防火墙课程.ppt
《防火墙课程.ppt》由会员分享,可在线阅读,更多相关《防火墙课程.ppt(44页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Firewall TranningEccom Network内容1、PIX系列硬件2、ASA系列硬件3、防火墙配置命令4、防火墙维护思科防火墙分类硬件分类 思科防火墙主要分为2类,老产品系列为PIX,新产品系列为ASA5500。软件分类 思科防火墙以配置命令格式主要分为2类软件版本:7.0以上包括7.0和7.0以下。PIX系列硬件系列硬件PIX系列PIX Firewall 515EPIX Firewall 525PIX Firewall 535PIX License TypePIX License Type501:Provided with a 10-user,50-user,or unlim
2、ited user licenses506E:Provided in a single,unlimited-user license.515E、525、535 provide 4 types of license:Unrestricted(UR)Restricted(R)Failover(FO)Failover-Active/Active(FO-A/A)PIX Firewall License ComparisonCisco PIX 500 防火墙性能参考产品产品最高性能最高性能流量端口流量端口HA50160Mbps/7500*conn.4 FE switch+1FE不支持506E100Mbp
3、s/25000*conn.2 FE不支持515E190Mbps/130000 conn.2 FE可扩充1FE(R Lic.)和4FE(UR Lic.)A/S+A/A*525E330Mbps/280000 conn.2 FE可扩充4FE或3GE(R Lic.)和8FE或3GE(UR Lic.)A/S+A/A*5351.7Gbps/500000 conn.2 FE可扩充6FE或8GE(R Lic.)和12FE或9GE(UR Lic.)A/S+A/A*ASA系列硬件系列硬件ASA系列ASA 5500 系列 5505 5520 5550 5510 5540 5580ASA 5510FeatureDes
4、criptionFirewall ThroughputUp to 300MbpsConcurrent Threat Mitigation Throughput Up to 150 Mbps with AIP-SSM-10VPN ThroughputUp to 170 MbpsConcurrent Sessions50,000/130,000*IPSec VPN Peers250SSL VPN Peer License Levels10,25,50,100,or 250Security ContextsNot supportedInterfaces3 FE+1 management port;5
5、 FE*Virtual interfaces(VLANs)10;25*High AvailabilityNot supported;Active/Standby*Upgrade available with Cisco ASA 5510 Security Plus licenseASA 5520FeatureDescriptionFirewall ThroughputUp to 450 MbpsConcurrent Threat Mitigation Throughput Up to 225 Mbps with AIP-SSM-10Up to 375 Mbps with AIP-SSM-20V
6、PN ThroughputUp to 225 MbpsConcurrent Sessions280,000IPSec VPN Peers750SSL VPN Peer License Levels*10,25,50,100,250,500,or 750Security ContextsUp to 10*Interfaces4 GE and 1 FEVirtual interfaces(VLANs)100ScalabilityVPN clustering and load balancingHigh AvailabilityActive/Active,Active/Standby*Separat
7、ely licensed feature;includes two with base systemASA 5540FeatureDescriptionFirewall ThroughputUp to 650 MbpsConcurrent Threat Mitigation Throughput Up to 450 Mbps with AIP-SSM-20VPN ThroughputUp to 325 MbpsConcurrent Sessions400,000IPSec VPN Peers5000SSL VPN Peer License Levels*10,25,50,100,250,500
8、,750,1000 and 2500Security ContextsUp to 50*Interfaces4 GE and 1 FEVirtual interfaces(VLANs)100ScalabilityVPN clustering and load balancingHigh AvailabilityActive/Active,Active/Standby*Separately licensed feature;includes two with base systemASA 5550FeatureDescriptionFirewall ThroughputUp to 1.2Gbps
