21. februar 2011 - 13:06
Der er
8 kommentarer og 1 løsning
Cisco asa 5505
Jeg har et spørgsmål.. Jeg skal til at flytte og så får jeg en ny ip .. Skal jeg kun ændre det under interfaces i asdm(outside ip) ?
Annonceindlæg fra Infor
21. februar 2011 - 13:09
#1
Muligvis. Det er den eneste variable faktor når du skifter forbindelse, og får ny ip.
21. februar 2011 - 13:21
#2
Det mente jeg også men man ved aldrig med ciso:)
21. februar 2011 - 14:20
#3
Ja, det skulle være nok, med mindre dine NAT indstillinger er lavet sjovt :) Bruger du access-lister, skal du nok også have disse tjekket igennem.
21. februar 2011 - 15:11
#4
Det ved jeg ikke om jeg gør:) kan du siger hvor i asdmén jeg kan se det?
21. februar 2011 - 15:42
#5
Jeg kan desværre ikke ASDMen i hovedet, men hvis du copy/paster din konfiguration herind, så kan jeg lynhurtigt set det. /Henrik
21. februar 2011 - 16:18
#6
: Saved : ASA Version 7.2(2) ! hostname absi-pix domain-name absi.dfq.dk enable password otT9ORMUZIGvnjWj encrypted no names name 192.168.1.150 server03 description windows server 1 ! interface Vlan1 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 ospf cost 10 ! interface Vlan2 nameif outside security-level 0 ip address 87.63.86.90 255.255.255.252 ospf cost 10 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! passwd otT9ORMUZIGvnjWj encrypted boot system disk0:/asa722-k8.bin ftp mode passive clock timezone CEST 1 clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00 dns server-group DefaultDNS domain-name absi.dfq.dk object-group service absiserver tcp description absiserver port-object eq www port-object range 3389 3389 port-object eq https port-object eq echo port-object eq smtp access-list outside_access_in extended permit tcp any eq ssh host 192.168.1.160 eq ssh access-list outside_access_in extended permit tcp host 212.130.69.130 interface outside eq telnet access-list outside_access_in extended permit tcp any interface outside object-group absiserver access-list outside_access_in extended permit icmp any any access-list absi_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 access-list NONAT extended permit ip any 192.168.1.128 255.255.255.224 access-list absi_splitTunnelAcl_1 standard permit any pager lines 24 logging enable logging monitor debugging logging buffered debugging logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool VPNPOOL 192.168.1.128-192.168.1.148 mask 255.255.255.255 no failover monitor-interface inside monitor-interface outside icmp unreachable rate-limit 1 burst-size 1 icmp permit any inside asdm image disk0:/asdm-522.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list NONAT nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 3389 192.168.1.200 3389 netmask 255.255.255.255 static (inside,outside) tcp interface www 192.168.1.150 www netmask 255.255.255.255 static (inside,outside) tcp interface smtp 192.168.1.150 smtp netmask 255.255.255.255 static (inside,outside) tcp interface https 192.168.1.150 https netmask 255.255.255.255 static (inside,outside) tcp interface 3652 192.168.1.160 3652 netmask 255.255.255.255 access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 87.63.86.89 1 timeout xlate 0:05:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute aaa-server radius protocol radius aaa-server radius host 192.168.1.100 key vpnabsi#2000 radius-common-pw vpnabsi#2000 group-policy DfltGrpPolicy attributes banner none wins-server none dns-server none dhcp-network-scope none vpn-access-hours none vpn-simultaneous-logins 10 vpn-idle-timeout none vpn-session-timeout none vpn-filter none vpn-tunnel-protocol IPSec password-storage disable ip-comp disable re-xauth disable group-lock none pfs disable ipsec-udp disable ipsec-udp-port 10000 split-tunnel-policy tunnelall split-tunnel-network-list none default-domain none split-dns none intercept-dhcp 255.255.255.255 disable secure-unit-authentication disable user-authentication disable user-authentication-idle-timeout 30 ip-phone-bypass disable leap-bypass disable nem disable backup-servers keep-client-config msie-proxy server none msie-proxy method no-modify msie-proxy except-list none msie-proxy local-bypass disable nac disable nac-sq-period 300 nac-reval-period 36000 nac-default-acl none address-pools none client-firewall none client-access-rule none webvpn functions url-entry html-content-filter none homepage none keep-alive-ignore 4 http-comp gzip filter none url-list none customization value DfltCustomization port-forward none port-forward-name value Application Access sso-server none deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information svc none svc keep-installer installed svc keepalive none svc rekey time none svc rekey method none svc dpd-interval client none svc dpd-interval gateway none svc compression deflate group-policy absi internal group-policy absi attributes wins-server value 192.168.1.150 dns-server value 192.168.1.150 194.239.134.83 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value absi_splitTunnelAcl default-domain value absi.local username axcess password UVaqOD8rG4CVclhv encrypted privilege 15 aaa authentication ssh console LOCAL http server enable 2180 http 192.168.1.0 255.255.255.0 inside http 192.168.1.0 255.255.255.0 outside http 83.72.129.224 255.255.255.255 outside http 92.43.232.7 255.255.255.255 outside http 92.43.232.135 255.255.255.255 outside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto dynamic-map outside_dyn_map 20 set pfs crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp nat-traversal 20 tunnel-group DefaultL2LGroup ipsec-attributes isakmp keepalive threshold 15 retry 2 tunnel-group DefaultRAGroup ipsec-attributes isakmp keepalive threshold 15 retry 2 tunnel-group absi type ipsec-ra tunnel-group absi general-attributes address-pool VPNPOOL authentication-server-group radius default-group-policy absi tunnel-group absi ipsec-attributes pre-shared-key * isakmp keepalive threshold 15 retry 2 telnet 192.168.1.0 255.255.255.0 inside telnet timeout 5 ssh 192.168.1.0 255.255.255.0 inside ssh 192.168.3.0 255.255.255.0 inside ssh 0.0.0.0 0.0.0.0 inside ssh 192.168.3.0 255.255.255.0 outside ssh 90.184.28.213 255.255.255.255 outside ssh 92.43.232.7 255.255.255.255 outside ssh 92.43.232.135 255.255.255.255 outside ssh timeout 5 console timeout 0 management-access inside l2tp tunnel hello 240 dhcpd dns 192.168.1.150 194.239.134.83 ! dhcpd address 192.168.1.10-192.168.1.49 inside dhcpd ping_timeout 750 interface inside ! ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global ntp server 194.239.134.10 source outside prefer prompt hostname context Cryptochecksum:48da711949db5017d17ebf970221b45a : end asdm image disk0:/asdm-522.bin no asdm history enable
21. februar 2011 - 16:24
#7
Nej IP adressen er det eneste du skal ændre, så er du kørende. Husk dine VPN klienter skal forbinde med en ny IP, måske noget DNS skal ændres. Du kan godt slette konfiggen igen eller hvertfald de dele der omhandler WAN IP og Passwords
21. februar 2011 - 16:26
#8
Øhh hvor sletter jeg det henne.. jeg er ny på siden
23. marts 2011 - 10:02
#9
Jeg har lige et til spørgsmål :) Nu hvor jeg skal flytter til nye lokaler skal jeg vel også ændre mine dns servere? jeg har stadig tdc men er i tvivl om jeg har fået nye dns servere hos dem`?
IT-kurser om Microsoft 365, sikkerhed, personlig vækst, udvikling, digital markedsføring, grafisk design, SAP og forretningsanalyse.