Network Topology
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/4B/F7/wKiom1Q2STWBG5RxAADqir0hadw389.jpg "Title =" 4.png" alt = "wkiom1q2stwbg5rxaadqir0hadw389.jpg"/>
Set dynamic pat on the ASA firewall so that the Intranet can access the Internet through a public address
The command is as follows:
Ciscoasa (config) # NAT (inside) 11900001.0 255.255.255.0
Ciscoasa (config) # global (outside) 1 Interface
Set static nat on
= "Wkiol1rbfgxhhqr_aah2jr3rd1i186.jpg"/>A computer with 4G memory can only open two virtual machines. So DNS is also on this server.The DNS server address is also: 202.168.1.10650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/4C/9C/wKiom1RBFfbhVjD3AAJr8DjTJGs963.jpg "title=" SS. PNG "alt=" Wkiom1rbffbhvjd3aajr8djtjgs963.jpg "/>After the DNS settings are complete, test it with Nslookup in this machine 、、、、Then configure the client:Client DNS pointing to the server650) this.width=650; "sr
I. Overview:
It is estimated that the actual work will often encounter with Asa two ISP line, for example, Telecom and Netcom, and there is not enough budget to buy load balancing equipment, but want to achieve link load sharing and automatic switching, from telecommunications to traffic, from the telecommunications line back, from Netcom to the flow of traffic from the Netcom line back, When one of the lines fails, all traffic never goes off the fau
connection type to remote access.Tunnel-group vpnclient general-attributes//Configuring the authentication method for this channel groupAddress-pool vpnclient//define the address pool usedDefault-group-policy vpnclient//define default Group Policy-----Set up authentication methods and shared keys-------------Tunnel-group vpnclient ipsec-attributes//Configure authentication method for IPSecPre-shared-key *//Pre-shared key for IKE connectionTelnet Timeout 5//telnet timeout settingSSH 0.0.0.0 0.0.
1. Topology map
For audit purposes, the source address of the syslog must be the actual address of the device, and for other reasons, the Syslog server cannot be placed in the intranet.
2. Interface configuration:
R1:
R1 (config) #int f0/0
R1 (config-if) #ip add 10.1.1.18 255.255.255.0
R1 (config-if) #no sh
R2:
R2 (config) #int f0/0
R2 (config-if) #ip add 10.1.1.28 255.255.255.0
R2 (config-if) #no sh
R3:
R3 (config) #int f0/0
R3 (config-if) #ip add 20.1.1.38 255.255.255.0
R3 (c
1, the external network for 1 fixed IP, do NAT let intranet share Internet.G0: External network port: 192.168.0.4/24Extranet Gateway: 192.168.0.1G2: Intranet port (Gateway of intranet): 172.16.0.1/24Only key commands are listed below:Interface GigabitEthernet0Nameif outside//designated external network port is outsideSecurity-level 10//Security level manually modified to 10, or it can be the default of 0IP address 192.168.0.4 255.255.255.0Interface GigabitEthernet2Nameif inside//designated intra
. changeappsanalysis0A dialedstring is a networking route between internal nodes. It indicates the Starting number. If only one segment is restricted, enter a number such as 6001. If only one segment is restricted, enter 60, and set the length to 4, in this way, 99 numbers can be used. routepattern represents the type, and our 3 represents siptrunk.16. After steps 13, 14, and 15 are completed, perform the following operations)A. Enter systemmanager --> routing --> entitylinks --> new, configurat
NAT configuration of the ASA/PIX Firewall1. configure a public address pool for NAT translation nat (inside) 1 10.0.0.0 255.255.255.0global (outside) 1 222.172.200.20-222.172.200.30 // can this command be unavailable? And the tab key are incomplete, but you don't have to worry about it. Just press it to finish. Or global (outside) 1 222.172.200.20 2. NAT for a public network with only one fixed IP address is converted to nat (inside) 1 10.0.0.0 255.25
1. Configure NAT translation for a public network address poolNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.20-222.172.200.30//This command may not work? And the TAB key is not complete, but no tube, according to lose can.OrGlobal (outside) 1 222.172.200.202, the public network only 1 fixed IP NAT conversionNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.68//Designated public network address is a network segment3, Pat conversion, suitable for non-fixed I
SYBASE ASA Database when you encounter an abnormal shutdown, it is easy to have exceptions, such as: Table or index error, the trouble is to use drop table T_name Delete tables when the database will down. Here are my two common ways to recover:
Restore with BACKUP database:
1. Start with BACKUP database
2, translation error database log (may have more than one file)
3, in order to perform the translation of the log file, read file
Second, no bac
I. Overview:
Static PAT is generally used in external access to the external IP of a port mapping to the internal host service port, so that the external host by accessing the external IP port, it can easily access to the internal host service (need policy release), but see "Cisco ASA 5500 Series Configuration Guide using the CLI, 8.4 and 8.6 documents, the static Pat, like Static Nat, is also bidirectional and confusing as it is intended to be valid
I. Overview:
QQ Group has netizens to discuss the policy-map of the ASA firewall of the global and interface order of execution, from the literal meaning can be seen that the two application range is not the same, one is global call, a only in the interface down, Therefore feel that the detailed interface is first called, in order to confirm their own ideas, the decision to build environment verification.
Two. Basic ideas:
A. Non-conflicting POLICY
This is certainly not the first article on "Quick Guide to building a VPN using Cisco devices, however, we still hope that this guide will become an all-in-one guide for users who use ASA 5505 devices to set up VPN and connect to the Internet.
The ASA itself has a setup wizard, but this wizard does not cover all aspects of work required by the user, and some steps are vague, making it difficult for the user
the flash format650) this.width=650; "Src=" Http://s2.51cto.com/wyfs02/M00/82/28/wKioL1dNLxuiOdu-AAAQJCGgzwc938.png-wh_500x0-wm_3 -wmp_4-s_2149940309.png "title=" 4.png "alt=" Wkiol1dnlxuiodu-aaaqjcggzwc938.png-wh_50 "/>To ensure that no errors occur when using the command WR, copy run start, after restarting the ASA, in the global configuration mode650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M01/82/28/wKioL1dNL5fjluXRAAAppw3MQ2o580.png-wh
//Disable Logging 503001logginghostdmz 192.168.12.1//specifies the interface log server (SYSLogserver) IP Address Troubleshooting tool Packet TracerThe Packet tracer simulates a packet traversing the data channel of the ASA and tracks the entire processing of the packet by the ASAASA1 (config) #packet-tracerinputdmzicmp192.168.12.10080 192.168.12.139phase:1 //View Route Type:route-lookupsubtype:resolveegressinterfaceresult: allowconfig:additionalinfo
The IPSec VPN realizes the network expansion, the firewall realizes the control and the filtering to the network traffic, therefore has the influence to the IPSec VPN communication.
The default ASA maintains a state session only for UDP/TCP traffic, and therefore discards the ESP traffic that is returned. There are two ways to solve the problem
One uses ACLs to release ESP traffic.
Two applications check IPSec VPN.
Experimental topology
R1 conf
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.