版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章 原始出处 、作者信息和本声明。否则将追究法律责任。[url]http://strugglu.blog.51cto.com/241957/55835[/url] |
今天把配置贴出来大家帮忙看一下,丢包问题是否和规则的配置有关呢?
配置了NAT之后可以上外网,但是用PC ping外网全部不通(但不影响上网)!
其间有一段时间不能浏览网页,而且也ping不出去,导致我以外NAT上面的错误,但是后来发现是我机器上面没有配置DNS地址,导致我无法浏览网页,后来加上当地的DNS之后就OK了。可是ping不通的问题依旧没有解决。
我用FTP测试下载速度,接PIX525+3750与直接接入的下载速率几乎相同,判断不存在“严重的丢包问题”。
pixfirewall(config)# sh run
: Saved : PIX Version 8.0(2) ! hostname pixfirewall domain-name xxxbank.com enable password PJlHc0RVFW2RrQAM encrypted names dns-guard ! interface Ethernet0 nameif outside security-level 0 ip address 192.168.8.92 255.255.255.0 ! interface Ethernet1 no nameif no security-level no ip address ! interface GigabitEthernet0 nameif dmz1 security-level 50 ip address 10.10.11.1 255.255.255.0 ! interface GigabitEthernet1 nameif dmz2 security-level 50 no ip address ! passwd usNpRs8WOPDxIVKn encrypted boot system flash:/pix802.bin ftp mode passive clock timezone CST 8 dns server-group DefaultDNS domain-name chinabank.com access-list ADtrans_splitTunnelAcl standard permit any access-list outside_access_in extended permit tcp any host 60.195.251.38 eq www access-list outside_access_in extended permit icmp any any access-list outside_access_in extended permit tcp any host 60.195.251.38 eq https access-list outside_access_in extended permit tcp any host 60.195.251.25 eq www access-list outside_access_in extended permit tcp any host 60.195.251.25 eq https access-list outside_access_in extended permit tcp any host 60.195.251.26 eq 5901 access-list outside_access_in extended permit tcp any host 60.195.251.29 eq 5901 access-list outside_access_in extended permit tcp any host 60.195.251.29 eq www access-list outside_access_in extended permit tcp any host 60.195.251.15 eq ssh access-list outside_access_in extended permit tcp any host 60.195.251.15 eq https access-list outside_access_in extended permit tcp any host 60.195.251.15 eq www access-list outside_access_in extended permit tcp any host 60.195.251.25 eq 9102 access-list outside_access_in extended permit tcp any host 60.195.251.14 eq https access-list outside_access_in extended permit tcp any host 60.195.251.14 eq ssh access-list outside_access_in extended permit tcp any host 60.195.251.25 eq 9103 access-list outside_access_in extended permit tcp any host 60.195.251.26 eq 9106 access-list outside_access_in extended permit tcp any host 60.195.251.25 eq 9107 access-list outside_access_in extended permit tcp host 219.142.173.116 host 60.195.251.26 eq 9000 access-list outside_access_in extended permit tcp any host 60.195.251.19 eq https access-list outside_access_in extended permit tcp any host 60.195.251.19 eq 5901 access-list outside_access_in extended permit tcp any host 60.195.251.19 eq www access-list outside_access_in extended permit tcp any host 60.195.251.19 eq 16111 access-list outside_access_in extended permit tcp any host 60.195.251.19 eq 16112 access-list outside_access_in extended permit tcp any host 60.195.251.19 eq 9000 access-list outside_access_in extended permit tcp any host 60.195.251.34 eq https access-list outside_access_in extended permit tcp any host 60.195.251.34 eq www access-list outside_access_in extended permit tcp any host 60.195.251.21 eq www access-list outside_access_in extended permit tcp any host 60.195.251.21 eq pop3 access-list outside_access_in extended permit tcp any host 60.195.251.23 eq www access-list outside_access_in extended permit tcp any host 60.195.251.23 eq https