文章导航绿软下载站软件下载安卓资源苹果资源专题

您当前所在位置:首页网络安全防火墙技术 → cisco PIX防火墙的配置及注解完全手册

cisco PIX防火墙的配置及注解完全手册

时间:2015/6/28来源:IT猫扑网作者:网管联盟我要评论(0)

PIX Version 6.3(1)
  interface ethernet0 auto 设定端口0 速率为自动
  interface ethernet1 100full 设定端口1 速率为100兆全双工
  interface ethernet2 auto 设定端口2 速率为自动
  nameif ethernet0 outside security0 设
 

定端口0 名称为 outside 安全级别为0
  nameif ethernet1 inside security100 设定端口1 名称为 inside 安全级别为100
  nameif ethernet2 dmz security50 设定端口2 名称为 dmz 安全级别为50
  enable password Dv0yXUGPM3Xt7xVs encrypted 特权密码
  passwd 2KFQnbNIdI.2KYOU encrypted 登陆密码
  hostname hhyy 设定防火墙名称
  fixup protocol ftp 21
  fixup protocol h323 h225 1720
  fixup protocol h323 ras 1718-1719
  fixup protocol http 80
  fixup protocol ils 389
  fixup protocol rsh 514
  fixup protocol rtsp 554
  fixup protocol sip 5060
  fixup protocol sip udp 5060
  no fixup protocol skinny 2000
  fixup protocol smtp 25
  fixup protocol sqlnet 1521

  允许用户查看、改变、启用或禁止一个服务或协议通过PIX防火墙,防火墙默认启用了一些常见的端口,但对于ORACLE等专有端口,需要专门启用。

  names
  access-list 101 permit ip 192.168.99.0 255.255.255.0 192.168.170.0 255.255.255.0
  access-list 101 permit ip 192.168.12.0 255.255.255.0 192.168.180.0 255.255.255.0
  access-list 101 permit ip 192.168.23.0 255.255.255.0 192.168.180.0 255.255.255.0
  access-list 101 permit ip 192.168.99.0 255.255.255.0 192.168.101.0 255.255.255.0

  建立访问列表,允许特定网段的地址访问某些网段

  access-list 120 deny icmp 192.168.2.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.3.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.4.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.5.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.6.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.7.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.8.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.9.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.10.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.11.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.12.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.13.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.14.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.15.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.16.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.17.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.18.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.19.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.20.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.21.0 255.255.255.0 any
  access-list 120 deny icmp 192.168.22.0 255.255.255.0 any
  access-list 120 deny udp any any eq netbios-ns
  access-list 120 deny udp any any eq netbios-dgm
  access-list 120 deny udp any any eq 4444
  access-list 120 deny udp any any eq 1205
  access-list 120 deny udp any any eq 1209
  access-list 120 deny tcp any any eq 445
  access-list 120 deny tcp any any range 135 netbios-ssn
  access-list 120 permit ip any any

  建立访问列表120防止各个不同网段之间的ICMP发包及拒绝135、137等端口之间的通信(主要防止冲击波病毒)

  access-list 110 permit ip 192.168.99.0 255.255.255.0 192.168.101.0 255.255.255.0

  pager lines 24
  logging on
  logging monitor debugging
  logging buffered debugging
  logging trap notifications
  mtu outside 1500
  mtu inside 1500
  mtu dmz 1500
  ip address outside 10.1.1.4 255.255.255.224 设定外端口地址
  ip address inside 192.168.1.254 255.255.255.0 设定内端口地址
  ip address dmz 192.168.19.1 255.255.255.0 设定DMZ端口地址
  ip audit info action alarm
  ip audit attack action alarm
  ip local pool hhyy 192.168.170.1-192.168.170.254

  建立名称为hhyy的地址池,起始地址段为:192.168.170.1-192.168.170.254

  ip local pool yy 192.168.180.1-192.168.180.254

  建立名称为yy 的地址池,起始地址段为:192.168.180.1-192.168.180.254

  no failover
  failover timeout 0:00:00
  failover poll 15
  no failover ip address outside
  no failover ip address inside
  no failover ip address dmz
  no pdm history enable
  arp timeout 14400


