CCNP_SEC_ASA 第七天作业

### 第一部分 - 透明墙 V4 LAB 考点 ###

实验一拓扑:

实验拓扑

EVE环境

环境描述:

本拓扑中包含五台路由器(Hostname 分别是 B1-Out,B2-Out,B1-In,B2-In,B1-DMZ),一台防火墙(Hostname:ASA),一台交换机(Hostname:SW)。

五台路由器的 E0/0口分别接入交换机的 E1/1 -- 3和 E2/1 - 2接口,ASA防火墙的 G0/0 -- 1接口分别接入交换机的 E0/0 -- 1接口,交换机如图所示,为各台设备划分 VLAN,并在 ASA防火墙上配置 Bridege-group。

|---------------------------|------------------|
| Device | IP/Mask |
| B1.Out路由器E0/0 | 202.100.1.1/24 |
| B2.Out路由器E0/0 | 202.100.2.1/24 |
| B1.In路由器E0/0 | 202.100.1.2/24 |
| B2.In路由器E0/0 | 202.100.2.2.1/24 |
| B1.DMZ路由器E0/0 | 202.100.1.3/24 |
| SW 交换机 | |
| E1/1 | VLAN11 |
| E1/2 | VLAN12 |
| E1/3 | VLAN13 |
| E2/1 | VLAN21 |
| E2/2 | VLAN22 |
| E0/0 | VLAN11,12,13 |
| E0/1 | VLAN21,22 |
| ASA Bridge-group1 | |
| b1-outside | VLAN11 |
| b1-intside | VLAN12 |
| b1-dmz | VLAN13 |
| BVI1 | 202.100.1.100/24 |
| ASA Bridge-group2 | |
| b2-outside | VLAN21 |
| b2-inside | VLAN22 |
| BVI2 | 202.100.2.100/24 |

实验一需求:

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

ASA

firewall transparent

!

interface GigabitEthernet0/0

no shutdown

!

interface GigabitEthernet0/0.11

vlan 11

nameif b1-out

bridge-group 1

security-level 0

!

interface GigabitEthernet0/0.12

vlan 12

nameif b1-in

bridge-group 1

security-level 100

!

interface GigabitEthernet0/0.13

vlan 13

nameif b1-dmz

bridge-group 1

security-level 50

!

interface GigabitEthernet0/1

no shutdown

!

interface GigabitEthernet0/1.21

vlan 21

nameif b2-out

bridge-group 2

security-level 0

!

interface GigabitEthernet0/1.22

vlan 22

nameif b2-in

bridge-group 2

security-level 100

interface BVI1

ip address 202.100.1.100 255.255.255.0

!

interface BVI2

ip address 202.100.2.100 255.255.255.0

SW

vlan 11,12,13,21,22

!

interface Ethernet0/0

switchport trunk allowed vlan 11-13

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface Ethernet0/1

switchport trunk allowed vlan 21,22

switchport trunk encapsulation dot1q

switchport mode trunk

!

interface Ethernet1/1

switchport access vlan 11

switchport mode access

spanning-tree portfast

!

interface Ethernet1/2

switchport access vlan 12

switchport mode access

spanning-tree portfast

!

interface Ethernet1/3

switchport access vlan 13

switchport mode access

spanning-tree portfast

!

interface Ethernet2/1

switchport access vlan 21

switchport mode access

!

interface Ethernet2/2

switchport access vlan 22

switchport mode access

!

