In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Experiment name: application of Firewall
Experimental step-by-step:
3. Purpose: 1. Client2 can visit server3.
two。 Use the command show conn detail to view the status of conn tables
3. View the routing tables of ASA and AR respectively
4. Configure ACL to prevent client5 from accessing server1
4. Configuration ideas:
# first create three zones, namely, private network, public network and DMAZ zone, then configure the servers in each zone, and finally set acl permissions
5. Operation steps:
# configure the terminal ip address of each region first
# configure outside region:
Configure ip addresses for client2, server4, and server1
Ip address 192.168.8.2 255.255.255.0
Configuration of gateway 192.168.8.254 / / server4 ftp
Ip address 192.168.8.1 255.255.255.0
Configuration of gateway 192.168.254 255.255.255.0 / / client2
Ip address 192.168.8.100 255.255.255.0
Configuration of gateway 192.168.8.254 / / server1 web
# configure DMAZ area
# configure the ip address of server3 and client5
Ip address 192.168.30.1 255.255.255.0
Configuration of gateway 192.168.30.254 / / client5
Ip address 192.168.30.100 255.255.255.0
Ip address of gateway 192.168.30.254 / / server 3
# configure inside area
# configure the ip address of server2 client1
Ip address 10.1.1.1 255.255.255.0
Gateway 10.1.1.254 / / server2 de ip address
Ip address 10.2.2.1 255.255.255.0
Ip address of gateway 10.2.2.254 / / client 1
# configure ip addresses for each port of the firewall
# interface g 0
Nameif inside
Ip address 192.168.1.254 255.255.255.0
No shutdow
Interface g 1
Nameif outside
Ip address 192.168.8.254 255.255.255.0
No shutdown
Interface DMAZ area
Interface g 2
Nameif DMAZ
Security-level 50
Ip address 192.168.30.254 255.255.255.0
No shutdown
# configure acl on the firewall asa so that client 2 can access server 2-web server
Access list 1 permit tcp any host 192.168.30.100 eq 80
Access-group 1 in interface outside / / default firewall has a security level of 100 in the internal network and 0 in the public network.
As shown in the following figure: prove that client2 has access to the web server
# next, configure the ip address and routing on the AR1, and configure the route to the intranet on the firewall
Inteface g0/0/0
Ip address 10.1.1.1.254 255.255.255.0
Undo shutdown
Interface g0/0/1
Ip address 10.2.2.254 255.255.255.0
Undo shutdown
Interface g0/0/2
Ip address 192.168.1.1 255.255.255.0
Undo shutdown
Ip route-static 0.0.0.0 0.0.0.0 192.168.1.254 / Route to the external network
# configure the route to the private network on the firewall asa
Route inside 10.1.1.0 255.255.255.0 192.168.1.1
Route inside 10.2.2.0 255.255.255.0 192.168.1.1
# Test, as shown in the figure: you can access the public network ftp server
# next you can check the show conn detail
# check the route on the router, and view the route on the asa firewall, as shown below
# finally configure acl so that clietn cannot access web-- server1
Access-list 2 deny tcp any host 192.168.8.100 eq 80
Access-group 2 in interface DMAZ / / call on the dmaz port
As shown in the following figure, the test is successful
Summary: the working process of the firewall:
By default, the security level of the internal network is high, while that of the external network is low, so the internal network can access the external network, while the external network cannot access the internal network.
Take a simple example:
If the public network has a web server, it is accessible to the private network by default. The firewall intercepts all traffic by default and stores it in the conn status table. When it comes back, it can only come back because it matches port 80.
If it is Ping traffic, it is not enabled by default. It has outgoing packets, but no return packages. If you can come back, you can only write acl to release it.
_ ___________________
End
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.