28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Background:<br />

We just learned about the standard, extended, and named access control lists (ACL’s) and<br />

how they work. We were told that too many ACL’s effectively turn the router into a<br />

firewall and severely degrades its overall performance. In fact routers and firewalls are<br />

very close in construction…they just have slightly different operating systems. Plus they<br />

cost about the same. Here is the front and rear views of a <strong>CISCO</strong> PIX Firewall.<br />

“front view” of PIX 515<br />

“rear view” of PIX 515<br />

Not too different huh? In this lab you will learn about a fourth type of access control list<br />

called a “reflexive” access control list. The reflexive access control list allows certain<br />

information out of a router port with a time to live counter. If the requested information<br />

returns before the timer expires then it is let back into that interface. Only information<br />

that originates from that interface is therefore allowed out and back in. Kind of like<br />

having a back stage pass huh? Take me to the green room! Typically firewalls allow<br />

private addresses (and address translation) on an “inside” portion of a network—totally<br />

shielded from the outside. Plus they have a “DMZ” zone which is not shielded from the<br />

outside…we tend to put our pesky sales people who are only contract employees out<br />

there. If you leap into the <strong>CISCO</strong> security certificate training then this lab provides a<br />

nice transition into the PIX firewall course.<br />

Step-By-Step Instructions:<br />

1. Cable the lab as shown.<br />

2. Set up the basics and interfaces for each router. Use EIGRP or RIP version 2 for<br />

your routing protocol.<br />

3. Put the IP addresses, masks, and gateways on the workstations.<br />

4. Test ping from each workstation to the others. It should work just fine.<br />

5. Let’s make an ACL to simulate a firewall:<br />

BrFW(config)#access-list 1 permit 10.0.0.0 0.255.255.255<br />

BrFW(config)#access-list 1 deny any<br />

BrFW(config)#int e0/0<br />

BrFW(config-if)#ip access-group 1 out<br />

6. Test ping again. Workstation B and C should be able to ping each other but not to<br />

A. Workstation A should not be able to get past any interface on its router<br />

(request times out).<br />

360

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!