пользователь заходит на Captive Portal вводит логин и пароль (используется LDAP со связкой контроллера домена) скачивает плагин, устанавливает  Cisco Anyconnect 3.1 и автоматом поднимается шифрованный канал.
  • VPN на cisco ASA, !*! alterego2014, 14:32 , 27-Авг-14 (1)
    > Доброго времени суток! Есть топология Cisco Router2911->Cisco ASA5515X (версия ОС 9.2 (2)).
    > NAT и маршрутизация с 2-мя провайдерами осуществляется на Cisco 2911, VPN
    > на ASA5515X. Вопрос при поднятии vpn внешние пользователи могут пользоваться ресурсами
    > внутренней сети, но не виден интернет, соответственно, если отключить VPN соединение
    > интернет появляется в чем может быть причина неработоспособности интернета? Построен VPN
    > по следующему принципу:  Пользователь заходит на Captive Portal вводит логин
    > и пароль (используется LDAP со связкой контроллера домена) скачивает плагин, устанавливает
    >  Cisco Anyconnect 3.1 и автоматом поднимается шифрованный канал.

    На ASA5515-X внутренняя сеть видна через vpn (соответственно и внутренние ресурсы), но со стороны маршрутизатора не видна сеть поднятая через vpn даже при явном разрешающем правиле на внешнем интерфейсе файервола (подозреваю что трафик заворачиваясь в виртуальную сеть не видит внешние маршруты в интернет).

    • VPN на cisco ASA, !*! alterego2014, 08:53 , 29-Авг-14 (2)
      Конфиг устройства
      ASA Version 9.2(2)
      !
      hostname ASA
      domain-name tmproj.ru
      enable password aD5MLkHiNxRshnib encrypted
      passwd pSrI5Zw54ciEXY2w encrypted
      names
      dns-guard
      ip local pool vpn_ip_pool 192.168.5.2-192.168.5.51 mask 255.255.255.0
      !
      interface GigabitEthernet0/0
      description DMZ->DMZservers
      nameif dmz
      security-level 50
      ip address 192.168.2.1 255.255.255.0
      !
      interface GigabitEthernet0/1
      description outside->Router1
      nameif outside
      security-level 0
      ip address 192.168.10.2 255.255.255.252
      !
      interface GigabitEthernet0/2
      duplex full
      nameif inside
      security-level 100
      no ip address
      !
      interface GigabitEthernet0/2.5
      description VLAN5
      vlan 5
      nameif inside5
      security-level 100
      ip address 192.168.5.1 255.255.255.0
      !
      interface GigabitEthernet0/2.10
      description VLAN10
      vlan 10
      nameif inside10
      security-level 100
      ip address 10.0.0.1 255.255.248.0
      !
      interface GigabitEthernet0/2.11
      description VLAN11
      vlan 11
      nameif inside11
      security-level 100
      ip address 172.0.0.1 255.255.255.0
      !
      interface GigabitEthernet0/3
      no nameif
      no security-level
      no ip address
      !
      interface GigabitEthernet0/4
      no nameif
      no security-level
      no ip address
      !
      interface GigabitEthernet0/5
      shutdown
      no nameif
      no security-level
      no ip address
      !
      interface Management0/0
      management-only
      nameif management
      security-level 100
      ip address 192.168.4.1 255.255.255.0
      !
