ASA Virtual Wall Configuration

Source: Internet
Author: User
Tags snmp

ASA configuration
ASA Version 8.0 (2) <system>
!
Hostname ASA5520
Enable password 2kfqnbnidi.2kyou encrypted
No mac-address Auto
!
Interface ethernet0/0
!
Interface ethernet0/0.1
VLAN 100
!
Interface ethernet0/0.2
VLAN 200
!
Interface ethernet0/0.3
VLAN 300
!
Interface ETHERNET0/1
!
Interface ethernet0/1.1
VLAN 10
!
Interface ethernet0/1.2
VLAN 20
!
Interface ethernet0/1.3
VLAN 30
!
Interface ETHERNET0/2
!
Interface ETHERNET0/3
!
Interface ETHERNET0/4
Shutdown
!
Interface ETHERNET0/5
Shutdown
!
Class default
Limit-resource all 0
Limit-resource ASDM 5
Limit-resource SSH 5
Limit-resource Telnet 5
!

FTP mode passive
Pager lines 24
No failover
No ASDM history enable
ARP Timeout 14400
Console Timeout 0

Admin-context Admin
Context Admin
Config-url disk0:/admin.cfg
!

Context Join
Allocate-interface ethernet0/0
Allocate-interface ETHERNET0/1
Config-url disk0:/join.cfg
!

Context Networking
Allocate-interface ETHERNET0/2
Allocate-interface ETHERNET0/3
Config-url disk0:/networking.cfg
!

Prompt hostname context
cryptochecksum:9cc1a45cf59984c4f1379b68f95b098a
: End

Asa/neworking Configuration

: Saved
:
ASA Version 8.0 (2) <context>
!
Hostname Networking
Enable password 2kfqnbnidi.2kyou encrypted
Names
!
Interface ETHERNET0/2
Nameif outside
Security-level 0
IP address DHCP
!
Interface ETHERNET0/3
Nameif inside
Security-level 100
IP address 172.16.1.254 255.255.255.0
!
passwd 2kfqnbnidi.2kyou Encrypted
Access-list out-to-in Extended permit ICMP any any echo
Access-list out-to-in Extended permit ICMP any any echo-reply
Access-list out-to-in extended Permit TCP any host 10.0.0.110 eq SSH
Access-list out-to-in extended Permit TCP any host 10.0.0.110 eq www
Access-list out-to-in extended Permit TCP any host 10.0.0.110 eq FTP
Access-list out-to-in extended Permit TCP any host 10.0.0.110 eq 8080
Pager lines 24
MTU outside 1500
MTU Inside 1500
ICMP unreachable rate-limit 1 burst-size 1
No ASDM history enable
ARP Timeout 14400
Global (outside) 1 interface
Nat (inside) 1 172.16.1.0 255.255.255.0
Static (inside,outside) TCP 10.0.0.110 ssh 172.16.1.1 ssh netmask 255.255.255.255
Static (inside,outside) tcp 10.0.0.110 www 172.16.1.1 www netmask 255.255.255.255
Static (inside,outside) TCP 10.0.0.110 FTP 172.16.1.1 FTP netmask 255.255.255.255
Static (inside,outside) TCP 10.0.0.110 8080 172.16.1.1 3128 netmask 255.255.255.255
Access-group out-to-in in interface outside
Route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
Timeout Xlate 3:00:00
Timeout conn 1:00:00 half-closed 0:10:00 UDP 0:02:00 ICMP 0:00:02
Timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 MGCP 0:05:00 mgcp-pat 0:05:00
Timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
Timeout Uauth 0:05:00 Absolute
AAA Authentication SSH Console LOCAL
No snmp-server location
No Snmp-server Contact
No crypto ISAKMP nat-traversal
Telnet Timeout 5
SSH 0.0.0.0 0.0.0.0 outside
SSH Timeout 30
SSH version 2
!
Class-map Inspection_default
Match default-inspection-traffic
!
!
Policy-map type Inspect DNS Preset_dns_map
Parameters
Message-length Maximum 512
Policy-map Global_policy
Class Inspection_default
Inspect DNS Preset_dns_map
Inspect FTP
Inspect h323 h225
Inspect h323 RAS
Inspect NetBIOS
Inspect RSH
Inspect RTSP
Inspect Skinny
Inspect ESMTP
Inspect Sqlnet
Inspect SUNRPC
Inspect TFTP
Inspect SIP
Inspect XDMCP
!
Service-policy Global_policy Global
Username Networking password QN3BIPPT/OSZXPM3 encrypted privilege 15
Cryptochecksum:430e91e467e74583910adccfabf80cec
: End

Asa/join Configuration

asa5520/join# SH running-config
: Saved
:
ASA Version 8.0 (2) <context>
!
Hostname Join
Enable password 2kfqnbnidi.2kyou encrypted
Names
!
Interface ethernet0/0
Nameif outside
Security-level 0
IP address DHCP
!
Interface ETHERNET0/1
Nameif inside
Security-level 100
IP address 192.168.1.254 255.255.255.0
!
passwd 2kfqnbnidi.2kyou Encrypted
Access-list out-to-in Extended permit ICMP any any echo
Access-list out-to-in Extended permit ICMP any any echo-reply
Access-list out-to-in extended Permit TCP any host 10.0.0.100 eq 3389
Access-list out-to-in extended Permit TCP any host 10.0.0.100 eq www
Access-list out-to-in extended Permit TCP any host 10.0.0.100 eq FTP
Access-list out-to-in extended Permit TCP any host 10.0.0.100 eq telnet
Pager lines 24
MTU Inside 1500
MTU outside 1500
ICMP unreachable rate-limit 1 burst-size 1
No ASDM history enable
ARP Timeout 14400
Global (outside) 1 interface
Nat (inside) 1 192.168.1.0 255.255.255.0
Static (inside,outside) TCP 10.0.0.100 3389 192.168.1.1 3389 netmask 255.255.255.255
Static (inside,outside) tcp 10.0.0.100 www 192.168.1.1 www netmask 255.255.255.255
Static (inside,outside) TCP 10.0.0.100 FTP 192.168.1.1 FTP netmask 255.255.255.255
Static (inside,outside) TCP 10.0.0.100 telnet 192.168.1.1 telnet netmask 255.255.255.255
Access-group out-to-in in interface outside
Route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
Timeout Xlate 3:00:00
Timeout conn 1:00:00 half-closed 0:10:00 UDP 0:02:00 ICMP 0:00:02
Timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 MGCP 0:05:00 mgcp-pat 0:05:00
Timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
Timeout Uauth 0:05:00 Absolute
AAA Authentication SSH Console LOCAL
No snmp-server location
No Snmp-server Contact
No crypto ISAKMP nat-traversal
Telnet Timeout 5
SSH 0.0.0.0 0.0.0.0 outside
SSH Timeout 30
SSH version 2
!
Class-map Inspection_default
Match default-inspection-traffic
!
!
Policy-map type Inspect DNS Preset_dns_map
Parameters
Message-length Maximum 512
Policy-map Global_policy
Class Inspection_default
Inspect DNS Preset_dns_map
Inspect FTP
Inspect h323 h225
Inspect h323 RAS
Inspect NetBIOS
Inspect RSH
Inspect RTSP
Inspect Skinny
Inspect ESMTP
Inspect Sqlnet
Inspect SUNRPC
Inspect TFTP
Inspect SIP
Inspect XDMCP
!
Service-policy Global_policy Global
Username Join password P8h1qs/3blqj2kna encrypted privilege 15
cryptochecksum:3ece39ddf49bbe75af6c3688e1aebb4f
: End

ASA Virtual Wall Configuration

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.