<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>计算机网络 on 知识带给我们自由</title>
    <link>https://yuexuan521.github.io/zh/tags/%E8%AE%A1%E7%AE%97%E6%9C%BA%E7%BD%91%E7%BB%9C/</link>
    <description>Recent content in 计算机网络 on 知识带给我们自由</description>
    <image>
      <title>知识带给我们自由</title>
      <url>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://yuexuan521.github.io/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- 0.160.1</generator>
    <language>en-us</language>
    <copyright>See this site&amp;rsquo;s source code here, licensed under GPLv3 ·</copyright>
    <lastBuildDate>Thu, 23 Jan 2025 16:37:23 +0000</lastBuildDate>
    <atom:link href="https://yuexuan521.github.io/zh/tags/%E8%AE%A1%E7%AE%97%E6%9C%BA%E7%BD%91%E7%BB%9C/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI（使用命令行界面配置和验证站点到站点IPsec VPN）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-configure-and-verify-a-site-to-site-ipsec-vpn-using-cli%E4%BD%BF%E7%94%A8%E5%91%BD%E4%BB%A4%E8%A1%8C%E7%95%8C%E9%9D%A2%E9%85%8D%E7%BD%AE%E5%92%8C%E9%AA%8C%E8%AF%81%E7%AB%99%E7%82%B9%E5%88%B0%E7%AB%99%E7%82%B9ipsec-vpn/</link>
      <pubDate>Thu, 23 Jan 2025 16:37:23 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-configure-and-verify-a-site-to-site-ipsec-vpn-using-cli%E4%BD%BF%E7%94%A8%E5%91%BD%E4%BB%A4%E8%A1%8C%E7%95%8C%E9%9D%A2%E9%85%8D%E7%BD%AE%E5%92%8C%E9%AA%8C%E8%AF%81%E7%AB%99%E7%82%B9%E5%88%B0%E7%AB%99%E7%82%B9ipsec-vpn/</guid>
      <description>&lt;h2 id=&#34;packettracer---使用命令行界面配置和验证站点到站点ipsec-vpn&#34;&gt;PacketTracer - 使用命令行界面配置和验证站点到站点IPsec VPN&lt;/h2&gt;
&lt;h3 id=&#34;地址表&#34;&gt;地址表&lt;/h3&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212547156.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212547156.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;验证整个网络的连通性。&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;配置R1以支持与R3之间的站点到站点IPsec VPN。&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;背景场景&#34;&gt;背景/场景&lt;/h3&gt;
&lt;p&gt;网络拓扑图显示了三个路由器。您的任务是配置R1和R3，以便在各自局域网（LAN）之间的流量流动时支持站点到站点的IPsec VPN。IPsec VPN隧道从R1经由R2到达R3。R2充当通过设备，并不了解VPN的存在。IPsec提供了一种在不受保护的网络（如互联网）上安全传输敏感信息的方法。IPsec在网络层运行，负责保护并验证参与IPsec设备（对等体）之间的IP数据包，例如Cisco路由器。&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packettracer---使用命令行界面配置和验证站点到站点ipsec-vpn">PacketTracer - 使用命令行界面配置和验证站点到站点IPsec VPN</h2>
<h3 id="地址表">地址表</h3>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212547156.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212547156.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<ul>
<li>
<p>验证整个网络的连通性。</p>
</li>
<li>
<p>配置R1以支持与R3之间的站点到站点IPsec VPN。</p>
</li>
</ul>
<h3 id="背景场景">背景/场景</h3>
<p>网络拓扑图显示了三个路由器。您的任务是配置R1和R3，以便在各自局域网（LAN）之间的流量流动时支持站点到站点的IPsec VPN。IPsec VPN隧道从R1经由R2到达R3。R2充当通过设备，并不了解VPN的存在。IPsec提供了一种在不受保护的网络（如互联网）上安全传输敏感信息的方法。IPsec在网络层运行，负责保护并验证参与IPsec设备（对等体）之间的IP数据包，例如Cisco路由器。</p>
<p><strong>ISAKMP阶段1策略参数</strong></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212549003.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212549003.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>注意：加粗参数为默认值。只有非加粗参数需要明确配置。</p>
<p><strong>IPsec阶段2策略参数</strong></p>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212550698.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212550698.png" 
             alt="（此处未给出具体参数，请补充完整）" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>路由器已预先配置以下内容：</p>
<p>· 控制台线路密码： <strong>ciscoconpa55</strong></p>
<p>· vty线路密码： <strong>ciscovtypa55</strong></p>
<p>· 启用密码： <strong>ciscoenpa55</strong></p>
<p>· SSH用户名和密码： <strong>SSHadmin / ciscosshpa55</strong></p>
<p>· OSPF进程号 <strong>101</strong></p>
<h3 id="第一部分在r1上配置ipsec参数">第一部分：在R1上配置IPsec参数</h3>
<p><strong>步骤1：测试连通性。</strong></p>
<p>从PC-A向PC-C发送ping请求。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212552384.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212552384.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤2：启用安全技术包。</strong></p>
<p>a. 在R1上执行 <code>show version</code> 命令查看安全技术包许可证信息。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212554645.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212554645.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>b. 如果未启用安全技术包，请使用以下命令启用该包。</p>
