|
楼主 |
发表于 2007-12-19 13:24:52
|
显示全部楼层
虚拟防火墙(多个出口)
sh ver
Cisco PIX Security Appliance Software Version 7.0(2) <system>
Compiled on Fri 15-Jul-05 22:55 by builders
System image file is "flash:/image.bin"
Config file at boot was "startup-config"
pixfirewall up 9 mins 51 secs
Hardware: PIX-525, 256 MB RAM, CPU Pentium III 600 MHz
Flash E28F128J3 @ 0xfff00000, 16MB
BIOS Flash AM29F400B @ 0xfffd8000, 32KB
Encryption hardware device : VAC+ (Crypto5823 revision 0x1)
0: Ext: Ethernet0 : address is 0012.daf1.5686, irq 10
1: Ext: Ethernet1 : address is 0012.daf1.5687, irq 11
2: Ext: Ethernet2 : address is 000d.88ff.b804, irq 11
3: Ext: Ethernet3 : address is 000d.88ff.b805, irq 10
4: Ext: Ethernet4 : address is 000d.88ff.b806, irq 9
5: Ext: Ethernet5 : address is 000d.88ff.b807, irq 5
Licensed features for this platform:
Maximum Physical Interfaces : 10
Maximum VLANs : 100
Inside Hosts : Unlimited
<--- More --->
Failover : Active/Active
VPN-DES : Enabled
VPN-3DES-AES : Enabled
Cut-through Proxy : Enabled
Guards : Enabled
URL Filtering : Enabled
Security Contexts : 2
GTP/GPRS : Disabled
VPN Peers : Unlimited
This platform has an Unrestricted (UR) license.
Serial Number: 808495289
Running Activation Key: 0xd60ccff6 0x66c10288 0x4708d0ce 0x2ae96ff3
Configuration has not been modified since last system restart.
pixfirewall# sh run
: Saved
:
PIX Version 7.0(2) <system>
!
interface Ethernet0
!
interface Ethernet1
!
interface Ethernet2
!
interface Ethernet3
!
interface Ethernet4
!
interface Ethernet5
!
enable password 8Ry2YjIyt7RRXU24 encrypted
hostname pixfirewall
ftp mode passive
pager lines 24
no failover
no asdm history enable
arp timeout 14400
console timeout 0
<--- More --->
admin-context admin
context admin
allocate-interface Ethernet0
allocate-interface Ethernet1
config-url flash:/admin.cfg
!
context cnc-1
allocate-interface Ethernet2
allocate-interface Ethernet3
config-url flash:/cnc-1.cfg
!
context cnc-2
allocate-interface Ethernet4
allocate-interface Ethernet5
config-url flash:/cnc-2.cfg
!
Cryptochecksum:1785a918b6c389976708b6f933687826
: end
pixfirewall#
pixfirewall# changeto context admin 进子防火墙
pixfirewall/admin# sh run
: Saved
:
PIX Version 7.0(2) <context>
names
!
interface Ethernet0
nameif outside
security-level 0
ip address 192.168.0.10 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname admin
access-list 1 extended permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
monitor-interface outside
monitor-interface inside
icmp permit any outside
<--- More --->
icmp permit any inside
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group 1 in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.0.100 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
telnet timeout 5
ssh timeout 5
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
<--- More --->
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:0fa292be4bf97aadf52da496b3c521d4
: end
pixfirewall/admin#
pixfirewall#
pixfirewall# changeto context cnc-1 进子防火墙
pixfirewall/cnc-1# sh run
: Saved
:
PIX Version 7.0(2) <context>
names
!
interface Ethernet2
nameif outside
security-level 0
ip address 192.168.2.1 255.255.255.0
!
interface Ethernet3
nameif inside
security-level 100
ip address 192.168.3.1 255.255.255.0
!
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname cnc-1
access-list 1 extended permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
monitor-interface outside
monitor-interface inside
icmp permit any outside
<--- More --->
icmp permit any inside
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group 1 in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.2.100 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
telnet timeout 5
ssh timeout 5
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
<--- More --->
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:037ff73f3db30dbbc964c48c536c0816
: end
pixfirewall/cnc-1# exit
pixfriewall#
pixfirewall# changeto context cnc-2 进子防火墙
pixfirewall/cnc-2# sh run
: Saved
:
PIX Version 7.0(2) <context>
names
!
interface Ethernet4
nameif outside
security-level 0
ip address 192.168.4.1 255.255.255.0
!
interface Ethernet5
nameif inside
security-level 100
ip address 192.168.5.1 255.255.255.0
!
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname cnc-2
access-list 1 extended permit icmp any any
pager lines 24
mtu outside 1500
mtu inside 1500
monitor-interface outside
monitor-interface inside
icmp permit any outside
<--- More --->
icmp permit any inside
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group 1 in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.4.100 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp
telnet timeout 5
ssh timeout 5
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
<--- More --->
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
!
service-policy global_policy global
Cryptochecksum:738597503a14f95ceb5a1efed1ddb8cf
: end
pixfirewall/cnc-2# |
|