温馨提示×

温馨提示×

您好,登录后才能下订单哦!

密码登录×
登录注册×
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》

ASA 8.4命令解析

发布时间:2020-05-26 20:32:08 来源:网络 阅读:4731 作者:versun_song 栏目:安全技术

前面发表了一篇文章是ASA 8.0版本的,后面用到8.4发现命令有很多不一样,特发一篇8.4版本的命令可以和前面命令做对比和参考

 需要注意的是

1.这边没有nat 0,也就是说到DMZ区域不需旁路。

2.如果是ASA 5505的设备,则需定义vlan端口地址然后把防火墙相应端口加入对应vlan.

:

ASA Version 8.4(2)                                      //版本8.4

!

hostname fw                                             

enable password 8Ry2YjIyt7RRXU24 encrypted              

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface GigabitEthernet0

 nameif inside

 security-level 100

 ip address 192.168.1.254 255.255.255.0

!

interface GigabitEthernet1

 nameif dmz

 security-level 50

 ip address 172.16.1.254 255.255.255.0

!

interface GigabitEthernet2

 nameif outside

 security-level 0

 ip address 221.222.1.2 255.255.255.0

!

interface GigabitEthernet3

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet4

 shutdown

 no nameif

 no security-level

 no ip address

!

interface GigabitEthernet5

 shutdown

 no nameif

 no security-level

 no ip address

!

ftp mode passive

object network inside                     //定义nat内部网段

 subnet 0.0.0.0 0.0.0.0

object network outside                    //定义外网地址

 host 221.222.1.2

object network telnet                     //定义需发布端口的内部服务器地址

 host 172.16.1.2

object network www                        

 host 172.16.1.1

object network towww                       //定义NAT转换的外部内址(此地址做静态NAT)

 host 221.222.1.3

object network totelnet

 host 221.222.1.4

object network natoutside

 host 221.222.1.5

access-list outtodmz extended permit tcp any object www eq www       //定义需要放行的流量

access-list outtodmz extended permit tcp any object www eq telnet

access-list outtodmz extended permit tcp any object telnet eq telnet

access-list outtodmz extended permit tcp any object telnet eq www

pager lines 24

mtu dmz 1500

mtu outside 1500

mtu inside 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

!

object network inside                                         //定义动态多对一NAT

 nat (dmz,outside) dynamic interface

object network telnet                                         //定义端口转换

 nat (dmz,outside) static interface service tcp telnet 2023

object network www                                            //定义静态一对一NAT

 nat (dmz,outside) static towww

access-group outtodmz in interface outside                    //应用ACL到端口进行流量放行

route outside 0.0.0.0 0.0.0.0 221.222.1.1 1                   //默认路由

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h423 0:05:00 h325 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

user-identity default-domain LOCAL

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

telnet timeout 5

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

!

class-map inspection_default

 match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

 parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

 class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h423 h325

  inspect h423 ras

  inspect ip-options

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip

  inspect xdmcp

  inspect icmp                                       

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

call-home

 profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

crashinfo save disable

Cryptochecksum:ceec7cf7a060a0ab5127d816542bb2db

: end


ASA QOS限速实例


access-list qos extended permitip host 192.168.1.10 host 192.168.2.10

access-list qos extended permitip host 192.168.2.10 host 192.168.1.10

 

class-map qos

match access-list qos

 

 

policy-map qos

class qos

  police output 10000

  police input 10000

 

service-policy qos interfaceinside


注意:

如果流量是已经建立的会话,那么数据包不会去找新建立的策略

只有在新建立的策略以后新生成的会话,才会撞击这个策略

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113396-asa-packet-flow-00.html


8.3以后若有NAT, ACL需匹配源实际IP地址。

向AI问一下细节
推荐阅读:
  1. ASA
  2. ASA8.4端口映射篇

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

AI