网站首页  注册会员  本站免费电影 留言板  繁體中文

 

您现在的位置: 陈鹏个人网站 >> 电脑应用 >> 网络应用 >> 组网维护 >> 正文
 

   
专 题 栏 目
相 关 文 章

360杀毒“暗杀”瑞星个人
360ARP防火墙v2.0.0.100
拒绝病毒 ARP防火墙单机
保护安全 USBkill 1.0 U
聊天软件突破防火墙终极
MSN与IE及Windows防火墙
配置防火墙和Web代理客户
加一道防护网:Win2008的
研究Linux下Firewall防火
让Vista防火墙独当一面的

 
加装防火墙前后的路由器配置           
加装防火墙前后的路由器配置
作者:陈鹏 文章来源:eNet 点击数: 更新时间:2009-9-11 1:39:52
 




 

随着人们对网络知识的普及,企业或公司的网络安全性,就变得更加重要起来了。关于网络安全的最可靠方法是加装防火墙。

  在这里我讲述一下关于加装防火墙前后的路由配置变化,因为在原先没有防火墙的情况下,路由既起到路由选择的作用,又起到网关的作用。当加装防火墙的后,局域网的网关就设为防火墙的局域网IP地址。要修改路由首先还是先看该网络的拓扑结构。在这里我所描述的是这样拓扑结构:

  图1

  

防火墙


  一、先将进入路由器设置将原来的配置备份一份,虽然这一份备份以后不一定用的上,可是万一防火墙安装失败呢?


  下面为没有安装防火墙以前的路由器配置情况。

User Access Verification

Password: (键入TELNET密码,如果你是直接用CONSOLE口进入没有此项提示)

Router>en

Password:

Router#show config (察看ROUTER配置情况命令)

Using 810 out of 7506 bytes

!

version 12.1

service timestamps debug uptime

service timestamps log uptime

no service password-encryption

!

hostname Router (ROUTER名字,这里为默认名字ROUTER)

!

enable secret 5 $1$FreK$4oQGtvDEF1jv8dh3NNXnN0.

enable password 123456789 (特权密码,当然这是加密的)

!

ip subnet-zero

!

interface Ethernet0 (配置局域网e0口)

ip address 192.168.1.1 255.255.255.0 (e0口在其局域网中对应的ip为192.168.1.1

ip nat inside 255.255.255.0是表示为C类网络)

!

interface Ethernet1 (E1口没有激活,也没有配置)

no ip address

shutdown

!

interface Serial0

bandwidth 2048

ip address 211.97.213.41 255.255.255.252 (此为定义ROUTER外部接口的IP

ip nat outside 255.255.255.252表示此合法的INTERNET-IP)

encapsulation ppp

!

ip nat pool 165 211.97.213.41 211.97.213.46 netmask 255.255.255.248 (isp给你分配的ip)

ip nat inside source list 1 pool 165 overload

ip classless

ip route 0.0.0.0 0.0.0.0 Serial0

no ip http server

!

access-list 1 permit 192.168.1.0 0.0.0.255

!

line con 0

transport input none

line vty 0 1

password 123456

login

!

end

Router#


  二、按照图1装上防火墙。

  将从路由器到交换机上的线,改为先从路由器到防火墙,然后用防火墙的E0口接交换机。

  
防火墙

  图2

  进入路由器配置模式修改,将路由器的配置改为:

Using 942 out of 7506 bytes

!

version 12.1

service timestamps debug uptime

service timestamps log uptime

service password-encryption

!

hostname router

!enable secret 5 $1$FreK$4oQGtvDEF1jv8dh3NNXnN0

enable password 123455676!

!

ip subnet-zero

!

crypto ipsec transform-set test esp-des esp-md5-hmac

!

crypto map vpnmap 1 ipsec-isakmp

! Incomplete

set transform-set test

match address 100

interface Ethernet0

ip address 211.97.213.41 255.255.255.248

interface Ethernet1

no ip address

ip nat inside

no ip route-cache

no ip mroute-cache

shutdown

!

!

interface Serial0

description internet

bandwidth 2048

ip address 211.97.209.145 255.255.255.252

ip nat outside

encapsulation ppp

no ip route-cache

no ip mroute-cache

!

ip classless

ip route 0.0.0.0 0.0.0.0 Serial0

ip http server

!

route-map nonat permit 10

match ip address 110

!

!

line con 0

transport input none

line vty 0 4

password 123456

login

!

end




  三、这时候,你可以配置你的防火墙了,以下是防火墙的配置情况:

PIX Version 5.1(2)

nameif ethernet0 outside security0

nameif ethernet1 inside security100

nameif ethernet2 pix/intf2 security10

hostname imrac_c_pix

fixup protocol ftp 21

fixup protocol http 80

fixup protocol h323 1720

fixup protocol rsh 514

fixup protocol smtp 25

fixup protocol sqlnet 1521

no names

access-list 100 permit ip 192.168.1.1 255.255.255.0 192.168.0.0 255.255.255.0

access-list 100 permit ip 192.168.1.1 255.255.255.0 192.100.0.0 255.255.255.0

pager lines 24

logging on

no logging timestamp

no logging standby

no logging console

no logging monitor

no logging buffered

no logging trap

logging facility 20

logging queue 512

interface ethernet0 auto

interface ethernet1 auto

interface ethernet2 auto shutdown

mtu outside 1500

mtu inside 1500

mtu pix/intf2 1500

ip address outside 211.97.213.44 255.255.255.248

ip address inside 192.168.1.1 255.255.255.0

ip address pix/intf2 127.0.0.1 255.255.255.255

no failover

failover timeout 0:00:00

failover ip address outside 0.0.0.0

failover ip address inside 0.0.0.0

failover ip address pix/intf2 0.0.0.0

arp timeout 14400

global (outside) 1 211.97.213.45 netmask 255.255.255.248

nat (inside) 0 access-list 100

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

route outside 0.0.0.0 0.0.0.0 211.97.213.41 1

timeout xlate 3:00:00 conn 1:00:00 half-closed 0:10:00 udp 0:02:00

timeout rpc 0:10:00 h323 0:05:00

aaa-server RADIUS protocol radius

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

crypto ipsec transform-set trans esp-des esp-md5-hmac

crypto map vpnmap 40 ipsec-isakmp

crypto map vpnmap 40 match address 100

crypto map vpnmap 40 set transform-set trans

crypto map vpnmap interface outside

isakmp enable outside

isakmp identity address

isakmp policy 1 authentication pre-share

isakmp policy 1 encryption des

isakmp policy 1 hash md5

isakmp policy 1 group 1

isakmp policy 1 lifetime 86400

telnet 192.168.1.88 255.255.255.255 inside

telnet timeout 5

terminal width 80

Cryptochecksum:7fd10854228b7e32b2808508f49a65a7

 



【责任编辑 彭凡】

文章录入:陈鹏    责任编辑:陈鹏 
  • 上一篇文章:

  • 下一篇文章:
  • 【字体: 】【发表评论】【加入收藏】【告诉好友】【打印此文】【关闭窗口
     
     
     
     
     

    Copyright © 2007 - 2009 chenpeng123.com All Rights Reserved
    本站所有文章,软件等均来自网络收集,不代表本站观点,仅供学习和研究使用。如有侵犯您的版权,请联系我们,本站将立即删除。
    鲁ICP备07014697号
    你是本站第 位访客