Cisco PIX 525 Especificaciones Pagina 91

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 90
2-31
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
The following procedure shows the way the configuration for this example differs from the example
shown in “
Two Interfaces Without NAT or PAT.”
Step 1 Identify the security level and names of each interface by entering the following commands:
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
An additional nameif command is required for the third interface in this example.
Step 2 Identify the line speed of each interface by entering the following commands:
interface ethernet0 100basetx
interface ethernet1 100basetx
interface ethernet2 100basetx
An additional interface command is required for the third interface in this example.
Step 3 Identify the IP addresses for each interface:
ip address outside 209.165.201.2 255.255.255.248
ip address inside 209.165.201.9 255.255.255.248
ip address dmz 209.165.201.17 255.255.255.248
An additional IP address is required for the third interface in this example.
Step 4 Map access to the 209.165.201.19 host on the dmz interface:
static (dmz,outside) 209.165.201.2 209.165.201.19 netmask 255.255.255.248
Step 5 Use the access-list command to let any outside user access the DMZ host on any port:
access-list acl_out permit tcp any host 209.165.201.19
access-group acl_out in interface outside
The access-list command lets any outside user access the host on any port.
Example 2-4 shows the complete configuration for three interfaces without NAT.
Example 2-4 Three Interfaces Without NAT or PAT
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
hostname pixfirewall
names
access-list acl_out permit tcp any host 209.165.201.19
access-list acl_out permit icmp any any
access-list ping_acl permit icmp any any
pager lines 24
logging buffered debugging
interface ethernet0 100basetx
interface ethernet1 100basetx
interface ethernet2 100basetx
mtu outside 1500
mtu inside 1500
ip address outside 209.165.201.2 255.255.255.248
ip address inside 209.165.201.9 255.255.255.248
ip address dmz 209.165.201.17 255.255.255.248
Vista de pagina 90
1 2 ... 86 87 88 89 90 91 92 93 94 95 96 ... 465 466

Comentarios a estos manuales

Sin comentarios