Configuration firewall Cisco PIX 501

Configuration firewall Cisco PIX 501 - Sécurité - Réseaux grand public / SoHo

Marsh Posté le 15-11-2010 à 17:41:54    

Bonjour à tous !
 
Voilà je vous explique mon problème...
Je dispose d'un réseau local 192.168.3.0 / 24 relié à un Firewall Cisco PIX 501 qui sort ensuite sur mon routeur Internet.
Je peux me connecter au Firewall Cisco en SSH via Putty, l'ip du Firewall est 192.168.3.6.
 
Je souhaiterais créer une liste de pc (192.168.3.1 - 192.168.3.10) qui soit autorisé à sortir sur le net (http 80) et une autre liste (192.168.3.10 - 192.168.3.254) qui soit interdit de net (http 80) juste le port 80.
Mais je ne sais pas du tout comment faire, j'ai bien sur effectué plusieurs recherchers sur le net avant de poster.
Voici la configuration du Firewall obtenue avec la commande wr t
 
pixfirewall(config)# wr t
Building configuration...
: Saved
:
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password QPct.uoxYiajOI02 encrypted
passwd w1gAdE.OyCWiDiTI encrypted
hostname pixfirewall
domain-name ciscopix.com
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
name 192.168.1.0 LAN_Tavaux
name 192.168.4.0 LAN_Villeurbanne
name 192.168.0.0 LAN_Montchanin
name 172.16.0.0 DMZ_Montchanin
access-list acl_out permit icmp any any
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 LAN_Mon                                          tchanin 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 LAN_Tav                                          aux 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 LAN_Vil                                          leurbanne 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.3.0 255.255.255.0 DMZ_Mon                                          tchanin 255.255.255.0
access-list outside_cryptomap_20 permit ip 192.168.3.0 255.255.255.0 LAN_Montcha                                          nin 255.255.255.0
access-list outside_cryptomap_20 permit ip 192.168.3.0 255.255.255.0 DMZ_Montcha                                          nin 255.255.255.0
access-list outside_cryptomap_40 permit ip 192.168.3.0 255.255.255.0 LAN_Tavaux                                           255.255.255.0
access-list outside_cryptomap_60 permit ip 192.168.3.0 255.255.255.0 LAN_Villeur                                          banne 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 196.203.54.198 255.255.255.252
ip address inside 192.168.3.6 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm location 213.150.169.0 255.255.255.0 outside
pdm location 213.150.176.0 255.255.255.0 outside
pdm location 213.150.177.0 255.255.255.0 outside
pdm location 213.150.169.0 255.255.255.0 inside
pdm location LAN_Montchanin 255.255.255.0 outside
pdm location 90.39.16.22 255.255.255.255 inside
pdm location LAN_Tavaux 255.255.255.0 inside
pdm location 192.168.3.1 255.255.255.255 inside
pdm location 192.168.3.143 255.255.255.255 inside
pdm location 213.150.169.245 255.255.255.255 outside
pdm location LAN_Tavaux 255.255.255.0 outside
pdm location LAN_Villeurbanne 255.255.255.0 inside
pdm location LAN_Villeurbanne 255.255.255.0 outside
pdm location 196.203.54.0 255.255.255.0 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 196.203.54.197 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
aaa authentication ssh console LOCAL
http server enable
http 213.150.169.0 255.255.255.0 outside
http 213.150.177.0 255.255.255.0 outside
http 213.150.176.0 255.255.255.0 outside
http 213.150.169.245 255.255.255.255 outside
http 0.0.0.0 0.0.0.0 outside
http LAN_Tavaux 255.255.255.0 inside
http 192.168.3.1 255.255.255.255 inside
http 192.168.3.143 255.255.255.255 inside
http 90.39.16.22 255.255.255.255 inside
http 0.0.0.0 0.0.0.0 inside
http 192.168.3.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community topnet.tn
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set pfs group2
crypto map outside_map 20 set peer 90.80.32.13
crypto map outside_map 20 set transform-set ESP-AES-128-SHA
crypto map outside_map 20 set security-association lifetime seconds 3600 kilobyt                                          es 4608000
crypto map outside_map 40 ipsec-isakmp
crypto map outside_map 40 match address outside_cryptomap_40
crypto map outside_map 40 set pfs group2
crypto map outside_map 40 set peer 90.80.26.209
crypto map outside_map 40 set transform-set ESP-AES-128-SHA
crypto map outside_map 40 set security-association lifetime seconds 3600 kilobyt                                          es 4608000
crypto map outside_map 60 ipsec-isakmp
crypto map outside_map 60 match address outside_cryptomap_60
crypto map outside_map 60 set pfs group2
crypto map outside_map 60 set peer 90.80.31.189
crypto map outside_map 60 set transform-set ESP-AES-128-SHA
crypto map outside_map 60 set security-association lifetime seconds 3600 kilobyt                                          es 4608000
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 80.118.186.186 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address 90.80.31.189 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address 90.80.26.209 netmask 255.255.255.255 no-xauth no-config-mode
isakmp key ******** address 90.80.32.13 netmask 255.255.255.255 no-xauth no-config-mode
isakmp identity address
isakmp keepalive 60 3
isakmp nat-traversal 20
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
isakmp policy 40 authentication pre-share
isakmp policy 40 encryption aes
isakmp policy 40 hash sha
isakmp policy 40 group 2
isakmp policy 40 lifetime 21600
telnet 196.203.52.0 255.255.255.0 outside
telnet 213.150.169.0 255.255.255.0 outside
telnet 213.150.177.0 255.255.255.0 outside
telnet 0.0.0.0 0.0.0.0 outside
telnet 192.168.3.0 255.255.255.0 inside
telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 5
ssh 213.150.169.0 255.255.255.0 outside
ssh 213.150.177.0 255.255.255.0 outside
ssh 0.0.0.0 0.0.0.0 outside
ssh 213.150.176.0 255.255.255.0 outside
ssh 193.252.44.237 255.255.255.255 outside
ssh 0.0.0.0 0.0.0.0 inside
ssh timeout 5
management-access inside
console timeout 0
dhcpd lease 3600
dhcpd ping_timeout 750
username atsfr password 7WHlerWMK2X1Pgtu encrypted privilege 15
username admin_ft password oWBxX4WKsQQBAwmS encrypted privilege 15
username topnet password yGsu4Rv9ppF5hsAP encrypted privilege 15
username topnetHD password I3DeRthHoaEwa6ca encrypted privilege 2
terminal width 80
Cryptochecksum:e05a39f6993450f306afaa0889137d95
: end
[OK]
 
 
Merci par avance.
 
Cordialement,
William

Reply

Marsh Posté le 15-11-2010 à 17:41:54   

Reply

Marsh Posté le 15-11-2010 à 19:14:58    

Salut,
édite ton post et supprime les adresse ip publique !
A+


---------------
Hommage au sergent Aurélie Salel - http://www.pompiersparis.fr/
Reply

Marsh Posté le 15-11-2010 à 19:21:11    

pas besoin, ça ne représente aucun risque.


---------------
Que va-t-il se passer cette gelgamar ? vous le découvrirez janamont à 20h
Reply

Sujets relatifs:

Leave a Replay

Make sure you enter the(*)required information where indicate.HTML code is not allowed