(config) # IP default-Gateway 192.168.8.1
M1
M1 (config) # int VLAN 1M1 (config-If) # IP add 192.168.8.1 255.255.255.0M1 (config-If) # No sh
Port ing on asa1
Asa1
Ciscoasa (config) # static (inside, outside) TCP int telnet192.168.8.8 Telnet netmask
255.255.255.255
Add an entry in the ACL to allow R1 to access port 23 of E0/1.Ciscoasa (config) # access-List Test permit TCP 12.0.0.1 255.255.255.255 12.0.0.2 255.255.255 EQ 23
Test results on r1
R1
R1 # telnet 12.0.0.2Trying 12.0.0.2... open
Us
accessed through the extranet IP.To turn on NAT:Global (outside) 1 interfaceNat (inside) 1 192.168.3.0 255.255.255.0Do port mapping:static (inside,outside) TCP interface 192.168.3.222 3389 netmask 255.255.255.255To do access control for an external network port:Access-list outside_access Extended permit IP any anyAccess-group Outside_access in Interface OutsideThe above directive realizes, the external network user accesses the internal terminal through the public network IP, but the intranet u
Release date:Updated on: 2013-06-27
Affected Systems:Cisco Next-Generation FirewallDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-3382Cisco ASA Next-Generation Firewall is a Next-Generation Firewall product. It is an additional service module that extends the
In this article, I'll briefly explain the Active/standby failover configuration on the Cisco ASA. The lab is do in GNS3.
Physical topology:
ConfigurationCiscoasa/act/pri (config) # sh run failoverFailoverFailover LAN Unit PrimaryFailover LAN Interface failover_stateless GIGABITETHERNET0/2Failover link failover_stateful gigabitethernet0/1Failover interface IP failover_stateless 169.254.0.15 255.255.255
TopologyRequirement: You can use the Cisco Firewall ASA to access servers in the Internet and DMZ through the Intranet. servers in DMZ can be published to the network for access by Internet users.I. Use of Cisco simulated FirewallBecause we do not have real devices, we use a virtual system using the Linux kernel to sim
) # access-list permit TCP host 13.0.0.3 host 218.1.1.1 eq 23Defining an ACL allows 13.0.0.3 to telnet to 218.1.1.1, since the previous 110 has been applied here on the interface and omittedMake a backhaul route on the R3R3 (config) #ip Route 218.1.1.1 255.255.255.255 13.0.0.1Telnet 218.1.1.1 on R3 to verify that you can map to R2650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/76/DC/wKiom1Zdrd2SCLZrAAAmdU1IUOg711.png "title=" pmy ( Doni3[ck}2oaw3gx328.png "alt=" Wkiom1zdrd2sclzraaamdu
Step 1 of Cisco ASA firewall VPN configuration: Create an address pool. To remotely access the client, you need to assign an IP address during logon. Therefore, we also need to create a DHCP address pool for these clients. However, if you have a DHCP server, you can also use a DHCP server. QUANMA-T (config) # ip local pool vpnpool 192.168.10.100-192.168.10.199 ma
Cisco Firewall ASA Configuration case
Topology map
Requirements: Through Cisco Firewall ASA use intranet users can access the external network and the server in the DMZ, the server in the DMZ can be published to the network, f
ASA Port mapping: Map the host 192.168.169.2 in the DMZ to the interface address of the firewall outside interface:Set up hosts that need to be mappedObject Network Server1Host 192.168.169.2Set the ports that need to be mappedCiscoasa (config) # object service 3389Ciscoasa (config-service-object) # service TCP source EQ 3389Ciscoasa (config) # Object Service 5000Ciscoasa (config-service-object) # Service TC
ASA 551X Network speed limitThe speed limit for the entire segment can also be limited to 4M for a single IP instance in the network segmentAsa846-k8.bin Test OKObject-group Network Rate_limitNetwork-object 192.168.0.0 255.255.255.0Access-list rate_limit Extended Permit IP object-group rate_limit anyAccess-list rate_limit Extended Permit ip any object-group rate_limitClass-map map_rateMatch Access-list Rate_limitPolicy-map Map_rate_useClass Map_ratePo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.