FWSM Tren Switch 6500
FWSM Tren Switch 6500
The vlan_range can be one or more VLANs (1 to 1000 and from 1025 to 4094) identified in one of the following ways:
• A single number (n)
• A range (n-x)
Ví dụ:
Router(config)# firewall vlan-group 50 55-57
Router(config)# firewall vlan-group 51 70-85
Router(config)# firewall module 5 vlan-group 50,51
The metric is the number of hops to gateway_ip. The default is 1 if you do not specify a metric.
The addresses you specify for the static route are the addresses that are in the packet before
entering the FWSM and performing NAT.
FWSM(config)# route inside 10.1.1.0 255.255.255.0 10.1.2.45 1
The following static routes are equal cost routes that direct traffic to three different routers on the
outside interface. The FWSM sends 1/3 of the traffic to each router.
FWSM(config)# route outside 10.10.10.0 255.255.255.0 192.168.1.1
FWSM(config)# route outside 10.10.10.0 255.255.255.0 192.168.1.2
FWSM(config)# route outside 10.10.10.0 255.255.255.0 192.168.1.3
o Configuring OSPF
FWSM(config)# router ospf process_id
FWSM(config-router)# network ip_address mask area area_id
Translate the 192.168.100.0/24 network on the dmz to 10.1.3.0/24 when it accesses the inside by
entering the following command:
FWSM(config)# static (dmz,inside) 10.1.3.0 192.168.100.0 netmask 255.255.255.0
Configure the following static routes so that traffic to the dmz network can be routed correctly by
the FWSM:
FWSM(config)# route dmz 192.168.100.128 255.255.255.128 10.1.1.2 1
FWSM(config)# route dmz 192.168.100.0 255.255.255.128 10.1.1.2 1
Configure PAT for the inside network by entering the following commands:
FWSM(config)# nat (inside) 1 0.0.0.0 0.0.0.0 0 0
FWSM(config)# global (outside) 1 209.165.201.15
Redirect Telnet requests for 209.165.201.5 to 10.1.1.6 by entering the following command:
FWSM(config)# static (inside,outside) tcp 209.165.201.5 telnet 10.1.1.6 telnet netmask
255.255.255.255
Redirect FTP requests for IP address 209.165.201.5 to 10.1.1.3 by entering the following
command:
FWSM(config)# static (inside,outside) tcp 209.165.201.5 ftp 10.1.1.3 ftp netmask
255.255.255.255
Redirect HTTP requests for the FWSM outside interface address to 10.1.1.5 by entering the
following command:
FWSM(config)# static (inside,outside) tcp interface www 10.1.1.5 www netmask
255.255.255.255
Redirect HTTP requests on port 8080 for PAT address 209.165.201.15 to 10.1.1.7 port 80 by
entering the following command:
FWSM(config)# static (inside,outside) tcp 209.165.201.15 8080 10.1.1.7 www
netmask 255.255.255.255
The Department networks are allowed to access the Internet, and use PAT.
FWSM Configuration
nameif vlan3 outside security0
nameif vlan4 dept2 security100
nameif vlan5 dept1 security100
nameif vlan10 dmz security50
passwd g00fba11
enable password gen1u$
hostname Buster
same-security-traffic permit inter-interface
ip address outside 209.165.201.3 255.255.255.224
ip address dept2 10.1.2.1 255.255.255.0
ip address dept2 10.1.1.1 255.255.255.0
ip address dmz 192.168.2.1 255.255.255.0
route outside 0 0 209.165.201.1 1
nat (dept1) 1 10.1.1.0 255.255.255.0
nat (dept2) 1 10.1.2.0 255.255.255.0
global (outside) 1 209.165.201.9 netmask 255.255.255.255 [The dept1 and dept2 networks use
PAT when accessing the outside]
static (dmz,outside) 209.165.201.5 192.168.2.2 netmask 255.255.255.255 [The syslog server
needs a static translation so the outside management host can access the server]
access-list DEPTS extended permit ip any any
access-group DEPTS in interface dept1
access-group DEPTS in interface dept2 [Allows all dept1 and dept2 hosts to access the
outside for any IP traffic]
access-list MANAGE extended permit tcp host 209.165.200.225 host 209.165.201.5 eq telnet
access-group MANAGE in interface outside [This ACL allows the management host to access
the syslog server]
rip dept2 default version 2 authentication md5 scorpius 1 [Advertises the FWSM IP address
as the default gateway for the downstream router. The FWSM does not advertise a default
route to the MSFC.]
