求cisco 思科ASA5505 中文使用说明书

在网上一直没有找到中文的,英文的看不懂 发到
2024-11-29 02:57:22
推荐回答(3个)
回答1:

  首先,cisco防火墙是没有官方中文使用说明书的,只能在官方找到英文版说明。
  其次,只要掌握相关配置,功能命令后,配置就得心应手。
  最后,送上ASA5505基本配置命令
  cisco-asa-5505基本配置
  调试CISCO-ASA-5505设备,,跟PIX一样,呵呵.没有技术含量,都是最基本的.
  Cisco ASA5505配置
  cisco, config, telnet, 防火墙, Cisco
  1.配置防火墙名
  ciscoasa> enable
  ciscoasa# configure terminal
  ciscoasa(config)# hostname asa5505
  2.配置telnet
  asa5505(config)#telnet 192.168.1.0 255.255.255.0 inside ↑//允许内部接口192.168.1.0网段telnet防火墙
  3.配置密码
  asa5505(config)# password cisco ------------------远程密码
  asa5505(config)# enable password cisco ------------------特权模式密码
  4.配置IP
  asa5505(config)# interface vlan 2 ------------------进入vlan2
  asa5505(config-if)# ip address 218.16.37.222 255.255.255.192 ------------------vlan2配置IP
  asa5505(config)#show ip address vlan2 ------------------验证配置
  5.端口加入vlan
  asa5505(config)# interface e0/3 ------------------进入接口e0/3
  asa5505(config-if)# switchport access vlan 3 ------------------接口e0/3加入vlan3
  asa5505(config)# interface vlan 3 ------------------进入vlan3
  asa5505(config-if)# ip address 10.10.10.36 255.255.255.224 ------------------vlan3配置IP
  asa5505(config-if)# nameif dmz ------------------vlan3名
  asa5505(config-if)# no shutdown ------------------开启
  asa5505(config-if)# show switch vlan ------------------验证配置
  6.最大传输单元MTU
  asa5505(config)#mtu inside 1500 ------------------inside最大传输单元1500字节
  asa5505(config)#mtu outside 1500 ------------------outside最大传输单元1500字节
  asa5505(config)#mtu dmz 1500 ------------------dmz最大传输单元1500字节
  7.配置arp表的超时时间
  asa5505(config)#arp timeout 14400 ------------------arp表的超时时间14400秒
  8.FTP模式
  asa5505(config)#ftp mode passive ------------------FTP被动模式
  9.配置域名
  asa5505(config)#domain-name Cisco.com
  10.启动日志
  asa5505(config)#logging enable ------------------启动日志
  asa5505(config)#logging asdm informational ------------------启动asdm报告日志
  asa5505(config)#Show logging ------------------验证配置
  11.启用http服务
  asa5505(config)#http server enable ------------------启动HTTP server,便于ASDM连接。
  asa5505(config)#http 0.0.0.0 0.0.0.0 outside ------------------对外启用ASDM连接
  asa5505(config)#http 0.0.0.0 0.0.0.0 inside ------------------对内启用ASDM连接
  12.控制列表
  access-list acl_out extended permit tcp any any eq www ------------------允许tcp协议80端口入站
  access-list acl_out extended permit tcp any any eq https ------------------允许tcp协议443端口入站
  access-list acl_out extended permit tcp any host 218.16.37.223 eq ftp
  ↑//允许tcp协议21端口到218.16.37.223主机
  access-list acl_out extended permit tcp any host 218.16.37.224 eq 3389
  ↑//允许tcp协议3389端口到218.16.37.224主机
  access-list acl_out extended permit tcp any host 218.16.37.225 eq 1433
  ↑//允许tcp协议1433端口到218.16.37.225主机
  access-list acl_out extended permit tcp any host 218.16.37.226 eq 8080
  ↑//允许tcp协议8080端口到218.16.37.226主机
  asa5505(config)#show access-list ------------------验证配置
  13.设置路由
  asa5505(config)#route dmz 10.0.0.0 255.0.0.0 10.10.10.33 1
  ↑//静态路由到10.0.0.0网段经过10.10.10.33网关跳数为1
  asa5505(config)#route outside 0.0.0.0 0.0.0.0 218.16.37.193 1
  ↑//默认路由到所有网段经过218.16.37.193网关跳数为1
  asa5505# show route ------------------显示路由信息
  14.静态NAT
  asa5505(config)# static (inside,outside) 218.16.37.223 192.168.1.6 netmask 255.255.255.255
