Internet Edge Configuration Guide

Internet Edge
Configuration Guide
Revision: H2CY10
Who Should Read
This Guide
• Has IT workers with a CCNA® certification or equivalent experience
This document is for the reader who:
• Has already read the Cisco Smart Business Architecture (SBA) for
Government Large Agencies—Borderless Networks Internet Edge
Deployment Guide
• Has 2000–10,000 connected employees
• Wants to deploy their network infrastructure efficiently
• Wants the assurance of a tested solution
• Requires a migration path for growth
Related Documents
• Wants more secure access to the Internet
• Wants to provide backup connectivity to the Internet for employees
• Requires a solution for teleworker and mobile worker access to the
agency’s data
Before reading this guide
Design Overview
• Requires a solution to control employee access to the web and block
malicious web sites
• Requires a solution to filter SPAM and malicious email sent to the agency
Internet Edge Deployment Guide
• Requires a solution to improve the availability of internet facing services
Deployment Guides
Design Guides
Design Overview
Foundation Deployment
Guides
Internet Edge
Deployment Guide
Internet Edge
Configuration Guide
You are Here
Network Management
Guides
Who Should Read This Guide
Table of Contents
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
ASA 5520 a (Remote Access VPN only) Internet Edge 10K. . . . . . . . . . . . . 19
Large Agencies Deployment Product List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
ASA 5520 b (Remote Access VPN only) Internet Edge 10K. . . . . . . . . . . . . 22
Internet Edge Configuration Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
ASA 5540 a Internet Edge 5K . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Outside 3750 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
DMZ 3750. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
ASA 5540 b Internet Edge 5K. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
ACE Server Load Balancing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ASA-SSM-40 a (IPS Module). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
ACE 4710-1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ACE 4710-2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
ASA-SSM-40 b (IPS Module) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
ASA 5540 a (Firewall only) Internet Edge 10K . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
ASA 5540 b (Firewall only) Internet Edge 10K. . . . . . . . . . . . . . . . . . . . . . . . . . 18
Appendix A: SBA for Large Agencies Document System. . . . . . . . . . . . . . . . . 31
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS
DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL
OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY
DEPENDING ON FACTORS NOT TESTED BY CISCO.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes
only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Unified Communications SRND (Based on Cisco Unified Communications Manager 7.x)
© 2010 Cisco Systems, Inc. All rights reserved.
Table of Contents
Introduction
For Cisco partners and customers with 2000–10,000 connected users, we
have created an “out-of-the-box” deployment that is simple, fast, affordable,
scalable, and flexible. We have designed it to be easy—easy to configure,
deploy, and manage.
The simplicity of this deployment, though, belies the depth and breadth of
the architecture. Based on feedback from many customers and partners,
Cisco has developed a solid network foundation with a flexible platform
that does not require re-engineering to support additional Network or User
services.
The SBA for Large Agencies—Borderless Networks (BN) architecture is composed of a single Design Guide, and Deployment guides and Configuration
guides for each of the three sections: LAN, WAN, and Internet Edge.
The SBA for Large Agencies—Borderless Networks Internet Edge
Deployment Guide is a prescriptive reference design that provides stepby-step instructions for the deployment of the products in the design. It
is based on Enterprise best practice principles. Based on feedback from
customers and partners, Cisco has developed a solid network foundation as
a flexible platform that does not require reengineering to include additional
Network or User services.
Tech Ti p
Figure 1. SBA Model
User
Services
Security,
WAN Optimization,
Guest Access
Network
Services
Network
Foundation
Voice,
Video,
Web Meetings
Routing, Switching,
Wireless, and Internet
This deployment guide has been architected to make your life a little bit—
maybe even a lot—smoother. This architecture:
• Provides a solid foundation
• Makes deployment fast and easy
• Accelerates ability to easily deploy additional services
• Avoids the need for re-engineering of the core network
The Purpose of This Document
This document provides the available configuration files for the products
used in the Cisco SBA for Large Agencies—Borderless Networks Internet
Edge Deployment Guide. It is a companion document to the deployment
guide as a reference for engineers who are evaluating or deploying the SBA.
Graphical Interface Management
Some of the base concepts referenced in this guide are covered in the
SBA BN Design and Deployment Guides; these documents should be
reviewed first.
There are products in this design where we have omitted the configuration
file. Those products have browser-based graphical configuration tools. Please
refer to the companion Cisco SBA for Large Agencies—Borderless Networks
WAN Deployment Guide at https://www.cisco.com/go/sba for step-bystep instructions on configuring those products.
Introduction
1
SBA For Large Agencies—Borderless Networks
Campus
Internet
I
WAN
Aggregation
Hardware and Software
VPN
Remote
Access VPN
Internet
Edge Routers
Email Security
Appliance
Guest
WLAN
Teleworker /
Mobile Worker
WAN
Wireless
Access Point
Application
Acceleration
VPN
Wireless
LAN Controller
Client
Access
Switch
Data
Internet
Center
Edge
Internet
Edge
Firewall
W ww
W ww
Internet
Servers
Web Security
Appliance
Branch Router with
Application Acceleration
Core
Switches
Remote
Local Area
Network
Collapsed
Distribution/Core
Switches
Distribution
Switches
I
Wireless
LAN Controller
Regional
Router
Application
Acceleration
Regional
Office
Client
Access
Switches
Building 1
Building 2
Building 3
Building 4
Introduction
2
Large Agencies Deployment Product List
Functional Area
Product
Part Numbers
Software Version
ASA 5510 or
ASA5510-AIP10-SP-K9
8.2.2
ASA 5520 or
ASA5520-AIP20-K9
ASA 5540
ASA5540-AIP40-K9
SSM-AIP-10 or
*part of the firewall bundle
7.0.2E4
Software license for main 250 or 500 SSL Session Software
ASA FW
license
ASA5500-SSL-250
*as Firewall
Email Security
C370-BUN-R-NA
Internet Edge 5K
Firewall
IPS
SSM-AIP-20 or
SSM-AIP-40
C370
ASA5500-SSL-500
Async OS 7.0
*Please consult Trusted Partner or Ironport Sales Team for pricing and licensing
Web Security
S370
S370-BUN-R-NA
Async OS 6.3
*Please consult Trusted Partner or Ironport Sales Team for pricing and licensing
Server Load Balancing
ACE 4710
ACE-4710-0.5F-K9
A3(2.5)
Outside Switch
2x Catalyst 3750
WS-C3750G-24TS-S1U
12.2(53)SE1
DMZ Switch
2x Catalyst 3750
WS-C3750G-24TS-S1U
12.2(53)SE1
Large Agencies Deployment Product List
3
Functional Area
Product
Part Numbers
Software Version
2x ASA 5520 or
ASA5520-AIP20-K9
8.2.2
2x ASA 5540
ASA5540-AIP40-K9
2x SSM-AIP-20 or
*part of bundle above
7.0.2E4
2x ASA 5520 and 500 SSL seats or
ASA5520-SSL500-K9
8.2.2
2x ASA 5540 and 1000 SSL seats
ASA5540-SSL1000-K9
2x C370
C370-BUN-R-NA
Internet Edge 10K
Firewall
IPS
2x SSM-AIP-40
VPN
Email Security
Async OS 7.0
*Please consult Trusted Partner or Ironport Sales Team for pricing and licensing
Web Security
2x S370
Async OS 6.3
S370-BUN-R-NA
*Please consult Trusted Partner or Ironport Sales Team for pricing and licensing
Server Load Balancing
ACE 4710
ACE-4710-1F-K9
A3(2.5)
Outside Switch
2x Catalyst 3750
WS-C3750G-24TS-S1U
12.2(53)SE1
DMZ Switch
2x Catalyst 3750
WS-C3750G-24TS-S1U
12.2(53)SE1
Large Agencies Deployment Product List
4
Internet Edge
Configuration Files
ASA 5540 a Internet Edge 5K
ASA Version 8.2(2)
!
hostname asa5540A
domain-name cisco.local
enable password 2y4FIGBVVyBLau0Q encrypted
passwd 2y4FIGBVVyBLau0Q encrypted
names
name 172.16.130.1 outside-dmvpn-1
name 172.16.130.16 outside-mail-1 description public email address
name 10.4.200.10 dns-server
name 10.4.244.0 dmz-mail-net
name 10.4.0.0 internal-net
name 10.4.246.0 dmz-guest-wlc-net
name 10.4.246.54 dmz-guest-wlc
name 192.168.16.0 dmz-wifi-guest-net
name 10.4.245.0 dmz-web-net
name 10.4.248.0 ra-pool
name 10.4.128.32 dmz-dmvpn
name 10.4.128.33 dmz-dmvpn-1
name 10.4.128.34 dmz-dmvpn-2
name 10.4.200.25 inside-mail
name 10.4.244.16 dmz-C370
name 10.4.200.0 data-center-net
name 10.4.244.20 dmz-C370-B
name 172.16.130.17 outside-mail_B-1 description Address for C370B in ISP A
!
