cisco asa vpn配置
配置 crypto 策略
第一阶段协商,或是做ipsec,需保证两端一致,否则协商不会成功
1crypto ikev1 policy 10
2 authentication pre-share
3 encryption 3des
4 hash md5
5 group 2
6 lifetime 86400
配置 crypto 动态map和 map
1crypto ipsec ikev1 transform-set ezvpn_set esp-3des esp-md5-hmac
2crypto dynamic-map ezvpn_dymap 10 set ikev1 transform-set ezvpn_set
3crypto map ezvpn_map 10 ipsec-isakmp dynamic ezvpn_dymap
将 ikev1 和 crypto map 应用到出接口
1crypto ikev1 enable outside
2crypto map ezvpn_map interface outside
配置 tunnel group 及 pre-shared 密钥
1tunnel-group ezvpn_group type remote-access
2tunnel-group ezvpn_group ipsec-attributes
3 ikev1 pre-shared-key qq123456
用户相关
允许用户访问的内网网段
1access-list Split_tunnel_list extended permit ip 10.22.13.0 255.255.255.0 any
2access-list Split_tunnel_list extended permit ip 10.22.15.0 255.255.255.0 any
3access-list Split_tunnel_list extended permit host 10.27.128.239 any
给予用户分配的IP池
1ip local pool net_vpn_1 10.255.254.11-10.255.254.126 mask 255.255.255.128
策略配置
1group-policy ezvpn_group_policy_user1 internal
2group-policy ezvpn_group_policy_user1 attributes
3 address-pools value net_vpn_1
4 split-tunnel-policy tunnelspecified
5 split-tunnel-network-list value Split_tunnel_list
配置用户并且关联到策略
1username user1 password cisco123
2username user1 attributes
3 vpn-group-policy ezvpn_group_policy_user1
NAT 免除 no nat
将所有内网会用到的网段关,和所有根据不同策略的用户的地址池的地址,来做 object
多个网段可以使用 object-group 单个网段可直接用 object network 即可
1object-group network nonat_source
2 network-object 10.22.13.0 255.255.255.0
3 network-object 10.22.15.0 255.255.255.0
4 network-object 10.27.128.224 255.255.255.240
5 network-object 10.39.176.32 255.255.255.224
6 exit
7
8object-group network nonat_dest
9 network-object 10.255.254.0 255.255.255.224
10 network-object 10.255.253.0 255.255.255.0
11 exit
12
13nat (inside,outside) source static nonat_source nonat_source destination static nonat_dest nonat_dest no-proxy-arp
扩展配置: 针对不同用户设置不同的内网访问权限
其实也就是通过access-list 访问控制列表来实现,也可叫做感兴趣流
需求描述:公司内网划分共有4个网段,其列表和用途如下:
- 10.21.18.0/25 #测试A组使用
- 10.21.18.128/25 #测试B组使用
- 10.21.19.0/24 # 研发部门使用
- 10.21.20.0/24 #生产服务器使用
需求:
- 测试A组和B组分别分配3个账号,他们只可以访问自己网段的
- 研发部门12个账号,只允许访问研发部门的网段
- 运维部门 4 个账号,可以访问所有网段
- 两台公共服务器,OA 和 文件服务器,所有账号都可以访问
- OA的 ip 为 10.21.20.16, 文件服务器为 10.21.20.135
实现思路:针对不需求做不同的访问控制列表,创建 group-policy,并绑定到不同的用户
配置地址池
配置不同用户的分配的地址池,也可以只用一个地址池,具体看需求,这里分多个,以部门来分
1ip local pool testA_ipools 10.255.254.1-10.255.254.6 mask 255.255.255.248
2ip local pool testB_ipools 10.255.254.9-10.255.254.14 mask 255.255.2555.248
3ip local pool developer_ipools 10.255.254.17-10.255.254.30 mask 255.255.255.240
4ip local pool yunwei_ipools 10.255.255.254.33-10.255.254.38 mask 255.255.255.248
配置访问控制列表
根据部门来做访问控制列表,源地址为允许访问的服务器地址或网段,目标可以写上面的地址池网段,也可以写 any
1access-list testA_access extended permit ip 10.21.18.0 255.255.255.128 any
2access-list testA_access extended permit ip host 10.21.20.16 any
3access-list testA_access extended permit ip host 10.21.20.135 any
4
5access-list testB_access extended permit ip 10.21.18.128 255.255.255.128 any
6access-list testB_access extended permit ip host 10.21.20.16 any
7access-list testB_access extended permit ip host 10.21.20.135 any
8
9access-list developer_access extended permit ip 10.21.19.0 255.255.255.0 any
10access-list developer_access extended permit ip host 10.21.20.16 any
11access-list developer_access extended permit ip host 10.21.20.135 any
12
13access-list yunwei_access extended permit ip 10.21.18.0 255.255.254.0 any
14access-list yunwei_access extended permit ip 10.21.20.0 255.255.255.0 any
配置 测试 A 组的 group policy
1group-policy testA_group_policy internal
2group-policy testA_group_policy attributes
3 address-pools value testA_ipools
4 split-tunnel-policy tunnelspecified
5 split-tunnel-network-list value testA_access
配置 测试 B 组的 group policy
1group-policy testB_group_policy internal
2group-policy testB_group_policy attributes
3 address-pools value testB_ipools
4 split-tunnel-policy tunnelspecified
5 split-tunnel-network-list value testB_access
配置 研发 组的 group policy
1group-policy developer_group_policy internal
2group-policy developer_group_policy attributes
3 address-pools value developer_ipools
4 split-tunnel-policy tunnelspecified
5 split-tunnel-network-list value developer_access
配置 运维组的 group policy
1group-policy yunwei_group_policy internal
2group-policy yunwei_group_policy attributes
3 address-pools value yunwei_ipools
4 split-tunnel-policy tunnelspecified
5 split-tunnel-network-list value yunwei_access
创建用户并分配策略
测试A组用户
1username tom password cisco123
2username tom attributes
3 pn-group-policy testA_group_policy
4 exit
5
6username jack password cisco456
7username jack
8 testA_group_policy testA_group_policy
测试B组用户
1username rose password cisco123
2username rose attributes
3 pn-group-policy testB_group_policy
4 exit
5
6username tony password cisco456
7username tony
8 testA_group_policy testB_group_policy
................................ 其它用户照上面例子配置即可, ................................