access-list outside_access_in extended permit tcp any host 60.195.251.23 eq 9000 access-list outside_access_in extended permit tcp any host 60.195.251.24 eq www access-list outside_access_in extended permit tcp any host 60.195.251.24 eq https access-list outside_access_in extended permit tcp any host 60.195.251.30 eq www access-list outside_access_in extended permit tcp any host 60.195.251.30 eq https access-list outside_access_in extended permit tcp any host 60.195.251.31 eq https access-list outside_access_in extended permit tcp any host 60.195.251.32 eq www access-list outside_access_in extended permit tcp any host 60.195.251.32 eq https access-list outside_access_in extended permit tcp any host 60.195.251.33 eq 16338 access-list outside_access_in extended permit tcp any host 60.195.251.38 eq ssh access-list outside_access_in extended permit tcp any host 60.195.251.29 eq 1194 access-list outside_access_in extended permit tcp host 219.142.173.116 host 60.195.251.23 eq 8000 access-list outside_access_in extended permit tcp host 219.142.173.116 host 60.195.251.33 eq https access-list outside_access_in extended permit tcp any host 60.195.251.37 eq www access-list outside_access_in extended permit tcp host 219.142.173.116 host 60.195.251.20 eq ssh access-list outside_access_in extended permit tcp any host 60.195.251.13 eq www access-list outside_access_in extended permit tcp any host 60.195.251.13 eq https access-list outside_access_in extended permit tcp any host 60.195.251.13 eq 20000 access-list outside_access_in extended permit tcp any host 60.195.251.26 eq 9102 access-list outside_access_in extended permit tcp any host 60.195.251.37 eq https access-list outside_access_in extended permit udp any host 60.195.251.10 eq domain access-list outside_access_in extended permit tcp any host 60.195.251.10 eq domain access-list outside_access_in extended permit tcp any host 60.195.251.11 eq www access-list outside_access_in extended permit tcp any host 60.195.251.11 eq https access-list outside_access_in extended permit tcp any host 60.195.251.12 eq https access-list outside_access_in extended permit tcp any host 60.195.251.12 eq www access-list outside_access_in extended permit tcp any host 60.195.251.10 eq 8080 access-list outside_access_in extended permit tcp any host 60.195.251.10 eq 8079 access-list outside_access_in extended permit tcp any host 60.195.251.10 eq 7079 access-list outside_access_in extended permit tcp any host 60.195.251.10 eq 7080 access-list outside_access_in extended permit tcp any host 60.195.251.10 eq www access-list outside_access_in extended permit tcp any host 60.195.251.10 eq https access-list outside_access_in extended permit tcp any host 60.195.251.21 eq smtp access-list outside_access_in extended permit tcp any host 60.195.251.16 eq www access-list outside_access_in extended permit tcp any host 60.195.251.16 eq smtp access-list outside_access_in extended permit tcp any host 60.195.251.16 eq pop3 access-list outside_access_in extended permit tcp any host 60.195.251.26 eq 9101 access-list outside_access_in extended permit tcp any host 60.195.251.25 eq 9105 access-list outside_access_in extended permit tcp host 219.142.173.112 host 60.195.251.26 eq 9000 access-list outside_access_in extended permit tcp host 219.142.173.113 host 60.195.251.26 eq 9000 access-list outside_access_in extended permit tcp host 220.231.5.2 host 60.195.251.26 eq 9000 access-list outside_access_in extended permit tcp host 220.231.5.2 host 