<blockquote>
<p>R1(config)# license boot module c1900 technology-package securityk9</p>
</blockquote>
<p>c. 接受最终用户许可协议。</p>
<p>d. 保存运行配置并重新加载路由器以启用安全许可证。</p>
<p>e. 使用 <code>show version</code> 命令验证是否已启用安全技术包。</p>
<p><strong>步骤3：在R1上识别感兴趣流量。</strong></p>
<p>配置 <strong>ACL 110</strong> ，将来自R1 LAN到R3 LAN的流量标识为“感兴趣”流量。当R1和R3之间的LAN之间存在流量时，这种感兴趣的流量会触发实施IPsec VPN。除了这些流量外，所有其他源自LAN的流量都不会被加密。由于存在隐式拒绝所有规则，因此无需配置deny ip any any语句。</p>
<blockquote>
<p>R1(config)# access-list 110 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255</p>
</blockquote>
<p><strong>步骤4：在R1上配置IKE阶段1 ISAKMP策略。</strong></p>
<p>在R1上配置crypto ISAKMP策略 <strong>10</strong> 属性以及共享的crypto密钥 <strong>vpnpa55</strong> 。请参考ISAKMP阶段1表中特定的参数进行配置。默认值不需要配置，因此只需要配置加密方法、密钥交换方法和DH方法。</p>
<p>注：当前Packet Tracer支持的最大DH组是组5。在生产网络中，您至少应配置DH 14。</p>
<blockquote>
<p>R1(config)# crypto isakmp policy 10
R1(config-isakmp)# encryption aes 256
R1(config-isakmp)# authentication pre-share
R1(config-isakmp)# group 5
R1(config-isakmp)# exit
R1(config)# crypto isakmp key vpnpa55 address 10.2.2.2</p>
</blockquote>
<p><strong>步骤5：在R1上配置IKE阶段2 IPsec策略。</strong></p>
<p>a. 创建名为VPN-SET的转换集，使用 <strong>esp-aes</strong> 和 <strong>esp-sha-hmac</strong> 。</p>
<blockquote>
<p>R1(config)# crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac</p>
</blockquote>
<p>b. 创建名为VPN-MAP的crypto映射，将所有阶段2参数绑定在一起。使用序列号10，并将其标识为ipsec-isakmp映射。</p>
<blockquote>
<p>R1(config)# crypto map VPN-MAP 10 ipsec-isakmp
R1(config-crypto-map)# description VPN connection to R3
R1(config-crypto-map)# set peer 10.2.2.2
R1(config-crypto-map)# set transform-set VPN-SET
R1(config-crypto-map)# match address 110
R1(config-crypto-map)# exit</p>
</blockquote>
<p><strong>步骤6：配置接口上的crypto映射。</strong></p>
<p>将VPN-MAP crypto映射绑定到 <strong>Serial 0/0/0</strong> 出站接口。</p>
<blockquote>
<p>R1(config)# interface s0/0/0
R1(config-if)# crypto map VPN-MAP</p>
</blockquote>
<h3 id="第二部分在r3上配置ipsec参数">第二部分：在R3上配置IPsec参数</h3>
<p><strong>步骤1：启用安全技术包。</strong></p>
<p>a. 在R3上执行 <code>show version</code> 命令以验证是否已启用安全技术包许可证信息。</p>
<p>b. 如果尚未启用安全技术包，则启用该包并重新加载R3。</p>
<p><strong>步骤2：配置路由器R3以支持与R1的站点到站点VPN。</strong></p>
<p>在R3上配置相应的参数。配置 <strong>ACL 110</strong> ，将来自R3 LAN到R1 LAN的流量标识为“感兴趣”流量。</p>
<blockquote>
<p>R3(config)# access-list 110 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255</p>
</blockquote>
<p><strong>步骤3：在R3上配置IKE阶段1 ISAKMP属性。</strong></p>
<p>在R3上配置crypto ISAKMP策略 <strong>10</strong> 属性以及共享的crypto密钥 <strong>vpnpa55</strong> 。</p>
<blockquote>
<p>R3(config)# crypto isakmp policy 10
R3(config-isakmp)# encryption aes 256
R3(config-isakmp)# authentication pre-share
R3(config-isakmp)# group 5
R3(config-isakmp)# exit
R3(config)# crypto isakmp key vpnpa55 address 10.1.1.2</p>
</blockquote>
<p><strong>步骤4：在R3上配置IKE阶段2 IPsec策略。</strong></p>
<p>a. 创建名为VPN-SET的转换集，使用 <strong>esp-aes</strong> 和 <strong>esp-sha-hmac</strong> 。</p>
<blockquote>
<p>R3(config)# crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac</p>
</blockquote>
<p>b. 创建名为VPN-MAP的crypto映射，将所有阶段2参数绑定在一起。使用序列号 <strong>10</strong> ，并将其标识为ipsec-isakmp映射。</p>
<blockquote>
<p>R3(config)# crypto map VPN-MAP 10 ipsec-isakmp
R3(config-crypto-map)# description VPN connection to R1
R3(config-crypto-map)# set peer 10.1.1.2
R3(config-crypto-map)# set transform-set VPN-SET
R3(config-crypto-map)# match address 110
R3(config-crypto-map)# exit</p>
</blockquote>
<p><strong>步骤5：配置接口上的crypto映射。</strong></p>
<p>将VPN-MAP crypto映射绑定到 <strong>Serial 0/0/1</strong> 出站接口（注意：此操作不会被评估）。</p>
<blockquote>
<p>R3(config)# interface s0/0/1
R3(config-if)# crypto map VPN-MAP</p>
</blockquote>
<h3 id="第三部分验证ipsec-vpn">第三部分：验证IPsec VPN</h3>
<p><strong>步骤1：在出现感兴趣流量之前验证隧道。</strong></p>
<p>在R1上执行 <code>show crypto ipsec sa</code> 命令。注意封装、加密、解封装和解密的包数量均设置为 <strong>0</strong> 。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212557007.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212557007.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤2：创建感兴趣流量。</strong></p>