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 10.4.240.30 255.255.255.224 standby 10.4.240.29
!
interface GigabitEthernet0/1
description dmz trunk to dmz-3750 stack port x/0/1
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1.1120
vlan 1120
nameif dmz-mail
security-level 50
ip address 10.4.244.1 255.255.255.0 standby 10.4.244.2
!
interface GigabitEthernet0/1.1121
vlan 1121
nameif dmz-web
security-level 50
ip address 10.4.245.1 255.255.255.0 standby 10.4.245.2
!
interface GigabitEthernet0/1.1122
vlan 1122
nameif dmz-guest-wlc
security-level 50
ip address 10.4.246.1 255.255.255.0 standby 10.4.246.2
!
interface GigabitEthernet0/1.1126
vlan 1126
nameif dmz-wifi-guest
security-level 10
ip address 192.168.16.1 255.255.252.0
!
interface GigabitEthernet0/1.1128
vlan 1128
nameif dmz-vpn
security-level 75
ip address 10.4.128.35 255.255.255.248
!
interface GigabitEthernet0/2
description LAN/STATE Failover Interface
!
interface GigabitEthernet0/3
description uplink to out-3750 stack port port x/0/2
vlan 16
nameif outside
security-level 0
ip address 172.16.130.124 255.255.255.0 standby 172.16.130.123
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
Internet Edge Configuration Files
5
clock timezone PACIFIC -7
dns server-group DefaultDNS
domain-name cisco.local
object-group network NAT0-DMZ-EXEMPT
network-object dmz-web-net 255.255.255.0
network-object dmz-mail-net 255.255.255.0
network-object dmz-guest-wlc-net 255.255.255.0
network-object dmz-wifi-guest-net 255.255.252.0
network-object ra-pool 255.255.252.0
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group network WLAN_Controllers
network-object host 10.4.56.64
network-object host 10.4.56.65
network-object host 10.4.56.66
network-object host 10.4.56.67
network-object host 10.4.56.68
object-group service DM_INLINE_TCP_1 tcp
port-object eq www
port-object eq https
object-group network DM_INLINE_NETWORK_1
network-object 10.0.0.0 255.0.0.0
network-object 172.16.0.0 255.255.0.0
network-object 192.168.0.0 255.255.0.0
object-group service DM_INLINE_TCP_2 tcp
port-object eq www
port-object eq https
port-object eq smtp
access-list INSIDE_NAT0_OUTBOUND extended permit ip internal-net 255.254.0.0 object-group NAT0-DMZ-EXEMPT
access-list DMZ-MAIL_ACCESS_IN extended permit object-group TCPUDP dmz-mail-net255.255.255.0 host dns-server eq domain
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-web-net 255.255.255.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-wifi-guest-net 255.255.252.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-guest-wlc-net 255.255.255.0
access-list DMZ-MAIL_ACCESS_IN extended permit tcp dmz-mail-net 255.255.255.0 any eq smtp
access-list DMZ-MAIL_ACCESS_IN extended permit icmp dmz-mail-net 255.255.255.0 any echo
access-list OUT-ACCESS-IN extended permit udp any host outside-dmvpn-1 eq 4500
access-list OUT-ACCESS-IN extended permit udp any host outside-dmvpn-1 eq isakmp
access-list OUT-ACCESS-IN extended permit esp any host outside-dmvpn-1
access-list OUT-ACCESS-IN extended permit icmp any host outside-dmvpn-1 echo
access-list OUT-ACCESS-IN extended permit icmp any host outside-dmvpn-1 echo-reply
access-list OUT-ACCESS-IN extended permit tcp any host outside-mail-1 eq smtp
access-list OUT-ACCESS-IN extended permit tcp any host outside-mail_B-1 eq smtp
access-list OUT-ACCESS-IN extended permit tcp any dmz-web-net 255.255.255.0 eq https
access-list OUT-ACCESS-IN extended permit tcp any dmz-web-net 255.255.255.0 eq www
access-list OUT-ACCESS-IN remark Arshad inserted this rule
Internet Edge Configuration Files
6
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
access-list
pager lines
OUT-ACCESS-IN extended permit icmp any any
WIFI-GUEST_NAT0_OUTBOUND extended permit ip dmz-wifi-guest-net 255.255.252.0 object-group NAT0-DMZ-EXEMPT
WIFI-GUEST_NAT0_OUTBOUND extended permit ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
INSIDE_ACCESS_IN extended deny tcp internal-net 255.254.0.0 any eq telnet
INSIDE_ACCESS_IN extended permit tcp internal-net 255.254.0.0 dmz-mail-net 255.255.255.0 eq smtp
INSIDE_ACCESS_IN extended deny tcp internal-net 255.254.0.0 any eq smtp
INSIDE_ACCESS_IN extended permit ip internal-net 255.254.0.0 any
DMZ-WEB_ACCESS_IN extended permit object-group TCPUDP dmz-web-net 255.255.255.0 host dns-server eq domain
DMZ-GUEST-WLC_ACCESS_IN remark For Guest Access Controller at 10.4.246.54
DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc object-group WLAN_Controllers eq 16666
DMZ-GUEST-WLC_ACCESS_IN extended permit 97 host dmz-guest-wlc object-group WLAN_Controllers
DMZ-GUEST-WLC_ACCESS_IN extended permit tcp host dmz-guest-wlc any eq 161
DMZ-GUEST-WLC_ACCESS_IN extended permit tcp host dmz-guest-wlc any eq 162
DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc any eq tftp
DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc eq bootpc host dns-server eq bootps
DMZ-WIFI-GUEST_ACCESS_IN extended permit udp dmz-wifi-guest-net 255.255.252.0 host dns-server eq bootps
DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq www
DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq https
DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq ftp
DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0
DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-mail-net 255.255.255.0
DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-guest-wlc-net 255.255.255.0
DMZ-WIFI-GUEST_ACCESS_IN extended permit ip dmz-wifi-guest-net 255.255.252.0 any
dmz-wifi-guest_access_in extended deny ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
dmz-wifi-guest_access_in extended deny tcp dmz-wifi-guest-net 255.255.252.0 any eq telnet
dmz-wifi-guest_access_in extended deny tcp dmz-wifi-guest-net 255.255.252.0 any eq smtp
dmz-wifi-guest_access_in extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 object-group DM_INLINE_TCP_1
dmz-wifi-guest_access_in extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0
dmz-wifi-guest_access_in extended permit ip dmz-wifi-guest-net 255.255.252.0 any
dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 host inside-mail eq smtp
dmz-mail_access_in extended permit object-group TCPUDP dmz-mail-net 255.255.255.0 host dns-server eq domain
dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0 eq ftp
dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0 eq ssh
dmz-mail_access_in extended permit icmp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0
dmz-mail_access_in remark Block all other traffic from mail net
dmz-mail_access_in extended deny ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 any object-group DM_INLINE_TCP_2
RA-FULL-TUNNEL_ACL standard permit any
global_mpc extended permit ip any any
RA_FullTunnelACL standard permit any
WCCP_REDIRECT remark Do not redirect connections to these addresses
WCCP_REDIRECT extended deny ip any object-group DM_INLINE_NETWORK_1
WCCP_REDIRECT remark Redirect to all other IP addr’s
WCCP_REDIRECT extended permit ip any any
dmz-mail_nat0_outbound extended permit ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
24
Internet Edge Configuration Files
7
logging enable
logging buffered informational
logging trap informational
logging asdm informational
logging host inside 10.4.200.17
logging host inside 10.4.200.115
mtu inside 1500
mtu dmz-mail 1500
mtu dmz-web 1500
mtu dmz-guest-wlc 1500
mtu dmz-wifi-guest 1500
mtu dmz-vpn 1500
mtu outside 1500
mtu outside-17 1500
ip local pool ravpn-pool ra-pool-10.4.251.255 mask 255.255.252.0
failover
failover lan unit primary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key *****
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.65 255.255.255.248 standby
10.4.242.66
monitor-interface dmz-mail
monitor-interface dmz-web
monitor-interface dmz-vpn
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
asdm image disk0:/asdm-631.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list INSIDE_NAT0_OUTBOUND
nat (inside) 1 internal-net 255.254.0.0
nat (dmz-mail) 0 access-list dmz-mail_nat0_outbound
nat (dmz-mail) 1 dmz-mail-net 255.255.255.0
nat (dmz-web) 1 dmz-web-net 255.255.255.0
nat (dmz-wifi-guest) 0 access-list WIFI-GUEST_NAT0_OUTBOUND
nat (dmz-wifi-guest) 1 dmz-wifi-guest-net 255.255.252.0
static (dmz-vpn,outside) outside-dmvpn-1 dmz-dmvpn-1 netmask
255.255.255.255
static (dmz-mail,outside) outside-mail-1 dmz-C370 netmask
255.255.255.255
static (dmz-mail,outside) outside-mail_B-1 dmz-C370-B netmask
255.255.255.255
access-group INSIDE_ACCESS_IN in interface inside
access-group dmz-mail_access_in in interface dmz-mail
access-group DMZ-GUEST-WLC_ACCESS_IN in interface dmz-guest-wlc
access-group dmz-wifi-guest_access_in in interface dmz-wifi-guest
access-group OUT-ACCESS-IN in interface outside
!
