====== Cisco ASA5505 ====== * Lze konfigurovat aplikací ASDM nebo přes CLI * CLI není tak intuitivní, zato je v něm pak čitelnější konfigurace WAN / LAN: interface GigabitEthernet1/1 # Popis description WAN nameif outside security-level 0 ip address 213.168.x.x 255.255.255.192 ! interface GigabitEthernet1/2 description LAN nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 NAT maškaráda: nat (inside,outside) after-auto source dynamic any interface NAT portforward: object network SERVER host 192.168.1.2 object service SRC-HTTP service tcp source eq www object service SRC-HTTPS service tcp source eq https # dst-nat access-list OUTSIDE extended permit tcp any object SERVER eq www access-list OUTSIDE extended permit tcp any object SERVER eq https # src-nat (zachování portu služby) nat (inside,outside) source static SERVER interface service SRC-HTTP SRC-HTTP nat (inside,outside) source static SERVER interface service SRC-HTTPS SRC-HTTPS access-group OUTSIDE in interface outside DNS client: dns domain-lookup outside # povoleni DNS dotazu na public servery dns domain-lookup inside # povoleni DNS dotazu na vnitrni server dns server-group DefaultDNS name-server 192.168.1.2 # Active Directory name-server 8.8.8.8 Český čas: clock timezone CET 1 clock summer-time CEST recurring last Sun Mar 2:00 last Sun Oct 3:00 ntp server x.x.x.x Logování: logging enable logging timestamp logging buffer-size 512000 logging buffered informational logging asdm informational Povolení ICMP: policy-map global_policy class inspection_default inspect icmp Management: enable password *********** username admin password ********* privilege 15 aaa authentication ssh console LOCAL http server enable http 192.168.1.0 255.255.255.0 inside http 213.168.x.x 255.255.255.255 outside # povoleni pristupu z konkretni adresy ssh 213.168.x.x 255.255.255.255 outside # povoleni pristupu z konkretni adresy ssh 192.168.1.0 255.255.255.0 inside ssh timeout 30 ssh version 2 ssh key-exchange group dh-group1-sha1 no call-home reporting anonymous # zákaz reportování statistik do cisca IPSec Site-to-Site VPN: object network VPNCLA subnet 192.168.20.0 255.255.255.0 object network LAN subnet 192.168.1.0 255.255.255.0 access-list outside_cryptomap_20 extended permit ip object LAN object VPNCLA access-list no_nat extended permit ip object LAN object VPNCLA nat (inside,outside) source static LAN LAN destination static VPNCLA VPNCLA no-proxy-arp route-lookup crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto map outside_map 20 match address outside_cryptomap_20 crypto map outside_map 20 set peer 213.168.x.x crypto map outside_map 20 set ikev1 transform-set ESP-3DES-SHA crypto map outside_map interface outside crypto ca trustpool policy crypto ikev1 enable outside crypto ikev1 policy 20 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 tunnel-group 213.168.x.x type ipsec-l2l tunnel-group 213.168.x.x ipsec-attributes ikev1 pre-shared-key *****