0
点赞
收藏
分享

微信扫一扫

防火墙ASA配置NAT实验案例

实验拓扑

防火墙ASA配置NAT实验案例_ide

实验步骤

1.配置路由器和防火墙的IP地址

IOU1

IOU1(config)#interface ethernet 0/0
IOU1(config-if)#ip address 200.1.1.2 255.255.255.0
IOU1(config-if)#no shutdown
IOU1(config-if)#duplex full
IOU1(config-if)#ex

IOU1(config)#interface loopback 0
IOU1(config-if)#ip address 218.85.152.99 255.255.255.255
IOU1(config-if)#ex

IOU2

IOU2(config)#interface ethernet 0/0
IOU2(config-if)#ip address 192.168.0.11 255.255.255.0
IOU2(config-if)#no shutdown
IOU2(config-if)#duplex full
IOU2(config-if)#exit

IOU2(config)#interface loopback 0
IOU2(config-if)#ip address 192.168.1.11 255.255.255.255
IOU2(config-if)#ex

IOU3

IOU3(config)#interface ethernet 0/0
IOU3(config-if)#ip address 172.16.1.1 255.255.255.0
IOU3(config-if)#no shutdown
IOU3(config-if)#duplex full
IOU3(config-if)#ex

IOU3(config)#interface loopback 0
IOU3(config-if)#ip address 172.16.88.11 255.255.255.255
IOU3(config-if)#ex

ASA-1

ciscoasa(config)# interface gigabitEthernet 0
ciscoasa(config-if)# ip address 20.1.1.1 255.255.255.0
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# ex

ciscoasa(config)# interface gigabitEthernet 1
ciscoasa(config-if)# ip address 192.168.0.254 255.255.255.0
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# ex

ciscoasa(config)# interface gigabitEthernet 2
ciscoasa(config-if)# ip address 172.16.1.254 255.255.255.0
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# ex

使用show ip interface brief命令来查看接口信息确认接口是否配置正确

IOU1

防火墙ASA配置NAT实验案例_ide_02

IOU2

防火墙ASA配置NAT实验案例_ide_03

IOU3

防火墙ASA配置NAT实验案例_外网_04

然后使用show interface ip brief命令来查看防火墙的接口信息来查看是否配置正确

ASA-1

防火墙ASA配置NAT实验案例_外网_05

之后分配防火墙与路由器之间的接口任务

ASA-1

ciscoasa(config)# interface gigabitEthernet 0
ciscoasa(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.

ciscoasa(config)# interface gigabitEthernet 1
ciscoasa(config-if)# nameif dmz
INFO: Security level for "dmz" set to 0 by default.
ciscoasa(config-if)# security-level 50

ciscoasa(config)# interface gigabitEthernet 2
ciscoasa(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
ciscoasa(config-if)# exit

2.配置路由

IOU2

IOU2(config)#ip route 0.0.0.0 0.0.0.0 192.168.0.254

IOU3

IOU3(config)#ip route 0.0.0.0 0.0.0.0 172.16.1.254

ASA-1

ciscoasa(config)# route outside 0 0 200.1.1.2
ciscoasa(config)# route dmz 192.168.1.0 255.255.255.0 192.168.0.11
ciscoasa(config)# route inside 172.16.88.0 255.255.255.0 172.16.1.1

3.配置动态NAT

IOU1配置远程连接

IOU1(config)#username cisco privilege 15 password cisco
IOU1(config)#line vty 0 4
IOU1(config-line)#login local
IOU1(config-line)#transport input telnet
IOU1(config-line)#exit

动态NAT

ASA(config)# object network out-pool
ASA(config-network-object)# range 200.1.1.10 200.1.1.20
ASA(config-network-object)# exit
ASA(config)# object network in-ld
ASA(config-network-object)# subnet 172.16.88.0 255.255.255.0
ASA(config-network-object)# exit
ASA(config)# object network in-xd
ASA(config-network-object)# subnet 172.16.1.0 255.255.255.0
ASA(config-network-object)# exit
ASA(config)# object network dmz-1
ASA(config-network-object)# subnet 192.168.0.0 255.255.255.0
ASA(config-network-object)# exit
ASA(config)# object network dmz-2
ASA(config-network-object)# subnet 192.168.1.0 255.255.255.0
ASA(config-network-object)# exit
ASA(config)# object-group network in-lan
ASA(config-network-object-group)# network-object object in-ld
ASA(config-network-object-group)# network-object object in-xd
ASA(config-network-object-group)# exit
ASA(config)# object-group network dmz-lan
ASA(config-network-object-group)# network-object object dmz-1
ASA(config-network-object-group)# network-object object dmz-2
ASA(config-network-object-group)# exit
ASA(config)# nat (inside,outside) source dynamic in-lan out-pool
ASA(config)# nat (dmz,outside) source dynamic dmz-lan out-pool

PAT,多内网架构,多个网段,多个zone,直接使用外网接口
ASA(config)# nat (inside,outside) source dynamic in-lan interface
ASA(config)# nat (dmz,outside) source dynamic dmz-lan interface

PAT,多内网架构使用一个指定外网IP
ASA(config)# object network out-pat3
ASA(config-network-object)# host 200.1.1.3
ASA(config-network-object)# exit
ASA(config)# nat (inside,outside) source dynamic in-ld pat-pool out-pat3
ASA(config)# object network out-pool4
ASA(config-network-object)# host 200.1.1.4
ASA(config-network-object)# exit
ASA(config)# nat (inside,outside) source dynamic in-xd pat-pool out-pool4

先动态NAT。最后用指定IP做PAT
ASA(config)# object network out-pool
ASA(config-network-object)# range 200.1.1.10 200.1.1.20
ASA(config-network-object)# exit
ASA(config)# object network out-pat3
ASA(config-network-object)# host 200.1.1.3
ASA(config-network-object)# exit
ASA(config)# object-group network out-nat
ASA(config-network-object-group)# network-object object out-pat3
ASA(config-network-object-group)# network-object object out-pool
ASA(config-network-object-group)# exit
ASA(config)# nat (inside,outside) source dynamic in-lan out-nat

静态NAT(一对一)
ASA(config)# object network web
ASA(config-network-object)# host 200.1.1.21
ASA(config-network-object)# exit
ASA(config)# object network dmz-web
ASA(config-network-object)# host 192.168.1.11
ASA(config-network-object)# exit
ASA(config)# access-list web extended permit tcp any host 192.168.1.11
ASA(config)# access-group web in interface outside
ASA(config)# nat (dmz,outside) source static dmz-web web

端口一对一
ASA(config)# object network teldmz
ASA(config-network-object)# host 200.1.1.22
ASA(config-network-object)# exit
ASA(config)# object network dmz-web
ASA(config-network-object)# host 192.168.1.11
ASA(config-network-object)# exit
ASA(config)# object service telnet
ASA(config-service-object)# service tcp source eq telnet
ASA(config-service-object)# exit
ASA(config)# nat (dmz,outside) source static dmz-web teldmz service telnet telnet


举报

相关推荐

0 条评论