router eigrp 100
no auto-summary
network 10.4.240.0 255.255.240.0
passive-interface default
no passive-interface inside
redistribute static
!
route outside 0.0.0.0 0.0.0.0 172.16.130.126 1
route inside 0.0.0.0 0.0.0.0 10.4.240.1 tunneled
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect
0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
ldap attribute-map VPN-Group-AD-Map
map-name memberOf IETF-Radius-Class
map-value memberOf CN=vpn-partner,CN=Users,DC=cisco,DC=com bn-partner
map-value memberOf CN=vpn-user,CN=Users,DC=cisco,DC=com bn-user
dynamic-access-policy-record DfltAccessPolicy
aaa-server AAA-SERVER protocol radius
aaa-server AAA-SERVER (inside) host 10.4.200.15
key [SecretKey]
aaa-server AD protocol ldap
aaa-server AD (inside) host dns-server
server-port 389
ldap-base-dn CN=Users,DC=cisco,DC=local
ldap-naming-attribute sAMAccountName
ldap-login-password [cisco]
ldap-login-dn CN=ASA 5540,CN=Users,DC=cisco,DC=local
server-type microsoft
aaa authentication enable console AAA-SERVER LOCAL
aaa authentication ssh console AAA-SERVER LOCAL
http server enable
http internal-net 255.254.0.0 inside
http redirect outside 80
snmp-server enable traps snmp authentication linkup linkdown coldstart
no snmp-server location
no snmp-server contact
snmp-server community [cisco]
Internet Edge Configuration Files
8
snmp-server enable traps snmp authentication linkup linkdown coldstart
service resetoutside
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map BN_DYN_CRYPTO_MAP_1 101 set transform-set ESP-AES128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA
crypto dynamic-map BN_DYN_CRYPTO_MAP_1 101 set reverse-route
crypto dynamic-map BN_DYN_CRYPTO_MAP_2 102 set transform-set ESP-AES128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA
crypto dynamic-map BN_DYN_CRYPTO_MAP_2 102 set reverse-route
crypto map outside_map 65535 ipsec-isakmp dynamic BN_DYN_CRYPTO_MAP_1
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
!
telnet timeout 5
ssh internal-net 255.254.0.0 inside
ssh timeout 5
ssh version 2
console timeout 0
dhcprelay server dns-server inside
dhcprelay enable dmz-wifi-guest
dhcprelay timeout 60
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
wccp 90 redirect-list WCCP_REDIRECT
wccp interface inside 90 redirect in
ntp server 10.4.200.17 source inside
webvpn
enable dmz-wifi-guest
enable outside
anyconnect-essentials
svc image disk0:/anyconnect-win-2.5.0217-k9.pkg 3
svc image disk0:/anyconnect-macosx-i386-2.5.0217-k9.pkg 4
svc enable
tunnel-group-list enable
group-policy 5505Group internal
group-policy 5505Group attributes
vpn-tunnel-protocol IPSec
ip-comp enable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
user-authentication-idle-timeout 480
nem enable
group-policy DfltGrpPolicy attributes
dns-server value 10.4.200.10
vpn-tunnel-protocol IPSec svc webvpn
split-dns value cisco.local
address-pools value ravpn-pool
webvpn
svc ask none default svc
group-policy bn-adm-group internal
group-policy bn-adm-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
group-policy bn-user-group internal
group-policy bn-user-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
group-policy bn-partner-group internal
group-policy bn-partner-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
username 5505site5 password [c1sco123]
username 5505site5 attributes
vpn-group-policy 5505Group
ip-comp enable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
user-authentication-idle-timeout 480
nem enable
username admin password [c1sco123] encrypted privilege 15
tunnel-group bn-user type remote-access
tunnel-group bn-user general-attributes
address-pool ravpn-pool
authentication-server-group AD
default-group-policy bn-user-group
tunnel-group bn-user webvpn-attributes
group-alias bn-user enable
group-url https://172.16.130.124/bn-user enable
tunnel-group bn-user ipsec-attributes
pre-shared-key [cisco]
tunnel-group bn-admin type remote-access
tunnel-group bn-admin general-attributes
address-pool ravpn-pool
default-group-policy bn-adm-group
Internet Edge Configuration Files
9
tunnel-group bn-admin webvpn-attributes
group-alias bn-admin enable
group-url https://172.16.130.124/bn-admin enable
tunnel-group bn-admin ipsec-attributes
pre-shared-key [cisco]
tunnel-group bn-partner type remote-access
tunnel-group bn-partner general-attributes
address-pool ravpn-pool
authentication-server-group AD
default-group-policy bn-partner-group
tunnel-group bn-partner webvpn-attributes
group-alias bn-partner enable
group-url https://172.16.130.124/bn-partner enable
tunnel-group bn-partner ipsec-attributes
pre-shared-key [cisco]
tunnel-group RA5505 type remote-access
tunnel-group RA5505 general-attributes
default-group-policy 5505Group
tunnel-group RA5505 ipsec-attributes
pre-shared-key [cisco]
!
class-map global-class
match access-list global_mpc
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
class global-class
ips promiscuous fail-close
!
service-policy global_policy global
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/
services/DD
CEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:ed9d61cebc3a992ec6d59da2b4eb13b1
: end
ASA 5540 b Internet Edge 5K
Tech Tip
This is not the configuration of the ASA. This is the configuration that
when applied allows the unit to become part of a failover pair. It does
require that the Primary unit be installed and configured.
interface GigabitEthernet0/2
no shutdown
!
failover
failover lan unit secondary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key [cisco]
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.65 255.255.255.248 standby
10.4.242.66
Internet Edge Configuration Files
10
ASA-SSM-40 a (IPS Module)
Tech Tip
Unlike the output from show config on the sensor, the content below
can be cut and paste into the sensor because of the extra new lines
between each service section.
! -----------------------------! Current configuration last modified Thu Jun 03 13:58:29 2010
! -----------------------------! Version 7.0(2)
! Host:
!
Realm Keys
key1.0
! Signature Definition:
!
