CCNA Security v.2 - PT - For Checking
CCNA Security v.2 - PT - For Checking
Introduction
In this practice Packet Tracer Skills Based Assessment, you will do as follows:
Configure basic device hardening and secure network management
Configure an ASA firewall to implement security policies
Configure ACLs to filter network traffic
Configure devices to protect against STP attacks and to enable broadcast storm control
Configure port security and disable unused switch ports
Configure an IOS IPS
Configure a ZBF to implement security policies
Configure a site-to-site IPsec VPN
Addressing Table
Device Interfac IP Address Subnet Mask Gateway DNS server
e
Internet S0/0/0 209.165.200.225 255.255.255.252 n/a n/a
S0/0/1 192.31.7.1 255.255.255.252 n/a n/a
S0/1/0 198.133.219.1 255.255.255.252 n/a n/a
Device Interfac IP Address Subnet Mask Gateway DNS server
e
Note: Appropriate verification procedures should be taken after each configuration task to ensure that it has been properly
implemented.
Step 1: Configure Basic Device Hardening for the CORP Router.
a. Configure the CORP router to accept only passwords with a minimum length of 10 characters.
CORP(config)#security passwords min-length 10
b. Configure an encrypted privileged level password of ciscoclass.
CORP(config)#enable secret ciscoclass
c. Enable password encryption for all clear text passwords in the configuration file.
CORP(config)#service password-encryption
d. Configure the console line and all vty lines 0 to 15 with the following requirements:
Note: CORP is already configured with the username CORPADMIN and the secret password Ciscoccnas.
username CORPADMIN secret Ciscoccnas
use the local database for login
line vty 0 15
login authentication default
disconnect after being idle for 20 minutes
line vty 0 15
exec-timeout 20 0
e. Disable the CDP protocol only on the link to the Internet router.
interface Serial0/0/0
no cdp enable
Note: The AAA server is already configured with RADIUS service, a username CORPSYS and the
password LetSysIn. The key for the client to access the AAA server is corpradius.
AAA authentication using the AAA server as the default for console line and vty lines 0 to 4 access. The
local database is used as a backup method in case the AAA server cannot be connected.
d. Configure PAT with POOL name patpool (NAT OVERLOAD with POOL) 192.168.1.5
192.168.1.10
ip nat pool patpool 192.168.1.5 192.168.1.10 netmask 255.255.255.0
ip nat inside source list 1 pool patpool overload
e. Configure access-list 1 to permit 172.16.0.0 0.0.255.255
access-list 1 permit 172.16.0.0 0.0.255.255
f. Configure static nat 172.16.25.2 192.168.1.3
ip nat inside source static 172.16.25.2 192.168.1.3
g. Configure static nat 172.16.25.5 192.168.1.4
b. Enable storm control for broadcasts on GigabitEthernet0/1 with a 50 percent rising suppression level.
interface G0/1
storm-control broadcast level 50
protect Drops all the packets from the insecure hosts at the port-security process level but does not
increment the security-violation count.
restrict Drops all the packets from the insecure hosts at the port-security process level and
increments the security-violation count.
shutdown Shuts down the port if there is a security violation.
ip ips config location flash:ipsdir
c. Configure the IOS IPS to use the signature categories. Retire the all signature category(ເອົາອອກ) and unretire
(ນໍາໃຊ້) the ios_ips basic category.
ip ips signature-category
category all
retired true
!
category ios_ips basic
retired false
signature-category
signature-definition
f. Verify that IPS is working properly, that Public DNS/WEB/FTP Svr in the External network cannot ping AAA
server, but that AAA server, however, can ping Public DNS/WEB/FTP Svr.
Step 5: Configure CORP-ASA to Implement the Security Policy.
a. Access CORP-ASA and enter the privileged mode with the enable password of Ciscoccnas.
CORP-ASA(config)#enable password Ciscoccnas
b. Configure the domain name as theccnas.com.
CORP-ASA(config)#domain-name theccnas.com
c. Configure the inside, outside, and dmz interfaces with the following information
VLAN 1 - IP address 192.168.1.1/24, nameif inside, security-level 100, assign to E0/1
Interface e0/1
Switchport access vlan1
---------------------------------------------
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
VLAN 2 - IP address 209.165.200.253/28, nameif outside, security-level 0, assign to E0/0
interface Ethernet0/0
switchport access vlan 2
---------------------------------
interface Vlan2
nameif outside
security-level 0
IP address 209.165.200.253 255.255.255.240
interface Vlan3
nameif dmz
no forward interface Vlan1
security-level 70
ip address 10.1.1.254 255.255.255.0
Enable interfaces
d. Configure a static default route with the next hop address of the CORP router
route outside 0.0.0.0 0.0.0.0 209.165.200.254
e. Configure NAT for both inside and dmz network
Create an object inside-nat with subnet 192.168.1.0/24 and enable the IP addresses of the hosts in the
Internal network to be dynamically translated to access the External network using the outside interface
object network inside-nat
subnet 192.168.1.0 255.255.255.0
nat (inside,outside) dynamic interface
Create an object dmz-dns-server to statically translate the DNS server in DMZ to the public IP
object network dmz-dns-server
host 10.1.1.5
nat (dmz,outside) static 209.165.200.242
Create an object dmz-web-server to statically translate the web server in DMZ to the public IP
object network dmz-web-server
host 10.1.1.2
nat (dmz,outside) static 209.165.200.241
f. Modify the default MPF(Modular Policy Framework) application inspection global service policy to enable hosts in
the Internal network to access the web servers on the Internet
Create a class inspection_default that matches default-inspection-traffic
class-map inspection_default
match default-inspection-traffic
Create a policy-map global_policy and specify the inspect http
policy-map global_policy
class inspection_default
inspect http
Attach the policy map globally to all interfaces
service-policy global_policy global
g. Configure an ACL to allow access to the DMZ servers from the Internet. The ACL will also allow icmp echo-reply
traffic from the Internet to enter the CORP-ASA
Create, apply, and verify an extended named ACL (named OUTSIDE-TO-DMZ) to filter incoming traffic
to the CORP-ASA. The ACL should be created in the order specified in the following guidelines (Please
note, the order of ACL statements is significant only because of the scoring need in Packet
Tracer.):
