9.3.1.1 Packet Tracer- Configuring ASA Basic Settings and Firewall Using CLI - Instructor
更新时间:2023-09-22 08:56:01 阅读量: 经管营销 文档下载
- 9311是什么意思推荐度:
- 相关推荐
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI(Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
IP Addressing Table
Device R1 Interface G0/0 S0/0/0 (DCE) S0/0/0 S0/0/1 (DCE) G0/1 S0/0/1 VLAN 1 (E0/1) VLAN 2 (E0/0) VLAN 3 (E0/2) NIC NIC NIC IP Address Subnet Mask Default Gateway N/A N/A N/A N/A N/A N/A NA NA NA 192.168.2.1 192.168.1.1 172.16.3.1 209.165.200.225 255.255.255.248 10.1.1.1 10.1.1.2 10.2.2.2 172.16.3.1 10.2.2.1 192.168.1.1 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.0 255.255.255.252 255.255.255.0 R2 R3 ASA ASA ASA DMZ Server PC-B PC-C 209.165.200.226 255.255.255.248 192.168.2.1 192.168.2.3 192.168.1.3 172.16.3.3 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Objectives
? ? ? ? ?
Verify connectivity and explore the ASA
Configurebasic ASA settings and interface security levels usingCLI Configurerouting, address translation, and inspection policy using CLI ConfigureDHCP, AAA, and SSH Configurea DMZ, Static NAT, and ACLs
Scenario
Your company has one location connected to an ISP. R1 represents a CPE device managed by the ISP. R2 represents an intermediate Internet router. R3 represents an ISP that connects an administrator from a
network management company, who has been hired to remotely manage your network. The ASA is an edge CPE security device that connects the internal corporate network and DMZ to the ISP while providing NAT and DHCP services to inside hosts. The ASA will be configured for management by an administrator on the internal network and by the remote administrator. Layer 3 VLAN interfaces provide access to the three areas created in the activity: Inside, Outside, and DMZ. The ISP assigned the public IP address space of 209.165.200.224/29, which will be used for address translation on the ASA. All router and switch devices have been preconfigured with the following:
o Enable password: ciscoenpa55 o Console password: ciscoconpa55
o Admin username and password: admin/adminpa55
Note: This Packet Tracer activity is not a substitute for the ASA labs. This activity provides additional practice and simulates most of the ASA 5505 configurations. When compared to a real ASA 5505, there may be slight differences in command output or commands that are not yet supported in Packet Tracer.
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
Part 1: Verify Connectivity and Explore the ASA
Note: This Packet Tracer activity starts with20% of the assessment items marked as complete. This is to ensure that you do not inadvertently change some ASA default values. For example, the default name of the inside interface is “inside” and should not be changed. Click Check Results to see which assessment items are already scored as correct.
Step 1: Verify connectivity.
The ASA is not currently configured. However, all routers, PCs, and the DMZ server are configured. Verify that PC-Ccan ping any router interface. PC-C is unable to ping the ASA, PC-B, or the DMZserver.
Step 2: Determine the ASA version, interfaces, and license.
Use the show version command to determine various aspects of this ASA device.
Step 3: Determine the file system and contents of flash memory.
a. Enter privileged EXEC mode. A password has not been set.Press Enterwhen prompted for a password. b. Use the show file system command to display the ASA file system and determine which prefixes are
supported. c. Use the show flash: orshow disk0: command to display the contents of flash memory.
Part 2: ConfigureASA Settings and Interface Security Using the CLI
Tip:Many ASA CLI commands are similar to, if not the same, as those used withthe Cisco IOS CLI. In addition, the process of moving between configuration modes and submodes is essentially the same.
Step 1: Configure the hostname and domain name.
a. Configure the ASA hostname as CCNAS-ASA. b. Configure the domain name as ccnasecurity.com.
Step 2: Configure the enable mode password.
Use the enable password command to change the privileged EXEC mode password to ciscoenpa55.
Step 3: Set the date and time.
Use the clock set command to manually set the date and time (this step is not scored).
Step 4: Configure the inside and outside interfaces.
You will only configure the VLAN 1 (inside) and VLAN 2 (outside) interfaces at this time. The VLAN 3 (dmz) interface will be configured in Part 5 of the activity.
a. Configure a logical VLAN 1 interface for the inside network (192.168.1.0/24) and set the security level to
the highest setting of 100.
CCNAS-ASA(config)# interface vlan 1 CCNAS-ASA(config-if)# nameif inside
CCNAS-ASA(config-if)# ip address 192.168.1.1 255.255.255.0 CCNAS-ASA(config-if)# security-level 100
b. Create a logical VLAN 2 interface for the outside network (209.165.200.224/29), set the security level to
the lowest setting of 0, and enable the VLAN 2 interface.
