查过配置手册了,ASA不支持指定IP用于SSH服务,也不支持修改SSH端口号,建议楼主采用其它替代解决方案,比如部署JumpServer来提升安全性
可以,一般的做法是用28这个地址做静态NAT映射,以H3C路由器或三层交换机的配置为例:
方法一:
#
nat static 192.168.0.1 130.125.126.28 # 静态一对一 NAT,内网地址:192.168.0.1,外网地址:130.125.126.28
#
interface GigabitEthernet1/1/3 # 使配置的静态NAT在 interface GigabitEthernet1/1/3 上生效,方向是 outbound
nat outbound static
ip address 130.125.126.30 255.255.255.248
方法二:
#
interface GigabitEthernet1/1/3
nat server protocol tcp global 130.125.126.28 22 inside 192.168.0.1 22
ip address 130.125.126.30 255.255.255.248
说明:前面的示例可能你用不上,姑且做个参考。按照你的想法,应该是130.125.126.28这个地址应该配置到防火墙管理端口,然后防火墙的外网端口和管理端口通过一台二层交换机和运营商过来的线缆连接在同一个二层域;或者是防火墙直接用 130.125.126.30:22,但是这两种方法都非常不安全,22端口不应该向互联网侧开放。通常的做法是通过vpn访问到内网,然后再访问防火墙内网管理地址的22端口,而且要做好访问限制规则。现在的防火墙一般都自带vpn功能(这个可能需要授权)
你的办法我试过,不行,28是虚拟端口
公网地址,24位的源码,28不是网络号,怎么映射出去
不太理解你的意思,29作为GW,30是配置在ASA实际接口的IP地址吗?其他几个地址,如31,32,33,34,35都是虚拟的?是指在ASA上配置的虚拟IP还是说只用作专门的功能的,并不提供实际业务转发的IP地址呢?
Features like HSRP, VRRP, GLBP are not supported on the ASA. If you have 2 ASAs in failover they share the same ip address, but only the active is taking passing the traffic. The do no pass traffic at the same time.
Now if you go in a more complicated scenario with an active/active context you can have 2 units passing traffic at the same time. But still these are different virtual firewalls that have different policies.
To summarize, HA pairs as know from IOS is not supported on ASAs in the same way.
https://community.cisco.com/t5/network-security/is-virtual-ip-possible-in-asa/td-p/1346257
-------------------
如果说想要配置SSH,可以参考如下文档:
30是配置实际接口的IP地址,其他几个地址,如31,32,33,34,35都是虚拟的,指在ASA上配置的虚拟IP