• Ishni bajarish tartibi
  • «Tarmoq xavfsizligi»




    Download 12,81 Mb.
    bet47/73
    Sana23.05.2024
    Hajmi12,81 Mb.
    #251629
    1   ...   43   44   45   46   47   48   49   50   ...   73
    Bog'liq
    «Tarmoq xavfsizligi»

    Cisco ASA Modellari
    Cisco ASA 5510 - masofadan turib ishlashni hisobga oladigan kichik va o'rta biznes korxonalar uchun mukammal model, bu iqtisodiy jihatdan xavfsiz yechim hamdir. Barcha xavfsizlik xizmatlarini onlayn boshqarish platformasi orqali boshqarish mumkin. Cisco 5510-da siz kutgan yuqori samarali firewall va tarmoq xavfsizligi yechimlari mavjud. Xavfsizlik xizmatlari moduli buzilishning oldini olish imkoniyatlarini to'liq boshqarish imkoniyatini beradi va mustahkam antivirus xizmatini bajaradi. Biznes kelajakda kengayishini inobatga olgan holda himoya qilish mexanizmlarini sinflarga ajratadi, shuning uchun Cisco ASA 5510 kompaniyaga kerak bo'lganda funksiyalarni kengaytirishga imkon beradi.
    Cisco ASA 5525-X - Cisco SecureX freymidan foydalangan holda, ushbu model xavfsizligi yanada murakkab tarmoqqa ega bo'lgan o'rta kompaniyalar uchun juda mos keladi. SecureX texnologiyasi Cisco taqdim etadigan xavfsizlik yechimlarining eng so'nggi versiyasidir.
    Ishni bajarish tartibi

    1. Cisco packet tracer dasturi ishga tushiriladi.

    2. Laboratoriya ishi uchun cisco 2960 kommutatori, 2911 marshruzatori, ASA0 5505 firewalli, server va kompyuterlar tanlanadi.

    3. Quyida keltirilgan topologiya quriladi.

    4. Qurilgan topologiya testlab ko`riladi.


    17.2-rasm. Tadqiq qilinayotgan tarmoq topologiyasi.

    Qurilgan topologiyada quyidagi buyruqlar teriladi:


    ASA0 ga quyidagi buyruqlar ketma ketligi kiritiladi.
    ciscoasa>en
    ciscoasa#conf t
    ciscoasa(config)#interface vlan 1
    ciscoasa(config-if)#no ip address
    ciscoasa(config-if)#ip address 195.158.100.1 255.255.255.0
    ciscoasa(config-if)#exit
    ciscoasa(config)#dhcpd address 195.158.100.22-192.158.100.50 inside
    ciscoasa(config)#dhcpd dns 8.8.8.8
    ciscoasa(config)#enable password salom
    ciscoasa(config)#username elshod password admin
    ciscoasa(config)#ssh 192.158.100.22 255.255.255.255 inside
    ciscoasa(config)#ssh timeout 1
    ciscoasa(config)#aaa authentication ssh console LOCAL
    ciscoasa(config)#interface vlan 2
    ciscoasa(config-if)# no ip address
    ciscoasa(config-if)#ip address 195.158.0.2 255.255.255.252
    ciscoasa(config-if)#exit
    ciscoasa(config)#route outside 0.0.0.0 0.0.0.0 195.158.0.1
    ciscoasa(config)#object network NET
    ciscoasa(config-network-object)#subnet 195.158.100.0 255.255.255.0
    ciscoasa(config-network-object)#nat (inside,outside) dynamic interface
    ciscoasa(config-network-object)#ex
    ciscoasa#conf t
    ciscoasa(config)#access-list NAT extended permit icmp any any
    ciscoasa(config)#access-group NAT in interface outside
    ROUTERga quyida buyruqlar ketma ketligi kiritiladi.
    continue with configuration dialog? [yes/no]: no
    Router>enable
    Router#conf t
    Router(config)#interface gigabitEthernet 0/0
    Router(config-if)#no shutdown
    Router(config-if)#exit
    Router(config)#hostname IP
    IP(config)#interface gigabitEthernet 0/0
    IP(config-if)#ip address 195.158.0.1 255.255.255.252
    IP(config-if)#ex
    IP(config)#interface gigabitEthernet 0/1
    IP(config-if)#no shutdown
    IP(config-if)#ip address 8.8.8.1 255.255.255.0
    Router(config-if)#do wr
    Router(config-if)#exit

    17.3-rasm Server ga IP manzil berish.



    17.4-rasm. Hostning ASA firewall orqali avtomatik IP manzil olishi.

    17.5-rasm. SSH protokoli yordamida firewallga masofaviy ulanish.

    17.6-rasm. Qurilgan topologiyani testlab ko’rish.



    Download 12,81 Mb.
    1   ...   43   44   45   46   47   48   49   50   ...   73




    Download 12,81 Mb.