IDC防火墙配置CISCO ASA5520

clear configure all
er erase
enable password WSBoxasa1@ encrypted
=================SSH================================
第一步,生成一个key
ciscoasa (config)# crypto key generate rsa
第二步,允许ssh从outside接口登录
ciscoasa (config)# ssh 0.0.0.0 0.0.0.0 outside
第三步,登录密码
默认情况下,用户名是pix,密码为passwd的密码,可通过ciscoasa (config)# passwd ***修改
第四步(附加),为ssh启用本地aaa
ciscoasa (config)# aaa authentication enable console LOCAL //注意:LOCAL要手动大写,不要先小写个 “l”然后按tab,那样就报错。
ciscoasa (config)# aaa authentication ssh enable console LOCAL
设置一个本地账号
ciscoasa (config)#username wswonder password wswonder

interface GigabitEthernet0/0
duplex full      
nameif outside
security-level 0
ip address 192.168.10.174 255.255.255.0
!
interface GigabitEthernet0/1
duplex full      
nameif inside
security-level 100
ip address 192.168.8.254 255.255.255.0
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!            
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address

//访问控制列表
addcess-list 1 extended permit ip 192.168.8.0 netmask 255.255.255.0 any
addcess-list 1 extended permit ip 10.100.10.0 netmask 255.255.255.0 any

access-list outside_permit extended permit ip 10.0.0.0 netmask 255.0.0.0 interface outside eq 22
access-list outside_permit extended permit ip 172.0.0.0 netmask 255.0.0.0 interface outside eq 22
access-list outside_permit extended permit ip 10.0.0.0 netmask 255.0.0.0  ip 192.168.10.237  eq 80
access-list outside_permit extended permit ip 172.0.0.0 netmask 255.0.0.0  ip 192.168.10.237  eq 80
access-list outside_permit extended permit tcp any interface outside eq 80
access-list outside_permit extended deny  any any
# access-list outside_permit extended permit tcp any interface outside range 30000 30010 //允许外部任何用户可以访问outside 接口的30000-30010的端口。
 

nat (inside) 1 access-list 1
global (outside) 1 192.168.10.237

static (inside,outside) tcp 192.168.10.237 www 192.168.8.11 www netmask 255.255.255.255
static (inside,outside) tcp 192.168.10.237 ssh 192.168.8.201 ssh netmask 255.255.255.255
access-group outside_permit in interface outside 
route outside 0.0.0.0 0.0.0.0 192.168.10.1 1

telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 5
ssh timeout 5

username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15


 

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值