(1)先配置好ip(pc端也要配好)
ciscoasa(config)# interface e0
ciscoasa(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.ciscoasa(config-if)#ip address 200.100.10.254 255.255.255.0
ciscoasa(config)# interface e1
ciscoasa(config-if)# nameif outside
INFO: Security level for "inside" set to 100 by default.ciscoasa(config-if)#ip address 192.168.100.254 255.255.255.0
ciscoasa(config)# interface e2
ciscoasa(config-if)# nameif dzm
INFO: Security level for "dzm" set to 0 by default.
ciscoasa(config-if)# security-level 100 给他的安全等级提高这样outside就会访问不了idzm了ciscoasa(config-if)#ip address 10.21.100.254 255.255.255.0
配置外网和内网 object (本实验的方法是用object network object-name 封装好 将他们一对一映射)
首先配置外网的object
ciscoasa(config)# object network outside-pudciscoasa(config)# host 200.100.10.2 要跟外网同一个网段即可
第二、配置内网的object
ciscoasa(config)# object network outside-in
ciscoasa(config)# host 192.168.10.1 要跟PC端的ip同一个
第三、将他们一对一映射
ciscoasa(config)# object network outside-in
ciscoasa(config)#nat (inside,outside) static outside-pud
验证实验(开启web服务访问即可)
要想outside访问inside需要配置一条access-list
ciscoasa(config)# access-list outside-to-inside extended permit tcp 200.100.10.0 255.255.255.0 192.168.200.0 255.255.p eq www
ciscoasa(config)# access-group outside-to-inside in interface outside