1. <tt id="5hhch"><source id="5hhch"></source></tt>
    1. <xmp id="5hhch"></xmp>

  2. <xmp id="5hhch"><rt id="5hhch"></rt></xmp>

    <rp id="5hhch"></rp>
        <dfn id="5hhch"></dfn>

      1. 思科ASA防火墻基本配置

        時間:2024-08-18 22:14:11 網絡技術 我要投稿
        • 相關推薦

        思科ASA防火墻基本配置

          Fire Wall 防火墻,它是一種位于內部網絡與外部網絡之間的網絡安全系統,當然,防火墻也分軟件防火墻與硬件防火墻。

          硬件防火墻又分為:基于PC架構與基于ASIC芯片

          今天來聊一聊思科的硬件防火墻 Cisco ASA

          Cisco ASA 防火墻產品線挺多:Cisco ASA5505 Cisco ASA5510 Cisco ASA5520 Cisco ASA5540 Cisco ASA5550 等等

          ASA 的基本配置步驟如下:

          配置主機名、域名

          hostname [hostname]

          domain-name xx.xx

          hostname Cisco-ASA 5520

          domain-name ciscosas.com.cn

          配置登陸用戶名密碼

          password [password]

          enable password [password]

          配置接口、路由

          interface interface_name

          nameif [name]

          name 有三種接口類型 insdie outside dmz

          security-level xx(數值)

          數值越大接口安全級別越高

          注:默認inside 100 ,outside 0 ,dmz 介于二者之間

          靜態路由

          route interface_number network mask next-hop-address

          route outside 0.0.0.0 0.0.0.0 210.210.210.1

          配置遠程管理接入

          Telnet

          telnet {network | ip-address } mask interface_name

          telnet 192.168.1.0 255.255.255.0 inside

          telnet 210.210.210.0 255.255.255.0 outside

          SSH

          crypto key generate rsa modulus {1024| 2048 }

          指定rsa系數,思科推薦1024

          ssh timeout minutes

          ssh version version_number

          crypto key generate rsa modulus 1024

          ssh timeout 30

          ssh version 2

          配置 ASDM(自適應安全設備管理器)接入

          http server enbale port 啟用功能

          http {networdk | ip_address } mask interface_name

          asdm image disk0:/asdm_file_name 指定文件位置

          username user password password privilege 15

          NAT

          nat-control

          nat interface_name nat_id local_ip mask

          global interface_name nat_id {global-ip [global-ip] |interface}

          nat-control

          nat inside 1 192.168.1.0 255.255.255.0

          global outside 1 interface

          global dmz 1 192.168.202.100-192.168.202.150

          ACL

          access-list list-name standad permit | deny ip mask

          access-list list-name extendad permit | deny protocol source-ip mask destnation-ip mask port

          access-group list-name in | out interface interface_name

          如果內網服務器需要以布到公網上

          staic real-interface mapped-interface mapped-ip real-ip

          staic (dmz,outside) 210.210.202.100 192.168.202.1

          保存配置

          wirte memory

          清除配置

          clear configure (all)

        【思科ASA防火墻基本配置】相關文章:

        思科交換機的基本配置09-10

        思科交換機基本配置命令大全06-10

        關于思科路由器的基本配置命令大全10-27

        2016思科交換機和路由器的基本配置01-21

        思科配置命令詳細介紹01-23

        思科交換機配置vlan09-02

        思科路由器的安全配置06-03

        思科路由器配置基礎08-13

        思科交換機STP配置08-30

        cisco思科交換機配置篇08-01

        国产高潮无套免费视频_久久九九兔免费精品6_99精品热6080YY久久_国产91久久久久久无码

        1. <tt id="5hhch"><source id="5hhch"></source></tt>
          1. <xmp id="5hhch"></xmp>

        2. <xmp id="5hhch"><rt id="5hhch"></rt></xmp>

          <rp id="5hhch"></rp>
              <dfn id="5hhch"></dfn>