- 积分
- 212
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|
配置防火墙的时候,NAT方面有一些一问题,麻烦大家了,谢谢
vlan信息以红色的字体为准
ISP提供5个公网地址,119.62.207.22-119.62.207.26 子网掩码是255.255.255.0(别奇怪这个,电信局给的就是这个)
ISP网关为119.62.207.1
22目前给另外一个网络使用了,然后25给2821路由使用了,做VPN,24给防火墙做outside地址,剩下 23, 26 两个地址,我把23作为动态NAT出口地址,nat翻译出去,26作为另外一台代理服务器内网IP地址静态映射的公网地址地址
有问题的就是,我做了2个地址池,23 26 分别各一个,然后对应的nat翻译,两条,我的意思是,outside的IP地址是24,然后23,26 两个地址经过翻译,是否正常,这样的配置是否正确,可否将24和23合并到一起?
谢谢。麻烦大家了
目前配置做出如下:
ciscoasa# show run
: Saved
:
ASA Version 8.3(1)
!
hostname ciscoasa
enable password 9jNfZuG3TC5tCVH0 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif outside
security-level 0
ip address 119.62.207.24 255.255.255.0
!
interface Vlan2
nameif inside
security-level 0
ip address 10.39.253.1 255.255.255.0
!
interface Vlan3
nameif dmz201
security-level 50
ip address 10.39.201.1 255.255.255.0
!
interface Vlan4
nameif dmz200
security-level 40
ip address 10.39.200.1 255.255.255.0
!
interface Vlan5
description FW5505
nameif Management
security-level 100
ip address 10.39.11.118 255.255.255.192
!
interface Ethernet0/0
!
interface Ethernet0/1
switchport access vlan 2
shutdown
!
interface Ethernet0/2
switchport access vlan 3
!
interface Ethernet0/3
switchport access vlan 4
!
interface Ethernet0/4
switchport access vlan 4
!
interface Ethernet0/5
switchport access vlan 5
!
interface Ethernet0/6
shutdown
!
interface Ethernet0/7
shutdown
!
ftp mode passive
clock timezone HKST 8
object network inside1
subnet 10.39.0.0 255.255.0.0
object network outside1
host 119.62.207.23
object network static-outside1
host 119.62.207.26
object network static-inside1
host 10.39.201.32
pager lines 24
mtu outside 1500
mtu inside 1500
mtu dmz201 1500
mtu Management 1500
mtu dmz200 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source dynamic inside1 outside1
nat (dmz201,outside) source static static-inside1 static-outside1
route outside 0.0.0.0 0.0.0.0 119.62.207.1 1
route inside 10.39.5.0 255.255.255.0 10.39.253.2 1
route inside 10.39.11.0 255.255.255.0 10.39.253.2 1
route dmz200 10.39.200.32 255.255.255.255 10.39.200.32 1
route dmz201 10.39.201.32 255.255.255.255 10.39.201.32 1
route inside 10.39.253.0 255.255.255.0 10.39.253.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 Management
http 0.0.0.0 0.0.0.0 Management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username cisco123 password ffIRPGpDSOJh9YLq encrypted privilege 15
!
!
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:6cc5fdef98661a435e363f094347a1ff
: end
ciscoasa#
|
|