<p>从PC-A向PC-C发送ping请求。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212558358.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212558358.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤3：在产生感兴趣流量后验证隧道。</strong></p>
<p>在R1上重新执行 <code>show crypto ipsec sa</code> 命令。注意包的数量大于0，这表明IPsec VPN隧道正在工作。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212600560.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212600560.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤4：创建非感兴趣流量。</strong></p>
<p>从PC-A向PC-B发送ping请求。注：从路由器R1向PC-C或R3向PC-A发送ping请求不属于感兴趣流量。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212602410.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212602410.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤5：再次验证隧道。</strong></p>
<p>在R1上重新执行 <code>show crypto ipsec sa</code> 命令。注意包的数量没有改变，这证实了非感兴趣流量并未被加密。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212604285.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212604285.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤6：检查结果。</strong></p>
<p>您的完成百分比应为100%。点击“CheckResults”查看反馈信息以及已完成的必要组件验证。</p>
<h3 id="实验脚本">实验脚本：</h3>
<p><strong>R1:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">crypto isakmp policy <span class="m">10</span>
</span></span><span class="line"><span class="cl"> encr aes <span class="m">256</span>
</span></span><span class="line"><span class="cl"> authentication pre-share
</span></span><span class="line"><span class="cl"> group <span class="m">5</span>
</span></span><span class="line"><span class="cl"> 
</span></span><span class="line"><span class="cl">crypto isakmp key vpnpa55 address 10.2.2.2
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">access-list <span class="m">110</span> permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">crypto map VPN-MAP <span class="m">10</span> ipsec-isakmp 
</span></span><span class="line"><span class="cl"> description VPN connection to R3
</span></span><span class="line"><span class="cl"> <span class="nb">set</span> peer 10.2.2.2
</span></span><span class="line"><span class="cl"> <span class="nb">set</span> transform-set VPN-SET 
</span></span><span class="line"><span class="cl"> match address <span class="m">110</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">interface Serial0/0/0
</span></span><span class="line"><span class="cl"> crypto map VPN-MAP
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>R3:</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">crypto isakmp policy <span class="m">10</span>
</span></span><span class="line"><span class="cl"> encr aes <span class="m">256</span>
</span></span><span class="line"><span class="cl"> authentication pre-share
</span></span><span class="line"><span class="cl"> group <span class="m">5</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">crypto isakmp key vpnpa55 address 10.1.1.2
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">crypto ipsec transform-set VPN-SET esp-aes esp-sha-hmac
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">access-list <span class="m">110</span> permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">crypto map VPN-MAP <span class="m">10</span> ipsec-isakmp 
</span></span><span class="line"><span class="cl"> description VPN connection to R1
</span></span><span class="line"><span class="cl"> <span class="nb">set</span> peer 10.1.1.2
</span></span><span class="line"><span class="cl"> <span class="nb">set</span> transform-set VPN-SET 
</span></span><span class="line"><span class="cl"> match address <span class="m">110</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">interface Serial0/0/1
</span></span><span class="line"><span class="cl"> crypto map VPN-MAP
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
    <item>
      <title>Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI（使用CLI配置ASA基本设置和防火墙）</title>
      <link>https://yuexuan521.github.io/zh/posts/packet-tracer-configuring-asa-basic-settings-and-firewall-using-cli%E4%BD%BF%E7%94%A8cli%E9%85%8D%E7%BD%AEasa%E5%9F%BA%E6%9C%AC%E8%AE%BE%E7%BD%AE%E5%92%8C%E9%98%B2%E7%81%AB%E5%A2%99/</link>
      <pubDate>Thu, 23 Jan 2025 12:46:18 +0000</pubDate>
      <guid>https://yuexuan521.github.io/zh/posts/packet-tracer-configuring-asa-basic-settings-and-firewall-using-cli%E4%BD%BF%E7%94%A8cli%E9%85%8D%E7%BD%AEasa%E5%9F%BA%E6%9C%AC%E8%AE%BE%E7%BD%AE%E5%92%8C%E9%98%B2%E7%81%AB%E5%A2%99/</guid>
      <description>&lt;h2 id=&#34;packet-tracer---使用cli配置asa基本设置和防火墙&#34;&gt;Packet Tracer - 使用CLI配置ASA基本设置和防火墙&lt;/h2&gt;
&lt;h3 id=&#34;ip地址表&#34;&gt;IP地址表&lt;/h3&gt;
&lt;p&gt;
&lt;div class=&#34;post-img-view&#34;&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212646524.png&#34;&gt;
        &lt;img src=&#34;https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212646524.png&#34; 
             alt=&#34;在这里插入图片描述&#34; 
              
             loading=&#34;lazy&#34;
        /&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;/p&gt;
&lt;h3 id=&#34;目标&#34;&gt;目标&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;验证连接并探索ASA设备&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;使用CLI配置ASA的基本设置和接口安全级别&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;使用CLI配置路由、地址转换和检查策略&lt;/p&gt;</description>
      <content:encoded><![CDATA[<h2 id="packet-tracer---使用cli配置asa基本设置和防火墙">Packet Tracer - 使用CLI配置ASA基本设置和防火墙</h2>
<h3 id="ip地址表">IP地址表</h3>
<p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212646524.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212646524.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="目标">目标</h3>
<ul>
<li>
<p>验证连接并探索ASA设备</p>
</li>
<li>
<p>使用CLI配置ASA的基本设置和接口安全级别</p>
</li>
<li>
<p>使用CLI配置路由、地址转换和检查策略</p>
</li>
<li>
<p>配置DHCP、AAA和SSH服务</p>
</li>
<li>
<p>配置DMZ区域、静态NAT和访问控制列表（ACL）</p>
</li>
</ul>
<h3 id="场景">场景</h3>
<p>您的公司有一个地点通过ISP进行互联网接入。R1代表由ISP管理的CPE设备。R2代表一个互联网路由器中继节点。R3代表一个ISP，它连接着一家网络管理公司的管理员，该管理员受雇远程管理您的网络。ASA是一个边缘CPE安全设备，将内部企业网络和DMZ区域连接到ISP，并为内部主机提供NAT和DHCP服务。ASA将被配置以允许内部网络的管理员以及远程管理员对其进行管理。三层VLAN接口提供了对活动中创建的三个区域——Inside区域、Outside区域和DMZ区域的访问权限。ISP分配了公共IP地址空间209.165.200.224/29，将在ASA上用于地址转换。</p>
<p>所有路由器和交换机设备已预先配置以下信息：</p>
<ul>
<li>
<p>启用密码： <strong>ciscoenpa55</strong></p>
</li>
<li>
<p>控制台密码： <strong>ciscoconpa55</strong></p>
</li>
<li>
<p>管理员用户名及密码： <strong>admin/adminpa55</strong></p>
</li>
</ul>
<p>注意：此Packet Tracer活动并不能替代ASA实验室练习。这个活动提供了额外的实践机会，模拟了大部分ASA 5505设备的配置过程。与真实的ASA 5505相比，在命令输出或部分尚未在Packet Tracer中支持的命令上可能存在细微差别。</p>
<h3 id="第一部分验证连接和探索asa设备">第一部分：验证连接和探索ASA设备</h3>
<p>注：此Packet Tracer活动开始时，有20%的评估项已被标记为已完成。这是为了确保您不会意外更改ASA的某些默认值。例如，默认情况下内部接口名称为“inside”，不应更改。点击“检查结果”查看哪些评估项已经被正确评分。</p>
<p><strong>步骤1：验证网络连接性。</strong></p>
<p>目前ASA尚未配置，但所有路由器、PC以及DMZ服务器都已配置完毕。请确认PC-C可以ping通任何路由器接口。请注意，此时PC-C无法ping通ASA、PC-B或DMZ服务器。</p>
<p><strong>步骤2：确定ASA版本、接口及许可证信息。</strong></p>
<p>使用 <code>show version</code> 命令来了解ASA设备的各种特性。</p>
<p><strong>步骤3：确定文件系统及其闪存内存内容。</strong></p>
<p>a. 进入特权EXEC模式。当前未设置密码，当提示输入密码时直接按回车键。</p>
<p>b. 使用 <code>show file system</code> 命令显示ASA的文件系统，并确定支持哪些前缀。</p>
<p>c. 使用 <code>show flash:</code> 或 <code>show disk0:</code> 命令来显示闪存内存的内容。</p>
<h3 id="第二部分使用cli配置asa设置和接口安全">第二部分：使用CLI配置ASA设置和接口安全</h3>
<p>提示：许多ASA CLI命令与Cisco IOS CLI中的命令相似，甚至相同。此外，在不同配置模式及子模式之间切换的过程本质上是相同的。</p>
<p><strong>步骤1：配置主机名和域名。</strong></p>
<p>a. 配置ASA主机名为 <strong>CCNAS-ASA</strong> 。</p>
<p>b. 配置域名为 <strong>ccnasecurity.com</strong> 。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">ciscoasa(config)#hostname CCNAS-ASA
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)#domain-name ccnasecurity.com
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤2：配置启用模式密码。</strong></p>
<p>使用 <code>enable password</code> 命令将特权EXEC模式密码更改为 <strong>ciscoenpa55</strong> 。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)#enable password ciscoenpa55
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤3：设置日期和时间。</strong></p>
<p>使用 <code>clock set</code> 命令手动设置日期和时间（此步骤不计入评分）。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)#clock set 21:42:25 May 11 2023
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤4：配置内部和外部接口。</strong></p>
<p>此时您只需配置VLAN 1（内部）和VLAN 2（外部）接口。VLAN 3（dmz）接口将在活动的第五部分进行配置。</p>
<p>a. 为内部网络（192.168.1.0/24）配置逻辑VLAN 1接口，并将其安全级别设置为最高值 <strong>100</strong> 。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# interface vlan 1
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# nameif inside
