实验要求
1.内网网段配置动态pat将内网192.168.1.0网段映射到防火墙外网接口上
2.dmz区域服务器做静态pat将两台服务器对应到一个外网接口的不同端口
3.开启nat 控制
4.对内网网段192.168.2.0或豁免能够发访问外网
5.并通过远程进行验证
实验命令
ciscoasa# conf t
ciscoasa(config)# int e0/0
ciscoasa(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
ciscoasa(config-if)# ip add 202.106.0.1 255.255.255.0
ciscoasa(config-if)# no sh
ciscoasa(config-if)# exit
ciscoasa(config)# int e0/1
ciscoasa(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
ciscoasa(config-if)# ip add 10.0.0.2 255.255.255.252
ciscoasa(config-if)# no sh
ciscoasa(config-if)# exit
ciscoasa(config)# int e0/2
ciscoasa(config-if)# nameif dmz
INFO: Security level for "dmz"