實驗目的:
1.VLAN互通
2.VRRP
3.內網PAT訪問外網【地址轉換成119.1.1.0/29網段】
4.發布Web服務器供外網訪問
實驗步驟:
配置各個交換機:
SW1:創建vlan1【交換機自帶】、vlan2、vlan100
創新互聯專注為客戶提供全方位的互聯網綜合服務,包含不限于網站設計、做網站、化德網絡推廣、小程序制作、化德網絡營銷、化德企業策劃、化德品牌公關、搜索引擎seo、人物專訪、企業宣傳片、企業代運營等,從售前售中售后,我們都將竭誠為您服務,您的肯定,是我們最大的嘉獎;創新互聯為所有大學生創業者提供化德建站搭建服務,24小時服務熱線:028-86922220,官方網址:m.newbst.com
interface GigabitEthernet0/0/1
port link-type access
port def vlan 1
interface GigabitEthernet0/0/12
port link-type trunk
port trunk allow-pass vlan 2 to 4094
interface GigabitEthernet0/0/13
port link-type trunk
port trunk allow-pass vlan 2 to 4094
SW2:創建vlan1【交換機自帶】、vlan2、vlan100、vlan3
interface GigabitEthernet0/0/1
port link-type access
port default vlan 2
interface GigabitEthernet0/0/2
port link-type access
port default vlan 3
interface GigabitEthernet0/0/12
port link-type trunk
port trunk allow-pass vlan 2 to 4094
interface GigabitEthernet0/0/23
port link-type trunk
port trunk allow-pass vlan 2 to 4094
SW3:創建vlan1【交換機自帶】、vlan2、vlan100、vlan4
interface GigabitEthernet0/0/1
port link-type access
port default vlan 100
interface GigabitEthernet0/0/2
port link-type access
port default vlan 4
interface GigabitEthernet0/0/13
port link-type trunk
port trunk allow-pass vlan 2 to 4094
interface GigabitEthernet0/0/23
port link-type trunk
port trunk allow-pass vlan 2 to 4094
配置VRRP:SW3做主VRRP、SW2做備用VRRP
SW3:interface Vlanif1
ip address 192.168.1.250 255.255.255.0
vrrp vrid 1 virtual-ip 192.168.1.254\\配置虛擬網關IP
vrrp vrid 1 priority 150\\配置優先級
vrrp vrid 1 track interface GigabitEthernet0/0/2 reduced 100
\\配置鏈路跟蹤使其斷掉后優先級下降100
interface Vlanif2
ip address 192.168.2.250 255.255.255.0
vrrp vrid 2 virtual-ip 192.168.2.254\\配置虛擬網關IP
vrrp vrid 2 priority 150\\配置優先級
vrrp vrid 2 track interface GigabitEthernet0/0/2 reduced 100
\\配置鏈路跟蹤使其斷掉后優先級下降100
interface Vlanif100
ip address 192.168.100.253 255.255.255.0
vrrp vrid 100 virtual-ip 192.168.100.254\\配置虛擬網關IP
vrrp vrid 100 priority 150\\配置優先級
vrrp vrid 100 track interface GigabitEthernet0/0/2 reduced 100
\\配置鏈路跟蹤使其斷掉后優先級下降100
SW2:interface Vlanif1
ip address 192.168.1.253 255.255.255.0
vrrp vrid 1 virtual-ip 192.168.1.254\\配置虛擬網關IP
interface Vlanif2
ip address 192.168.2.253 255.255.255.0
vrrp vrid 2 virtual-ip 192.168.2.254\\配置虛擬網關IP
interface Vlanif100
ip address 192.168.100.250 255.255.255.0
vrrp vrid 100 virtual-ip 192.168.100.254\\配置虛擬網關IP
配置OSPF:SW3:ospf 1 router-id 3.3.3.3
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
network 192.168.100.0 0.0.0.255
network 192.168.4.0 0.0.0.255
SW2:ospf 1 router-id 2.2.2.2
area 0.0.0.0
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
network 192.168.3.0 0.0.0.255
interface Vlanif3
ip address 192.168.3.1 255.255.255.0
interface Vlanif4
ip address 192.168.4.1 255.255.255.0
配置防火墻【ASA】:interface GigabitEthernet0
nameif inside1
security-level 100
ip address 192.168.4.254 255.255.255.0
interface GigabitEthernet1
nameif inside2
security-level 100
ip address 192.168.3.254 255.255.255.0
interface GigabitEthernet2
nameif outside
security-level 0
ip address 200.8.8.1 255.255.255.252
配置防火墻下一跳:
route inside1 192.168.1.0 255.255.255.0 192.168.4.1
route inside1 192.168.2.0 255.255.255.0 192.168.4.1
route inside1 192.168.100.0 255.255.255.0 192.168.4.1
配置ISP:interface GigabitEthernet0/0/0
ip address 200.8.8.2 255.255.255.252 \\配置IP【子網為30位】
interface GigabitEthernet0/0/1
ip address 200.9.9.254 255.255.255.0\\配置IP
默認路由:ip route-static 0.0.0.0 0.0.0.0 200.8.8.1
配置防火墻對ISP下一跳:
route outside 200.9.9.0 255.255.255.0 200.8.8.2
防火墻設置ACL【使外網可訪問內網的web服務】:
access-list out-to-in permit tcp host 200.9.9.2 host 192.168.100.1 eq 80
調用ACL:
access-group out-to-in in interface outside
NAT地址轉換【將私有地址轉換為公有地址119.1.1.0/29】:
object network vlan1\\配置vlan1 NAT
subnet 192.168.1.0 255.255.255.0
nat (inside1,outside) dynamic 119.1.1.1
quit
object network vlan2\\配置vlan2 NAT
subnet 192.168.2.0 255.255.255.0
nat (inside1,outside) dynamic 119.1.1.2
quit
object network vlan100 \\配置vlan100 NAT
subnet 192.168.100.0 255.255.255.0
nat (inside1,outside) dynamic 119.1.1.3
quit
客戶端IP:
Client1:192.168.1.1 255.255.255.0
Client2:192.168.2.1 255.255.255.0
Server-web:192.168.100.1 255.255.255.0
Client3:200.9.9.2 255.255.255.0
Server-ftp:200.9.9.1 255.255.255.0
結果驗證:
1vlan互通
2VRRP【此時ping的為虛擬網關IP】
3內網PAT訪問外網【地址將轉換成119.1.1.0/29的網段】
4發布Web服務器供外網訪問【Client3為外網客戶端】
實驗拓撲圖【紅點代表信號不穩定,不是未開啟,數據可以通過】:
謝謝大家支持
網站標題:第十九期ASA【防火墻】綜合拓撲
分享URL:http://m.newbst.com/article6/phdoig.html
成都網站建設公司_創新互聯,為您提供虛擬主機、域名注冊、響應式網站、關鍵詞優化、移動網站建設、電子商務
聲明:本網站發布的內容(圖片、視頻和文字)以用戶投稿、用戶轉載內容為主,如果涉及侵權請盡快告知,我們將會在第一時間刪除。文章觀點不代表本網站立場,如需處理請聯系客服。電話:028-86922220;郵箱:631063699@qq.com。內容未經允許不得轉載,或轉載時需注明來源: 創新互聯