[ Pobierz całość w formacie PDF ]
.Using Access-Lists (Crypto ACL) we can identify which traffic flow must be encrypted.In our example diagramabove, we want all traffic flow between private networks 192.168.1.0/24 and 192.168.2.0/24 to beencrypted.ASA 1:ASA-1(config)# access-list LAN1-to-LAN2 extended permit ip 192.168.1.0 255.255.255.0192.168.2.0 255.255.255.0ASA 2:ASA-2(config)# access-list LAN2-to-LAN1 extended permit ip 192.168.2.0 255.255.255.0192.168.1.0 255.255.255.0Notice that we have to configure the exact mirror access-list for each ASA firewall participating inthe IPSEc VPN.The Crypto ACL needs to identify only outbound traffic.The permit statement in theACL means that the specific traffic must be encrypted.One important issue to consider is the case of using NAT on the firewall for normal Internet access.Because IPSEc does not work with NAT, we need to exclude the traffic to be encrypted from theNAT operation.This means in our example that the Interesting Traffic in the Crypto ACL must notbe translated (we can use the nat 0 command for this).See configuration below:56 ASA 1:ASA-1(config)# access-list NONAT extended permit ip 192.168.1.0 255.255.255.0192.168.2.0 255.255.255.0ASA-1(config)# nat (inside) 0 access-list NONAT ßð Exclude traffic from LAN1 to LAN2 fromNAT operationASA 2:ASA-2(config)# access-list NONAT extended permit ip 192.168.2.0 255.255.255.0192.168.1.0 255.255.255.0ASA-2(config)# nat (inside) 0 access-list NONAT ßð Exclude traffic from LAN2 to LAN1 fromNAT operationCisco ASA Version 8.3 and laterASA 1:ASA-1(config)# object network obj-localASA-1(config-network-object)# subnet 192.168.1.0 255.255.255.0ASA-1(config-network-object)# exitASA-1(config)# object network obj-remoteASA-1(config-network-object)# subnet 192.168.2.0 255.255.255.0ASA-1(config-network-object)# exitASA-1(config)# nat (inside,outside) 1 source static obj-local obj-local destination static obj-remote obj-remoteASA 2:ASA-2(config)# object network obj-localASA-2(config-network-object)# subnet 192.168.2.0 255.255.255.0ASA-2(config-network-object)# exitASA-2(config)# object network obj-remoteASA-2(config-network-object)# subnet 192.168.1.0 255.255.255.0ASA-2(config-network-object)# exitASA-2(config)# nat (inside,outside) 1 source static obj-local obj-local destination static obj-remote obj-remote57 STEP 2: Configure Phase 1 (ISAKMP)Phase 1 of the IPSEc operation is used to establish a secure communication channel for further datatransmission.In Phase 1, VPN peers exchange shared secret keys, authenticate each other, negotiateIKE security policies etc.In this Phase we configure an isakmp policy which MUST match thepolicy configured on the other peer(s).This isakmp policy tells the other peer(s) what securityparameters must be used in the VPN (e.g encryption protocol, hash algorithm, authenticationmethod, Diffie Hellman Group (DH), lifetime threshold for the tunnel etc).The command format of the isakmp policy is the following:ASA(config)# isakmp policy  priority number ßðLower number means higher priorityASA(config-isakmp-policy)# encryption {aes | 3des | des}ASA(config-isakmp-policy)# hash {sha | md5}ASA(config-isakmp-policy)# authentication {pre-share | rsa-sig}ASA(config-isakmp-policy)# group {1 | 2 | 5 | 7} ßðDH GroupASA(config-isakmp-policy)# lifetime  seconds ßðUp to 86400 secondsASA(config)# isakmp enable  interface-name ßðAttach the policy on an interfaceASA(config)# isakmp identity address ßðIdentify the ASA with its address and not FQDNSeveral isakmp policies can be configured to match different requirements from different IPSEcpeers.The priority number uniquely identifies each policy.The lower the priority number, thehigher the priority will be given to the specific policy.The following example parameters can be used to create a strong isakmp policy:Encryption aesHash shaAuthentication pre-shareGroup 2 or 5Lifetime 3600 (the Security Association  SA will expire and renegotiate every 1 hour)The next thing we need to specify is the pre-shared key and the type of the VPN (Lan-to-Lan,Remote Access or WebVPN).These are configured by the tunnel-group command.ASA(config)# tunnel-group  peer IP address type {ipsec-l2l | ipsec-ra | webvpn}ASA(config)# tunnel-group  peer IP address ipsec-attributesASA(config-tunnel-ipsec)# pre-shared-key  key58 Note: The tunnel-group types  ipsec-ra and  webvpn were deprecated from ASA version 8.0(2).These two are replaced by the new  remote-access type.Let s see the complete example configuration for both firewalls for Phase 1 setup:ASA 1:ASA-1(config)# isakmp policy 10ASA-1(config-isakmp-policy)# encryption aesASA-1(config-isakmp-policy)# hash shaASA-1(config-isakmp-policy)# authentication pre-shareASA-1(config-isakmp-policy)# group 2ASA-1(config-isakmp-policy)# lifetime 3600ASA-1(config)# isakmp enable outsideASA-1(config)# isakmp identity addressASA-1(config)# tunnel-group 200.200.200.1 type ipsec-l2lASA-1(config)# tunnel-group 200.200.200.1 ipsec-attributesASA-1(config-tunnel-ipsec)# pre-shared-key somestrongkeyASA 2:ASA-2(config)# isakmp policy 10ASA-2(config-isakmp-policy)# encryption aesASA-2(config-isakmp-policy)# hash shaASA-2(config-isakmp-policy)# authentication pre-shareASA-2(config-isakmp-policy)# group 2ASA-2(config-isakmp-policy)# lifetime 3600ASA-2(config)# isakmp enable outsideASA-2(config)# isakmp identity addressASA-2(config)# tunnel-group 100.100.100.1 type ipsec-l2lASA-2(config)# tunnel-group 100.100.100 [ Pobierz caÅ‚ość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • windykator.keep.pl
  • Strona pocz±tkowa
  • Isaac Asimov Foundation 04 Foundation's Edge (Ballantine Edition)
  • Graeme Turner British Cultural Studies, Third Edition An Introduction
  • Warzone 3nd Edition UWZ Polskie Zasady
  • 300 101 Cisco Testking Jan 2016 by TYLER Free VCE Practice Exam
  • Nasz czlowiek z Szanghaju Asa Lantz
  • Unitarne odpowiedzi na fundamentalne pytania
  • Burrough Bryan Wrogowie publiczni
  • Stiefvater Maggie Drżenie 03 Ukojenie
  • MacLean Sarah Zasady Å‚ajdaków 04 Trzy twarze damy
  • Jon Mandle Rawls's 'A Theory of Justice', An Introduction (2009)
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • ocenkijessi.opx.pl