CCNAS-ASA(config-if)# interface vlan 2
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
CCNAS-ASA(config-if)# nameif outside
CCNAS-ASA(config-if)# ip address 209.165.200.226 255.255.255.248 CCNAS-ASA(config-if)# security-level 0
c. Use the following verification commands to check your configurations:
1) Use the show interface ip brief command to display the status for all ASA interfaces. Note:This
command is different from the IOS command show ip interface brief. If any of the physical or logical interfaces previously configured are not up/up, troubleshoot as necessary before continuing. Tip: Most ASA showcommands, includingping, copy, and others, can be issued from within any configuration mode prompt without the do command.
2) Use the show ip address command to display the information for the Layer 3 VLAN interfaces.
3) Use the show switch vlan command to display the inside and outside VLANs configured on the ASA
and to display the assigned ports.
Step 5: Test connectivity to the ASA.
a. You should be able to ping from PC-B to the ASA inside interface address (192.168.1.1). If the pings fail,
troubleshoot the configuration as necessary. b. From PC-B, ping the VLAN 2 (outside) interface at IP address 209.165.200.226. You should not be able
to ping this address.
Part 3: ConfigureRouting, Address Translation, and Inspection Policy Using the CLI
Step 1: Configure a static default route for the ASA.
Configure a default static route on the ASA outside interface to enable the ASA to reach external networks. a. Create a “quad zero” default route using the route command, associate it with the ASA outside interface,
and point to the R1 G0/0 IP address (209.165.200.225) as the gateway of last resort.
CCNAS-ASA(config)# route outside 0.0.0.0 0.0.0.0 209.165.200.225 b. Issue the show route command to verify the static default route is in the ASA routing table.
c. Verify that the ASA can ping theR1S0/0/0 IP address 10.1.1.1. If the ping is unsuccessful, troubleshoot as
necessary.
Step 2: Configure address translation using PAT and network objects.
a. Create network object inside-net and assign attributes to it using the subnet and nat commands.
CCNAS-ASA(config)# object network inside-net
CCNAS-ASA(config-network-object)# subnet 192.168.1.0 255.255.255.0
CCNAS-ASA(config-network-object)# nat (inside,outside) dynamic interface CCNAS-ASA(config-network-object)# end
b. The ASA splits the configuration into the object portion that defines the network to be translated and the
actual nat command parameters. These appear in two different places in the running configuration. Display the NAT object configuration using the show run command. c. From PC-B attempt to ping the R1 G0/0 interface at IP address 209.165.200.225. The pings should fail. d. Issue the show nat command on the ASA to see the translated and untranslated hits. Notice that, of the
pings from PC-B, four were translated and four were not. The outgoing pings (echos) were translated and
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
sent to the destination. The returning echo replies were blocked by the firewall policy. You will configure the default inspection policy to allow ICMP in Step 3 of this part of the activity.
Step 3: Modify the default MPF application inspection global service policy.
For application layer inspectionand other advanced options, the Cisco MPF is available on ASAs.
The Packet Tracer ASA device does not have an MPF policy map in place by default.As a modification, we can create the default policy map that will perform the inspection on inside-to-outside traffic. When configured correctly only traffic initiated from the inside is allowed back in to the outside interface. You will need to add ICMPto the inspection list.
a. Create the class-map, policy-map, and service-policy. Add the inspection of ICMP traffic to the policy map
list using the following commands:
CCNAS-ASA(config)# class-map inspection_default
CCNAS-ASA(config-cmap)#match default-inspection-traffic CCNAS-ASA(config-cmap)# exit
CCNAS-ASA(config)# policy-map global_policy
CCNAS-ASA(config-pmap)#class inspection_default CCNAS-ASA(config-pmap-c)#inspect icmp CCNAS-ASA(config-pmap-c)#exit
CCNAS-ASA(config)# service-policy global_policy global
b. From PC-B, attempt to ping the R1 G0/0 interface at IP address 209.165.200.225. The pings should be
successful this time because ICMP traffic is now being inspected and legitimate return traffic is being allowed. If the pings fail, troubleshoot your configurations.
Part 4: ConfigureDHCP, AAA, and SSH
Step 1: Configure the ASA as a DHCP server.
a. Configure a DHCP address pool and enable it on the ASA inside interface.
CCNAS-ASA(config)# dhcpd address 192.168.1.5-192.168.1.36 inside b. (Optional) Specify the IP address of the DNS server to be given to clients.
CCNAS-ASA(config)# dhcpd dns 209.165.201.2 interface inside
c. Enable the DHCP daemon within the ASA to listen for DHCP client requests on the enabled interface
(inside).
