Ping Firewall PIX (emulator GNS3)
monhim
Messages postés
3
Date d'inscription
Statut
Membre
Dernière intervention
-
monhim Messages postés 3 Date d'inscription Statut Membre Dernière intervention -
monhim Messages postés 3 Date d'inscription Statut Membre Dernière intervention -
Bonjour,
J'ai mis en place un firewall Cisco Pix ( Os 8.0(2) ). Mon problème c'est que je peux pas autorisé le "ping". j'ai creer un access-list pour autoriser tout les packet ip pour l'inerface outside
topology :
(LoopBack ip:10.10.10.2 getway :10.10.10.1) <-->(outside ip: 10.10.10.1) Firewall (inside ip:192.168.56.3) <--> Pc (VirtualBx ip: 192.168.56.101 getway :192.168.56.3)
voici ma configuration :
interface Ethernet0
nameif outside
security-level 0
ip address 10.10.10.1 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.56.3 255.255.255.0
!
interface Ethernet2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet4
shutdown
no nameif
no security-level
no ip address
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network tt
network-object 0.0.0.0 0.0.0.0
access-list outside_access_in extended permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image flash:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (outside) 101 interface
nat (inside) 101 0.0.0.0 0.0.0.0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.1.3 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 10.10.10.2 255.255.255.255 outside
http 10.10.10.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no crypto isakmp nat-traversal
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
Merci de votre aide.
J'ai mis en place un firewall Cisco Pix ( Os 8.0(2) ). Mon problème c'est que je peux pas autorisé le "ping". j'ai creer un access-list pour autoriser tout les packet ip pour l'inerface outside
topology :
(LoopBack ip:10.10.10.2 getway :10.10.10.1) <-->(outside ip: 10.10.10.1) Firewall (inside ip:192.168.56.3) <--> Pc (VirtualBx ip: 192.168.56.101 getway :192.168.56.3)
voici ma configuration :
interface Ethernet0
nameif outside
security-level 0
ip address 10.10.10.1 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.56.3 255.255.255.0
!
interface Ethernet2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet4
shutdown
no nameif
no security-level
no ip address
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network tt
network-object 0.0.0.0 0.0.0.0
access-list outside_access_in extended permit ip any any
pager lines 24
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image flash:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (outside) 101 interface
nat (inside) 101 0.0.0.0 0.0.0.0
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.1.3 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 10.10.10.2 255.255.255.255 outside
http 10.10.10.2 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no crypto isakmp nat-traversal
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
Merci de votre aide.
A voir également:
- Ping Firewall PIX (emulator GNS3)
- Comodo firewall - Télécharger - Pare-feu
- Code ascii pix - Guide
- Andy emulator - Télécharger - Émulation & Virtualisation
- Avoir du ping expression ✓ - Forum Réseau
- C est quoi un ping??????? - Forum Réseau
2) comment ????
mrc bcp cisscowarrior
ipconfig/release puis ipconfig/renew pour récupérer la df gw de l'interface physique
route add 192.168.56.0 mask 255.255.255.0 10.10.10.1 -p pour créer la route statique et la rendre permanente