其他设备

|--------------------------------------|--------------------------------------|--------------------------------------|
| hostname B1.out | hostname B1.DMZ | hostname B1.in |
| ! | ! | ! |
| no ip domain lookup | no ip domain lookup | no ip domain lookup |
| ! | ! | ! |
| interface Ethernet0/0 | interface Ethernet0/0 | interface Ethernet0/0 |
| ip address 202.100.1.1 255.255.255.0 | ip address 202.100.1.3 255.255.255.0 | ip address 202.100.1.2 255.255.255.0 |
| ! | ! | ! |
| | | |
| | | |
| hostname B2.out | hostname B2.in | |
| ! | ! | |
| no ip domain lookup | no ip domain lookup | |
| ! | ! | |
| interface Ethernet0/0 | interface Ethernet0/0 | |
| mac-address 0001.0001.0001 | mac-address 0002.0002.0002 | |
| ip address 202.100.2.1 255.255.255.0 | ip address 202.100.2.2 255.255.255.0 | |
| ! | ! | |

在ASA上放行ICMP和Telnet,并成功完成以下测试:

提示:需要看到如下输出信息

B1.Out#ping 202.100.1.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 202.100.1.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

B1.Out#telnet 202.100.1.2

Trying 202.100.1.2 ... Open

B2.Out#ping 202.100.2.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 202.100.2.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

B2.Out#telnet 202.100.2.2

Trying 202.100.2.2 ... Open

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

access-list b1-out-in extended permit tcp host 202.100.1.1 host 202.100.1.2 eq telnet

access-list b1-out-in extended permit icmp host 202.100.1.1 host 202.100.1.2

access-group b1-out-in in interface b1-out

access-list b2-out-in extended permit tcp host 202.100.2.1 host 202.100.2.2 eq telnet

access-list b2-out-in extended permit icmp host 202.100.2.1 host 202.100.2.2

access-group b2-out-in in interface b2-out

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

在B1.Out路由器(Loopback0:1.1.1.1)和B1.In路由器(Loopback0:2.2.2.2)上运行EIGRP(AS为90),使得Loopback口可以相互Ping通。

提示:需要看到如下输出信息

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

access-list b1-out-in extended permit eigrp host 202.100.1.1 host 202.100.1.2

access-list b1-out-in extended permit eigrp host 202.100.1.1 host 224.0.0.10

access-list b1-out-in extended permit icmp host 1.1.1.1 host 2.2.2.2

access-group b1-out-in in interface b1-out

access-list b1-in-in extended permit eigrp host 202.100.1.2 host 202.100.1.1

access-list b1-in-in extended permit eigrp host 202.100.1.2 host 224.0.0.10

access-list b1-in-in extended permit icmp host 2.2.2.2 host 1.1.1.1

access-group b1-in-in in interface b1-in

!

interface Loopback1

ip address 1.1.1.1 255.255.255.255

!

router eigrp 90

network 1.1.1.1 0.0.0.0

network 202.100.1.0

!

interface Loopback1

ip address 2.2.2.2 255.255.255.255

!

router eigrp 90

network 2.2.2.2 0.0.0.0

network 202.100.1.0

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

手动配置B2.Out路由器和B2.In路由器以太网接口的MAC地址,分别为0001.0001.0001和0002.0002.0002,在防火墙上启用ARP-Inspection功能分别测试一下NO-Flood和Flood特性。(每次测试前需要在路由器上clear arp)

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

不泛洪

ciscoasa(config)# arp-inspection b2-in enable no-flood

ciscoasa(config)# arp-inspection b2-out enable no-flood

泛洪

ASA(config)# arp-inspection b2-in enable flood

ASA(config)# arp-inspection b2-out enable flood

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

不泛洪

b2-in#sh arp

Protocol Address Age (min) Hardware Addr Type Interface

Internet 202.100.2.1 0 Incomplete ARPA

Internet 202.100.2.2 - 0002.0002.0002 ARPA Ethernet0/0

b2-in#

泛洪正常

在Bridge-group2接口上静态添加MAC地址(b2-outside:0003.0003.0003;b2-inside:0004.0004.0004),并关闭自动MAC学习功能。

