189 8069 5689

防火墙FirewallsASA-创新互联

防火墙Firewalls   ASA

创新互联服务项目包括灞桥网站建设、灞桥网站制作、灞桥网页制作以及灞桥网络营销策划等。多年来,我们专注于互联网行业,利用自身积累的技术优势、行业经验、深度合作伙伴关系等,向广大中小型企业、政府机构等提供互联网行业的解决方案,灞桥网站推广取得了明显的社会效益与经济效益。目前,我们服务的客户以成都为中心已经辐射到灞桥省份的部分城市,未来相信会继续扩大服务区域并继续获得客户的支持与信任!

实验:

            1.思路:数据包的走向

            2.要求:vlan互通,VRRP 内网pat访问外网,发布web服务器供外网访问,


      防火墙Firewalls   ASA

   让sw1作根交换机


   1.配置sw10  创建vlan10 20 100

             1端口加入vlan10   2和3端口为trunk模式

             防火墙Firewalls   ASA防火墙Firewalls   ASA

     2.配置sw20  创建vlan10 20  40 100

             1端口加入vlan100   3端口加入vlan40  2和4端口为trunk模式

             防火墙Firewalls   ASA防火墙Firewalls   ASA

             配置vlanif 10  ip:192.168.10.254 24

                 vlanif20  ip:192.168.20.254 24

                 vlanif40  ip:192.168.40.1 24


                 vlanif100 ip:192.168.100.254 24

             防火墙Firewalls   ASA防火墙Firewalls   ASA

   3.配置sw30  创建vlan10 20 50 100

             1端口加入vlan20   3端口加入vlan50   2和4端口为trunk模式

             防火墙Firewalls   ASA防火墙Firewalls   ASA

             配置vlanif 10  ip:192.168.10.253 24

                vlanif20  ip:192.168.20.253 24

                vlanif50  ip:192.168.50.1 24


                vlanif100 ip:192.168.100.253 24

            防火墙Firewalls   ASA 防火墙Firewalls   ASA

   4.配置sw20  配置 vlan1的vrrp

            vrrp vrid 10 virtual-ip 192.168.10.250

                  vrrp vrid 10 priority150

                  vrrp vrid 10 track interface g0/0/3 reduce 80

               vrrp vrid 10 track interface g0/0/2 reduce 80

               配置 vlan100的vrrp

                  vrrp vrid 100 virtual-ip 192.168.100.250

                  vrrp vrid 100 priority150

                  vrrp vrid 100 track interface g0/0/3 reduce 80

                  vrrp vrid 100 track interface g0/0/2 reduce 80

             配置 vlan20的vrrp

                 vrrp vrid 20 virtual-ip 192.168.20.250

              防火墙Firewalls   ASA防火墙Firewalls   ASA

     5.配置sw30  配置 vlan10的vrrp

                 vrrp vrid 10 virtual-ip 192.168.20.250

               配置 vlan20的vrrp

            vrrp vrid 20 virtual-ip 192.168.20.250

                  vrrp vrid 20priority150

                  vrrp vrid 20 track interface g0/0/3 reduce 80

                vrrp vrid 20 track interface g0/0/2 reduce 80

             配置 vlan100的vrrp

                  vrrp vrid 100 virtual-ip 192.168.100.250

             防火墙Firewalls   ASA防火墙Firewalls   ASA

   6.配置sw20  配置rip

               rip

               version2

               network 192.168.10.0

               network 192.168.100.0

               network 192.168.20.0

               network 192.168.40.0


             静态浮动路由

               ip route-static 0.0.0.0 0.0.0.0 192.168.40.254

             防火墙Firewalls   ASA

7.配置sw30 配置rip

               rip

               version2

               network 192.168.10.0

               network 192.168.20.0

                  network 192.168.50.0

               network 192.168.100.0

               静态浮动路由

               ip route-static 0.0.0.0 0.0.0.0 192.168.50.254

            防火墙Firewalls   ASA

  8.配置防火墙

             interface g0

             nameif  inside1

             no shutdown


             ip address 192.168.40.254 255.255.255.0

             security-level 100


             interface g1

             nameif  inside2

             no shutdown


             ip address 192.168.50.254 255.255.255.0

             security-level 90

               interface g2

             nameif  outside

             no shutdown


             ip address 200.8.8.1 255.255.255.252

             security-level 0

             防火墙Firewalls   ASA 防火墙Firewalls   ASA

          配置默认路由

             route inside1 192.168.10.0 255.255.255.0 192.168.40.1

             route inside1 192.168.100.0 255.255.255.0 192.168.40.1

             route inside2 192.168.20.0 255.255.255.0 192.168.50.1

                  route outside 200.1.1.0 255.255.255.0 200.8.8.2

             防火墙Firewalls   ASA防火墙Firewalls   ASA

          备份


             route inside2 192.168.1.0 255.255.255.0 192.168.50.2

             route inside2 192.168.100.0 255.255.255.0 192.168.50.2

             route inside2 192.168.2.0 255.255.255.0 192.168.50.2

     9.配置AR1

          配置0端口ip:200.1.1.254 24

              1端口ip:200.8.8.2 255.255.255.252

          配置静态浮动路由

               ip route-static 0.0.0.0 0.0.0.0 200.8.8.1

           防火墙Firewalls   ASA防火墙Firewalls   ASA

     10.在防火墙上配置静态NAT

          object network ob-in1

          subnet 192.168.10.0 255.255.255.0

          nat (inside1,outside)dynamic 119.1.1.1

         object network ob-in2

          subnet 192.168.20.0 255.255.255.0

          nat (inside2,outside)dynamic 119.1.1.2

           防火墙Firewalls   ASA

 此时client1和clent2 都可访问公网ftp 并抓包查看 内网地址已转化

           防火墙Firewalls   ASA防火墙Firewalls   ASA

          配置动态PAT  使公网访问内网

          object network ob-out

          host 119.1.1.3

          object network outside

          host 200.1.1.1

          nat (outside,inside1)static ob-out service tcp 80 80

           防火墙Firewalls   ASA防火墙Firewalls   ASA

          配置ACL

          access-list out-to-ins permit tcp any object inside1 eq http

          access-group out-to-ins in interface outside










另外有需要云服务器可以了解下创新互联scvps.cn,海内外云服务器15元起步,三天无理由+7*72小时售后在线,公司持有idc许可证,提供“云服务器、裸金属服务器、高防服务器、香港服务器、美国服务器、虚拟主机、免备案服务器”等云主机租用服务以及企业上云的综合解决方案,具有“安全稳定、简单易用、服务可用性高、性价比高”等特点与优势,专为企业上云打造定制,能够满足用户丰富、多元化的应用场景需求。


网页名称:防火墙FirewallsASA-创新互联
文章起源:http://cdxtjz.com/article/ceseed.html

其他资讯