• <output id="aynwq"><form id="aynwq"><code id="aynwq"></code></form></output>

    <mark id="aynwq"><option id="aynwq"></option></mark>
  • <mark id="aynwq"><option id="aynwq"></option></mark><label id="aynwq"><dl id="aynwq"></dl></label>
  • 學習啦 > 學習電腦 > 網絡知識 > 路由器 > 路由器設置 > cisco思科 > cisco PIX防火墻怎么配置

    cisco PIX防火墻怎么配置

    時間: 權威724 分享

    cisco PIX防火墻怎么配置

      思科cisco依靠自身的技術和對網絡經濟模式的深刻理解,使他成為了網絡應用的成功實踐者之一,他制造的路由器也是全球頂尖的,那么你知道cisco PIX防火墻怎么配置嗎?下面是學習啦小編整理的一些關于cisco PIX防火墻怎么配置的相關資料,供你參考。

      cisco PIX防火墻配置的過程:

      PIX Version 6.3(1)

      interface ethernet0 auto 設定端口0 速率為自動

      interface ethernet1 100full 設定端口1 速率為100兆全雙工

      interface ethernet2 auto 設定端口2 速率為自動

      nameif ethernet0 outside security0 設

      定端口0 名稱為 outside 安全級別為0

      nameif ethernet1 inside security100 設定端口1 名稱為 inside 安全級別為100

      nameif ethernet2 dmz security50 設定端口2 名稱為 dmz 安全級別為50

      enable password Dv0yXUGPM3Xt7xVs encrypted 特權密碼

      passwd 2KFQnbNIdI.2KYOU encrypted 登陸密碼

      hostname hhyy 設定防火墻名稱

      fixup protocol ftp 21

      fixup protocol h323 h225 1720

      fixup protocol h323 ras 1718-1719

      fixup protocol http 80

      fixup protocol ils 389

      fixup protocol rsh 514

      fixup protocol rtsp 554

      fixup protocol sip 5060

      fixup protocol sip udp 5060

      no fixup protocol skinny 2000

      fixup protocol smtp 25

      fixup protocol sqlnet 1521

      允許用戶查看、改變、啟用或禁止一個服務或協議通過PIX防火墻,防火墻默認啟用了一些常見的端口,但對于ORACLE等專有端口,需要專門啟用。

      names

      access-list 101 permit ip 192.168.99.0 255.255.255.0 192.168.170.0 255.255.255.0

      access-list 101 permit ip 192.168.12.0 255.255.255.0 192.168.180.0 255.255.255.0

      access-list 101 permit ip 192.168.23.0 255.255.255.0 192.168.180.0 255.255.255.0

      access-list 101 permit ip 192.168.99.0 255.255.255.0 192.168.101.0 255.255.255.0

      建立訪問列表,允許特定網段的地址訪問某些網段

      access-list 120 deny icmp 192.168.2.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.3.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.4.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.5.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.6.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.7.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.8.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.9.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.10.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.11.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.12.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.13.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.14.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.15.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.16.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.17.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.18.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.19.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.20.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.21.0 255.255.255.0 any

      access-list 120 deny icmp 192.168.22.0 255.255.255.0 any

      access-list 120 deny udp any any eq netbios-ns

      access-list 120 deny udp any any eq netbios-dgm

      access-list 120 deny udp any any eq 4444

      access-list 120 deny udp any any eq 1205

      access-list 120 deny udp any any eq 1209

      access-list 120 deny tcp any any eq 445

      access-list 120 deny tcp any any range 135 netbios-ssn

      access-list 120 permit ip any any

      建立訪問列表120防止各個不同網段之間的ICMP發包及拒絕135、137等端口之間的通信(主要防止沖擊波病毒)