提示:需要看到如下输出信息

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

mac-address-table static b2-in 0004.0004.0004

mac-address-table static b2-out 0003.0003.0003

mac-address-table static b2-in 0002.0002.0002

mac-address-table static b2-out 0001.0001.0001

mac-learn b2-out disable

mac-learn b2-in disable

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

ASA# sh mac-learn

no mac-learn flood

interface mac learn


b1-out enabled

b1-in enabled

b1-dmz enabled

b2-out disabled

b2-in disabled

ASA# sh mac-address-table

interface mac address type Age(min) bridge-group


b1-dmz aabb.cc00.2400 dynamic 3 1

b1-out aabb.cc00.4400 dynamic 5 1

b1-in aabb.cc00.6400 dynamic 5 1

b2-in 0004.0004.0004 static 2

b2-out 0003.0003.0003 static 2

b2-in 0002.0002.0002 static 2

b2-out 0001.0001.0001 static 2

### 第二部分 - 多模墙 V4 LAB 考点 ###

实验二拓扑:

环境描述:

本拓扑中包含五台路由器(Hostname 分别是 Outside,Adm-DMZ,Inside,Vir-DMZ),一台防火墙(Hostname:ASA),一台交换机(Hostname:SW)。

四台路由器的 E0/0口分别接入交换机的 E1/0 -- 3,ASA防火墙的 G0/0 -- 1接口分别接入交换机的 E0/0 -- 1接口,交换机如图所示,为各台设备划分 VLAN。

|---------------------------|------------------|
| Device | IP/Mask |
| Outside路由器E0/0 | 202.100.1.1/24 |
| Inside路由器E0/0 | 192.168.1.1/24 |
| Adm-DMZ路由器E0/0 | 172.16.1.1/24 |
| Vir-DMZ路由器E0/0 | 10.1.1.1/24 |
| SW 交换机 | |
| E1/0 | VLAN2 |
| E1/1 | VLAN3 |
| E1/2 | VLAN4 |
| E1/3 | VLAN5 |
| E0/0 | VLAN2 |
| E0/1 | VLAN3,4,5 |
| ASA Bridge-group1 | |
| b1-outside | VLAN11 |
| b1-intside | VLAN12 |
| b1-dmz | VLAN13 |
| BVI1 | 202.100.1.100/24 |
| ASA Bridge-group2 | |
| b2-outside | VLAN21 |
| b2-inside | VLAN22 |
| BVI2 | 202.100.2.100/24 |

实验二需求:

按照拓扑所示,初始化多模式防火墙,子墙名称分别为admin和Vir,其中在admin子墙中,所有接口不能出现接口类型,例如G0。(切换防火墙模式会死机,重启一下即可,可参考照教主视频)

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

ASA:

hostname FW

!

interface Ethernet0

!

interface Ethernet1

!

interface Ethernet1.3

vlan 3

!

interface Ethernet1.4

vlan 4

!

interface Ethernet1.5

vlan 5

!

admin-context Admin

context Admin

allocate-interface Ethernet0

allocate-interface Ethernet1.3-Ethernet1.4

config-url disk0:/Admin.cfg

!

context Vir

allocate-interface Ethernet0 outside

allocate-interface Ethernet1.4 inside

allocate-interface Ethernet1.5 dmz

config-url disk0:/Vir.cfg

!

hostname Admin

enable password 8Ry2YjIyt7RRXU24 encrypted

names

!

interface Ethernet0

nameif Outside

security-level 0

ip address 202.100.1.10 255.255.255.0

!

interface Ethernet1.3

nameif dmz

security-level 50

ip address 172.16.1.10 255.255.255.0

!

interface Ethernet1.4

nameif inside

security-level 100

hostname Vir

enable password 8Ry2YjIyt7RRXU24 encrypted

names

!

interface outside

nameif outside

security-level 0

ip address 202.100.1.20 255.255.255.0

!

interface inside

nameif inside

security-level 100

ip address 192.168.1.20 255.255.255.0

!

interface dmz

nameif dmz

security-level 50

ip address 10.1.1.20 255.255.255.0

!

