Cisco PIX 525 Spécifications Page 129

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 466
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 128
3-17
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 3 Controlling Network Access and Use
Access Control Configuration Example
Step 2 Specify that the access-list group regulates the activities of inside hosts starting outbound connections:
access-group acl_in in interface inside
Note For information about logging activity associated with specific ACLs, see “Logging Access
Control List Activity” in Chapter 9, “Accessing and Monitoring PIX Firewall.
Step 3 Create static address mappings:
static (inside, outside) 209.165.201.16 192.168.3.16 netmask 255.255.255.240
This example maps IP addresses 209.165.201.17 through 209.165.201.30 to 192.168.3.17 through
192.168.3.30.
Step 4 Enable VoIP access:
access-list acl_out permit tcp any 209.165.201.16 255.255.255.240 eq h323
This command lets users on the Internet send Intel Internet Phone requests to users on the protected
network. A request can be sent to any IP address in the range from 209.165.201.16 through
209.165.201.31 and the PIX
Firewall will translate this address to the next available IP address in the
range from 192.168.3.16 through 192.168.3.31.
Step 5 Establish an externally visible IP address for Web access:
static (inside, outside) 209.165.201.11 10.1.1.11
access-list acl_out permit tcp any host 209.165.201.11 eq 80
The static command statement with the access-list command statement establishes an externally visible
IP address for Web access (port 80 in the access-list command statement).
Example 3-4 shows the command listing for configuring access to services for the network illustrated in
Figure 3-3.
Example 3-4 Configuring Access to Services
access-list acl_in deny tcp host 192.168.3.3 any eq 1720
access-list acl_in permit tcp host 192.168.3.3 any eq 80
access-list acl_in permit tcp host 10.1.1.11 any eq 80
access-list acl_in deny tcp any any eq 80
access-group acl_in in interface inside
access-list acl_out permit tcp any 209.165.201.16 255.255.255.240 eq h323
static (inside, outside) 209.165.201.11 10.1.1.11
access-list acl_out permit tcp any host 209.165.201.11 eq 80
Vue de la page 128
1 2 ... 124 125 126 127 128 129 130 131 132 133 134 ... 465 466

Commentaires sur ces manuels

Pas de commentaire