设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: ihorse
收起左侧

[原创] packet tracer 6 配置防火墙asa

[复制链接]
发表于 2017-5-1 23:25:32 | 显示全部楼层
能把原配置详细发出来吗
16# 2017-5-1 23:25:32 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-1 23:27:01 | 显示全部楼层
FireWall#show run : Saved : ASA Version 8.4(2) ! hostname FireWall enable password 4IncP7vTjpaba2aF encrypted names ! interface Ethernet0/0 ! interface Ethernet0/1  switchport access vlan 2 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1  nameif inside  security-level 100  ip address 192.168.1.1 255.255.255.0 ! interface Vlan2  nameif outside  security-level 0  ip address 100.100.100.100 255.255.255.0 ! object network cisco  host 192.168.1.2 object network myNatPool  ! route inside 192.0.0.0 255.0.0.0 192.168.1.2 1 route outside 0.0.0.0 0.0.0.0 100.100.100.10 1 ! ! ipv6 access-list 10 permit udp any any ipv6 access-list 10 permit icmp any any ! access-group 10 in interface outside object network cisco  nat (inside,outside) static 192.168.1.2 ! ! ! ! ! policy-map cisco ! ! telnet timeout 5 ssh timeout 5 ! dhcpd address 192.168.1.5-192.168.1.35 inside dhcpd enable inside ! dhcpd auto_config outside ! ! ! ! ! FireWall# SHOW RUN : Saved : ASA Version 8.4(2) ! hostname FireWall enable password 4IncP7vTjpaba2aF encrypted names ! interface Ethernet0/0 ! interface Ethernet0/1  switchport access vlan 2 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1  nameif inside  security-level 100  ip address 192.168.1.1 255.255.255.0 ! interface Vlan2  nameif outside  security-level 0  ip address 100.100.100.100 255.255.255.0 ! object network cisco  host 192.168.1.2 object network myNatPool  ! route inside 192.0.0.0 255.0.0.0 192.168.1.2 1 route outside 0.0.0.0 0.0.0.0 100.100.100.10 1 ! ! ipv6 access-list 10 permit udp any any ipv6 access-list 10 permit icmp any any ! access-group 10 in interface outside object network cisco  nat (inside,outside) static 192.168.1.2 ! ! ! ! ! policy-map cisco ! ! telnet timeout 5 ssh timeout 5 ! dhcpd address 192.168.1.5-192.168.1.35 inside dhcpd enable inside ! dhcpd auto_config outside ! ! ! ! ! FireWall
17# 2017-5-1 23:27:01 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-1 23:28:16 | 显示全部楼层
FireWall#show run : Saved : ASA Version 8.4(2) ! hostname FireWall enable password 4IncP7vTjpaba2aF encrypted names ! interface Ethernet0/0 ! interface Ethernet0/1  switchport access vlan 2 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1  nameif inside  security-level 100  ip address 192.168.1.1 255.255.255.0 ! interface Vlan2  nameif outside  security-level 0  ip address 100.100.100.100 255.255.255.0 ! object network cisco  host 192.168.1.2 object network myNatPool  ! route inside 192.0.0.0 255.0.0.0 192.168.1.2 1 route outside 0.0.0.0 0.0.0.0 100.100.100.10 1 ! ! ipv6 access-list 10 permit udp any any ipv6 access-list 10 permit icmp any any ! access-group 10 in interface outside object network cisco  nat (inside,outside) static 192.168.1.2 ! ! ! ! ! policy-map cisco ! ! telnet timeout 5 ssh timeout 5 ! dhcpd address 192.168.1.5-192.168.1.35 inside dhcpd enable inside ! dhcpd auto_config outside ! ! ! ! ! FireWall# SHOW RUN : Saved : ASA Version 8.4(2) ! hostname FireWall enable password 4IncP7vTjpaba2aF encrypted names ! interface Ethernet0/0 ! interface Ethernet0/1  switchport access vlan 2 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1  nameif inside  security-level 100  ip address 192.168.1.1 255.255.255.0 ! interface Vlan2  nameif outside  security-level 0  ip address 100.100.100.100 255.255.255.0 ! object network cisco  host 192.168.1.2 object network myNatPool  ! route inside 192.0.0.0 255.0.0.0 192.168.1.2 1 route outside 0.0.0.0 0.0.0.0 100.100.100.10 1 ! ! ipv6 access-list 10 permit udp any any ipv6 access-list 10 permit icmp any any ! access-group 10 in interface outside object network cisco  nat (inside,outside) static 192.168.1.2 ! ! ! ! ! policy-map cisco ! ! telnet timeout 5 ssh timeout 5 ! dhcpd address 192.168.1.5-192.168.1.35 inside dhcpd enable inside ! dhcpd auto_config outside ! ! ! ! ! FireWall
18# 2017-5-1 23:28:16 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-1 23:31:40 | 显示全部楼层
FireWall#show run
: Saved
:
ASA Version 8.4(2)
!
hostname FireWall
enable password 4IncP7vTjpaba2aF encrypted
names
!
interface Ethernet0/0
!
interface Ethernet0/1
switchport access vlan 2
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 100.100.100.100 255.255.255.0
!
object network cisco
host 192.168.1.2
object network myNatPool

