slechЦитата: через ASDM не пробовал настраивать ?
Это первое что попробовал. Когда не заработало, начал колупать из консоли.
ESX091Цитата: покажите конфиги, которые сейчас не работают.
[more=gades]!
ASA Version 8.2(1)
!
hostname gades
domain-name office.local
enable password <removed> encrypted
passwd <removed> encrypted
names
name 192.168.100.2 iWINROUTE
name 62.y.y.y eGADES
name 192.168.100.1 iGADES
name 192.168.100.76 iVOICEGW
!
interface Vlan1
nameif inside
security-level 100
ip address iGADES 255.255.255.0
!
interface Vlan10
nameif outside
security-level 0
ip address eGADES 255.255.255.252
!
interface Vlan99
no nameif
no security-level
ip address 192.168.255.1 255.255.255.0
management-only
!
interface Ethernet0/0
!
interface Ethernet0/1
switchport access vlan 10
!
interface Ethernet0/2
shutdown
!
interface Ethernet0/3
shutdown
!
interface Ethernet0/4
shutdown
!
interface Ethernet0/5
shutdown
!
interface Ethernet0/6
!
interface Ethernet0/7
switchport access vlan 99
!
banner login -----------------------------------------------------------------------------
banner login WARNING: This is a restricted access system. If you do not have explicit
banner login permission to access this system, please disconnect immediately!
banner login -----------------------------------------------------------------------------
ftp mode passive
clock timezone MSK/MSD 3
clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
domain-name spb.pc-energo
object-group service to_winroute_tcp tcp
port-object range ftp-data ftp
object-group network NET_HQ
network-object 80.x.x.0 255.255.255.240
object-group service ipsec
service-object gre
service-object esp
service-object ah
service-object udp eq isakmp
service-object udp eq 4500
object-group service voice_tcp-udp
service-object udp eq 1718
service-object udp eq 1719
service-object tcp eq h323
service-object tcp eq 1731
access-list inside_nat extended permit gre host iWINROUTE any
access-list inside_nat extended permit ip host iWINROUTE any
access-list inside_nat extended permit icmp host iWINROUTE any
access-list inside_nat extended permit ip host iVOICEGW object-group NET_HQ
access-list from_inside extended permit gre host iWINROUTE any
access-list from_inside extended permit ip host iWINROUTE any
access-list from_inside extended permit icmp host iWINROUTE any
access-list from_inside extended permit ip host iVOICEGW object-group NET_HQ
access-list from_outside extended permit icmp any any echo-reply
access-list from_outside extended permit tcp any interface outside object-group to_winroute_tcp
access-list from_outside extended permit icmp any any source-quench
access-list from_outside extended permit icmp any any unreachable
access-list from_outside extended permit icmp any any time-exceeded
access-list from_outside extended permit object-group voice_tcp-udp object-group NET_HQ interface outside
access-list from_outside extended permit icmp any any
access-list 100 extended permit ip 192.168.100.0 255.255.255.0 172.16.0.0 255.240.0.0
access-list 101 extended permit ah any any
access-list 101 extended permit esp any any
access-list 101 extended permit udp any any eq isakmp
access-list 101 extended permit udp any any eq 4500
access-list nonat extended permit ip 192.168.100.0 255.255.255.0 172.22.22.0 255.255.255.0
pager lines 24
logging enable
logging timestamp
logging buffer-size 128000
logging buffered debugging
logging trap informational
logging asdm warnings
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
