国产宅男网站在线|亚洲A级性爱免费视频|亚洲中精品级在线|午夜福利AA毛

  • <dd id="gf5jf"><th id="gf5jf"></th></dd>

    <cite id="gf5jf"><label id="gf5jf"></label></cite>
  • <div id="gf5jf"><listing id="gf5jf"></listing></div>
    學(xué)習(xí)啦 > 學(xué)習(xí)電腦 > 網(wǎng)絡(luò)知識(shí) > 路由器 > 路由器設(shè)置 > cisco思科 > 如何配置思科IOS防火墻

    如何配置思科IOS防火墻

    時(shí)間: 權(quán)威724 分享

    如何配置思科IOS防火墻

      思科依靠自身的技術(shù)和對(duì)網(wǎng)絡(luò)經(jīng)濟(jì)模式的深刻理解,使他成為了網(wǎng)絡(luò)應(yīng)用的成功實(shí)踐者之一,其制造的路由器也是全球頂尖的,那么你知道如何配置思科IOS防火墻嗎?下面是學(xué)習(xí)啦小編整理的一些關(guān)于如何配置思科IOS防火墻的相關(guān)資料,供你參考。

      配置思科IOS防火墻的方法:

      拓?fù)鋱D

      配置思科IOS防火墻步驟

      第一步:在R1 、 R2 、 R3上的預(yù)配置

      r1(config)#int e0/0

      r1(config-if)#ip add 172.16.1.1 255.255.255.0

      r1(config-if)#no sh

      r1(config)#ip route 0.0.0.0 0.0.0.0 172.16.1.2配置靜態(tài)路由

      r1(config)#^Z

      r2(config)#int e0/0

      r2(config-if)#ip add 172.16.1.2 255.255.255.0

      r2(config-if)#no sh

      r2(config-if)#int e2/0

      r2(config-if)#ip add 192.168.1.2 255.255.255.0

      r2(config-if)#no sh

      r3(config)#int e2/0

      r3(config-if)#ip add 192.168.1.3 255.255.255.0

      r3(config-if)#no sh

      r3(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.2 配置靜態(tài)路由

      r3(config)#^Z

      r3(config)#li vty 0 4

      r3(config-line)#pass

      r3(config-line)#password cisco

      r3(config-line)#exit

      第二步:

      在R2上配置zhang

      r2#conf t

      Enter configuration commands, one per line. End with CNTL/Z.

      r2(config)#ip inspect name zhang tcp 檢查TCP

      r2(config)#ip inspect name zhang udp 檢查udp

      r2(config)#ip inspect udp idle-time 60 檢查udp 的時(shí)間是60S

      r2(config)#ip inspect name zhang icmp timeout 5 超時(shí)時(shí)間是5S

      r2(config)#ip inspect name zhang http alert off 控制HTTP

      r2(config)#

      r2(config)#int e0/0

      r2(config-if)#ip inspect zhang in 在e0/0接口檢查流量是否滿足以上所定義過的任何一條

      r2(config-if)#exit

      r2(config)#acce 100 deny ip any any log 做ACL拒絕IP的任何包通過

      r2(config)#int e2/0

      r2(config-if)#ip acce 100 in 將ACL要用到e2/0的進(jìn)接口上

      第三步: 從R1上TELNET R3

      r1#telnet 192.168.1.3

      Trying 192.168.1.3 ... Open

      User Access Verification

      Password:

      r3>

      從R3上TELNET R1

      r3#telnet 172.16.1.1

      Trying 172.16.1.1 ...

      % Destination unreachable; gateway or host down

      第四步:

      從R1上ping R2直連接口

      r1#ping 172.16.1.2

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 172.16.1.2, timeout is 2 seconds:

      !!!!!

      Success rate is 100 percent (5/5), round-trip min/avg/max = 28/54/92 ms

      從R2上ping R1直連接口

      r2#ping 172.16.1.1

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 172.16.1.1, timeout is 2 seconds:

      !!!!!

      Success rate is 100 percent (5/5), round-trip min/avg/max = 16/67/124 ms

      從R2ping R3直連接口

      r2#ping

      *Mar 1 00:15:20.615: %SYS-5-CONFIG_I: Configured from console by console

      r2#ping 192.168.1.3

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 192.168.1.3, timeout is 2 seconds:

      *Mar 1 00:15:28.055: %SEC-6-IPACCESSLOGDP: list 100 denied icmp 192.168.1.3 -> 192.168.1.2 (0/0), 1 packet..... //說明icmp包可以到達(dá),但 是沒有回包

      Success rate is 0 percent (0/5)

      從R3ing R2連接口

      r3#ping 192.168.1.2

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2 seconds:

      U.U.U //說明icmp包不可以到達(dá)目的地

      Success rate is 0 percent (0/5)

      r1#ping 192.168.1.3

      Type escape sequence to abort.

      Sending 5, 100-byte ICMP Echos to 192.168.1.3, timeout is 2 seconds:

      !!!!!

      Success rate is 100 percent (5/5), round-trip min/avg/max = 76/124/156 ms

      r2#debug ip inspect icmp

      INSPECT ICMP Inspection debugging is on

      r2#

      *Mar 1 00:35:09.187: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.187: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.191: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.263: CBAC: ICMP Echo Reply pkt 192.168.1.3 => 172.16.1.1

      *Mar 1 00:35:09.375: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.423: CBAC: ICMP Echo Reply pkt 192.168.1.3 => 172.16.1.1

      *Mar 1 00:35:09.467: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.531: CBAC: ICMP Echo Reply pkt 192.168.1.3 => 172.16.1.1

      *Mar 1 00:35:09.563: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      r2#

      *Mar 1 00:35:09.623: CBAC: ICMP Echo Reply pkt 192.168.1.3 => 172.16.1.1

      *Mar 1 00:35:09.671: CBAC: ICMP Echo pkt 172.16.1.1 => 192.168.1.3

      *Mar 1 00:35:09.735: CBAC: ICMP Echo Reply pkt 192.168.1.3 => 172.16.1.1

    569947