9、VPN ThroughputUp to 450 MbpsConcurrent Sessions650,000IPSec VPN Peers5000SSL VPN Peer License Levels10,25,50,100,250,500,750,1000,2500 and 5000Security ContextsUp to 50*Interfaces8GE,4SFP and 1 FEVirtual interfaces(VLANs)200ScalabilityVPN clustering and load balancingHigh AvailabilityActive/Active,A
10、ctive/Standby*Separately licensed feature;includes two with base systemCharacteristics of Cisco ASA 5500 Series Adaptive Security AppliancesCharacteristics of Cisco ASA 5500 Series Adaptive Security Appliances防火墙配置命令防火墙配置命令7.0版本以下配置命令讲解interface ethernet0 auto 设定端口0 速率为自动interface ethernet1 100full
11、设定端口1 速率为100兆全双工nameif ethernet0 outside security0 设定端口0 名称为 outside 安全级别为0nameif ethernet1 inside security100 设定端口1 名称为 inside 安全级别为100nameif ethernet2 dmz security50 设定端口2 名称为 dmz 安全级别为50enable password Dv0yXUGPM3Xt7xVs encrypted 特权密码passwd 2KFQnbNIdI.2KYOU encrypted 登陆密码访问控制列表access-list 101 perm
12、it ip 192.168.99.0 255.255.255.0 192.168.170.0 255.255.255.0access-list 101 permit ip 192.168.12.0 255.255.255.0 192.168.180.0 255.255.255.0access-list 101 permit ip 192.168.23.0 255.255.255.0 192.168.180.0 255.255.255.0access-list 101 permit ip 192.168.99.0 255.255.255.0 192.168.101.0 255.255.255.0
13、建立访问列表,允许特定网段的地址访问某些网段access-group 101 in interface outsideaccess-group 101 in interface insideaccess-group 101 in interface dmz应用访问列表到接口上接口地址及MTUmtu outside 1500mtu inside 1500mtu dmz 1500ip address outside 10.1.1.4 255.255.255.224 设定外端口地址ip address inside 192.168.1.254 255.255.255.0 设定内端口地址ip addr
14、ess dmz 192.168.19.1 255.255.255.0 设定DMZ端口地址日志记录logging on logging timestamp logging buffered warningslogging trap warnings 打开设备日志记录功能并设定记录的日志等级查看日志命令:show loggingNAT配置global(outside)1 10.1.1.13-10.1.1.28global(outside)1 10.1.1.7-10.1.1.9global(outside)1 10.1.1.10 定义内部网络地址将要翻译成的全局地址或地址范围nat(inside)0
15、 access-list 101 使得符合访问列表为101地址不通过翻译,对外部网络是可见的nat(inside)1 192.168.0.0 255.255.0.0 0 0 内部网络地址翻译成外部地址nat(dmz)1 192.168.0.0 255.255.0.0 0 0 DMZ区网络地址翻译成外部地址static(inside,outside)10.1.1.5 192.168.12.100 netmask 255.255.255.255static(inside,outside)10.1.1.12 192.168.12.158 netmask 255.255.255.255static(i
16、nside,outside)10.1.1.3 192.168.2.4 netmask 255.255.255.255设定固定主机与外网固定IP之间的一对一静态转换static(dmz,outside)10.1.1.2 192.168.19.2 netmask 255.255.255.255 设定DMZ区固定主机与外网固定IP之间的一对一静态转换 静态路由设置route inside 192.168.2.0 255.255.255.0 192.168.1.1route inside 192.168.3.0 255.255.255.0 192.168.1.1route outside 192.16
17、8.4.0 255.255.255.0 192.168.10.17.0版本以上配置命令讲解防火墙7.0及以上版本的命令格式与路由器基本一样,在这里不再详述。举例如下:防火墙维护防火墙维护PIX Troubleshooting工具工具show commandShow connect和和show connect detail pix#sh conn1514 in use,66418 most usedTCP out 210.72.32.92:4826 in 10.6.99.97:1433 idle 0:00:15 Bytes 4454 flags UIOBTCP out 210.72.32.92:
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 防火墙 课程
限制150内