当前位置: 首页 > article >正文

CCNP_SEC_ASA 第七天作业

### 第一部分-透明墙 V4 LAB 考点###

实验一拓扑:

实验拓扑

EVE环境

环境描述:

本拓扑中包含五台路由器Hostname 分别是 B1-OutB2-OutB1-InB2-InB1-DMZ,一台防火墙HostnameASA,一台交换机HostnameSW

五台路由器的 E0/0口分别接入交换机的 E1/1 – 3和 E2/1 - 2接口,ASA防火墙的 G0/0 – 1接口分别接入交换机的 E0/0 – 1接口,交换机如图所示,为各台设备划分 VLAN,并在 ASA防火墙上配置 Bridege-group。

Device

IP/Mask

B1.Out路由器E0/0

202.100.1.1/24

B2.Out路由器E0/0

202.100.2.1/24

B1.In路由器E0/0

202.100.1.2/24

B2.In路由器E0/0

202.100.2.2.1/24

B1.DMZ路由器E0/0

202.100.1.3/24

SW交换机

E1/1

VLAN11

E1/2

VLAN12

E1/3

VLAN13

E2/1

VLAN21

E2/2

VLAN22

E0/0

VLAN11,12,13

E0/1

VLAN21,22

ASA Bridge-group1

b1-outside

VLAN11

b1-intside

VLAN12

b1-dmz

VLAN13

BVI1

202.100.1.100/24

ASA Bridge-group2

b2-outside

VLAN21

b2-inside

VLAN22

BVI2

202.100.2.100/24

实验一需求:

 

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

ASA

firewall transparent

!

interface GigabitEthernet0/0

 no shutdown

!

interface GigabitEthernet0/0.11

 vlan 11

 nameif b1-out

 bridge-group 1

 security-level 0

!

interface GigabitEthernet0/0.12

 vlan 12

 nameif b1-in

 bridge-group 1

 security-level 100

!

interface GigabitEthernet0/0.13

 vlan 13

 nameif b1-dmz

 bridge-group 1

 security-level 50

!

interface GigabitEthernet0/1

 no shutdown

!

interface GigabitEthernet0/1.21

 vlan 21

 nameif b2-out

 bridge-group 2

 security-level 0

!

interface GigabitEthernet0/1.22

 vlan 22     

 nameif b2-in

 bridge-group 2

 security-level 100

interface BVI1

 ip address 202.100.1.100 255.255.255.0

!

interface BVI2

 ip address 202.100.2.100 255.255.255.0

SW

vlan 11,12,13,21,22

!

interface Ethernet0/0

 switchport trunk allowed vlan 11-13

 switchport trunk encapsulation dot1q

 switchport mode trunk

!

interface Ethernet0/1

 switchport trunk allowed vlan 21,22

 switchport trunk encapsulation dot1q

 switchport mode trunk

!

interface Ethernet1/1

 switchport access vlan 11

 switchport mode access

 spanning-tree portfast

!

interface Ethernet1/2

 switchport access vlan 12

 switchport mode access

 spanning-tree portfast

!

interface Ethernet1/3

 switchport access vlan 13

 switchport mode access

 spanning-tree portfast

!

interface Ethernet2/1

 switchport access vlan 21

 switchport mode access

!

interface Ethernet2/2

 switchport access vlan 22

 switchport mode access

!

其他设备

hostname B1.out

hostname B1.DMZ

hostname B1.in

!

!

!

no ip domain lookup

no ip domain lookup

no ip domain lookup

!

!

!

interface Ethernet0/0

interface Ethernet0/0

interface Ethernet0/0

 ip address 202.100.1.1 255.255.255.0

 ip address 202.100.1.3 255.255.255.0

 ip address 202.100.1.2 255.255.255.0

!        

!        

!    

hostname B2.out

hostname B2.in

!

!

no ip domain lookup

no ip domain lookup

!

!

interface Ethernet0/0

interface Ethernet0/0

 mac-address 0001.0001.0001

 mac-address 0002.0002.0002

 ip address 202.100.2.1 255.255.255.0

 ip address 202.100.2.2 255.255.255.0

!     

!

在ASA上放行ICMP和Telnet,并成功完成以下测试:

提示:需要看到如下输出信息

B1.Out#ping 202.100.1.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 202.100.1.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

B1.Out#telnet 202.100.1.2

Trying 202.100.1.2 ... Open

B2.Out#ping 202.100.2.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 202.100.2.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

B2.Out#telnet 202.100.2.2

Trying 202.100.2.2 ... Open

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

access-list b1-out-in extended permit tcp host 202.100.1.1 host 202.100.1.2 eq telnet

access-list b1-out-in extended permit icmp host 202.100.1.1 host 202.100.1.2

access-group b1-out-in in interface b1-out

access-list b2-out-in extended permit tcp host 202.100.2.1 host 202.100.2.2 eq telnet

access-list b2-out-in extended permit icmp host 202.100.2.1 host 202.100.2.2

access-group b2-out-in in interface b2-out

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

在B1.Out路由器(Loopback0:1.1.1.1)和B1.In路由器(Loopback0:2.2.2.2)上运行EIGRP(AS为90),使得Loopback口可以相互Ping通。

提示:需要看到如下输出信息

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

access-list b1-out-in extended permit eigrp host 202.100.1.1 host 202.100.1.2

access-list b1-out-in extended permit eigrp host 202.100.1.1 host 224.0.0.10

access-list b1-out-in extended permit icmp host 1.1.1.1 host 2.2.2.2

access-group b1-out-in in interface b1-out

access-list b1-in-in extended permit eigrp host 202.100.1.2 host 202.100.1.1

access-list b1-in-in extended permit eigrp host 202.100.1.2 host 224.0.0.10

access-list b1-in-in extended permit icmp host 2.2.2.2 host 1.1.1.1

access-group b1-in-in in interface b1-in

!

interface Loopback1

 ip address 1.1.1.1 255.255.255.255

!

router eigrp 90

 network 1.1.1.1 0.0.0.0

 network 202.100.1.0

!

interface Loopback1

 ip address 2.2.2.2 255.255.255.255

!

router eigrp 90

 network 2.2.2.2 0.0.0.0

 network 202.100.1.0

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

手动配置B2.Out路由器和B2.In路由器以太网接口的MAC地址,分别为0001.0001.0001和0002.0002.0002,在防火墙上启用ARP-Inspection功能分别测试一下NO-Flood和Flood特性。(每次测试前需要在路由器上clear arp)

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

不泛洪

ciscoasa(config)# arp-inspection b2-in enable no-flood

ciscoasa(config)# arp-inspection b2-out enable no-flood

泛洪

ASA(config)# arp-inspection b2-in enable flood

ASA(config)# arp-inspection b2-out enable flood

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

不泛洪

b2-in#sh arp

Protocol  Address          Age (min)  Hardware Addr   Type   Interface

Internet  202.100.2.1             0   Incomplete      ARPA  

Internet  202.100.2.2             -   0002.0002.0002  ARPA   Ethernet0/0

b2-in#

泛洪正常

在Bridge-group2接口上静态添加MAC地址(b2-outside:0003.0003.0003;b2-inside:0004.0004.0004),并关闭自动MAC学习功能。

提示:需要看到如下输出信息

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

mac-address-table static b2-in 0004.0004.0004

mac-address-table static b2-out 0003.0003.0003

mac-address-table static b2-in 0002.0002.0002

mac-address-table static b2-out 0001.0001.0001

mac-learn b2-out disable

mac-learn b2-in disable

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

ASA# sh mac-learn

no mac-learn flood

interface                         mac learn

-------------------------------------------

 b1-out                             enabled

 b1-in                              enabled

 b1-dmz                             enabled

 b2-out                             disabled

 b2-in                              disabled

ASA# sh mac-address-table

interface                  mac  address          type       Age(min)    bridge-group

----------------------------------------------------------------------------------------------------

b1-dmz                     aabb.cc00.2400        dynamic      3           1

b1-out                     aabb.cc00.4400        dynamic      5           1

b1-in                      aabb.cc00.6400        dynamic      5           1

b2-in                      0004.0004.0004        static                   2

b2-out                     0003.0003.0003        static                   2

b2-in                      0002.0002.0002        static                   2

b2-out                     0001.0001.0001        static                   2

### 第二部分-多模墙 V4 LAB 考点###

实验二拓扑:

环境描述:

本拓扑中包含五台路由器Hostname 分别是 OutsideAdm-DMZInsideVir-DMZ,一台防火墙HostnameASA,一台交换机HostnameSW

四台路由器的 E0/0口分别接入交换机的 E1/0 – 3,ASA防火墙的 G0/0 – 1接口分别接入交换机的 E0/0 – 1接口,交换机如图所示,为各台设备划分 VLAN。

Device

IP/Mask

Outside路由器E0/0

202.100.1.1/24

Inside路由器E0/0

192.168.1.1/24

Adm-DMZ路由器E0/0

172.16.1.1/24

Vir-DMZ路由器E0/0

10.1.1.1/24

SW交换机

E1/0

VLAN2

E1/1

VLAN3

E1/2

VLAN4

E1/3

VLAN5

E0/0

VLAN2

E0/1

VLAN3,4,5

ASA Bridge-group1

b1-outside

VLAN11

b1-intside

VLAN12

b1-dmz

VLAN13

BVI1

202.100.1.100/24

ASA Bridge-group2

b2-outside

VLAN21

b2-inside

VLAN22

BVI2

202.100.2.100/24

实验二需求:

按照拓扑所示,初始化多模式防火墙,子墙名称分别为admin和Vir,其中在admin子墙中,所有接口不能出现接口类型,例如G0。(切换防火墙模式会死机,重启一下即可,可参考照教主视频)

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

ASA:

hostname FW

!

interface Ethernet0

!

interface Ethernet1

!

interface Ethernet1.3

 vlan 3

!

interface Ethernet1.4

 vlan 4

!

interface Ethernet1.5

 vlan 5

!

admin-context Admin

context Admin

  allocate-interface Ethernet0

  allocate-interface Ethernet1.3-Ethernet1.4

  config-url disk0:/Admin.cfg

!

context Vir

  allocate-interface Ethernet0 outside

  allocate-interface Ethernet1.4 inside

  allocate-interface Ethernet1.5 dmz

  config-url disk0:/Vir.cfg

!

hostname Admin

enable password 8Ry2YjIyt7RRXU24 encrypted

names

!

interface Ethernet0

 nameif Outside

 security-level 0

 ip address 202.100.1.10 255.255.255.0

!

interface Ethernet1.3

 nameif dmz

 security-level 50

 ip address 172.16.1.10 255.255.255.0

!

interface Ethernet1.4

 nameif inside

 security-level 100

hostname Vir

enable password 8Ry2YjIyt7RRXU24 encrypted

names

!

interface outside

 nameif outside

 security-level 0

 ip address 202.100.1.20 255.255.255.0

!

interface inside

 nameif inside

 security-level 100

 ip address 192.168.1.20 255.255.255.0

!

interface dmz

 nameif dmz

 security-level 50

 ip address 10.1.1.20 255.255.255.0

!

把HTTP服务器Admin.dmz(路由器)转换到外部202.100.100;把Telnet服务器Vir.dmz(路由器)转换到外部202.100.101;在Outside设备上测试并截图。

提示:需要看到如下输出信息

Outside#telnet 202.100.1.100 80

Trying 202.100.1.100, 80 ... Open

/GET

HTTP/1.1 400 Bad Request

Date: Sun, 18 Dec 2016 14:29:49 GMT

Server: cisco-IOS

Accept-Ranges: none

   

ASA/admin(config)# sh xlate

1 in use, 1 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

       s - static, T - twice, N - net-to-net

TCP PAT from DMZ:172.16.1.1 80-80 to Outside:202.100.1.100 80-80

flags sr idle 0:20:19 timeout 0:00:00

Outside#telnet 202.100.1.101

Trying 202.100.1.101 ... Open

User Access Verification

Password:

