Ciao a tutti,
ho bisogno di aiuto per configurare una vpn su un pix 515e aggiornato alla 7.0(4). Il firewall è dietro un router cisco 827 con software 12.0 ed ho a disposizione solo l'ip pubblico del router, sul quale quindi devo impostare il nat per raggiungere il pix. Qualcuno può aiutarmi in questa configurazione?
Grazie
Configurazione Nat o Pat
Moderatore: Federico.Lagni
- TheIrish
- Site Admin
- Messaggi: 1840
- Iscritto il: dom 14 mar , 2004 11:26 pm
- Località: Udine
- Contatta:
Sui PIX sei completamente a secco? In tal caso dovresti provare ad acquisire qualche base minimale, altrimenti la comunicazione diventa veramente complicata.
E del router? Come sei messo con IOS?
Nel caso in cui tu abbia provato a configurare qualcosa, ci fai vedere cos'hai fatto (per evitare lungaggini su cose che già sai)?
E del router? Come sei messo con IOS?
Nel caso in cui tu abbia provato a configurare qualcosa, ci fai vedere cos'hai fatto (per evitare lungaggini su cose che già sai)?
-
- Cisco fan
- Messaggi: 36
- Iscritto il: ven 29 set , 2006 10:56 am
Ciao e scusa se non l'ho messa prima la config. Sui pix non sono proprio a zero ma sono comunque inesperto. Ti ringrazio per qualsiasi aiuto tu voglia darmi.
Questa è la configurazione del router
Building configuration...
Current configuration:
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname Anubi
!
enable password 7 14151D050502232825
!
username Administrator password 7 08234340001F0C1413
!
!
!
!
clock timezone Roma 1
ip subnet-zero
no ip source-route
no ip finger
ip domain-name isnet.it
ip name-server 151.99.125.2
ip name-server 151.99.125.3
ip name-server 213.88.96.8
!
!
!
!
interface Ethernet0
ip address 192.168.5.1 255.255.255.0
ip nat inside
!
interface ATM0
no ip address
load-interval 30
timeout absolute 35790 0
no atm ilmi-keepalive
bundle-enable
dsl operating-mode auto
hold-queue 224 in
!
interface ATM0.1 point-to-point
bandwidth 640
ip address 81.73.111.114 255.255.255.0
ip nat outside
timeout absolute 35790 0
pvc 8/35
encapsulation aal5snap
!
!
ip nat inside source list 101 interface ATM0.1 overload
ip nat inside source static tcp 192.168.5.2 4500 interface ATM0.1 4500
ip nat inside source static tcp 192.168.5.2 10000 interface ATM0.1 10000
ip classless
ip route 0.0.0.0 0.0.0.0 81.73.111.254
no ip http server
!
access-list 101 permit tcp any host 192.168.5.2 eq www
banner motd ^CBenvenuto su Anubi^C
!
line con 0
exec-timeout 120 0
transport input none
stopbits 1
line vty 0 4
exec-timeout 0 0
login local
scheduler max-task-time 5000
end
Questa è quella del pix
PIX Version 7.0(4)
!
hostname Ra
domain-name cbc
enable password 2KFQnbNIdI.2KYOU encrypted
names
name 85.39.124.98 cerbero
!
interface Ethernet0
nameif outside
security-level 0
ip address 192.168.5.2 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.1.210 255.255.255.0
!
interface Ethernet2
shutdown
nameif intf2
security-level 4
no ip address
passwd 2KFQnbNIdI.2KYOU encrypted
boot system flash:/pix704.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
access-list inside_nat0_outbound extended permit ip any 192.168.1.192 255.255.255.224
access-list outside_cryptomap_dyn_20 extended permit ip any 192.168.1.192 255.255.255.224
access-list outside_cryptomap_dyn_40 extended permit ip any 192.168.1.192 255.255.255.224
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip local pool poolvpn 192.168.1.205-192.168.1.209 mask 255.255.255.0
ERROR: Command requires failover license
ERROR: Command requires failover license
asdm image flash:/asdm504.bin
asdm history enable
arp timeout 14400
nat-control
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 0 0.0.0.0 0.0.0.0
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
group-policy vpngroup internal
username admin password f3UhLvUj1QsXsuK7 encrypted privilege 15
username administrator nopassword privilege 0
username administrator attributes
vpn-group-policy vpngroup
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.1.52 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp enable inside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
isakmp policy 65535 authentication pre-share
isakmp policy 65535 encryption des
isakmp policy 65535 hash sha
isakmp policy 65535 group 2
isakmp policy 65535 lifetime 86400
tunnel-group tunnelvpn type ipsec-ra
tunnel-group tunnelvpn general-attributes
address-pool poolvpn
tunnel-group tunnelvpn ipsec-attributes
pre-shared-key *
telnet 192.168.1.52 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
ssh version 1
console timeout 0
dhcpd address 192.168.1.42-192.168.1.43 inside
dhcpd lease 3600
dhcpd ping_timeout 750
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect http
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:1d3e1740cf5fa7ac4851cc6b57108ba1
: end
Questa è la configurazione del router
Building configuration...