  ↑//外网218.16.37.223映射到内网192.168.1.6
  asa5505(config)#access-list acl_out extended permit icmp any any
  ↑//控制列表名acl_out允许ICMP协议
  asa5505(config)#access-group acl_out in interface outside
  ↑//控制列表acl_out应用到outside接口
  asa5505(config)#static (inside,dmz) 10.10.10.37 192.168.1.16 netmask 255.255.255.255
  ↑//dmz10.10.10.37映射到内网192.168.1.16
  asa5505(config)#access-list acl_dmz extended permit icmp any any
  ↑//控制列表名acl_dmz允许ICMP协议
  asa5505(config)#access-group acl_dmz in interface dmz -----------------控制列表acl_out应用到dmz接口 asa5505(config)#Show nat ------------------验证配置
  15.动态NAT
  asa5505(config)#global(outside) 1 218.201.35.224-218.201.35.226 ------------------定义全局地址池
  asa5505(config)#nat(inside) 1 192.168.1.20-192.168.1.22 ------------------内部转换地址池
  asa5505(config)# show xlate ------------------验证配置
  16.基于端口NAT(PAT)
  asa5505(config)#global (outside) 2 interface ----------------定义全局地址即outside地址:218.16.37.222
  asa5505(config)#nat (inside) 2 192.168.1.0 255.255.255.0 ------------------内部转换地址池
  asa5505(config)# show xlate ------------------验证配置
  17.基于LAN故障倒换(failover)
  1).主防火墙配置
  asa5505(config)#failover mac addr outside 001a.2b3c.4d11 001a.2b3c.4w12----故障倒换虚拟MAC地址
  asa5505(config)#failover mac addr inside 001a.2b3c.4d21 001a.2b3c.4w22-----故障倒换虚拟MAC地址
  asa5505(config)#failover mac addr inside 001a.2b3c.4d21 001a.2b3c.4w32-----故障倒换虚拟MAC地址
  asa5505(config)#failover ------------------启动故障倒换
  asa5505(config)#failover lan unit primary ------------------设置主要防火墙
  asa5505(config)#failover lan interface standby Vlan4 ------------------故障倒换接口名standby
  asa5505(config)#failover interface ip standby 172.168.32.1 255.255.255.252 standby 172.168.32.2
  ↑//配置主防火墙IP:172.168.32.1,备用防火墙IP:172.168.32.2
  asa5505# show failover ------------------验证配置
  2).备防火墙配置
  asa5505(config)#failover mac addr outside 001a.2b3c.4d11 001a.2b3c.4w12----故障倒换虚拟MAC地址
  asa5505(config)#failover mac addr inside 001a.2b3c.4d21 001a.2b3c.4w22------故障倒换虚拟MAC地址asa5505(config)#failover mac addr inside 001a.2b3c.4d21 001a.2b3c.4w32------故障倒换虚拟MAC地址asa5505(config)#failover ------------------启动故障倒换
  asa5505(config)#failover lan unit secondary ------------------设置备用防火墙
  asa5505(config)#failover lan interface standby Vlan4 ------------------故障倒换接口名standby
  asa5505(config)#failover interface ip standby 172.168.32.1 255.255.255.252 standby 172.168.32.2
  ↑//配置主防火墙IP:172.168.32.1,备用防火墙IP:172.168.32.2
  asa5505# show failover ------------------验证配置
  18.显示mac地址
  asa5505# show switch mac-address-table
  19.保存配置
  asa5505# write memory
  Cisco ASA 5505防火墙地址映射问题
  解决前些天帮朋友配置一台Cisco ASA5505防火墙, 映射总是不成功. 在网上也看到很多朋友遇到了这种问题,都在寻问这个解决方法.有人已经将问题解决了,但没给出解决方案. 也许这并不是一个很复杂的难题,但我希望通过博客能帮助朋友们及时得到这个小问题的处理.
  基本情况:
  WAN: 221.221.147.195 Gateway: 221.221.147.200 LAN: 192.168.0.1
  内网中有一台服务器,地址: 192.168.0.10 端口: 8089
  故障描述: 内网可正常连接至服务器,外网无法连接. 端口映射出现问题.
  解决方法: 命令行错误, 已更正并解决.
  问题重点: 采用 "static (inside,outside) 221.221.147.195 192.168.0.10 tcp 8089" 映射.
  目前配置如下:
  ASA Version 7.2(2)
  !
  hostname ciscoasa
  enable password 8Ry2YjIyt7RRXU24 encrypted
  names
  !
  interface Vlan1
  nameif inside
  security-level 100
  ip address 192.168.0.1 255.255.255.0
