2024年5月19日发(作者:电脑cpu性能天梯图)
防
火
墙
配
置
目录
一. 防火墙的基本配置原则 ......................................................................................................... 3
1.防火墙两种情况配置 ........................................................................................................... 3
2.防火墙的配置中的三个基本原则 ....................................................................................... 3
3.网络拓扑图 ........................................................................................................................... 4
二.方案设计原则 ........................................................................................................................... 4
1. 先进性与成熟性 .................................................................................................................. 4
2. 实用性与经济性 .................................................................................................................. 5
3. 扩展性与兼容性 .................................................................................................................. 5
4. 标准化与开放性 .................................................................................................................. 5
5. 安全性与可维护性 .............................................................................................................. 5
6. 整合型好 .............................................................................................................................. 5
三.防火墙的初始配置 ................................................................................................................... 6
1.简述....................................................................................................................................... 6
2.防火墙的具体配置步骤 ....................................................................................................... 6
四. Cisco PIX防火墙的基本配置 ............................................................................................... 8
1. 连接 ..................................................................................................................................... 8
2. 初始化配置 ......................................................................................................................... 8
3. enable命令 ........................................................................................................................ 8
4.定义以太端口 ..................................................................................................................... 8
5. clock ................................................................................................................................... 8
6. 指定接口的安全级别 ......................................................................................................... 9
7. 配置以太网接口IP地址 ................................................................................................... 9
8. access-group ..................................................................................................................... 9
9.配置访问列表 ..................................................................................................................... 9
10. 地址转换(NAT) ........................................................................................................... 10
11. Port Redirection with Statics ............................................................................... 10
1.命令 .............................................................................................................................. 10
2.实例 ........................................................................................................................... 11
12. 显示与保存结果 ............................................................................................................. 12
五.过滤型防火墙的访问控制表(ACL)配置 ......................................................................... 13
1. access-list:用于创建访问规则 ................................................................................. 13
2. clear access-list counters:清除访问列表规则的统计信息 ............................... 14
3. ip access-grou ............................................................................................................... 15
4. show access-list ........................................................................................................... 15
5. show firewall ................................................................................................................. 16
发布者:admin,转转请注明出处:http://www.yc00.com/xitong/1716103997a2720308.html
评论列表(0条)