rip dept2 passive version 2 authentication md5 scorpius 1 [Listens for RIP updates from
the downstream router. The FWSM does not listen for RIP updates from the MSFC because a
default route to the MSFC is all that is required.]
isakmp policy 1 authentication pre-share [The client uses a pre-shared key to connect to
the FWSM over IPSec. The key is the password in the username command below.]
isakmp policy 1 encryption 3des
isakmp policy 1 group 2
isakmp policy 1 hash sha
isakmp enable outside
crypto ipsec transform-set vpn_client esp-3des esp-sha-hmac
username admin password passw0rd
crypto ipsec transform-set vpn esp-3des esp-sha-hmac
crypto dynamic-map vpn_client 1 set transform-set vpn
crypto map telnet_tunnel 1 ipsec-isakmp dynamic vpn_client
crypto map telnet_tunnel interface outside
crypto map telnet_tunnel client authentication LOCAL
ip local pool client_pool 10.1.1.2
access-list VPN_SPLIT extended permit ip host 209.165.201.3 host 10.1.1.2
vpngroup admin address-pool client_pool
vpngroup admin split-tunnel VPN_SPLIT
vpngroup admin password $ecure23
telnet 10.1.1.2 255.255.255.255 outside
telnet timeout 30
logging trap 5
logging host dmz 192.168.2.2 [System messages are sent to the syslog server on the DMZ
network]
logging on
Department 1 has a web server that outside users who are authenticated by the AAA server can
access.
See the following sections for the configurations :
• System Configuration
• Switch Configuration
System Configuration
You must first enable multiple context mode using the mode multiple command. Then enter the
activation key to allow more than two contexts using the activation-key command. The mode and
the activation key are not stored in the configuration file, even though they do endure reboots. If
you view the configuration on the FWSM using the write terminal, show startup, or show
running commands, the mode displays after the FWSM Version (blank means single mode,
"<system>" means you are in multiple mode in the system configuration, and <context> means
you are in multiple mode in a context).
hostname Ubik
password pkd55
enable password deckard69
admin-context admin
context admin
allocate-interface vlan200
allocate-interface vlan201
allocate-interface vlan300
config-url disk://admin.cfg
context department1
allocate-interface vlan200
allocate-interface vlan202
allocate-interface vlan300
config-url ftp://admin:passw0rd@10.1.0.16/dept1.cfg
context department2
allocate-interface vlan200
allocate-interface vlan203
allocate-interface vlan300
config-url ftp://admin:passw0rd@10.1.0.16/dept2.cfg
The secondary FWSM is also in routed, multiple context mode, and has the same software version
See the following sections for the configurations:
• Primary FWSM Configuration
• Switch Configuration
Switch Configuration
The following lines in the Cisco IOS switch configuration on both switches relate to the FWSM. For
information about configuring redundancy for the switch, see the switch documentation.
...
firewall module 1 vlan-group 1
firewall vlan-group 1 10,11,200-203
interface vlan 200
ip address 209.165.201.1 255.255.255.224
standby 200 ip 209.165.201.2
standby 200 priority 110
standby 200 preempt
standby 200 timers 5 15
standby 200 authentication Secret
no shut
interface range gigabitethernet 2/1-3
channel-group 2 mode on
switchport trunk encapsulation dot1q
no shut
...