1. HTTP traffic is allowed to DMZ Web Svr.
access-list OUTSIDE-TO-DMZ extended permit tcp any host 209.165.200.241eq www
2. DNS traffic (both TCP and UDP) is allowed to DMZ DNS Server (two separate ACEs)
access-list OUTSIDE-TO-DMZ extended permit tcp any host 209.165.200.242 eq domain
access-list OUTSIDE-TO-DMZ extended permit udp any host 209.165.200.242 eq domain
b. Create, apply, and verify an extended named ACL (named INCORP) to control access from the Internet into the
CORP router. The ACL should be created in the order specified in the following guidelines (Please note, the
order of ACL statements is significant only because of the scoring need in Packet Tracer.):
ip access-list extended INCORP
1. Allow HTTP traffic to the DMZ Web Server.
permit tcp any host 209.165.200.241 eq www
2. Allow DNS traffic (both TCP and UDP) to the DMZ DNS Server (two separate ACEs).
permit tcp any host 209.165.200.242 eq domain
permit udp any host 209.165.200.242 eq domain
3. Allow SSH traffic from the Branch Office administrator workstation to the Serial 0/0/0 interface on the
CORP router.
permit tcp host 198.133.219.35 host 209.165.200.226 eq 22
4. Allow IP traffic from the Branch router serial interface into the CORP router serial interface.
permit ip host 198.133.219.2 host 209.165.200.226
5. Allow IP traffic from the Branch Office LAN to the public IP address range that is assigned to the CORP
site (209.165.200.240/28).
permit ip 198.133.219.32 0.0.0.31 209.165.200.240 0.0.0.15
6. Allow echo-reply and host-unreachable traffic from the Internet
permit icmp any any echo-reply
permit icmp any any host-unreachable
7. Allow return TCP traffic from the Internet with the destination of 209.165.200.240/28
permit tcp any 209.165.200.240 0.0.0.15 established
c. To verify the INCORP ACL, complete the following tests:
Net Admin PC in the Internal network can access the URL http://www.externalone.com;
Admin PC can establish an SSH connection to the CORP router (209.165.200.226) with the
username CORPSYS and password LetSysIn. If the password does not work, you may try the backup
usernameSSHAccess and password ciscosshaccess defined in the local database.
External User cannot establish an SSH connection to the CORP router (209.165.200.226).
Step 7: Configure a Zone-Based Policy Firewall on the Branch Router.
a. Access the Branch router with username CORPADMIN, password Ciscoccnas and the enable secret password
of ciscoclass.
enable secret ciscoclass
username CORPADMIN password Ciscoccnas
b. On the Branch router, create the firewall zones.
Create an internal zone named BR-IN-ZONE.
zone security BR-IN-ZONE
Create an external zone named BR-OUT-ZONE.
zone security BR-OUT-ZONE
c. Define a traffic class and access list.
Create an ACL 110 to permit all protocols from the 198.133.219.32/27 network to any destination.
access-list 110 permit ip 198.133.219.32 0.0.0.31 any
Create a class map using the option of class map type inspect with the match-all keyword. Match the
ACL 110 and name the class map BR-IN-CLASS-MAP.
class-map type inspect match-all BR-IN-CLASS-MAP
match access-group 110
d. Specify firewall policies.
Create a policy map named BR-IN-OUT-PMAP.
policy-map type inspect BR-IN-OUT-PMAP
Use the BR-IN-CLASS-MAP class map.
class type inspect BR-IN-CLASS-MAP
Specify the action of inspect for this policy map.
inspect
e. Configure IPsec parameters on the Branch router using the same parameters as on the CORP router. Note that
interesting traffic is defined as the IP traffic from the two LANs.
access-list 120 permit ip 198.133.219.32 0.0.0.31 209.165.200.240 0.0.0.15
f. Verify the VPN configuration. From the Admin PC, establish an FTP session to www.theccnas.com, using the
username cisco and password cisco.
Also on Admin PC, visit the website www.theccnas.com. On the Branch or CORP router, check that the packets are
encrypted.
Version 2
Created in Packet Tracer 7.2
All contents are Copyright © 1992 - 2014 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Logging synchronous command is useful whenever console messages are being displayed at the same time that
you are trying to input EXEC or configuration commands.
Instead of console messages being intermingled (ປະສົມກັນ) with your input, your input is redisplayed on a single
line at the finish of each console message that "interrupts" your input.
-----------------------------------------------------------
Hate when you exit out of Global Configuration Mode and start another command and you are interrupted by a console or debug
message? Use the logging synchronous command to fix that.
Switch#conf t
Switch(config)#line con 0
Switch(config-line)#logging synchronous
Switch(config-line)#end