  !
  interface Vlan2
  nameif outside
  security-level 0
  ip address 221.221.147.195 255.255.255.252
  !
  interface Ethernet0/0
  switchport access vlan 2
  !
  interface Ethernet0/1
  !
  interface Ethernet0/2
  !
  !
  interface Ethernet0/4
  !
  interface Ethernet0/5
  !
  interface Ethernet0/6
  !
  interface Ethernet0/7
  !
  passwd 2KFQnbNIdI.2KYOU encrypted
  ftp mode passive
  access-list 101 extended permit tcp any host 221.221.147.195 eq 8089
  access-list 101 extended permit icmp any any
  access-list 101 extended permit tcp any any
  access-list 101 extended permit udp any any
  pager lines 24
  logging asdm informational
  mtu inside 1500
  mtu outside 1500
  icmp unreachable rate-limit 1 burst-size 1
  no asdm history enable
  arp timeout 14400
  global (outside) 1 interface
  static (inside,outside) 221.221.147.195 192.168.0.10 netmask 255.255.255.255 tcp 8089 0
  access-group 101 in interface outside
  route outside 0.0.0.0 0.0.0.0 221.221.147.200 1
  timeout xlate 3:00:00
  timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
  timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
  timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
  timeout uauth 0:05:00 absolute
  http server enable
  no snmp-server location
  no snmp-server contact
  snmp-server enable traps snmp authentication linkup linkdown coldstart
  telnet timeout 5
  ssh timeout 5
  console timeout 0
  dhcpd auto_config outside
  !
  !
  class-map inspection_default
  match default-inspection-traffic
  !
  policy-map type inspect dns preset_dns_map
  parameters
  message-length maximum 512
  policy-map global_policy
  class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  !
  service-policy global_policy global
  prompt hostname context
  Cryptochecksum:30e219cbc04a4c919e7411de55e14a64
  : end
  ciscoasa(config)#
  ------------------------------------------------------------
  在找寻解决方案过程中,有朋友做了重要提示, 采用: static (inside,outside) int 192.168.0.10 tcp 8089 做映射,但出现警告提示:
  WARNING: static redireting all traffics at outside interface;
  WARNING: all services terminating at outside interface are disabled.
  后来将命令改成: static (inside,outside) 221.221.147.195 192.168.0.10 tcp 8089 问题解决.
  ASA5505配置笔记
  ASA5505配置笔记
  1.IP地址配置
  #int vlan1
  #>nameif outside
  #security-level 0
  #ip address 172.16.1.1 255.255.0.0.
  #end
  #int vlan 2
  #nameif insiede
  #security-levlel 100
  #ip address 192.168.1.1 255.255.255.0
  #end
  2.把端口指定到相应VLAN中
  #int Eth0/0
  #switchport access vlan 1
  end
  #int Eth0/1
  switchport access vlan 2
  end
  #exit
  3.配置Http.telnet和ssh管理
  #username xxx password xxxxxx encrypted privilege 15
  #aaa authentication enable console LOCAL
  #aaa authentication telnet console LOCAL
  #aaa authentication http console LOCAL
  #aaa authentication ssh console LOCAL
  #aaa autoentication command LOCAL
  #http server enable
  #http 192.168.1.0 255.255.255.0 inside
  #telnet 192.168.1.0 255.255.255.0 inside
  #ssh 192.168.1.0 255.255.255.0 inside
  #crypto key generate rsa(打开SSH服务)
  4.VPN配置
  VPN配置可在ASDM模式下配置,具体配置略

回答2:

百度文库中有各类配置:
http://wenku.baidu.com/view/b694bdfbfab069dc502201fe.html

另外可以拨打cisco中国技术服务电话询问。 4008 100 110

回答3:

留个邮箱,发你一份