TopologyRequirement: You can use the Cisco Firewall ASA to access servers in the Internet and DMZ through the Intranet. servers in DMZ can be published to the network for access by Internet users.I. Use of Cisco simulated FirewallBecause we do not have real devices, we use a virtual system using the Linux kernel to simulate Cisco's firewall. The simulated firewall can be downloaded by ourselves, we also need to use a software to connect to the simulat
ExperimentExperimental topology diagram:650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/5C/15/wKioL1UaedbRN4XgAACgbIamcMM749.jpg "title=" 1.jpg " alt= "Wkiol1uaedbrn4xgaacgbiamcmm749.jpg"/>Lab Environment:Build a web site and DNS service on the server2008 Server , creating a domain name of benet.com and the accp.com two websites. Experimental requirements:First the client can access the two Web sites on the server, and after successful URL filtering on the firewall makes it impossible
Currently, my company uses all static IP addresses. There is an ASA5505 firewall in the company, in this firewall, some users must be restricted from using certain applications, such as QQ farms. To implement these functions, we need to bind ARP to the ASA 5505 firewall, and then use the access control lists to restrict these IP addresses and MAC addresses. The specific configuration is very simple. Let's take a look at how to configure ARP binding on
Step 1 of Cisco ASA firewall VPN configuration: Create an address pool. To remotely access the client, you need to assign an IP address during logon. Therefore, we also need to create a DHCP address pool for these clients. However, if you have a DHCP server, you can also use a DHCP server. QUANMA-T (config) # ip local pool vpnpool 192.168.10.100-192.168.10.199 mask 255.255.255.0 Step 2: Create IKE Phase 1. Www.2cto.com QUANMA-T (config) # isakmp polic
ASA Port mapping: Map the host 192.168.169.2 in the DMZ to the interface address of the firewall outside interface:Set up hosts that need to be mappedObject Network Server1Host 192.168.169.2Set the ports that need to be mappedCiscoasa (config) # object service 3389Ciscoasa (config-service-object) # service TCP source EQ 3389Ciscoasa (config) # Object Service 5000Ciscoasa (config-service-object) # Service TCP Source EQ 5000Port conversion (convert extr
Overview:
System time:local NTP
Managing Event and Session Logging
Configuring Event and Session Logging
Verifying Event and Session Logging
Troubleshooting Event and Session Logging
Effective troubleshooting of network or device activity, from the perspective of the security appliance, requires accurate Information. Many times, the best source of accurate and complete information'll be various logs, if logging is properly configured T o Capture the necessary infor
ASA 551X Network speed limitThe speed limit for the entire segment can also be limited to 4M for a single IP instance in the network segmentAsa846-k8.bin Test OKObject-group Network Rate_limitNetwork-object 192.168.0.0 255.255.255.0Access-list rate_limit Extended Permit IP object-group rate_limit anyAccess-list rate_limit Extended Permit ip any object-group rate_limitClass-map map_rateMatch Access-list Rate_limitPolicy-map Map_rate_useClass Map_ratePo
I. Overview:
The acs4.x initial HTTP access Port is 2002, and subsequent ports are randomly changed by default from 1024~65535, It is not a problem to access the outside area from the inside area of ASA, but if you access inside from the outside area of the ASA, there is a problem and it is not possible to release all the acs4.x ports.
Two. Basic ideas:
A. Defining the range of changes in acs4.x dynamic
At present, the network used by my company is all static IP address, inside the company has a ASA5505 firewall, should lead the requirements, in the firewall to limit a part of users can not use certain applications (such as QQ farm, etc.), and the leader of the computer does not make any restrictions. To implement these features, we need to do an ARP binding above the ASA 5505 Firewall and then use the Access control list to restrict these IP address
Security in the past to see a foreigner article, now can not remember this very good enthusiasm like my general young people, but the mailbox and he discussed the mail.
There are a number of sites may have such a situation, Leverage. Inc and. ASA contains files to store database connection information, especially. Inc's files, want to get rid of the need for too much time and do a lot of program adjustments, such as I have a customer is the light. inc
Cisco Firewall ASA Configuration case
Topology map
Requirements: Through Cisco Firewall ASA use intranet users can access the external network and the server in the DMZ, the server in the DMZ can be published to the network, for the extranet user access
A The use of Cisco analog firewalls
Because we do not have real equipment, we use a virtual system using the Linux kernel to simulate Cisco's firewall
Safety
In the past to see a foreigner's article, now can not remember this very good enthusiasm like my general young people, but the mailbox and he discussed the mail.There are a number of sites may have such a situation, Leverage. Inc and. ASA contains files to store database connection information, especially. Inc's files, want to get rid of the need for too much time and do a lot of program adjustments, such as I have a customer is the light. inc
1, the external network for 1 fixed IP, do NAT let intranet share Internet.G0: External network port: 192.168.0.4/24Extranet Gateway: 192.168.0.1G2: Intranet port (Gateway of intranet): 172.16.0.1/24Only key commands are listed below:Interface GigabitEthernet0Nameif outside//designated external network port is outsideSecurity-level 10//Security level manually modified to 10, or it can be the default of 0IP address 192.168.0.4 255.255.255.0Interface GigabitEthernet2Nameif inside//designated intra
. changeappsanalysis0A dialedstring is a networking route between internal nodes. It indicates the Starting number. If only one segment is restricted, enter a number such as 6001. If only one segment is restricted, enter 60, and set the length to 4, in this way, 99 numbers can be used. routepattern represents the type, and our 3 represents siptrunk.16. After steps 13, 14, and 15 are completed, perform the following operations)A. Enter systemmanager --> routing --> entitylinks --> new, configurat
NAT configuration of the ASA/PIX Firewall1. configure a public address pool for NAT translation nat (inside) 1 10.0.0.0 255.255.255.0global (outside) 1 222.172.200.20-222.172.200.30 // can this command be unavailable? And the tab key are incomplete, but you don't have to worry about it. Just press it to finish. Or global (outside) 1 222.172.200.20 2. NAT for a public network with only one fixed IP address is converted to nat (inside) 1 10.0.0.0 255.25
1. Configure NAT translation for a public network address poolNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.20-222.172.200.30//This command may not work? And the TAB key is not complete, but no tube, according to lose can.OrGlobal (outside) 1 222.172.200.202, the public network only 1 fixed IP NAT conversionNat (inside) 1 10.0.0.0 255.255.255.0Global (Outside) 1 222.172.200.68//Designated public network address is a network segment3, Pat conversion, suitable for non-fixed I
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.