Cisco PIX 525 Especificações Página 80

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 466
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 79
2-20
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Configuring the PIX Firewall for Routing
To move the network 10.130.12.0 255.255.255.0 area 10.130.12.0 to router ospf 10, enter the following
commands:
pixfirewall(config-router)# router ospf 50
pixfirewall(config-router)# no network 10.130.12.0 255.255.255.0 area 10.130.12.0
pixfirewall(config-router)# router ospf 10
pixfirewall(config-router)# network 10.130.12.0 255.255.255.0 area 10.130.12.0
pixfirewall(config-router)# s router
router ospf 10
network 10.130.12.0 255.255.255.0 area 10.130.12.0
distance ospf intra-area 130 inter-area 120
log-adj-changes
router ospf 50
network 10.132.12.0 255.255.255.0 area 0
network 10.139.12.0 255.255.255.0 area 50
area 50 stub
log-adj-changes
Using OSPF in Private and Public Networks
When NAT is used and OSPF is operating on public and private areas you need to run two OSPF
processes to prevent the advertising of private networks in public areas. This lets you use NAT and OSPF,
without advertising private networks.
In this implementation, the PIX Firewall is used as an ASBR with NAT enabled on both the inside
interface and on the DMZ, with all interfaces running OSPF. This configuration allows both the inside
and DMZ interfaces to learn routes dynamically from all areas, while preventing the private routes from
being propagated onto the backbone or public areas.
Follow these steps to configure this implementation on the PIX Firewall:
Step 1 To configure the PIX Firewall interfaces, enter the following commands:
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
ip address outside 1.1.1.1 255.255.255.0
ip address inside 10.0.0.1 255.0.0.0
ip address dmz 192.168.1.1 255.255.255.0
Step 2 To configure the static routes, enter the following commands:
static (inside,outside) 1.1.1.2 10.1.1.2 255.255.255.255
static (dmz,outside)1.1.1.3 192.168.1.3 255.255.255.255
Step 3 Configure NAT by entering the following commands:
nat (inside) 1 0 0
nat (dmz)1 0 0
global (outside) 1 1.1.1.4-1.1.1.254
Step 4 Configure OSPF by entering the following commands:
router ospf 1 //public AS
network 1.1.1.0 255.255.255.0 area 0
router ospf 2 //private AS
redistribute ospf 1 //import the public external routes
network 10.0.0.0 255.0.0.0 area 10.0.0.0
network 192.168.1.0 255.255.255.0 area 192.168.1.0
Vista de página 79
1 2 ... 75 76 77 78 79 80 81 82 83 84 85 ... 465 466

Comentários a estes Manuais

Sem comentários