cisco上网配置

原创 2012年03月28日 15:27:32
: Saved
:
ASA Version 8.0(2) 
!
hostname name
enable password * encrypted
names
!
interface Ethernet0/0
 nameif outside
 security-level 0
 ip address ip mask 
!
interface Ethernet0/1
 nameif inside
 security-level 100
 ip address ip mask 
!
interface Ethernet0/2
 nameif dmz
 security-level 50
 ip address ip mask 
!
interface Ethernet0/3
 shutdown
 no nameif    
 no security-level
 no ip address
!
interface Management0/0
 nameif management
 security-level 100
 ip address ip mask 
 management-only
!
passwd * encrypted
!
boot system disk0:/asa802-k8.bin
clock timezone HKST 8
access-list permit_ip extended permit ip any any
access-list 100 extended permit ip any any
access-list nonat extended permit ip any any
access-list p_dmz extended permit ip any any
access-list dmz_ip extended permit ip any any
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu management 1500
asdm image disk0:/asdm-611.bin
asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (outside) 1 access-list 100
nat (inside) 0 access-list nonat
nat (inside) 1 access-list permit_ip
nat (dmz) 1 access-list dmz_ip 
access-group 100 in interface outside
access-group p_dmz in interface dmz
route outside 0.0.0.0 0.0.0.0 ip 1
route inside ip mask ip 1
timeout xlate 0:30:00
timeout conn 0:20:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 0.0.0.0 0.0.0.0 inside
ip local pool pool129 ip-ip mask mask
no snmp-server location
no snmp-server contact
crypto ipsec transform-set ravpn esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto dynamic-map dyn1 1 set pfs 
crypto dynamic-map dyn1 1 set transform-set ravpn
crypto dynamic-map dyn1 1 set reverse-route
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-

MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map map1 1 ipsec-isakmp dynamic dyn1
crypto map map1 interface outside
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map inside_map interface inside
crypto map dmz_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map dmz_map interface dmz
crypto isakmp enable outside
crypto isakmp enable inside
crypto isakmp enable dmz
crypto isakmp policy 1
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
no vpn-addr-assign dhcp
vpn-sessiondb max-session-limit 50
telnet ip mask inside
telnet timeout 1440
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns migrated_dns_map_1
 parameters
policy-map global_policy
 class inspection_default
  inspect dns migrated_dns_map_1 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect netbios 
  inspect tftp 
policy-map rfb
!
service-policy global_policy global
group-policy DfltGrpPolicy attributes
 wins-server value ip
 dns-server value ip
 vpn-idle-timeout 999
 vpn-tunnel-protocol IPSec l2tp-ipsec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value Split_Tunnel_List
 default-domain value ip
group-policy rac_y internal
group-policy rac_y attributes
 wins-server value ip
 dns-server value ip
 vpn-tunnel-protocol IPSec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value rac_y_splitTunnelAcl
 client-access-rule 1 permit type * version *
username rac_y password * encrypted privilege 0
username rac_y attributes
 vpn-group-policy rac_y
username admin password * encrypted privilege 15
tunnel-group rac_y type remote-access
tunnel-group rac_y general-attributes
 address-pool pool129
 default-group-policy rac_y
tunnel-group rac_y ipsec-attributes
 pre-shared-key *
prompt hostname context 
Cryptochecksum:8a9e41ee014c56619eecccdac698b193
: end


 结束

版权声明:本文为博主原创文章,未经博主允许不得转载。

相关文章推荐

cisco 路由器 ADSL拨号上网配置

原文地址:http://blog.sina.com.cn/s/blog_61c07ac501015ek0.htm虚拟拨号接口cisco(config)>interface Dialer1 //定义拨号...
  • juded
  • juded
  • 2016-09-22 17:22
  • 3674

cisco交换机IP-MAC地址绑定配置

一、基于端口的MAC地址绑定     思科2950交换机为例,登录进入交换机,输入管理口令进入配置模式,敲入命令:     Switch#c onfig terminal     进入配置模式 ...

CISCO Router配置、升级、隐藏SSID、侦测SSID

一、上网配置 如下图进入页面后我们点setup--Basic setup,在internet connetion type选PPPoE拨号的设置。PPPoE拨号可以给ADSL猫拨号,...

PXE服务和Cisco路由器上的DHCP配置

预启动执行环境(Preboot eXecution Environment,PXE,也被称为预执行环境)提供了一种使用网络接口(Network Interface)启动计算机的机制,这种机制让计算机的...

Cisco交换机ACL的配置

访问控制列表(Access Control List   ACL)的含义和作用就不讲了,自行百度 一 .ACL讲解 ACL分标准访问控制列表(Standard ACL)和拓展访问控制列表(Exte...

Cisco IPSec简单的配置

IPSec VPN也可以实现隧道功能,相比较linux的

思科CISCO ACL配置详解

访问控制列表简称为ACL,访问控制列表使用包过滤技术,在路由器上读取第三层及第四层包头中的信息如源地址,目的地址,源端口,目的端口等,根据预先定 义好的规则对包进行过滤,从而达到访问控制的目的。该技术...

Cisco交换基础路由配置:交换机怎么设置实现三层交换功能

转载自http://www.examw.com/cisco/zhonghe/182237/ 首先我们看一下交换机怎么设置三层交换技术的应用环境   为了使VLAN之间通信,单臂路由容易产生瓶颈,使用三...

Cisco Netflow配置

以下以Cisco为例: 1、首先看看Netflow配置是否正常起来: Switch# show mls nde 一般看到都是Netflow Data Export disabled 这说明N...
  • 631799
  • 631799
  • 2012-09-05 14:51
  • 1008

cisco asa(asa5510 设置)防火墙的配置详解

今天在一个客户那边配置的 asa5510(config)#             asa5510(config)# show run : Saved : ASA...
  • Galdys
  • Galdys
  • 2011-09-27 14:47
  • 5512
内容举报
返回顶部
收藏助手
不良信息举报
您举报文章:深度学习:神经网络中的前向传播和反向传播算法推导
举报原因:
原因补充:

(最多只允许输入30个字)