Signature Update
S482.0
2010-04-06
! -----------------------------service interface
exit
! -----------------------------service authentication
exit
! -----------------------------service event-action-rules rules0
exit
! -----------------------------service host
network-settings
host-ip 10.4.240.28/27,10.4.240.1
host-name SSM-40-A
telnet-option disabled
access-list 10.0.0.0/8
dns-primary-server enabled
address 10.4.200.10
exit
dns-secondary-server disabled
dns-tertiary-server disabled
http-proxy proxy-server
address 128.107.241.169
port 80
exit
exit
time-zone-settings
offset -480
standard-time-zone-name GMT-08:00
exit
ntp-option enabled-ntp-unauthenticated
ntp-server 10.4.200.17
exit
summertime-option recurring
summertime-zone-name GMT-08:00
exit
exit
! -----------------------------service logger
exit
! -----------------------------service network-access
exit
! -----------------------------service notification
exit
! -----------------------------service signature-definition sig0
signatures 2000 0
status
enabled true
exit
exit
signatures 2004 0
status
enabled true
exit
exit
exit
Internet Edge Configuration Files
11
! -----------------------------service ssh-known-hosts
exit
! -----------------------------service trusted-certificates
exit
! -----------------------------service web-server
exit
! -----------------------------service anomaly-detection ad0
exit
! -----------------------------service external-product-interface
exit
! -----------------------------service health-monitor
exit
! -----------------------------service global-correlation
network-participation partial
exit
! -----------------------------service analysis-engine
virtual-sensor vs0
physical-interface GigabitEthernet0/1
exit
exit
ASA-SSM-40 b (IPS Module)
! -----------------------------! Current configuration last modified Thu May 27 17:09:01 2010
! -----------------------------! Version 7.0(2)
! Host:
!
Realm Keys
key1.0
! Signature Definition:
!
Signature Update
S425.0
2009-08-17
!
Virus Update
V1.4
2007-03-02
! -----------------------------service interface
exit
! -----------------------------service authentication
exit
! -----------------------------service event-action-rules rules0
exit
! -----------------------------service host
network-settings
host-ip 10.4.240.27/27,10.4.240.1
host-name SSM-40-B
telnet-option disabled
access-list 10.0.0.0/8
dns-primary-server enabled
address 10.4.200.10
exit
dns-secondary-server disabled
dns-tertiary-server disabled
http-proxy proxy-server
address 128.107.241.169
port 80
exit
exit
time-zone-settings
offset -480
standard-time-zone-name GMT-08:00
exit
ntp-option enabled-ntp-unauthenticated
ntp-server 10.4.200.17
Internet Edge Configuration Files
12
exit
summertime-option recurring
summertime-zone-name UTC
exit
exit
! -----------------------------service logger
exit
! -----------------------------service network-access
exit
! -----------------------------service notification
exit
! -----------------------------service signature-definition sig0
signatures 2000 0
status
enabled true
exit
exit
signatures 2004 0
status
enabled true
exit
exit
exit
! -----------------------------service ssh-known-hosts
exit
! -----------------------------service trusted-certificates
exit
! ------------------------------
service web-server
exit
! -----------------------------service anomaly-detection ad0
exit
! -----------------------------service external-product-interface
exit
! -----------------------------service health-monitor
exit
! -----------------------------service global-correlation
exit
! -----------------------------service analysis-engine
virtual-sensor vs0
physical-interface GigabitEthernet0/1
exit
exit
ASA 5540 a (Firewall only) Internet Edge 10K
ASA Version 8.2(2)
!
hostname asa5540A
domain-name cisco.local
enable password c1sco123
passwd c1sco123
names
name 172.16.130.1 outside-dmvpn-1
name 172.16.130.16 outside-mail-1 description email address on ISP A
name 10.4.200.10 dns-server
name 10.4.244.0 dmz-mail-net
name 10.4.0.0 internal-net
Internet Edge Configuration Files
13
name 10.4.246.0 dmz-guest-wlc-net
name 10.4.246.54 dmz-guest-wlc
name 192.168.16.0 dmz-wifi-guest-net
name 10.4.245.0 dmz-web-net
name 10.4.248.0 ra-pool
name 10.4.128.32 dmz-dmvpn
name 10.4.128.33 dmz-dmvpn-1
name 10.4.128.34 dmz-dmvpn-2
name 10.4.200.25 inside-mail
name 10.4.244.16 dmz-C370
name 172.17.130.16 outside-mail-2 description Email address on ISP B
name 10.4.200.0 data-center-net
name 10.4.244.20 dmz-C370-B
name 172.16.130.17 outside-mail_B-1 description Address for C370B in ISP A
name 172.17.130.17 outside-mail_B-2 description Address for C370B in ISP B
!
interface GigabitEthernet0/0
no shutdown
nameif inside
security-level 100
ip address 10.4.240.30 255.255.255.224 standby 10.4.240.29
!
interface GigabitEthernet0/1
no shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1.1120
vlan 1120
nameif dmz-mail
security-level 50
ip address 10.4.244.1 255.255.255.0 standby 10.4.244.2
!
interface GigabitEthernet0/1.1121
vlan 1121
nameif dmz-web
security-level 50
ip address 10.4.245.1 255.255.255.0 standby 10.4.245.2
!
interface GigabitEthernet0/1.1122
vlan 1122
nameif dmz-guest-wlc
security-level 50
ip address 10.4.246.1 255.255.255.0 standby 10.4.246.2
!
interface GigabitEthernet0/1.1126
vlan 1126
nameif dmz-wifi-guest
security-level 10
ip address 192.168.16.1 255.255.252.0
!
interface GigabitEthernet0/1.1128
vlan 1128
nameif dmz-vpn
security-level 75
ip address 10.4.128.35 255.255.255.248
!
interface GigabitEthernet0/2
no shutdown
!
interface GigabitEthernet0/3
no shutdown
description uplink to out-3750 stack port port x/0/2
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3.16
vlan 16
nameif outside-16
security-level 0
ip address 172.16.130.124 255.255.255.0 standby 172.16.130.123
!
