Cisco PIX 525 Specifikace Strana 90

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 466
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 89
2-30
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
no failover
names
pager lines 24
logging buffered debugging
nat (inside) 1 0 0
global (outside) 1 209.165.201.10-209.165.201.30
global (outside) 1 209.165.201.8
route outside 0.0.0.0 0.0.0.0 209.165.201.1 1
access-list acl_out permit icmp any any
access-group acl_out in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00
udp 0:02:00 rpc 0:10:00 h323 0:05:00
sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server community public
mtu outside 1500
mtu inside 1500
Three Interfaces Without NAT or PAT
In Figure 2-7, the PIX Firewall has three interfaces configured without address translation.
Figure 2-7 Three-interface Configuration Without NAT or PAT
209.165.201.10
Outside
Inside
209.165.201.17
255.255.255.248
DMZ
2
09.165.201.11
209.165.201.19
209.165.201.18
34781
209.165.201.9
255.255.255.248
209.165.201.1
209.165.201.4209.165.201.3
209.165.201.2
255.255.255.248
Router B
Internet
The network has the following IP addresses and network masks:
Outside network interface address: 209.165.201.2, network mask: 255.255.255.248
Inside network interface address: 209.165.201.9, network mask: 255.255.255.248
DMZ network interface address: 209.165.201.17, network mask: 255.255.255.248
In addition, the DMZ host 209.165.201.19 must be accessible from hosts on the outside interface.
Zobrazit stránku 89
1 2 ... 85 86 87 88 89 90 91 92 93 94 95 ... 465 466

Komentáře k této Příručce

Žádné komentáře