Sophos 2 cisco asa: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
 
(8 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt)
Zeile 1: Zeile 1:
=interfaces einrichten=
+
=sophos site=
  
 +
[[Datei:soph-asa1.png]]
 +
 +
 +
 +
[[Datei:soph-asa2.png]]
 +
 +
=asa site=
 +
==interfaces einrichten==
 
  configure terminal
 
  configure terminal
 
  interface Vlan2
 
  interface Vlan2
Zeile 14: Zeile 22:
 
  name-server 192.168.240.200
 
  name-server 192.168.240.200
 
  end
 
  end
 
+
==nach ausen freigeben==
object network obj-lan  
+
object network obj-lan  
subnet 10.20.170.0 255.255.255.0
+
subnet 10.20.170.0 255.255.255.0
nat (if-inside,if-outside) dynamic interface
+
nat (if-inside,if-outside) dynamic interface
end  
+
end  
 
+
==phase1==
=auf cisco=
 
 
 
 
  configure terminal
 
  configure terminal
 
  crypto ikev1 policy 10
 
  crypto ikev1 policy 10
Zeile 30: Zeile 36:
 
  lifetime 28800
 
  lifetime 28800
 
  crypto ikev1 enable if-outside
 
  crypto ikev1 enable if-outside
 
+
==phase2==
 
 
 
  access-list acl-asa-soph extended permit ip 10.20.170.0 255.255.255.0 10.20.0.0 255.255.0.0
 
  access-list acl-asa-soph extended permit ip 10.20.170.0 255.255.255.0 10.20.0.0 255.255.0.0
 
  crypto isakmp identity address
 
  crypto isakmp identity address
Zeile 44: Zeile 49:
 
  tunnel-group 192.168.244.130 ipsec-attributes  
 
  tunnel-group 192.168.244.130 ipsec-attributes  
 
  pre-shared-key streng-geheim
 
  pre-shared-key streng-geheim
 +
end
 +
==nat ausnahme==
 +
object network no-nat
 +
subnet 10.20.0.0 255.255.0.0
 +
nat (if-inside,if-outside) source static obj-lan obj-lan destination static no-nat no-nat
 +
==ping freischalten==
 +
configure terminal
 +
policy-map icmp_policy
 +
policy-map global_policy
 +
class inspection_default
 +
inspect icmp
 
  end
 
  end
  
  
*ping freischalten
+
* so sollte es aussehen wenn die vpn steht
configure terminal
+
[[Datei:soph-asa3.png]]
policy-map icmp_policy
 
policy-map global_policy
 
class inspection_default
 
inspect icmp
 
end
 

Aktuelle Version vom 18. März 2016, 11:13 Uhr

sophos site

Soph-asa1.png


Soph-asa2.png

asa site

interfaces einrichten

configure terminal
interface Vlan2
ip address 192.168.244.185 255.255.248.0 
 nameif if-outside
interface Vlan1                     
 nameif if-inside
ip address 10.20.170.1 255.255.255.0
route if-outside 0.0.0.0 0.0.0.0 192.168.240.100
domain-name xinux.org
dns domain-lookup if-outside
dns server-group DefaultDNS
name-server 192.168.240.200
end

nach ausen freigeben

object network obj-lan 
subnet 10.20.170.0 255.255.255.0
nat (if-inside,if-outside) dynamic interface
end 

phase1

configure terminal
crypto ikev1 policy 10
authentication pre-share
encryption aes-256
hash md5
group 5
lifetime 28800
crypto ikev1 enable if-outside

phase2

access-list acl-asa-soph extended permit ip 10.20.170.0 255.255.255.0 10.20.0.0 255.255.0.0
crypto isakmp identity address
crypto isakmp enable if-outside
crypto ipsec transform-set AES256-MD5 esp-aes-256 esp-md5-hmac
crypto map vpn-asa-soph 10 match address acl-asa-soph
crypto map  vpn-asa-soph 10 set pfs group5
crypto map vpn-asa-soph 10 set peer 192.168.244.130
crypto map  vpn-asa-soph 10 set ikev1 transform-set AES256-MD5
crypto map  vpn-asa-soph  interface if-outside
tunnel-group 192.168.244.130 type ipsec-l2l 
tunnel-group 192.168.244.130 ipsec-attributes 
pre-shared-key streng-geheim
end

nat ausnahme

object network no-nat
subnet 10.20.0.0 255.255.0.0
nat (if-inside,if-outside) source static obj-lan obj-lan destination static no-nat no-nat

ping freischalten

configure terminal
policy-map icmp_policy
policy-map global_policy
class inspection_default
inspect icmp
end


  • so sollte es aussehen wenn die vpn steht

Soph-asa3.png