Asa5510 + CheckPoint + rekeying
- From
- Andrew Lutov (2:5080/1003)
- To
- All (2:5054/37.63)
- Date
- 2009-08-20T16:50:22Z
- Area
- RU.CISCO
Hello, All!
А как она себя ведет под IPsec на версии :
Cisco Adaptive Security Appliance Software Version 8.2(1)
Device Manager Version 6.2(1)
Compiled on Tue 05-May-09 22:45 by builders
System image file is "disk0:/asa821-k8.bin"
Потому как все валится как-то странно и приводит вот к этому:
asa5510# sh cry isa sa
Active SA: 1
Rekey SA: 1 (A tunnel will report 1 Active and 1 Rekey SA during rekey)
Total IKE SA: 2
1 IKE Peer: 192.168.14.11
Type : L2L Role : responder
Rekey : no State : MM_REKEY_DONE_H2
2 IKE Peer: 192.168.14.11
Type : L2L Role : initiator
Rekey : yes State : MM_ACTIVE_REKEY
asa5510#
Притом время жизни уж очень маленькое.
Кто-нибудь что-то может посоветовать для улучшения работы IPsec на ASA?
Конфиг вот такой (еще на ней терминируется EasyVPN, но здесь этого куска не
видно):
interface Ethernet0/0
nameif outside
security-level 0
ip address 10.1.0.10 255.255.255.224
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 172.16.1.1 255.255.255.0
!
interface Ethernet0/2
nameif REGU
security-level 100
ip address 172.16.2.1 255.255.255.0
!
same-security-traffic permit inter-interface
object-group network IPSec
network-object host 172.16.1.243
network-object host 172.16.1.245
network-object host 172.16.2.244
access-list noNAT extended permit ip object-group IPSec host 192.168.220.15
access-list noNAT extended permit ip object-group IPSec host 192.168.220.2
access-list noNATregu extended permit ip object-group IPSec host
192.168.220.15
access-list noNATregu extended permit ip object-group IPSec host
192.168.220.2
access-list IPSecFTC extended permit icmp object-group IPSec host
192.168.220.15
access-list IPSecFTC extended permit icmp object-group IPSec host
192.168.220.2
access-list IPSecFTC extended permit ip object-group IPSec host
192.168.220.15
access-list IPSecFTC extended permit ip object-group IPSec host
192.168.220.2
mtu outside 1500
mtu inside 1500
mtu REGU 1500
nat-control
nat (inside) 0 access-list noNAT
nat (REGU) 0 access-list noNATregu
route outside 0.0.0.0 0.0.0.0 10.1.0.2 1
route outside 192.168.14.11 255.255.255.255 10.1.0.4 1
no sysopt connection permit-vpn
crypto ipsec transform-set STRONG-DES esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto ipsec df-bit clear-df outside
crypto ipsec df-bit clear-df inside
crypto ipsec df-bit clear-df REGU
crypto map PMAP 10 match address IPSecFTC
crypto map PMAP 10 set pfs
crypto map PMAP 10 set peer 192.168.14.11
crypto map PMAP 10 set transform-set STRONG-DES
crypto map PMAP interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 43200
no crypto isakmp nat-traversal
crypto isakmp disconnect-notify
tunnel-group 192.168.14.11 type ipsec-l2l
tunnel-group 192.168.14.11 ipsec-attributes
pre-shared-key *
--
А5 увидимся е2 ли
--- Microsoft Outlook Express 6.00.2900.5843
* Origin: (http://news.cca.usart.ru/) USURT's FidoNET<->Internet (2:5080/1003)
SEEN-BY: 46/50 450/186 1024 451/30 452/25 154 463/68 469/418 4614/20 4615/21
SEEN-BY: 5000/5000 5001/100 5001 5003/58 5004/58 5010/126 5011/13 5012/9 30 46
SEEN-BY: 5015/28 5019/26 5020/175 400 545 715 758 830 1042 1641 2238 4441
SEEN-BY: 5021/29 5022/128 5023/11 5025/3 750 5026/49 5027/12 5029/60 5030/115
SEEN-BY: 5030/500 830 966 1256 1900 5035/38 5042/12 13 5045/7 5049/96 5052/4
SEEN-BY: 5054/1 4 8 9 28 30 36 37 67 75 81 89 5058/42 999 5059/37 5062/10
SEEN-BY: 5063/3 5070/156 5075/35 5077/70 5080/31 68 80 111 237 1003 5083/1
SEEN-BY: 5084/9 5085/13 45 131 5090/108 5093/55 5095/20 5096/18 6001/10 6004/3
SEEN-BY: 6009/3 6055/2 6083/12
PATH: 5080/1003 5020/4441 545 5054/1 37