您好,登錄后才能下訂單哦!
一、實驗一:配置No-Pat
1、基本配置略:
2、R1開啟Telnet功能:
[R1]user-interface vty 0 4
[R1-ui-vty0-4]authentication-mode password ?
<cr>Please press ENTER to execute command
[R1-ui-vty0-4]authentication-mode password
Please configure the login password (maximum length 16):cisco
[R1-ui-vty0-4]user privilege level 15
3、配置Trust到Untrust的Zone間策略:
[SRG]policy interzone trust untrust outbound
[SRG-policy-interzone-trust-untrust-outbound]policy create-mode auto-sort enable
[SRG-policy-interzone-trust-untrust-outbound]policy 5
[SRG-policy-interzone-trust-untrust-outbound-5]policy source 192.168.1.0 mask 24
[SRG-policy-interzone-trust-untrust-outbound-5]policy destination 202.100.1.0 mask 24
[SRG-policy-interzone-trust-untrust-outbound-5]policy service service-set telnet
[SRG-policy-interzone-trust-untrust-outbound-5]policy service service-set icmp
[SRG-policy-interzone-trust-untrust-outbound-5]action permit
4、NAT未部署前地址未轉換:
<R2>telnet 202.100.1.1
Login authentication
Password:cisco
5、配置no-pat:
[SRG]nat address-group 1 202.100.1.10 202.100.1.20 //創建地址組
[SRG]nat-policy interzone trust untrust outbound //創建Zone間NAT策略
[SRG-nat-policy-interzone-trust-untrust-outbound]policy 0
[SRG-nat-policy-interzone-trust-untrust-outbound-0]policy source 192.168.1.0 mask 24 //需要轉換的源地址段
[SRG-nat-policy-interzone-trust-untrust-outbound-0]address-group 1 no-pat //轉換后的地址組,并且不轉換到端口
[SRG-nat-policy-interzone-trust-untrust-outbound-0]action source-nat //執行源轉換動作
測試:
<R2>telnet 202.100.1.1
查看防火墻會話轉換:
[SRG]display firewall session table verbose //源端口50573,轉換后端口依然是50573
查看防火墻Map:
[SRG]display firewall server-map
二:實驗二:配置PAT,有外部地址池的端口轉換
[SRG-nat-policy-interzone-trust-untrust-outbound-0]undo address-group
[SRG-nat-policy-interzone-trust-untrust-outbound-0]address-group 1
測試:
<R2>telnet 202.100.1.1
[SRG]display firewall session table verbose
三、實驗三:配置Easy-IP,轉換192.168.1.2到USG的g0/0/0接口地址
[SRG]nat-policy interzone trust untrust outbound
[SRG-nat-policy-interzone-trust-untrust-outbound-1]policy 0
[SRG-nat-policy-interzone-trust-untrust-outbound-0]undo address-group
[SRG-nat-policy-interzone-trust-untrust-outbound-0]easy-ip GigabitEthernet 0/0/0
測試:
[SRG]display firewall session table verbose
免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:is@yisu.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。