ASA8.4命令解析-创新互联

前面发表了一篇文章是ASA 8.0版本的,后面用到8.4发现命令有很多不一样,特发一篇8.4版本的命令可以和前面命令做对比和参考

10年积累的成都做网站、成都网站建设经验,可以快速应对客户对网站的新想法和需求。提供各种问题对应的解决方案。让选择我们的客户得到更好、更有力的网络服务。我虽然不认识你,你也不认识我。但先网站制作后付款的网站建设流程,更有南雄免费网站建设让你可以放心的选择与我们合作。

 需要注意的是

1.这边没有nat 0,也就是说到DMZ区域不需旁路。

2.如果是ASA 5505的设备,则需定义vlan端口地址然后把防火墙相应端口加入对应vlan.

:

ASA Version 8.4(2)                    //版本8.4

!

hostname fw

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface GigabitEthernet0

 nameif inside

 security-level 100

 ip address 192.168.1.254 255.255.255.0

!

interface GigabitEthernet1

 nameif dmz

 security-level 50

 ip address 172.16.1.254 255.255.255.0

!

interface GigabitEthernet2

 nameif outside

 security-level 0

 ip address 221.222.1.2 255.255.255.0

!

interface GigabitEthernet3

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet4

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet5

 shutdown

 no nameif

 no security-level

 no ip address

!

ftp mode passive

object network inside           //定义nat内部网段

 subnet 0.0.0.0 0.0.0.0

object network outside           //定义外网地址

 host 221.222.1.2

object network telnet           //定义需发布端口的内部服务器地址

 host 172.16.1.2

object network www

 host 172.16.1.1

object network towww            //定义NAT转换的外部内址(此地址做静态NAT)

 host 221.222.1.3

object network totelnet

 host 221.222.1.4

object network natoutside

 host 221.222.1.5

access-list outtodmz extended permit tcp any object www eq www    //定义需要放行的流量

access-list outtodmz extended permit tcp any object www eq telnet

access-list outtodmz extended permit tcp any object telnet eq telnet

access-list outtodmz extended permit tcp any object telnet eq www

pager lines 24

mtu dmz 1500

mtu outside 1500

mtu inside 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

!

object network inside                     //定义动态多对一NAT

 nat (dmz,outside) dynamic interface

object network telnet                     //定义端口转换

 nat (dmz,outside) static interface service tcp telnet 2023

object network www                       //定义静态一对一NAT

 nat (dmz,outside) static towww

access-group outtodmz in interface outside           //应用ACL到端口进行流量放行

route outside 0.0.0.0 0.0.0.0 221.222.1.1 1          //默认路由

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h423 0:05:00 h325 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

user-identity default-domain LOCAL

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

telnet timeout 5

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

!

class-map inspection_default

 match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

 parameters

 message-length maximum client auto

 message-length maximum 512

policy-map global_policy

 class inspection_default

 inspect dns preset_dns_map

 inspect ftp

 inspect h423 h325

 inspect h423 ras

 inspect ip-options

 inspect netbios

 inspect rsh

 inspect rtsp

 inspect skinny

 inspect esmtp

 inspect sqlnet

 inspect sunrpc

 inspect tftp

 inspect sip

 inspect xdmcp

 inspect icmp

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

call-home

 profile CiscoTAC-1

 no active

 destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

 destination address email callhome@cisco.com

 destination transport-method http

 subscribe-to-alert-group diagnostic

 subscribe-to-alert-group environment

 subscribe-to-alert-group inventory periodic monthly

 subscribe-to-alert-group configuration periodic monthly

 subscribe-to-alert-group telemetry periodic daily

crashinfo save disable

Cryptochecksum:ceec7cf7a060a0ab5127d816542bb2db

: end

ASA QOS限速实例

access-list qos extended permitip host 192.168.1.10 host 192.168.2.10

access-list qos extended permitip host 192.168.2.10 host 192.168.1.10

class-map qos

match access-list qos

policy-map qos

class qos

 police output 10000

 police input 10000

service-policy qos interfaceinside

注意:

如果流量是已经建立的会话,那么数据包不会去找新建立的策略

只有在新建立的策略以后新生成的会话,才会撞击这个策略

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html

8.3以后若有NAT, ACL需匹配源实际IP地址。

另外有需要云服务器可以了解下创新互联scvps.cn,海内外云服务器15元起步,三天无理由+7*72小时售后在线,公司持有idc许可证,提供“云服务器、裸金属服务器、高防服务器、香港服务器、美国服务器、虚拟主机、免备案服务器”等云主机租用服务以及企业上云的综合解决方案,具有“安全稳定、简单易用、服务可用性高、性价比高”等特点与优势,专为企业上云打造定制,能够满足用户丰富、多元化的应用场景需求。


本文标题:ASA8.4命令解析-创新互联
当前链接:http://scjbc.cn/article/edgsh.html

其他资讯