CarTerr Posted November 23, 2017 (edited) Всем привет. Пытаюсь настроить на asa 5506-X (ASA Version 9.8) VPN сервер, для подключения удаленных сотрудников. Настраиваю по документации https://www.cisco.com/c/ru_ru/support/docs/ip/layer-two-tunnel-protocol-l2tp/200340-Configure-L2TP-Over-IPsec-Between-Window.html Подключение устанавливается на ура, но трафик между asa и клиентом не ходит. Как оказалось при vpn подключении не назначается шлюз по умолчанию (скрин 1) Подскажите что нужно еще настроить для правильной работы VPN ? Конфиг ASA: Спойлер ASA Version 9.8(2) ! hostname ciscoasa enable password $sha512$5000$lpNqB42Xr9fsUwk8BxqTSw==$BAd1uhRoTcsYfksFjXukuQ== pbkdf2 names ip local pool VPN 192.168.6.1-192.168.6.254 mask 255.255.255.0 ! interface GigabitEthernet1/1 nameif outside security-level 0 ip address xx.xx.xx.xx 255.255.255.xx (Internet) ! interface GigabitEthernet1/2 nameif inside_1 security-level 100 ip address 10.1.2.2 255.255.255.248 ! interface GigabitEthernet1/3 shutdown nameif inside_2 security-level 100 no ip address ! interface GigabitEthernet1/4 nameif inside_3 security-level 100 no ip address ! interface GigabitEthernet1/5 nameif inside_4 security-level 100 no ip address ! interface GigabitEthernet1/6 nameif inside_5 security-level 100 no ip address ! interface GigabitEthernet1/7 nameif inside_6 security-level 100 no ip address ! interface GigabitEthernet1/8 nameif inside_7 security-level 100 no ip address ! interface Management1/1 management-only no nameif no security-level no ip address ! ftp mode passive same-security-traffic permit inter-interface object network obj_any1 subnet 0.0.0.0 0.0.0.0 object network obj_any2 subnet 0.0.0.0 0.0.0.0 object network obj_any3 subnet 0.0.0.0 0.0.0.0 object network obj_any4 subnet 0.0.0.0 0.0.0.0 object network obj_any5 subnet 0.0.0.0 0.0.0.0 object network obj_any6 subnet 0.0.0.0 0.0.0.0 object network obj_any7 subnet 0.0.0.0 0.0.0.0 object network Dvoryanskaya27 subnet 192.168.1.0 255.255.255.0 object network Tipografiya subnet 192.168.4.0 255.255.255.0 object network Servers subnet 192.168.0.0 255.255.255.0 object network Cisco-GW host 10.1.2.1 object network NETWORK_OBJ_192.168.6.0_24 subnet 192.168.6.0 255.255.255.0 access-list outside_access_in extended permit ip any any log disable pager lines 24 logging asdm informational mtu outside 1500 mtu inside_1 1500 mtu inside_2 1500 mtu inside_3 1500 mtu inside_4 1500 mtu inside_5 1500 mtu inside_6 1500 mtu inside_7 1500 no failover no monitor-interface service-module icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected arp rate-limit 16384 nat (inside_1,outside) source static any any destination static NETWORK_OBJ_192.168.6.0_24 NETWORK_OBJ_192.168.6.0_24 no-proxy-arp route-lookup ! nat (any,outside) after-auto source dynamic any interface description Default NAT access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1 route inside_1 192.168.0.0 255.255.255.0 10.1.2.1 1 route inside_1 192.168.1.0 255.255.255.0 10.1.2.1 1 route inside_1 192.168.4.0 255.255.255.0 10.1.2.1 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 timeout conn-holddown 0:00:15 timeout igp stale-route 0:01:10 user-identity default-domain LOCAL aaa authentication login-history http server enable http 0.0.0.0 0.0.0.0 inside_1 no snmp-server location no snmp-server contact service sw-reset-button crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport crypto ipsec security-association pmtu-aging infinite crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside_map interface outside crypto ca trustpool policy crypto ikev1 enable outside crypto ikev1 policy 10 authentication pre-share encryption aes-256 hash sha group 2 lifetime 86400 crypto ikev1 policy 20 authentication rsa-sig encryption aes-256 hash sha group 2 lifetime 86400 crypto ikev1 policy 40 authentication pre-share encryption aes-192 hash sha group 2 lifetime 86400 crypto ikev1 policy 50 authentication rsa-sig encryption aes-192 hash sha group 2 lifetime 86400 crypto ikev1 policy 70 authentication pre-share encryption aes hash sha group 2 lifetime 86400 crypto ikev1 policy 80 authentication rsa-sig encryption aes hash sha group 2 lifetime 86400 crypto ikev1 policy 100 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto ikev1 policy 110 authentication rsa-sig encryption 3des hash sha group 2 lifetime 86400 crypto ikev1 policy 130 authentication pre-share encryption des hash sha group 2 lifetime 86400 crypto ikev1 policy 140 authentication rsa-sig encryption des hash sha group 2 lifetime 86400 telnet timeout 5 ssh stricthostkeycheck ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 dhcpd auto_config outside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes dns-server value 192.168.0.2 vpn-tunnel-protocol l2tp-ipsec dynamic-access-policy-record DfltAccessPolicy username test password DLaUiAX3l78qgoB5c7iVNw== nt-encrypted privilege 0 username test attributes vpn-group-policy DefaultRAGroup tunnel-group DefaultRAGroup general-attributes address-pool VPN default-group-policy DefaultRAGroup tunnel-group DefaultRAGroup ipsec-attributes ikev1 pre-shared-key ***** tunnel-group DefaultRAGroup ppp-attributes no authentication chap authentication ms-chap-v2 ! ! prompt hostname context no call-home reporting anonymous Edited November 23, 2017 by CarTerr Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...