Table of Contents
Create Server Object to Translate (Layer 4 Translation)
object-group service SERVER_Services tcp port-object eq 3389 port-object range 6100 6199 port-object eq ident object network SERVER host 172.32.100.5 nat (real,mapped) static interface service tcp ident ident nat (real,mapped) static interface service tcp 3389 3389 nat (real,mapped) static interface service tcp 6103 6103 |
Create Access List to allow Services to server (Layer 3 Translation)
access-list outside_access_in extended permit tcp any host SERVER object-group SERVER_Services |
Define the Networks
object-group network Remote_VPN network-object 10.10.10.0 255.255.255.0 network-object 10.20.20.0 255.255.255.0 object-group network Remote_Internal network-object 172.16.1.0 255.255.255.0 network-object 172.16.2.0 255.255.255.0 network-object 172.16.3.0 255.255.255.0 network-object 172.16.4.0 255.255.255.0 network-object 172.18.0.0 255.255.0.0 object-group network Remote_Combined group-object Remote_VPN group-object Remote_Internal |
Create the Crypto Map ACL
access-list outside_cryptomap_1 extended permit ip INTERNAL_NETWORK 255.255.255.0 object-group Remote_Combined |
Create the No-Nat ACL (Networks/hosts to which the packets should not be changed)
access-list VPNNONAT extended permit ip INTERNAL_NETWORK 255.255.255.0 object-group Remote_Combined |
Apply the No-NAT
nat (inside) 0 access-list VPNNONAT |
Create a Transform set
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac |
Create the Crypto Map
crypto map MELONGCryptoMaps 1 match address outside_cryptomap_1 crypto map MELONGCryptoMaps 1 set peer 1.1.1.1 crypto map MELONGCryptoMaps 1 set transform-set ESP-AES-256-SHA crypto map MELONGCryptoMaps interface outside |
Enable isakmp on interface
crypto isakmp enable outside |
Create isakmp policies (Note, the policy number is for priority. The highest number first, and then tries lower policies after)
crypto isakmp policy 50 authentication pre-share encryption aes-256 hash sha group 2 lifetime 86400 |
Create policy for Tunnel-Group (Site-Site hosts)
group-policy Site2Site internal group-policy Site2Site attributes vpn-tunnel-protocol IPSec l2tp-ipsec |
Apply Tunnel-Group and Attributes
tunnel-group 1.1.1.1 type ipsec-l2l tunnel-group 1.1.1.1 general-attributes default-group-policy Site2Site tunnel-group 1.1.1.1 ipsec-attributes pre-shared-key PASSWORD |
ciscoasa# config t ciscoasa(config)# group-policy POLICY attributes ciscoasa(config-group-policy)# split-dns value internal.local extenral.com |
debug ISAKMP SA negotiations
debug crypto isakmp sa <debug level>
Performing Password Recovery for the ASA 5500 Series Adaptive Security Appliance
To recover from the loss of passwords, perform the following steps:
--------------------------------------------------------------------------------
Step 1 Connect to the security appliance console port according to the "Accessing the Command-Line Interface" section on page 2-1.
Step 2 Power off the security appliance, and then power it on.
Step 3 During the startup messages, press the Escape key when prompted to enter ROMMON.
Step 4 To set the security appliance to ignore the startup configuration at reload, enter the following command:
rommon #1> confreg The security appliance displays the current configuration register value, and asks if you want to change the value: Current Configuration Register: 0x00000011 Configuration Summary: boot TFTP image, boot default image from Flash on netboot failure Do you wish to change this configuration? y/n [n]: Step 5 Record your current configuration register value, so you can restore it later. |
Step 6 At the prompt, enter Y to change the value.
The security appliance prompts you for new values.
Step 7 Accept the default values for all settings, except for the "disable system configuration?" value; at that prompt, enter Y.
Step 8 Reload the security appliance by entering the following command:
rommon #2> boot The security appliance loads a default configuration instead of the startup configuration. |
Step 9 Enter privileged EXEC mode by entering the following command:
hostname> enable |
Step 10 When prompted for the password, press Return.
The password is blank.
Step 11 Load the startup configuration by entering the following command:
hostname# copy startup-config running-config |
Step 12 Enter global configuration mode by entering the following command:
hostname# configure terminal |
Step 13 Change the passwords in the configuration by entering the following commands, as necessary:
hostname(config)# password password hostname(config)# enable password password hostname(config)# username name password password |
Step 14 Change the configuration register to load the startup configuration at the next reload by entering the following command:
hostname(config)# config-register value Where value is the configuration register value you noted in Step 5. 0x1 is the default configuration register. For more information about the configuration register, see the Cisco Security Appliance Command Reference. |
Step 15 Save the new passwords to the startup configuration by entering the following command:
hostname(config)# copy running-config startup-config |