對于switch0、switch2,如果是三層交換機,則需要寫路由,如果為二層交換機,則需要寫網(wǎng)關(guān)。
靜態(tài)NAT地址轉(zhuǎn)換
object network waiwang
host 192.168.1.2
nat (inside,outside) static 10.99.121.141 理解為:從inside到outside方向,192.168.1.2這個 源地址轉(zhuǎn)換為10.99.121.141這個地址
靜態(tài)NAT地址轉(zhuǎn)換特點:
1.數(shù)據(jù)包從outside進入inside,也就是從低優(yōu)先級到高優(yōu)先級的訪問,在訪問控制列表里要放過
2. host要真是存在
3.首先要考慮會話的發(fā)起者,并確定是單向訪問,還是雙向訪問。
Static (inside,outside) 10.99.216.202 192.168.0.2
Object network yelian
Host 10.99.216.205
Nat (outside,inside) static 192.168.1.2
1.數(shù)據(jù)包從inside進入outside,也就是從高優(yōu)先級到低優(yōu)先級的訪問,然后從outside到inside返回,理論上在防火墻上有session,數(shù)據(jù)包從outside到inside能正常返回。但測試的時候,不能ping通192.168.1.2,F(xiàn)TP訪問正常。防火墻有一個inspect機制,配置命令: inspcet icmp?;蛘咴趏utside端的in方向的訪問控制列表放過icmp。
官方文檔:
In routed mode, hosts on the inside (Business and Home VLANs) count towards the limit only when they communicate with the outside (Internet VLAN). Internet hosts are not counted towards the limit. Hosts that initiate traffic between Business and Home are also not counted towards the limit. The interface associated with the default route is considered to be the Internet interface. If there is no default route, hosts on all interfaces are counted toward the limit. In transparent mode, the interface with the lowest number of hosts is counted towards the host limit. See the show local-host command to view the host limits.
實驗總結(jié):
1.在防火墻outside接口配置default-route,那么其他別的接口的主機數(shù)將受到限制。
2.在防火墻inside接口配置default-route,其他接口的主機數(shù)也受到限制。8.2(1)以下的版本相對混亂。(認為是低版本的BUG)
3.如果接口不配置默認路由,那么其他接口的主機數(shù)不受限制。
另外有需要云服務器可以了解下創(chuàng)新互聯(lián)scvps.cn,海內(nèi)外云服務器15元起步,三天無理由+7*72小時售后在線,公司持有idc許可證,提供“云服務器、裸金屬服務器、高防服務器、香港服務器、美國服務器、虛擬主機、免備案服務器”等云主機租用服務以及企業(yè)上云的綜合解決方案,具有“安全穩(wěn)定、簡單易用、服務可用性高、性價比高”等特點與優(yōu)勢,專為企業(yè)上云打造定制,能夠滿足用戶豐富、多元化的應用場景需求。