>мне, уважаемый есть что сказать всегда, вопросы надо задавать по-человечески, а не
>как вам угодно
>другого пикса конфиг покажите? и насчет схемы по-подробней, а то не совсем ясно...
Конфиг другого пикса имеет смысл показывать совместно еще с одним, между ними настроен VPN, соединяющий две подсетки.
Схема сетки достаточно простая:
Инет - Сетка провайдера - PIX-INET - Сетка 2 - PIX-KBI <= VPN => PIX-ABK - Сетка 1
Сетка провайдера - 192.168.100.0, gate в Инет - 192.168.100.1
Сетка 2 - 192.168.2.0
Сетка 1 - 192.168.1.0
Туннель VPN проходит через сеть сторонней организации, адреса интерфейсов на пиксах
PIX-ABK - 194.84.17.202
PIX-KBI - 194.84.17.210
оборудование:
PIX-INET - Cisco PIX 501 3DES Bundle (10 Users)
PIX-KBI - Cisco PIX 501 3DES Bundle (50 Users)
PIX-ABK - Cisco PIX 515R DMZ Bundle
************* Config PIX-KBI: *******************
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname PIX-KBI
names
access-list 2201 permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
interface ethernet0 10baset
interface ethernet1 10full
ip address outside 194.84.17.210 255.255.255.248
ip address inside 192.168.2.201 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.1.0 255.255.255.0 outside
pdm location 194.84.17.202 255.255.255.255 outside
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list 2201
route outside 192.168.1.0 255.255.255.0 194.84.17.209 1
route outside 194.84.17.202 255.255.255.255 194.84.17.209 1
timeout xlate 0:05:00
http server enable
http 192.168.2.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set chevelle esp-des esp-md5-hmac
crypto map transam 1 ipsec-isakmp
crypto map transam 1 match address 2201
crypto map transam 1 set peer 194.84.17.202
crypto map transam 1 set transform-set chevelle
crypto map transam interface outside
isakmp enable outside
isakmp key ******** address 194.84.17.202 netmask 255.255.255.255
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
telnet 192.168.1.0 255.255.255.0 outside
telnet 192.168.2.0 255.255.255.0 inside
dhcpd dns 192.168.1.201
dhcpd wins 192.168.2.1
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain domainkbi
dhcpd auto_config outside
************* Config PIX-ABK: *******************
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
hostname PIX-ABK
names
access-list 1201 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto shutdown
ip address outside 194.84.17.202 255.255.255.248
ip address inside 192.168.1.202 255.255.255.0
ip address intf2 127.0.0.1 255.255.255.255
ip verify reverse-path interface outside
ip audit info action alarm
ip audit attack action alarm
pdm location 192.168.2.0 255.255.255.0 outside
pdm history enable
global (outside) 1 interface
nat (inside) 0 access-list 1201
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 194.84.17.201 1
route outside 192.168.2.0 255.255.255.0 194.84.17.201 1
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set toyota esp-des esp-md5-hmac
crypto map bmw 1 ipsec-isakmp
crypto map bmw 1 match address 1201
crypto map bmw 1 set peer 194.84.17.210
crypto map bmw 1 set transform-set toyota
crypto map bmw interface outside
isakmp enable outside
isakmp key ******** address 194.84.17.210 netmask 255.255.255.255
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000
telnet 192.168.2.0 255.255.255.0 outside
telnet 192.168.1.0 255.255.255.0 inside