SlideShare ist ein Scribd-Unternehmen logo
1 von 9
FWSM TP mode에서 FWSM의 connection 테이블에세션이
생성되지않은상태에서 TCP ack또는syn + ack패킷이
FWSM으로들어오는경우 FWSM이어떻게처리하는지에
대한설명입니다.
구성도
Topic1
FWSM의 connection 테이블에세션정보가없는상태에서F340.08.18-3800-8라우터
로부터 TCP ack패킷이 outside인터페이스를통해서들어온경우, 아래에있는 log 메
세지가표시가됩니다.
%FWSM-6-106015: Deny TCP (no connection) from 10.3.35.204/22475 to
10.1.1.24/23 flags ACK on interface outside
FWSM# sh log
Syslog logging: enabled
Facility: 20
Timestamp logging: disabled
Standby logging: disabled
Deny Conn when Queue Full: disabled
Console logging: disabled
Monitor logging: disabled
Buffer logging: level debugging, 163 messages logged
Trap logging: disabled
History logging: disabled
Device ID: disabled
Mail logging: disabled
ASDM logging: disabled
%FWSM-5-111008: User 'enable_15' executed the 'clear logging buffer' command.
%FWSM-7-111009: User 'enable_15' executed cmd: show conn
%FWSM-7-111009: User 'enable_15' executed cmd: show conn de
%FWSM-7-111009: User 'enable_15' executed cmd: show logging
F340.08.18-3800-8
Client 역할
vlan11
F340.08.18-3800-7
서버역할
vlan10
10.1.1.24/24 10.1.1.204/24 10.3.35.204/24
FWSM : TP mode
Version : 3.1.7
G0/0 G0/0 L10
BVI10:10.1.1.254/24
%FWSM-5-111007: Begin configuration: 127.0.0.51 reading from terminal
%FWSM-5-111008: User 'enable_15' executed the 'configure terminal' command.
%FWSM-5-111005: 127.0.0.51 end configuration: OK
%FWSM-5-111007: Begin configuration: 127.0.0.51 reading from terminal
%FWSM-5-111008: User 'enable_15' executed the 'configure terminal' command.
%FWSM-5-111005: 127.0.0.51 end configuration: OK
%FWSM-7-111009: User 'enable_15' executed cmd: show conn
%FWSM-7-111009: User 'enable_15' executed cmd: show conn
%FWSM-7-111009: User 'enable_15' executed cmd: show logging
%FWSM-6-106015: Deny TCP (no connection) from 10.3.35.204/22475 to
10.1.1.24/23 flags ACK on interface outside
%FWSM-6-302013: Built inbound TCP connection 145673024472747997 for
outside:10.3.35.204/64591 (10.3.35.204/64591) to inside:10.1.1.24/23
(10.1.1.24/23)
Topic2.
FWSM의 connection 테이블에세션정보가없는상태에서F340.08.18-3800-7 라우터
로부터 TCP syn + ack패킷이 inside인터페이스를통해서들어온경우, 아래에있는
log 메세지가표시가됩니다.
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/1500 flags SYN ACK on interface inside
FWSM/admin# shlogg
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/1500 flags SYN ACK on interface inside
%FWSM-6-106015: Deny TCP (no connection)from 10.1.1.24/23 to
10.3.35.204/44069 flags SYN ACKon interface inside
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/44070 flags SYN ACK on interface inside
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/44071 flags SYN ACK on interface inside
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/44072 flags SYN ACK on interface inside
%FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to
10.3.35.204/44073 flags SYN ACK on interface inside
시험에사용된설정
F340.08.18-3800-8설정
F340.08.18-3800-8#sh run
Building configuration...
Current configuration : 1039 bytes
!
! Last configuration change at 04:52:22 UTC Tue Nov 12 2013
version 15.1
service timestamps debug datetimemsec
service timestamps log datetimemsec
no service password-encryption
!
hostname F340.08.18-3800-8
!
boot-start-marker
boot-end-marker
!
!
!
noaaa new-model
!
!
dot11 syslog
ip source-route
!
!
!
ipcef
!
!
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
voice-card 0
!
!
!
!
!
!
!
cryptopki token default removal timeout 0
!
!
!
!
licenseudipid CISCO3825 sn FTX0951C0LK
!
redundancy
!
!
!
!
!
!
!
!
!
!
interface Loopback10
ip address 10.3.35.204 255.255.255.0
!
interface GigabitEthernet0/0
ip address 10.1.1.204 255.255.255.0
duplex full
speed auto
media-type rj45
!
interface GigabitEthernet0/1
noip address
shutdown
duplex auto
speed auto
media-type rj45
!
