【实验】配置CISCO IOS基于区域的防火墙
生活随笔
收集整理的這篇文章主要介紹了
【实验】配置CISCO IOS基于区域的防火墙
小編覺(jué)得挺不錯(cuò)的,現(xiàn)在分享給大家,幫大家做個(gè)參考.
?
歡迎關(guān)注微信公眾號(hào)【廈門(mén)微思網(wǎng)絡(luò)】。www.xmws.cn專(zhuān)業(yè)IT認(rèn)證培訓(xùn)19周年主要課程:思科、華為、紅帽、ORACLE、VMware、CISP、PMP等認(rèn)證培訓(xùn)及考證
配置需求
配置CISCO IOS基于區(qū)域的防火墻
A. 使得Inside的網(wǎng)絡(luò)可以訪問(wèn)Outside所用服務(wù)B. 使得Inside的網(wǎng)絡(luò)可以訪問(wèn)Dmz(只能訪問(wèn)Dmz的telnet服務(wù))C. 使得Outside網(wǎng)絡(luò)可以訪問(wèn)Dmz(只能訪問(wèn)Dmz的telnet服務(wù))
1.配置設(shè)備IP地址和路由(使用EIGRP動(dòng)態(tài)路由協(xié)議使得整個(gè)網(wǎng)絡(luò)互通)
interface FastEthernet0/0ip address 15.1.1.1 255.255.255.0no sh router eigrp 100network 15.1.1.0 0.0.0.255no auto-summary- 配置R2
配置R3:
interface Serial2/0ip address 35.1.1.3 255.255.255.0 no sh router eigrp 100network 35.1.1.0 0.0.0.255 no auto-summary配置R4:
interface Serial2/0ip address 45.1.1.4 255.255.255.0 no sh router eigrp 100network 45.1.1.0 0.0.0.255 no auto-summary配置R5:
interface FastEthernet0/0description ###conn to R1 F0/0###ip address 15.1.1.5 255.255.255.0 no sh interface Serial2/0description ###conn to R2 S2/0###ip address 25.1.1.5 255.255.255.0 no sh interface Serial2/1description ###conn to R3 S2/0###ip address 35.1.1.5 255.255.255.0 no sh interface Serial2/2description ###conn to R4 S2/0###ip address 45.1.1.5 255.255.255.0 no sh router eigrp 100network 15.1.1.0 0.0.0.255 network 25.1.1.0 0.0.0.255 network 35.1.1.0 0.0.0.255 network 45.1.1.0 0.0.0.255 no auto-summary2.按需求在R5上配置基于區(qū)域的防火墻
實(shí)現(xiàn)需求A:使得Inside的網(wǎng)絡(luò)可以訪問(wèn)Outside所用服務(wù)
配置安全區(qū)域
zone security Inside zone security Dmz zone security Outside配置class map
ip access-list extended In_to_Out_Aclpermit ip any anyclass-map type inspect match-all Inside_to_Outside_Cmapmatch access-group name In_to_Out_Acl配置policy map
policy-map type inspect In_to_Out_Pmapclass type inspect Inside_to_Outside_Cmapinspect配置區(qū)域?qū)?/strong>
zone-pair security mypair1 source Inside destination Outsideservice-policy type inspect In_to_Out_Pmap把接口分配到區(qū)域
interface FastEthernet0/0 zone-member security Outsideinterface Serial2/0 zone-member security Inside interface Serial2/1 zone-member security Inside實(shí)現(xiàn)求B:
使得Inside的網(wǎng)絡(luò)可以訪問(wèn)Dmz(只能訪問(wèn)Dmz的telnet服務(wù)) class-map type inspect match-all Inside_to_Dmz_Cmapmatch protocol telnet.
policy-map type inspect In_to_Dmz_Pmapclass type inspect Inside_to_Dmz_Cmapinspectzone-pair security mypair3 source Inside destination Dmzservice-policy type inspect In_to_Dmz_Pmapinterface Serial2/2 zone-member security Dmz實(shí)現(xiàn)需求C:
使得Outside網(wǎng)絡(luò)可以訪問(wèn)Dmz(只能訪問(wèn)Dmz的telnet服務(wù))class-map type inspect match-all Outside_to_Dmz_Cmapmatch protocol telnetpolicy-map type inspect Out_to_Dmz_Pmap class type inspect Outside_to_Dmz_Cmapinspectzone-pair security mypair2 source Outside destination Dmzservice-policy type inspect Out_to_Dmz_Pmap檢查命令:
?
總結(jié)
以上是生活随笔為你收集整理的【实验】配置CISCO IOS基于区域的防火墙的全部?jī)?nèi)容,希望文章能夠幫你解決所遇到的問(wèn)題。
- 上一篇: 30 个 Redis 基础知识
- 下一篇: 一定要用虚拟化服务器吗?