<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>network on 明哥技术笔记</title>
    <link>http://test.mylass.com/tags/network/</link>
    <description>Recent content in network on 明哥技术笔记</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <copyright>明哥技术笔记</copyright>
    <lastBuildDate>Sat, 08 Jun 2013 00:00:00 +0000</lastBuildDate><atom:link href="http://test.mylass.com/tags/network/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>cisco asa vpn配置</title>
      <link>http://test.mylass.com/post/ciscoasavpn/</link>
      <pubDate>Sat, 08 Jun 2013 00:00:00 +0000</pubDate>
      
      <guid>http://test.mylass.com/post/ciscoasavpn/</guid>
      <description>
        
          
            配置 crypto 策略 第一阶段协商，或是做ipsec，需保证两端一致，否则协商不会成功 1crypto ikev1 policy 10 2 authentication pre-share 3 encryption 3des 4 hash md5 5 group 2 6 lifetime 86400 配置 crypto 动态map和 map 1crypto ipsec ikev1 transform-set ezvpn_set esp-3des esp-md5-hmac 2crypto dynamic-map ezvpn_dymap 10 set ikev1 transform-set ezvpn_set 3crypto map ezvpn_map 10 ipsec-isakmp dynamic ezvpn_dymap 将 ikev1 和 crypto map 应用到出接口 1crypto ikev1 enable outside 2crypto map ezvpn_map interface outside 配置 tunnel group 及 pre-shared 密钥 1tunnel-group ezvpn_group type remote-access 2tunnel-group ezvpn_group ipsec-attributes 3 ikev1 pre-shared-key qq123456 用户相关 允许用户访问的内网网段 1access-list Split_tunnel_list extended permit ip 10.
          
          
        
      </description>
    </item>
    
  </channel>
</rss>
