cisco-GNS3-pix防火牆基本配置實操(持續更新)


一、ASA和PIX基礎配置

1、ASA防火牆配置

1、GNS配置

因為使用的GNS3的版本可能不同,gns配置asa防火牆的步驟可能不同

在低版本的gns中直接在qemu選項里可以直接配置,參考:https://blog.51cto.com/dldxzjr/1905682

在高版本的gns中配置可以參考:https://wenku.baidu.com/view/8934accc48649b6648d7c1c708a1284ac850059c.html

2、簡單的防火牆設置命令

show version
show running-config
show activation-key			查看激活秘鑰
activation-key key-values		設置激活秘鑰
write mem					將配置保存到非易失flash,重啟或斷電都不會對配置產生影響
no shutdown					使借口處於啟用

show interface ip breif			提供接口的簡短概要
interface 接口
nameif inside/outside/dmz
ip address ip地址 掩碼
speed auto					#連接速度,有10/100/1000Mbps等
duplex auto					#雙工模式,有Half/Full為半雙工/全雙工模式
						   #一般網卡都為Auto/Auto適配出來的情況一般為100M全雙工模式

#防火牆上設置靜態路由,最多可以配置3個不同的默認路由
例:
指向外部接口上的網關192.168.1.1的路由	route outside 0.0.0.0 0.0.0.0 192.168.1.1 1
可通過內部接口上的網關192.168.254.2找到網絡172.21.0.0/16		route inside 172.21.0.0 255.255.0.0 192.168.254.2 1
刪除則直接加一個no
show route


#
show xlate
show conn

實例:

###配置ASA防火牆

ciscoasa# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
GigabitEthernet0           unassigned      YES unset  administratively down up
GigabitEthernet1           unassigned      YES unset  administratively down up
GigabitEthernet2           unassigned      YES unset  administratively down up
GigabitEthernet3           unassigned      YES unset  administratively down up
ciscoasa# conf t
ciscoasa(config)# int g0
ciscoasa(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
ciscoasa(config-if)# ip address 13.0.1.1 255.255.255.0
ciscoasa(config-if)# no sh
ciscoasa(config-if)# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
GigabitEthernet0           13.0.1.1        YES manual up                    up
GigabitEthernet1           unassigned      YES unset  administratively down up
GigabitEthernet2           unassigned      YES unset  administratively down up
GigabitEthernet3           unassigned      YES unset  administratively down up




###配置pc1的ip

PC1> show ip

NAME        : PC1[1]
IP/MASK     : 0.0.0.0/0
GATEWAY     : 0.0.0.0
DNS         :
MAC         : 00:50:79:66:68:00
LPORT       : 10012
RHOST:PORT  : 127.0.0.1:10011
MTU:        : 1500

PC1> ip 13.0.1.2 13.0.1.1 24
Checking for duplicate address...
PC1 : 13.0.1.2 255.255.255.0 gateway 13.0.1.1

PC1> show ip

NAME        : PC1[1]
IP/MASK     : 13.0.1.2/24
GATEWAY     : 13.0.1.1
DNS         :
MAC         : 00:50:79:66:68:00
LPORT       : 10012
RHOST:PORT  : 127.0.0.1:10011
MTU:        : 1500

PC1>

ping測試:

2、pix防火牆配置

安裝時有一步需要激活

activation-key key

關閉重啟pix防火牆:

還有一點需要注意,就是pix運行時有一個進程pemu會占用大量的cpu資源,導致很卡,可以使用BES對它進行限制:

實例

pix:

pixfirewall> en
Password:
pixfirewall# conf t
pixfirewall(config)# exit
pixfirewall# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  unassigned      YES unset  administratively down down
Ethernet1                  unassigned      YES unset  administratively down down
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down
pixfirewall# conf t
pixfirewall(config)# int e0
pixfirewall(config-if)# ip address 13.0.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  unassigned      YES manual up                    up
Ethernet1                  unassigned      YES unset  administratively down down
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down
pixfirewall(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
pixfirewall(config-if)# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  13.0.1.1        YES manual up                    up
Ethernet1                  unassigned      YES unset  administratively down down
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down

pc1

VPCS[1]> ip 13.0.1.2 13.0.1.1 24
Checking for duplicate address...
PC1 : 13.0.1.2 255.255.255.0 gateway 13.0.1.1

VPCS[1]> show ip

NAME        : VPCS[1]
IP/MASK     : 13.0.1.2/24
GATEWAY     : 13.0.1.1
DNS         :
MAC         : 00:50:79:66:68:00
LPORT       : 20000
RHOST:PORT  : 127.0.0.1:30000
MTU:        : 1500

VPCS[1]>

ping

二、PIX-NAT

1、pix配置動態NAT

基礎命令舉例:

show int ip b
hostname
ip address
nameif
security number

show conn					顯示所有的活動連接
show conn detail
show local-host
show xlate					顯示翻譯(xlate)槽位的內容
show xlate detail

#添加acl,訪問規則
1)創建標准訪問列表
access-list [list-number] [permit|deny] [source-address] [wildcard mask] [log]
access-group list-number in int 接口名



#靜態NAT
static [(internal_if_name, external_if_name)] global_ip local_ip[netmask network_mask][max_conns
[em_limit]] [norandomseq]
例:static (inside,outside) 13.0.1.3 192.168.1.2 				將本地地址192.168.1.2轉換為全局地址13.0.1.3

#static PAT
static [(real_interface, mapped_interface)] {tcp | udp} {mapped_ip | interface}
mapped_port {real_ip real_port [netmask mask]

例:dmz:172.16.1.9  outside:192.168.0.9
static (dmz,outside) tcp 192.168.0.9 ftp 172.16.1.9 ftp netmask 255.255.255.255

#動態NAT
nat (inside) 1 192.168.1.0 255.255.255.0
global (outside) 1 12.0.1.0-12.0.1.9 netmask 255.255.255.0

#PAT
nat (inside) 1 192.168.1.0 255.255.255.0
global (outside) 1 12.0.1.9 netmask 255.255.255.0

#nat 0
nat (dmz) 0 192.168.0.9 255.255.255.255
#
no global (outside) 1 12.0.1.0-12.0.1.9 netmask 255.255.255.0


route if_name ip_address netmask gateway_ip [metric]			為接口口if_name定義一條靜態或缺省路由

#
debug icmp trace
no debug icmp trace

#
logging on
show logging
no logging on
show capture inside

#
show users
show run nat-control
show conn detail
show xlate

pix配置

pixfirewall> en
Password:
pixfirewall# conf t
pixfirewall(config)# int e0
pixfirewall(config-if)# ip address 192.168.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# int e1
pixfirewall(config-if)# ip address 13.0.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# exit
pixfirewall(config)# exit
pixfirewall# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  unassigned      YES manual up                    up
Ethernet1                  unassigned      YES manual up                    up
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down
pixfirewall# conf t
pixfirewall(config)# int e0
pixfirewall(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
pixfirewall(config-if)# int e1
pixfirewall(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
pixfirewall(config-if)# exit
pixfirewall(config)# exit
pixfirewall# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  192.168.1.1     YES manual up                    up
Ethernet1                  13.0.1.1        YES manual up                    up
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down
pixfirewall# conf t
pixfirewall(config)# access-list test1 permit icmp any any
pixfirewall(config)# access-group test1 in int outside
pixfirewall(config)# nat (inside) 1 192.168.1.0 255.255.255.0
pixfirewall(config)# global (outside) 1 13.0.1.4-13.0.1.6 netmask 255.255.255.0

R1

R1#ip route 0.0.0.0 0.0.0.0 192.168.1.1
!因為我們是用路由器R1模擬的主機,所以要么關閉路由功能,配置網關;要么添加一條路由讓路由器發出的消息從192.168.1.1出去

2、static NAT

pix配置

pixfirewall> en
Password:
pixfirewall# conf t
pixfirewall(config)# int e0
pixfirewall(config-if)# ip address 192.168.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# int e1
pixfirewall(config-if)# ip address 13.0.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# int e0
pixfirewall(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
pixfirewall(config-if)# int e1
pixfirewall(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
pixfirewall(config-if)# exit

pixfirewall(config)# show running-config static
pixfirewall(config)# static (inside,outside) 13.0.1.3 192.168.1.2
pixfirewall(config)# static (inside,outside) 13.0.1.4 192.168.1.3
pixfirewall(config)# route outside 0 0 13.0.1.2
pixfirewall(config)# exit
pixfirewall# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  192.168.1.1     YES manual up                    up
Ethernet1                  13.0.1.1        YES manual up                    up
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down

pixfirewall(config)# access-l
pixfirewall(config)# access-list acl-outside permit icmp any any
pixfirewall(config)# access-g
pixfirewall(config)# access-group acl-outside in int outside
pixfirewall(config)# exit
pixfirewall# show int ip b
Interface                  IP-Address      OK? Method Status                Protocol
Ethernet0                  192.168.1.1     YES manual up                    up
Ethernet1                  13.0.1.1        YES manual up                    up
Ethernet2                  unassigned      YES unset  administratively down down
Ethernet3                  unassigned      YES unset  administratively down down
Ethernet4                  unassigned      YES unset  administratively down down



測試:
pixfirewall# ping 13.0.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 13.0.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 10/14/20 ms
pixfirewall# ping 192.168.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 10/10/10 ms
pixfirewall# show running-config
: Saved
:
PIX Version 7.2(2)
!
hostname pixfirewall
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface Ethernet0
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
interface Ethernet1
 nameif outside
 security-level 0
 ip address 13.0.1.1 255.255.255.0
!
interface Ethernet2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet4
 shutdown
 no nameif
 ...
pixfirewall#



R1配置

R1#en
R1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#int f0/0
R1(config-if)#ip address 13.0.1.2 255.255.255.0
R1(config-if)#no sh
R1(config-if)#
*Mar  1 00:19:52.959: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
*Mar  1 00:19:53.959: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1(config-if)#int f1/0
R1(config-if)#ip address 14.0.1.1 255.255.255.0
R1(config-if)#no sh
R1(config-if)#
*Mar  1 00:25:10.991: %LINK-3-UPDOWN: Interface FastEthernet1/0, changed state to up
*Mar  1 00:25:11.991: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/0, changed state to up
R1(config-if)#

pc1\pc2\pc3配置

ping測試

192.168.1.2 ping 13.0.1.2

192.168.1.3 ping 14.0.1.2

14.0.1.2 ping 192.168.1.2

3、PAT

類似於動態NAT,只不過外部地址池里只有一個公網ip,主要是通過網絡套接字(ip+端口的方式)實現地址轉換

4、pix防火牆----二接口測試(inside,outside)

。。好幾天沒有打開GNS3,發現前面的ios配置全沒了。老老實實又重新配置了一遍

R1配置

R1#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#int f1/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no sh
R1(config-if)#
*Mar  1 00:01:04.391: %LINK-3-UPDOWN: Interface FastEthernet1/0, changed state to up
*Mar  1 00:01:05.391: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/0, changed state to up
R1(config-if)#int f0/0
R1(config-if)#ip address 13.0.1.2 255.255.255.0
R1(config-if)#no sh
R1(config-if)#
*Mar  1 00:01:42.527: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
*Mar  1 00:01:43.527: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1(config-if)#exit
R1(config)#ip route 14.0.1.0 255.255.255.0 13.0.1.1
R1(config)#ip route 15.0.1.0 255.255.255.0 13.0.1.1

PC1、PC2、PC3、PC4配置

VPCS[1]> ip 192.168.1.2 192.168.1.1 24
Checking for duplicate address...
PC1 : 192.168.1.2 255.255.255.0 gateway 192.168.1.1

VPCS[1]> 2
VPCS[2]> ip 192.168.1.3 192.168.1.1 24
Checking for duplicate address...
PC2 : 192.168.1.3 255.255.255.0 gateway 192.168.1.1

VPCS[2]> 3
VPCS[3]> ip 15.0.1.2 15.0.1.1 24
Checking for duplicate address...
PC3 : 15.0.1.2 255.255.255.0 gateway 15.0.1.1

VPCS[3]> 4
VPCS[4]> ip 15.0.1.3 15.0.1.1 24
Checking for duplicate address...
PC4 : 15.0.1.3 255.255.255.0 gateway 15.0.1.1

VPCS[4]>

R2配置

R2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
R2(config)#int f0/0
R2(config-if)#ip address 14.0.1.2 255.255.255.0
R2(config-if)#no sh
R2(config-if)#
*Mar  1 00:00:51.907: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
*Mar  1 00:00:52.907: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R2(config-if)#int f1/0
R2(config-if)#ip address 15.0.1.1 255.255.255.0
R2(config-if)#no sh
R2(config-if)#exit

R2(config)#ip route 13.0.1.0 255.255.255.0 14.0.1.1
R2(config)#ip route 192.168.1.0 255.255.255.0 14.0.1.1


#可以給路由器配置遠程終端,用telnet來豐富一下測試
R2#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
R2(config)#line vty 0 4
R2(config-line)#password zwish
R2(config-line)#end
R2#
*Mar  1 01:35:20.871: %SYS-5-CONFIG_I: Configured from console by console
R2#

PIX配置

pixfirewall# conf t
pixfirewall(config)# int e0
pixfirewall(config-if)# ip address 13.0.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
pixfirewall(config-if)# int e1
pixfirewall(config-if)# ip address 14.0.1.1 255.255.255.0
pixfirewall(config-if)# no sh
pixfirewall(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.

pc1、R1先ping一下pix的e0,看一下能不能通,可以再繼續

pixfirewall(config-if)# access
pixfirewall(config-if)# access-
pixfirewall(config-if)# access-l
pixfirewall(config-if)# access-list acl-1 permit icmp any any
pixfirewall(config)# access-g
pixfirewall(config)# access-group acl-1 in int
pixfirewall(config)# access-group acl-1 in interface outside
pixfirewall(config)# nat (inside) 1 0 0
pixfirewall(config)# global (outside) 1 14.0.1.3-14.0.1.6 netmask 255.255.255.0
#下面是配置回程路由
pixfirewall(config)# route inside 192.168.1.0 255.255.255.0 13.0.1.2
pixfirewall(config)# route outside 15.0.1.0 255.255.255.0 14.0.1.2		
pixfirewall(config)#

測試

pc1 ping R2

pc1 ping pc3

pc3 ping pc1

R1 telnet 登錄R2 (因為我沒有用路由器模擬主機,所以用的R1,如果是路由器模擬的主機,則直接用PC1進行telnet登錄)


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM