-
Notifications
You must be signed in to change notification settings - Fork 10
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
114 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -3346,6 +3346,120 @@ network:lan1 = { ip = 10.99.2.0/24; } | |
Error: router:asavpn can't establish crypto tunnel to interface:vpn1.internet with unknown IP | ||
=END= | ||
############################################################ | ||
=TITLE=VPN ASA to VPN router with two local networks | ||
=INPUT= | ||
[[crypto_vpn]] | ||
network:intern = { ip = 10.1.1.0/24;} | ||
router:asavpn = { | ||
model = ASA, VPN; | ||
managed; | ||
general_permit = icmp 3; | ||
radius_attributes = { | ||
trust-point = ASDM_TrustPoint3; | ||
banner = Welcome at VPN service; | ||
dns-server = 10.1.1.10 10.1.1.11; | ||
wins-server = 10.1.1.20; | ||
} | ||
interface:intern = { | ||
ip = 10.1.1.101; | ||
hardware = inside; | ||
} | ||
interface:dmz = { | ||
ip = 192.168.0.101; | ||
hub = crypto:vpn; | ||
hardware = outside; | ||
} | ||
} | ||
network:dmz = { ip = 192.168.0.0/24; } | ||
router:extern = { | ||
interface:dmz = { ip = 192.168.0.1; } | ||
interface:internet; | ||
} | ||
network:internet = { ip = 0.0.0.0/0; has_subnets; } | ||
router:vpn = { | ||
managed; | ||
model = IOS; | ||
interface:internet = { | ||
negotiated; | ||
spoke = crypto:vpn; | ||
id = [email protected]; | ||
hardware = e1; | ||
} | ||
interface:lan2 = { | ||
ip = 10.99.2.1; | ||
hardware = e2; | ||
} | ||
interface:lan3 = { | ||
ip = 10.99.3.1; | ||
hardware = e3; | ||
} | ||
} | ||
network:lan2 = { ip = 10.99.2.0/24; } | ||
network:lan3 = { ip = 10.99.3.0/24; } | ||
service:test = { | ||
user = network:lan2, network:lan3; | ||
permit src = user; dst = network:intern; prt = tcp 80; | ||
permit src = network:intern; dst = user; prt = udp 123; | ||
} | ||
=OUTPUT= | ||
--asavpn | ||
tunnel-group VPN-single type remote-access | ||
tunnel-group VPN-single general-attributes | ||
authorization-server-group LOCAL | ||
default-group-policy global | ||
authorization-required | ||
username-from-certificate EA | ||
tunnel-group VPN-single ipsec-attributes | ||
chain | ||
ikev1 trust-point ASDM_TrustPoint3 | ||
ikev1 user-authentication none | ||
tunnel-group VPN-single webvpn-attributes | ||
authentication certificate | ||
tunnel-group-map default-group VPN-single | ||
-- | ||
! [email protected] | ||
access-list [email protected] extended permit ip 10.99.2.0 255.255.254.0 any4 | ||
access-list [email protected] extended deny ip any4 any4 | ||
group-policy [email protected] internal | ||
group-policy [email protected] attributes | ||
banner value Welcome at VPN service | ||
dns-server value 10.1.1.10 10.1.1.11 | ||
wins-server value 10.1.1.20 | ||
username [email protected] nopassword | ||
username [email protected] attributes | ||
service-type remote-access | ||
vpn-filter value [email protected] | ||
vpn-group-policy [email protected] | ||
-- | ||
! outside_in | ||
access-list outside_in extended permit icmp 10.99.2.0 255.255.254.0 any4 3 | ||
access-list outside_in extended permit tcp 10.99.2.0 255.255.254.0 10.1.1.0 255.255.255.0 eq 80 | ||
access-list outside_in extended deny ip any4 any4 | ||
access-group outside_in in interface outside | ||
--vpn | ||
ip access-list extended e1_in | ||
permit 50 host 192.168.0.101 any | ||
permit udp host 192.168.0.101 eq 500 any eq 500 | ||
deny ip any any | ||
-- | ||
ip access-list extended e2_in | ||
permit tcp 10.99.2.0 0.0.0.255 10.1.1.0 0.0.0.255 eq 80 | ||
permit udp 10.99.2.0 0.0.0.255 eq 123 10.1.1.0 0.0.0.255 | ||
deny ip any any | ||
-- | ||
interface e1 | ||
ip address negotiated | ||
crypto map crypto-e1 | ||
ip access-group e1_in in | ||
interface e2 | ||
ip address 10.99.2.1 255.255.255.0 | ||
ip access-group e2_in in | ||
interface e3 | ||
ip address 10.99.3.1 255.255.255.0 | ||
ip access-group e3_in in | ||
=END= | ||
############################################################ | ||
=TITLE=ASA as managed VPN spoke | ||
=TEMPL=input | ||
|