Ciscopix525vpdn+acs用户验证

发表于:2007-06-23来源:作者:点击数: 标签:
系统环境: cisco pix 525 cisco acs server 3.2 实现功能: 远程使用cisco ipsec vpn client 3.x以上的vpn client 拨入企业 网络 ; 远程使用ms pptp vpn拨入企业网络; 所有远程vpdn用户通过acs server 做用户验证和记帐,便于管理和实现其他pix 验证无法实现的

   
  系统环境:
  
  cisco pix 525
  
  cisco acs server 3.2
  
  实现功能:
  
  远程使用cisco ipsec vpn client 3.x以上的vpn client 拨入企业网络;
  

  远程使用ms pptp vpn拨入企业网络;
  
  所有远程vpdn用户通过acs server 做用户验证和记帐,便于管理和实现其他pix 验证无法实现的功能,例如实现用户帐号尝试错误后锁定,访问时间等功能;
  
  pix 525 上的配置:
  
  jtpixfirewall# sh run
  
  : Saved
  
  :
  
  PIX Version 6.3(3)
  
  interface ethernet0 auto
  
  interface ethernet1 auto
  
  interface ethernet2 auto
  
  interface ethernet3 auto
  
  interface ethernet4 auto
  
  interface ethernet5 auto
  
  nameif ethernet0 outside security0
  
  nameif ethernet1 inside security100
  
  nameif ethernet2 perimter1 security20
  
  nameif ethernet3 perimter2 security30
  
  nameif ethernet4 perimter3 security40
  
  nameif ethernet5 perimter4 security50
  
  enable password pAvMEKYodlghdOOb7Y encrypted
  
  passwd 1ZowQT4VG2d3TbU69 encrypted
  
  hostname jtpixfirewall
  
  domain-name jt.com
  
  fixup protocol dns maximum-length 512
  
  fixup protocol ftp 21
  
  fixup protocol h323 h225 1720
  
  fixup protocol h323 ras 1718-1719
  
  fixup protocol http 80
  
  fixup protocol ils 389
  
  fixup protocol rsh 514
  
  fixup protocol rtsp 554
  
  fixup protocol sip 5060
  
  fixup protocol sip udp 5060
  
  fixup protocol skinny 2000
  
  fixup protocol smtp 25
  
  fixup protocol sqlnet 1521
  
  fixup protocol tftp 69
  
  names
  
  name 10.1.5.0 test
  
  name 10.1.8.50 netmang
  
  aclearcase/" target="_blank" >ccess-list inside_outbound_nat0_acl permit ip 10.1.8.0 255.255.255.0 10.1.58.0 255.255.255.0
  
  access-list inside_outbound_nat0_acl permit ip test 255.255.255.0 10.1.58.0 255.255.255.0
  
  access-list inside_outbound_nat0_acl permit ip 10.0.0.0 255.252.0.0 10.1.58.0 255.255.255.0
  
