Pagina 1 di 1

ASA 5505 e NAT

Inviato: sab 25 ott , 2008 5:47 pm
da Albornoz
Mi trovo nella necessità di aprire delle porte dall'esterno ma dopo aver configurato l' ASA soltanto la porta 5900 risulta essere in ascolto.... tutte le altre, che puntano ad un altro ip, non vanno! Eppure mi sembra di averle configurate tutte allo stesso modo!

Questa è la mia configurazione.
Ah, dimenticavo di dirvi che sono un pivello su apparati Cisco :D

Grazie!

Codice: Seleziona tutto

: Saved
:
ASA Version 7.2(3) 
!
hostname ciscoasa
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.254 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 192.168.0.200 255.255.255.0 
!
interface Vlan3
 no forward interface Vlan1
 nameif dmz
 security-level 50
 no ip address
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name default.domain.invalid
access-list outside_access_in extended permit tcp any interface outside eq 5900 
access-list outside_access_in extended permit tcp any interface outside eq ftp 
access-list outside_access_in extended permit tcp any interface outside eq telnet 
access-list outside_access_in extended permit tcp any interface outside eq 8470 
access-list outside_access_in extended permit tcp any interface outside eq 8476 
access-list outside_access_in extended permit tcp any interface outside eq 446 
access-list outside_access_in extended permit tcp any interface outside eq 447 
access-list outside_access_in extended permit tcp any interface outside eq 448 
access-list outside_access_in extended permit tcp any interface outside eq 449 
access-list outside_access_in extended permit tcp any interface outside eq lpd 
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 5900 192.168.1.200 5900 netmask 255.255.255.255 
static (inside,outside) tcp interface telnet 192.168.1.10 telnet netmask 255.255.255.255 
static (inside,outside) tcp interface ftp 192.168.1.10 ftp netmask 255.255.255.255 
static (inside,outside) tcp interface 8470 192.168.1.10 8470 netmask 255.255.255.255 
static (inside,outside) tcp interface 8476 192.168.1.10 8476 netmask 255.255.255.255 
static (inside,outside) tcp interface 446 192.168.1.10 446 netmask 255.255.255.255 
static (inside,outside) tcp interface 447 192.168.1.10 447 netmask 255.255.255.255 
static (inside,outside) tcp interface 448 192.168.1.10 448 netmask 255.255.255.255 
static (inside,outside) tcp interface 449 192.168.1.10 449 netmask 255.255.255.255 
static (inside,outside) tcp interface lpd 192.168.1.10 lpd netmask 255.255.255.255 
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.0.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.1.190-192.168.1.195 inside
dhcpd enable inside
!

!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
  inspect sip 
  inspect netbios 
  inspect tftp 
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:442c21a06d33f80c18917e26f2c2a982
: end
asdm image disk0:/asdm-523.bin
no asdm history enable

Inviato: mar 11 nov , 2008 11:28 pm
da hashashin
ciao,

la configurazione sembra ok, di conseguenza mi appresto a farti alcune domande stupide:

1) la macchina 192.168.1.10 è in ascolto sulle porte nattate??

2) la macchina 192.168.1.10 è collegata alla rete?

3) se digiti il comando "show xlate", ti appaiono tutti i nat statici che hai configurato?


ciaooooo