28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7. Even though that ACL works let’s remove that ACL and make a better one using<br />

reflexive ACL’s. This one will not only keep people out of the inside network but<br />

will not “imprison” the inside network. We will set it up to be able to use icmp to<br />

and from the inside network but anything outside of the network will not be able<br />

to ping into it (destination net unreachable).<br />

BrFW(config)#ip access-list extended filterincoming<br />

BrFW(config)#permit icmp 10.0.0.0 0.255.255.255 any reflect internaltraffic<br />

BrFW(config)#deny icmp any any<br />

BrFW(config)#evaluate internaltraffic<br />

BrFW(config)#ip access-list extended filteroutgoing<br />

BrFW(config)#permit icmp 10.0.0.0 0.255.255.255 any reflect internaltraffic<br />

BrFW(config)#evaluate internaltraffic<br />

Then we need to apply them to the interface:<br />

BrFW(config)#int e0/0<br />

BrFW(config-if)#ip access-group filterincoming in<br />

BrFW(config-if)# ip access-group filteroutgoing out<br />

What we are doing here is creating two named ACL’s (filterincoming and<br />

filteroutgoing). Then we select which icmp addresses will be allowed (with<br />

wildcard mask) and then, in the same command, turn it into a reflexive ACL with<br />

the reflect command. Last in that command we create a temporary placeholder<br />

called “internaltraffic” which will hold our source information for the duration of<br />

the timer. When the packets come back we ask it to be evaluated with the<br />

information in our temporary placeholder “internaltraffic.” Finally, the reflexive<br />

ACL is applied to an interface. Notice how we used both in and out for our<br />

extended part…I told you earlier there are many uses of ACL’s and you would<br />

start learning more later.<br />

8. Test ping again. Workstation B and C should be able to ping each other but not to<br />

A. Workstation A should now be able to ping everything.<br />

Supplemental Lab or Challenge Activity:<br />

1. Go out to <strong>CISCO</strong> and do some research on the features of the PIX firewall.<br />

2. One problem with PIX firewall is they only work with IP. No IPX, Apple,<br />

XNS, etc. How could you get around that sort of problem?<br />

3. What are dynamic access control lists? How could I use them here?<br />

So What Have I Learned Here?<br />

In this lab you have learned the basics of firewall technology. As you progress in your<br />

studies you will learn more about techniques related to firewalls and security including<br />

content based access control, dynamic access control lists (lock and key), and AAA.<br />

361

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!