Cisco ASA NAT: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
 
(Eine dazwischenliegende Version desselben Benutzers wird nicht angezeigt)
Zeile 5: Zeile 5:
 
==Copy and Paste==
 
==Copy and Paste==
 
<pre>
 
<pre>
 +
configure terminal
 
object network obj-lan  
 
object network obj-lan  
 
subnet 172.18.122.0 255.255.255.0
 
subnet 172.18.122.0 255.255.255.0
 
nat (if-inside,if-outside) dynamic interface
 
nat (if-inside,if-outside) dynamic interface
 
+
end
 +
   
 
</pre>
 
</pre>
  

Aktuelle Version vom 17. Februar 2016, 09:58 Uhr

Maskieren auf ausgehende Interface (Regular Dynamic PAT)

  • ciscoasa(config)# object network obj-lan
  • ciscoasa(config-network-object)# subnet 172.18.122.0 255.255.255.0
  • ciscoasa(config-network-object)# nat (if-inside,if-outside) dynamic interface

Copy and Paste

configure terminal
object network obj-lan 
subnet 172.18.122.0 255.255.255.0
nat (if-inside,if-outside) dynamic interface
end 
    

Nat auf einen Rechner im Lan (Regular Static NAT)

Portforwarding auf internen Bastion Host

Webserver
  • ciscoasa(config)# object network obj-www
  • ciscoasa(config-network-object)# host 172.18.122.101
  • ciscoasa(config-network-object)# nat (if-inside,if-outside) static interface service tcp www www
Smtp
  • ciscoasa(config)# object network obj-smtp
  • ciscoasa(config-network-object)# host 172.18.122.101
  • ciscoasa(config-network-object)# nat (if-inside,if-outside) static interface service tcp smtp smtp
Ssh von 8472 auf 22
  • ciscoasa(config)# object network obj-ssh
  • ciscoasa(config-network-object)# host 172.18.122.101
  • ciscoasa(config-network-object)# nat (if-inside,if-outside) static interface service tcp ssh 8472

Acls bilden

  • ciscoasa(config)# access-list acl-bastion extended permit tcp any object obj-www eq www
  • ciscoasa(config)# access-list acl-bastion extended permit tcp any object obj-smtp eq smtp
  • ciscoasa(config)# access-list acl-bastion extended permit tcp any object obj-ssh eq ssh

Acl anwenden

  • ciscoasa(config)# access-group acl-bastion in interface if-outside