Cisco Pix 515 POP&SMTP, Илья, 26-Дек-06, 10:00 [смотреть все]Здравствуйте! Имеется следующий конфиг.Подскажите как безопасно открыть доступ по протоколам POP3 и SMTP с конкретного внешнего IP на определеную машину,находящуюся в сети INSIDE (10.1.0.1). И соответственно открыть для этой машины pop3 и smtp на выход.PIX Version 6.3(4) interface ethernet0 auto interface ethernet1 auto interface ethernet2 auto interface ethernet2 vlan64 physical interface ethernet2 vlan65 logical nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security40 nameif vlan65 dmz_1 security60 hostname pixfirewall fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list in_dmz permit ip any 192.168.2.0 255.255.255.0 access-list in_dmz permit icmp any any access-list in_vpn permit ip 10.1.0.0 255.255.128.0 192.168.3.0 255.255.255.0 pager lines 24 logging on logging timestamp logging trap errors logging facility 21 logging host dmz 192.168.1.26 logging host inside 10.1.2.10 mtu outside 1500 mtu inside 1500 mtu dmz 1500 ip address outside 213.85.178.107 255.255.255.240 ip address inside 10.1.0.1 255.255.128.0 ip address dmz 192.168.1.1 255.255.255.0 ip address dmz_1 192.168.2.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool mypool 192.168.3.1-192.168.3.10 pdm logging informational 100 pdm history enable arp timeout 14400 global (outside) 1 interface global (dmz_1) 1 interface nat (inside) 0 access-list in_vpn nat (inside) 1 192.168.2.0 255.255.255.0 0 0 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 nat (dmz) 1 0.0.0.0 0.0.0.0 0 0 static (dmz,outside) tcp 213.85.178.106 smtp 192.168.1.2 smtp netmask 255.255.255.255 0 0 static (dmz,outside) tcp 213.85.178.108 ftp 192.168.1.2 ftp netmask 255.255.255.255 0 0 static (dmz,outside) tcp 213.85.178.103 www 192.168.1.2 www netmask 255.255.255.255 0 0 access-group in_dmz in interface inside conduit permit icmp any any echo-reply conduit permit icmp any any unreachable conduit permit icmp any any redirect conduit permit icmp any any time-exceeded conduit permit tcp host 213.85.178.106 eq smtp any eq smtp conduit permit tcp host 213.85.178.106 eq smtp any conduit permit tcp host 213.85.178.108 eq ftp any conduit permit tcp host 213.85.178.103 eq www any route outside 0.0.0.0 0.0.0.0 213.85.178.97 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local http server enable no snmp-server location no snmp-server contact snmp-server community public no snmp-server enable traps floodguard enable sysopt connection permit-pptp telnet 10.1.0.0 255.255.128.0 inside telnet 192.168.1.0 255.255.255.0 dmz telnet 192.168.2.0 255.255.255.0 dmz_1 telnet timeout 5 ssh timeout 5 console timeout 0
|