Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Cisco asa 5510 transparent mode full configuration and ssh configuration

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Use HyperTerminal to connect to the console port of asa5510, enter a name randomly, and select the corresponding com port. The default is com1.

Click to restore the default settings to make sure you hit enter several times in a row, and the following appears

Ciscoasa >

Ciscoasa >-Note all ports are layer 3 routing ports

Ciscoasa >

Here is the basic configuration information

Ciscoasa > en

The Password:- password is empty by default. Enter directly.

Ciscoasa# conf t-enter privileged mode

Ciscoasa (config) # hostname ciscoasa---- rename the firewall

Ciscoasa (config) #

# # #

Ciscoasa# conf t

Ciscoasa (config) # enable password *-sets the privileged mode password

Ciscoasa (config) # username * password *-add the username and password of the ASDM graphics management console

# # #

Ciscoasa# conf t

Ciscoasa (config) # interface e0ram 0Murray-enter port configuration mode

Ciscoasa (config-if) # nameif outside---- add port name, defined as WLAN port

INFO: Security level for "outside" set to 0 by default. Note: the default port security level is minimum 0, and high-level ports cannot be accessed.

Ciscoasa (config-if) # no shutdown- Activation Port

Ciscoasa (config) # int e0bin1

Ciscoasa (config-if) # nameif inside-add the port name, defined as LAN port INFO: Security level for "inside" set to 100 by default.

Ciscoasa (config-if) # security-level 100murmuri-set the security level of the private network interface to 100and can access the low-level external network port

Ciscoasa (config-if) # no shutdown

# # #

Ciscoasa# conf t

Ciscoasa (config) # ip address * *-transparent mode must be configured with management ip

# # #

Ciscoasa# conf t

Ciscoasa (config) # route outside *-add default route (gateway of public network address)

# # #

Ciscoasa# conf t

:: ciscoasa (config) # access-list acc-nei permit ip any any---- add ACL acc-nei to allow ip protocol ownership to all

Ciscoasa (config) # access-list acc-nei permit icmp any any--- appends ACL acc-nei, allowing icmp (ping) to all

Ciscoasa (config) # access-group acc-nei in interface outside--- applies ACL acc-nei, and Internet information is returned to the WLAN port to the in direction

Ciscoasa (config) #-Note: every time you modify ACL, you must apply ACL to the port by access-group, otherwise it will not take effect.

# # #

Ciscoasa# conf t

Ciscoasa (config) # object-group network remote-create an external remote access group

Ciscoasa (config-network) # network-object host *

Ciscoasa (config-network) # network-object host *

Ciscoasa (config-network) # exit

Ciscoasa# conf t

Ciscoasa (config) # object-group service RMMSoft-create external access wind soft port access group

Ciscoasa (config-service) # service-object tcp *

Ciscoasa (config-service) # service-object tcp *

Ciscoasa (config-service) # service-object tcp *

Ciscoasa (config-service) # exit

# # #

# # #

Ciscoasa# conf t-add to allow everyone access to rmmsoft port and designated person access to port 41726

Ciscoasa (config) # access-list acc-nei permit object-group RMMSoft any *

Ciscoasa (config) # access-list acc-nei permit tcp object-group remote host * eq 3389

Ciscoasa (config) # access-list acc-nei permit tcp object-group remote host * eq 21120

Ciscoasa (config) # access-group acc-nei in int outside

# # #

Ciscoasa# conf t-allow telnet access

Ciscoasa (config) # telnet 0.0.0.0 0.0.0.0 inside

Ciscoasa (config) # passwd *

Ciscoasa (config) # http server enable

Ciscoasa (config) # http * * outside

Ciscoasa (config) # http * * outside

# # #

Ciscoasa# conf t-the default public network port can be ping, and only these two addresses ping are allowed.

Ciscoasa (config) # icmp permit host * outside

# # #

Ciscoasa (config) # crypto key generate rsa 1024-configure ssh below to generate the secret key

Ciscoasa (config) # aaa authentication enable console LOCAL- enables local authentication

Ciscoasa (config) # aaa authentication ssh console LOCAL- enable local authentication note LOCAL uppercase here

Ciscoasa (config) # username duchengadmin password ducheng,@123GHJ encrypted privilege 15

Ciscoasa (config) # ssh 0.0.0.0 0.0.0.0 outside

Ciscoasa (config) # ssh 0.0.0.0 0.0.0.0 inside

End, QQ exchange group 221046788

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report