no asdm history enable
arp timeout 14400
global (outside) 10 interface
nat (inside) 0 access-list nonat
nat (inside) 10 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface ftp-data iWINROUTE ftp-data netmask 255.255.255.255
static (inside,outside) tcp interface ftp iWINROUTE ftp netmask 255.255.255.255
static (inside,outside) udp interface 1718 iVOICEGW 1718 netmask 255.255.255.255
static (inside,outside) udp interface 1719 iVOICEGW 1719 netmask 255.255.255.255
static (inside,outside) tcp interface h323 iVOICEGW h323 netmask 255.255.255.255
static (inside,outside) tcp interface 1731 iVOICEGW 1731 netmask 255.255.255.255
access-group from_inside in interface inside
access-group from_outside in interface outside
route outside 0.0.0.0 0.0.0.0 62.y.y.y 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication enable console LOCAL
http server enable
http server idle-timeout 15
http server session-timeout 30
http 80.x.x.0 255.255.255.240 outside
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address 100
crypto map outside_map 1 set peer 80.x.x.3
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 43200
crypto isakmp policy 10
authentication pre-share
encryption aes
hash sha
group 5
lifetime 86400
crypto isakmp policy 30
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
crypto isakmp policy 50
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 65535
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto isakmp am-disable
crypto isakmp disconnect-notify
telnet 0.0.0.0 0.0.0.0 inside
telnet 80.x.x.0 255.255.255.240 outside
telnet timeout 10
ssh scopy enable
ssh 0.0.0.0 0.0.0.0 inside
ssh 80.x.x.0 255.255.255.240 outside
ssh timeout 10
ssh version 2
console timeout 30
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username radmin password <removed> encrypted privilege 15
tunnel-group 80.x.x.3 type ipsec-l2l
tunnel-group 80.x.x.3 ipsec-attributes
pre-shared-key 121314
peer-id-validate nocheck
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 1024
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:6507bd86a5866b0c048f503ce9c8beeb
: end[/more]
[more=guard]!
ASA Version 8.2(1)
!
hostname guard
domain-name local.tld
enable password <removed> encrypted
passwd <removed> encrypted
names
name 80.x.x.5 eCGP
name 10.20.0.2 iCGP
name 80.x.x.3 eGUARD
name 172.22.12.200 iCASABLANKA
name 172.22.12.110 iPIXIE
name 172.22.10.126 PRINTER1
name 172.22.0.1 LAN_GATEWAY
name 172.16.0.1 iGUARD
name 80.x.x.13 ePC1
name 10.20.0.101 iPC1
name 172.22.202.2 Loskutnikova
name 83.222.23.208 u43453.ftp.masterhost.ru
name 89.108.86.110 ftp.lenera.ru
name 10.20.0.4 iPOLYCOM
name 80.x.x.11 ePOLYCOM
name 172.22.12.207 iASY_ARCHIVE
name 83.x1.x1.x1 ASNTL
name 195.x2.x2.x2 VKS1
name 195.x3.x3.x3 VKS2
name 80.x4.x4.x4 VKS3
name 62.x5.x5.x5 VKS4
name 212.x6.x6.x6 VKS5
name 80.x.x.12 ePROJECT
name 172.22.12.214 iPROJECT
name 217.107.216.59 TAXCOM1
name 195.161.113.229 TAXCOM2
name 195.161.42.220 TAXCOM3
name 212.92.96.60 TAXCOM4
name 77.91.230.114 TAXCOM5
name 213.221.47.78 webtours.ru
name 172.17.10.11 iVOLANS
name 217.175.155.18 ticket.rzd.ru
name 80.x.x.4 IP4NAT-1
name 80.x.x.6 IP4NAT-2
name 80.x.x.7 IP4NAT-3
name 62.141.125.30 BR-SRV2
name 80.x.x.9 eVOICEGW
name 80.x.x.14 eKHRONOS
name 172.22.22.22 iKHRONOS
name 10.20.0.6 iVAULT2
name 80.x.x.8 eVAULT2
name 10.20.0.5 iVAULT-TEST
name 80.x.x.10 eVAULT-TEST
name 10.20.0.3 iVAULT
name 10.20.0.1 iDMZ
name 172.22.22.89 ETimonin
name 172.22.12.205 iACADLS
name 172.22.12.219 iMODELS
name 172.22.22.77 iVOICEGW
dns-guard
!
interface Ethernet0/0
nameif outside
security-level 0
ip address eGUARD 255.255.255.240
ospf cost 10
!
interface Ethernet0/1
speed 100
duplex full
nameif inside
security-level 100
ip address iGUARD 255.255.255.252
ospf cost 10
!
interface Ethernet0/2
nameif DMZ
security-level 60
ip address iDMZ 255.255.255.0
ospf cost 10
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
no nameif
no security-level
ip address 192.168.255.1 255.255.255.0
management-only
!
ftp mode passive
clock timezone MSK/MSD 3
clock summer-time MSK/MSD recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
domain-name office.local
object-group service to_mail tcp
port-object eq 993
port-object eq 9100
port-object eq 465
port-object eq 995
port-object eq smtp
port-object eq 9010
port-object eq pop3
port-object eq ldap
object-group service from_proxy_tcp tcp
port-object eq domain
port-object eq www
port-object eq https
port-object eq aol
port-object eq ftp-data
port-object eq ftp
port-object eq 9100
port-object eq 483
port-object eq 7771
port-object eq 7772
object-group service from_proxy_udp udp
port-object eq domain
port-object eq ntp
object-group network ISP_DNS
network-object host 80.x7.x7.x7
network-object host 80.x7.x7.x7
object-group service to_ftp tcp
port-object range ftp-data ftp
object-group network NET_MAIN
network-object 172.16.0.0 255.255.255.252
network-object 172.17.0.0 255.255.0.0
network-object 172.22.0.0 255.255.0.0
object-group network NET_DMZ
network-object 10.20.0.0 255.255.255.0
object-group network NET_ADMINS
network-object 172.22.22.0 255.255.255.0
object-group network MAIL_SERVERS
network-object host 213.180.204.37
network-object host 213.180.204.38
network-object host 213.180.193.24
network-object host 194.67.23.102
network-object host 194.67.23.220
object-group network TRUSTED_SERVERS
network-object host TAXCOM1
network-object host TAXCOM2
network-object host TAXCOM3
network-object host TAXCOM4
network-object host TAXCOM5
object-group network VKS_SERVERS
network-object host VKS1
network-object host VKS2
network-object host VKS3
network-object host VKS4
network-object host VKS5
object-group network NET-SUB1
network-object 172.17.201.0 255.255.255.0
object-group network NET_SUB2
network-object 172.17.202.0 255.255.255.0
object-group network WITHOUT_PROXY
network-object host 80.68.241.182
network-object host 80.68.246.56
object-group service voice_tcp-udp
service-object udp eq 1718
service-object udp eq 1719
service-object tcp eq h323
service-object tcp eq 1731
access-list from_outside extended permit tcp any host eCGP object-group to_mail
access-list from_outside extended permit icmp any any echo-reply
access-list from_outside extended permit tcp host eCGP host IP4NAT-1
access-list from_outside extended permit tcp object-group VKS_SERVERS host ePOLYCOM
access-list from_outside extended permit udp object-group VKS_SERVERS host ePOLYCOM
access-list from_outside extended permit tcp any host ePROJECT eq 17170
access-list from_outside extended permit tcp any host ePROJECT eq 17173
access-list from_outside extended permit tcp any host eCGP object-group to_ftp
access-list from_outside extended permit icmp any any source-quench
access-list from_outside extended permit icmp any any unreachable
access-list from_outside extended permit icmp any any time-exceeded
access-list from_outside extended permit object-group voice_tcp-udp host 62.y.y.y host eVOICEGW
access-list from_outside extended permit ip host 62.y.y.y host eVOICEGW
access-list from_inside extended permit ip host Loskutnikova any
access-list from_inside extended permit tcp object-group NET_MAIN host 62.y.y.y object-group to_ftp
access-list from_inside extended permit tcp object-group NET_MAIN host iVAULT eq 1433
access-list from_inside extended permit tcp object-group NET_MAIN host iVAULT2 eq 1433