!
route inside 192.0.0.0 255.0.0.0 192.168.1.2 1
route outside 0.0.0.0 0.0.0.0 100.100.100.10 1
!
!
ipv6 access-list 10 permit udp any any
ipv6 access-list 10 permit icmp any any
!
access-group 10 in interface outside
object network cisco
nat (inside,outside) static 192.168.1.2
!
!
!
!
!
policy-map cisco
!
!
telnet timeout 5
ssh timeout 5
!
dhcpd address 192.168.1.5-192.168.1.35 inside
dhcpd enable inside
!
dhcpd auto_config outside
!
!
!
!
!
FireWall# SHOW RUN
: Saved
:
ASA Version 8.4(2)
!
hostname FireWall
enable password 4IncP7vTjpaba2aF encrypted
names
!
interface Ethernet0/0
!
interface Ethernet0/1
switchport access vlan 2
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 100.100.100.100 255.255.255.0
!
object network cisco
host 192.168.1.2
object network myNatPool

!
route inside 192.0.0.0 255.0.0.0 192.168.1.2 1
route outside 0.0.0.0 0.0.0.0 100.100.100.10 1
!
!
ipv6 access-list 10 permit udp any any
ipv6 access-list 10 permit icmp any any
!
access-group 10 in interface outside
object network cisco
nat (inside,outside) static 192.168.1.2
!
!
!
!
!
policy-map cisco
!
!
telnet timeout 5
ssh timeout 5
!
dhcpd address 192.168.1.5-192.168.1.35 inside
dhcpd enable inside
!
dhcpd auto_config outside
!
!
!
!
!
FireWall
ping不同,不知道问题出在哪里
19# 2017-5-1 23:31:40 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-2 09:32:37 | 显示全部楼层
好东西谢谢楼主分享
20# 2017-5-2 09:32:37 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2017-5-29 00:48:18 | 显示全部楼层
ASA Version 8.4(2)
!
hostname ciscoasa
names
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 10.0.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 10.0.1.1 255.255.255.0
!
object network fw1
host 10.0.0.254
!
route inside 192.168.13.0 255.255.255.0 10.0.0.254 1
route inside 192.168.23.0 255.255.255.0 10.0.0.254 1
route inside 192.168.33.0 255.255.255.0 10.0.0.254 1
!
!
ipv6 access-list 100 permit icmp any any
ipv6 access-list 100 permit tcp any any established
!
access-group 100 in interface inside
access-group 100 in interface outside
object network fw1
nat (inside,outside) dynamic interface
!
!
!
!
!
!
!
telnet timeout 5
ssh timeout 5
!
dhcpd enable inside
!
dhcpd auto_config outside
!
!
!
!
!
ciscoasa#

我现在在主机192.168.13.1上ping 10.0.0.1能通,但ping 10.0.1.1不通
21# 2017-5-29 00:48:18 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-26 12:30 , Processed in 0.122188 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表