ip forward-protocol nd
!
!
noip http server
noip http secure-server
!
!
!
!
!
!
!
control-plane
!
!
!
!
mgcp profile default
!
!
!
!
!
!
line con 0
line aux 0
linevty 0 4
login
transport input all
!
scheduler allocate 20000 1000
end
F340.08.18-3800-8#sh ipintbr
Interface IP-Address OK? Method Status
Protocol
GigabitEthernet0/0 10.1.1.204 YES manual up up
GigabitEthernet0/1 unassigned YES NVRAM administratively down
down
Loopback10 10.3.35.204 YES manual up up
FWSM 설정
FWSM/admin# shver
FWSM Firewall Version 3.1(7) <context>
FWSM# sh run
: Saved
:
FWSM Version 3.1(7)
!
firewall transparent
hostname FWSM
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface Vlan10
nameif outside
bridge-group 10
security-level 0
!
interface Vlan11
nameif inside
bridge-group 10
security-level 100
!
interface BVI10
ip address 10.1.1.254 255.255.255.0
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
access-list all extended permit ip any any
access-listhh extended permit ip host 10.1.1.204 host 10.1.1.24
access-listhh extended permit ip host 10.1.1.24 host 10.1.1.204
pager lines 24
logging enable
logging buffer-size 1000000
logging buffered debugging
mtu outside 1500
mtu inside 1500
no failover
icmp permit any outside
icmp permit any inside
noasdm history enable
arp timeout 14400
access-group all in interface outside
access-group all in interface inside
timeoutxlate 3:00:00
timeout conn 0:05:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeoutsunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00
timeoutmgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeoutuauth 0:05:00 absolute
nosnmp-server location
nosnmp-server contact
snmp-server enable traps snmp authentication linkup linkdowncoldstart
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-mapinspection_default
match default-inspection-traffic
!
!
policy-mapglobal_policy
classinspection_default
inspectdns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspectrsh
inspectsmtp
inspectsqlnet
inspect skinny
inspectsunrpc
inspectxdmcp
inspect sip
inspectnetbios
inspecttftp
!
service-policyglobal_policy global
prompt hostname context
Cryptochecksum:57da25c712fea479bcb6da8ec935423e
: end
FWSM#
F340.11.09-6500-2#sh cdp ne
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
D - Remote, C - CVTA, M - Two-port Mac Relay
Device ID Local IntrfceHoldtmeCapability Platform Port ID
F340.08.18-3800-8
Gig 2/2 146 R S I 3825 Gig 0/0
F340.08.18-3800-7
Gig 2/1 146 R S I 3825 Gig 0/0
F340.08.18-3800-7설정
F340.08.18-3800-7#sh run
Building configuration...
Current configuration : 1259 bytes
!
! Last configuration change at 05:56:32 UTC Tue Nov 12 2013
version 15.1
service timestamps debug datetimemsec
service timestamps log datetimemsec
no service password-encryption
!
hostname F340.08.18-3800-7
!
boot-start-marker
boot system flash:c3825-advipservicesk9-mz.151-4.M7
boot-end-marker
!
!
!
noaaa new-model
!
!
dot11 syslog
ip source-route
!
!
!
ipcef
!
!
ip host PAGENT-SECURITY-V3 55.11.39.5 36.72.0.0
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
voice-card 0
!
!
!
!
!
!
!
cryptopki token default removal timeout 0
!
!
!
!
licenseudipid CISCO3825 sn FTX1012A01W
!
redundancy
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 10.1.1.24 255.255.255.0
duplex full
speed auto
media-type rj45
!
interface GigabitEthernet0/1
noip address
shutdown
duplex auto
speed auto
media-type rj45
!
ip forward-protocol nd
!
!
noip http server
noip http secure-server
ip route 0.0.0.0 0.0.0.0 10.1.1.204
!
!
!
!
!
!
!
control-plane
!
!
!
!
mgcp profile default
!
!
!
!
!
!
line con 0
exec-timeout 0 0
line aux 0
linevty 0 4
privilege level 15
no login
transport input all
!
scheduler allocate 20000 1000
end
More Cisco Network Topics you can visit: http://blog.router-switch.com/

