Tarmoq xavfsizligi



Yüklə 305,53 Kb.
səhifə53/80
tarix27.12.2023
ölçüsü305,53 Kb.
#163603
1   ...   49   50   51   52   53   54   55   56   ...   80
Tarmoq xavfsizligi-hozir.org

Cisco ASA Modellari
Cisco ASA 5510 - masofadan turib ishlashni hisobga oladigan kichik va o'rta biznes korxonalar uchun mukammal model, bu iqtisodiy jihatdan xavfsiz yechim hamdir. Barcha xavfsizlik xizmatlarini onlayn boshqarish platformasi orqali boshqarish mumkin. Cisco 5510-da siz kutgan yuqori samarali firewall va tarmoq xavfsizligi yechimlari mavjud. Xavfsizlik xizmatlari moduli buzilishning oldini olish imkoniyatlarini to'liq boshqarish imkoniyatini beradi va mustahkam antivirus xizmatini bajaradi. Biznes kelajakda kengayishini inobatga olgan holda himoya qilish mexanizmlarini sinflarga ajratadi, shuning uchun Cisco ASA 5510 kompaniyaga kerak bo'lganda funksiyalarni kengaytirishga imkon beradi.
Ishni bajarish tartibi
  1. Cisco packet tracer dasturi ishga tushiriladi.


  2. Laboratoriya ishi uchun cisco 2960 kommutatori, 2911 marshruzatori, ASA0 5505 firewalli, server va kompyuterlar tanlanadi.


  3. Quyida keltirilgan topologiya quriladi.


  4. Qurilgan topologiya testlab ko`riladi.



15.2-rasm. Tadqiq qilinayotgan tarmoq topologiyasi.
Qurilgan topologiyada quyidagi buyruqlar teriladi:
ASA0 ga quyidagi buyruqlar ketma ketligi kiritiladi.
ciscoasa>en
ciscoasa#conf t
ciscoasa(config)#interface vlan 1
ciscoasa(config-if)#no ip address
ciscoasa(config-if)#ip address 192.168.100.1 255.255.255.0
ciscoasa(config-if)#exit
ciscoasa(config)#dhcpd address 192.168.100.22-192.168.100.50 inside
ciscoasa(config)#dhcpd dns 8.8.8.8
ciscoasa(config)#enable password salom
ciscoasa(config)#username elshod password admin
ciscoasa(config)#ssh 192.168.100.22 255.255.255.255 inside
ciscoasa(config)#ssh timeout 1
ciscoasa(config)#aaa authentication ssh console LOCAL
ciscoasa(config)#interface vlan 2
ciscoasa(config-if)# no ip address
ciscoasa(config-if)#ip address 195.158.0.2 255.255.255.252
ciscoasa(config-if)#exit
ciscoasa(config)#route outside 0.0.0.0 0.0.0.0 195.158.0.1
ciscoasa(config)#object network NET
ciscoasa(config-network-object)#subnet 192.168.100.0 255.255.255.0
ciscoasa(config-network-object)#nat (inside,outside) dynamic interface
ciscoasa(config-network-object)#ex
ciscoasa#conf t
ciscoasa(config)#access-list NAT extended permit icmp any any
ciscoasa(config)#access-group NAT in interface outside
ROUTERga quyida buyruqlar ketma ketligi kiritiladi.

continue with configuration dialog? [yes/no]: no
Router>enable
Router#conf t
Router(config)#interface gigabitEthernet 0/0
Router(config-if)#no shutdown
Router(config-if)#exit
Router(config)#hostname IP
IP(config)#interface gigabitEthernet 0/0
IP(config-if)#ip address 195.158.0.1 255.255.255.252
IP(config-if)#ex
IP(config)#interface gigabitEthernet 0/1
IP(config-if)#no shutdown
IP(config-if)#ip address 8.8.8.1 255.255.255.0
Router(config-if)#do wr
Router(config-if)#exit

15.3-rasm Server ga IP manzil berish.

15.4-rasm. Hostning ASA firewall orqali avtomatik IP manzil olishi.

15.5-rasm. SSH protokoli yordamida firewallga masofaviy ulanish.

15.6-rasm. Qurilgan topologiyani testlab ko’rish.


Yüklə 305,53 Kb.

Dostları ilə paylaş:
1   ...   49   50   51   52   53   54   55   56   ...   80




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə