- 积分
- 207
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|
CISCO PIX-515E 配置完成,保存并重启后设备无法正常运行ping任何ip都是time out
CISCO PIX-515E 配置完成,保存并重启后设备无法ping通任何接口的ip、也不能正常工作、所有都是time out,(重启后配置都在,没有丢失)
以下是配置详细内容和版本说明,请大家帮忙看看
pixfirewall> sh version
Cisco PIX Security Appliance Software Version 8.0(2)
Device Manager Version 6.0(3)
Compiled on Fri 15-Jun-07 18:25 by builders
System image file is "flash:/pix802.bin"
Config file at boot was "startup-config"
pixfirewall up 1 hour 45 mins
Hardware: PIX-515E, 128 MB RAM, CPU Pentium II 433 MHz
Flash E28F128J3 @ 0xfff00000, 16MB
BIOS Flash AM29F400B @ 0xfffd8000, 32KB
Encryption hardware device : VAC+ (Crypto5823 revision 0x1)
0: Ext: Ethernet0 : address is 0013.c471.7257, irq 10
1: Ext: Ethernet1 : address is 0013.c471.7258, irq 11
Licensed features for this platform:
Maximum Physical Interfaces : 6
Maximum VLANs : 25
Inside Hosts : Unlimited
Failover : Active/Standby
VPN-DES : Enabled
VPN-3DES-AES : Disabled
Cut-through Proxy : Enabled
Guards : Enabled
URL Filtering : Enabled
Security Contexts : 2
GTP/GPRS : Disabled
VPN Peers : Unlimited
This platform has a Failover Only-Active/Standby (FO) license.
Serial Number: 809161978
Running Activation Key: 0x8d735e90 0xe0b1af60 0x6b80b8ed 0x41092d6e
Configuration has not been modified since last system restart.
pixfirewall>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
pixfirewall# sh run
: Saved
:
PIX Version 8.0(2)
!
hostname pixfirewall
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface Ethernet0
nameif outside
security-level 0
ip address 212.100.158.118 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
passwd 2KFQnbNIdI.2KYOU encrypted
boot system flash:/pix802.bin
ftp mode passive
access-list 100 extended permit ip any any
access-list 100 extended permit ip 192.168.1.0 255.255.255.0 any
access-list 100 extended permit ip 192.168.1.0 255.255.255.0 host 212.100.158.118
pager lines 24
mtu outside 1500
mtu inside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 212.100.158.116-212.100.158.117 netmask 255.255.255.0
nat (outside) 1 192.168.1.0 255.255.255.0
nat (outside) 1 0.0.0.0 0.0.0.0
nat (inside) 1 192.168.1.0 255.255.255.0
static (inside,outside) tcp 212.100.158.117 5051 192.168.1.2 5051 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 5005 192.168.1.2 5005 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 6000 192.168.1.2 6000 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 10252 192.168.1.2 10252 netmask 255.2
55.255.255
static (inside,outside) tcp 212.100.158.117 6060 192.168.1.2 6060 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 7007 192.168.1.2 7007 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 8008 192.168.1.2 8008 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 4221 192.168.1.2 4221 netmask 255.255
.255.255
static (inside,outside) tcp 212.100.158.117 81 192.168.1.2 81 netmask 255.255.255
.255
static (inside,outside) tcp 212.100.158.117 ftp 192.168.1.2 ftp netmask 255.255.2
55.255
access-group 100 in interface outside
route outside 0.0.0.0 0.0.0.0 212.100.158.113 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no crypto isakmp nat-traversal
telnet 222.189.24.112 255.255.25.248 outside
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:9db3f4528b8ee3c00f90d2e390f825e2
: end
pixfirewall#
|
|