      boot system disk0:/asa922-smp-k8.bin
      ftp mode passive
      dns domain-lookup inside
      dns domain-lookup inside10
      dns server-group DefaultDNS
      name-server 10.0.0.10
      name-server 10.0.0.11
      domain-name tmproj.ru
      same-security-traffic permit inter-interface
      object network mail.tmproj.ru
      host 10.0.0.8
      object network Synology
      host 10.0.0.20
      object network Ivan-Server
      host 172.0.0.18
      object network Nagios-server
      host 172.0.0.100
      object network syslog-serv.tmproj.ru
      host 10.0.0.6
      object network Cisco2911
      host 192.168.10.1
      object network vpn-network
      subnet 192.168.5.0 255.255.255.0
      object network outside_ip
      host 192.168.10.2
      object-group service DM_INLINE_TCP_1 tcp
      port-object eq 587
      port-object eq 993
      port-object eq https
      port-object eq smtp
      object-group service DM_INLINE_SERVICE_1
      service-object tcp destination eq 10011
      service-object tcp destination eq 2008
      service-object tcp destination eq 30033
      service-object tcp destination eq 41144
      service-object tcp destination eq ssh
      service-object udp destination eq 2010
      service-object udp destination eq 30033
      service-object udp destination eq 9987
      object-group network TMP_NETWORKS
      network-object 10.0.0.0 255.255.248.0
      network-object 172.0.0.0 255.255.255.0
      object-group service DM_INLINE_SERVICE_2
      service-object icmp echo
      service-object icmp echo-reply
      service-object icmp unreachable
      service-object tcp destination eq www
      service-object tcp destination eq ssh
      object-group service DM_INLINE_SERVICE_3
      service-object tcp destination eq 20443
      service-object udp destination eq 4500
      service-object udp destination eq isakmp
      service-object udp destination eq 10000
      service-object icmp
      service-object udp destination eq echo
      service-object icmp echo-reply
      service-object icmp information-reply
      service-object icmp information-request
      access-list ADMIN extended permit ip 10.0.0.0 255.255.248.0 any
      access-list ADMIN remark any any
      access-list ADMIN extended deny ip any any
      access-list outside_access_in extended permit ip any any
      access-list outside_access_in extended permit ip 192.168.10.0 255.255.255.252 any
      access-list outside_access_in remark permit from outside to mail.tmproj.ru
      access-list outside_access_in extended permit tcp any object mail.tmproj.ru object-group DM_INLINE_TCP_1
      access-list outside_access_in extended permit tcp any object Synology eq 5006
      access-list outside_access_in remark permit from ouside to Ivan-server
      access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any object Ivan-Server
      access-list outside_access_in remark permit from outside for Nagios-server
      access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 any object Nagios-server
      access-list outside_access_in extended permit tcp any object syslog-serv.tmproj.ru eq 59000
      access-list outside_access_in remark syslog-server trafic
      access-list outside_access_in extended permit udp object Cisco2911 object syslog-serv.tmproj.ru eq syslog
      access-list outside_access_in remark Permit port for VPN
      access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_3 any object outside_ip
      access-list outside_access_in extended deny ip any any
      access-list inside1_access_in remark permit any any
      access-list inside1_access_in extended permit ip 172.0.0.0 255.255.255.0 any
      access-list inside1_access_in remark deny any any
      access-list inside1_access_in extended deny ip any any
      access-list global_access remark permit any any
      access-list global_access extended permit ip any any inactive
      access-list dmz_access_in extended permit ip any any
      access-list dmz_access_in remark deny any any
      access-list dmz_access_in extended deny ip any any
      access-list inside10_access_in remark permit any any
      access-list inside10_access_in extended permit ip any any log disable inactive
      access-list inside10_access_in extended permit ip 10.0.0.0 255.255.248.0 any log disable
