当前位置: 首页 > news >正文

Secure 第四天作业

实验需求:

  1. 需求一拓扑:

按照以上拓扑所示,完成以下需求:

  1. 参考以上拓扑,配置设备IP地址,使用UNL里Secure第四天拓扑即可。(有兴趣的同学课后也可按照PPT原拓扑做做实验);
  2. 配置Zone-Base Policy Firewall,Zone Nname为Inside/Outside,并配置VRF,名字为QYT,监控Inbound的ICMP/Telnet流量;
  3. 内部地址10.1.1.1静态一对一转换到外部地址202.100.1.101;
  4. 配置User-Base FW,Username=user1,Group=group1,监控PC去往10.1.1.1的HTTP流量;
  5. 配置Radius,在满足需求4的同时,Reset掉uri中的“who”关键字。

设备配置:

1) 参考以上拓 ,配置设备 IP 地址,使用 UNL 里 Secure 第四 扑即可。

bridge irb

bridge 1 protocol ieee

bridge 1 route ip

!

zone security 2-inside

zone security 2-outside

zone security inside

zone security outside

zone security DMZ

class-map type inspect match-any in-out

 match protocol icmp

 match protocol tcp

class-map type inspect match-any 2-in-out

 match protocol icmp

 match protocol tcp

!!

policy-map type inspect in-out

 class type inspect in-out

  inspect

 class class-default

  drop

policy-map type inspect 2-in-out

 class type inspect 2-in-out

  inspect

 class class-default

  drop

!

zone security 2-inside

zone security 2-outside

zone security inside

zone security outside

zone security DMZ

zone-pair security in-out source inside destination outside

 service-policy type inspect in-out

zone-pair security 2-in-out source 2-inside destination 2-outside

 service-policy type inspect 2-in-out

zone-pair security 1-2 source inside destination DMZ

 service-policy type inspect 2-in-out

!

interface FastEthernet0/0

 ip address 10.1.1.10 255.255.255.0

 zone-member security inside

 duplex half

!

interface FastEthernet1/0

 ip address 202.100.1.10 255.255.255.0

 zone-member security outside

 duplex half

!

interface FastEthernet2/0

 no ip address

 zone-member security 2-inside

 duplex half

 bridge-group 1

!

interface FastEthernet3/0

 no ip address

 zone-member security 2-outside

 duplex half

 bridge-group 1

!

interface BVI1

 ip address 192.168.1.10 255.255.255.0

 zone-member security DMZ

测试:

5-7层过滤

ip access-list extended in-out

    10 permit ip 10.1.1.0 0.0.0.255 202.100.1.0 0.0.0.255

class-map type inspect match-all in-out

 match access-group name in-out

 match protocol http

parameter-map type regex shrun

 pattern [Ss][Hh]/[Rr][Uu][Nn]

class-map type inspect http match-any in-out.http

 match  request uri regex shrun

 match  request header length gt 4096

 match  req-resp protocol-violation

!

policy-map type inspect http in-out-http-1

 class type inspect http in-out.http

  reset

  log

policy-map type inspect in-out-http.policy

 class type inspect in-out

  inspect

  service-policy http in-out-http-1

 class class-default

  drop

!

zone-pair security in-out-http source inside destination outside

 service-policy type inspect in-out-http.policy

测试

*Apr 18 12:34:12.678: %APPFW-4-HTTP_URI_REGEX_MATCHED: URI regex ([Ss][Hh]/[Rr][Uu][Nn]) matched - resetting session 10.1.1.2:49215 202.100.1.1:80 on zone-pair in-out-http class in-out appl-class in-out.http

*Apr 18 12:35:51.826: %APPFW-4-HTTP_PROTOCOL_VIOLATION: HTTP protocol violation (0) detected - resetting session 10.1.1.1:22772 202.100.1.1:80 on zone-pair in-out-http class in-out appl-class in-out.http


2) 配置 Zon -Base Policy Firewall,Zone Nname 为 Inside/Outside,并配置 VRF,名字为 QYT,监控 Inbound 的 ICMP/Telnet 流量

class-map type inspect match-any in-out

 match protocol icmp

 match protocol tcp

 match protocol udp

 match protocol ftp

 match protocol telnet

!

policy-map type inspect in-out

 class type inspect in-out

  inspect

 class class-default

  drop

!

zone security insidee

zone security outside

zone-pair security in-out source insidee destination outside

 service-policy type inspect in-out

!

ip vrf QYT  

!

interface FastEthernet2/0

 ip vrf forwarding QYT

 ip address 202.100.1.10 255.255.255.0

 zone-member security outside

 duplex half

!

interface FastEthernet3/0

 ip vrf forwarding QYT

 ip address 10.1.1.10 255.255.255.0

 zone-member security insidee

 duplex half

!

