网络安全 频道

CISCO PIX-515E-R-BUN 详细设置

  三、配置IPSec
  IPSec配置包括创建加密用访问控制列表,定义变换集,创建加密图条目,并将加密集应用到接口上去;
  
  步骤1:用access-list命令来配置加密用访问控制列表;
  例如:
  access-list acl-name {permit|deny} protocol src_addr src_mask [operator port [port]] dest_addr dest_mask [operator prot [port]]
  步骤2:用crypto ipsec transform-set 命令配置变换集;
  例如:
  crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]]
  步骤3:(任选)用crypto ipsec security-association lifetime命令来配置全局性的IPSec安全关联的生存期;
  步骤4:用crypto map 命令来配置加密图;
  步骤5:用interface 命令和crypto map map-name interface应用到接口上;
  步骤6:用各种可用的show命令来验证IPSec的配置。
  四、测试和验证IPSec
  该任务涉及到使用`show ` 、`debug`和相关的命令来测试和验证IPSec加密工作是否正常,并为之排除故障。
  
  样例:
  
  PIX 1的配置:
  
  !configure the IP address for each PIX Firewall interface
  ip address outside 192.168.1.1 255.255.255.0
  ip address inside 10.1.1.3 255.255.255.0
  ip address dmz 192.168.11.1 255.255.255.0
  global (outside) 1 192.168.1.10-192.168.1.254 netmask 255.255.255.0
  !creates a global pooll on the outside interface,enablesNAT.
  !windows NTserver
  static (inside,outside) 192.168.1.10 10.1.1.4 netmask 255.255.255.0
  !Cryptoaccesslist specifiles between the global and the inside
  !server beind PIX Firewalls is encrypted ,The source
  !and destination IP address are the global IP addresses of the statics.
  Access-list 101 permit iphost192.168.1.10 host 192.168.2.10
  !The conduit permit ICMP and web access for testing.
  Conduit permit icmp any any
  Conduit permit tcp host 192.168.1.10 eq www any
  route outside 0.0.0.0 0.0.0.0 192.168.1.2 1
  !Enable IPSec to bypass access litst,access ,and confuit restrictions
  syspot connnection permit ipsec
  !Defines a crypto map transform. set to user esp-des
  crypto ipsec transform-set pix2 esp-des
  crypto map peer2 10 ipsec-isakmp!
  
  
  完全配置:
  
  ip address outside 202.105.113.194 255.255.255.0 /*看电信给你的IP
  ip address inside 192.168.1.1 255.255.255.0
  !
  global (outside) 1 202.105.113.195-202.105.113.200
  global (outside) 1 202.105.113.201
  nat (inside) 1 0.0.0.0 0.0.0.0 0 0
  static (inside,outside) 202.105.113.203 192.168.1.10 netmask 255.255.255.255 0 0
  static (inside,outside) 202.105.113.205 192.168.1.11netmask 255.255.255.255 0 0
  conduit permit icmp any any
  conduit permit tcp host 202.105.113.203 eq www any
  conduit permit tcp host 202.105.113.203 eqftpany
  conduit permit tcp host 202.105.113.205 eq smtp any
  conduit permit tcp host 202.105.113.205 eq pop3 any
  !
  route outside 0.0.0.0 0.0.0.0 202.105.113.193 1
  route inside 0.0.0.0 0.0.0.0 192.168.1.1

0
相关文章