interface GigabitEthernet0/3.17
vlan 17
nameif outside-17
security-level 0
ip address 172.17.130.124 255.255.255.0 standby 172.17.130.123
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
clock timezone PACIFIC -7
dns server-group DefaultDNS
domain-name cisco.local
object-group network NAT0-DMZ-EXEMPT
network-object dmz-web-net 255.255.255.0
network-object dmz-mail-net 255.255.255.0
network-object dmz-guest-wlc-net 255.255.255.0
network-object dmz-wifi-guest-net 255.255.252.0
object-group protocol TCPUDP
Internet Edge Configuration Files
14
protocol-object udp
protocol-object tcp
object-group network WLAN_Controllers
network-object host 10.4.56.64
network-object host 10.4.56.65
network-object host 10.4.56.66
network-object host 10.4.56.67
network-object host 10.4.56.68
object-group service DM_INLINE_TCP_1 tcp
port-object eq www
port-object eq https
object-group network DM_INLINE_NETWORK_1
network-object 10.0.0.0 255.0.0.0
network-object 172.16.0.0 255.255.0.0
network-object 192.168.0.0 255.255.0.0
object-group service DM_INLINE_TCP_2 tcp
port-object eq www
port-object eq https
port-object eq smtp
access-list INSIDE_NAT0_OUTBOUND extended permit ip internal-net 255.254.0.0 object-group NAT0-DMZ-EXEMPT
access-list DMZ-MAIL_ACCESS_IN extended permit object-group TCPUDP dmz-mail-net 255.255.255.0 host dns-server eq domain
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-web-net 255.255.255.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-wifi-guest-net 255.255.252.0
access-list DMZ-MAIL_ACCESS_IN extended deny ip dmz-mail-net 255.255.255.0 dmz-guest-wlc-net 255.255.255.0
access-list DMZ-MAIL_ACCESS_IN extended permit tcp dmz-mail-net 255.255.255.0 any eq smtp
access-list DMZ-MAIL_ACCESS_IN extended permit icmp dmz-mail-net 255.255.255.0 any echo
access-list OUT-ACCESS-IN extended permit udp any host outside-dmvpn-1 eq 4500
access-list OUT-ACCESS-IN extended permit udp any host outside-dmvpn-1 eq isakmp
access-list OUT-ACCESS-IN extended permit esp any host outside-dmvpn-1
access-list OUT-ACCESS-IN extended permit icmp any host outside-dmvpn-1 echo
access-list OUT-ACCESS-IN extended permit icmp any host outside-dmvpn-1 echo-reply
access-list OUT-ACCESS-IN extended permit tcp any host outside-mail-1 eq smtp
access-list OUT-ACCESS-IN extended permit tcp any host outside-mail_B-1 eq smtp
access-list OUT-ACCESS-IN extended permit tcp any dmz-web-net 255.255.255.0 eq https
access-list OUT-ACCESS-IN extended permit tcp any dmz-web-net 255.255.255.0 eq www
access-list OUT-ACCESS-IN remark Arshad inserted this rule
access-list OUT-ACCESS-IN extended permit icmp any any
access-list WIFI-GUEST_NAT0_OUTBOUND extended permit ip dmz-wifi-guest-net 255.255.252.0 object-group NAT0-DMZ-EXEMPT
access-list WIFI-GUEST_NAT0_OUTBOUND extended permit ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
access-list INSIDE_ACCESS_IN extended deny tcp internal-net 255.254.0.0 any eq telnet
access-list INSIDE_ACCESS_IN extended permit tcp internal-net 255.254.0.0 dmz-mail-net 255.255.255.0 eq smtp
access-list INSIDE_ACCESS_IN extended deny tcp internal-net 255.254.0.0 any eq smtp
access-list INSIDE_ACCESS_IN extended permit ip internal-net 255.254.0.0 any
access-list DMZ-WEB_ACCESS_IN extended permit object-group TCPUDP dmz-web-net 255.255.255.0 host dns-server eq domain
access-list DMZ-GUEST-WLC_ACCESS_IN remark For Guest Access Controller at 10.4.246.54
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc object-group WLAN_Controllers eq 16666
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit 97 host dmz-guest-wlc object-group WLAN_Controllers
Internet Edge Configuration Files
15
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit tcp host dmz-guest-wlc any eq 161
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit tcp host dmz-guest-wlc any eq 162
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc any eq tftp
access-list DMZ-GUEST-WLC_ACCESS_IN extended permit udp host dmz-guest-wlc eq bootpc host dns-server eq bootps
access-list DMZ-WIFI-GUEST_ACCESS_IN extended permit udp dmz-wifi-guest-net 255.255.252.0 host dns-server eq bootps
access-list DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
access-list DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq www
access-list DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq https
access-list DMZ-WIFI-GUEST_ACCESS_IN extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 eq ftp
access-list DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0
access-list DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-mail-net 255.255.255.0
access-list DMZ-WIFI-GUEST_ACCESS_IN extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-guest-wlc-net 255.255.255.0
access-list DMZ-WIFI-GUEST_ACCESS_IN extended permit ip dmz-wifi-guest-net 255.255.252.0 any
access-list dmz-wifi-guest_access_in extended deny ip dmz-wifi-guest-net 255.255.252.0 internal-net 255.254.0.0
access-list dmz-wifi-guest_access_in extended deny tcp dmz-wifi-guest-net 255.255.252.0 any eq telnet
access-list dmz-wifi-guest_access_in extended deny tcp dmz-wifi-guest-net 255.255.252.0 any eq smtp
access-list dmz-wifi-guest_access_in extended permit tcp dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0 object-group DM_INLINE_TCP_1
access-list dmz-wifi-guest_access_in extended deny ip dmz-wifi-guest-net 255.255.252.0 dmz-web-net 255.255.255.0
access-list dmz-wifi-guest_access_in extended permit ip dmz-wifi-guest-net 255.255.252.0 any
access-list dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 host inside-mail eq smtp
access-list dmz-mail_access_in extended permit object-group TCPUDP dmz-mail-net 255.255.255.0 host dns-server eq domain
access-list dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0 eq ftp
access-list dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0 eq ssh
access-list dmz-mail_access_in extended permit icmp dmz-mail-net 255.255.255.0 data-center-net 255.255.255.0
access-list dmz-mail_access_in remark Block all other traffic from mail net
access-list dmz-mail_access_in extended deny ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
access-list dmz-mail_access_in extended permit tcp dmz-mail-net 255.255.255.0 any object-group DM_INLINE_TCP_2
access-list global_mpc extended permit ip any any
access-list RA_FullTunnelACL standard permit any
access-list WCCP_REDIRECT remark Do not redirect connections to these addresses
access-list WCCP_REDIRECT extended deny ip any object-group DM_INLINE_NETWORK_1
access-list WCCP_REDIRECT remark Redirect to all other IP addr’s
access-list WCCP_REDIRECT extended permit ip any any
access-list outside-17_access extended permit tcp any host outside-mail-2 eq smtp
access-list outside-17_access extended permit tcp any host outside-mail_B-2 eq smtp
access-list dmz-mail_nat0_outbound extended permit ip dmz-mail-net 255.255.255.0 internal-net 255.254.0.0
pager lines 24
logging enable
logging buffered informational
logging trap informational
logging asdm informational
logging host inside 10.4.200.17
logging host inside 10.4.200.115
mtu inside 1500
mtu dmz-mail 1500
mtu dmz-web 1500
mtu dmz-guest-wlc 1500
mtu dmz-wifi-guest 1500
Internet Edge Configuration Files
16
mtu dmz-vpn 1500
mtu outside-16 1500
mtu outside-17 1500
failover
failover lan unit primary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key *****
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.65 255.255.255.248 standby
10.4.242.66
monitor-interface dmz-mail
monitor-interface dmz-web
monitor-interface dmz-vpn
monitor-interface outside-16
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside-16
asdm image disk0:/asdm-631.bin
no asdm history enable
arp timeout 14400
global (outside-16) 1 interface
global (outside-17) 1 interface
nat (inside) 0 access-list INSIDE_NAT0_OUTBOUND
nat (inside) 1 internal-net 255.254.0.0
nat (dmz-mail) 0 access-list dmz-mail_nat0_outbound
nat (dmz-mail) 1 dmz-mail-net 255.255.255.0
nat (dmz-web) 1 dmz-web-net 255.255.255.0
nat (dmz-wifi-guest) 0 access-list WIFI-GUEST_NAT0_OUTBOUND
nat (dmz-wifi-guest) 1 dmz-wifi-guest-net 255.255.252.0
static (dmz-vpn,outside-16) outside-dmvpn-1 dmz-dmvpn-1 netmask
255.255.255.255
static (dmz-mail,outside-16) outside-mail-1 dmz-C370 netmask
255.255.255.255
static (dmz-mail,outside-17) outside-mail-2 dmz-C370 netmask
255.255.255.255
static (dmz-mail,outside-16) outside-mail_B-1 dmz-C370-B netmask
255.255.255.255
static (dmz-mail,outside-17) outside-mail_B-2 dmz-C370-B netmask
255.255.255.255
access-group INSIDE_ACCESS_IN in interface inside
access-group dmz-mail_access_in in interface dmz-mail
access-group DMZ-GUEST-WLC_ACCESS_IN in interface dmz-guest-wlc
access-group dmz-wifi-guest_access_in in interface dmz-wifi-guest
access-group OUT-ACCESS-IN in interface outside-16
access-group outside-17_access in interface outside-17
!
router eigrp 100
no auto-summary
network 10.4.240.0 255.255.240.0
passive-interface default
no passive-interface inside
redistribute static
!
route outside-16 0.0.0.0 0.0.0.0 172.16.130.126 1 track 1
route outside-17 0.0.0.0 0.0.0.0 172.17.130.126 254
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect
0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server AAA-SERVER protocol radius
aaa-server AAA-SERVER (inside) host 10.4.200.15
key [SecretKey]
aaa authentication enable console AAA-SERVER LOCAL
aaa authentication ssh console AAA-SERVER LOCAL
http server enable
http internal-net 255.254.0.0 inside
http redirect outside-16 80
no snmp-server location
no snmp-server contact
snmp-server community [cisco]
snmp-server enable traps snmp authentication linkup linkdown coldstart
sla monitor 16
type echo protocol ipIcmpEcho 10.194.112.65 interface outside-16
num-packets 3
frequency 10
sla monitor schedule 16 life forever start-time now
service resetoutside
!
