系统环境:
     
     cisco pix 525
     
     cisco acs server 3.2
     
     实现功能:
     
     远程使用cisco ipsec vpn client 3.x以上的vpn client 拨入企业网络;
     
     远程使用ms pptp vpn拨入企业网络;
     
     所有远程vpdn用户通过acs server 做用户验证和记帐,便于管理和实现其他pix 验证无法实现的功能,例如实现用户帐号尝试错误后锁定,访问时间等功能;
     
     pix 525 上的配置:
     
     jtpixfirewall# sh run
     
     : Saved
     
     :
     
     PIX Version 6.3(3)
     
     interface ethernet0 auto
     
     interface ethernet1 auto
     
     interface ethernet2 auto
     
     interface ethernet3 auto
     
     interface ethernet4 auto
     
     interface ethernet5 auto
     
     nameif ethernet0 outside security0
     
     nameif ethernet1 inside security100
     
     nameif ethernet2 perimter1 security20
     
     nameif ethernet3 perimter2 security30
     
     nameif ethernet4 perimter3 security40
     
     nameif ethernet5 perimter4 security50
     
     enable password pAvMEKYodlghdOOb7Y encrypted
     
     passwd 1ZowQT4VG2d3TbU69 encrypted
     
     hostname jtpixfirewall
     
     domain-name jt.com
     
     fixup protocol dns maximum-length 512
     
     fixup protocol ftp 21
     
     fixup protocol h323 h225 1720
     
     fixup protocol h323 ras 1718-1719
     
     fixup protocol http 80
     
     fixup protocol ils 389
     
     fixup protocol rsh 514
     
     fixup protocol rtsp 554
     
     fixup protocol sip 5060
     
     fixup protocol sip udp 5060
     
     fixup protocol skinny 2000
     
     fixup protocol smtp 25
     
     fixup protocol sqlnet 1521
     
     fixup protocol tftp 69
     
     names
     
     name 10.1.5.0 test
     
     name 10.1.8.50 netmang
     
     access-list inside_outbound_nat0_acl permit ip 10.1.8.0 255.255.255.0 10.1.58.0 255.255.255.0
     
     access-list inside_outbound_nat0_acl permit ip test 255.255.255.0 10.1.58.0 255.255.255.0
     
     access-list inside_outbound_nat0_acl permit ip 10.0.0.0 255.252.0.0 10.1.58.0 255.255.255.0
     
