您好,欢迎来到刀刀网。
搜索
您的当前位置:首页ASA配置案例

ASA配置案例

来源:刀刀网


ASA配置案例

拓扑

基本要求:

1. Hosts on the Inside network can access any network host on any network for FTP and DNS services.

2. Sales Department hosts on the Inside network can access any network host on any network for WWW services.

3. Finance Department hosts can only access WWW services on the WWW server in their own DMZ.

4. All hosts on the Inside network are permitted to Ping hosts on any network.

5. Hosts on the Inside network are only permitted to respond to ICMP echo requests from hosts on the DMZ network.

6. Unless otherwise stated, only specified traffic is permitted to leave the Inside network.

7. Only hosts on the Inside network are permitted to access FTP services on the DMZ FTP server.

8. All hosts are permitted to access WWW services on the DMZ WWW server.

9. Hosts in the DMZ are only permitted to communicate for their designated purpose. (E.g. The WWW server can respond to web requests, but cannot initiate a web request.)

10. Hosts in the DMZ are only permitted to respond to ICMP echo requests from hosts on the Inside network.

11. Unless otherwise stated, only specified traffic is permitted to leave

the DMZ network.

配置GUI

(I: Internet S: Sales F: Finanacial D: DMZ)

配置命令:

ASA Version 8.0(4)

!

hostname ciscoasa

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

name 10.0.0.12 DMZ_FTP

name .59.194.15 ShawDNS

name 10.0.0.11 DMZ_WWW

name 4.2.2.2 PublicDNS

!

interface Ethernet0/0

nameif I

security-level 0

ip address dhcp setroute

!

interface Ethernet0/1

nameif D

security-level 50

ip address 10.0.0.1 255.255.255.0

!

interface Ethernet0/2

nameif F

security-level 100

ip address 172.16.0.1 255.255.0.0

!

interface Ethernet0/3

nameif S

security-level 100

ip address 192.168.0.1 255.255.255.0

!

interface Management0/0

nameif management

security-level 100

ip address 192.168.1.1 255.255.255.0

management-only

!

ftp mode passive

object-group protocol TCPUDP

protocol-object udp

protocol-object tcp

object-group network DM_INLINE_NETWORK_1

network-object 172.16.0.0 255.255.0.0

network-object 192.168.0.0 255.255.255.0

object-group network DM_INLINE_NETWORK_2

network-object 172.16.0.0 255.255.0.0

network-object 192.168.0.0 255.255.255.0

object-group service DM_INLINE_TCP_1 tcp

port-object eq ftp

port-object eq ftp-data

object-group service DM_INLINE_TCP_2 tcp

port-object eq ftp

port-object eq ftp-data

object-group service DM_INLINE_TCP_3 tcp

port-object eq ftp

port-object eq ftp-data

object-group service DM_INLINE_TCP_4 tcp

port-object eq ftp

port-object eq ftp-data

access-list F_access_in extended permit object-group TCPUDP any 10.0.0.0 255.255.255.0 eq www

access-list F_access_in extended permit icmp any 10.0.0.0 255.255.255.0

access-list F_access_in extended permit tcp any any object-group DM_INLINE_TCP_3

access-list F_access_in extended permit udp any any eq domain

access-list D_access_in extended permit icmp any object-group

DM_INLINE_NETWORK_1

access-list D_access_in extended permit tcp any object-group

DM_INLINE_NETWORK_2 object-group DM_INLINE_TCP_1

access-list D_access_in extended permit tcp any any eq www

access-list S_access_in extended permit tcp any any object-group DM_INLINE_TCP_2

access-list S_access_in extended permit object-group TCPUDP any any eq www

access-list S_access_in extended permit icmp any any

access-list S_access_in extended permit ip any any inactive

access-list S_access_in extended permit udp any any eq domain

access-list I_access_in extended permit tcp any any object-group DM_INLINE_TCP_4

access-list I_access_in extended permit tcp any any eq www

access-list S_nat0_outbound extended permit ip any host DMZ_FTP

access-list S_nat0_outbound extended permit ip any host DMZ_WWW

access-list F_nat0_outbound extended permit ip any host DMZ_WWW

access-list F_nat0_outbound extended permit ip any host DMZ_FTP

pager lines 24

logging enable

logging asdm informational

mtu management 1500

mtu I 1500

mtu D 1500

mtu F 1500

mtu S 1500

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-613.bin

no asdm history enable

arp timeout 14400

global (I) 1 interface

nat (F) 0 access-list F_nat0_outbound

nat (F) 1 0.0.0.0 0.0.0.0

nat (S) 0 access-list S_nat0_outbound

nat (S) 1 0.0.0.0 0.0.0.0

static (D,I) tcp interface www DMZ_WWW www netmask 255.255.255.255

access-group I_access_in in interface I

access-group D_access_in in interface D

access-group F_access_in in interface F

access-group S_access_in in interface S

route I 0.0.0.0 0.0.0.0 10.100.200.1 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

dynamic-access-policy-record DfltAccessPolicy

http server enable

http 192.168.1.0 255.255.255.0 management

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

telnet timeout 5

ssh timeout 5

console timeout 0

dhcp-client client-id interface I

dhcpd dns ShawDNS

!

dhcpd address 192.168.1.2-192.168.1.254 management

dhcpd dns ShawDNS interface management

dhcpd enable management

!

dhcpd address 10.0.0.10-10.0.0.100 D

dhcpd dns ShawDNS interface D

dhcpd enable D

!

dhcpd address 172.16.0.2-172.16.0.254 F

dhcpd dns ShawDNS interface F

dhcpd enable F

!

dhcpd address 192.168.0.2-192.168.0.254 S

dhcpd dns ShawDNS interface S

dhcpd enable S

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

message-length maximum 512

policy-map global_policy

class inspection_default

inspect dns preset_dns_map

inspect ftp

inspect h323 h225

inspect h323 ras

inspect rsh

inspect rtsp

inspect esmtp

inspect sqlnet

inspect skinny

inspect sunrpc

inspect xdmcp

inspect sip

inspect netbios

inspect tftp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:4f6cbef867f1efc432e7738edc5b0fd2

: end

asdm image disk0:/asdm-613.bin

asdm location DMZ_FTP 255.255.255.255 I

asdm location ShawDNS 255.255.255.255 F

asdm location DMZ_WWW 255.255.255.255 F

asdm location PublicDNS 255.255.255.255 F

no asdm history enable

因篇幅问题不能全部显示,请点此查看更多更全内容

Copyright © 2019- gamedaodao.com 版权所有 湘ICP备2022005869号-6

违法及侵权请联系:TEL:199 18 7713 E-MAIL:2724546146@qq.com

本站由北京市万商天勤律师事务所王兴未律师提供法律服务