版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Cisco IOS Threat Defense Features,Implementing Cisco IOS Firewalls,Configuring Cisco IOS Firewall from the CLI,Cisco IOS Firewall ConfigurationTasks Using the CLI,Pick an interface: internal or external. Configure IP ACLs at the interface. Define inspection rules. Apply inspection rules and ACLs to
2、interfaces. Test and verify.,Set Audit Trails and Alerts,Router(config)#logging on Router(config)#logging host Router(config)#ip inspect audit-trail Router(config)#no ip inspect alert-off,Enables the delivery of audit trail messages using syslog,ip inspect audit-trail,Router(config)#,Enable
3、s real-time alerts,no ip inspect alert-off,Router(config)#,Define Inspection Rules forApplication Protocols,ip inspect name inspection-name protocol alert on|off audit-trail on|off timeout seconds,Defines the application protocols to inspect. Will be applied to an interface: Available protocols are
4、tcp, udp, icmp, smtp, esmtp, cuseeme, ftp, ftps, http, h323, netshow, rcmd, realaudio, rpc, rtsp, sip, skinny, sqlnet, tftp, vdolive, etc. Alert, audit-trail, and timeout are configurable per protocol, and override global settings.,Router(config)#,Router(config)#ip inspect name FWRULE smtp alert on
5、audit-trail on timeout 300 Router(config)#ip inspect name FWRULE ftp alert on audit-trail on timeout 300,Apply an Inspection Rule to an Interface,ip inspect inspection-name in | out,Applies the named inspection rule to an interface,Router(config-if)#,Router(config)#interface e0/0 Router(config-if)#i
6、p inspect FWRULE in,Applies the inspection rule to interface e0/0 in inward direction,Guidelines for Applying InspectionRules and ACLs to Interfaces,On the interface where traffic initiates: Apply ACL on the inward direction that permits only wanted traffic. Apply rule on the inward direction that i
7、nspects wanted traffic. On all other interfaces, apply ACL on the inward direction that denies all unwanted traffic.,Example: Two-Interface Firewall,ip inspect name OUTBOUND tcp ip inspect name OUTBOUND udp ip inspect name OUTBOUND icmp ! interface FastEthernet0/0 ip access-group OUTSIDEACL in ! int
8、erface FastEthernet0/1 ip inspect OUTBOUND in ip access-group INSIDEACL in ! ip access-list extended OUTSIDEACL permit icmp any any packet-too-big deny ip any any log ! ip access-list extended INSIDEACL permit tcp any any permit udp any any permit icmp any any,Example: Three-Interface Firewall,inter
9、face FastEthernet0/0 ip inspect OUTSIDE in ip access-group OUTSIDEACL in ! interface FastEthernet0/1 ip inspect INSIDE in ip access-group INSIDEACL in ! interface FastEthernet0/2 ip access-group DMZACL in ! ip inspect name INSIDE tcp ip inspect name OUTSIDE tcp ! ip access-list extended OUTSIDEACL p
10、ermit tcp any host eq 25 permit tcp any host eq 80 permit icmp any any packet-too-big deny ip any any log ! ip access-list extended INSIDEACL permit tcp any any eq 80 permit icmp any any packet-too-big deny ip any any log ! ip access-list extended DMZACL permit icmp any any packe
11、t-too-big deny ip any any log,Verifying Cisco IOS Firewall,show ip inspect name inspection-name show ip inspect config show ip inspect interfaces show ip inspect session detail show ip inspect statistics show ip inspect all,Displays inspections, interface configurations, sessions, and statistics,Rou
12、ter#show ip inspect session Established Sessions Session 6155930C (:35009)=(0:34233) tcp SIS_OPEN Session 6156F0CC (:35011)=(0:34234) tcp SIS_OPEN Session 6156AF74 (:35010)=(0:5002) tcp SIS_OPEN,Router#,Troubleshooting Cisco IOS Firewall,debug ip
13、 inspect function-trace debug ip inspect object-creation debug ip inspect object-deletion debug ip inspect events debug ip inspect timers debug ip inspect detail,General debug commands,debug ip inspect protocol,Protocol-specific debug,Router#,Router#,Basic and Advanced Firewall Wizards,Basic and Adv
14、anced Firewall Wizards,SDM offers configuration wizards to simplify Cisco IOS Firewall configuration. Two configuration wizards exist: Basic Firewall Configuration wizard: Supports two interface types (Inside and Outside) Applies predefined rules Advanced Firewall Configuration wizard: Supports more
15、 interfaces (Inside, Outside, and DMZ) Applies predefined or custom rules,Configuring a Basic Firewall,Configuring a Basic Firewall,1.,2.,3.,4.,Basic Firewall Interface Configuration,Basic Firewall Configuration Summary and Deployment,Reviewing the Basic Firewall for the Originating Traffic,Reviewin
16、g the Basic Firewall for the Returning Traffic,Resulting Basic Firewall Inspection Rule Configuration,Router#show running-config | include ip inspect name ip inspect name SDM_LOW cuseeme ip inspect name SDM_LOW dns ip inspect name SDM_LOW ftp ip inspect name SDM_LOW h323 ip inspect name SDM_LOW http