     access-list jt1_splitTunnelAcl permit ip tests 255.255.255.0 any
     
     access-list jt1_splitTunnelAcl permit ip 10.1.2.0 255.255.255.0 any
     
     access-list acl-out permit icmp any any
     
     pager lines 24
     
     logging on
     
     logging timestamp
     
     logging trap debugging
     
     logging history debugging
     
     logging facility 16
     
     logging host inside netmang
     
     mtu outside 1500
     
     mtu inside 1500
     
     mtu perimter1 1500
     
     mtu perimter2 1500
     
     mtu perimter3 1500
     
     mtu perimter4 1500
     
     ip address outside 222.121.48.75 255.255.255.224
     
     ip address inside 10.1.8.12 255.255.255.0
     
     ip address perimter1 127.0.0.1 255.255.255.255
     
     no ip address perimter2
     
     no ip address perimter3
     
     no ip address perimter4
     
     ip audit info action alarm
     
     ip audit attack action alarm
     
     ip local pool local_pool 10.1.58.50-10.1.58.100
     
     no failover
     
     failover timeout 0:00:00
     
     failover poll 15
     
     no failover ip address outside
     
     no failover ip address inside
     
     no failover ip address perimter1
     
     no failover ip address perimter2
     
     no failover ip address perimter3
     
     no failover ip address perimter4
     
     pdm location 10.1.9.50 255.255.255.255 inside
     
     pdm location 10.1.9.0 255.255.255.0 inside
     
     pdm location 10.1.9.0 255.255.255.0 perimter1
     
     pdm location 10.1.1.253 255.255.255.255 inside
     
     pdm location 10.1.0.0 255.255.0.0 inside
     
     pdm location 10.1.1.253 255.255.255.255 perimter1
     
     pdm location test 255.255.255.0 inside
     
     pdm location 10.0.0.0 255.252.0.0 inside
     
     pdm location 10.1.58.0 255.255.255.0 outside
     
     pdm location netmang 255.255.255.255 inside
     
     pdm history enable
     
     arp timeout 14400
     
     nat (inside) 0 access-list inside_outbound_nat0_acl
     
     nat (inside) 1 10.1.8.0 255.255.255.0 0 0
     
     nat (inside) 0 10.0.0.0 255.252.0.0 0 0
     
     access-group acl-out in interface inside
     
     rip inside default version 2
     
     route outside 0.0.0.0 0.0.0.0 222.121.48.65 1
     
     route inside 10.1.0.0 255.255.0.0 10.1.8.253 1
     
     timeout xlate 3:00:00
     
     timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
     
     timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
     
     timeout uauth 0:05:00 absolute
     
     aaa-server TACACS+ protocol tacacs+
     
     aaa-server RADIUS protocol radius
     
     aaa-server LOCAL protocol local
     
     aaa-server jtacs protocol radius
     
     #指定aaa采用radius
     
     aaa-server jtacs (inside) host netmang ddjt2008 timeout 5
     
     #指定radius server 的ip地址和口令(ddjt2008)
     
     aaa proxy-limit disable
     
     aaa accounting include tcp/0 inside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 jtacs
     
     #对aaa group jtacs做radius account (记帐)
     
     http server enable
     
     http 10.1.9.50 255.255.255.255 inside
     
     snmp-server host inside netmang
     
     no snmp-server location
     
     no snmp-server contact
     
     snmp-server community en9fk5*37
     
     snmp-server enable traps
     
     floodguard enable
     
     sysopt connection permit-ipsec
     
     sysopt connection permit-pptp
     
     sysopt radius ignore-secret
     
     service resetinbound
     
     crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
     
     crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
     
     crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
     
     crypto map outside_map client authentication jtacs
     
     crypto map outside_map interface outside
     
     isakmp enable outside
     
     isakmp nat-traversal 20
     
     #解决 ipsec 穿透 nat 问题;
     
     isakmp policy 40 authentication pre-share
     
     isakmp policy 40 encryption 3des
     
     isakmp policy 40 hash md5
     
     isakmp policy 40 group 2
     
     isakmp policy 40 lifetime 86400
     
     vpngroup test1 address-pool local_pool
     
     vpngroup test1 dns-server 10.1.2.1
     
     vpngroup test1 wins-server 10.1.2.1
     
     vpngroup test1 default-domain jt
     
     vpngroup test1 split-tunnel jt1_splitTunnelAcl
     
     vpngroup test1 idle-time 1800
     
     vpngroup test1 secure-unit-authentication
     
     vpngroup tset1 user-idle-timeout 18
     
     vpngroup test1 device-pass-through
     
     vpngroup test1 password ********
     
     telnet 10.1.8.0 255.255.255.0 inside
     
     telnet 10.1.9.0 255.255.255.0 inside
     
     telnet 10.1.1.253 255.255.255.255 inside
     
     telnet 10.1.1.253 255.255.255.255 perimter1
     
     telnet 10.1.1.253 255.255.255.255 perimter2
     
     telnet 10.1.1.253 255.255.255.255 perimter3
     
     telnet 10.1.1.253 255.255.255.255 perimter4
     
     telnet timeout 10
     
     ssh 10.1.9.0 255.255.255.0 inside
     
     ssh 10.1.9.0 255.255.255.0 perimter1
     
     ssh 10.1.9.0 255.255.255.0 perimter2
     
   ssh 10.1.9.0 255.255.255.0 perimte