The OpenNET Project / Index page

[ новости /+++ | форум | теги | ]




Версия для распечатки Пред. тема | След. тема
Новые ответы [ Отслеживать ]
Проход через PIX внутрь сети, !*! kirill_i, 28-Апр-05, 18:28  [смотреть все]
Господа помогите!
Имеется PIX 501, на outside выставлен реальный ip 195.218.x.x (маска 255.255.255.252), на inside 192.168.0.0 (маска 255.255.255.0).
Настроен PAT (все выходят через один адрес но по разным портам).

Задача, пробить снаружи дыру (только с одного адреса), чтобы проходить на сервер 192.168.0.10. по ssh
Чего делать?
ACL на outside открыл для наружнего адреса.
Не могу понять нужно ли настраивать outside nat и если нужно то как...
Подскажите?

  • Проход через PIX внутрь сети, !*! EDSKA, 23:55 , 28-Апр-05 (1)

    access-list 101 permit tcp any host 192.168.0.10 eq ssh
    // ACL prikrepliajemij na outside interface, razresaet ssh obrasenije na 192.168.0.10
    static (inside,outside) tcp 195.218.x.x ssh 192.168.0.10 ssh netmask 255.255.255.255 0 0
    // Vikidivaem porti ssh’a IPishnika 192.168.0.10 (inside interface) naruzu.
    access-group 101 in interface outside
    // Ispolzujem ACL Nr. 101 na OUTSIDE interface
      
    • Проход через PIX внутрь сети, !*! kirill_i, 11:28 , 29-Апр-05 (2)
      Не помогает :(, не проходим мы ssh когда делаем конект на 195.218.236.178
      Вот тестовая конфигурация...
      Может чего забыли?


      PIX Version 6.3(4)
      interface ethernet0 10baset
      interface ethernet1 100full
      nameif ethernet0 outside security0
      nameif ethernet1 inside security100
      hostname pix
      domain-name local
      clock timezone MSK/MSD 3
      clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
      fixup protocol dns maximum-length 512
      fixup protocol ftp 21
      no fixup protocol h323 h225 1720
      no fixup protocol h323 ras 1718-1719
      fixup protocol http 80
      no fixup protocol rsh 514
      no fixup protocol rtsp 554
      no fixup protocol sip 5060
      no fixup protocol sip udp 5060
      no fixup protocol skinny 2000
      fixup protocol smtp 25
      no fixup protocol sqlnet 1521
      no fixup protocol tftp 69
      names
      access-list 110 permit ip 192.168.0.0 255.255.255.0 any
      access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
      access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
      pager lines 36
      logging on
      logging buffered debugging
      icmp permit 195.218.159.0 255.255.255.0 outside
      icmp permit host 195.218.236.177 outside
      icmp deny any outside
      icmp permit 192.168.0.0 255.255.255.0 inside
      icmp deny any inside
      mtu outside 1500
      mtu inside 1500
      ip address outside 195.218.236.178 255.255.255.252
      ip address inside 192.168.0.254 255.255.255.0
      ip audit name out_del attack action alarm drop reset
      ip audit name out_inf info action alarm
      ip audit info action alarm
      ip audit attack action alarm drop reset
      pdm location 195.218.159.0 255.255.255.0 outside
      pdm location 192.168.0.0 255.255.255.0 inside
      pdm location 0.0.0.0 0.0.0.0 outside
      pdm location 195.218.159.4 255.255.255.255 inside
      pdm location 195.218.159.4 255.255.255.255 outside
      pdm location 192.168.0.8 255.255.255.255 inside
      pdm logging informational 100
      pdm history enable
      arp timeout 14400
      global (outside) 1 interface
      nat (inside) 1 192.168.0.0 255.255.255.0 0 0
      static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0
      access-group outside_access_in in interface outside
      route outside 0.0.0.0 0.0.0.0 195.218.236.177 1
      timeout xlate 0:05:00
      timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 0:00:00
      timeout h323 0:00:00 mgcp 0:00:00 sip 0:00:00 sip_media 0:00:00
      timeout uauth 0:05:00 absolute
      aaa-server TACACS+ protocol tacacs+
      aaa-server TACACS+ max-failed-attempts 3
      aaa-server TACACS+ deadtime 10
      aaa-server RADIUS protocol radius
      aaa-server RADIUS max-failed-attempts 3
      aaa-server RADIUS deadtime 10
      aaa-server LOCAL protocol local
      aaa authentication ssh console LOCAL
      aaa authorization command LOCAL
      ntp server 130.149.17.21 source outside prefer
      ntp server 193.67.79.202 source outside
      http server enable
      http 195.218.159.0 255.255.255.0 outside
      http 192.168.0.0 255.255.255.0 inside
      no snmp-server location
      no snmp-server contact
      snmp-server community public
      no snmp-server enable traps
      sysopt noproxyarp outside
      auth-prompt prompt Login:
      auth-prompt accept Passw:
      auth-prompt reject The END! Thanks!
      telnet timeout 5
      ssh timeout 5
      console timeout 5
      dhcpd address 192.168.0.32-192.168.0.58 inside
      dhcpd dns 192.168.0.2 212.44.131.6
      dhcpd wins 192.168.0.8
      dhcpd lease 3600
      dhcpd ping_timeout 750
      dhcpd domain local
      dhcpd option 150 ip 192.168.0.254
      dhcpd enable inside
      terminal width 80

