溫馨提示×

溫馨提示×

您好,登錄后才能下訂單哦!

密碼登錄×
登錄注冊×
其他方式登錄
點擊 登錄注冊 即表示同意《億速云用戶服務條款》

ASA 8.4命令解析

發(fā)布時間:2020-05-26 20:32:08 來源:網絡 閱讀:4758 作者:versun_song 欄目:安全技術

前面發(fā)表了一篇文章是ASA 8.0版本的,后面用到8.4發(fā)現(xiàn)命令有很多不一樣,特發(fā)一篇8.4版本的命令可以和前面命令做對比和參考

 需要注意的是

1.這邊沒有nat 0,也就是說到DMZ區(qū)域不需旁路。

2.如果是ASA 5505的設備,則需定義vlan端口地址然后把防火墻相應端口加入對應vlan.

:

ASA Version 8.4(2)                                      //版本8.4

!

hostname fw                                             

enable password 8Ry2YjIyt7RRXU24 encrypted              

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface GigabitEthernet0

 nameif inside

 security-level 100

 ip address 192.168.1.254 255.255.255.0

!

interface GigabitEthernet1

 nameif dmz

 security-level 50

 ip address 172.16.1.254 255.255.255.0

!

interface GigabitEthernet2

 nameif outside

 security-level 0

 ip address 221.222.1.2 255.255.255.0

!

interface GigabitEthernet3

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet4

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet5

 shutdown

 no nameif

 no security-level

 no ip address

!

ftp mode passive

object network inside                     //定義nat內部網段

 subnet 0.0.0.0 0.0.0.0

object network outside                    //定義外網地址

 host 221.222.1.2

object network telnet                     //定義需發(fā)布端口的內部服務器地址

 host 172.16.1.2

object network www                        

 host 172.16.1.1

object network towww                       //定義NAT轉換的外部內址(此地址做靜態(tài)NAT)

 host 221.222.1.3

object network totelnet

 host 221.222.1.4

object network natoutside

 host 221.222.1.5

access-list outtodmz extended permit tcp any object www eq www       //定義需要放行的流量

access-list outtodmz extended permit tcp any object www eq telnet

access-list outtodmz extended permit tcp any object telnet eq telnet

access-list outtodmz extended permit tcp any object telnet eq www

pager lines 24

mtu dmz 1500

mtu outside 1500

mtu inside 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

!

object network inside                                         //定義動態(tài)多對一NAT

 nat (dmz,outside) dynamic interface

object network telnet                                         //定義端口轉換

 nat (dmz,outside) static interface service tcp telnet 2023

object network www                                            //定義靜態(tài)一對一NAT

 nat (dmz,outside) static towww

access-group outtodmz in interface outside                    //應用ACL到端口進行流量放行

route outside 0.0.0.0 0.0.0.0 221.222.1.1 1                   //默認路由

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h423 0:05:00 h325 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

user-identity default-domain LOCAL

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

telnet timeout 5

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

!

class-map inspection_default

 match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

 parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

 class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h423 h325

  inspect h423 ras

  inspect ip-options

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip

  inspect xdmcp

  inspect icmp                                       

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

call-home

 profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

crashinfo save disable

Cryptochecksum:ceec7cf7a060a0ab5127d816542bb2db

: end


ASA QOS限速實例


access-list qos extended permitip host 192.168.1.10 host 192.168.2.10

access-list qos extended permitip host 192.168.2.10 host 192.168.1.10

 

class-map qos

match access-list qos

 

 

policy-map qos

class qos

  police output 10000

  police input 10000

 

service-policy qos interfaceinside


注意:

如果流量是已經建立的會話,那么數(shù)據包不會去找新建立的策略

只有在新建立的策略以后新生成的會話,才會撞擊這個策略

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html


8.3以后若有NAT, ACL需匹配源實際IP地址。

向AI問一下細節(jié)
推薦閱讀:
  1. ASA
  2. ASA8.4端口映射篇

免責聲明:本站發(fā)布的內容(圖片、視頻和文字)以原創(chuàng)、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯(lián)系站長郵箱:is@yisu.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。

AI