• Kiếm tiền với Hostinger

    Kiếm Tiền Cùng Hostinger

    Bạn đang tìm kiếm cách kiếm thêm thu nhập online? Hãy tham gia ngay chương trình Affiliate của Hostinger! Với mỗi khách hàng đăng ký thông qua liên kết của bạn, bạn sẽ nhận được khoản hoa hồng hấp dẫn.

    Hostinger cung cấp các dịch vụ lưu trữ web (hosting) chất lượng cao với mức giá cạnh tranh, giúp bạn dễ dàng giới thiệu và thu hút người dùng.

    Đừng bỏ lỡ cơ hội tuyệt vời này để tăng thêm thu nhập thụ động.

    Tham Gia Ngay

Configure PPPoE dialing on Cisco ASA Firewall

TigerDao

Administrator
Thành viên BQT
Configure PPPoE dialing on Firewall ASA
1. Model


upload_2018-1-8_14-7-29.png


2. Requirements:

– Configure PPPoE to connect to ISP. Use static IP 123.30.40.58 to assign the Interface to connect directly to the ISP
– Configure basic network parameters (IP, Network Object, Access-List, Access-Group)
– Configure NAT (inside, outside) for internal access to the outside.
– Configure NAT(dmz,outside) for public website, when outside http access to address 123.30.40.59 will be able to access website server 192.168.2.20 located in DMZ.

3. Configure PPPoE ASA 5525

– Configure parameters: username, password, authentication….
ciscoasa(config)#vpdn group FTP-DIALER-GROUP request dialout pppoe

ciscoasa(config)#vpdn group FTP-DIALER-GROUP localname sgfdl-111111-222

ciscoasa(config)#vpdn group FTP-DIALER-GROUP ppp authentication chapter

ciscoasa(config)#vpdn username sgfdl-111111-222 password d111111222 store-local


Assign the newly created parameters to the Interface connecting to the ISP
ciscoasa(config)#interface GigabitEthernet0

ciscoasa(config-if)#pppoe client vpdn group FTP-DIALER-GROUP


Enable PPPoE on the interface connected to the ISP
+ Configure interface to receive dynamic IP from ISP
ciscoasa(config#interface GigabitEthernet0

ciscoasa(config-if)#ip address pppoe setroute


+ Configure static IP for interface
Suppose you have an IP address range from 123.30.40.58 to 123.30.40.62, the IP address 123.30.40.57 is used by the ISP to assign to the Interface that connects directly to your outside network.

  • Address 123.30.40.58 assigned to Interface g0 on ASA
  • Address 123.30.40.59 is used as the public IP for the web server. When outside http access to address 123.30.40.59, the ASA will redirect to web server 192.168.2.20 located in the DMZ area.

ciscoasa(config)#interface GigabitEthernet0

ciscoasa(config-if)#ip address 123.30.40.58 255.255.255.248 pppoe setroute


The setroute parameter will automatically set the default route for you
Review the routing information as follows:
ciscoasa# show route

C 192.168.1.0 255.255.255.0 is directly connected, inside

C 192.168.2.0 255.255.255.0 is directly connected, dmz

S* 0.0.0.0 0.0.0.0 (1/0) via 123.30.40.57, outside


4. Configure IP, Network Object, Access-List, Access-Group, NAT.
Configure ip, nameif, security-level for interfaces connecting on the ASA.
interface GigabitEthernet0

nameif outside

security-level 0

ip address 123.30.40.58 255.255.255.255 pppoe setroute

!

interface GigabitEthernet1

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface GigabitEthernet2

nameif dmz

security-level 70

ip address 192.168.2.1 255.255.255.0

!


-Configuring Object Networks:
object network WWW-SERVER

host 192.168.2.20

object network WWW-SERVER-external-ip

host 123.30.40.59

object network INSIDE-SUBNET

subnet 192.168.1.0 255.255.255.0

object network DMZ-SUBNET

subnet 192.168.2.0 255.255.255.0


– Configure ACL, assign ACL to interface
ciscoasa# show running-config access-list

access-list Outside_access_in extended permit icmp any any
access-list Outside_access_in extended permit tcp any object WWW-SERVER eq www
access-list Outside_access_in extended permit tcp any object WWW-SERVER eq telnet


+ Assign ACL to interface
access-group Outside_access_in in interface outside

Configure NAT


object network INSIDE-SUBNET

nat (inside,outside) dynamic interface

object network WWW-SERVER

nat (dmz,outside) static WWW-SERVER-external-ip

Xem tiếp...
 
Top