track 1 rtr 16 reachability
telnet timeout 5
ssh internal-net 255.254.0.0 inside
ssh 0.0.0.0 0.0.0.0 outside-16
ssh timeout 5
ssh version 2
console timeout 0
dhcprelay server dns-server inside
dhcprelay enable dmz-wifi-guest
dhcprelay timeout 60
threat-detection basic-threat
Internet Edge Configuration Files
17
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
wccp 90 redirect-list WCCP_REDIRECT
wccp interface inside 90 redirect in
ntp server 10.4.200.17 source inside
username admin password w2Y.6Op4j7clVDk2 encrypted privilege 15
!
class-map global-class
match access-list global_mpc
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
class global-class
ips promiscuous fail-close
!
service-policy global_policy global
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/
services/DD
CEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:ed9d61cebc3a992ec6d59da2b4eb13b1
: end
ASA 5540 b (Firewall only) Internet Edge 10K
Tech Tip
This is not the configuration of the ASA. This is the configuration that
when applied allows the unit to become part of a failover pair. It does
require that the Primary unit be installed and configured.
interface GigabitEthernet0/1
no shutdown
!
failover
failover lan unit secondary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key [cisco]
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.65 255.255.255.248 standby
10.4.242.66
Internet Edge Configuration Files
18
ASA 5520 a (Remote Access VPN only) Internet Edge 10K
ASA Version 8.2(2)
!
hostname ASA5520
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 10.4.200.10 dns-server
name 10.4.0.0 internal-net
name 10.4.248.0 ra-pool
!
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 10.4.240.24 255.255.255.224 standby 10.4.240.23
!
interface GigabitEthernet0/1
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/2
description LAN/STATE Failover Interface
!
interface GigabitEthernet0/3
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3.16
vlan 16
nameif outside-16
security-level 0
ip address 172.16.130.122 255.255.255.0 standby 172.16.130.121
!
interface GigabitEthernet0/3.17
vlan 17
nameif outside-17
security-level 0
ip address 172.17.130.122 255.255.255.0 standby 172.17.130.121
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
boot system disk0:/asa822-k8.bin
ftp mode passive
clock timezone PST -8
clock summer-time PDT recurring
access-list RA_SplitTunnelACL standard permit internal-net 255.254.0.0
access-list inside_nat0_outbound extended permit ip any ra-pool
255.255.252.0
access-list RA_FullTunnelACL standard permit any
access-list redistribute-list standard permit ra-pool 255.255.252.0
pager lines 24
mtu inside 1500
mtu outside-16 1500
mtu outside-17 1500
ip local pool ravpn-pool ra-pool-10.4.251.255 mask 255.255.252.0
failover
failover lan unit primary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key *****
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.73 255.255.255.248 standby
10.4.242.74
monitor-interface outside-16
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-631.bin
no asdm history enable
arp timeout 14400
nat (inside) 0 access-list inside_nat0_outbound
!
route-map redistribute-map permit 1
match ip address redistribute-list
!
!
router eigrp 100
no auto-summary
network internal-net 255.254.0.0
passive-interface default
no passive-interface inside
redistribute static route-map redistribute-map
!
route outside-16 0.0.0.0 0.0.0.0 172.16.130.126 1 track 1
route outside-17 0.0.0.0 0.0.0.0 172.17.130.126 254
route inside 0.0.0.0 0.0.0.0 10.4.240.1 tunneled
timeout xlate 3:00:00
Internet Edge Configuration Files
19
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect
0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
ldap attribute-map VPN-Group-AD-Map
map-name memberOf IETF-Radius-Class
map-value memberOf CN=vpn-partner,CN=Users,DC=cisco,DC=com bn-partner
map-value memberOf CN=vpn-user,CN=Users,DC=cisco,DC=com bn-user
dynamic-access-policy-record DfltAccessPolicy
aaa-server AAA-SERVER protocol radius
aaa-server AAA-SERVER (inside) host 10.4.200.15
key [SecretKey]
aaa-server AD protocol ldap
aaa-server AD (inside) host dns-server
server-port 389
ldap-base-dn CN=Users,DC=cisco,DC=local
ldap-naming-attribute sAMAccountName
ldap-login-password [cisco]
ldap-login-dn CN=ASA 5520,CN=Users,DC=cisco,DC=local
server-type microsoft
aaa authentication enable console AAA-SERVER LOCAL
aaa authentication ssh console AAA-SERVER LOCAL
http server enable
http internal-net 255.254.0.0 inside
http redirect outside 80
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sla monitor 16
type echo protocol ipIcmpEcho 10.194.112.65 interface outside-16
num-packets 3
frequency 10
sla monitor schedule 16 life forever start-time now
service resetoutside
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map BN_DYN_CRYPTO_MAP_1 101 set transform-set ESP-AES128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA
crypto dynamic-map BN_DYN_CRYPTO_MAP_1 101 set reverse-route
crypto dynamic-map BN_DYN_CRYPTO_MAP_2 102 set transform-set ESP-AES128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA
crypto dynamic-map BN_DYN_CRYPTO_MAP_2 102 set reverse-route
crypto map outside-16_map 65535 ipsec-isakmp dynamic BN_DYN_CRYPTO_MAP_1
crypto map outside-16_map interface outside-16
crypto map outside-17_map 65535 ipsec-isakmp dynamic BN_DYN_CRYPTO_MAP_2
crypto map outside-17_map interface outside-17
crypto isakmp enable outside-16
crypto isakmp enable outside-17
crypto isakmp policy 10
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
!
track 1 rtr 16 reachability
telnet timeout 5
ssh internal-net 255.254.0.0 inside
ssh timeout 5
ssh version 2
console timeout 0
!
tls-proxy maximum-session 1200
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 10.4.200.17 source inside
webvpn
enable outside-16
enable outside-17
anyconnect-essentials
svc image disk0:/anyconnect-win-2.5.0217-k9.pkg 3
svc image disk0:/anyconnect-macosx-i386-2.5.0217-k9.pkg 4
svc enable
tunnel-group-list enable
group-policy 5505Group internal
group-policy 5505Group attributes
vpn-group-policy 5505Group
ip-comp enable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
user-authentication-idle-timeout 480
nem enable
group-policy DfltGrpPolicy attributes
dns-server value 10.4.200.10
vpn-tunnel-protocol IPSec svc webvpn
split-dns value cisco.local
address-pools value ravpn-pool
Internet Edge Configuration Files
20
webvpn
svc ask none default svc
group-policy bn-adm-group internal
group-policy bn-adm-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
group-policy bn-user-group internal
group-policy bn-user-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
group-policy bn-partner-group internal
group-policy bn-partner-group attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
username 5505site5 password [c1sco123]
username 5505site5 attributes
vpn-group-policy 5505Group
ip-comp enable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value RA_FullTunnelACL
user-authentication-idle-timeout 480
nem enable
username admin password [c1sco123] encrypted privilege 15
tunnel-group bn-user type remote-access
tunnel-group bn-user general-attributes
address-pool ravpn-pool
authentication-server-group AD
default-group-policy bn-user-group
tunnel-group bn-user webvpn-attributes
group-alias bn-user enable
group-url https://172.16.130.122/bn-user enable
group-url https://172.17.130.122/bn-user enable
tunnel-group bn-user ipsec-attributes
pre-shared-key [cisco]
tunnel-group bn-admin type remote-access
tunnel-group bn-admin general-attributes
address-pool ravpn-pool
default-group-policy bn-adm-group
tunnel-group bn-admin webvpn-attributes
group-alias bn-admin enable
group-url https://172.16.130.122/bn-admin enable
group-url https://172.17.130.122/bn-admin enable
tunnel-group bn-admin ipsec-attributes
pre-shared-key [cisco]
tunnel-group bn-partner type remote-access
tunnel-group bn-partner general-attributes
address-pool ravpn-pool
authentication-server-group AD
default-group-policy bn-partner-group
tunnel-group bn-partner webvpn-attributes
group-alias bn-partner enable
group-url https://172.16.130.122/bn-partner enable
group-url https://172.17.130.122/bn-partner enable
tunnel-group bn-partner ipsec-attributes
pre-shared-key [cisco]
tunnel-group RA5505 type remote-access
tunnel-group RA5505 general-attributes
default-group-policy 5505Group
tunnel-group RA5505 ipsec-attributes
pre-shared-key [cisco]
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/
services/DD
CEService
destination address email [email protected]
destination transport-method http
Internet Edge Configuration Files
21
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:168120830ff94b707f03b7457a67a38b
: end
ASA 5520 b (Remote Access VPN only) Internet Edge 10K
Tech Tip
This is not the configuration of the ASA. This is the configuration that
when applied allows the unit to become part of a failover pair. It does
require that the Primary unit be installed and configured.
interface GigabitEthernet0/2
no shutdown
!
failover
failover lan unit primary
failover lan interface failover GigabitEthernet0/2
failover polltime unit msec 200 holdtime msec 800
failover polltime interface msec 500 holdtime 5
failover key [cisco]
failover replication http
failover link failover GigabitEthernet0/2
failover interface ip failover 10.4.242.73 255.255.255.248 standby
10.4.242.74
Outside 3750
Current configuration : 4951 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname out-3750
!
boot-start-marker
boot-end-marker
!
!
!
!
no aaa new-model
switch 1 provision ws-c3750g-24ps
switch 2 provision ws-c3750g-24ps
system mtu routing 1500
authentication mac-move permit
ip subnet-zero
!
!
!
!
crypto pki trustpoint TP-self-signed-3398555264
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3398555264
revocation-check none
rsakeypair TP-self-signed-3398555264
!
!
crypto pki certificate chain TP-self-signed-3398555264
certificate self-signed 01
30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D
69666963 6174652D 33333938 35353532 3634301E 170D3933 30333031
33395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33
35353236 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030
8100AE3B B3C1DB46 C135C457 31032217 01612602 87356D55 5DA2AA71
3BFA8FE4 D9BA9036 1F87E35F 2F4FAC0A FA8CCD54 75759EBF 69B4CE1A
1DE084CB 259C234F C3EFD7FD 842F5364 CAF0BB7C 1B2B6FB3 2A05394B
6C10B9C2 F4B0E7A2 F5FE375F 2C1A831D F993A2A3 106FD4A6 580FD16B
4C910203 010001A3 69306730 0F060355 1D130101 FF040530 030101FF
Internet Edge Configuration Files
22
04050030
43657274
30303031
03132649
33393835
81890281
817AC9D1
BB9E6D3E
7920DC9F
4E36AA32
30140603
551D1104
2D1A42A2
1A42A2E3
00038181
EDE91C06
3E782B1C
23E8D094
6A630A84
quit
0D300B82
E3A91351
A9135162
003DBB92
378E6E34
9A87A8BC
94331F96
D6
096F7574
620CAB5A
0CAB5A41
6B4E16EA
796D1432
4D450FFC
376FB6F6
2D333735
41A0F31B
A0F31B8B
62FCB5DA
C0A6294A
82CB45BE
D1680993
302E301F
8B6EF330
6EF3300D
7F5CF3D7
83EE960D
60ACA864
24D5F69F
!
!
!
spanning-tree mode pvst
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
!
!
!
interface GigabitEthernet1/0/1
switchport access vlan 16
!
interface GigabitEthernet1/0/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
!
interface GigabitEthernet1/0/3
!
interface GigabitEthernet1/0/4
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
!
interface GigabitEthernet1/0/5
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
0603551D
1D060355
06092A86
BE5BC356
6AAB121F
0F8933F9
0AF854CA
23041830
1D0E0416
4886F70D
8053627E
6042B6C3
2B732F28
C9A87DB3
16801438
0414382D
01010405
1A043AD4
7850EACB
E3F541C6
408FE524
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface GigabitEthernet2/0/1
switchport access vlan 17
!
interface GigabitEthernet2/0/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
Internet Edge Configuration Files
23
!
interface GigabitEthernet2/0/3
!
interface GigabitEthernet2/0/4
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
!
interface GigabitEthernet2/0/5
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 16,17
switchport mode trunk
!
interface GigabitEthernet2/0/6
!
interface GigabitEthernet2/0/7
!
interface GigabitEthernet2/0/8
!
interface GigabitEthernet2/0/9
!
interface GigabitEthernet2/0/10
!
interface GigabitEthernet2/0/11
!
interface GigabitEthernet2/0/12
!
interface GigabitEthernet2/0/13
!
interface GigabitEthernet2/0/14
!
interface GigabitEthernet2/0/15
!
interface GigabitEthernet2/0/16
!
interface GigabitEthernet2/0/17
!
interface GigabitEthernet2/0/18
!
interface GigabitEthernet2/0/19
!
interface GigabitEthernet2/0/20
!
interface GigabitEthernet2/0/21
!
interface GigabitEthernet2/0/22
!
interface GigabitEthernet2/0/23
!
interface GigabitEthernet2/0/24
!
interface GigabitEthernet2/0/25
!
interface GigabitEthernet2/0/26
!
interface GigabitEthernet2/0/27
!
interface GigabitEthernet2/0/28
!
interface Vlan1
no ip address
!
interface Vlan16
no ip address
!
ip classless
ip route 0.0.0.0 0.0.0.0 172.16.16.1
ip http server
ip http secure-server
!
!
ip sla enable reaction-alerts
!
!
!
line con 0
exec-timeout 0 0
line vty 0 4
login
line vty 5 15
login
!
end
Internet Edge Configuration Files
24
DMZ 3750
Current configuration : 4443 bytes
!
version 12.2
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname DMZ-3750
!
!
no aaa new-model
switch 1 provision ws-c3750g-24ps
vtp mode transparent
ip subnet-zero
!
!
!
!
!
!
no file verify auto
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
vlan dot1q tag native
!
vlan 1120-1128
!
interface Port-channel1
!
interface Port-channel3
description ACE 1 port 1/1
switchport access vlan 1128
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
!
interface Port-channel4
description ACE 1 port 1/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
!
interface Port-channel5
description ACE 2 port 1/1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
!
interface Port-channel6
description ACE 2 port 1/2
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
!
interface Port-channel20
description LAG port for Wireless Guest Access Controller
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1122,1126
switchport mode trunk
!
interface GigabitEthernet1/0/1
!
interface GigabitEthernet1/0/2
description Connection to Ironport C370
switchport access vlan 1120
!
interface GigabitEthernet1/0/3
description ACE 1 inter 1/1 ******
switchport access vlan 1128
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
channel-group 3 mode on
spanning-tree portfast
!
interface GigabitEthernet1/0/4
description ACE 1 inter 1/2 ******
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
channel-group 3 mode on
!
interface GigabitEthernet1/0/5
description ACE 2 inter 1/1 ********
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet1/0/6
Internet Edge Configuration Files
25
description ACE 2 inter 1/2 ********
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1121
switchport mode trunk
channel-group 5 mode on
!
interface GigabitEthernet1/0/7
description vpn-asr1006-1
switchport access vlan 1128
spanning-tree portfast
!
interface GigabitEthernet1/0/8
description vpn-asr1006-2
switchport access vlan 1128
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1122,1126
switchport mode trunk
channel-group 20 mode on
!
interface GigabitEthernet1/0/10
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1122,1126
switchport mode trunk
channel-group 20 mode on
!
interface GigabitEthernet1/0/11
description vpn-7206-1 gig0/3
switchport access vlan 1128
shutdown
!
interface GigabitEthernet1/0/12
description vpn-7206-2 gig0/3
switchport access vlan 1128
!
interface GigabitEthernet1/0/13
description Wireless Guest DHCP Server
switchport access vlan 1126
spanning-tree portfast
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
description vpn-3945e gig0/2
switchport access vlan 1128
shutdown
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
description uplink to 6504L (VMWare server connection)
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1120-1128
switchport mode trunk
!
interface GigabitEthernet1/0/23
description uplink to 5540-1 DMZ port Gi 0/1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1120-1128
switchport mode trunk
!
interface GigabitEthernet1/0/24
description uplink to 5540-2 DMZ port Gi 0/1
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1120-1128
switchport mode trunk
!
interface GigabitEthernet1/0/25
!
interface GigabitEthernet1/0/26
!
interface GigabitEthernet1/0/27
!
interface GigabitEthernet1/0/28
!
interface Vlan1
no ip address
!
interface Vlan1120
ip address 10.4.241.5 255.255.255.0
!
interface Vlan1121
Internet Edge Configuration Files
26
ip address 10.4.245.254 255.255.255.0
!
interface Vlan1122
no ip address
!
ip classless
ip http server
ip http secure-server
!
