
提示:Outside路由器作为 Server端要配置好正确的时间和时区,ASA防火墙记得指定对端的 key ID,同步过程会稍慢,大约 10分钟,可以先做后面的需求。

ASA

Outside
ntp authentication-key 1 md5 060506324F41 7
ntp authenticate
ntp trusted-key 1
ntp master

logging enable
logging asdm debugging


logging list Telnet-List message 106001
logging list Telnet-List message 302013
logging trap Telnet-List
logging host DMZ 192.168.1.100 format emblem
logging message 302013 level Warnings



packet-tracer input DMZ icmp 192.168.1.241 0 3 10.1.1.10 xml
packet-tracer input Inside tcp 10.1.1.10 8888 192.168.1.241 23 xml


! DMZ
! Apply ingress capture on the DMZ interface.
capture asdm\_cap\_ingress match tcp 192.168.1.1 255.255.255.255 202.100.1.1 255.255.255.255 eq telnet
capture asdm\_cap\_ingress packet-length 1522 buffer 524288
capture asdm\_cap\_ingress interface DMZ
! Inside
! Apply egress capture on the Inside interface.
capture asdm\_cap\_egress match tcp 192.168.1.1 255.255.255.255 202.100.1.1 255.255.255.255 eq telnet
capture asdm\_cap\_egress packet-length 1522 buffer 524288
capture asdm\_cap\_egress interface Inside

提示:需要看到如下输出
Outside#ssh -l admin -v 2 202.100.1.10
Password:
Type help or '?' for a list of available commands.
ASA> en
ASA
ssh 202.100.1.0 255.255.255.0 Outside

提示:需要看到如下输出
Inside#telnet 10.1.1.10
Trying 10.1.1.10 ... Open
User Access Verification
Username: acsuser
Password: \*\*\*\*\*\*\*\*
Type help or '?' for a list of available commands.
ASA>
##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##
ssh 0 0 Inside
aaa-server 3A protocol tacacs+
aaa-server 3A (DMZ) host 192.168.1.241
key cisco


aaa authentication ssh console 3A LOCAL
