cisco5520防火墙求助 配置实例.doc
《cisco5520防火墙求助 配置实例.doc》由会员分享,可在线阅读,更多相关《cisco5520防火墙求助 配置实例.doc(13页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、如有侵权,请联系网站删除,仅供学习与交流cisco5520防火墙求助 配置实例【精品文档】第 13 页cisco5520防火墙求助 配置实例2007年12月17日 星期一 14:02开通远程登入的命令是什么?10.0.0.1 内网可以telnet我想通过外网 61.175.201.80 telnet防火墙希望各位大大帮帮忙。具体配置如下:ciscoasa# show ipSystem IP Addresses:Interface Name IP address Subnet mask Method GigabitEthernet0/0 outside1 61.175.201.80 255.25
2、5.255.248 CONFIGGigabitEthernet0/1 outside2 221.12.102.112 255.255.255.248 CONFIGGigabitEthernet0/2 inside 10.0.0.1 255.255.240.0 CONFIGManagement0/0 management 192.168.1.1 255.255.255.0 CONFIGCurrent IP Addresses:Interface Name IP address Subnet mask Method GigabitEthernet0/0 outside1 61.175.201.80
3、 255.255.255.248 CONFIGGigabitEthernet0/1 outside2 221.12.102.112 255.255.255.248 CONFIGGigabitEthernet0/2 inside 10.0.0.1 255.255.240.0 CONFIGManagement0/0 management 192.168.1.1 255.255.255.0 CONFIGciscoasa# show run: Saved:ASA Version 7.2(2) !hostname ciscoasaenable password 2KFQnbNIdI.2KYOU encr
4、yptednames!interface GigabitEthernet0/0nameif outside1security-level 0ip address 61.175.201.80 255.255.255.248 !interface GigabitEthernet0/1nameif outside2security-level 0ip address 221.12.102.112 255.255.255.248 !interface GigabitEthernet0/2nameif insidesecurity-level 100ip address 10.0.0.1 255.255
5、.240.0 !interface GigabitEthernet0/3shutdownno nameif no security-levelno ip address!interface Management0/0nameif managementsecurity-level 100ip address 192.168.1.1 255.255.255.0 management-only!passwd 2KFQnbNIdI.2KYOU encryptedftp mode passiveaccess-list outside_access_in extended permit icmp any
6、any access-list mail extended permit 110 any any access-list mail extended permit 25 any any access-list mail extended permit icmp any any access-list mail extended permit tcp any any eq 81 access-list dianxin extended permit ip 10.0.0.0 255.255.240.0 any access-list test extended permit tcp any any
7、 eq smtp access-list test extended permit icmp any any access-list test extended permit tcp any any eq pop3 access-list test extended permit tcp any any eq 1970 access-list test extended permit tcp any any eq 1971 access-list test extended permit tcp any any eq www access-list test extended permit t
8、cp any any eq 5001 access-list test extended permit tcp any any eq pcanywhere-data access-list test extended permit tcp any any eq 3389 access-list test extended permit tcp any any eq 5632 access-list test extended permit tcp any any access-list test extended permit udp any any access-list extended
9、extended permit tcp any any pager lines 24logging asdm informationalmtu outside1 1500mtu outside2 1500mtu inside 1500mtu management 1500no failovericmp unreachable rate-limit 1 burst-size 1no asdm history enablearp timeout 14400global (outside1) 1 interfaceglobal (outside2) 2 interfacenat (inside) 2
10、 access-list wangtongnat (inside) 1 access-list dianxinstatic (inside,outside1) tcp interface 81 10.0.0.101 81 netmask 255.255.255.255 static (inside,outside1) tcp interface pop3 10.0.0.101 pop3 netmask 255.255.255.255 static (inside,outside1) tcp interface smtp 10.0.0.101 smtp netmask 255.255.255.2
11、55 static (inside,outside2) tcp interface www 10.0.0.99 www netmask 255.255.255.255 static (inside,outside1) tcp interface www 10.0.0.99 www netmask 255.255.255.255 static (inside,outside1) tcp interface 1970 10.0.0.2 1970 netmask 255.255.255.255 static (inside,outside2) tcp interface 1971 10.0.0.2
12、1971 netmask 255.255.255.255 static (inside,outside1) tcp interface 5001 10.0.0.101 5001 netmask 255.255.255.255 static (inside,outside2) tcp interface pcanywhere-data 10.0.0.108 pcanywhere-data netmask 255.255.255.255 static (inside,outside2) tcp interface 5632 10.0.0.108 5632 netmask 255.255.255.2
13、55 static (inside,outside1) tcp interface 5632 10.0.0.108 5632 netmask 255.255.255.255 static (inside,outside1) tcp interface pcanywhere-data 10.0.0.108 pcanywhere-data netmask 255.255.255.255 static (inside,outside1) tcp interface 3389 10.0.0.108 3389 netmask 255.255.255.255 static (inside,outside2
14、) tcp interface 1970 10.0.0.2 1970 netmask 255.255.255.255 static (inside,outside1) tcp interface 1971 10.0.0.2 1971 netmask 255.255.255.255 access-group test in interface outside1access-group test in interface outside2route outside1 0.0.0.0 0.0.0.0 61.175.223.89 1route outside2 58.16.0.0 255.255.0.
