蓝色动力网络

 找回密码
 立即注册

扫一扫,访问微社区

QQ登录

只需一步,快速开始

查看: 1809|回复: 0

ASA ipsec vpn 路由问题

[复制链接]
发表于 2013-12-29 11:08:36 | 显示全部楼层 |阅读模式
小弟对vpn接触较少,现按网上一些资料配置ASA ipsec vpn出现以下问题,远程电脑客户端可以成功拨入,相关指定的IP也可以获取到,但不能访问公司内网,就连ASA inside接口都不能ping通。如果vpn连接网段设置跟inside网段相同,即可以正常访问,查了很多资料,现还没弄明白是路由问题,还是NAT没有做好。相关拓扑图如下:
  asa配置:
  ASA Version 8.2(5)
  !
  hostname ciscoasa
  enable password 2KFQnbNIdI.2KYOU encrypted
  passwd 2KFQnbNIdI.2KYOU encrypted
  names
  !
  interface Ethernet0/0
  nameif outside
  security-level 0
  ip address 202.xxx.xxx.xxx 255.255.255.248
  !
  interface Ethernet0/1
  nameif inside
  security-level 100
  ip address 172.65.1.100 255.255.255.0
  !
  interface Ethernet0/2
  shutdown
  no nameif
  no security-level
  no ip address
  !
  interface Ethernet0/3
  shutdown
  no nameif
  no security-level
  no ip address
  !
  interface Management0/0
  shutdown
  no nameif
  no security-level
  no ip address
  !
  ftp mode passive
  access-list no-nat extended permit ip 172.65.1.0 255.255.255.0 172.65.3.0 255.255.255.0
  access-list no-nat extended permit ip 172.65.3.0 255.255.255.0 172.65.1.0 255.255.255.0
  access-list vpnclient_splitTunnelAcl standard permit 172.65.1.0 255.255.255.0
  pager lines 24
  logging enable
  logging asdm informational
  mtu outside 1500
  mtu inside 1500
  ip local pool ipsecpool 172.65.3.100-172.65.3.199 mask 255.255.255.0
  icmp unreachable rate-limit 1 burst-size 1
  asdm image disk0:/asdm-645.bin
  no asdm history enable
  arp timeout 14400
  global (outside) 1 interface
  nat (inside) 0 access-list no-nat
  nat (inside) 1 0.0.0.0 0.0.0.0
  route outside 0.0.0.0 0.0.0.0 202.xxx.xxx.xxx 1
  route inside 172.65.0.0 255.255.0.0 172.65.1.1 1
  timeout xlate 3:00:00
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00  timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00  timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute  timeout tcp-proxy-reassembly 0:01:00  timeout floating-conn 0:00:00  dynamic-access-policy-record DfltAccessPolicy  aaa authentication http console LOCAL  aaa authentication telnet console LOCAL  http server enable  http 172.65.0.0 255.255.0.0 inside  no snmp-server location  no snmp-server contact  snmp-server enable traps snmp authentication linkup linkdown coldstart  crypto ipsec transform-set vpnset esp-3des esp-sha-hmac  crypto ipsec security-association lifetime seconds 28800  crypto ipsec security-association lifetime kilobytes 4608000  crypto dynamic-map outside-dyn-map 10 set transform-set vpnset  crypto dynamic-map outside-dyn-map 10 set security-association lifetime seconds 288000  crypto dynamic-map outside-dyn-map 10 set reverse-route  crypto map outside-map 10 ipsec-isakmp dynamic outside-dyn-map  crypto map outside-map interface outside  crypto ca trustpoint _SmartCallHome_ServerCA  crl configure  crypto isakmp enable outside  crypto isakmp policy 1  authentication pre-share  encryption 3des  hash sha  group 2  lifetime 43200  telnet 172.65.0.0 255.255.0.0 inside  telnet timeout 30  ssh 172.65.0.0 255.255.0.0 inside  ssh timeout 30  ssh version 1  console timeout 0  threat-detection basic-threat  threat-detection statistics access-list  no threat-detection statistics tcp-intercept  webvpn  group-policy vpnclient internal  group-policy vpnclient attributes  dns-server value 172.65.0.11  vpn-tunnel-protocol IPSec  split-tunnel-policy tunnelspecified  split-tunnel-network-list value vpnclient_splitTunnelAcl  username admin password f3UhLvUj1QsXsuK7 encrypted  username test password c2I40Rrw1iizALuA encrypted  username test attributes  vpn-group-policy vpnclient  tunnel-group vpnclient type remote-access  tunnel-group vpnclient general-attributes  address-pool ipsecpool  default-group-policy vpnclient  tunnel-group vpnclient ipsec-attributes  pre-shared-key *****  !  class-map inspection_default  match default-inspection-traffic  !  !  policy-map type inspect dns preset_dns_map  parameters  message-length maximum client auto  message-length maximum 512  policy-map global_policy  class inspection_default  inspect dns preset_dns_map  inspect ftp  inspect h323 h225  inspect h323 ras  inspect ip-options  inspect netbios  inspect rsh  inspect rtsp  inspect skinny  inspect esmtp  inspect sqlnet  inspect sunrpc  inspect tftp  inspect sip  inspect xdmcp  !  service-policy global_policy global  prompt hostname context  call-home reporting anonymous  call-home  profile CiscoTAC-1  no active  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService  destination address email callhome@cisco.com  destination transport-method http  subscribe-to-alert-group diagnostic  subscribe-to-alert-group environment  subscribe-to-alert-group inventory periodic monthly  subscribe-to-alert-group configuration periodic monthly  subscribe-to-alert-group telemetry periodic daily  Cryptochecksum:6fdb4100304d2eebc91ce0be6c3c9e89  : end  补充:vpn route模式  如果把vpn地址池更换为ip local pool ipsecpool 172.65.1.110-172.65.1.199 mask 255.255.255.0  即可正常访问了!
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

蓝色动力网络微信平台
网站管理,业务合作联系邮箱: admin#lansedongli.com    QQ:13412492 限网站业务问题.
网站帐号、密码、密保找回请使用注册邮箱,发送邮件至 password#lansedongli.com ,否则不予受理.
免责声明:本论坛所有文字和图片仅代表其个人观点.
本站某些资料或文章来自于互联网,不代表本站观点,如果侵犯了您的权益,请来信告知,我们会在三天内删除.
为了给大家一个更好的交流场所,请勿在本论坛发表与中华人民共和国法律相抵触的言论,请合作,谢谢!
Copyright © 2007-2019 Corporation Powered by网吧系统 版权所有    转载请注明!
浙ICP备11043737号 程序:Discuz! x3.4

湘公网安备 43018102000145号

手机版|Archiver|蓝色动力网络   

快速回复 返回顶部 返回列表