File: firewall2.fw.orig

package info (click to toggle)
fwbuilder 5.1.0-3
  • links: PTS, VCS
  • area: main
  • in suites: wheezy
  • size: 41,192 kB
  • sloc: cpp: 185,790; sh: 71,182; ansic: 4,345; xml: 3,488; python: 83; makefile: 74; perl: 49
file content (245 lines) | stat: -rwxr-xr-x 6,401 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
!
!  This is automatically generated file. DO NOT MODIFY !
!
!  Firewall Builder  fwb_pix v5.0.1.3581
!
!  Generated Wed Oct 19 16:51:04 2011 PDT by vadim
!
! Compiled for pix 6.3
! Outbound ACLs: not supported
! Emulate outbound ACLs: yes
! Generating outbound ACLs: no
! Assume firewall is part of any: yes
!
!# files: * firewall2.fw
!
! lots of different combinations of objects in the NAT rules

! C firewall2:Policy:1: warning: Rule with direction 'Outbound' was suppressed because generation of outbound access lists is turned off in firewall object settings

!
! Prolog script:
!

!
! End of prolog script:
!




nameif eth0 inside security100

nameif eth1 outside security0

nameif eth2 dmz security50


no logging buffered
no logging console
no logging timestamp
no logging on



telnet timeout 5

clear ssh
aaa authentication ssh console LOCAL
ssh timeout 5

clear snmp-server
no snmp-server enable traps

clear ntp


no service resetinbound
no service resetoutside
no sysopt connection timewait
no sysopt nodnsalias inbound
no sysopt nodnsalias outbound
floodguard disable


!################

clear xlate
clear static
clear global
clear nat
clear access-list
clear icmp
clear telnet
clear object-group

object-group service id3D6EF08C.srv.tcp.0 tcp
  port-object eq 80
  port-object eq 119
exit

object-group network id3D8FCCDE.src.net.0
  network-object host 192.168.1.10 
  network-object host 192.168.1.20 
exit

! 
! Rule  0 (eth1)
! Anti-spoofing rule
access-list outside_acl_in deny   ip host 192.168.1.1 any log 6 interval 300
access-list outside_acl_in deny   ip host 22.22.22.22 any log 6 interval 300
access-list outside_acl_in deny   ip host 192.168.2.1 any log 6 interval 300
access-list outside_acl_in deny   ip 192.168.1.0 255.255.255.0 any log 6 interval 300
! 
! Rule  1 (eth1)
! Anti-spoofing rule
! firewall2:Policy:1: warning: Rule with direction 'Outbound' was suppressed because generation of outbound access lists is turned off in firewall object settings

access-list inside_acl_in deny   ip 192.168.1.0 255.255.255.0 any log 6 interval 300
! 
! Rule  2 (global)
access-list inside_acl_in permit tcp any host 192.168.1.10 object-group id3D6EF08C.srv.tcp.0 
access-list outside_acl_in permit tcp any host 22.22.22.22 eq 80 
access-list outside_acl_in permit tcp any host 22.22.22.22 eq 119 
access-list outside_acl_in permit tcp any host 192.168.1.10 object-group id3D6EF08C.srv.tcp.0 
access-list dmz_acl_in permit tcp any host 192.168.1.10 object-group id3D6EF08C.srv.tcp.0 
! 
! Rule  3 (global)
access-list inside_acl_in permit ip object-group id3D8FCCDE.src.net.0 host 200.200.200.200 
! 
! Rule  4 (global)
access-list outside_acl_in permit ip host 200.200.200.200 object-group id3D8FCCDE.src.net.0 
! 
! Rule  6 (global)
access-list inside_acl_in deny   ip any any 
access-list outside_acl_in deny   ip any any 
access-list dmz_acl_in deny   ip any any 


access-group dmz_acl_in in interface dmz
access-group inside_acl_in in interface inside
access-group outside_acl_in in interface outside

! 
! Rule  0 (NAT)

access-list nat0.inside permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
nat (inside) 0 access-list nat0.inside
! 
! Rule  1 (NAT)
static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0
! 
! Rule  2 (NAT)
global (outside) 1 interface
access-list id3AFB66C8.0 permit ip 192.168.1.0 255.255.255.0  any 
global (dmz) 1 interface
! 
! 
! Rule  3 (NAT)
access-list id3AFB66C8.0 permit ip host 192.168.1.10   any 
! 
access-list id3AFB66C8.0 permit ip host 192.168.1.20   any 
! 
! 
! Rule  4 (NAT)
access-list id3AFB66C8.0 permit ip host 192.168.1.11   any 
! 
access-list id3AFB66C8.0 permit ip 192.168.1.12 255.255.255.252  any 
! 
! 
! Rule  5 (NAT)
access-list id3D1C2292.0 permit ip 192.168.2.0 255.255.255.0  any 
nat (dmz) 1 access-list id3D1C2292.0 0 0
! 
! Rule  6 (NAT)
! 
! 
! Rule  7 (NAT)
global (outside) 1 interface
! 
! 
! Rule  8 (NAT)
! 
! 
! Rule  9 (NAT)
! 
! 
! 
! Rule  10 (NAT)
global (outside) 1 22.22.22.0 netmask 255.255.255.0
! 
! 
! Rule  11 (NAT)
global (outside) 1 22.22.22.21-22.22.22.25 netmask 255.255.255.0
! 
! 
! 
! Rule  12 (NAT)
global (dmz) 1 interface
access-list id3D1C1104.0 permit ip host 192.168.1.10   192.168.2.0 255.255.255.0 
! 
! Rule  13 (NAT)
access-list id3D1C1D30.0 permit ip 192.168.1.0 255.255.255.0  192.168.2.0 255.255.255.0 
nat (inside) 1 access-list id3D1C1D30.0 0 0
! 
! Rule  14 (NAT)
! 
! 
! Rule  16 (NAT)
access-list id3D1BFFA4.0 permit ip host 192.168.1.10   any 
static (inside,outside) interface  access-list id3D1BFFA4.0 0 0
! 
! Rule  17 (NAT)
access-list id3D1C0835.0 permit tcp host 192.168.1.10  eq 6667  any 
static (inside,outside) tcp interface 6667  access-list id3D1C0835.0 0 0
! 
! Rule  18 (NAT)
access-list id16986X27842.0 permit tcp host 192.168.1.1  eq 6667  any 
static (inside,outside) tcp interface 6667  access-list id16986X27842.0 0 0
! 
! Rule  19 (NAT)
access-list id414351C7.0 permit tcp host 192.168.1.10  eq 80  any 
! 
! Rule  20 (NAT)
access-list id414351C7.0 permit tcp host 192.168.1.10  eq 80  any 
static (inside,outside) tcp interface 80  access-list id414351C7.0 0 0
! 
! Rule  21 (NAT)
access-list id3AFB69BD.0 permit ip host 192.168.1.10   any 
static (inside,outside) interface  access-list id3AFB69BD.0 0 0
! 
! Rule  22 (NAT)
access-list id3D1BFFCE.0 permit ip 192.168.1.0 255.255.255.0  any 
static (inside,outside) 22.22.22.0  access-list id3D1BFFCE.0 0 0
! 
! Rule  24 (NAT)
access-list id3D1BFFF6.0 permit ip host 192.168.1.10   192.168.2.0 255.255.255.0 
static (inside,dmz) interface  access-list id3D1BFFF6.0 0 0
! 
! Rule  25 (NAT)
access-list id3BEEF6D2.0 permit tcp host 192.168.1.10  eq 119  any 
static (inside,outside) tcp interface 119  access-list id3BEEF6D2.0 0 0
! 
! Rule  27 (NAT)
access-list id3B7313C4.0 permit tcp host 192.168.1.10  eq 3128  any 
static (inside,outside) tcp interface 80  access-list id3B7313C4.0 0 0
! 
! Rule  28 (NAT)
access-list id47B6CF3421818.0 permit tcp host 192.168.1.10  eq 3128  any 
! 
! Rule  29 (NAT)
access-list id36573X14603.0 permit tcp host 192.168.1.10  eq 3128  any 
static (inside,outside) tcp interface 80  access-list id36573X14603.0 0 0
! 
! Rule  30 (NAT)
access-list id47B6CF3421818.0 permit tcp host 192.168.1.10  eq 3128  any 
static (inside,outside) tcp interface 80  access-list id47B6CF3421818.0 0 0



!
! Epilog script:
!

! End of epilog script:
!