15、0 221.12.104.113 1route outside2 58.17.0.0 255.255.128.0 221.12.104.113 1route outside2 58.17.128.0 255.255.128.0 221.12.104.113 1route outside2 58.18.0.0 255.255.0.0 221.12.104.113 1route outside2 58.19.0.0 255.255.0.0 221.12.104.113 1route outside2 58.20.0.0 255.255.0.0 221.12.104.113 1route outsi
16、de2 58.21.0.0 255.255.0.0 221.12.104.113 1route outside2 58.22.0.0 255.254.0.0 221.12.104.113 1route outside2 58.240.0.0 255.254.0.0 221.12.104.113 1route outside2 58.242.0.0 255.254.0.0 221.12.104.113 1route outside2 58.244.0.0 255.254.0.0 221.12.104.113 1route outside2 58.246.0.0 255.254.0.0 221.1
17、2.104.113 1route outside2 58.248.0.0 255.248.0.0 221.12.104.113 1route outside2 60.0.0.0 255.248.0.0 221.12.104.113 1route outside2 60.8.0.0 255.254.0.0 221.12.104.113 1route outside2 60.10.0.0 255.255.0.0 221.12.104.113 1route outside2 60.11.0.0 255.255.0.0 221.12.104.113 1route outside2 60.12.0.0
18、255.255.0.0 221.12.104.113 1route outside2 60.13.0.0 255.255.192.0 221.12.104.113 1route outside2 60.13.64.0 255.255.192.0 221.12.104.113 1route outside2 60.13.128.0 255.255.128.0 221.12.104.113 1route outside2 60.14.0.0 255.254.0.0 221.12.104.113 1route outside2 60.16.0.0 255.248.0.0 221.12.104.113
19、 1route outside2 60.24.0.0 255.252.0.0 221.12.104.113 1route outside2 60.28.0.0 255.254.0.0 221.12.104.113 1route outside2 60.30.0.0 255.255.0.0 221.12.104.113 1route outside2 60.31.0.0 255.255.0.0 221.12.104.113 1route outside2 60.208.0.0 255.248.0.0 221.12.104.113 1route outside2 60.216.0.0 255.25
20、4.0.0 221.12.104.113 1route outside2 60.218.0.0 255.254.0.0 221.12.104.113 1route outside2 60.220.0.0 255.252.0.0 221.12.104.113 1route outside2 61.48.0.0 255.252.0.0 221.12.104.113 1route outside2 61.52.0.0 255.254.0.0 221.12.104.113 1route outside2 61.54.0.0 255.255.0.0 221.12.104.113 1route outsi
21、de2 61.55.0.0 255.255.0.0 221.12.104.113 1route outside2 61.133.0.0 255.255.128.0 221.12.104.113 1route outside2 61.134.96.0 255.255.224.0 221.12.104.113 1route outside2 61.134.128.0 255.255.192.0 221.12.104.113 1route outside2 61.134.192.0 255.255.192.0 221.12.104.113 1route outside2 61.135.0.0 255
22、.255.0.0 221.12.104.113 1route outside2 61.136.0.0 255.255.192.0 221.12.104.113 1route outside2 61.136.64.0 255.255.192.0 221.12.104.113 1route outside2 61.137.128.0 255.255.128.0 221.12.104.113 1route outside2 61.138.0.0 255.255.192.0 221.12.104.113 1route outside2 61.138.64.0 255.255.192.0 221.12.
23、104.113 1route outside2 61.138.128.0 255.255.192.0 221.12.104.113 1route outside2 61.139.128.0 255.255.192.0 221.12.104.113 1route outside2 61.148.0.0 255.254.0.0 221.12.104.113 1route outside2 61.156.0.0 255.255.0.0 221.12.104.113 1route outside2 61.158.0.0 255.255.128.0 221.12.104.113 1route outsi
24、de2 61.158.128.0 255.255.128.0 221.12.104.113 1route outside2 61.159.0.0 255.255.192.0 221.12.104.113 1route outside2 61.161.0.0 255.255.192.0 221.12.104.113 1route outside2 61.161.128.0 255.255.128.0 221.12.104.113 1route outside2 61.162.0.0 255.255.0.0 221.12.104.113 1route outside2 61.163.0.0 255
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- cisco5520防火墙求助 配置实例 cisco5520 防火墙 求助 配置 实例
限制150内