DNS Doctoring NAT NAT-Hairping

这个LAB的主要目标就是防火墙下的私有地址能PING通本身的公网地址,  ide

这个在一些特殊的场合会用掉,当数据包到了防火墙以后,防火墙看到是这台机器的公网地址,而后U转了一个弯,再回到这台机器。 3d

私有地址:192.168.1.100 router

公网地址:10.10.10.2 server

wpsC1F5.tmp

Linux(192.168.1.100) ---inside(192.168.1.1)-outside(10.10.10.1)-R10(10.10.10.10) blog

router R10 - 10.10.10.10 (DNS server) dns

ip dns server ip

ip host test1 10.10.10.2 ci

ip host test2 10.10.10.2 get

ip host test3 10.10.10.2 it

ASA

object network LAN

subnet 192.168.1.0 255.255.255.0

object network PUBLIC  <---公网地址 10.10.10.2

host 10.10.10.2

object network LOCAL

host 192.168.1.100

GigabitEthernet0/0 outside 10.10.10.1 255.255.255.0 manual

GigabitEthernet0/1 inside 192.168.1.1 255.255.255.0 manual

ciscoasa# sh run nat

nat (inside,inside) source dynamic LAN interface destination static PUBLIC LOCAL

nat (inside,outside) source static 192.168.1.100 10.10.10.2

nat (inside,outside) source static 192.168.1.101 10.10.10.3

ciscoasa# sh run same-security-traffic

same-security-traffic permit intra-interface

wpsC1F6.tmp

相关文章
相关标签/搜索