Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The ninth of the top ten tasks of firewall configuration to verify the operation of the firewall

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Task 9 for configuring firewalls

Verify the operation of the firewall

Topology figure 9.0.1

Router R1 configuration

Figure 9.0.2

Pix Firewall configuration

Figure 9.0.3

1. Set up so that internal hosts can ping R1

Figure 9.1

two。 View with PC5 and PC6 ping R1

(1) address translation table (xlate) and connection table (conns)

(2) display traffic statistics

(3) use the show interface command to view a large amount of information related to the operation of the interface

Figure 9.2

3. Define two capture sessions that capture all traffic on the inside and outside interfaces, respectively.

Figure 9.3

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report