access-list from_inside extended permit tcp host iPIXIE any object-group from_proxy_tcp
access-list from_inside extended permit udp host iPIXIE any object-group from_proxy_udp
access-list from_inside extended permit udp host iCASABLANKA any eq ntp
access-list from_inside extended permit tcp object-group NET_MAIN host 213.180.204.37 eq pop3
access-list from_inside extended permit udp object-group NET_MAIN object-group ISP_DNS eq domain
access-list from_inside extended permit ip object-group NET_ADMINS any
access-list from_inside extended permit tcp object-group NET_MAIN object-group NET_DMZ object-group to_mail
access-list from_inside extended permit gre object-group NET_ADMINS any
access-list from_inside extended permit icmp object-group NET_ADMINS any
access-list from_inside extended permit ip object-group NET_MAIN object-group NET_VPN
access-list from_inside extended permit tcp object-group NET_MAIN host eCGP object-group to_mail
access-list from_inside extended permit tcp host iACADLS host iCGP eq ssh
access-list from_inside extended permit tcp object-group NET_MAIN object-group TRUSTED_SERVERS
access-list from_inside extended permit tcp host iVOLANS any object-group from_proxy_tcp
access-list from_inside extended permit udp host iVOLANS any object-group from_proxy_udp
access-list from_inside extended permit tcp object-group NET_MAIN object-group NET_DMZ object-group to_ftp
access-list from_inside extended permit tcp object-group NET_MAIN host eCGP object-group to_ftp
access-list from_inside extended permit ip object-group NET-SUB1 any
access-list from_inside extended permit ip object-group NET_SUB2 any
access-list from_inside extended permit tcp object-group NET_MAIN object-group WITHOUT_PROXY
access-list from_inside extended permit tcp host iVOLANS host iCGP eq ssh
access-list from_inside extended permit ip host iMODELS any
access-list inside_nonat extended permit ip object-group NET_MAIN object-group NET_DMZ
access-list inside_nonat extended permit ip object-group NET_MAIN object-group NET_VPN
access-list inside_nonat extended permit ip object-group NET-SUB1 object-group NET_DMZ
access-list inside_nonat extended permit ip object-group NET_SUB2 object-group NET_DMZ
access-list inside_nonat extended permit ip 172.22.22.0 255.255.255.0 192.168.100.0 255.255.255.0
access-list inside_nat extended permit gre object-group NET_ADMINS any
access-list inside_nat extended permit ip object-group NET_ADMINS any
access-list inside_nat extended permit icmp object-group NET_ADMINS any
access-list inside_nat extended permit tcp host iPIXIE any
access-list inside_nat extended permit udp host iPIXIE any
access-list inside_nat extended permit udp host iCASABLANKA any
access-list inside_nat extended permit tcp host iVOLANS any
access-list inside_nat extended permit udp host iVOLANS any
access-list inside_nat extended permit ip object-group NET_MAIN any
access-list inside_nat extended permit ip host iMODELS any
access-list inside_nat_sub1 extended permit ip object-group NET-SUB1 any
access-list inside_nat_sub2 extended permit ip object-group NET_SUB2 any
access-list DMZ_nonat extended permit ip object-group NET_DMZ object-group NET_VPN
access-list DMZ_nonat extended permit ip object-group NET_DMZ object-group NET_MAIN
access-list DMZ_nonat extended permit ip object-group NET_DMZ object-group NET-SUB1
access-list DMZ_nonat extended permit ip object-group NET_DMZ object-group NET_SUB2
access-list 101 extended permit ah any any
access-list 101 extended permit esp any any
access-list 101 extended permit udp any any eq isakmp
access-list 101 extended permit udp any any eq 4500
access-list 100 extended permit ip 172.16.0.0 255.240.0.0 192.168.100.0 255.255.255.0
pager lines 24
logging enable
logging timestamp
logging buffer-size 128000
logging buffered debugging
logging trap informational
logging asdm warnings