Current configuration:
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname Anubi
!
enable password 7 14151D050502232825
!
username Administrator password 7 08234340001F0C1413
!
!
!
!
clock timezone Roma 1
ip subnet-zero
no ip source-route
no ip finger
ip domain-name isnet.it
ip name-server 151.99.125.2
ip name-server 151.99.125.3
ip name-server 213.88.96.8
!
!
!
!
interface Ethernet0
ip address 192.168.5.1 255.255.255.0
ip nat inside
!
interface ATM0
no ip address
load-interval 30
timeout absolute 35790 0
no atm ilmi-keepalive
bundle-enable
dsl operating-mode auto
hold-queue 224 in
!
interface ATM0.1 point-to-point
bandwidth 640
ip address 81.73.111.114 255.255.255.0
ip nat outside
timeout absolute 35790 0
pvc 8/35
encapsulation aal5snap
!
!
ip nat inside source list 101 interface ATM0.1 overload
ip nat inside source static tcp 192.168.5.2 4500 interface ATM0.1 4500
ip nat inside source static tcp 192.168.5.2 10000 interface ATM0.1 10000
ip classless
ip route 0.0.0.0 0.0.0.0 81.73.111.254
no ip http server
!
access-list 101 permit tcp any host 192.168.5.2 eq www
banner motd ^CBenvenuto su Anubi^C
!
line con 0
exec-timeout 120 0
transport input none
stopbits 1
line vty 0 4
exec-timeout 0 0
login local
scheduler max-task-time 5000
end
Questa è quella del pix
PIX Version 7.0(4)
!
hostname Ra
domain-name cbc
enable password 2KFQnbNIdI.2KYOU encrypted
names
name 85.39.124.98 cerbero
!
interface Ethernet0
nameif outside
security-level 0
ip address 192.168.5.2 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.1.210 255.255.255.0
!
interface Ethernet2
shutdown
nameif intf2
security-level 4
no ip address
passwd 2KFQnbNIdI.2KYOU encrypted
boot system flash:/pix704.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
access-list inside_nat0_outbound extended permit ip any 192.168.1.192 255.255.255.224
access-list outside_cryptomap_dyn_20 extended permit ip any 192.168.1.192 255.255.255.224
access-list outside_cryptomap_dyn_40 extended permit ip any 192.168.1.192 255.255.255.224
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip local pool poolvpn 192.168.1.205-192.168.1.209 mask 255.255.255.0
ERROR: Command requires failover license
ERROR: Command requires failover license
asdm image flash:/asdm504.bin
asdm history enable
arp timeout 14400
nat-control
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 0 0.0.0.0 0.0.0.0
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
group-policy vpngroup internal
username admin password f3UhLvUj1QsXsuK7 encrypted privilege 15
username administrator nopassword privilege 0
username administrator attributes
vpn-group-policy vpngroup
http server enable
http 192.168.1.0 255.255.255.0 inside
http 192.168.1.52 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server community public
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
isakmp enable outside
isakmp enable inside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
isakmp policy 65535 authentication pre-share
isakmp policy 65535 encryption des
isakmp policy 65535 hash sha
isakmp policy 65535 group 2
isakmp policy 65535 lifetime 86400
tunnel-group tunnelvpn type ipsec-ra
tunnel-group tunnelvpn general-attributes
address-pool poolvpn
tunnel-group tunnelvpn ipsec-attributes
pre-shared-key *
telnet 192.168.1.52 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
ssh version 1
console timeout 0
dhcpd address 192.168.1.42-192.168.1.43 inside
dhcpd lease 3600
dhcpd ping_timeout 750
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect http
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:1d3e1740cf5fa7ac4851cc6b57108ba1
: end