      • Проход через PIX внутрь сети, !*! sh_, 11:33 , 29-Апр-05 (3)
        no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
        access-list outside_access_in permit ip any 195.218.159.0 255.255.255.0
        • Проход через PIX внутрь сети, !*! kirill_i, 11:40 , 29-Апр-05 (4)
          >no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 any
          >access-list outside_access_in permit ip any 195.218.159.0 255.255.255.0

          Нет, так совсем не катит.

          Адрес на outside 195.218.236.178, а сетка 195.218.159.0 - эта та сеть из которой разрешено идти на данный firewall
          Поэтому данное правило на мой взгляд не имет смысла ..а илия не прав?


          • Проход через PIX внутрь сети, !*! EDSKA, 11:55 , 29-Апр-05 (5)
            U tebia zadaca bila ssh na 192.168.0.10
            a ti probrosil na: 192.168.0.8 !!!!

            static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0

            Dobav ese
            access-list outside_access_in permit ssh any host 195.218.236.178 eq ssh

            I ti smotri idut li packeti po tvojemu ACL ili net ...
            show access-list
            hitcnt dolzen uvelicivatsia ...

            • Проход через PIX внутрь сети, !*! kirill_i, 14:05 , 29-Апр-05 (6)
              Неа, все равное не пашет, каунтеры обновляются в линии 3 (когда пытаюсь зайти туда ssh), хотя почему в строке 3, а не 1?

              Вобщем в чем засада совсем не понимаю.... все как по книжкам....


              access-list outside_access_in; 4 elements
              access-list outside_access_in line 1 permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh (hitcnt=0)
              access-list outside_access_in line 2 permit tcp any host 192.168.0.8 eq ssh (hitcnt=0)
              access-list outside_access_in line 3 permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178 (hitcnt=2)
              access-list outside_access_in line 4 permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0 (hitcnt=0)

