1. Trang chủ
  2. » Cao đẳng - Đại học

Tài Liệu CCNA - Cisco PIX Firewall _www.bit.ly/taiho123

195 4,8K 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 195
Dung lượng 3,33 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

pixfirewallconfig# pixfirewallconfig# Configure Message Output to the PIX Firewall Buffer logging buffered level • Step 3—Clear the internal buffer.. Configure Message Outputto a Syslog

Trang 1

Cisco PIX Firewall

John Joo APAC Channels Technical Operations

Trang 2

PIX Technical Development Program Agenda

Product Review

Six Primary Commands

VLAN Support

Syslog Configuration

Access Control Lists

Java and Active X filtering

URL Filtering

Fixup Protocols

Trang 3

PIX Technical Development Program Agenda

Trang 4

PIX Firewall—Review

Stateful firewall with high security and fast performance

Secure, real-time, embedded operating system—

no UNIX or NT security holes

Adaptive security algorithm provides stateful

Trang 5

PIX Firewall Family Lineup

SMB

Gigabit Ethernet Enterprise

Functionality

Trang 6

PIX Firewall Product Line Overview

1 300 32

2 10BaseT No

20 16

SMB

$7,495 Unlimited 2,000 1 433 64 6 Yes 188 63

Enterprise

$13,995 Unlimited 2,000 2 600 256 8 Yes 360 70

Ent.+, SP

$37,995 Unlimited 2,000 3

1 GHz

1 GB

10 Yes 1.7 Gbps 95

SOHO

$595 or $845

10, 50 or Unlimited 10

< 1 133 16

1 10BT + 4 FE No

10 3

GigE Enabled

501

Trang 7

NEW Multi-Gigabit Firewall Module

Multi-Gigabit Firewall Acceleration Module for Securing

Enterprise Campus, Data Center & SP Networks

Applications

Enterprise Campus/WAN Perimeter Security

Data Center Security

Service Provider Edge Security Services

High performance

- 3Mpps (5Gbps) Packet Processing Performance

- 100,000 Conn Per Sec, 1 million sessions/ sec for HTTP&DNS

- VLANs, DMZ, Dynamic Routing, Failover Capabilities

- Multiple blades per chassis supported

Trang 8

The Six Primary Commands

(Review)

Trang 9

PIX Firewall Primary Commands

There are six primary configuration commands for the PIX Firewall:

Trang 10

Command 1: nameif

nameif hardware_id if_name security_level

pixfirewall(config)#

interface on the PIX Firewall and specifies its security

level.

dmz sec50

Trang 11

Command 2: interface

pixfirewall(config)#

interface hardware_id hardware_speed

The interface command configures the type and capability of each perimeter interface.

pixfirewall(config)# interface ethernet0 auto

pixfirewall(config)# interface ethernet1 10

pixfirewall(config)# interface ethernet2 100

Trang 13

Command 4: nat

nat [(if_name)] nat_id local_ip [netmask]

pixfirewall(config)#

inside network from the outside network.

pixfirewall(config)#

1 0.0.0.0 0.0.0.0

Trang 14

Command 5: global

pixfirewall(config)#

global[(if_name)] nat_id {global_ip[-global_ip]

[netmask global_mask]} | interface

Works with the nat command to assign a registered or public IP

address to an internal host when accessing the outside network

through the firewall

pixfirewall(config)# nat (inside) 1 0.0.0.0 0.0.0.0

pixfirewall(config)# global (outside) 1

192.168.0.20-192.168.0.254

When internal hosts access the outside network through the firewall, they are assigned public addresses from the 192.168.0.20–

192.168.0.254 range

Trang 15

Three Interfaces with NAT

Inside host, and web and FTP server

Backbone, web, FTP, and TFTP server

Pod perimeter router

PIX Firewall 192.168.0.0/24

.1

.3 10.0.0.0 /24

e0 outside 2 security level 0

e2 dmz 1 security level 50

Bastion host, and web and FTP server

pixfirewall(config)# global (outside) 1 192.168.0.20-192.168.0.254 netmask 255.255.255.0

pixfirewall(config)# global(dmz) 1 172.16.0.20-172.16.0.254 netmask 255.255.255.0

Inside users can start outbound connections to both the DMZ and the Internet.