      access-list inside10_access_in remark deny any any
      access-list inside10_access_in extended deny ip any any
      access-list inside11_access_in remark permit any any
      access-list inside11_access_in extended permit ip any any inactive
      access-list inside11_access_in extended permit ip 172.0.0.0 255.255.255.0 any log disable
      access-list inside11_access_in remark deny any any
      access-list inside11_access_in extended deny ip any any
      access-list inside_access_in remark permit any any
      access-list inside_access_in extended permit ip any any log disable
      access-list inside_access_in remark deny any any
      access-list inside_access_in extended deny ip any any
      access-list inside5_access_in extended permit ip any any
      pager lines 24
      logging enable
      logging timestamp
      logging console warnings
      logging monitor alerts
      logging buffered informational
      logging asdm warnings
      logging debug-trace
      logging class auth trap emergencies
      mtu dmz 1500
      mtu outside 1500
      mtu inside 1500
      mtu inside10 1500
      mtu inside11 1500
      mtu management 1500
      mtu inside5 1500
      ip verify reverse-path interface dmz
      ip verify reverse-path interface outside
      ip verify reverse-path interface inside
      ip verify reverse-path interface management
      ip audit name 1 attack action alarm drop
      ip audit interface outside 1
      ip audit info action alarm drop
      no failover
      icmp unreachable rate-limit 1 burst-size 1
      icmp permit any echo outside
      icmp permit any echo inside10
      icmp permit any echo inside11
      asdm image disk0:/asdm-722.bin
      asdm history enable
      arp timeout 14400
      no arp permit-nonconnected
      access-group dmz_access_in in interface dmz
      access-group outside_access_in in interface outside
      access-group inside_access_in in interface inside
      access-group inside10_access_in in interface inside10
      access-group inside11_access_in in interface inside11
      access-group inside5_access_in in interface inside5
      access-group global_access global
      route outside 0.0.0.0 0.0.0.0 192.168.10.1 1
      timeout xlate 3:00:00
      timeout pat-xlate 0:00:30
      timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
      timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
      timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
      timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
      timeout tcp-proxy-reassembly 0:01:00
      timeout floating-conn 0:00:00
      ldap attribute-map tmp_ldap
        map-name  memberOf IETF-Radius-Class
      dynamic-access-policy-record DfltAccessPolicy
      aaa-server tmp_ldap protocol ldap
      max-failed-attempts 5
      aaa-server tmp_ldap (inside10) host 10.0.0.10
      timeout 20
      server-port 3268
      ldap-base-dn dc=tmproj,dc=ru
      ldap-scope subtree
      ldap-naming-attribute sAMAccountName
      ldap-login-password ****************
      ldap-login-dn cn=tonica,ou=otdel_it,ou=tmp_all,dc=tmproj,dc=ru
      server-type auto-detect
      ldap-attribute-map tmp_ldap
      user-identity default-domain LOCAL
      aaa authentication http console LOCAL
      aaa authentication enable console LOCAL
      aaa authentication ssh console LOCAL
      aaa authentication telnet console LOCAL
      aaa authorization exec LOCAL
      http server enable
      http 192.168.1.0 255.255.255.0 management
      http 192.168.4.0 255.255.255.0 management
      http 10.0.0.0 255.255.248.0 inside10
      no snmp-server location
      no snmp-server contact
      crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
      crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
      crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
      crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
      crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
      crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
      crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
      crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
      crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
      crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
      crypto ipsec ikev2 ipsec-proposal AES256
      protocol esp encryption aes-256
      protocol esp integrity sha-1 md5
      crypto ipsec ikev2 ipsec-proposal AES192
      protocol esp encryption aes-192
      protocol esp integrity sha-1 md5
      crypto ipsec ikev2 ipsec-proposal AES
      protocol esp encryption aes
      protocol esp integrity sha-1 md5
      crypto ipsec ikev2 ipsec-proposal 3DES
      protocol esp encryption 3des
      protocol esp integrity sha-1 md5
      crypto ipsec ikev2 ipsec-proposal DES
      protocol esp encryption des
      protocol esp integrity sha-1 md5
      crypto ipsec security-association pmtu-aging infinite
      crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
      crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
      crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
      crypto map outside_map interface outside
      crypto map inside10_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
      crypto map inside10_map interface inside10
      crypto map inside5_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
      crypto map inside5_map interface inside5
      crypto ca trustpoint TMPVPN
      enrollment self
      fqdn vpn.tmproj.ru
      subject-name CN=TMPROJ
      proxy-ldc-issuer
      crl configure
      crypto ca trustpoint asa.tmproj.ru
      enrollment self
      subject-name CN=asa,OU=IT,O=Transmashproekt OAO,C=RU,St=RUSSIA,L=R
      ip-address 10.0.0.10
      proxy-ldc-issuer
      crl configure
      crypto ca trustpool policy
      crypto ca certificate chain TMPVPN
      certificate 0e1d9653
          3082023a 308201a3 a0030201 0202040e 1d965330 0d06092a 864886f7 0d010105
          0500302f 310f300d 06035504 03130654 4d50524f 4a311c30 1a06092a 864886f7
          0d010902 160d7670 6e2e746d 70726f6a 2e727530 1e170d31 34303631 37313232
          3930385a 170d3234 30363134 31323239 30385a30 2f310f30 0d060355 04031306
          544d5052 4f4a311c 301a0609 2a864886 f70d0109 02160d76 706e2e74 6d70726f
          6a2e7275 30819f30 0d06092a 864886f7 0d010101 05000381 8d003081 89028181
          00b091fa b04b6668 23569756 8fad5777 d68d6f42 eac776d7 1bc076e7 ba9797dc
          e4dd12a4 a5f6a100 a87d9527 f7d517c7 06765b0e 88181fae dbe84cbd 1035f840
          09b765dd 1f887ab5 53eee6b5 c1caaa59 c8eb79e3 986f1175 ece14a55 e11ffdf6
          a652d950 1aa2c3fe c0d8637e abda5a59 2a5c3331 fe17759d d1e38dd7 3fb20a27
          d1020301 0001a363 3061300f 0603551d 130101ff 04053003 0101ff30 0e060355
          1d0f0101 ff040403 02018630 1f060355 1d230418 30168014 7248fb78 466f3cd7
          da4bbdb7 229aec8f 30560739 301d0603 551d0e04 16041472 48fb7846 6f3cd7da
          4bbdb722 9aec8f30 56073930 0d06092a 864886f7 0d010105 05000381 810011b1
          d1ff439a 2e671c9a de8dff86 738f1445 386ef2a6 5747633e 3479f76e 50d0b2ec
          23176df4 0d6c6582 0bdff8e6 b1a3592d b5c4b87c 38b0cd1b b150cd7c 82f4c017
          32a884e7 f133bfa4 7b91487a 041bf8c5 dd68c659 98a7f72c b02905f0 94d4e695
          3ad77932 391fa838 b02804f9 a8b11494 217471db 55478a12 1343646b ffeb
        quit
      crypto ca certificate chain asa.tmproj.ru
      certificate 101d9653
          30820310 30820279 a0030201 02020410 1d965330 0d06092a 864886f7 0d010105
          05003081 99310a30 08060355 04071301 52310f30 0d060355 04081306 52555353
          4941310b 30090603 55040613 02525531 1c301a06 0355040a 13135472 616e736d
          61736870 726f656b 74204f41 4f310b30 09060355 040b1302 4954310c 300a0603
          55040313 03617361 31343016 06092a86 4886f70d 01090813 0931302e 302e302e
          3130301a 06092a86 4886f70d 01090216 0d415341 2e746d70 726f6a2e 7275301e
          170d3134 30363137 31333134 32385a17 0d323430 36313431 33313432 385a3081
          99310a30 08060355 04071301 52310f30 0d060355 04081306 52555353 4941310b
          30090603 55040613 02525531 1c301a06 0355040a 13135472 616e736d 61736870
          726f656b 74204f41 4f310b30 09060355 040b1302 4954310c 300a0603 55040313
          03617361 31343016 06092a86 4886f70d 01090813 0931302e 302e302e 3130301a
          06092a86 4886f70d 01090216 0d415341 2e746d70 726f6a2e 72753081 9f300d06
          092a8648 86f70d01 01010500 03818d00 30818902 818100b0 91fab04b 66682356
          97568fad 5777d68d 6f42eac7 76d71bc0 76e7ba97 97dce4dd 12a4a5f6 a100a87d
          9527f7d5 17c70676 5b0e8818 1faedbe8 4cbd1035 f84009b7 65dd1f88 7ab553ee
          e6b5c1ca aa59c8eb 79e3986f 1175ece1 4a55e11f fdf6a652 d9501aa2 c3fec0d8
          637eabda 5a592a5c 3331fe17 759dd1e3 8dd73fb2 0a27d102 03010001 a3633061
          300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f 0101ff04 04030201
          86301f06 03551d23 04183016 80147248 fb78466f 3cd7da4b bdb7229a ec8f3056
          0739301d 0603551d 0e041604 147248fb 78466f3c d7da4bbd b7229aec 8f305607
          39300d06 092a8648 86f70d01 01050500 03818100 45888fc2 b0baec53 d0e33e8d
          6ff443e1 9d056c50 78c8f6b5 1e2c217c 204738a9 1b688a23 4ec1a9b9 68e3934b
          d70a034c ba9d7eec 7337bda9 57f6675b da621d69 e1abac99 6c3243f4 d2db49da
          43ebd8fe 2e1633a1 28108e59 ef91e622 d496e039 f871964f fb90f66d a6eccf4b
          397ea005 6f4731d8 48474811 77ed3b8b 507a9996
        quit
      crypto ikev2 policy 1
      encryption aes-256
      integrity sha
      group 5 2
      prf sha
      lifetime seconds 86400
      crypto ikev2 policy 10
      encryption aes-192
      integrity sha
      group 5 2
      prf sha
      lifetime seconds 86400
      crypto ikev2 policy 20
      encryption aes
      integrity sha
      group 5 2
      prf sha
      lifetime seconds 86400
      crypto ikev2 policy 30
      encryption 3des
      integrity sha
      group 5 2
      prf sha
      lifetime seconds 86400
      crypto ikev2 policy 40
      encryption des
      integrity sha
      group 5 2
      prf sha
      lifetime seconds 86400
      crypto ikev2 enable outside client-services port 20443
      crypto ikev2 enable inside10 client-services port 20443
      crypto ikev2 enable inside5 client-services port 20443
      crypto ikev2 remote-access trustpoint asa.tmproj.ru
      crypto ikev1 enable outside
      crypto ikev1 enable inside10
      crypto ikev1 policy 10
      authentication crack
      encryption aes-256
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 20
      authentication rsa-sig
      encryption aes-256
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 30
      authentication pre-share
      encryption aes-256
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 40
      authentication crack
      encryption aes-192
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 50
      authentication rsa-sig
      encryption aes-192
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 60
      authentication pre-share
      encryption aes-192
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 70
      authentication crack
      encryption aes
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 80
      authentication rsa-sig
      encryption aes
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 90
      authentication pre-share
      encryption aes
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 100
      authentication crack
      encryption 3des
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 110
      authentication rsa-sig
      encryption 3des
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 120
      authentication pre-share
      encryption 3des
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 130
      authentication crack
      encryption des
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 140
      authentication rsa-sig
      encryption des
      hash sha
      group 2
      lifetime 86400
      crypto ikev1 policy 150
      authentication pre-share
      encryption des
      hash sha
      group 2
      lifetime 86400
      telnet timeout 5
      ssh stricthostkeycheck
      ssh 10.0.0.0 255.255.248.0 inside10
      ssh 172.0.0.0 255.255.255.0 inside11
      ssh timeout 60
      ssh version 2
      ssh key-exchange group dh-group1-sha1
      console timeout 0
      no ipv6-vpn-addr-assign aaa
      no ipv6-vpn-addr-assign local
      dhcpd dns 8.8.8.8 8.8.4.4
      dhcpd lease 604800
      !
      dhcpd address 172.0.0.100-172.0.0.150 inside11
      dhcpd dns 8.8.8.8 8.8.4.4 interface inside11
      dhcpd lease 604800 interface inside11
      dhcpd option 3 ip 172.0.0.1 interface inside11
      dhcpd option 7 ip 10.0.0.6 interface inside11
      dhcpd enable inside11
      !
      threat-detection basic-threat
      threat-detection scanning-threat
      threat-detection statistics
      threat-detection statistics tcp-intercept rate-interval 1200 burst-rate 1900 average-rate 1600
      dynamic-filter updater-client enable
      dynamic-filter use-database
      dynamic-filter enable interface dmz
      dynamic-filter enable interface outside
      dynamic-filter enable interface inside
      dynamic-filter enable interface inside10
      dynamic-filter enable interface inside11
      dynamic-filter drop blacklist interface outside threat-level range very-low very-high
      dynamic-filter drop blacklist interface inside10 threat-level range high very-high
      dynamic-filter drop blacklist interface inside11 threat-level range very-low very-high
      dynamic-filter ambiguous-is-black
      dynamic-filter whitelist
      name nnm-club.me
      name www.ulmart.ru
      address 10.0.0.8 255.255.255.255
      address 10.0.0.11 255.255.255.255
      address 10.0.0.10 255.255.255.255
      name urod.ru
      name fontanka.ru
      dynamic-filter blacklist
      name palevo.com
      ntp server 10.0.0.10 source inside10
      ssl encryption 3des-sha1 aes128-sha1 aes256-sha1
      ssl trust-point asa.tmproj.ru inside5
      ssl trust-point asa.tmproj.ru outside
      ssl trust-point asa.tmproj.ru inside10
      webvpn
      port 20443
      enable outside
      enable inside10
      enable inside5
      dtls port 20443
      anyconnect-essentials
      anyconnect image disk0:/anyconnect-win-3.1.05170-k9.pkg 1
      anyconnect profiles vpn_anyconnect_client_profile disk0:/vpn_anyconnect_client_profile.xml
      anyconnect enable
      tunnel-group-list enable
      group-policy DfltGrpPolicy attributes
      wins-server value 10.0.0.10
      dns-server value 10.0.0.10 10.0.0.11
      vpn-tunnel-protocol ikev2 ssl-clientless
      default-domain value tmproj.ru
      group-policy GroupPolicy_vpn_anyconnect internal
      group-policy GroupPolicy_vpn_anyconnect attributes
      wins-server value 10.0.0.10
      dns-server value 10.0.0.10 10.0.0.11
      vpn-tunnel-protocol ikev1 ikev2
      default-domain value tmproj.ru
      webvpn
        anyconnect profiles value vpn_anyconnect_client_profile type user
      username tonica password XXXXXXXXXXX encrypted privilege 15
      username alterego password XXXXXXXXXXXXXX encrypted privilege 15
      tunnel-group vpn_anyconnect type remote-access
      tunnel-group vpn_anyconnect general-attributes
      address-pool (inside10) vpn_ip_pool
      address-pool vpn_ip_pool
      authentication-server-group tmp_ldap
      default-group-policy GroupPolicy_vpn_anyconnect
      nat-assigned-to-public-ip outside
      tunnel-group vpn_anyconnect webvpn-attributes
      group-alias vpn_anyconnect enable
      !
      class-map inside10-class
      match default-inspection-traffic
      class-map inside11-class
      match any
      class-map inspection_default
      match default-inspection-traffic
      class-map inside11-class1
      match default-inspection-traffic
      !
      !
      policy-map type inspect dns preset_dns_map
      parameters
        message-length maximum client auto
        message-length maximum 512
        id-randomization
        id-mismatch action log
        tsig enforced action log
      policy-map global_policy
      class inspection_default
        inspect ftp
        inspect h323 h225
        inspect h323 ras
        inspect rsh
        inspect rtsp
        inspect esmtp
        inspect sqlnet
        inspect skinny
        inspect sunrpc
        inspect xdmcp
        inspect sip
        inspect netbios
        inspect tftp
        inspect ip-options
        inspect dns preset_dns_map dynamic-filter-snoop
      class class-default
        user-statistics accounting
      policy-map inside10-policy
      class inside10-class
        inspect esmtp
        inspect ftp
        inspect http
        inspect dns dynamic-filter-snoop
        inspect icmp
        inspect icmp error
        inspect ip-options
        inspect ils
      policy-map type inspect gtp default_gtp_map
      parameters
      policy-map inside11-policy
      class inside11-class
        inspect tftp
      class inside11-class1
        inspect ctiqbe
        inspect dcerpc
        inspect esmtp
        inspect ftp
        inspect gtp default_gtp_map
        inspect h323 h225
        inspect h323 ras
        inspect http
        inspect icmp
        inspect icmp error
        inspect ils
        inspect ip-options
        inspect ipsec-pass-thru
        inspect mgcp
        inspect netbios
        inspect pptp
        inspect rsh
        inspect rtsp
        inspect sip
        inspect skinny
        inspect snmp
        inspect sqlnet
        inspect sunrpc
        inspect tftp
        inspect waas
        inspect xdmcp
        inspect dns dynamic-filter-snoop
      !
      service-policy global_policy global
      service-policy inside10-policy interface inside10
      service-policy inside11-policy interface inside11
      prompt hostname context
      no call-home reporting anonymous
      hpm topN enable
      Cryptochecksum:4d447f490c9370538dc74393b4642b1b
      : end




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру