DOC PREVIEW
U of I CS 498 - Cyber Security Lab 1

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

DueGoalRequirementsThings you will need to knowPIX VersionsDevice Assignment and Storing ConfigsAddress Translation RequirementsLab ConfigurationTesting TrafficHand-in ItemsCyber Security Lab 1DueFebruary 7GoalPerform basic configuration of PIX firewall.RequirementsBob Co. has hired you and your partner to design a configuration for a border PIX firewall.The firewall has four interfaces (inside, outside, DMZ, and mgmt) and is designed to separate internal corporate machines from DMZ servers and from the outside world. It needs to be configured to enforce the following constraints.The employees of Bob Co should be able to web surf, ssh, and ping anywhere in the outside. They should also be able to pull mail via POP via a mail server running on the DMZ machine. They also need to ssh to the DMZ machine for maintenance and browse the web server. The web traffic accessed from the inside should not have any java or activeX content.People from the outside world should be able to surf the DMZ web server. Appropriately authenticated mail servers should communicate via SMTP with the DMZ machine. In addition, the boss wants to be able to SSH in from his home computer to his work computer. You can use the Ping box (192.168.100.100) as the bosses computer.The DMZ machine is not yet configured. There will be one DMZ virtual machine with a unique address for each firewall. The details will be posted on the class web site and in the newsgroup when they become available (by Thursday).No traffic is allowed from Control to the other interfaces or to Control from the other interfaces. The control network should be an isolated network dedicated to managing and monitoring the network security devices. However, in our scenario, the control network is also connected to the outside router to enable you to upload your final configs. All applications proxies for the allowed traffic should be configured via the inspect command. All other application proxies should be turned off. All protocols necessary for a good user experience should be allowed.Configure antispoof checks on the outside interface (via the ip verify reverse-path command).Set the domain name of the device to “bob.com”. Set the banner to warn that any unauthorized access is illegal.1/29/08 1 Lab 1Things you will need to knowPIX VersionsAll PIX are loaded with image 7.2.1. All PIX are loaded with ASDM 5.2.1. ASDM is a GUI management java application. In the past I have gotten that to run under windows. Unfortunately, I do not have the windows environment set up yet. When that is ready, I will post to the class newsgroup. The PIX images installed only communicate with ssh version 1 and DES. From linux, the following command will allow you to connect via ssh:ssh -1 –l pix –c des <ip address of the firewall> This will get you to the first prompt. To actually do anything interesting, you will want to execute the “enable” command to enter privileged mode. It will prompt you for another password which should be “class-test”.At this point, the prompt should end with “#”. You can run “show config” to see the configuration loaded in non-volatile RAM (basically the config that would be loaded when the firewall reboots) or “show running-config” to show the config currently executing in memory (if you just logged on, these should be the same). “show interface” shows the current addresses and state of the interfaces. “show xlate” shows the current state of the translation (or session) table.At any point “?” will show you the commands that can be executed at this point. You can also enter a command followed by the “?”, e.g., “show ?”, to see all the options of the command.Execute “config term” to enter configuration mode from the terminal. “?” will show many more possible configuration commands. Configuration commands that you will need for this lab include: access-list, access-group, static, inspect, filter java, ip verify reverse-path. “end” or “exit” will take you out of “config term” mode.To make your edits persistent, use the command “write memory” or “write mem”. This will push the edits to the startup config storage.The PIX 7.2 documentation is voluminous, so I cannot print copies for you. Online references are below.Cisco Security Appliance Command Line Configuration Guide, Version 7.2, http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/conf_gd.htmlCisco Security Appliance Command Reference, Version 7.2, http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/cmd_ref.htmlConfiguration commands that you will need for this lab include: access-list, access-group, static, inspect, filter activex, , ip verify reverse-path, domain, banner. “end” or “exit” will take you out of “config term” mode.1/29/08 2 Lab 1Device Assignment and Storing ConfigsWe are using virtual firewalls this semester in attempt to make sharing hardware cleaner. Each of the five physical firewalls has three virtual firewalls (or security contexts). One context is the admin context and we will not be using that one. The other two contexts have the naming scheme fwX-Y, where X is the physical firewall number (1-5) and Y is the context number (1 or 2). Each context has its persistent configuration stored on the management machine (192.168.200.2). It is accessed via ftp using Alice's account. The configurations are stored at /home/alice/configs/fwX-Y.cfg. Original versions of those configurations are stored at /home/alice/configs/orig.We will likely have multiple teams sharing a context in some cases. When getting ready to start work on their context, the team should copy their version of the configuration into /home/alice/configs/fwX-Y.cfg (perhaps backing up the previous version to fwX-Y.cfg.bak). Then they should reload the context.You can also edit the configuration file directly and use “copy startup-config running-config” to bring the changes into the system. Editing directly is useful for removing commands (e.g., access-lists where you must list each entry you one to remove prefixed by “no”).Address Translation RequirementsPIX uses security levels associated with the interfaces to determine what traffic should be allowed and should not be allowed. Traffic originating from a high security interface (e.g. Inside) to a lower security interface (e.g. Outside) is outbound traffic. Traffic originating from a low


View Full Document

U of I CS 498 - Cyber Security Lab 1

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download Cyber Security Lab 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Cyber Security Lab 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Cyber Security Lab 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?