17、s ip inspect name SDM_LOW icmp ip inspect name SDM_LOW imap ip inspect name SDM_LOW pop3 ip inspect name SDM_LOW netshow ip inspect name SDM_LOW rcmd ip inspect name SDM_LOW realaudio ip inspect name SDM_LOW rtsp ip inspect name SDM_LOW esmtp ip inspect name SDM_LOW sqlnet ip inspect name SDM_LOW st
18、reamworks ip inspect name SDM_LOW tftp ip inspect name SDM_LOW tcp ip inspect name SDM_LOW udp ip inspect name SDM_LOW vdolive,Resulting Basic Firewall ACL Configuration,Router#show running-config | include access-list access-list 100 remark autogenerated by SDM firewall configuration access-list 10
19、0 remark SDM_ACL Category=1 access-list 100 deny ip any access-list 100 deny ip host 55 any access-list 100 deny ip 55 any access-list 100 permit ip any any access-list 101 remark autogenerated by SDM firewall configuration access-list 101 remark S
20、DM_ACL Category=1 access-list 101 deny ip 55 any access-list 101 permit icmp any host echo-reply access-list 101 permit icmp any host time-exceeded access-list 101 permit icmp any host unreachable access-list 101 deny ip 55 any access
21、-list 101 deny ip 55 any access-list 101 deny ip 55 any access-list 101 deny ip 55 any access-list 101 deny ip host 55 any access-list 101 deny ip host any access-list 101 deny ip any any log,Resulting Basic Firewall
22、 Interface Configuration,Router#show running-config | begin interface interface FastEthernet0/0 description $FW_INSIDE$ ip address ip access-group 100 in ! interface Serial0/0/0 description $FW_OUTSIDE$ ip address 52 ip access-group 101 in ip verify unic
23、ast reverse-path ip inspect SDM_LOW out ! ,Configuring Interfaces on an Advanced Firewall,Configuring Interfaces onan Advanced Firewall,2.,3.,4.,1.,Advanced Firewall Interface Configuration,Configuring a DMZ on an Advanced Firewall,Advanced Firewall DMZService Configuration,Advanced Firewall DMZServ
24、ice Configuration: TCP,Advanced Firewall DMZService Configuration: UDP,Advanced Firewall DMZService Configuration (Cont.),Advanced Firewall Security Configuration,Advanced Firewall Security Policy,Advanced Firewall Protocolsand Applications,Advanced Firewall Protocolsand Applications (Cont.),Advance
25、d Firewall Protocolsand Applications (Cont.),Advanced Firewall Inspection Parameters,Advanced Firewall Security Policy Selection,Complete the Configuration,Advanced Firewall ConfigurationSummary and Deployment,Resulting Advanced FirewallInspection Rule Configuration,Router#show running-config | incl
26、ude ip inspect name ip inspect name appfw_100 tcp audit-trail on ip inspect name appfw_100 udp ip inspect name appfw_100 ftp ip inspect name dmzinspect tcp ip inspect name dmzinspect udp,Resulting Advanced FirewallACL Configuration,Router#show running-config | include access-list access-list 100 rem
27、ark autogenerated by SDM firewall configuration access-list 100 remark SDM_ACL Category=1 access-list 100 deny ip any access-list 100 deny ip 55 any access-list 100 deny ip host 55 any access-list 100 deny ip 55 any access-list 1
28、00 permit ip any any access-list 101 remark autogenerated by SDM firewall configuration access-list 101 remark SDM_ACL Category=1 access-list 101 deny ip any any log access-list 102 remark autogenerated by SDM firewall configuration access-list 102 remark SDM_ACL Category=1 access-list 102 deny ip 1
29、 55 any access-list 102 deny ip 55 any access-list 102 permit icmp any host echo-reply access-list 102 permit icmp any host time-exceeded access-list 102 permit icmp any host unreachable access-list 102 permit tcp any host eq
30、www access-list 102 permit udp any host eq isakmp access-list 102 deny ip 55 any access-list 102 deny ip 55 any access-list 102 deny ip 55 any access-list 102 deny ip 55 any access-list 102 deny ip host 55 any access-list 102 deny ip host any access-list 102 deny ip any any log,Resulting Advanced FirewallInterface Configuration,Router#show running-config | begin interface interface FastEthernet0/0 description $FW_INSIDE$ ip address ip access-g
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年宝安中学(集团)海天学校初中实验员、小学语文教师招聘备考题库及答案详解(考点梳理)
- 2025年长治十三中招聘代课教师备考题库及答案详解1套
- 2025年柳州市鱼峰区花岭社区卫生服务中心招聘编外合同制工作人员备考题库及答案详解参考
- 2025年梧州市城建投资发展集团有限公司招聘13人备考题库附答案详解
- 2025年孝感市云梦县外国语小学出纳岗位招聘备考题库及答案详解(易错题)
- 2025年重庆人文科技学院招聘110人备考题库完整参考答案详解
- 山东大学齐鲁医院(青岛)2025年度部分非事业编制岗位招聘备考题库完整参考答案详解
- 2025年安远县卫生健康总院面向社会公开招聘卫技人员备考题库及答案详解一套
- 2025年虾峙镇工作人员招聘备考题库参考答案详解
- 2025年中国人民对外友好协会所属事业单位公开招聘工作人员5人备考题库及一套完整答案详解
- 班主任班级管理(课堂)课件
- 数学第一章数据描述性分析课件
- 2023年福建军融建设发展有限公司招聘笔试题库及答案解析
- 《美学》课件(第1-8讲)教学提纲
- 森林防火整改报告记录
- 《海洋里的好伙伴》课件
- 中国文化概论(第三版)全套课件
- 冶金生产概论绪论课件
- 计算机应用基础英文版课件:4.OS
- 二年级上册数学教案 -《分一分》 西师大版
- 新苏教版科学六年级下册全册教案(含反思)
评论
0/150
提交评论