60.195.251.23 eq 8000 access-list outside_access_in extended permit tcp host 220.231.5.2 host 60.195.251.33 eq https access-list outside_access_in extended permit tcp host 220.231.5.2 host 60.195.251.20 eq ssh access-list Chinabank extended permit ip 10.10.8.0 255.255.255.0 192.168.0.0 255.255.255.0 access-list Chinabank extended permit ip 10.10.9.0 255.255.255.0 192.168.0.0 255.255.255.0 pager lines 24 logging timestamp logging buffered notifications logging trap notifications logging asdm warnings logging facility 22 mtu outside 1500 mtu dmz1 1500 mtu dmz2 1500 ip audit name INFO info action alarm drop ip audit name ATTACK attack action alarm drop reset ip audit signature 2004 disable no failover icmp unreachable rate-limit 1 burst-size 1 asdm p_w_picpath flash:/asdm-521.bin asdm history enable arp timeout 14400 global (outside) 1 interface //指定outside接口进行PAT转换 nat (dmz1) 0 access-list Chinabank nat (dmz1) 2 10.10.8.14 255.255.255.255 nat (dmz1) 1 10.10.8.0 255.255.255.0 nat (dmz1) 1 10.10.11.0 255.255.255.0 //对该网段地址进行转换 route outside 0.0.0.0 0.0.0.0 192.168.8.254 1 //默认路由 timeout xlate 1:00:00 timeout conn 0:30:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy http server enable http 10.10.8.200 255.255.255.255 dmz1 snmp-server host dmz1 10.10.8.200 poll community Microcisco no snmp-server location snmp-server contact Microcisco snmp-server community Microcisco snmp-server enable traps snmp authentication linkup linkdown coldstart snmp-server enable traps syslog snmp-server enable traps ipsec start stop snmp-server enable traps entity config-change fru-insert fru-remove snmp-server enable traps remote-access session-threshold-exceeded crypto ipsec transform-set ××× esp-3des esp-md5-hmac crypto map aaa 30 match address Chinabank crypto map aaa 30 set peer 220.bb.b.2 crypto map aaa 30 set transform-set ××× crypto map aaa 30 set security-association lifetime seconds 7200 crypto isakmp identity address crypto isakmp policy 30 authentication pre-share encryption 3des hash md5 group 2 lifetime 7200 no crypto isakmp nat-traversal telnet 10.10.0.0 255.255.0.0 dmz1 telnet timeout 5 ssh 10.10.0.0 255.255.0.0 dmz1 ssh 10.10.8.200 255.255.255.255 dmz1 ssh timeout 20 console timeout 0 threat-detection basic-threat threat-detection statistics access-list ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns migrated_dns_map_1 parameters message-length maximum 512 policy-map global_policy class inspection_default inspect rtsp inspect rsh inspect skinny inspect sqlnet inspect ftp inspect h323 h225 inspect tftp inspect xdmcp inspect netbios inspect sunrpc inspect h323 ras inspect dns migrated_dns_map_1 ! service-policy global_policy global ntp server 137.189.11.181 username ciscocisco password txHKylaC1k.z8b/4 encrypted tunnel-group 220.bb.b.2 type ipsec-l2l tunnel-group 220.bb.b.2 ipsec-attributes pre-shared-key * prompt hostname context Cryptochecksum:b69116e40344208a286bb6a024cd53e0 : end 在PC上ping PIX的dmz1接口即 10.10.11.1 可以通,但是ping 所有外网地址、域名和公司的192.168.x.x网段就不能通了。在上面也没有找到禁止icmp的语句。
应该不是规则的事,今天用
clear config all
把所有配置都干掉后又试了一次,问题依旧……
中午吃饭的时候问了一下我们的PIX高手:)
没2分钟就给搞定了。
原来PIX默认是不允许ICMP的包进来的。加了一条ACL让它进来就搞定了。
access-list 100 per ip any any
access-group 100 in interface outside
本文出自 “不奋斗,无颜以对江东父老!” 博客,请务必保留此出处[url]http://strugglu.blog.51cto.com/241957/55835[/url] 本文出自 51CTO.COM技术博客 |
完成PIX525的NAT映射
精选 转载完成PIX525的NAT映射
上一篇:linux下查找一般文件方法
下一篇: Cisco 3750文件系统学习总结
![](https://ucenter.51cto.com/images/noavatar_middle.gif)
提问和评论都可以,用心的回复会被更多人看到
评论
发布评论
相关文章