  access-list jt1_splitTunnelAcl permit ip tests 255.255.255.0 any
  
  access-list jt1_splitTunnelAcl permit ip 10.1.2.0 255.255.255.0 any
  
  access-list acl-out permit icmp any any
  
  pager lines 24
  
  logging on
  
  logging timestamp
  
  logging trap debugging
  
  logging history debugging
  
  logging facility 16
  
  logging host inside netmang
  
  mtu outside 1500
  
  mtu inside 1500
  
  mtu perimter1 1500
  
  mtu perimter2 1500
  
  mtu perimter3 1500
  
  mtu perimter4 1500
  
  ip address outside 222.121.48.75 255.255.255.224
  
  ip address inside 10.1.8.12 255.255.255.0
  
  ip address perimter1 127.0.0.1 255.255.255.255
  
  no ip address perimter2
  
  no ip address perimter3
  
  no ip address perimter4
  
  ip audit info action alarm
  
  ip audit attack action alarm
  
  ip local pool local_pool 10.1.58.50-10.1.58.100
  
  no failover
  
  failover timeout 0:00:00
  
  failover poll 15
  
  no failover ip address outside
  
  no failover ip address inside
  
  no failover ip address perimter1
  
  no failover ip address perimter2
  
  no failover ip address perimter3
  
  no failover ip address perimter4
  
  pdm location 10.1.9.50 255.255.255.255 inside
  
  pdm location 10.1.9.0 255.255.255.0 inside
  
  pdm location 10.1.9.0 255.255.255.0 perimter1
  
  pdm location 10.1.1.253 255.255.255.255 inside
  
  pdm location 10.1.0.0 255.255.0.0 inside
  
  pdm location 10.1.1.253 255.255.255.255 perimter1
  
  pdm location test 255.255.255.0 inside
  
  pdm location 10.0.0.0 255.252.0.0 inside
  
  pdm location 10.1.58.0 255.255.255.0 outside
  
  pdm location netmang 255.255.255.255 inside
  
  pdm history enable
  
  arp timeout 14400
  
  nat (inside) 0 access-list inside_outbound_nat0_acl
  
  nat (inside) 1 10.1.8.0 255.255.255.0 0 0
  
  nat (inside) 0 10.0.0.0 255.252.0.0 0 0
  
  access-group acl-out in interface inside
  
  rip inside default version 2
  
  route outside 0.0.0.0 0.0.0.0 222.121.48.65 1
  
  route inside 10.1.0.0 255.255.0.0 10.1.8.253 1
  
  timeout xlate 3:00:00
  
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
  
  timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
  
  timeout uauth 0:05:00 absolute
  
  aaa-server TACACS+ protocol tacacs+
  
  aaa-server RADIUS protocol radius
  
  aaa-server LOCAL protocol local
  
  aaa-server jtacs protocol radius
  
  #指定aaa采用radius
  
  aaa-server jtacs (inside) host netmang ddjt2008 timeout 5
  
  #指定radius server 的ip地址和口令(ddjt2008)
  
  aaa proxy-limit disable
  
  aaa accounting include tcp/0 inside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 jtacs
  
  #对aaa group jtacs做radius account (记帐)
  
  http server enable
  
  http 10.1.9.50 255.255.255.255 inside
  
  snmp-server host inside netmang
  
  no snmp-server location
  
  no snmp-server contact
  
  snmp-server community en9fk5*37
  
  snmp-server enable traps
  
  floodguard enable
  
  sysopt connection permit-ipsec
  
  sysopt connection permit-pptp
  
  sysopt radius ignore-secret
  
  service resetinbound
  
  crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
  
  crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
  
  crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
  
  crypto map outside_map client authentication jtacs
  
  crypto map outside_map interface outside
  
  isakmp enable outside
  
  isakmp nat-traversal 20
  
  #解决 ipsec 穿透 nat 问题;
  
  isakmp policy 40 authentication pre-share
  
  isakmp policy 40 encryption 3des
  
  isakmp policy 40 hash md5
  
  isakmp policy 40 group 2
  
  isakmp policy 40 lifetime 86400
  
  vpngroup test1 address-pool local_pool
  
  vpngroup test1 dns-server 10.1.2.1
  
  vpngroup test1 wins-server 10.1.2.1
  
  vpngroup test1 default-domain jt
  
  vpngroup test1 split-tunnel jt1_splitTunnelAcl
  
  vpngroup test1 idle-time 1800
  
  vpngroup test1 secure-unit-authentication
  
  vpngroup tset1 user-idle-timeout 18
  
  vpngroup test1 device-pass-through
  
  vpngroup test1 password ********
  
  telnet 10.1.8.0 255.255.255.0 inside
  
  telnet 10.1.9.0 255.255.255.0 inside
  
  telnet 10.1.1.253 255.255.255.255 inside
  
  telnet 10.1.1.253 255.255.255.255 perimter1
  
  telnet 10.1.1.253 255.255.255.255 perimter2
  
  telnet 10.1.1.253 255.255.255.255 perimter3
  
  telnet 10.1.1.253 255.255.255.255 perimter4
  
  telnet timeout 10
  
  ssh 10.1.9.0 255.255.255.0 inside
  
  ssh 10.1.9.0 255.255.255.0 perimter1
  
  ssh 10.1.9.0 255.255.255.0 perimter2
  
  ssh 10.1.9.0 255.255.255.0 perimter

原文转自:http://www.ltesting.net