User Tools

Site Tools


wiki:site:cisco:asa

Cisco ASA5505

  • Lze konfigurovat aplikací ASDM nebo přes CLI
  • CLI není tak intuitivní, zato je v něm pak čitelnější konfigurace

WAN / LAN:

interface GigabitEthernet1/1                           # Popis
 description WAN
 nameif outside
 security-level 0
 ip address 213.168.x.x 255.255.255.192 
!
interface GigabitEthernet1/2
 description LAN
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0

NAT maškaráda:

nat (inside,outside) after-auto source dynamic any interface

NAT portforward:

object network SERVER
 host 192.168.1.2
object service SRC-HTTP
 service tcp source eq www 
object service SRC-HTTPS
 service tcp source eq https 
 
# dst-nat
access-list OUTSIDE extended permit tcp any object SERVER eq www 
access-list OUTSIDE extended permit tcp any object SERVER eq https 
 
# src-nat (zachování portu služby)
nat (inside,outside) source static SERVER interface service SRC-HTTP SRC-HTTP
nat (inside,outside) source static SERVER interface service SRC-HTTPS SRC-HTTPS
 
access-group OUTSIDE in interface outside

DNS client:

dns domain-lookup outside     # povoleni DNS dotazu na public servery
dns domain-lookup inside      # povoleni DNS dotazu na vnitrni server
dns server-group DefaultDNS
 name-server 192.168.1.2      # Active Directory
 name-server 8.8.8.8

Český čas:

clock timezone CET 1
clock summer-time CEST recurring last Sun Mar 2:00 last Sun Oct 3:00
 
ntp server x.x.x.x

Logování:

logging enable                                
logging timestamp
logging buffer-size 512000
logging buffered informational
logging asdm informational

Povolení ICMP:

policy-map global_policy
 class inspection_default
  inspect icmp

Management:

enable password ***********
username admin password ********* privilege 15
aaa authentication ssh console LOCAL 
 
http server enable
http 192.168.1.0 255.255.255.0 inside
http 213.168.x.x 255.255.255.255 outside   # povoleni pristupu z konkretni adresy
 
ssh 213.168.x.x 255.255.255.255 outside    # povoleni pristupu z konkretni adresy
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 30
ssh version 2
ssh key-exchange group dh-group1-sha1
 
no call-home reporting anonymous                     # zákaz reportování statistik do cisca

IPSec Site-to-Site VPN:

object network VPNCLA
 subnet 192.168.20.0 255.255.255.0
object network LAN
 subnet 192.168.1.0 255.255.255.0
 
access-list outside_cryptomap_20 extended permit ip object LAN object VPNCLA
 
access-list no_nat extended permit ip object LAN object VPNCLA
 
nat (inside,outside) source static LAN LAN destination static VPNCLA VPNCLA no-proxy-arp route-lookup
 
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
 
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 213.168.x.x
crypto map outside_map 20 set ikev1 transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev1 enable outside
crypto ikev1 policy 20
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
 
tunnel-group 213.168.x.x type ipsec-l2l
tunnel-group 213.168.x.x ipsec-attributes
 ikev1 pre-shared-key *****
wiki/site/cisco/asa.txt · Last modified: 2018/01/24 21:27 by root