{"id":211665,"date":"2020-12-01T06:59:43","date_gmt":"2020-11-30T22:59:43","guid":{"rendered":"http:\/\/4563.org\/?p=211665"},"modified":"2020-12-01T06:59:43","modified_gmt":"2020-11-30T22:59:43","slug":"asa5505-%e4%bd%bf%e7%94%a8%e7%9b%b8%e5%85%b3%e9%97%ae%e9%a2%98","status":"publish","type":"post","link":"http:\/\/4563.org\/?p=211665","title":{"rendered":"ASA5505 \u4f7f\u7528\u76f8\u5173\u95ee\u9898"},"content":{"rendered":"<div>\n<div>\n<div>\n<h1>                  ASA5505 \u4f7f\u7528\u76f8\u5173\u95ee\u9898               <\/h1>\n<p> <\/p>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : makusuofute <\/span>  <span><i><\/i> 0<\/span> <\/div>\n<div> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div isfirst=\"1\">                        \u73b0\u5728\u9047\u5230\u7684\u95ee\u9898\u662f<br \/>ASA \u642d\u5efa\u4e86 AnyConnect<br \/>\u5141\u8bb8 outside \u8bbf\u95ee<\/p>\n<p>\u5982\u4f55\u8bbe\u7f6e AnyConnect \u62e8\u5165\u540e\u5168\u90e8\u6570\u636e\u53ef\u4ee5\u4ece outside \u51fa\u53bb\uff1f      <\/p><\/div>\n<div> <b>\u5927\u4f6c\u6709\u8a71\u8aaa<\/b> (<span>9<\/span>)        <\/div>\n<div> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<ul>\n<li data-pid=\"4373762\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : Tianao <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             same-security-traffic permit intra-interface<br \/>\u653e\u901a\u540c\u4e00\u7aef\u53e3\u5185\u76f8\u540c security-level \u7684\u5355\u81c2\u6d41\u91cf\uff08\u601d\u79d1\u53eb hairpin \uff09<\/p>\n<p>nat (outside,outside) dynamic interface<br \/>\u7ed9 anyconnect \u5bf9\u8c61\u914d\u7f6e\u51fa\u7ad9\u6e90\u5730\u5740\u8f6c\u6362<\/p>\n<p>route outside 0.0.0.0 0.0.0.0 [outside \u63a5\u53e3\u7f51\u5173]<br \/>\u914d\u7f6e\u51fa\u7ad9\u9ed8\u8ba4\u8def\u7531                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373763\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u4e3b<\/span> <span>\u8cc7\u6df1\u5927\u4f6c : makusuofute <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @Tianao <br \/>ASA Version 9.2(4)\u7684\u7248\u672c<br \/>\u7b2c\u4e8c\u6761\u539f\u5730\u5740\u8f6c\u6362\u5c31\u76f4\u63a5\u62a5\u9519\u4e86\u3002                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373764\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : lirno <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             \u4e0d\u8981\u5f00\u7d22\u9053\u5206\u79bb\u7b56\u7565                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373765\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : Tianao <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @makusuofute #2 \u662f\u5728 object \u89c6\u56fe\u4e0b\u6253\u7684\u5417\uff1f                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373766\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u4e3b<\/span> <span>\u8cc7\u6df1\u5927\u4f6c : makusuofute <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @Tianao <\/p>\n<p>\u770b\u4e86\u4e0b\u5df2\u7ecf\u6709\u4e86\uff0c\u8fd9\u4e2a\u5e94\u8be5\u662f\u5728 ASDM \u91cc\u9762\u914d\u7f6e\u751f\u6210\u7684\uff1f<br \/>object network obj_any<br \/> nat (inside,outside) dynamic interface                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373767\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : Tianao <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @makusuofute #5 \u8fd8\u9700\u8981\u7ed9 anyconnect \u5ba2\u6237\u7aef\u5730\u5740\u5bf9\u8c61\u4e00\u4e2a outside,outside \u7684\uff0c\u56e0\u4e3a\u8fd9\u4e9b\u5ba2\u6237\u7aef\u662f outside \u8fdb\u6765\u518d\u53bb\u8bbf\u95ee outside \u7684\u3002                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373768\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u8cc7\u6df1\u5927\u4f6c : wsycqyz <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/security\/asa-5500-x-series-next-generation-firewalls\/100918-asa-sslvpn-00.html                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373769\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u4e3b<\/span> <span>\u8cc7\u6df1\u5927\u4f6c : makusuofute <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @Tianao <\/p>\n<p>: Saved<br \/>: <br \/>: Serial Number: JMX1546417H<br \/>: Hardware: ASA5505, 1024 MB RAM, CPU Geode 500 MHz<br \/>:<br \/>ASA Version 9.2(4) <br \/>!<br \/>hostname ciscoasa<br \/>enable password 8Ry2YjIyt7RRXU24 encrypted<br \/>names<br \/>ip local pool pool_Any 192.168.20.1-192.168.20.30 mask 255.255.255.0<br \/>!<br \/>interface Ethernet0\/0<br \/> switchport access vlan 2<br \/>!<br \/>interface Ethernet0\/1<br \/>!<br \/>interface Ethernet0\/2<br \/>!<br \/>interface Ethernet0\/3<br \/>!<br \/>interface Ethernet0\/4<br \/>!<br \/>interface Ethernet0\/5<br \/>!<br \/>interface Ethernet0\/6<br \/>!<br \/>interface Ethernet0\/7<br \/>!<br \/>interface Vlan1<br \/> nameif inside<br \/> security-level 100<br \/> ip address 192.168.1.1 255.255.255.0 <br \/>!<br \/>interface Vlan2<br \/> nameif outside<br \/> security-level 0<br \/> ip address dhcp setroute <br \/>!<br \/>ftp mode passive<br \/>dns domain-lookup inside<br \/>dns domain-lookup outside<br \/>same-security-traffic permit intra-interface<br \/>object network obj_any<br \/> subnet 0.0.0.0 0.0.0.0<br \/>object network NETWORK_OBJ_192.168.20.0_27<br \/> subnet 192.168.20.0 255.255.255.224<br \/>object network host<br \/> subnet 192.168.1.0 255.255.255.0<br \/>object network any2<br \/> subnet 192.168.20.0 255.255.255.0<br \/>access-list 102 extended permit icmp any any <br \/>access-list 102 extended permit ip any any <br \/>access-list NAT-EXEMPT extended permit ip 192.168.1.0 255.255.255.0 192.168.20.0 255.255.255.0 <br \/>access-list 234 extended permit ip 192.168.20.0 255.255.255.0 any <br \/>pager lines 24<br \/>logging enable<br \/>logging asdm informational<br \/>mtu inside 1500<br \/>mtu outside 1500<br \/>icmp unreachable rate-limit 1 burst-size 1<br \/>no asdm history enable<br \/>arp timeout 14400<br \/>no arp permit-nonconnected<br \/>!<br \/>object network obj_any<br \/> nat (inside,outside) dynamic interface<br \/>object network host<br \/> nat (any,outside) dynamic interface<br \/>object network any2<br \/> nat (any,outside) dynamic interface<br \/>access-group 102 in interface inside<br \/>access-group 102 in interface outside<br \/>timeout xlate 3:00:00<br \/>timeout pat-xlate 0:00:30<br \/>timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02<br \/>timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00<br \/>timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00<br \/>timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute<br \/>timeout tcp-proxy-reassembly 0:01:00<br \/>timeout floating-conn 0:00:00<br \/>dynamic-access-policy-record DfltAccessPolicy<br \/>user-identity default-domain LOCAL<br \/>aaa authentication http console LOCAL <br \/>aaa authentication ssh console LOCAL <br \/>http server enable<br \/>http 192.168.1.0 255.255.255.0 inside<br \/>http 0.0.0.0 0.0.0.0 outside<br \/>no snmp-server location<br \/>no snmp-server contact<br \/>crypto ipsec ikev2 ipsec-proposal DES<br \/> protocol esp encryption des<br \/> protocol esp integrity sha-1 md5<br \/>crypto ipsec ikev2 ipsec-proposal 3DES<br \/> protocol esp encryption 3des<br \/> protocol esp integrity sha-1 md5<br \/>crypto ipsec ikev2 ipsec-proposal AES<br \/> protocol esp encryption aes<br \/> protocol esp integrity sha-1 md5<br \/>crypto ipsec ikev2 ipsec-proposal AES192<br \/> protocol esp encryption aes-192<br \/> protocol esp integrity sha-1 md5<br \/>crypto ipsec ikev2 ipsec-proposal AES256<br \/> protocol esp encryption aes-256<br \/> protocol esp integrity sha-1 md5<br \/>crypto ipsec security-association pmtu-aging infinite<br \/>crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES<br \/>crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP<br \/>crypto map outside_map interface outside<br \/>crypto ca trustpoint ASDM_TrustPoint0<br \/> enrollment self<br \/> subject-name CN=ciscoasa<br \/> keypair ASA-SSL<br \/> crl configure<br \/>crypto ca trustpool policy<br \/>crypto ca certificate chain ASDM_TrustPoint0<br \/> certificate 2079c25f<br \/> 308201cf 30820138 a0030201 02020420 79c25f30 0d06092a 864886f7 0d010105 <br \/> 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648 <br \/> 86f70d01 09021608 63697363 6f617361 301e170d 32303131 32383136 33343135 <br \/> 5a170d33 30313132 36313633 3431355a 302c3111 300f0603 55040313 08636973 <br \/> 636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613081 <br \/> 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100cc 187ec456 <br \/> 17f099c7 76e3b9ac b598c5fd 0d6631a3 3f52b76d 5a222dea ea967130 98d41bea <br \/> 5ce5a3d8 854e1a22 986f0b88 5d991fbc 2281db21 c1092465 47eac8ab 4d4a0e0d <br \/> 2685eb72 2bfeb1c0 6b7edb60 daf9957d db46ede4 3bab05f2 3e2626fe eb17046e <br \/> 6abdc950 1c547833 701c917a 5db9623f 7dc991e0 310e5f34 590fdf02 03010001 <br \/> 300d0609 2a864886 f70d0101 05050003 81810067 cbc18d0d 7dff0412 66ac5a31 <br \/> bf13d91a 4f23cdd8 fb04b269 cceaeb67 3b9540e2 b09e0441 13598d8c bb01225d <br \/> 07428d43 4b2da65f 3c1a0be8 e66a3a1b f2f675be 3d08678a 2227787a 1eb1f4ca <br \/> 698c9c7e 8d99fb94 01bc5185 714dc675 d3bd67a6 f030688d a36dc1ac ccb420cb <br \/> 4298e890 5718a547 6f41fe76 95c0082e a940a1<br \/> quit<br \/>crypto ikev2 policy 1<br \/> encryption aes-256<br \/> integrity sha<br \/> group 5 2<br \/> prf sha<br \/> lifetime seconds 86400<br \/>crypto ikev2 policy 10<br \/> encryption aes-192<br \/> integrity sha<br \/> group 5 2<br \/> prf sha<br \/> lifetime seconds 86400<br \/>crypto ikev2 policy 20<br \/> encryption aes<br \/> integrity sha<br \/> group 5 2<br \/> prf sha<br \/> lifetime seconds 86400<br \/>crypto ikev2 policy 30<br \/> encryption 3des<br \/> integrity sha<br \/> group 5 2<br \/> prf sha<br \/> lifetime seconds 86400<br \/>crypto ikev2 policy 40<br \/> encryption des<br \/> integrity sha<br \/> group 5 2<br \/> prf sha<br \/> lifetime seconds 86400<br \/>crypto ikev2 enable outside client-services port 443<br \/>crypto ikev2 remote-access trustpoint ASDM_TrustPoint0<br \/>telnet timeout 5<br \/>no ssh stricthostkeycheck<br \/>ssh 0.0.0.0 0.0.0.0 outside<br \/>ssh timeout 5<br \/>ssh key-exchange group dh-group1-sha1<br \/>console timeout 0<\/p>\n<p>dhcpd auto_config outside<br \/>!<br \/>dhcpd address 192.168.1.5-192.168.1.36 inside<br \/>dhcpd enable inside<br \/>!<br \/>threat-detection basic-threat<br \/>threat-detection statistics access-list<br \/>no threat-detection statistics tcp-intercept<br \/>ssl trust-point ASDM_TrustPoint0 inside<br \/>ssl trust-point ASDM_TrustPoint0 outside<br \/>webvpn<br \/> enable outside<br \/> anyconnect image disk0:\/anyconnect-macos-4.9.04043-webdeploy-k9.pkg 1<br \/> anyconnect image disk0:\/anyconnect-win-4.9.04043-webdeploy-k9.pkg 2<br \/> anyconnect profiles Any_client_profile disk0:\/Any_client_profile.xml<br \/> anyconnect enable<br \/> tunnel-group-list enable<br \/>group-policy GroupPolicy_Any internal<br \/>group-policy GroupPolicy_Any attributes<br \/> wins-server value 114.114.114.114<br \/> dns-server value 223.5.5.5<br \/> vpn-tunnel-protocol ikev2 ssl-client ssl-clientless<br \/> split-tunnel-policy tunnelspecified<br \/> split-tunnel-network-list value 234<br \/> default-domain value cisco.com<br \/> webvpn<br \/> anyconnect profiles value Any_client_profile type user<br \/>username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15<br \/>tunnel-group Any type remote-access<br \/>tunnel-group Any general-attributes<br \/> address-pool pool_Any<br \/> default-group-policy GroupPolicy_Any<br \/>tunnel-group Any webvpn-attributes<br \/> group-alias Any enable<br \/>tunnel-group VPN type remote-access<br \/>!<br \/>class-map inspection_default<br \/> match default-inspection-traffic<br \/>!<br \/>!<br \/>policy-map type inspect dns preset_dns_map<br \/> parameters<br \/> message-length maximum client auto<br \/> message-length maximum 512<br \/>policy-map global_policy<br \/> class inspection_default<br \/> inspect dns preset_dns_map <br \/> inspect ftp <br \/> inspect h323 h225 <br \/> inspect h323 ras <br \/> inspect rsh <br \/> inspect rtsp <br \/> inspect esmtp <br \/> inspect sqlnet <br \/> inspect skinny <br \/> inspect sunrpc <br \/> inspect xdmcp <br \/> inspect sip <br \/> inspect netbios <br \/> inspect tftp <br \/> inspect ip-options <br \/>!<br \/>service-policy global_policy global<br \/>prompt hostname context <br \/>no call-home reporting anonymous<br \/>Cryptochecksum:6178a7c91d73664c0348c01caa0ed653<br \/>: end<br \/>no asdm history enable                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li data-pid=\"4373770\" data-uid=\"2\">\n<div>\n<div>\n<div> <span>\u4e3b<\/span> <span>\u8cc7\u6df1\u5927\u4f6c : makusuofute <\/span>  <\/div>\n<div> <i title=\"\u5f15\u7528\"><\/i>  <span>          <\/span> <\/div>\n<\/p><\/div>\n<div>                                                             @Tianao \u770b\u4e86\u4e0b\u914d\u7f6e\u6ca1\u6709\u89e3\u51b3\u601d\u8def\u3002                                                            <\/div>\n<\/p><\/div>\n<\/li>\n<li>\n","protected":false},"excerpt":{"rendered":"<p>ASA5505 \u4f7f\u7528\u76f8\u5173\u95ee\u9898 \u8cc7\u6df1&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"http:\/\/4563.org\/index.php?rest_route=\/wp\/v2\/posts\/211665"}],"collection":[{"href":"http:\/\/4563.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/4563.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/4563.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/4563.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=211665"}],"version-history":[{"count":0,"href":"http:\/\/4563.org\/index.php?rest_route=\/wp\/v2\/posts\/211665\/revisions"}],"wp:attachment":[{"href":"http:\/\/4563.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=211665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/4563.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=211665"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/4563.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=211665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}