logging device-id ipaddress inside
logging host inside iACADLS
logging host inside iKHRONOS
mtu outside 1500
mtu inside 1500
mtu DMZ 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
asdm location iKHRONOS 255.255.255.255 inside
asdm history enable
arp timeout 14400
nat-control
global (outside) 300 IP4NAT-1
global (outside) 201 IP4NAT-2 netmask 255.0.0.0
global (outside) 202 IP4NAT-3 netmask 255.0.0.0
nat (inside) 0 access-list inside_nonat
nat (inside) 300 access-list inside_nat
nat (inside) 201 access-list inside_nat_sub1
nat (inside) 202 access-list inside_nat_sub2
nat (DMZ) 0 access-list DMZ_nonat
static (DMZ,outside) eCGP iCGP netmask 255.255.255.255
static (inside,outside) eKHRONOS iKHRONOS netmask 255.255.255.255
static (DMZ,outside) ePC1 iPC1 netmask 255.255.255.255
static (DMZ,outside) ePOLYCOM iPOLYCOM netmask 255.255.255.255
static (inside,outside) ePROJECT iASY_ARCHIVE netmask 255.255.255.255
static (DMZ,outside) eVAULT-TEST iVAULT-TEST netmask 255.255.255.255
static (DMZ,outside) eVAULT2 iVAULT2 netmask 255.255.255.255
static (inside,outside) eVOICEGW iVOICEGW netmask 255.255.255.255
access-group from_outside in interface outside
access-group from_inside in interface inside
route outside 0.0.0.0 0.0.0.0 80.x.x.1 1
route inside 172.17.0.0 255.255.0.0 172.16.0.2 1
route inside 172.22.0.0 255.255.0.0 172.16.0.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
aaa authentication enable console LOCAL
http server enable
http 0.0.0.0 0.0.0.0 inside
snmp-server host inside iACADLS community <removed> version 2c
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address 100
crypto map outside_map 1 set peer 62.y.y.y
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 43200
crypto isakmp policy 10
authentication pre-share
encryption aes
hash sha
group 5
lifetime 86400
crypto isakmp policy 30
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
crypto isakmp policy 50
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 65535
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto isakmp am-disable
crypto isakmp disconnect-notify
telnet timeout 5
ssh scopy enable
ssh 192.168.250.0 255.255.255.240 outside
ssh 83.220.162.154 255.255.255.255 outside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 30
ssh version 2
console timeout 15
management-access inside
priority-queue outside
tx-ring-limit 256
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server iVOLANS source inside
tftp-server inside iVOLANS /
webvpn
username radmin password removed encrypted privilege 15
tunnel-group 62.y.y.y type ipsec-l2l
tunnel-group 62.y.y.y ipsec-attributes
pre-shared-key 121314
peer-id-validate nocheck
!
class-map VoIP
description High Priority = VoIP
match dscp ef
class-map inspection_default
match default-inspection-traffic
class-map imblock
match any
class-map P2P
match port tcp eq www
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect http
inspect pptp
inspect icmp
inspect mgcp
policy-map VoIP
class VoIP
priority
policy-map type inspect http P2P_HTTP
parameters
match request uri regex _default_gator
drop-connection log
match request uri regex _default_x-kazaa-network
drop-connection log
policy-map IM_P2P
class imblock
class P2P
inspect http P2P_HTTP
policy-map type inspect dns migrated_dns_map_1
parameters
!
service-policy global_policy global
service-policy VoIP interface outside
service-policy IM_P2P interface inside
prompt hostname context [/more]
Цитата: вот эту команду уберите
crypto isakmp identity address
убирал, не помогает.
Минимальный рабочий конфиг есть на cisco.com, ссылку я выше приводил (по которой настраивал). Конфиги IPSEC'а полностью зеркальны.
Более того, на guard'е (5510) были настройки для подключения VPN клиента и прекрасно все работало. Убил в процессе поиска проблемы, чтобы конфиг максимально совпадал с примером настройки.