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# ip address 192.168.1.1 255.255.255.0
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# security-level 100
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 为外部网络（209.165.200.224/29）创建逻辑VLAN 2接口，将其安全级别设置为最低值 <strong>0</strong> ，并启用VLAN 2接口。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config-if)# interface vlan 2
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# nameif outside
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# ip address 209.165.200.226 255.255.255.248
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-if)# security-level 0
</span></span></code></pre></td></tr></table>
</div>
</div><p>c. 使用以下验证命令检查您的配置：</p>
<ol>
<li>使用 <code>show interface ip brief</code> 命令显示所有ASA接口的状态。注意：这个命令与IOS命令show ip interface brief不同。如果之前配置的任何物理或逻辑接口状态不是up/up，请根据需要排查问题后再继续。</li>
</ol>
<p>提示：大多数ASA show命令，包括ping、copy等，无需do命令即可在任意配置模式提示符下执行。</p>
<ol>
<li>
<p>使用 <code>show ip address</code> 命令显示三层VLAN接口的信息。</p>
</li>
<li>
<p>使用 <code>show switch vlan</code> 命令显示ASA上配置的内部和外部VLAN以及分配的端口。</p>
</li>
</ol>
<p><strong>步骤5：测试到ASA的连接性。</strong></p>
<p>a. 应该可以从PC-B成功ping通ASA内部接口地址（192.168.1.1）。如果无法ping通，请按需排查配置问题。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212649034.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212649034.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>b. 从PC-B尝试ping VLAN 2（外部）接口的IP地址209.165.200.226。理论上您不应该能ping通这个地址。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212651625.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212651625.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第三部分使用cli配置路由地址转换和检查策略">第三部分：使用CLI配置路由、地址转换和检查策略</h3>
<p><strong>步骤1：为ASA配置静态默认路由。</strong></p>
<p>在ASA外部接口上配置默认静态路由，以便ASA能够访问外部网络。</p>
<p>a. 使用 <code>route</code> 命令创建一个“全零”默认路由，将其与ASA外部接口关联，并将R1 G0/0 IP地址（209.165.200.225）设置为最后手段网关。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# route outside 0.0.0.0 0.0.0.0 209.165.200.225
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 发出 <code>show route</code> 命令以验证静态默认路由是否存在于ASA路由表中。</p>
<p>c. 验证ASA能否ping通R1 S0/0/0 IP地址10.1.1.1。如果无法ping通，请按需排查问题。</p>
<p><strong>步骤2：使用PAT和网络对象配置地址转换。</strong></p>
<p>a. 创建名为 <strong>inside-net</strong> 的网络对象，并使用subnet和nat命令为其分配属性。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# object network inside-net
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# subnet 192.168.1.0 255.255.255.0
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# nat (inside,outside) dynamic interface
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# end
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. ASA将配置拆分为定义要转换的网络的对象部分以及实际的nat命令参数。这些内容会在运行配置中的两个不同位置显示。使用 <code>show run</code> 命令显示NAT对象配置。</p>
<p>c. 从PC-B尝试ping R1 G0/0接口IP地址209.165.200.225。这些ping请求应失败。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212653563.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212653563.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>d. 在ASA上发出 <code>show nat</code> 命令查看已翻译和未翻译的命中次数。请注意，来自PC-B的ping请求中有四个被翻译，四个未被翻译。外出的ping（echo请求）已被翻译并发送至目标。返回的echo响应由于防火墙策略而被阻止。您将在本部分活动的第3步配置默认检查策略以允许ICMP流量。</p>
<p><strong>步骤3：修改默认MPF应用检查全局服务策略。</strong></p>
<p>为了实现应用层检查和其他高级选项，Cisco ASA设备提供了MPF功能。</p>
<p>Packet Tracer ASA设备默认没有MPF策略映射。作为修改，我们可以创建一个默认策略映射，用于对内部到外部的流量进行检查。正确配置后，只有由内部发起的流量才被允许回传到外部接口。您需要将ICMP添加到检查列表中。</p>
<p>a. 使用以下命令创建类图、策略映射和服务策略，并在策略映射列表中添加ICMP流量的检查：</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span><span class="lnt">7
</span><span class="lnt">8
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# class-map inspection_default
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-cmap)# match default-inspection-traffic
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-cmap)# exit
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)# policy-map global_policy
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-pmap)# class inspection_default
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-pmap-c)# inspect icmp
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-pmap-c)# exit
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)# service-policy global_policy global
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 从PC-B再次尝试ping R1 G0/0接口IP地址209.165.200.225。这次ping应该成功，因为现在ICMP流量正在被检查，合法的返回流量被允许通过。若ping失败，请排查您的配置。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212655546.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212655546.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第四部分配置dhcpaaa和ssh">第四部分：配置DHCP、AAA和SSH</h3>
<p><strong>步骤1：配置ASA作为DHCP服务器。</strong></p>
<p>a. 在ASA内部接口上配置DHCP地址池并启用它。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# dhcpd address 192.168.1.5-192.168.1.36 inside
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. （可选）指定给客户端提供的DNS服务器IP地址。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# dhcpd dns 209.165.201.2 interface inside
</span></span></code></pre></td></tr></table>
</div>
</div><p>c. 在ASA内启用DHCP守护进程，使其监听内部接口上的DHCP客户端请求。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# dhcpd enable inside
</span></span></code></pre></td></tr></table>
</div>
</div><p>d. 将PC-B从静态IP地址更改为DHCP客户端，并验证其是否接收到IP地址信息。如有必要，请解决任何问题。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212657871.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212657871.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p><strong>步骤2：配置AAA以使用本地数据库进行身份验证。</strong></p>
<p>a. 使用username命令定义一个名为admin的本地用户，并指定密码adminpa55。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# username admin password adminpa55
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 配置AAA以使用本地ASA数据库进行SSH用户身份验证。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# aaa authentication ssh console LOCAL
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤3：配置远程访问ASA。</strong></p>
<p>ASA可以配置为接受来自内部或外部网络的单个主机或范围内的主机连接。在此步骤中，外部网络的主机只能通过SSH与ASA通信。SSH会话可用于从内部网络访问ASA。</p>
<p>a. 生成RSA密钥对，这是支持SSH连接所必需的。由于ASA设备已经有RSA密钥存在，当提示替换它们时请输入no。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# crypto key generate rsa modulus 1024
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 配置ASA以允许来自内部网络（192.168.1.0/24）和外部网络分支办公室远程管理主机（172.16.3.3）的任何主机通过SSH进行连接。设置SSH超时时间为10分钟（默认为5分钟）。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# ssh 192.168.1.0 255.255.255.0 inside
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)# ssh 172.16.3.3 255.255.255.255 outside
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)# ssh timeout 10
</span></span></code></pre></td></tr></table>
</div>
</div><p>c. 从PC-C通过SSH建立到ASA（209.165.200.226）的会话。如不成功，请排查问题。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">PC&gt; ssh -l admin 209.165.200.226
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212700132.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212700132.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<p>d. 从PC-B通过SSH建立到ASA（192.168.1.1）的会话。如不成功，请排查问题。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">PC&gt; ssh -l admin 192.168.1.1
</span></span></code></pre></td></tr></table>
</div>
</div><p>
<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212701975.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212701975.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
<h3 id="第五部分配置dmz静态nat和acl">第五部分：配置DMZ、静态NAT和ACL</h3>
<p>R1 G0/0接口与ASA的外部接口分别使用209.165.200.225和.226。您将使用公网地址209.165.200.227，并通过静态NAT提供对服务器的地址转换访问。</p>
<p><strong>步骤1：在ASA上配置DMZ接口VLAN 3。</strong></p>
<p>a. 配置DMZ VLAN 3，该VLAN将是公共访问Web服务器所在的位置。为它分配IP地址192.168.2.1/24，并命名为 <strong>dmz</strong> ，同时为其设置安全级别为 <strong>70</strong> 。由于服务器无需主动与内部用户通信，因此禁用到接口VLAN 1的转发。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-shell" data-lang="shell"><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config<span class="o">)</span><span class="c1"># interface vlan 3</span>
</span></span><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># ip address 192.168.2.1 255.255.255.0</span>
</span></span><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># no forward interface vlan 1</span>
</span></span><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># nameif dmz</span>
</span></span><span class="line"><span class="cl">INFO: Security level <span class="k">for</span> <span class="s2">&#34;dmz&#34;</span> <span class="nb">set</span> to <span class="m">0</span> by default.
