Господа помогите!
Имеется PIX 501, на outside выставлен реальный ip 195.218.x.x (маска 255.255.255.252), на inside 192.168.0.0 (маска 255.255.255.0).
Настроен PAT (все выходят через один адрес но по разным портам).Задача, пробить снаружи дыру (только с одного адреса), чтобы проходить на сервер 192.168.0.10. по ssh
Чего делать?
ACL на outside открыл для наружнего адреса.
Не могу понять нужно ли настраивать outside nat и если нужно то как...
Подскажите?
access-list 101 permit tcp any host 192.168.0.10 eq ssh
// ACL prikrepliajemij na outside interface, razresaet ssh obrasenije na 192.168.0.10
static (inside,outside) tcp 195.218.x.x ssh 192.168.0.10 ssh netmask 255.255.255.255 0 0
// Vikidivaem porti ssh’a IPishnika 192.168.0.10 (inside interface) naruzu.
access-group 101 in interface outside
// Ispolzujem ACL Nr. 101 na OUTSIDE interface
Не помогает :(, не проходим мы ssh когда делаем конект на 195.218.236.178
Вот тестовая конфигурация...
Может чего забыли?
PIX Version 6.3(4)
interface ethernet0 10baset
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pix
domain-name local
clock timezone MSK/MSD 3
clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol dns maximum-length 512
fixup protocol ftp 21
no fixup protocol h323 h225 1720
no fixup protocol h323 ras 1718-1719
fixup protocol http 80
no fixup protocol rsh 514
no fixup protocol rtsp 554
no fixup protocol sip 5060
no fixup protocol sip udp 5060
no fixup protocol skinny 2000
fixup protocol smtp 25
no fixup protocol sqlnet 1521
no fixup protocol tftp 69
names
access-list 110 permit ip 192.168.0.0 255.255.255.0 any
access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
pager lines 36
logging on
logging buffered debugging
icmp permit 195.218.159.0 255.255.255.0 outside
icmp permit host 195.218.236.177 outside
icmp deny any outside
icmp permit 192.168.0.0 255.255.255.0 inside
icmp deny any inside
mtu outside 1500
mtu inside 1500
ip address outside 195.218.236.178 255.255.255.252
ip address inside 192.168.0.254 255.255.255.0
ip audit name out_del attack action alarm drop reset
ip audit name out_inf info action alarm
ip audit info action alarm
ip audit attack action alarm drop reset
pdm location 195.218.159.0 255.255.255.0 outside
pdm location 192.168.0.0 255.255.255.0 inside
pdm location 0.0.0.0 0.0.0.0 outside
pdm location 195.218.159.4 255.255.255.255 inside
pdm location 195.218.159.4 255.255.255.255 outside
pdm location 192.168.0.8 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.0.0 255.255.255.0 0 0
static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 195.218.236.177 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 0:00:00
timeout h323 0:00:00 mgcp 0:00:00 sip 0:00:00 sip_media 0:00:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
aaa authorization command LOCAL
ntp server 130.149.17.21 source outside prefer
ntp server 193.67.79.202 source outside
http server enable
http 195.218.159.0 255.255.255.0 outside
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
sysopt noproxyarp outside
auth-prompt prompt Login:
auth-prompt accept Passw:
auth-prompt reject The END! Thanks!
telnet timeout 5
ssh timeout 5
console timeout 5
dhcpd address 192.168.0.32-192.168.0.58 inside
dhcpd dns 192.168.0.2 212.44.131.6
dhcpd wins 192.168.0.8
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain local
dhcpd option 150 ip 192.168.0.254
dhcpd enable inside
terminal width 80
no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
access-list outside_access_in permit ip any 195.218.159.0 255.255.255.0
>no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
>access-list outside_access_in permit ip any 195.218.159.0 255.255.255.0Нет, так совсем не катит.
Адрес на outside 195.218.236.178, а сетка 195.218.159.0 - эта та сеть из которой разрешено идти на данный firewall
Поэтому данное правило на мой взгляд не имет смысла ..а илия не прав?
U tebia zadaca bila ssh na 192.168.0.10
a ti probrosil na: 192.168.0.8 !!!!static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0
Dobav ese
access-list outside_access_in permit ssh any host 195.218.236.178 eq sshI ti smotri idut li packeti po tvojemu ACL ili net ...
show access-list
hitcnt dolzen uvelicivatsia ...
