Configuration tasks for Firewalls six
three-interface configuration with NAT
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/5A/37/wKioL1T6zAuxzCY2AAGRjNbkPFA427.jpg "title=" 1.PNG " alt= "Wkiol1t6zauxzcy2aagrjnbkpfa427.jpg"/>
Task topology Diagram 6.1
1. Port Basic Settings
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/5A/3B/wKiom1T6yxKxCxhOAAQ4QS-ku8c225.jpg "title=" 2.PNG " alt= "Wkiom1t6yxkxcxhoaaq4qs-ku8c225.jpg"/>
Figure 6.2
2. Set the system log information to be valid, which will provide the firewall with diagnostic information and status, sent to the buffer (Figure 6.3)
3. Authorized internal hosts can use Telnet to access the firewall console. The maximum time that a session can be idle is minutes. (Figure 6.3)
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/5A/3B/wKiom1T6yzGSqB55AAahRXkMGsU573.jpg "title=" 3.PNG " alt= "Wkiom1t6yzgsqb55aaahrxkmgsu573.jpg"/>
Figure 6.3
4.establish an external andDMZthe global address pool for the interface. Because onlyTenan external globalIPaddress, so add aPATglobal amount to handle overflow. Global (DMZ)command allows internal user accessDMZinterface on theWebServer
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/5A/37/wKioL1T6zM6w60AdAANP-Fqx1Uk661.jpg "title=" 4.PNG " alt= "Wkiol1t6zm6w60adaanp-fqx1uk661.jpg"/>
5. allow internal users to initiate connections on the DMZ interface and external interfaces, allowing DMZ users to initiate connections on the external interface
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/5A/3B/wKiom1T6y9eBASoSAAPAtJlRd6M838.jpg "title=" 5.PNG " alt= "Wkiom1t6y9ebasosaapatjlrd6m838.jpg"/>
6. allow any user on the external interface to access the Web server on the DMZ interface
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/5A/37/wKioL1T6zRGQDRJZAAJ0HjYY3fU703.jpg "title=" 6.PNG " alt= "Wkiol1t6zrgqdrjzaaj0hjyy3fu703.jpg"/>
7. set The external default route to connect to the Internet router
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/5A/3B/wKiom1T6zEXglGNHAAaUOj3jjxE956.jpg "title=" 13.PNG "alt=" Wkiom1t6zexglgnhaaauoj3jjxe956.jpg "/>
Figure 6.7
This article is from the "Network" blog, be sure to keep this source http://zznetwork.blog.51cto.com/9398550/1618286
Firewall configuration Six of the ten tasks, three-interface configuration with NAT