      access-list 110 permit ip 192.168.99.0 255.255.255.0 192.168.101.0 255.255.255.0

      pager lines 24

      logging on

      logging monitor debugging

      logging buffered debugging

      logging trap notifications

      mtu outside 1500

      mtu inside 1500

      mtu dmz 1500

      ip address outside 10.1.1.4 255.255.255.224 設定外端口地址

      ip address inside 192.168.1.254 255.255.255.0 設定內端口地址

      ip address dmz 192.168.19.1 255.255.255.0 設定DMZ端口地址

      ip audit info action alarm

      ip audit attack action alarm

      ip local pool hhyy 192.168.170.1-192.168.170.254

      建立名稱為hhyy的地址池,起始地址段為:192.168.170.1-192.168.170.254

      ip local pool yy 192.168.180.1-192.168.180.254

      建立名稱為yy 的地址池,起始地址段為:192.168.180.1-192.168.180.254

      no failover

      failover timeout 0:00:00

      failover poll 15

      no failover ip address outside

      no failover ip address inside

      no failover ip address dmz

      no pdm history enable

      arp timeout 14400

      不支持故障切換

      global (outside) 1 10.1.1.13-10.1.1.28

      global (outside) 1 10.1.1.7-10.1.1.9

      global (outside) 1 10.1.1.10

      定義內部網絡地址將要翻譯成的全局地址或地址范圍

      nat (inside) 0 access-list 101

      使得符合訪問列表為101地址不通過翻譯,對外部網絡是可見的

      nat (inside) 1 192.168.0.0 255.255.0.0 0 0

      內部網絡地址翻譯成外部地址

      nat (dmz) 1 192.168.0.0 255.255.0.0 0 0

      DMZ區網絡地址翻譯成外部地址

      static (inside,outside) 10.1.1.5 192.168.12.100 netmask 255.255.255.255 0 0

      static (inside,outside) 10.1.1.12 192.168.12.158 netmask 255.255.255.255 0 0

      static (inside,outside) 10.1.1.3 192.168.2.4 netmask 255.255.255.255 0 0

      設定固定主機與外網固定IP之間的一對一靜態轉換

      static (dmz,outside) 10.1.1.2 192.168.19.2 netmask 255.255.255.255 0 0

      設定DMZ區固定主機與外網固定IP之間的一對一靜態轉換

      static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.0.0 0 0

      設定內網固定主機與DMZ IP之間的一對一靜態轉換

      static (dmz,outside) 10.1.1.29 192.168.19.3 netmask 255.255.255.255 0 0

      設定DMZ區固定主機與外網固定IP之間的一對一靜態轉換

      access-group 120 in interface outside

      access-group 120 in interface inside

      access-group 120 in interface dmz

      將訪問列表應用于端口

      conduit permit tcp host 10.1.1.2 any

      conduit permit tcp host 10.1.1.3 any

      conduit permit tcp host 10.1.1.12 any

      conduit permit tcp host 10.1.1.29 any

      設置管道:允許任何地址對全局地址進行TCP協議的訪問

      conduit permit icmp 192.168.99.0 255.255.255.0 any

      設置管道:允許任何地址對192.168.99.0 255.255.255.0地址進行PING測試

      rip outside passive version 2

      rip inside passive version 2

      route outside 0.0.0.0 0.0.0.0 10.1.1.1

      設定默認路由到電信端

      route inside 192.168.2.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.3.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.4.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.5.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.6.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.7.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.8.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.9.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.10.0 255.255.255.0 192.168.1.1 1

      route inside 192.168.11.0 255.255.255.0 192.168.1.1 1

      設定路由回指到內部的子網

      timeout xlate 3:00:00

      timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225

      1:00:00

      timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

      timeout uauth 0:05:00 absolute

      aaa-server TACACS+ protocol tacacs+

      aaa-server RADIUS protocol radius

      aaa-server LOCAL protocol local

      no snmp-server location

      no snmp-server contact

      snmp-server community public

      no snmp-server enable traps

      floodguard enable

      sysopt connection permit-ipsec

      sysopt connection permit-pptp

      service resetinbound

      service resetoutside

      crypto ipsec transform-set myset esp-des esp-md5-hmac

      定義一個名稱為myset的交換集

      crypto dynamic-map dynmap 10 set transform-set myset

      根據myset交換集產生名稱為dynmap的動態加密圖集(可選)

      crypto map 10 ipsec-isakmp dynamic dynmap

      將dynmap動態加密圖集應用為IPSEC的策略模板(可選)