The nat (dmz) command gives DMZ services access to the Internet

The global (dmz) command gives inside users access to the web server on the DMZ.

Trang 16

Command 6: route

pixfirewall(config)#

route if_name ip_address netmask gateway_ip

[metric]

The route command defines a static or default route for an interface.

pixfirewall(config)# route outside 0.0.0.0

0.0.0.0 192.168.0.1 1

Trang 17

New 6.3 feature VLAN SUPPORT(802.1Q tagging)

Trang 18

PIX VLAN SUPPORT

Supports IEEE 802.1Q encapsulation for trunking and tagging

Supported on all PIX adapters except for the Intel 82557 adapter

since it does not understand frame sizes greater than 1500 bytes

Trang 19

Number of VLANs supported

VLAN Feature with Restricted License

Interfaces

Maximum Interfaces

(Physical + Logical interfaces

Trang 20

Number of VLANs supported

VLAN Feature with Unrestricted License

Interfaces

Maximum Interfaces

(Physical + Logical interfaces

Trang 21

Logical interface

Logical interfaces have been added to support the

VLAN feature.

Multiple logical IP interfaces per physical interface

Layer 3 attributes such as IP addressing and security levels can be configured.

layer 2 attributes such as MTU and failover will be

available only on the physical interface.

Trang 22

Creating a logical interface

Create a logical interface for it or add it to a physical interface

interface ethernet0 vlan10 [physical | logical ]

physical : Permanent interface.

physical interface 0

Can send and receive both tagged and untagged VLAN traffic.

Associated with interface 0 and assign VLAN ID 10 to it.

Can send receive only tagged traffic

An IP address can be assigned to each VLAN interface and

it will have its own security level

Different security zones can be defined with VLAN interface

Trang 23

VLAN Configuration Example

interface ethernet0 vlan100 physical interface ethernet0 vlan200 logical interface ethernet1 vlan300 logical

nameif vlan200 dmz2 security20

Ip address dmz2 192.168.1.10 255.255.255.0 nameif vlan300 dmz3 security30

ip address dmz3 192.168.2.10 255.255.255.0

Trang 24

Syslog Messages

Trang 26

show logging

Step 1—Send Syslog messages to an internal buffer.

Step 2—View messages in the internal buffer.

pixfirewall(config)#

pixfirewall(config)#

Configure Message Output

to the PIX Firewall Buffer

logging buffered level

Step 3—Clear the internal buffer.

clear logging pixfirewall(config)#

Enable or disable specific Syslog message type logging.

[no] logging message syslog_id

pixfirewall(config)#

pixfirewall(config)#

logging standby

Trang 27

Configure Message Output

to a Syslog Server

logging trap level

• Step 1—Designate the Syslog host server.

• Step 2—Set the logging level.

pixfirewall(config)#

pixfirewall(config)#

logging host [in_if_name] ip_address {protocol/port]

pixfirewall(config)#

logging facility facility

• Step 3—Set the facility marked on all messages.

pixfirewall(config)#

[no] logging timestamp

• Step 4—Start and stop sending timestamp messages.

pixfirewall(config)#

[no] logging on

• Step 5—Start or stop sending messages to the Syslog server.

Trang 28

Modifiable syslog levels (6.3)

Gives user ability to modify the level at which a particular syslog is issued

Trang 29

Modifiable syslog levels (6.3)

[ no] logging message <syslog_id> level <level>

pix(config)# logging message 111008 level emergencies

pix(config)# clear logging level

To restore all of the currently changed syslogs back to their default levels

pix# show logging level

Logging message 111008 level emergencies

pix# show logging message 111008

syslog 111008 enabled

syslog 111008 is at level emergencies

Trang 30

Syslog by ACL (6.3)

COMMAND

access-list <acl_id> permit|deny <protocol> <src_ip> [<src_port>]

<dst_ip> [<dst_port>] [log [disable|default] | [<level>] [interval <secs>]]

access-list outside-acl permit ip host 1.1.1.1 any log 7 interval 600 access-list outside-acl deny ip any any log 2

level : An optional syslog level (0 - 7) may be specified

default level is 6 (informational)

[interval <secs>]] : the time interval in seconds (1 - 600) to generate

an ACL logging message default is 300 seconds

Trang 31

any Syslog server.

