Secure 第四天作业
实验需求:
- 需求一拓扑:
按照以上拓扑所示,完成以下需求:
- 参考以上拓扑,配置设备IP地址,使用UNL里Secure第四天拓扑即可。(有兴趣的同学课后也可按照PPT原拓扑做做实验);
- 配置Zone-Base Policy Firewall,Zone Nname为Inside/Outside,并配置VRF,名字为QYT,监控Inbound的ICMP/Telnet流量;
- 内部地址10.1.1.1静态一对一转换到外部地址202.100.1.101;
- 配置User-Base FW,Username=user1,Group=group1,监控PC去往10.1.1.1的HTTP流量;
- 配置Radius,在满足需求4的同时,Reset掉uri中的“who”关键字。
设备配置:
1) 参考以上拓 ,配置设备 IP 地址,使用 UNL 里 Secure 第四 扑即可。
bridge irb
bridge 1 protocol ieee
bridge 1 route ip
!
zone security 2-inside
zone security 2-outside
zone security inside
zone security outside
zone security DMZ
class-map type inspect match-any in-out
match protocol icmp
match protocol tcp
class-map type inspect match-any 2-in-out
match protocol icmp
match protocol tcp
!!
policy-map type inspect in-out
class type inspect in-out
inspect
class class-default
drop
policy-map type inspect 2-in-out
class type inspect 2-in-out
inspect
class class-default
drop
!
zone security 2-inside
zone security 2-outside
zone security inside
zone security outside
zone security DMZ
zone-pair security in-out source inside destination outside
service-policy type inspect in-out
zone-pair security 2-in-out source 2-inside destination 2-outside
service-policy type inspect 2-in-out
zone-pair security 1-2 source inside destination DMZ
service-policy type inspect 2-in-out
!
interface FastEthernet0/0
ip address 10.1.1.10 255.255.255.0
zone-member security inside
duplex half
!
interface FastEthernet1/0
ip address 202.100.1.10 255.255.255.0
zone-member security outside
duplex half
!
interface FastEthernet2/0
no ip address
zone-member security 2-inside
duplex half
bridge-group 1
!
interface FastEthernet3/0
no ip address
zone-member security 2-outside
duplex half
bridge-group 1
!
interface BVI1
ip address 192.168.1.10 255.255.255.0
zone-member security DMZ
测试:
5-7层过滤
ip access-list extended in-out
10 permit ip 10.1.1.0 0.0.0.255 202.100.1.0 0.0.0.255
class-map type inspect match-all in-out
match access-group name in-out
match protocol http
parameter-map type regex shrun
pattern [Ss][Hh]/[Rr][Uu][Nn]
class-map type inspect http match-any in-out.http
match request uri regex shrun
match request header length gt 4096
match req-resp protocol-violation
!
policy-map type inspect http in-out-http-1
class type inspect http in-out.http
reset
log
policy-map type inspect in-out-http.policy
class type inspect in-out
inspect
service-policy http in-out-http-1
class class-default
drop
!
zone-pair security in-out-http source inside destination outside
service-policy type inspect in-out-http.policy
测试
*Apr 18 12:34:12.678: %APPFW-4-HTTP_URI_REGEX_MATCHED: URI regex ([Ss][Hh]/[Rr][Uu][Nn]) matched - resetting session 10.1.1.2:49215 202.100.1.1:80 on zone-pair in-out-http class in-out appl-class in-out.http
*Apr 18 12:35:51.826: %APPFW-4-HTTP_PROTOCOL_VIOLATION: HTTP protocol violation (0) detected - resetting session 10.1.1.1:22772 202.100.1.1:80 on zone-pair in-out-http class in-out appl-class in-out.http
2) 配置 Zon -Base Policy Firewall,Zone Nname 为 Inside/Outside,并配置 VRF,名字为 QYT,监控 Inbound 的 ICMP/Telnet 流量
class-map type inspect match-any in-out
match protocol icmp
match protocol tcp
match protocol udp
match protocol ftp
match protocol telnet
!
policy-map type inspect in-out
class type inspect in-out
inspect
class class-default
drop
!
zone security insidee
zone security outside
zone-pair security in-out source insidee destination outside
service-policy type inspect in-out
!
ip vrf QYT
!
interface FastEthernet2/0
ip vrf forwarding QYT
ip address 202.100.1.10 255.255.255.0
zone-member security outside
duplex half
!
interface FastEthernet3/0
ip vrf forwarding QYT
ip address 10.1.1.10 255.255.255.0
zone-member security insidee
duplex half
!
3) 内部地址 10.1.1.1 静态一对一转换到外部地址 202.100.1.101
interface FastEthernet2/0
ip nat outside
!
interface FastEthernet3/0
ip nat inside
!
ip nat inside source static 10.1.1.1 202.100.1.101 vrf QYT extendable match-in-vrf
!
ip access-list extended Outside-to-Inside.telnet
permit tcp any host 10.1.1.1 eq telnet
policy-map type inspect out-in
class type inspect Outside-to-Inside.telnet
inspect
class class-default
drop!
zone-pair security out-in source outside destination insidee
service-policy type inspect out-in
4) 配置 User-Base FW,Use name=user1,Group=group1,监控 PC 去往 10. 1.1.1的 HTTP 流量
ip http server
zone security inside
zone security outside
aaa new-model
!
aaa authentication login default local
aaa authorization auth-proxy default local
!
aaa attribute list user1
attribute type supplicant-group "group1"
!
username user1 privilege 15 password 0 cisco
username user1 aaa attribute list user1
!
ip admission name qytanng proxy http
!
interface FastEthernet0/0
ip address 202.100.1.10 255.255.255.0
ip admission qytanng
zone-member security outside
duplex half
!
class-map type inspect match-all out-in-http
match protocol http
match user-group group1
class-map type inspect match-all out-in-icmp
match protocol icmp
match user-group group1
!
policy-map type inspect out-in
class type inspect out-in-icmp
inspect
class type inspect out-in-http
inspect
zone-pair security out-in source outside destination inside
service-policy type inspect out-in
5) 配置 Radius,在满足需求 4 的同时,Reset掉 uri 中的“who”关键字
parameter-map type regex who
pattern [Ww][Hh][Oo]
class-map type inspect http match-all user1-http
match request uri regex who
!
policy-map type inspect out-in
class type inspect out-in-http
inspect
service-policy http user1-http.p
aaa group server radius ACS
server-private 202.100.1.4 key cisco
aaa authentication login default group ACS
aaa authorization auth-proxy default group ACS