</span></span><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># security-level 70</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>b. 将ASA物理接口E0/2分配给DMZ VLAN 3并启用此接口。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-shell" data-lang="shell"><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># interface Ethernet0/2</span>
</span></span><span class="line"><span class="cl">CCNAS-ASA<span class="o">(</span>config-if<span class="o">)</span><span class="c1"># switchport access vlan 3</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p>c. 使用以下验证命令检查您的配置：</p>
<ol>
<li>
<p>使用 <code>show interface ip brief</code> 命令显示所有ASA接口的状态。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212704275.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212704275.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
</li>
<li>
<p>使用 <code>show ip address</code> 命令显示第3层VLAN接口的信息。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212706400.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212706400.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
</li>
<li>
<p>使用 <code>show switch vlan</code> 命令显示ASA上的inside和outside VLAN配置以及分配的端口信息。

<div class="post-img-view">
    <a data-fancybox="gallery" href="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212708670.png">
        <img src="https://cdn.jsdelivr.net/gh/yuexuan521/image/20251228212708670.png" 
             alt="在这里插入图片描述" 
              
             loading="lazy"
        />
    </a>
</div></p>
</li>
</ol>
<p><strong>步骤2：使用网络对象配置到DMZ服务器的静态NAT。</strong></p>
<p>配置一个名为dmz-server的网络对象，并将其分配给DMZ服务器的静态IP地址（192.168.2.3）。在定义对象模式下，使用nat命令指定此对象用于使用静态NAT将DMZ地址翻译为外部地址，并指定公开翻译地址209.165.200.227。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# object network dmz-server
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# host 192.168.2.3
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# nat (dmz,outside) static 209.165.200.227
</span></span><span class="line"><span class="cl">CCNAS-ASA(config-network-object)# exit
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>步骤3：配置ACL以允许从互联网访问DMZ服务器。</strong></p>
<p>配置一个名为OUTSIDE-DMZ的命名访问列表，允许来自任何外部主机到DMZ服务器内部IP地址的TCP协议在端口80上进行通信。将访问列表应用到ASA的外部接口的“IN”方向。</p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-fallback" data-lang="fallback"><span class="line"><span class="cl">CCNAS-ASA(config)# access-list OUTSIDE-DMZ permit tcp any host 192.168.2.3 eq 80
</span></span><span class="line"><span class="cl">CCNAS-ASA(config)# access-group OUTSIDE-DMZ in interface outside
</span></span></code></pre></td></tr></table>
</div>
</div><p>注：与IOS ACL不同，ASA ACL的permit语句必须允许对内部私有DMZ地址的访问。外部主机通过服务器的公共静态NAT地址访问服务器，ASA将其翻译成内部主机IP地址，然后应用ACL。</p>
<p><strong>步骤4：测试对DMZ服务器的访问。</strong></p>
<p>在创建Packet Tracer活动时，成功测试外部对DMZ Web服务器的访问功能并未实现；因此，不强制要求成功测试。</p>
<p><strong>步骤5：检查结果。</strong></p>
<p>完成百分比应为100%。点击“Check Results”查看反馈和已完成所需组件的验证。</p>
<h3 id="实验脚本">实验脚本：</h3>
<p><strong>第一部分：验证连接和探索ASA设备</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">hostname CCNAS-ASA
</span></span><span class="line"><span class="cl">domain-name ccnasecurity.com
</span></span><span class="line"><span class="cl"><span class="nb">enable</span> password ciscoenpa55
</span></span><span class="line"><span class="cl">clock <span class="nb">set</span> 10:38:00 <span class="m">22</span> dec <span class="m">2020</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>第二部分：使用CLI配置ASA设置和接口安全</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span><span class="lnt">12
</span><span class="lnt">13
</span><span class="lnt">14
</span><span class="lnt">15
</span><span class="lnt">16
</span><span class="lnt">17
</span><span class="lnt">18
</span><span class="lnt">19
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">interface vlan <span class="m">1</span>
</span></span><span class="line"><span class="cl">nameif inside
</span></span><span class="line"><span class="cl">ip address 192.168.1.1 255.255.255.0
</span></span><span class="line"><span class="cl">security-level <span class="m">100</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">interface vlan <span class="m">2</span>
</span></span><span class="line"><span class="cl">nameif outside
</span></span><span class="line"><span class="cl">ip address 209.165.200.226 255.255.255.248
</span></span><span class="line"><span class="cl">security-level <span class="m">0</span>
</span></span><span class="line"><span class="cl">interface Ethernet0/0
</span></span><span class="line"><span class="cl">switchport access vlan <span class="m">2</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">interface vlan <span class="m">3</span>
</span></span><span class="line"><span class="cl">ip address 192.168.2.1 255.255.255.0
</span></span><span class="line"><span class="cl">no forward interface vlan <span class="m">1</span>
</span></span><span class="line"><span class="cl">nameif dmz
</span></span><span class="line"><span class="cl">security-level <span class="m">70</span>
</span></span><span class="line"><span class="cl">interface Ethernet0/2
</span></span><span class="line"><span class="cl">switchport access vlan <span class="m">3</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>第三部分：使用CLI配置路由、地址转换和检查策略</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt">1
</span><span class="lnt">2
</span><span class="lnt">3
</span><span class="lnt">4
</span><span class="lnt">5
</span><span class="lnt">6
</span><span class="lnt">7
</span><span class="lnt">8
</span><span class="lnt">9
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">route outside 0.0.0.0 0.0.0.0 209.165.200.225
</span></span><span class="line"><span class="cl">class-map inspection_default
</span></span><span class="line"><span class="cl">match default-inspection-traffic
</span></span><span class="line"><span class="cl"><span class="nb">exit</span>
</span></span><span class="line"><span class="cl">policy-map global_policy
</span></span><span class="line"><span class="cl">class inspection_default
</span></span><span class="line"><span class="cl">inspect icmp
</span></span><span class="line"><span class="cl"><span class="nb">exit</span>
</span></span><span class="line"><span class="cl">service-policy global_policy global
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>第四部分：配置DHCP、AAA和SSH</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">dhcpd address 192.168.1.5-192.168.1.36 inside
</span></span><span class="line"><span class="cl">dhcpd dns 209.165.201.2 interface inside
</span></span><span class="line"><span class="cl">dhcpd <span class="nb">enable</span> inside
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">username admin password adminpa55
</span></span><span class="line"><span class="cl">crypto key generate rsa modulus <span class="m">1024</span> <span class="c1">#no</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">aaa authentication ssh console LOCAL
</span></span><span class="line"><span class="cl">ssh 192.168.1.0 255.255.255.0 inside
</span></span><span class="line"><span class="cl">ssh 172.16.3.3 255.255.255.255 outside
</span></span><span class="line"><span class="cl">ssh timeout <span class="m">10</span>
</span></span></code></pre></td></tr></table>
</div>
</div><p><strong>第五部分：配置DMZ、静态NAT和ACL</strong></p>
<div class="highlight"><div class="chroma">
<table class="lntable"><tr><td class="lntd">
<pre tabindex="0" class="chroma"><code><span class="lnt"> 1
</span><span class="lnt"> 2
</span><span class="lnt"> 3
</span><span class="lnt"> 4
</span><span class="lnt"> 5
</span><span class="lnt"> 6
</span><span class="lnt"> 7
</span><span class="lnt"> 8
</span><span class="lnt"> 9
</span><span class="lnt">10
</span><span class="lnt">11
</span></code></pre></td>
<td class="lntd">
<pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl">object network dmz-server
</span></span><span class="line"><span class="cl">host 192.168.2.3
</span></span><span class="line"><span class="cl">nat <span class="o">(</span>dmz,outside<span class="o">)</span> static 209.165.200.227
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">object network inside-net
</span></span><span class="line"><span class="cl">subnet 192.168.1.0 255.255.255.0
</span></span><span class="line"><span class="cl">nat <span class="o">(</span>inside,outside<span class="o">)</span> dynamic interface
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl">access-list OUTSIDE-DMZ permit icmp any host 192.168.2.3
</span></span><span class="line"><span class="cl">access-list OUTSIDE-DMZ permit tcp any host 192.168.2.3 eq <span class="m">80</span>
</span></span><span class="line"><span class="cl">access-group OUTSIDE-DMZ in interface outside
</span></span></code></pre></td></tr></table>
</div>
</div>]]></content:encoded>
    </item>
  </channel>
</rss>