Неа, все равное не пашет, каунтеры обновляются в линии 3 (когда пытаюсь зайти туда ssh), хотя почему в строке 3, а не 1?Вобщем в чем засада совсем не понимаю.... все как по книжкам....
access-list outside_access_in; 4 elements
access-list outside_access_in line 1 permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh (hitcnt=0)
access-list outside_access_in line 2 permit tcp any host 192.168.0.8 eq ssh (hitcnt=0)
access-list outside_access_in line 3 permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178 (hitcnt=2)
access-list outside_access_in line 4 permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0 (hitcnt=0)PIX Version 6.3(4)
interface ethernet0 10baset
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
hostname pix
domain-name local
clock timezone MSK/MSD 3
clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol dns maximum-length 512
fixup protocol ftp 21
no fixup protocol h323 h225 1720
no fixup protocol h323 ras 1718-1719
fixup protocol http 80
no fixup protocol rsh 514
no fixup protocol rtsp 554
no fixup protocol sip 5060
no fixup protocol sip udp 5060
no fixup protocol skinny 2000
fixup protocol smtp 25
no fixup protocol sqlnet 1521
no fixup protocol tftp 69
names
access-list 110 permit ip 192.168.0.0 255.255.255.0 any
access-list outside_access_in permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh
access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178
access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0
pager lines 36
logging on
logging buffered debugging
icmp permit 195.218.159.0 255.255.255.0 outside
icmp permit host 195.218.236.177 outside
icmp deny any outside
icmp permit 192.168.0.0 255.255.255.0 inside
icmp deny any inside
mtu outside 1500
mtu inside 1500
ip address outside 195.218.236.178 255.255.255.252
ip address inside 192.168.0.254 255.255.255.0
ip audit name out_del attack action alarm drop reset
ip audit name out_inf info action alarm
ip audit info action alarm
ip audit attack action alarm drop reset
pdm location 195.218.159.0 255.255.255.0 outside
pdm location 192.168.0.0 255.255.255.0 inside
pdm location 195.218.159.4 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.0.0 255.255.255.0 0 0
static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 195.218.236.177 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 0:00:00
timeout h323 0:00:00 mgcp 0:00:00 sip 0:00:00 sip_media 0:00:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
aaa authorization command LOCAL
ntp server 130.149.17.21 source outside prefer
ntp server 193.67.79.202 source outside
http server enable
http 195.218.159.0 255.255.255.0 outside
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
no floodguard enable
sysopt noproxyarp outside
auth-prompt prompt Novasoft_Login:
auth-prompt accept Novasoft_Passw:
auth-prompt reject The END! Thanks!
telnet 195.218.159.4 255.255.255.255 outside
telnet timeout 5
ssh 195.218.159.4 255.255.255.255 outside
ssh timeout 5
console timeout 5
dhcpd address 192.168.0.32-192.168.0.58 inside
dhcpd dns 192.168.0.2 212.44.131.6
dhcpd wins 192.168.0.8
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd domain local
dhcpd option 150 ip 192.168.0.254
dhcpd enable inside
terminal width 80
Cryptochecksum:1b2988213856d21193223ab71a50815d
: end
>Вобщем в чем засада совсем не понимаю.... все как по книжкам....
>
>
>access-list outside_access_in; 4 elements
>access-list outside_access_in line 1 permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178
>eq ssh (hitcnt=0)
>access-list outside_access_in line 2 permit tcp any host 192.168.0.8 eq ssh (hitcnt=0)
>
>access-list outside_access_in line 3 permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178 (hitcnt=2)
>access-list outside_access_in line 4 permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0 (hitcnt=0)Ja ocen izveniajus no v pervom otvete dopustil osibku v access-liste ...
Access-list imejut osobennost srabotav pervomu ostalnije acl'i ne rassmatrivajutsia ...
Delaj tak :
1.
no access-list 110 permit ip 192.168.0.0 255.255.255.0 any
no access-list outside_access_in permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh
no access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 no host 195.218.236.178
no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0
no access-group outside_access_in in interface outside2.
access-list 100 permit tcp 192.168.0.0 255.255.255.0 any // razresaesh hodit kompam v internet
access-list 101 permit tcp any host 195.218.236.178 eq 22 // razresaesh obrasenija k vneshmenu IP na 22 port (port ssh)access-group 101 in interface outside // prikrepliajesh pravilo k 195.218.236.178
access-group 100 in interface inside // k 192.168.0.254Ispolnuj 100 i 101 kak imena access-listov ...
Eto tocno rabotaet ja proverial na rabote ...
Помогите пожалуйста, не могу настроить доступ через SSh на интерфейс outside.
напишите пример конфига в которов будут описаны все команды касающиеся SSH
заранее огромное спасибопривиденная выше схема у меня не работает