3) 内部地址 10.1.1.1 静态一对一转换到外部地址 202.100.1.101

interface FastEthernet2/0

 ip nat outside

!

interface FastEthernet3/0

ip nat inside

ip nat inside source static 10.1.1.1 202.100.1.101 vrf QYT extendable match-in-vrf

!

ip access-list extended Outside-to-Inside.telnet

permit tcp any host 10.1.1.1 eq telnet

policy-map type inspect out-in

 class type inspect Outside-to-Inside.telnet

  inspect

 class class-default

  drop!

zone-pair security out-in source outside destination insidee

 service-policy type inspect out-in

4) 配置 User-Base FW,Use name=user1,Group=group1,监控 PC 去往 10. 1.1.1的 HTTP 流量

ip http server

zone security inside

zone security outside

aaa new-model

!

aaa authentication login default  local

aaa authorization auth-proxy default local

!

aaa attribute list user1

 attribute type supplicant-group "group1"

!

username user1 privilege 15 password 0 cisco

username user1 aaa attribute list user1

!

ip admission name qytanng proxy http

!

interface FastEthernet0/0

 ip address 202.100.1.10 255.255.255.0

 ip admission qytanng

 zone-member security outside

 duplex half

!

class-map type inspect match-all out-in-http

 match protocol http

 match user-group group1

class-map type inspect match-all out-in-icmp

 match protocol icmp

 match user-group group1

!

policy-map type inspect out-in

 class type inspect out-in-icmp

  inspect

 class type inspect out-in-http

  inspect

zone-pair security out-in source outside destination inside


service-policy type inspect out-in

5) 配置 Radius,在满足需求 4 的同时,Reset掉 uri 中的“who”关键字

parameter-map type regex who

 pattern [Ww][Hh][Oo]

class-map type inspect http match-all user1-http

 match  request uri regex who

!

policy-map type inspect out-in

class type inspect out-in-http

  inspect

  service-policy http user1-http.p

aaa group server radius ACS

 server-private 202.100.1.4 key cisco

aaa authentication login default group ACS

aaa authorization auth-proxy default group ACS

http://www.dtcms.com/a/328085.html

相关文章:

  • Linux环境部署RocketMQ
  • C++算法·排序
  • 第六十四章:AI的“觅食”之路:数据采集器设计与多源数据获取
  • DL-FWI 的三项主要任务: 网络构建, 数据生成, 训练控制
  • 跑腿APP开发未来趋势:同城O2O系统源码在智能调度与个性化中的进化
  • Spring Boot项目中调用第三方接口
  • HCIP项目之OSPF综合实验
  • Flux.1系列模型解析--Kontext
  • 8月12号打卡
  • 【Leetcode hot 100】560.和为K的子数组
  • 无人机航拍数据集|第13期 无人机城市斑马线目标检测YOLO数据集963张yolov11/yolov8/yolov5可训练
  • 为什么304不锈钢仍会生锈?
  • Ubuntu20.06环境下安装VS Code及中文设置方法
  • CSRF 攻击
  • 【机器学习】什么是DNN / MLP(全连接深度神经网络, Deep Neural Network / Multilayer Perceptron)?
  • 【Python】支持向量机SVM
  • Web攻防-业务逻辑篇Fuzz技术数据并发条件竞争JS挖掘参数盲猜Turbo插件SRC
  • c#联合Halcon进行OCR字符识别(含halcon-25.05 百度网盘)
  • 下一代防火墙部署
  • TF-IDF 红楼梦关键词提取
  • 全文深度剖析国产化数据库达梦之备份恢复体系
  • nurbs曲线的matlab
  • RabbitMQ面试精讲 Day 20:RabbitMQ压测与性能评估
  • Hystrix核心内容
  • JUC 面试知识点大纲
  • Notepad++插件开发实战
  • 【从0带做】基于Springboot3+Vue3的校园表白墙系统
  • Java进阶学习之不可变集合
  • 【实时Linux实战系列】基于RFID的实时资产追踪系统
  • 矩形前缀和