      crypto map 20 ipsec-isakmp

      用IKE來建立IPSEC安全關聯以保護由該加密條目指定的數據流

      crypto map 20 match address 110

      為加密圖指定列表110作為可匹配的列表

      crypto map 20 set peer 10.1.1.41

      在加密圖條目中指定IPSEC對等體

      crypto map 20 set transform-set myset

      指定myset交換集可以被用于加密條目

      crypto map client configuration address initiate

      指示PIX防火墻試圖為每個對等體設置IP地址

      crypto map client configuration address respond

      指示PIX防火墻接受來自任何請求對等體的IP地址請求

      crypto map interface outside

      isakmp enable outside

      在外部接口啟用IKE協商

      isakmp key ******** address 10.1.1.41 netmask 255.255.255.255

      指定預共享密鑰和遠端對等體的地址

      isakmp identity address

      IKE身份設置成接口的IP地址

      isakmp client configuration address-pool local yy outside

      isakmp policy 10 authentication pre-share

      指定預共享密鑰作為認證手段

      isakmp policy 10 encryption des

      指定56位DES作為將被用于IKE策略的加密算法

      isakmp policy 10 hash md5

      指定MD5 (HMAC變種)作為將被用于IKE策略的散列算法

      isakmp policy 10 group 2

      指定1024比特Diffie-Hellman組將被用于IKE策略

      isakmp policy 10 lifetime 86400

      每個安全關聯的生存周期為86400秒(一天)

      group cisco idle-time 1800

      group pix_ address-pool yy

      group pix_ idle-time 1800

      group pix_ password ********

      group 123 address-pool yy

      group 123 idle-time 1800

      group 123 password ********

      group 456 address-pool yy

      group 456 idle-time 1800

      group 456 password ********

      telnet 192.168.88.144 255.255.255.255 inside

      telnet 192.168.88.154 255.255.255.255 inside

      telnet timeout 5

      ssh timeout 5

      console timeout 0

      vpdn group 1 accept dialin pptp

      vpdn group 1 ppp authentication pap

      vpdn group 1 ppp authentication chap

      vpdn group 1 ppp authentication mschap

      vpdn group 1 ppp encryption mppe 40

      vpdn group 1 client configuration address local hhyy

      vpdn group 1 pptp echo 60

      vpdn group 1 client authentication local

      vpdn username cisco password *********

      vpdn enable outside

      username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 2

      client group cisco_ password ********

      client username pix password ********

      terminal width 80

      Cryptochecksum:9524a589b608c79d50f7c302b81bdfa4b

    570322 主站蜘蛛池模板: 又大又硬一进一出做视频| 女人扒开裤子让男人桶| 四虎影8818| 一本色道久久HEZYO无码| 精品亚洲国产成人| 天天摸天天摸色综合舒服网| 亚洲精品视频免费在线观看| 91制片厂(果冻传媒)原档破解| 欧美日韩你懂的| 国产探花在线视频| 久久久精品免费| 精品无码一区在线观看| 好妈妈5高清中字在线观看神马| 伊人情人综合网| 91啦在线视频| 曰批免费视频试看天天视频下| 国产人妖视频一区二区| 三色堂明星合成论坛| 狼友av永久网站免费观看| 国产视频你懂得| 亚洲AV无码专区亚洲AV不卡| 青青国产成人久久91网站站| 成年人在线免费| 亚洲视频在线观看不卡| 18禁无遮挡无码网站免费| 最新版天堂中文在线| 国产又大又粗又长免费视频| 中国大臿蕉香蕉大视频| 狼群社区视频免费下载观看| 国产黄大片在线观看视频| 狠狠躁夜夜躁人人爽超碰97香蕉 | 福利片福利一区二区三区| 国产视频一区二区三区四区| 久久无码无码久久综合综合 | 人人添人人澡人人澡人人人爽| 无翼乌全彩我被闺蜜男口工全彩| 亚洲视频国产视频| 香蕉视频免费看| 大象传媒在线观看| 久久国产精品最新一区| 牛牛影院毛片大全免费看|