Cisco PIX 525 Spezifikationen Seite 539

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 538
B-11
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Appendix B Sample Configurations
Example 4: Multiple Mode, Transparent Firewall with Outside Access
access-list MAIL extended permit tcp host 10.1.1.35 eq smtp host 10.1.1.7 eq smtp
access-list MAIL extended permit tcp host 10.1.1.36 eq smtp host 10.1.1.7 eq smtp
access-list MAIL extended permit tcp host 10.1.1.37 eq smtp host 10.1.1.7 eq smtp
access-group MAIL out interface shared
aaa-server AAA-SERVER protocol tacacs+
aaa-server AAA-SERVER (shared) host 10.1.1.6
key TheUauthKey
!
All traffic matching the WEBSERVER access list must authenticate with the AAA server
aaa authentication match WEBSERVER outside AAA-SERVER
logging trap 4
!
System messages are sent to the syslog server on the Shared network
logging host shared 10.1.1.8
logging on
Example 3: Department 2 Context Configuration
interface gigabitethernet 0.200
nameif outside
security-level 0
ip address 209.165.201.5 255.255.255.224
no shutdown
interface gigabitethernet 0.203
nameif inside
security-level 100
ip address 10.1.3.1 255.255.255.0
no shutdown
interface gigabitethernet 0.300
nameif shared
security-level 50
ip address 10.1.1.3 255.255.255.0
no shutdown
passwd maz1r1an
enable password ly0ne$$e
route outside 0 0 209.165.201.2 1
nat (inside) 1 10.1.3.0 255.255.255.0
!
The inside network uses PAT when accessing the outside
global (outside) 1 209.165.201.10 netmask 255.255.255.255
!
The inside network uses PAT when accessing the shared network
global (shared) 1 10.1.1.38
access-list MAIL remark -Allows only mail traffic from inside to exit out the shared int
access-list MAIL extended permit tcp host 10.1.1.38 host 10.1.1.7 eq smtp
!
Note that the translated PAT address is used.
access-group MAIL out interface shared
logging trap 3
!
System messages are sent to the syslog server on the Shared network
logging host shared 10.1.1.8
logging on
Example 4: Multiple Mode, Transparent Firewall with Outside
Access
This configuration creates three security contexts plus the admin context. Each context allows OSPF
traffic to pass between the inside and outside routers (see Figure B-4).
Inside hosts can access the Internet through the outside, but no outside hosts can access the inside.
The admin context allows SSH sessions to the security appliance from one host.
Seitenansicht 538
1 2 ... 534 535 536 537 538 539 540 541 542 543 544 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare