"Asbjorn Hojmark" wrote:
> Nå ja, din static er også forkert. Det skal være (inside,outside)
> outside inside og du har lavet (outside,inside) inside outside.
Det havde jeg faktisk også lavet til at starte med, men da det ikke ville
virke lavede jeg det om
Jeg har ændret det tilbage nu.
> For outside kan du bare 'interface' i stedet for at angive en adresse.
Det VIL den faktisk have, så det har den fået
Hvis jeg laver en packet trace på interface outside med source-ip angivet
til den offentlige ip jeg har på min TDC linie, og destination IP sat til
den offentlige ip jeg har på min Energi Midt linie hvor ASA'en står, så går
den hele vejen igennem (packet type TCP, source og destination port begge
ftp). Så alt burde jo være helt perfekt, men jeg har bare stadig ikke hul
igennem til ftp på min Synology box..
Man kan fint ftp til Synology boksen fra indersiden, og boksen har
selvfølgelig ASA'en som default gateway, og kan godt sende mails via Energi
Midts SMTP server, så den burde jo være fint på nettet. Men hvis trafikken
går fint igennem ASA'en, og Synology'en også virker fint.. hvor hulen er
problemet så? :-/
Kan jeg på en smart måde slå noget logging til i ASA boksen så den kun viser
mig hvad der prøver at komme ind og ud på ftp porten, og ikke alt muligt
andet skrammel som man bare bliver forvirret af?
Btw, så ser ASA'ens konfig sådan her ud nu:
ASA Version 8.0(4)
!
hostname pbp-home
enable password *************** encrypted
passwd *************** encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.42.2 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
pppoe client vpdn group EnergiMidt
ip address pppoe setroute
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
boot system disk0:/asa804-k8.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
same-security-traffic permit intra-interface
access-list outside_access_in extended permit icmp any any
access-list outside_access_in extended permit tcp any eq ftp host
78.156.xxx.yyy eq ftp
access-list outside_access_in extended permit tcp any eq ftp-data host
78.156.xxx.yyy eq ftp-data
access-list outside_access_in extended permit tcp any eq www host
78.156.xxx.yyy eq www
access-list outside_access_in extended permit tcp any eq 42000 host
78.156.xxx.yyy eq 42000
access-list outside_access_in extended permit udp any eq 42000 host
78.156.xxx.yyy eq 42000
access-list PeterBP_splitTunnelAcl standard permit 192.168.42.0
255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.42.0
255.255.255.0 192.168.100.0 255.255.255.128
access-list vpn_split standard permit 192.168.42.0 255.255.255.0
access-list nat0 extended permit ip any 10.100.100.0 255.255.255.0
access-list nat0 extended permit ip any 10.100.101.0 255.255.255.0
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool VPN-pool 192.168.100.0-192.168.100.100 mask 255.255.255.0
ip local pool admin_pool 10.100.100.1-10.100.100.254 mask 255.255.255.0
ip local pool split_pool 10.100.101.1-10.100.101.254 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any outside
asdm image disk0:/asdm-61551.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nat0
nat (inside) 1 0.0.0.0 0.0.0.0
nat (outside) 1 10.100.100.0 255.255.255.0
static (inside,outside) tcp interface ftp 192.168.42.30 ftp netmask
255.255.255.255
static (inside,outside) tcp interface ftp-data 192.168.42.30 ftp-data
netmask 255.255.255.255
static (inside,outside) tcp interface www 192.168.42.30 www netmask
255.255.255.255
static (inside,outside) tcp interface 42000 192.168.42.51 42000 netmask
255.255.255.255
static (inside,outside) udp interface 42000 192.168.42.51 42000 netmask
255.255.255.255
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect
0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.42.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map outside_dyn_map 20 set pfs
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 20 set security-association lifetime
seconds 28800
crypto dynamic-map outside_dyn_map 20 set security-association lifetime
kilobytes 4608000
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
no crypto isakmp nat-traversal
telnet 192.168.42.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
management-access inside
vpdn group EnergiMidt request dialout pppoe
vpdn group EnergiMidt localname 541106a
vpdn group EnergiMidt ppp authentication chap
vpdn username 541106a password *********
dhcpd auto_config outside
!
dhcpd address 192.168.42.100-192.168.42.130 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.239.134.10 source outside
ntp server 193.162.145.130 source outside
ntp server 193.162.159.194 source outside prefer
webvpn
enable outside
svc image disk0:/anyconnect-win-2.3.0254-k9.pkg 1
svc image disk0:/anyconnect-macosx-i386-2.3.0254-k9.pkg 2
svc image disk0:/anyconnect-linux-2.3.0254-k9.pkg 3
svc enable
tunnel-group-list enable
group-policy PeterBP internal
group-policy PeterBP attributes
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value PeterBP_splitTunnelAcl
group-policy AnyConnectVpnGroup internal
group-policy AnyConnectVpnGroup attributes
dns-server value 217.198.208.66 194.239.134.83
vpn-tunnel-protocol svc
webvpn
svc dtls enable
svc ask enable default svc
group-policy AnyConnectVpnGroupSplit internal
group-policy AnyConnectVpnGroupSplit attributes
dns-server value 217.198.208.66 194.239.134.83
vpn-tunnel-protocol svc
split-tunnel-policy tunnelspecified
split-tunnel-network-list value vpn_split
webvpn
svc dtls enable
svc ask enable default svc
username peterbp password ********** encrypted privilege 0
username peterbp attributes
vpn-group-policy PeterBP
tunnel-group PeterBP type remote-access
tunnel-group PeterBP general-attributes
address-pool VPN-pool
default-group-policy PeterBP
tunnel-group PeterBP ipsec-attributes
pre-shared-key *
tunnel-group AnyConnectVpnGroup type remote-access
tunnel-group AnyConnectVpnGroup general-attributes
address-pool admin_pool
default-group-policy AnyConnectVpnGroup
tunnel-group AnyConnectVpnGroup webvpn-attributes
group-alias Admin enable
tunnel-group AnyConnectVpnGroupSplit type remote-access
tunnel-group AnyConnectVpnGroupSplit general-attributes
address-pool split_pool
default-group-policy AnyConnectVpnGroupSplit
tunnel-group AnyConnectVpnGroupSplit webvpn-attributes
group-alias Split enable
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:462a594d3e4e4f25ba636731fe5f535
: end
--
Mvh.
Peter Bak