本帖最后由 edenzhang 于 2015-4-21 04:58 编辑
在思科英文论坛我也发了类似的帖子,有个老外回答说“ASA在一个crypto map里如果得到了SA,此时如果收到了另外的peer请求,就会关闭当前的SA“。他还说,我所能做的就是把这边的ASA设为”initiator only",另一头的2个ASA设为"responder only",并说2个peer只能互为备份。事实上他的回答是我已经看到了的现象。看来ASA的一个crypto map里两个peer是不能同时工作的。
以下是两个站点的配置,贴出来也没什么用的。
这是站点A的配置:
ASA802(config)# show run cry
crypto ipsec transform-set TS esp-des esp-md5-hmac
crypto map CM 10 match address VPN
crypto map CM 10 set peer asa1 asa2
crypto map CM 10 set transform-set TS
crypto map CM interface outside
crypto isakmp identity key-id 888
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption des
hash md5
group 2
lifetime 3600
no crypto isakmp nat-traversal
ASA802(config)# show run tunn
tunnel-group DefaultL2LGroup ipsec-attributes
isakmp keepalive threshold 3600 retry 2
tunnel-group DefaultRAGroup ipsec-attributes
isakmp keepalive threshold 3600 retry 2
tunnel-group DefaultWEBVPNGroup ipsec-attributes
isakmp keepalive threshold 3600 retry 2
tunnel-group 100.0.0.1 type ipsec-l2l
tunnel-group 100.0.0.1 ipsec-attributes
pre-shared-key *
isakmp keepalive threshold 3600 retry 2
tunnel-group 100.0.0.2 type ipsec-l2l
tunnel-group 100.0.0.2 ipsec-attributes
pre-shared-key *
isakmp keepalive threshold 3600 retry 2
ASA802(config)# show run name
name 100.0.0.1 asa1
name 100.0.0.2 asa2
ASA802(config)# show run access-l
access-list VPN extended permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list VPN extended permit ip 172.16.2.0 255.255.255.0 172.16.1.0 255.255.255.0
ASA802(config)#
这是站点B的一个ASA的配置,另一个ASA2与此类似:
asa1(config)# show run cry
crypto ipsec ikev1 transform-set TS esp-des esp-md5-hmac
crypto map CM 10 match address VPN
crypto map CM 10 set peer 200.0.0.1
crypto map CM 10 set ikev1 transform-set TS
crypto map CM interface outside
crypto isakmp identity hostname
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption des
hash md5
group 2
lifetime 3600
asa1(config)# show run tunn
tunnel-group 200.0.0.1 type ipsec-l2l
tunnel-group 200.0.0.1 ipsec-attributes
ikev1 pre-shared-key *****
asa1(config)# show run access-l
access-list VPN extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list VPN extended permit ip 172.16.1.0 255.255.255.0 172.16.2.0 255.255.255.0
asa1(config)#