CCNAS-ASA(config)# dhcpd enable inside
d. Change PC-B from a static IP address to a DHCP client, and verify that it receives IP addressing
information. Troubleshoot, as necessary to resolve any problems.
Step 2: Configure AAA to use the local database for authentication.
a. Define a local user named admin by entering the username command. Specify a password of
adminpa55.
CCNAS-ASA(config)# username admin password adminpa55 b. Configure AAA to use the local ASA database for SSH user authentication.
CCNAS-ASA(config)# aaa authentication ssh console LOCAL
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
Step 3: Configure remote access to the ASA.
The ASA can be configured to accept connections from a single host or a range of hosts on the inside or
outside network. In this step, hosts from the outside network can only use SSH to communicate with the ASA. SSH sessions can be used to access the ASA from the inside network.
a. Generate an RSA key pair, which is required to support SSH connections. Because the ASA device has
RSA keys already in place, enter no when prompted to replace them.
CCNAS-ASA(config)# crypto key generate rsa modulus 1024
WARNING: You have a RSA keypair already defined named
Do you really want to replace them? [yes/no]: no
ERROR: Failed to create new RSA keys named
b. Configure the ASA to allow SSH connections from any host on the inside network (192.168.1.0/24) and
from the remote management host at the branch office (172.16.3.3) on the outside network. Set the SSH timeout to 10 minutes (the default is 5 minutes).
CCNAS-ASA(config)# ssh 192.168.1.0 255.255.255.0 inside CCNAS-ASA(config)# ssh 172.16.3.3 255.255.255.255 outside CCNAS-ASA(config)# ssh timeout 10
c. Establish an SSH session from PC-C to the ASA (209.165.200.226). Troubleshoot if it is not successful.
PC>ssh -l admin 209.165.200.226
d. Establish an SSH session from PC-B to the ASA (192.168.1.1). Troubleshoot if it is not successful.
PC>ssh -l admin 192.168.1.1
Part 5: Configurea DMZ, Static NAT, and ACLs
R1G0/0 and the ASA outside interface already use209.165.200.225 and .226, respectively. You will use public address 209.165.200.227 and static NAT to provide address translation access to the server.
Step 1: Configure the DMZ interface VLAN 3 on the ASA.
a. Configure DMZ VLAN 3, which is where the public access web server will reside. Assign it IP address
192.168.2.1/24, name it dmz, and assign it a security level of 70. Because the server does not need to initiate communication with the inside users, disable forwarding to interface VLAN 1.
CCNAS-ASA(config)# interface vlan 3
CCNAS-ASA(config-if)# ip address 192.168.2.1 255.255.255.0 CCNAS-ASA(config-if)# no forward interface vlan 1 CCNAS-ASA(config-if)# nameifdmz
INFO: Security level for \CCNAS-ASA(config-if)# security-level 70
b. Assign ASAphysical interface E0/2 to DMZ VLAN 3 and enable the interface.
CCNAS-ASA(config-if)#interface Ethernet0/2 CCNAS-ASA(config-if)#switchport access vlan 3 c. Use the following verification commands to check your configurations:
1) Use the show interface ip brief commandto display the status for all ASA interfaces.
2) Use the show ip address command to display the information for the Layer 3 VLAN interfaces.
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI
3) Use the show switch vlan command to display the inside and outside VLANs configured on the ASA
and to display the assigned ports.
Step 2: Configure static NAT to the DMZ server using a network object.
Configure a network object named dmz-server and assign it the static IP address of the DMZ server (192.168.2.3). While in object definition mode, use the nat command to specify that this object is used to translate a DMZ address to an outside address using static NAT, and specify a public translated address of 209.165.200.227.
CCNAS-ASA(config)# object network dmz-server
CCNAS-ASA(config-network-object)# host 192.168.2.3
CCNAS-ASA(config-network-object)# nat (dmz,outside) static 209.165.200.227 CCNAS-ASA(config-network-object)# exit
Step 3: Configure an ACL to allow access to the DMZ server from the Internet.
Configure a named access list OUTSIDE-DMZ that permits the TCP protocol on port 80 from any external host to the internal IP address of the DMZ server. Apply the access list to the ASA outside interface in the “IN” direction.
CCNAS-ASA(config)# access-list OUTSIDE-DMZ permit icmp any host 192.168.2.3 CCNAS-ASA(config)# access-list OUTSIDE-DMZ permit tcp any host 192.168.2.3 eq 80
CCNAS-ASA(config)# access-group OUTSIDE-DMZ in interface outside
Note: Unlike IOS ACLs, the ASA ACL permit statement must permit access to the internal private DMZ address. External hosts access the server using its public static NAT address, the ASA translates it to the internal host IP address, and then applies the ACL.
Step 4: Test access to the DMZ server.