!
control-plane
!
!
line con 0
line vty 0 4
no login
line vty 5 15
no login
!
end
ACE Server Load Balancing
ACE 4710-1
boot system image:c4710ace-mz.A3_2_5.bin
boot system image:c4710ace-mz.A3_2_0.bin
peer hostname ace-4710-2
hostname ace-4710-1
interface gigabitEthernet 1/1
channel-group 1
no shutdown
interface gigabitEthernet 1/2
channel-group 1
no shutdown
interface gigabitEthernet 1/3
switchport trunk allowed vlan 12
no shutdown
interface gigabitEthernet 1/4
shutdown
interface port-channel 1
switchport trunk allowed vlan 1121
no shutdown
access-list ALL line 8 extended permit ip any any
probe http http-probe
interval 15
passdetect interval 60
request method head
expect status 200 200
open 1
rserver host
ip address
inservice
rserver host
ip address
inservice
webserver1
10.4.245.112
webserver2
10.4.245.113
serverfarm host webfarm
probe http-probe
rserver webserver1 80
inservice
rserver webserver2 80
inservice
class-map
2 match
class-map
2 match
3 match
4 match
5 match
6 match
7 match
8 match
match-all http-vip
virtual-address 10.4.245.100 tcp eq www
type management match-any remote_access
protocol xml-https any
protocol icmp any
protocol telnet any
protocol ssh any
protocol http any
protocol https any
protocol snmp any
policy-map type management first-match remote_mgmt_allow_policy
class remote_access
permit
policy-map type loadbalance first-match http-vip-17slb
class class-default
serverfarm webfarm
policy-map multi-match int1121
class http-vip
loadbalance vip inservice
Internet Edge Configuration Files
27
loadbalance policy http-vip-17slb
loadbalance vip icmp-reply active
nat dynamic 1 vlan 1121
interface vlan 1121
ip address 10.4.245.22 255.255.255.0
peer ip address 10.4.245.21 255.255.255.0
access-group input ALL
nat-pool 1 10.4.245.99 10.4.245.99 netmask 255.255.255.0 pat
service-policy input remote_mgmt_allow_policy
service-policy input int1121
no shutdown
ft interface vlan 12
ip address 10.10.12.11 255.255.255.0
peer ip address 10.10.12.12 255.255.255.0
no shutdown
ft peer 1
heartbeat interval 300
heartbeat count 10
ft-interface vlan 12
ft group 1
peer 1
peer priority 110
associate-context Admin
inservice
ip route 0.0.0.0 0.0.0.0 10.4.245.1
username admin password 5 $1$B3h9fdMd$Z421F/bPKKmRhoc/.L8dq1 role Admin
domain default-domain
username www password 5 $1$CjdxXlER$U78nAgDUH9Sdi7RRu60VU1 role Admin
domain default-domain
ACE 4710-2
boot system image:c4710ace-mz.A3_2_5.bin
boot system image:c4710ace-mz.A3_2_0.bin
hostname ace-4710-2
interface gigabitEthernet 1/1
channel-group 1
no shutdown
interface gigabitEthernet 1/2
channel-group 1
no shutdown
interface gigabitEthernet 1/3
switchport trunk allowed vlan 12
no shutdown
interface gigabitEthernet 1/4
shutdown
interface port-channel 1
switchport trunk allowed vlan 1121
no shutdown
access-list ALL line 8 extended permit ip any any
probe http http-probe
interval 15
passdetect interval 60
request method head
expect status 200 200
open 1
rserver host
ip address
inservice
rserver host
ip address
inservice
webserver1
10.4.245.112
webserver2
10.4.245.113
serverfarm host webfarm
probe http-probe
rserver webserver1 80
inservice
rserver webserver2 80
inservice
class-map
2 match
class-map
2 match
3 match
4 match
5 match
6 match
match-all http-vip
virtual-address 10.4.245.100 tcp eq www
type management match-any remote_access
protocol xml-https any
protocol icmp any
protocol telnet any
protocol ssh any
protocol http any
Internet Edge Configuration Files
28
username www password 5 $1$CjdxXlER$U78nAgDUH9Sdi7RRu60VU1
domain default-domain
7 match protocol https any
8 match protocol snmp any
role Admin
policy-map type management first-match remote_mgmt_allow_policy
class remote_access
permit
policy-map type loadbalance first-match http-vip-17slb
class class-default
serverfarm webfarm
policy-map multi-match int1121
class http-vip
loadbalance vip inservice
loadbalance policy http-vip-17slb
loadbalance vip icmp-reply active
nat dynamic 1 vlan 1121
interface vlan 1121
ip address 10.4.245.21 255.255.255.0
peer ip address 10.4.245.22 255.255.255.0
access-group input ALL
nat-pool 1 10.4.245.99 10.4.245.99 netmask 255.255.255.0 pat
service-policy input remote_mgmt_allow_policy
service-policy input int1121
no shutdown
ft interface vlan 12
ip address 10.10.12.12 255.255.255.0
peer ip address 10.10.12.11 255.255.255.0
no shutdown
ft peer 1
heartbeat interval 300
heartbeat count 10
ft-interface vlan 12
ft group 1
peer 1
priority 110
associate-context Admin
inservice
ip route 0.0.0.0 0.0.0.0 10.4.245.1
username admin password 5 $1$B3h9fdMd$Z421F/bPKKmRhoc/.L8dq1
domain default-domain
role Admin
Internet Edge Configuration Files
29
Summary
The Internet Edge Configuration Guide is a supplemental guide to be used
with the Internet Edge Deployment Guide. The Internet Edge Deployment
Guide is a reference design for Cisco customers and partners. It covers the Internet Edge component of For Large Agencies—Borderless
Networks and is meant to be used in conjunction with the Cisco SBA for
Large Agencies—Borderless Networks LAN Deployment Guide and
WAN Deployment Guide, which you can find on www.cisco.com/go/sba.
If this design does not scale to meet your needs, please refer to the Cisco
Validated Designs (CVD) for larger deployment models. CVDs can be found
on Cisco.com. The Cisco products used in this design were tested in a
network lab at Cisco. The specific products are listed near the beginning of
this document for your convenience.
Internet Edge Configuration Files
30
Appendix A:
SBA for Large Agencies Document System
Deployment Guides
Design Guides
Design Overview
IPv6 Addressing
Guide
Supplemental Guides
Foundation Deployment
Guides
Wireless CleanAir
Deployment Guide
LAN Deployment
Guide
Nexus 7000
Deployment Guide
SIEM Deployment
Guide
LAN
Configuration Guide
WAN Deployment
Guide
ArcSight SIEM
Partner Guide
LogLogic SIEM
Partner Guide
WAN
Configuration Guide
Internet Edge
Deployment Guide
You are Here
nFx SIEM
Partner Guide
Internet Edge
Configuration Guide
Network Management
Guides
SolarWinds
Deployment Guide
RSA SIEM
Partner Guide
Splunk SIEM
Partner Guide
Data Security
Deployment Guide
CREDANT Data Security
Partner Guide
Lumension Data Security
Partner Guide
Appendix A
31
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word
partner does not imply a partnership relationship between Cisco and any other company. (1005R)
C07-640805-00
/11