這個LAB的主要目標就是防火牆下的私有地址能PING通本身的公網地址, ide
這個在一些特殊的場合會用掉,當數據包到了防火牆以後,防火牆看到是這臺機器的公網地址,而後U轉了一個彎,再回到這臺機器。 3d
私有地址:192.168.1.100 router
公網地址:10.10.10.2 server
Linux(192.168.1.100) ---inside(192.168.1.1)-outside(10.10.10.1)-R10(10.10.10.10) blog
router R10 - 10.10.10.10 (DNS server) dns
ip dns server ip
ip host test1 10.10.10.2 ci
ip host test2 10.10.10.2 get
ip host test3 10.10.10.2 it
ASA
object network LAN
subnet 192.168.1.0 255.255.255.0
object network PUBLIC <---公網地址 10.10.10.2
host 10.10.10.2
object network LOCAL
host 192.168.1.100
GigabitEthernet0/0 outside 10.10.10.1 255.255.255.0 manual
GigabitEthernet0/1 inside 192.168.1.1 255.255.255.0 manual
ciscoasa# sh run nat
nat (inside,inside) source dynamic LAN interface destination static PUBLIC LOCAL
nat (inside,outside) source static 192.168.1.100 10.10.10.2
nat (inside,outside) source static 192.168.1.101 10.10.10.3
ciscoasa# sh run same-security-traffic
same-security-traffic permit intra-interface