              PIX Version 6.3(4)
              interface ethernet0 10baset
              interface ethernet1 100full
              nameif ethernet0 outside security0
              nameif ethernet1 inside security100
              hostname pix
              domain-name local
              clock timezone MSK/MSD 3
              clock summer-time MSK/MDD recurring last Sun Mar 2:00 last Sun Oct 3:00
              fixup protocol dns maximum-length 512
              fixup protocol ftp 21
              no fixup protocol h323 h225 1720
              no fixup protocol h323 ras 1718-1719
              fixup protocol http 80
              no fixup protocol rsh 514
              no fixup protocol rtsp 554
              no fixup protocol sip 5060
              no fixup protocol sip udp 5060
              no fixup protocol skinny 2000
              fixup protocol smtp 25
              no fixup protocol sqlnet 1521
              no fixup protocol tftp 69
              names
              access-list 110 permit ip 192.168.0.0 255.255.255.0 any
              access-list outside_access_in permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh
              access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
              access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178
              access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0
              pager lines 36
              logging on
              logging buffered debugging
              icmp permit 195.218.159.0 255.255.255.0 outside
              icmp permit host 195.218.236.177 outside
              icmp deny any outside
              icmp permit 192.168.0.0 255.255.255.0 inside
              icmp deny any inside
              mtu outside 1500
              mtu inside 1500
              ip address outside 195.218.236.178 255.255.255.252
              ip address inside 192.168.0.254 255.255.255.0
              ip audit name out_del attack action alarm drop reset
              ip audit name out_inf info action alarm
              ip audit info action alarm
              ip audit attack action alarm drop reset
              pdm location 195.218.159.0 255.255.255.0 outside
              pdm location 192.168.0.0 255.255.255.0 inside
              pdm location 195.218.159.4 255.255.255.255 outside
              pdm logging informational 100
              pdm history enable
              arp timeout 14400
              global (outside) 1 interface
              nat (inside) 1 192.168.0.0 255.255.255.0 0 0
              static (inside,outside) tcp 195.218.236.178 ssh 192.168.0.8 ssh netmask 255.255.255.255 0 0
              access-group outside_access_in in interface outside
              route outside 0.0.0.0 0.0.0.0 195.218.236.177 1
              timeout xlate 0:05:00
              timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 0:00:00
              timeout h323 0:00:00 mgcp 0:00:00 sip 0:00:00 sip_media 0:00:00
              timeout uauth 0:05:00 absolute
              aaa-server TACACS+ protocol tacacs+
              aaa-server TACACS+ max-failed-attempts 3
              aaa-server TACACS+ deadtime 10
              aaa-server RADIUS protocol radius
              aaa-server RADIUS max-failed-attempts 3
              aaa-server RADIUS deadtime 10
              aaa-server LOCAL protocol local
              aaa authentication ssh console LOCAL
              aaa authorization command LOCAL
              ntp server 130.149.17.21 source outside prefer
              ntp server 193.67.79.202 source outside
              http server enable
              http 195.218.159.0 255.255.255.0 outside
              http 192.168.0.0 255.255.255.0 inside
              no snmp-server location
              no snmp-server contact
              snmp-server community public
              no snmp-server enable traps
              no floodguard enable
              sysopt noproxyarp outside
              auth-prompt prompt Novasoft_Login:
              auth-prompt accept Novasoft_Passw:
              auth-prompt reject The END! Thanks!
              telnet 195.218.159.4 255.255.255.255 outside
              telnet timeout 5
              ssh 195.218.159.4 255.255.255.255 outside
              ssh timeout 5
              console timeout 5
              dhcpd address 192.168.0.32-192.168.0.58 inside
              dhcpd dns 192.168.0.2 212.44.131.6
              dhcpd wins 192.168.0.8
              dhcpd lease 3600
              dhcpd ping_timeout 750
              dhcpd domain local
              dhcpd option 150 ip 192.168.0.254
              dhcpd enable inside
              terminal width 80
              Cryptochecksum:1b2988213856d21193223ab71a50815d
              : end

              • Проход через PIX внутрь сети, !*! EDSKA, 14:19 , 29-Апр-05 (7)
                >Вобщем в чем засада совсем не понимаю.... все как по книжкам....
                >
                >
                >access-list outside_access_in; 4 elements
                >access-list outside_access_in line 1 permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178
                >eq ssh (hitcnt=0)
                >access-list outside_access_in line 2 permit tcp any host 192.168.0.8 eq ssh (hitcnt=0)
                >
                >access-list outside_access_in line 3 permit ip 195.218.159.0 255.255.255.0 host 195.218.236.178 (hitcnt=2)
                >access-list outside_access_in line 4 permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0 (hitcnt=0)

                Ja ocen izveniajus no v pervom otvete dopustil osibku v access-liste ...

                Access-list imejut osobennost srabotav pervomu ostalnije acl'i ne rassmatrivajutsia ...

                Delaj tak :
                1.
                no access-list 110 permit ip 192.168.0.0 255.255.255.0 any
                no access-list outside_access_in permit tcp 195.218.159.0 255.255.255.0 eq ssh host 195.218.236.178 eq ssh
                no access-list outside_access_in permit tcp any host 192.168.0.8 eq ssh
                no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 no host 195.218.236.178
                no access-list outside_access_in permit ip 195.218.159.0 255.255.255.0 192.168.0.0 255.255.255.0
                no access-group outside_access_in in interface outside

                2.
                access-list 100 permit tcp 192.168.0.0 255.255.255.0 any // razresaesh hodit kompam v internet
                access-list 101 permit tcp any host 195.218.236.178 eq 22 // razresaesh obrasenija k vneshmenu IP na 22 port (port ssh)

                access-group 101 in interface outside // prikrepliajesh pravilo k 195.218.236.178
                access-group 100 in interface inside // k 192.168.0.254

                Ispolnuj 100 i 101 kak imena access-listov ...

                Eto tocno rabotaet ja proverial na rabote ...

                • Подключение к Pix на outside, !*! bmonk, 14:52 , 14-Фев-08 (8)
                  Помогите пожалуйста, не могу настроить доступ через SSh на интерфейс outside.
                  напишите пример конфига в которов будут описаны все команды касающиеся SSH
                  заранее огромное спасибо

                  привиденная выше схема у меня не работает




Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру