DNS Doctoring NAT NAT-Hairping

這個LAB的主要目標就是防火牆下的私有地址能PING通本身的公網地址,  ide

這個在一些特殊的場合會用掉,當數據包到了防火牆以後,防火牆看到是這臺機器的公網地址,而後U轉了一個彎,再回到這臺機器。 3d

私有地址:192.168.1.100 router

公網地址:10.10.10.2 server

wpsC1F5.tmp

Linux(192.168.1.100) ---inside(192.168.1.1)-outside(10.10.10.1)-R10(10.10.10.10) blog

router R10 - 10.10.10.10 (DNS server) dns

ip dns server ip

ip host test1 10.10.10.2 ci

ip host test2 10.10.10.2 get

ip host test3 10.10.10.2 it

ASA

object network LAN

subnet 192.168.1.0 255.255.255.0

object network PUBLIC  <---公網地址 10.10.10.2

host 10.10.10.2

object network LOCAL

host 192.168.1.100

GigabitEthernet0/0 outside 10.10.10.1 255.255.255.0 manual

GigabitEthernet0/1 inside 192.168.1.1 255.255.255.0 manual

ciscoasa# sh run nat

nat (inside,inside) source dynamic LAN interface destination static PUBLIC LOCAL

nat (inside,outside) source static 192.168.1.100 10.10.10.2

nat (inside,outside) source static 192.168.1.101 10.10.10.3

ciscoasa# sh run same-security-traffic

same-security-traffic permit intra-interface

wpsC1F6.tmp

相關文章
相關標籤/搜索