使用数据包跟踪器的ASA配置

问题描述 投票:0回答:1

我正在尝试在网络下进行配置。

我无法从公共笔记本电脑打开http://142.12.56.68

我能够从VLAN20 laptop0 ping通到防火墙192.158.99.1。

我在ASA和多功能开关上具有以下配置。请让我知道完成此网络还需要执行的其他操作。

ciscoasa(config)#show run
: Saved
:
ASA Version 9.6(1)
!
hostname ciscoasa
names
!
interface GigabitEthernet1/1
 nameif inside
 security-level 100
 ip address 192.168.99.1 255.255.255.252
!
interface GigabitEthernet1/2
 nameif dmz
 security-level 50
 ip address 172.16.1.0 255.255.255.0
 ospf authentication message-digest
 ospf message-digest-key 1 md5 *****
!
!
interface Management1/1
 management-only
 nameif outside
 security-level 0
 ip address 148.12.56.67 255.255.255.0
 ospf authentication message-digest
 ospf message-digest-key 1 md5 *****
!
webvpn
 enable outside
object network DMZ
 subnet 172.16.1.0 255.255.255.0
object network LAN
 subnet 192.168.20.0 255.255.255.0
object network webserver
 host 172.16.1.10
object network webserver-external-ip
 host 148.12.56.68
!
route outside 192.168.99.0 255.255.255.252 148.12.56.68 1
!
access-list OUTSIDE extended permit icmp any any echo-reply
access-list OUTSIDE extended permit icmp any any unreachable
access-list OUTSIDE extended permit tcp any object webserver eq www
access-list OUTSIDE extended permit tcp any host 148.12.56.68 eq www
access-list outside extended permit icmp any any echo-reply
access-list outside extended permit icmp any any unreachable
!
!
access-group OUTSIDE in interface outside
object network DMZ
 nat (dmz,outside) dynamic interface
object network LAN
 nat (inside,outside) dynamic interface
object network webserver
 nat (dmz,outside) static 148.12.56.68
!
!
class-map inspection_default
 match default-inspection-traffic
!
policy-map global_policy
 class inspection_default
  inspect icmp 
!
service-policy global_policy global
!
telnet timeout 5
ssh timeout 5
!
!
router ospf 1
 log-adjacency-changes
 network 0.0.0.0 255.255.255.255 area 0
 network 192.168.99.0 255.255.255.252 area 0
 network 148.12.56.0 255.255.255.0 area 0
 network 171.16.1.0 255.255.255.0 area 1
 network 172.16.1.0 255.255.255.0 area 1
!

对于MultiSwitch,我有以下内容:

> S1#show run
Building configuration...

Current configuration : 1840 bytes
!
version 12.2(37)SE1
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname S1
!
ip routing
!
interface FastEthernet0/1
 switchport access vlan 20
 switchport mode access
 switchport nonegotiate
!
interface FastEthernet0/2
 switchport access vlan 20
 switchport mode access
 switchport nonegotiate
!
interface FastEthernet0/3
 switchport access vlan 10
 switchport mode access
 switchport nonegotiate
!
interface FastEthernet0/4
 switchport access vlan 10
 switchport mode access
 switchport nonegotiate
!
interface FastEthernet0/5
 no switchport
 ip address 192.168.99.2 255.255.255.252
 duplex auto
 speed auto
!
interface Vlan1
 no ip address
 shutdown
!
interface Vlan10
 mac-address 000c.8551.6601
 ip address 192.168.10.1 255.255.255.0
!
interface Vlan20
 mac-address 000c.8551.6602
 ip address 192.168.20.1 255.255.255.0
!
router ospf 1
 log-adjacency-changes
 network 192.0.0.0 0.255.255.255 area 0
 network 172.16.1.0 0.0.0.255 area 1
end

`Network Diagram

networking cisco vlan asa
1个回答
0
投票

您正在仅管理模式下使用管理界面,因此只能使用此界面来管理ASA。据我所知,您无法从管理界面中删除仅管理选项。

packet tracer命令示例:

packet-tracer input outside tcp <laptop_ip> 148.12.56.68 80

在输出的末尾,您可以看到Action行,其中显示了最终操作。下一行将显示操作为drop

的原因。

您还可以检查ASA日志条目。您应该始终配置日志记录功能!!!最小日志记录配置:

logging enable
logging timestamp
logging buffered informational
logging buffer-size 16384

以上配置将为所有日志消息添加时间戳,日志严重性级别为参考,并为日志消息提供16M的缓冲区。

有关ASA日志记录的更多信息:https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/monitor-syslog.html

您可以找到有关日志严重性级别的更多信息:https://en.wikipedia.org/wiki/Syslog#Severity_level

将日志消息发送到中央日志服务器:

logging host <asa_interface> <remote_log_server_ip> <protocol/port/>

示例,日志消息将从inside界面发送到192.168.1.1远程服务器,并发送到udp / 514端口(标准/旧版系统日志协议和端口):

logging host inside 192.168.1.1 udp

我认为日志消息是您进行故障排除的最好的朋友之一!

© www.soinside.com 2019 - 2024. All rights reserved.