Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Configure nat or pat on the firewall

2025-02-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

Lab 1: configuring dynamic PAT (port address translation Network address Translation)

Thinking and configuration

1. Configure R1

two。 Configure Cloud

Interface GigabitEthernet0

Nameif inside

Security-level 100

Ip address 192.168.1.254 255.255.255.0

Interface GigabitEthernet1

Nameif outside

Security-level 0

Ip address 200.8.8.6 255.255.255.248

Interface GigabitEthernet2

Nameif DMZ

Security-level 50

Ip address 192.168.3.254 255.255.255.0

Route inside 10.1.1.0 255.255.255.0 192.168.1.1

Route inside 10.2.2.0 255.255.255.0 192.168.1.1

3. Configure client:

Object network ob-in

Subnet 10.2.2.0 255.255.255.0

Nat (inside,outside) dynamic 200.8.8.4 (200.8.8.4 means the network segment does not use ip)

4. Access server2 with client1

Grab the bag and check.

At this time, the private network address of client1 has been translated

-configure static PAT

1. The following configurations are made on the basis of experiment 1:

Static PAT:

Object network ob-out

Host 200.8.8.4

Object network dmz01

Host 192.168.3.100

Nat (dmz,outside) static ob-out service tcp 80 80

Object network dmz02

Host 192.168.3.101

Nat (dmz,outside) static ob-out service tcp 21 21

Configure ACL

Accecc-list out-to-dmz permit tcp any object dmz01 eq http

Access-list out-to-dmz permit tcp any object dmz02 eq ftp

Access-group out-to-dmz in interface outside

3. Verify:

Verify http on client2

Verify ftp on client2

Lab 3:

Remote ssh

Configure Cloud

Hostname asa842

Domain-name asadomain.com

Crypto key generate rsa modulus 1024

Ssh 0 0 outside

Username ssh password cisco

Aaa authentication ssh console LOCAL

Configure vmnet8 ip:200.8.8.5 255.255.255.248 200.8.8.6

Connect 200.8.8.6 in crt

Enter username: ssh after entering

Password:cisco

Configure the following:

Http server enable

Http 0 0 outside

Asdm image disk0:/asdm-64.9 bin

Username cisco password cisco privilege15

Run JAVA first

Type: http//:200.8.8.6 in Google browser

Click Install ASDM Launcher to enter

Enter user name: ssh

Password: cisco

After landing

Choose to keep after download is complete

After running, the lower left corner of the stand-alone machine

Just follow the prompts to install.

The following interface pops up

Enter name:200.8.8.6

Username:ssh

Password:cisco

Follow the prompts

Finally enter the following interface:

-

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report