Cisco PIX 525 Spécifications Page 189

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 466
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 188
5-13
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 5 Configuring Application Inspection (Fixup)
Basic Internet Protocols
Sample Configuration
Figure 5-3 illustrates a network scenario implementing SMTP and NFS on an internal network.
Figure 5-3 Sample Configuration with SMTP and NFS (Sun RPC)
34780
Global pool
209.165.201.6-8
209.165.201.10 (PAT)
209.165.200.225-254
Internet
Intel
Internet
Phone
Outside
Sun Mail host
NT SNMP
BSDI NT TACACS+
server
209.165.201.1
PIX Firewall
RIP 10.1.1.1
209.165.201.3209.165.201.2
10.1.1.3 10.1.1.11 10.1.1.12
209.165.201.4 209.165.201.5
BSDI
192.168.3.1
In this example, the static command sets up a global address to permit outside hosts access to the
10.1.1.3 Sun Mail host on the Inside interface. (The MX record for DNS must point to the 209.165.201.1
address so that mail is sent to this address.) The access-list command lets any outside users access the
global address through the SMTP port (25). The no fixup protocol command disables the Mail Guard
feature.
Perform the following steps to complete the configuration required for this example:
Step 1 Provide access to the 10.1.1.3 mail server through global address 209.165.201.12:
static (inside, outside) 209.165.201.12 10.1.1.3 netmask 255.255.255.255 0 0
access-list acl_out permit tcp any host 209.165.201.12 eq smtp
The access-list command allows any outside host access to the static via SMTP (port 25). By default,
the PIX
Firewall restricts all access to mail servers to the commands DATA, HELO, MAIL, NOOP,
QUIT, RCPT, and RSET, as described in RFC 821, section 4.5.1. This is implemented through the Mail
Guard service, which is enabled by default (fixup protocol smtp 25).
Another aspect of providing access to a mail server is being sure that you have a DNS MX record for the
static’s global address, which outside users access when sending mail to your site.
Step 2 Create access to port 113, the IDENT protocol:
access-list acl_out permit tcp any host 209.165.201.12 eq 113
access-group acl_out in interface outside
static (inside, outside) 209.165.201.12 10.1.1.3 netmask 255.255.255.255 0 0
access-list acl_out permit tcp any host 209.165.201.12 eq smtp
access-list acl_out permit tcp any host 209.165.201.12 eq 113
access-group acl_out in interface outside
Vue de la page 188
1 2 ... 184 185 186 187 188 189 190 191 192 193 194 ... 465 466

Commentaires sur ces manuels

Pas de commentaire