Trang 32

Access Control Lists

Trang 33

Access Control List

An ACL enables you to determine what traffic will be

allowed or denied through the PIX Firewall.

ACLs are applied per interface (traffic is analyzed

inbound relative to an interface).

The access-list and access-group commands are used to create an ACL.

The access-list and access-group commands are an

alternative for the conduit and outbound commands.

Trang 34

ASA Security Level Example

Internet

PIX Firewall

Outside network e0

Trang 35

ACL Usage Guidelines

Higher to lower security level

Use an ACL to restrict outbound traffic.

The ACL source address is the actual

(un-translated) address of the host or network.

Lower to higher security level

Use an ACL to allow inbound traffic.

The destination host must have a statically

mapped address.

The ACL destination address is the “global ip” assigned in the static command.

Trang 36

access-list Command

pixfirewall(config)#

access-list acl_name [deny | permit] protocol

{src_addr | local_addr} {src_mask |

local_mask} operator port {destination_addr | remote_addr} {destination_mask | remote_mask} operator port

Enables you to create an ACL

ACLs associated with IPSec are known as “crypto” ACLs

ACL “dmz1” denies access from the 192.168.1.0 network to

TCP ports less than 1025 on host 192.168.0.1

pixfirewall(config)# access-list dmz1 deny

tcp 192.168.1.0 255.255.255.0 host

192.168.0.1 lt 1025

Trang 37

access-group Command

pixfirewall(config)#

access-group acl_name in interface

interface_name

Binds an ACL to an interface

The ACL is applied to traffic inbound to an interface

ACL “dmz1” is bound to interface “dmz”

pixfirewall(config)# access-group dmz1 in interface dmz

Trang 38

Converting Conduits to Access Lists

Trang 39

ACLs Versus Conduits

A conduit creates an exception to the PIX Firewall Adaptive Security Algorithm by permitting connections from one interface

to access hosts on another

An ACL applies to a single interface,

affecting all traffic entering that interface

regardless of its security level

c o n d u i t ACL

It is recommended to use ACLs to maintain future compatibility.

Do not mix ACLs and Conduits in the same PIX

Trang 40

The Problem: ACLs Collide with Conduits

pixfirewall(config)# access-group 102 in interface dmz

Due to the ACL bound to the DMZ interface,

Users on the DMZ are unable to access the internal FTP server.

Users on the DMZ are unable to access the Internet.

Users on the DMZ are only able to access the internal mail server.

Trang 41

The Solution: Convert Conduits to ACLs

pixfirewall(config)#

conduit permit | deny protocol global_ip global_mask [operator port

[port]] foreign_ip foreign_mask[operator port[port]]

Trang 42

Making ACLs Work for You

pixfirewall(config)# access-group 102 in interface dmz

Users on the DMZ are able to access the Internet, the internal FTP server, and the internal mail server.

Trang 43

Configuring Access Control

Trang 44

pixfirewall(config)# write terminal

nameif ethernet0 outside sec0 nameif ethernet1 inside sec100 access-list acl_out deny tcp any any eq www access-list acl_out permit ip any any

access-group acl_out in interface inside nat (inside) 1 10.0.0.0 255.255.255.0 global (outside) 1 192.168.0.20-192.168.0.254 netmask 255.255.255.0

Denies web traffic on port 80 from the inside network to the Internet

Permits all other IP traffic from the inside network to the Internet

www

Deny Web Access to the Internet

Internet

Trang 45

Permit Web Access to the DMZ

Web server 2

.1 1

.2

172.16.0.0/24 10.0.0.0/24

ip address outside 192.168.0.2 255.255.255.0

ip address inside 10.0.0.1 255.255.255.0

ip address dmz 172.16.0.1 255.255.255.0 static (dmz,outside) 192.168.0.11 172.16.0.2 access-list acl_in_dmz permit tcp any host 192.168.0.11 eq www

access-list acl_in_dmz deny ip any any access-group acl_in_dmz in interface outside

The ACL acl_in_dmz permits web traffic

on port 80 from the Internet to the DMZ web server.

The ACL acl_in_dmz denies all other IP traffic from the Internet.

Trang 46

Turbo ACL –New in 6.2

New commands

Access-list compiled

Global command that turns on the Turbo ACL feature on all access-lists and turbo compiles all ACLs with 19 or more entries

(automatically enables when there are 19 or more acl)

Access-list <acl_name> compiled

Turns on the Turbo ACL feature on the individual access-list

[no] debug access-list all | standard | turbo

PDM only supports all on or all off

Trang 47

-Group the Group Object (up to 10 levels)

Introduction of Sub mode

(config-proto), (config-icmp-type), (config-service) and

(config-network)

Trang 48

Object Grouping

Grouping of network objects and services to simplify access rule configuration and management

Access list TEST configuration

access-list TEST permit tcp 12.0.0.0 255.0.0.0 host 11.0.0.1

access-list TEST permit icmp 12.0.0.0 255.0.0.0 host 11.0.0.1

access-list TEST permit tcp 12.0.0.0 255.0.0.0 host 11.0.0.2

access-list TEST permit icmp 12.0.0.0 255.0.0.0 host 11.0.0.2

access-list TEST permit tcp host 14.0.0.1 host 11.0.0.1

access-list TEST permit icmp host 14.0.0.1 host 11.0.0.1

access-list TEST permit tcp host 14.0.0.1 host 11.0.0.2

access-list TEST permit icmp host 14.0.0.1 host 11.0.0.2

access-list TEST permit tcp host 14.0.0.2 host 11.0.0.1

access-list TEST permit icmp host 14.0.0.2 host 11.0.0.1

access-list TEST permit tcp host 14.0.0.2 host 11.0.0.2

access-list TEST permit icmp host 14.0.0.2 host 11.0.0.2

Trang 49

access-list TEST permit object-group p1 object-group s1 object-group d1

This will generate the previous access list entries

Hierarchical grouping is also supported i.e object group can also contain groups (up to 10 nest)

Trang 50

icmp Command

pixfirewall(config)#

Enables or disables pinging to an interface

icmp permit | deny [host] src_addr [src_mask]

All ping requests are denied at the outside interface, and all

unreachable messages are permitted at the outside interface

Allow ICMP unreachable’s so that ICMP PathMTU Discovery still operates

Trang 51

Securing Remote Configuration with SSH

10.0.0.0/24 192.168.0.0/24

SSH client

Specifies the host or network authorized

to initiate an SSH connection to the PIX

Firewall.

An RSA key pair is generated for the PIX

Firewall using the default key modulus

size of 768.

Host 172.26.26.50 is authorized to initiate

an SSH connection to the PIX Firewall.

Trang 52

Comments in ACLs and

PIX ACL Line numbers (6.3)

Trang 53

Comments in ACLs

any IP standard or extended ACL

• Each remark line is limited to 100 characters

• The remark can go any part of ACL lines

Trang 54

Commands for Comments in ACLs

For IP numbered ACLs:

access-list access-list number remark remark global

configuration command to include a comment about an access

access-list 1 remark Permit only Jones workstation through

access-list 1 permit 171.69.2.88

For an entry in a named IP ACL :

access-list named remark Do not allow Jones subnet to telnet out deny tcp host 171.69.2.88 any eq telnet

Trang 55

PIX ACL Line numbers

Before 6.3:

If a user wants to enter an element in the middle of an

access-list all the elements after the particular ACE need

to be removed and re-applied

After 6.3:

Iine number can be used to insert or delete elements at any position in an access-list

Trang 56

PIX ACL Line numbers

All the access list elements (ACE) resulting from a single

object-group access-list statement have a single line number

These numbers would be maintained internally in a

increasing order starting from 1(1, 2, 3 )

A user can enter a new entry between two consecutive

ACEs, by choosing to insert at the line number of the ACE with higher line number

line-numbers are not stored in config and the output of

'write t' is unchanged

Trang 57

PIX ACL Line numbers

[no] access-list id [line line-num] remark text

show access-list

access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 256)

alert-interval 300 access-list 101; 2 elements

access-list 101 line 1 permit ip any any (hitcnt=0)

access-list 101 line 2 permit icmp any any (hitcnt=0)

Ngày đăng: 23/10/2015, 18:12

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm