Ho ASA5505, connesso alla WAN sulla porta 0 (chiamata Vlan2) e connesso alla mia LAN di sviluppo sulla porta 7 (Chiamato Vlan1).
Voglio aggiungere DMZ e ho collegato switch e server alla porta 3 e l'ho chiamato Vlan3.
questa è la mia impostazione:
interface Vlan1
nameif inside
security-level 100
ip address x.x.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address x.x.3.1 255.255.255.240
!
interface Vlan3
no forward interface Vlan1
nameif dmz
security-level 51
ip address x.x.2.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/3
switchport access vlan 3
!
Inoltre, ho aggiunto la regola NAT DYNAMIC all'interfaccia DMZ e la regola NAT POLICY STATICA in modo che tutte le connessioni HTTP e HTTPS per xx3.3 (l'indirizzo IP esterno del blog) vengano inoltrate a xx2.3 (Blog IP interno).
Posso collegarmi al sito web fuori dal mondo, ma non riesco a connettermi dalla mia LAN (Vlan1) - ping o ssh a xx3.3 non è disponibile, e anche ping o ssh all'interfaccia Vlan3 xx3.1 (il ASA ip su Vlan3).
IPS:
x.x.1.1 = Vlan1 ASA ip
x.x.1.x / 24 = Vlan1 - Sviluppo LAN
x.x.2.1 = Vlan2 ASA ip
x.x.2.3 = Blog IP esterno del blog
x.x.3.1 = Vlan3 ASA ip
x.x.3.3 = Blog ip interno
Devo essere in grado di eseguire il ping da x.x.1.x a x.x.3.x (dalla mia LAN di sviluppo Vlan1 alla LAN DML Vlan3)
Versione e Lic:
ciscoasa# sh ver
Cisco Adaptive Security Appliance Software Version 8.2(2)
Device Manager Version 6.3(1)
Compiled on Mon 11-Jan-10 14:19 by builders
System image file is "disk0:/asa822-k8.bin"
Config file at boot was "startup-config"
ciscoasa up 157 days 18 hours
Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz
Internal ATA Compact Flash, 128MB
BIOS Flash Firmware Hub @ 0xffe00000, 1024KB
Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)
Boot microcode : CN1000-MC-BOOT-2.00
SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03
IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04
0: Int: Internal-Data0/0 : address is d0d0.fd22.622c, irq 11
1: Ext: Ethernet0/0 : address is d0d0.fd22.6224, irq 255
2: Ext: Ethernet0/1 : address is d0d0.fd22.6225, irq 255
3: Ext: Ethernet0/2 : address is d0d0.fd22.6226, irq 255
4: Ext: Ethernet0/3 : address is d0d0.fd22.6227, irq 255
5: Ext: Ethernet0/4 : address is d0d0.fd22.6228, irq 255
6: Ext: Ethernet0/5 : address is d0d0.fd22.6229, irq 255
7: Ext: Ethernet0/6 : address is d0d0.fd22.622a, irq 255
8: Ext: Ethernet0/7 : address is d0d0.fd22.622b, irq 255
9: Int: Internal-Data0/1 : address is 0000.0003.0002, irq 255
10: Int: Not used : irq 255
11: Int: Not used : irq 255
Licensed features for this platform:
Maximum Physical Interfaces : 8
VLANs : 3, DMZ Restricted
Inside Hosts : Unlimited
Failover : Disabled
VPN-DES : Enabled
VPN-3DES-AES : Enabled
SSL VPN Peers : 2
Total VPN Peers : 10
Dual ISPs : Disabled
VLAN Trunk Ports : 0
Shared License : Disabled
AnyConnect for Mobile : Disabled
AnyConnect for Cisco VPN Phone : Disabled
AnyConnect Essentials : Disabled
Advanced Endpoint Assessment : Disabled
UC Phone Proxy Sessions : 2
Total UC Proxy Sessions : 2
Botnet Traffic Filter : Disabled
This platform has a Base license.
Le regole NAT:
access-list dmz_nat_static line 1 extended permit ip host x.x.3.3 any
static (dmz,outside) x.x.2.3 access-list dmz_nat_static tcp 0 0 udp 0
nat (dmz) 1 x.x.3.0 255.255.255.0 tcp 0 0 udp 0
Vedo che è limitato da DMZ, ma posso creare una soluzione "simile a DMZ" con le 3 Vlans che ho nella mia licenza?
Grazie.