At the time this Packet Tracer activity was created, the ability to successfully test outside access to the DMZ web server was not in place; therefore, successful testing is not required.
Step 5: Check results.
Your completion percentage should be 100%. Click Check Resultsto see feedback and verification of which required components have been completed.
Scripts ASA
enable
!
hostname CCNAS-ASA
domain-name ccnasecurity.com enable password ciscoenpa55
clock set 23:41:33December 30 2016 interface vlan 1 nameif inside
ip address 192.168.1.1 255.255.255.0 security-level 100 interface vlan 2
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 8
Packet Tracer - Configuring ASA Basic Settings and Firewall Using CLI nameif outside
ip address 209.165.200.226 255.255.255.248 security-level 0
route outside 0.0.0.0 0.0.0.0 209.165.200.225 object network inside-net
subnet 192.168.1.0 255.255.255.0
nat (inside,outside) dynamic interface class-mapinspection_default
match default-inspection-traffic exit
policy-mapglobal_policy classinspection_default inspecticmp exit
service-policyglobal_policy global
dhcpd address 192.168.1.5-192.168.1.36 inside dhcpd dns 209.165.201.2 interface inside dhcpd enable inside
username admin password adminpa55 aaa authentication ssh console LOCAL crypto key generate rsa modulus 1024 no
ssh 192.168.1.0 255.255.255.0 inside ssh 172.16.3.3 255.255.255.255 outside ssh timeout 10 interface vlan 3
ip address 192.168.2.1 255.255.255.0 no forward interface vlan 1 nameifdmz
security-level 70
interface Ethernet0/2 switchport access vlan 3 object network dmz-server host 192.168.2.3
nat (dmz,outside) static 209.165.200.227
access-list OUTSIDE-DMZ permit icmp any host 192.168.2.3
access-list OUTSIDE-DMZ permit tcp any host 192.168.2.3 eq 80 access-group OUTSIDE-DMZ in interface outside
PC-B
-Change from static to DHCP addressing
? 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 8
- 1网路设备模拟器Packet - Tracer教程
- 2科目一 Packet Tracer基本操作 - 图文
- 3网路设备模拟器Packet - Tracer教程
- 4网路设备模拟器Packet - Tracer教程
- 5利用packet tracer设计校园网 毕业设计
- 6基于Packet-tracer设计校园网 - 图文
- 7Packet+Tracer+5.0建构CCNA实验攻略(GOOD) - 图文
- 8Packet Tracer 5.0实验(九) 路由器RIP动态路由配置
- 9Cisco Packet Tracer服务器配置 - 邮件传送 - ftp - web - email
- 10Packet Tracer 5.2实验(十二) 标准IP访问控制列表配置
- 教育局拟征求中考升学奖励制度
- 2020房地产销售主管年终工作总结
- 虚拟多台位互感器检定装置投资项目可行性分析
- 车间工人辞职报告范本
- 溴投资项目可行性分析
- 改名字申请书怎么写
- 忧与爱作文素材
- 溴苯腈投资项目可行性分析
- 2020清华大学考研复试时间:3月6日至22日
- 2020年蚌埠高考查分系统网址
- 2020年二建《建筑工程实务》测试题及答案(13)
- 生死感悟——人间世观感一
- 武陵源区军地小学观看魏书生《如何当好班主任》讲座录像
- 全球10大安全旅游国出炉日本排名第9
- 企业策划书模板
- 高中英语教师工作总结3篇
- 法定代表人证明范本
- 大学助学金申请书范文1700字
- 案外人申请不予执行仲裁裁决司法解释施行首份申请书递交齐齐哈尔...
- 环球国际房地产开发项目策划
- Configuring
- Instructor
- Settings
- Firewall
- Packet
- Tracer
- Basic
- Using
- 9.3
- 1.1
- ASA
- CLI
- 中共大竹县教育局党组文件
- 生吃要选择脆嫩蔬菜-各烹调法如何保营养?
- 福建省福安一中高三高考模拟理综试卷 Word版含答案
- 管理学考试题型及练习
- 人防工程质量监督记录表 - 图文
- 安全生产交流材料
- 蜜在保健和医疗的作用
- 北京市大兴区2013中考二模试卷语文试题
- 分子生物学名词解释
- 2010科技周知识竞赛题目
- 一至六年级词语盘点和日积月累,相当实用!
- 临近既有线桥梁施工防护方案
- 贵阳市教育系统防控甲型H1N1流感应急预案
- 幼儿语言表达能力的培养方法
- 人教版七年级上册英语单词表 - 图文
- 场综合练习题及答案
- 智能化系统技术方案 - 图文
- 中国新闻传播史82道复习题 - 带大部分答案
- 脊椎动物名词解释
- 全国计算机二级access选择题14