Weitere ähnliche Inhalte

Was ist angesagt?

Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Mohammed Omar
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortIPMAX s.r.l.
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Securitydkaya
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switchIT Tech
 
Algosec how to avoid business outages from misconfigured devices final
Algosec how to avoid business outages from misconfigured devices finalAlgosec how to avoid business outages from misconfigured devices final
Algosec how to avoid business outages from misconfigured devices finalMaytal Levi
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part iiKrunal Shah
 
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)Naoto MATSUMOTO
 
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO) UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO) Naoto MATSUMOTO
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port SecurityHamed Moghaddam
 
Copy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackCopy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackVishal Gurujuwada
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2Shuya Osaki
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleChanaka Lasantha
 

Was ist angesagt? (20)

Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
Exploit wep flaws in six steps using backtrack 5 r3 (crack hack wireless)
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
Cisco Switch Security
Cisco Switch SecurityCisco Switch Security
Cisco Switch Security
 
How to configure port security in cisco switch
How to configure port security in cisco switchHow to configure port security in cisco switch
How to configure port security in cisco switch
 
Algosec how to avoid business outages from misconfigured devices final
Algosec how to avoid business outages from misconfigured devices finalAlgosec how to avoid business outages from misconfigured devices final
Algosec how to avoid business outages from misconfigured devices final
 
IPSec VPN
IPSec VPNIPSec VPN
IPSec VPN
 
Vpn 3854d825
Vpn 3854d825Vpn 3854d825
Vpn 3854d825
 
Nexus 1000v part ii
Nexus 1000v part iiNexus 1000v part ii
Nexus 1000v part ii
 
Examen main remote
Examen main remoteExamen main remote
Examen main remote
 
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)
Large Scale L2TPv3 Overlay Networking with OSPFv3(DRAFT)
 
Stu t17 a
Stu t17 aStu t17 a
Stu t17 a
 
Ipsec
IpsecIpsec
Ipsec
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO) UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
 
Cisco CCNA Port Security
Cisco CCNA Port SecurityCisco CCNA Port Security
Cisco CCNA Port Security
 
Copy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attackCopy of a simple tcp spoofing attack
Copy of a simple tcp spoofing attack
 
ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2ハイパフォーマンスブラウザネットワーキング2
ハイパフォーマンスブラウザネットワーキング2
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Port Security
Port SecurityPort Security
Port Security
 

Andere mochten auch

R8 configuraciã³n de un router de servicios integrados
R8 configuraciã³n de un router de servicios integradosR8 configuraciã³n de un router de servicios integrados
R8 configuraciã³n de un router de servicios integradosRichy Vega
 
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....VMworld
 
Application hosting in the Intelligent WAN
Application hosting in the Intelligent WANApplication hosting in the Intelligent WAN
Application hosting in the Intelligent WANCisco DevNet
 
Open Service Containers: a virtual machine hosting environment directly into ...
Open Service Containers: a virtual machine hosting environment directly into ...Open Service Containers: a virtual machine hosting environment directly into ...
Open Service Containers: a virtual machine hosting environment directly into ...Cisco DevNet
 
Integracion de servicios de redes de voz y datos
Integracion de servicios de redes de voz y datosIntegracion de servicios de redes de voz y datos
Integracion de servicios de redes de voz y datosgugarte
 

Andere mochten auch (6)

Practica# (2)
Practica# (2)Practica# (2)
Practica# (2)
 
R8 configuraciã³n de un router de servicios integrados
R8 configuraciã³n de un router de servicios integradosR8 configuraciã³n de un router de servicios integrados
R8 configuraciã³n de un router de servicios integrados
 
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
 
Application hosting in the Intelligent WAN
Application hosting in the Intelligent WANApplication hosting in the Intelligent WAN
Application hosting in the Intelligent WAN
 
Open Service Containers: a virtual machine hosting environment directly into ...
Open Service Containers: a virtual machine hosting environment directly into ...Open Service Containers: a virtual machine hosting environment directly into ...
Open Service Containers: a virtual machine hosting environment directly into ...
 
Integracion de servicios de redes de voz y datos
Integracion de servicios de redes de voz y datosIntegracion de servicios de redes de voz y datos
Integracion de servicios de redes de voz y datos
 

Ähnlich wie Tcp ack or syn+ack coming to fwsm running tp mode when session is not in the connection table

Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponlaonap166
 
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and later
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and laterHow to set ssh telnet-http connection timeout using mpf for asa 8.3 and later
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and latercandy tang
 
CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host securityShiv Koppad
 
Open stack advanced_part
Open stack advanced_partOpen stack advanced_part
Open stack advanced_partlilliput12
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network TroubleshootingOpen Source Consulting
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configurationIT Tech
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshopKae Hsu
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemSneha Inguva
 
보안위협 관리통제
보안위협 관리통제보안위협 관리통제
보안위협 관리통제Munkyeonggu
 
Solaris 10 Advanced Features.
Solaris 10 Advanced Features.Solaris 10 Advanced Features.
Solaris 10 Advanced Features.Aram Avetisyan
 
Cisco data center support
Cisco data center supportCisco data center support
Cisco data center supportKrunal Shah
 
Switch olt config
Switch olt configSwitch olt config
Switch olt configkalel1486
 
Make container without_docker_6-overlay-network_1
Make container without_docker_6-overlay-network_1 Make container without_docker_6-overlay-network_1
Make container without_docker_6-overlay-network_1 Sam Kim
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchiLeandro Uglar
 

Ähnlich wie Tcp ack or syn+ack coming to fwsm running tp mode when session is not in the connection table (20)

Triển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gponTriển khai vpn client to site qua router gpon
Triển khai vpn client to site qua router gpon
 
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and later
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and laterHow to set ssh telnet-http connection timeout using mpf for asa 8.3 and later
How to set ssh telnet-http connection timeout using mpf for asa 8.3 and later
 
הגדרת נתבי סיסקו 1.0
הגדרת נתבי סיסקו 1.0הגדרת נתבי סיסקו 1.0
הגדרת נתבי סיסקו 1.0
 
CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host security
 
Open stack advanced_part
Open stack advanced_partOpen stack advanced_part
Open stack advanced_part
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
Cisco asa active,active failover configuration
Cisco asa active,active failover configurationCisco asa active,active failover configuration
Cisco asa active,active failover configuration
 
Configuracion EIGRP
Configuracion EIGRPConfiguracion EIGRP
Configuracion EIGRP
 
OpenVPN
OpenVPNOpenVPN
OpenVPN
 
Network and TCP performance relationship workshop
Network and TCP performance relationship workshopNetwork and TCP performance relationship workshop
Network and TCP performance relationship workshop
 
1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Handy Networking Tools and How to Use Them
Handy Networking Tools and How to Use ThemHandy Networking Tools and How to Use Them
Handy Networking Tools and How to Use Them
 
보안위협 관리통제
보안위협 관리통제보안위협 관리통제
보안위협 관리통제
 
Solaris 10 Advanced Features.
Solaris 10 Advanced Features.Solaris 10 Advanced Features.
Solaris 10 Advanced Features.
 
Configuracao de switch
Configuracao de switchConfiguracao de switch
Configuracao de switch
 
Cisco data center support
Cisco data center supportCisco data center support
Cisco data center support
 
Switch olt config
Switch olt configSwitch olt config
Switch olt config
 
Conns connlimits
Conns connlimitsConns connlimits
Conns connlimits
 
Make container without_docker_6-overlay-network_1
Make container without_docker_6-overlay-network_1 Make container without_docker_6-overlay-network_1
Make container without_docker_6-overlay-network_1
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
 

Mehr von IT Tech

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setupIT Tech
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideIT Tech
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideIT Tech
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faqIT Tech
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesIT Tech
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresIT Tech
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solutionIT Tech
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesIT Tech
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesIT Tech
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesIT Tech
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellIT Tech
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000IT Tech
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexIT Tech
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesIT Tech
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesIT Tech
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration exampleIT Tech
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700IT Tech
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration optionsIT Tech
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement modelIT Tech
 

Mehr von IT Tech (20)

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setup
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guide
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guide
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faq
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switches
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi features
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solution
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switches
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switches
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modes
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fex
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches series
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 series
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration example
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration options
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement model
 

Kürzlich hochgeladen

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Tcp ack or syn+ack coming to fwsm running tp mode when session is not in the connection table

  • 1. FWSM TP mode에서 FWSM의 connection 테이블에세션이 생성되지않은상태에서 TCP ack또는syn + ack패킷이 FWSM으로들어오는경우 FWSM이어떻게처리하는지에 대한설명입니다. 구성도 Topic1 FWSM의 connection 테이블에세션정보가없는상태에서F340.08.18-3800-8라우터 로부터 TCP ack패킷이 outside인터페이스를통해서들어온경우, 아래에있는 log 메 세지가표시가됩니다. %FWSM-6-106015: Deny TCP (no connection) from 10.3.35.204/22475 to 10.1.1.24/23 flags ACK on interface outside FWSM# sh log Syslog logging: enabled Facility: 20 Timestamp logging: disabled Standby logging: disabled Deny Conn when Queue Full: disabled Console logging: disabled Monitor logging: disabled Buffer logging: level debugging, 163 messages logged Trap logging: disabled History logging: disabled Device ID: disabled Mail logging: disabled ASDM logging: disabled %FWSM-5-111008: User 'enable_15' executed the 'clear logging buffer' command. %FWSM-7-111009: User 'enable_15' executed cmd: show conn %FWSM-7-111009: User 'enable_15' executed cmd: show conn de %FWSM-7-111009: User 'enable_15' executed cmd: show logging F340.08.18-3800-8 Client 역할 vlan11 F340.08.18-3800-7 서버역할 vlan10 10.1.1.24/24 10.1.1.204/24 10.3.35.204/24 FWSM : TP mode Version : 3.1.7 G0/0 G0/0 L10 BVI10:10.1.1.254/24
  • 2. %FWSM-5-111007: Begin configuration: 127.0.0.51 reading from terminal %FWSM-5-111008: User 'enable_15' executed the 'configure terminal' command. %FWSM-5-111005: 127.0.0.51 end configuration: OK %FWSM-5-111007: Begin configuration: 127.0.0.51 reading from terminal %FWSM-5-111008: User 'enable_15' executed the 'configure terminal' command. %FWSM-5-111005: 127.0.0.51 end configuration: OK %FWSM-7-111009: User 'enable_15' executed cmd: show conn %FWSM-7-111009: User 'enable_15' executed cmd: show conn %FWSM-7-111009: User 'enable_15' executed cmd: show logging %FWSM-6-106015: Deny TCP (no connection) from 10.3.35.204/22475 to 10.1.1.24/23 flags ACK on interface outside %FWSM-6-302013: Built inbound TCP connection 145673024472747997 for outside:10.3.35.204/64591 (10.3.35.204/64591) to inside:10.1.1.24/23 (10.1.1.24/23) Topic2. FWSM의 connection 테이블에세션정보가없는상태에서F340.08.18-3800-7 라우터 로부터 TCP syn + ack패킷이 inside인터페이스를통해서들어온경우, 아래에있는 log 메세지가표시가됩니다. %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/1500 flags SYN ACK on interface inside FWSM/admin# shlogg %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/1500 flags SYN ACK on interface inside %FWSM-6-106015: Deny TCP (no connection)from 10.1.1.24/23 to 10.3.35.204/44069 flags SYN ACKon interface inside %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/44070 flags SYN ACK on interface inside %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/44071 flags SYN ACK on interface inside %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/44072 flags SYN ACK on interface inside %FWSM-6-106015: Deny TCP (no connection) from 10.1.1.24/23 to 10.3.35.204/44073 flags SYN ACK on interface inside 시험에사용된설정 F340.08.18-3800-8설정 F340.08.18-3800-8#sh run Building configuration... Current configuration : 1039 bytes ! ! Last configuration change at 04:52:22 UTC Tue Nov 12 2013 version 15.1 service timestamps debug datetimemsec
  • 3. service timestamps log datetimemsec no service password-encryption ! hostname F340.08.18-3800-8 ! boot-start-marker boot-end-marker ! ! ! noaaa new-model ! ! dot11 syslog ip source-route ! ! ! ipcef ! ! no ipv6 cef ! multilink bundle-name authenticated ! ! ! ! voice-card 0 ! ! ! ! ! ! ! cryptopki token default removal timeout 0 ! ! ! ! licenseudipid CISCO3825 sn FTX0951C0LK ! redundancy ! ! ! ! ! ! !
  • 4. ! ! ! interface Loopback10 ip address 10.3.35.204 255.255.255.0 ! interface GigabitEthernet0/0 ip address 10.1.1.204 255.255.255.0 duplex full speed auto media-type rj45 ! interface GigabitEthernet0/1 noip address shutdown duplex auto speed auto media-type rj45 ! ip forward-protocol nd ! ! noip http server noip http secure-server ! ! ! ! ! ! ! control-plane ! ! ! ! mgcp profile default ! ! ! ! ! ! line con 0 line aux 0 linevty 0 4 login transport input all ! scheduler allocate 20000 1000 end
  • 5. F340.08.18-3800-8#sh ipintbr Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 10.1.1.204 YES manual up up GigabitEthernet0/1 unassigned YES NVRAM administratively down down Loopback10 10.3.35.204 YES manual up up FWSM 설정 FWSM/admin# shver FWSM Firewall Version 3.1(7) <context> FWSM# sh run : Saved : FWSM Version 3.1(7) ! firewall transparent hostname FWSM enable password 8Ry2YjIyt7RRXU24 encrypted names ! interface Vlan10 nameif outside bridge-group 10 security-level 0 ! interface Vlan11 nameif inside bridge-group 10 security-level 100 ! interface BVI10 ip address 10.1.1.254 255.255.255.0 ! passwd 2KFQnbNIdI.2KYOU encrypted ftp mode passive access-list all extended permit ip any any access-listhh extended permit ip host 10.1.1.204 host 10.1.1.24 access-listhh extended permit ip host 10.1.1.24 host 10.1.1.204 pager lines 24 logging enable logging buffer-size 1000000 logging buffered debugging mtu outside 1500 mtu inside 1500 no failover icmp permit any outside icmp permit any inside noasdm history enable
  • 6. arp timeout 14400 access-group all in interface outside access-group all in interface inside timeoutxlate 3:00:00 timeout conn 0:05:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeoutsunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00 timeoutmgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00 timeoutuauth 0:05:00 absolute nosnmp-server location nosnmp-server contact snmp-server enable traps snmp authentication linkup linkdowncoldstart telnet timeout 5 ssh timeout 5 console timeout 0 ! class-mapinspection_default match default-inspection-traffic ! ! policy-mapglobal_policy classinspection_default inspectdns maximum-length 512 inspect ftp inspect h323 h225 inspect h323 ras inspectrsh inspectsmtp inspectsqlnet inspect skinny inspectsunrpc inspectxdmcp inspect sip inspectnetbios inspecttftp ! service-policyglobal_policy global prompt hostname context Cryptochecksum:57da25c712fea479bcb6da8ec935423e : end FWSM# F340.11.09-6500-2#sh cdp ne Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local IntrfceHoldtmeCapability Platform Port ID F340.08.18-3800-8 Gig 2/2 146 R S I 3825 Gig 0/0 F340.08.18-3800-7 Gig 2/1 146 R S I 3825 Gig 0/0
  • 7. F340.08.18-3800-7설정 F340.08.18-3800-7#sh run Building configuration... Current configuration : 1259 bytes ! ! Last configuration change at 05:56:32 UTC Tue Nov 12 2013 version 15.1 service timestamps debug datetimemsec service timestamps log datetimemsec no service password-encryption ! hostname F340.08.18-3800-7 ! boot-start-marker boot system flash:c3825-advipservicesk9-mz.151-4.M7 boot-end-marker ! ! ! noaaa new-model ! ! dot11 syslog ip source-route ! ! ! ipcef ! ! ip host PAGENT-SECURITY-V3 55.11.39.5 36.72.0.0 no ipv6 cef ! multilink bundle-name authenticated ! ! ! ! voice-card 0 ! ! ! ! ! ! ! cryptopki token default removal timeout 0 !
  • 8. ! ! ! licenseudipid CISCO3825 sn FTX1012A01W ! redundancy ! ! ! ! ! ! ! ! ! ! interface GigabitEthernet0/0 ip address 10.1.1.24 255.255.255.0 duplex full speed auto media-type rj45 ! interface GigabitEthernet0/1 noip address shutdown duplex auto speed auto media-type rj45 ! ip forward-protocol nd ! ! noip http server noip http secure-server ip route 0.0.0.0 0.0.0.0 10.1.1.204 ! ! ! ! ! ! ! control-plane ! ! ! ! mgcp profile default ! ! !
  • 9. ! ! ! line con 0 exec-timeout 0 0 line aux 0 linevty 0 4 privilege level 15 no login transport input all ! scheduler allocate 20000 1000 end More Cisco Network Topics you can visit: http://blog.router-switch.com/