Avatar billede crazymalamute Nybegynder
21. februar 2011 - 13:06 Der er 8 kommentarer og
1 løsning

Cisco asa 5505

Jeg har et spørgsmål.. Jeg skal til at flytte og så får jeg en ny ip .. Skal jeg kun ændre det under interfaces i asdm(outside ip) ?
Avatar billede Blandy Praktikant
21. februar 2011 - 13:09 #1
Muligvis. Det er den eneste variable faktor når du skifter forbindelse, og får ny ip.
Avatar billede crazymalamute Nybegynder
21. februar 2011 - 13:21 #2
Det mente jeg også men man ved aldrig med ciso:)
Avatar billede henrik_meyer Nybegynder
21. februar 2011 - 14:20 #3
Ja, det skulle være nok, med mindre dine NAT indstillinger er lavet sjovt :)

Bruger du access-lister, skal du nok også have disse tjekket igennem.
Avatar billede crazymalamute Nybegynder
21. februar 2011 - 15:11 #4
Det ved jeg ikke om jeg gør:) kan du siger hvor i asdmén jeg kan se det?
Avatar billede henrik_meyer Nybegynder
21. februar 2011 - 15:42 #5
Jeg kan desværre ikke ASDMen i hovedet, men hvis du copy/paster din konfiguration herind, så kan jeg lynhurtigt set det.

/Henrik
Avatar billede crazymalamute Nybegynder
21. februar 2011 - 16:18 #6
: Saved
:
ASA Version 7.2(2)
!
hostname absi-pix
domain-name absi.dfq.dk
enable password otT9ORMUZIGvnjWj encrypted
no names
name 192.168.1.150 server03 description windows server 1
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
ospf cost 10
!
interface Vlan2
nameif outside
security-level 0
ip address 87.63.86.90 255.255.255.252
ospf cost 10
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd otT9ORMUZIGvnjWj encrypted
boot system disk0:/asa722-k8.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
domain-name absi.dfq.dk
object-group service absiserver tcp
description absiserver
port-object eq www
port-object range 3389 3389
port-object eq https
port-object eq echo
port-object eq smtp
access-list outside_access_in extended permit tcp any eq ssh host 192.168.1.160 eq ssh
access-list outside_access_in extended permit tcp host 212.130.69.130 interface outside eq telnet
access-list outside_access_in extended permit tcp any interface outside object-group absiserver
access-list outside_access_in extended permit icmp any any
access-list absi_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0
access-list NONAT extended permit ip any 192.168.1.128 255.255.255.224
access-list absi_splitTunnelAcl_1 standard permit any
pager lines 24
logging enable
logging monitor debugging
logging buffered debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool VPNPOOL 192.168.1.128-192.168.1.148 mask 255.255.255.255
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
asdm image disk0:/asdm-522.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list NONAT
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 3389 192.168.1.200 3389 netmask 255.255.255.255
static (inside,outside) tcp interface www 192.168.1.150 www netmask 255.255.255.255
static (inside,outside) tcp interface smtp 192.168.1.150 smtp netmask 255.255.255.255
static (inside,outside) tcp interface https 192.168.1.150 https netmask 255.255.255.255
static (inside,outside) tcp interface 3652 192.168.1.160 3652 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 87.63.86.89 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
aaa-server radius protocol radius
aaa-server radius host 192.168.1.100
key vpnabsi#2000
radius-common-pw vpnabsi#2000
group-policy DfltGrpPolicy attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 10
vpn-idle-timeout none
vpn-session-timeout none
vpn-filter none
vpn-tunnel-protocol IPSec
password-storage disable
ip-comp disable
re-xauth disable
group-lock none
pfs disable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
intercept-dhcp 255.255.255.255 disable
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout 30
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
msie-proxy server none
msie-proxy method no-modify
msie-proxy except-list none
msie-proxy local-bypass disable
nac disable
nac-sq-period 300
nac-reval-period 36000
nac-default-acl none
address-pools none
client-firewall none
client-access-rule none
webvpn
  functions url-entry
  html-content-filter none
  homepage none
  keep-alive-ignore 4
  http-comp gzip
  filter none
  url-list none
  customization value DfltCustomization
  port-forward none
  port-forward-name value Application Access
  sso-server none
  deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information
  svc none
  svc keep-installer installed
  svc keepalive none
  svc rekey time none
  svc rekey method none
  svc dpd-interval client none
  svc dpd-interval gateway none
  svc compression deflate
group-policy absi internal
group-policy absi attributes
wins-server value 192.168.1.150
dns-server value 192.168.1.150 194.239.134.83
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value absi_splitTunnelAcl
default-domain value absi.local
username axcess password UVaqOD8rG4CVclhv encrypted privilege 15
aaa authentication ssh console LOCAL
http server enable 2180
http 192.168.1.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 outside
http 83.72.129.224 255.255.255.255 outside
http 92.43.232.7 255.255.255.255 outside
http 92.43.232.135 255.255.255.255 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set pfs
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp nat-traversal  20
tunnel-group DefaultL2LGroup ipsec-attributes
isakmp keepalive threshold 15 retry 2
tunnel-group DefaultRAGroup ipsec-attributes
isakmp keepalive threshold 15 retry 2
tunnel-group absi type ipsec-ra
tunnel-group absi general-attributes
address-pool VPNPOOL
authentication-server-group radius
default-group-policy absi
tunnel-group absi ipsec-attributes
pre-shared-key *
isakmp keepalive threshold 15 retry 2
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.1.0 255.255.255.0 inside
ssh 192.168.3.0 255.255.255.0 inside
ssh 0.0.0.0 0.0.0.0 inside
ssh 192.168.3.0 255.255.255.0 outside
ssh 90.184.28.213 255.255.255.255 outside
ssh 92.43.232.7 255.255.255.255 outside
ssh 92.43.232.135 255.255.255.255 outside
ssh timeout 5
console timeout 0
management-access inside
l2tp tunnel hello 240
dhcpd dns 192.168.1.150 194.239.134.83
!
dhcpd address 192.168.1.10-192.168.1.49 inside
dhcpd ping_timeout 750 interface inside
!