不支持故障切换

  global (outside) 1 10.1.1.13-10.1.1.28
  global (outside) 1 10.1.1.7-10.1.1.9
  global (outside) 1 10.1.1.10

  定义内部网络地址将要翻译成的全局地址或地址范围

  nat (inside) 0 access-list 101

  使得符合访问列表为101地址不通过翻译,对外部网络是可见的

  nat (inside) 1 192.168.0.0 255.255.0.0 0 0

  内部网络地址翻译成外部地址

  nat (dmz) 1 192.168.0.0 255.255.0.0 0 0

  DMZ区网络地址翻译成外部地址

  static (inside,outside) 10.1.1.5 192.168.12.100 netmask 255.255.255.255 0 0
  static (inside,outside) 10.1.1.12 192.168.12.158 netmask 255.255.255.255 0 0
  static (inside,outside) 10.1.1.3 192.168.2.4 netmask 255.255.255.255 0 0

  设定固定主机与外网固定IP之间的一对一静态转换

  static (dmz,outside) 10.1.1.2 192.168.19.2 netmask 255.255.255.255 0 0

  设定DMZ区固定主机与外网固定IP之间的一对一静态转换

  static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.0.0 0 0

  设定内网固定主机与DMZ IP之间的一对一静态转换

  static (dmz,outside) 10.1.1.29 192.168.19.3 netmask 255.255.255.255 0 0

  设定DMZ区固定主机与外网固定IP之间的一对一静态转换

  access-group 120 in interface outside
  access-group 120 in interface inside
  access-group 120 in interface dmz

  将访问列表应用于端口

  conduit permit tcp host 10.1.1.2 any
  conduit permit tcp host 10.1.1.3 any
  conduit permit tcp host 10.1.1.12 any
  conduit permit tcp host 10.1.1.29 any

  设置管道:允许任何地址对全局地址进行TCP协议的访问

  conduit permit icmp 192.168.99.0 255.255.255.0 any

  设置管道:允许任何地址对192.168.99.0 255.255.255.0地址进行PING测试

  rip outside passive version 2
  rip inside passive version 2
  route outside 0.0.0.0 0.0.0.0 10.1.1.1

  设定默认路由到电信端

  route inside 192.168.2.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.3.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.4.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.5.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.6.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.7.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.8.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.9.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.10.0 255.255.255.0 192.168.1.1 1
  route inside 192.168.11.0 255.255.255.0 192.168.1.1 1

  设定路由回指到内部的子网

  timeout xlate 3:00:00
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225
  1:00:00
  timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
  timeout uauth 0:05:00 absolute
  aaa-server TACACS+ protocol tacacs+
  aaa-server RADIUS protocol radius
  aaa-server LOCAL protocol local
  no snmp-server location
  no snmp-server contact
  snmp-server community public
  no snmp-server enable traps
  floodguard enable
  sysopt connection permit-ipsec 关键词标签:完全,手册,配置,防火墙

相关阅读 没有数据

文章评论
发表评论

热门文章 十面埋伏让 isa 防火墙封锁qq十面埋伏让 isa 防火墙封锁qq掌握 Linux防火墙经典应用掌握 Linux防火墙经典应用Cisco ACE Web应用防火墙Cisco ACE Web应用防火墙硬件防火墙选购经验谈硬件防火墙选购经验谈

相关软件

人气排行 Juniper防火墙之图解L2TP over IPSECjuniper防火墙之恢复出厂默认设置CISCO ASA防火墙ASDM配置redhat 5)防火墙添加端口与强制关闭端口Cisco ASA 防火墙巨有效的排错命令如何开启关闭linux防火墙在ISA中利用Radius服务器搭建VPN服务器十面埋伏让 isa 防火墙封锁qq