转到正文

天亮了说晚安's Blog

欢迎您的光临! http://www.tllswa.com

存档

分类: 防火墙

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-remote-access.html Chapter: Remote Access IPsec VPNs Chapter Contents About Remote Access IPsec VPNsLicensing Requirements for Remote Access IPsec VPNs for 3.1Restrictions for IPsec VPNConfigure Remote Access IPsec VPNsConfiguration Examples for Remote Access IPsec VPNsConfiguration Examples for Standards-Based IPSec IKEv2 Remote Access VPN in Multiple-Context ModeConfiguration Examples for AnyConnect IPSec IKEv2 Remote Access VPN in Multiple-Context ModeFeature History for Remote Access VPNs About Remote Access IPsec VPNs Remote access VPNs allow users to connect to a central site through a secure connection over a TCP/IP network. The Internet Security Association and Key Management Protocol, also called IKE, is the negotiation protocol that lets the IPsec client on the remote PC and the ASA agree on how to build an IPsec Security Association. Each ISAKMP negot......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-addresses.html Chapter: IP Addresses for VPNs Chapter Contents Configure an IP Address Assignment PolicyConfigure Local IP Address PoolsConfigure AAA AddressingConfigure DHCP Addressing Configure an IP Address Assignment Policy The ASA can use one or more of the following methods for assigning IP addresses to remote access clients. If you configure more than one address assignment method, the ASA searches each of the options until it finds an IP address. By default, all methods are enabled. aaa Retrieves addresses from an external authentication, authorization, and accounting server on a per-user basis. If you are using an authentication server that has IP addresses configured, we recommend using this method. This method is available for IPv4 and IPv6 assignment policies.dhcp Obtains IP addresses from a DHCP server. If you want to use DHCP, you must......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-groups.html Chapter: Connection Profiles, Group Policies, and Users Chapter Contents This chapter describes how to configure VPN connection profiles (formerly called “tunnel groups”), group policies, and users. This chapter includes the following sections. Overview of Connection Profiles, Group Policies, and UsersConnection ProfilesConfigure Connection ProfilesGroup PoliciesUse of a Zone Labs Integrity ServerConfigure User Attributes Overview of Connection Profiles, Group Policies, and Users Groups and users are core concepts in managing the security of virtual private networks (VPNs) and in configuring the ASA. They specify attributes that determine user access to and use of the VPN. A group is a collection of users treated as a single entity. Users get their attributes from group policies. A connection profile identifies......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-params.html Chapter: General VPN Parameters Chapter Contents The ASA implementation of virtual private networking includes useful features that do not fit neatly into categories. This chapter describes some of these features. Guidelines and LimitationsConfigure IPsec to Bypass ACLsPermitting Intra-Interface Traffic (Hairpinning)Setting Maximum Active IPsec or SSL VPN SessionsUse Client Update to Ensure Acceptable IPsec Client Revision LevelsImplement NAT-Assigned IP to Public IP ConnectionConfigure VPN Session LimitsUsing an Identify Certificate When NegotiatingConfigure the Pool of Cryptographic CoresConfigure Dynamic Split TunnelingViewing Active VPN SessionsAbout ISE Policy EnforcementConfigure Advanced SSL SettingsPersistent IPsec Tunneled Flows Guidelines and Limitations This section includes the guidelines and limitations for this feature. Context Mo......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-ha.html Chapter: High Availability Options Chapter Contents High Availability OptionsVPN Load Balancing High Availability Options Load balancing and Failover are high-availability features that function differently and have different requirements. In some circumstances you may use multiple capabilities in your deployment. The following sections describe these features. Refer to the appropriate release of the ASA General Operations CLI Configuration Guide for details on Failover. Load Balancing details are included here. VPN Load BalancingFailover VPN Load Balancing VPN load balancing is a mechanism for equitably distributing remote-access VPN traffic among the devices in a VPN load-balancing group. It is based on simple distribution of traffic without taking into account throughput or other factors. A VPN load-balancing group consists of ......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-l2tp-ipsec.html Chapter: L2TP over IPsec Chapter Contents This chapter describes how to configure L2TP over IPsec/IKEv1 on the ASA. About L2TP over IPsec/IKEv1 VPNLicensing Requirements for L2TP over IPsecPrerequisites for Configuring L2TP over IPsecGuidelines and LimitationsConfiguring L2TP over Eclipse with CLIFeature History for L2TP over IPsec About L2TP over IPsec/IKEv1 VPN Layer 2 Tunneling Protocol (L2TP) is a VPN tunneling protocol that allows remote clients to use the public IP network to securely communicate with private corporate network servers. L2TP uses PPP over UDP (port 1701) to tunnel the data. L2TP protocol is based on the client/server model. The function is divided between the L2TP Network Server (LNS), and the L2TP Access Concentrator (LAC). The LNS typically runs on a network gateway such as a router, while the LAC can be a dial-up Ne......Read More

本文转自:https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/configuration/vpn/asa-98-vpn-config/vpn-ike.html Chapter: IPsec and ISAKMP Chapter Contents About Tunneling, IPsec, and ISAKMPLicensing for IPsec VPNsGuidelines for IPsec VPNsConfigure IPsec About Tunneling, IPsec, and ISAKMP This topic describes the Internet Protocol Security (IPsec) and the Internet Security Association and Key Management Protocol (ISAKMP) standards used to build Virtual Private Networks (VPNs). Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections between remote users and a private corporate network. Each secure connection is called a tunnel. The ASA uses the ISAKMP and IPsec tunneling standards to build and manage tunnels. ISAKMP and IPsec accomplish the following: Negotiate tunnel parametersEstablish tunnelsAuthenticate users and dataManage security keysEncrypt and decrypt dataManage data transfer across the tunnel......Read More

本文转自:https://blog.csdn.net/u010531676/article/details/79733901 能找到这里,都是用Cisco VPN ,然后出现442错误吧。     说下我的情况,我这里本来是解决了一次,能连回公司,但昨天升到Win 10 1709时,开机看到提示说Cisco VPN不安全还是怎样,然后VPN服务被移除了。然后在控制面板修复了Cisco VPN,连接时就出现442。     先贴下可能帮你解决问题的链接:     1.https://supportforums.cisco.com/t5/vpn/reason-442-failed-to-enable-virtual-adapter-windows-7-64-bit/td-p/1782751     2.https://blog.csdn.net/gotomic/article/details/8113536     第三个是解决我的问题的原始链接,注册表的问题:Solved     解决步骤:         1.打开注册表中心 (Win + R , 输入regeidt );         2.在注册表中定位到 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CVirtA,双击右边”DisplayName”,将”Cisco Systems VPN Adapter for 64-bit Windows&......Read More

本文转自: https://blog.csdn.net/chentaocba/article/details/7704918 学防火墙必知的几个概念 一、区域概念(接口区域) 1、 TRUST 信任区域 UNTRUST 非信任区域 DMZ 非军事区 2、 INSIDE 信任区域 OUSIDE 非信任区域 DMZ 非军事区 二、接口模式 transparent模式:(透明模式) 在transparent模式下,设备检查通过防火墙的数据包,但并不改变ip包头中的任何源地址和目的地址信息。因为它不改变地址,所以保护网内的ip必须在untrust连接的网络内是有效且可寻路的,untrust很可能就接互连网了。 在transparent模式下,对于trust区和untrust区的ip地址就设为0.0.0.0,这样可以使防火墙在网络中不可见。但是,防火墙、vpn和流量管理还是要通过配置设备的策略来生效。防火墙相当于一个2层交换机(2层交换机本身是没有ip地址的)。 route模式(路由模式) 当设备处于route模式下,每一个接口都被设立为route模式或nat模式。不像transparent模式,所有的网口都处于不同的子网当中。这个网口处理通过的流量时不nat,即ip包头中的源地址和端口号都保持不变 NAT模式:(地址转换模式) 当一个网口处于nat模式,防火墙会把从trust口往外的ip包中的源......Read More

本文转自: https://blog.csdn.net/chentaocba/article/details/7716109 要想配置思科的防火墙得先了解这些命令:  常用命令有:nameif、interface、ip address、nat、global、route、static等。  global  指定公网地址范围:定义地址池。  Global命令的配置语法:  global (if_name) nat_id ip_address-ip_address [netmark global_mask]  其中:  (if_name):表示外网接口名称,一般为outside。  nat_id:建立的地址池标识(nat要引用)。  ip_address-ip_address:表示一段ip地址范围。  [netmark global_mask]:表示全局ip地址的网络掩码。  nat  地址转换命令,将内网的私有ip转换为外网公网ip。  nat命令配置语法:nat (if_name) nat_id local_ip [netmark]  其中:  (if_name):表示接口名称,一般为inside.  nat_id: 表示地址池,由global命令定义。  local_ip: 表示内网的ip地址。对于0.0.0.0表示内网所有主机。  [netmark]:表示内网ip地址的子网掩码。  route  route命令定义静态路由。  语法:  route (if_name) 0 0 gateway_ip [metric]  其中:  (if_name):表示接口名称。  0 0 :表示所有主机  ......Read More

备案信息