Vir.DMZ>

ASA/Vir(config)# sh xlate

1 in use, 1 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

       s - static, T - twice, N - net-to-net

TCP PAT from DMZ:10.1.1.1 23-23 to Outside:202.100.1.101 23-23

    flags sr idle 0:20:19 timeout 0:00:00

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

Admin

object network dmz-to-outside

host 172.16.1.1

nat (dmz,outside) static 202.100.1.100

access-list out extended permit tcp any host 172.16.1.1 eq 80

access-group out in interface outside

Vir:

object network dmz-to-outside

host 10.1.1.1

nat (dmz,outside) static 202.100.1.101

access-list out extended permit tcp any host 10.1.1.1 eq telnet

access-group out in interface outside

!

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

在admin子墙上把内部网络192.168.1.0/24转换到外部接口(PAT),并从Inside设备上Telnet外部设备Outside路由器进行测试。

提示:需要看到如下输出信息

Inside#telnet 202.100.1.1

Trying 202.100.1.1 ... Open

User Access Verification

Password:

Outside>

ASA/admin(config)# sh xlate

2 in use, 2 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

       s - static, T - twice, N - net-to-net

TCP PAT from DMZ:172.16.1.1 80-80 to Outside:202.100.1.100 80-80

    flags sr idle 0:01:17 timeout 0:00:00

TCP PAT from Inside:192.168.1.1/60754 to Outside:202.100.1.10/60754 flags ri idle 0:00:03 timeout 0:20:19

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

object network inside-net

subnet 192.168.1.0 255.255.255.0

nat (inside,Outside) dynamic interface

手动指派接口MAC地址

interface Ethernet1.4

 mac-address 0001.0001.0001

interface inside

 mac-address 0001.0002.0001

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

为节约ASA的系统资源,在admin子墙上限制网管的Telnet数量为1,ASDM的数量为1;在Vir子墙上限制连接数为资源的50%,地址转换条目为20000条。

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

class Level1

  limit-resource Telnet 1

  limit-resource ASDM 1

!

class Level2

  limit-resource Conns 50.0%

  limit-resource Xlates 20000

!

context Admin

  member Level1

!

context Vir

  member Level2


http://www.kler.cn/a/470645.html

相关文章:

  • CS·GO搬砖流程详细版
  • 并行云使用流程
  • 【竞技宝】CS2:HLTV2024职业选手排名TOP8-broky
  • FastAPI vs Flask 专业对比与选择
  • Tableau数据可视化与仪表盘搭建-数据可视化原理
  • 【Linux】文件的压缩与解压
  • 使用Python实现网络安全攻击检测系统
  • 进制转换(蓝桥杯)
  • 【C/C++】Protobuf与nlohmann/json的比较
  • 【Uniapp-Vue3】常用的表单组件button和input
  • SpringBoot2 如何集成OpenAPI
  • 麒麟操作系统服务架构保姆级教程(八)数据库拆分静态业务拆分和负载均衡
  • dockerignore文件怎么写
  • iOS - AutoreleasePoolPage 节点为空时的处理逻辑
  • 使用Node编写服务器接口
  • 新型大数据架构之湖仓一体(Lakehouse)架构特性说明——Lakehouse 架构(一)
  • uniapp使用canvas生成订单小票图片
  • 【STM32】点击下载按钮时,提示No ST-LINK detected
  • 创建型模式4.原型模式
  • node.js版本管理之---npm 和 package.json
  • 图像识别-全连接层-卷积层-卷积层的计算-多输入通道场景-多输出通道场景-感受野-填充-VALID 与 SAME-stride-池化-CNN架构
  • 【C语言程序设计——选择结构程序设计】按从小到大排序三个数(头歌实践教学平台习题)【合集】
  • Backend - ADO.NET(C# 操作Oracle、PostgreSQL DB)
  • HCIA-Access V2.5_8_1_EPON原理_PON基本概念
  • 在Linux中,SElinux的作用是什么?如何临时和永久的更改SElinux上下文?
  • Linux buildroot和ubuntu的异同点