!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
!
service-policy global_policy global
ntp server 194.239.134.10 source outside prefer
prompt hostname context
Cryptochecksum:48da711949db5017d17ebf970221b45a
: end
asdm image disk0:/asdm-522.bin
no asdm history enable
Avatar billede henrik_meyer Nybegynder
21. februar 2011 - 16:24 #7
Nej IP adressen er det eneste du skal ændre, så er du kørende.
Husk dine VPN klienter skal forbinde med en ny IP, måske noget DNS skal ændres.

Du kan godt slette konfiggen igen eller hvertfald de dele der omhandler WAN IP og Passwords
Avatar billede crazymalamute Nybegynder
21. februar 2011 - 16:26 #8
Øhh hvor sletter jeg det henne.. jeg er ny på siden
Avatar billede crazymalamute Nybegynder
23. marts 2011 - 10:02 #9
Jeg har lige et til spørgsmål :)

Nu hvor jeg skal flytter til nye lokaler skal jeg vel også ændre mine dns servere? jeg har stadig tdc men er i tvivl om jeg har fået nye dns servere hos dem`?
Avatar billede Ny bruger Nybegynder

Din løsning...

Tilladte BB-code-tags: [b]fed[/b] [i]kursiv[/i] [u]understreget[/u] Web- og emailadresser omdannes automatisk til links. Der sættes "nofollow" på alle links.

Loading billede Opret Preview
Kategori
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.

Log ind eller opret profil

Hov!

For at kunne deltage på Computerworld Eksperten skal du være logget ind.

Det er heldigvis nemt at oprette en bruger: Det tager to minutter og du kan vælge at bruge enten e-mail, Facebook eller Google som login.

Du kan også logge ind via nedenstående tjenester