把HTTP服务器Admin.dmz(路由器)转换到外部202.100.100;把Telnet服务器Vir.dmz(路由器)转换到外部202.100.101;在Outside设备上测试并截图。

提示:需要看到如下输出信息

Outside#telnet 202.100.1.100 80

Trying 202.100.1.100, 80 ... Open

/GET

HTTP/1.1 400 Bad Request

Date: Sun, 18 Dec 2016 14:29:49 GMT

Server: cisco-IOS

Accept-Ranges: none

ASA/admin(config)# sh xlate

1 in use, 1 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

s - static, T - twice, N - net-to-net

TCP PAT from DMZ:172.16.1.1 80-80 to Outside:202.100.1.100 80-80

flags sr idle 0:20:19 timeout 0:00:00

Outside#telnet 202.100.1.101

Trying 202.100.1.101 ... Open

User Access Verification

Password:

Vir.DMZ>

ASA/Vir(config)# sh xlate

1 in use, 1 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

s - static, T - twice, N - net-to-net

TCP PAT from DMZ:10.1.1.1 23-23 to Outside:202.100.1.101 23-23

flags sr idle 0:20:19 timeout 0:00:00

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

Admin

object network dmz-to-outside

host 172.16.1.1

nat (dmz,outside) static 202.100.1.100

access-list out extended permit tcp any host 172.16.1.1 eq 80

access-group out in interface outside

Vir:

object network dmz-to-outside

host 10.1.1.1

nat (dmz,outside) static 202.100.1.101

access-list out extended permit tcp any host 10.1.1.1 eq telnet

access-group out in interface outside

!

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

在admin子墙上把内部网络192.168.1.0/24转换到外部接口(PAT),并从Inside设备上Telnet外部设备Outside路由器进行测试。

提示:需要看到如下输出信息

Inside#telnet 202.100.1.1

Trying 202.100.1.1 ... Open

User Access Verification

Password:

Outside>

ASA/admin(config)# sh xlate

2 in use, 2 most used

Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,

s - static, T - twice, N - net-to-net

TCP PAT from DMZ:172.16.1.1 80-80 to Outside:202.100.1.100 80-80

flags sr idle 0:01:17 timeout 0:00:00

TCP PAT from Inside:192.168.1.1/60754 to Outside:202.100.1.10/60754 flags ri idle 0:00:03 timeout 0:20:19

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

object network inside-net

subnet 192.168.1.0 255.255.255.0

nat (inside,Outside) dynamic interface

手动指派接口MAC地址

interface Ethernet1.4

mac-address 0001.0001.0001

interface inside

mac-address 0001.0002.0001

测试现象:

##此处展示实验需求的测试结果,可以粘贴文字,也可以粘贴截图##

为节约ASA的系统资源,在admin子墙上限制网管的Telnet数量为1,ASDM的数量为1;在Vir子墙上限制连接数为资源的50%,地址转换条目为20000条。

设备配置:

##此处展示各设备的配置,可以粘贴文字,也可以粘贴截图##

class Level1

limit-resource Telnet 1

limit-resource ASDM 1

!

class Level2

limit-resource Conns 50.0%

limit-resource Xlates 20000

!

context Admin

member Level1

!

context Vir

member Level2

相关推荐
论迹1 小时前
【JavaEE】-- 多线程(初阶)1
java·开发语言·网络·java-ee
不爱学英文的码字机器2 小时前
[操作系统] 进程等待
linux·运维·服务器
9毫米的幻想2 小时前
【Linux系统】—— 简易进度条的实现
linux·运维·服务器·c语言·c++
久绊A3 小时前
状态监控与流量分析
linux·运维
ThisIsClark4 小时前
【linux】xargs命令的使用方法详解
linux·运维·chrome·操作系统
龙哥·三年风水4 小时前
shell+kafka实现服务器健康数据搜集
运维·kafka·shell
文牧之4 小时前
MySQL的字符集(Character Set)和排序规则(Collation)
运维·数据库·mysql
Dingdangr6 小时前
网络安全的正确认知
网络·安全·web安全
hanniuniu136 小时前
防火墙是什么?详解网络安全的关键守护者
网络·安全·web安全