cisco pix пробросить порт
- From
- Ivan Sichev (2:5025/3.41)
- To
- All (2:5054/37.63)
- Date
- 2009-07-10T14:53:32Z
- Area
- RU.CISCO
Здравствуй, All!
Помогите пожалуйста. Есть PIX которая находится очень далеко. Нужно на хост 192.168.6.1 пробросить порт 3389(RDP). Как это сделать. PIX никогда в руках не дрежал, поэтому экспериментировать страшно. Заранее спасибо.
Конфиг:
: Saved
:
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security4
enable password 8acp40YFIH/Xee3r encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname ciscoPIX515ens
domain-name ens.local
clock timezone YEKST 5
clock summer-time YEKDT recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list outside_access_in permit icmp any host a.a.a.a
access-list inside_nat0_outbound permit ip 192.168.6.0 255.255.255.0 192.168.0.0
255.255.254.0
access-list inside_nat0_outbound permit ip 192.168.6.0 255.255.255.0 192.168.254
.0 255.255.255.0
access-list inside_nat0_outbound permit ip any 192.168.6.144 255.255.255.240
access-list outside_cryptomap permit ip 192.168.6.0 255.255.255.0 192.168.0.0 25
5.255.254.0
access-list outside_cryptomap permit ip 192.168.6.0 255.255.255.0 192.168.254.0
255.255.255.0
pager lines 24
logging on
logging console warnings
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip address outside a.a.a.a 255.255.255.252
ip address inside b.b.b.b 255.255.255.0
no ip address intf2
ip audit info action alarm
ip audit attack action alarm
ip local pool forl2tp 192.168.6.151-192.168.6.155 mask 255.255.255.0
pdm location c.c.c.c 255.255.255.255 outside
pdm location d.d.d.d 255.255.255.255 outside
pdm location 192.168.6.0 255.255.255.0 inside
pdm location 192.168.0.0 255.255.254.0 outside
pdm location 192.168.254.0 255.255.255.0 outside
pdm location 192.168.6.144 255.255.255.240 outside
pdm logging warnings 500
pdm history enable
arp timeout 14400
global (outside) 10 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 10 0.0.0.0 0.0.0.0 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 d.d.d.d 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http c.c.c.c 255.255.255.255 outside
http 192.168.6.0 255.255.255.0 inside
no snmp-server location
no
12:44:11: snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
sysopt connection permit-l2tp
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 86400 kilobytes 50000
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap
crypto map outside_map 20 set peer c.c.c.c
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 20 set security-association lifetime seconds 28800 kiloby
tes 4608000
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address c.c.c.c netmask 255.255.255.255 no-xauth no-
config-mode
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 86400
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
telnet c.c.c.c 255.255.255.255 outside
telnet timeout 5
ssh c.c.c.c 255.255.255.255 outside
ssh timeout 5
console timeout 0
vpdn group l2tpusers accept dialin pptp
vpdn group l2tpusers ppp authentication pap
vpdn group l2tpusers ppp authentication chap
vpdn group l2tpusers ppp authentication mschap
vpdn group l2tpusers ppp encryption mppe auto
vpdn group l2tpusers client configuration address local forl2tp
vpdn group l2tpusers client configuration dns 192.168.6.1
vpdn group l2tpusers pptp echo 60
vpdn group l2tpusers client authentication local
vpdn username lindstrom password *********
vpdn username mashchenkov password *********
vpdn username SkyWharf password *********
vpdn enable outside
username admin password eShNP4cTOTzlziG0 encrypted privilege
username SkyWharf password UtjpORzUagymSLnK encrypted privilege 15
terminal width 80
Cryptochecksum:31adfcd2f3b0a029ffd156e02bc0f978
: end
С уважением, Иван Сычёв.
np: silence...
--- GoldED+/W32 1.1.4.7
* Origin: (2:5025/3.41)
SEEN-BY: 450/1024 5000/5000 5011/13 5012/46 5015/28 5019/26 5020/400 545 2238
SEEN-BY: 5020/4441 5021/29 5025/2 3 27 38 63 69 502 646 5027/12 5035/38 5045/7
SEEN-BY: 5054/1 4 8 9 28 30 36 37 67 75 81 89 5062/10 5063/3 5075/35 5077/70
SEEN-BY: 5080/68 5084/9 5085/13 5095/20 5096/18 6001/10 6004/3 6009/3
PATH: 5025/3 5020/545 5054/1 37