Compare cert salaries and plan your next career move
gorebrush wrote: » OK So here is what I'm trying to setup We recently had a router failure, so I was able to install a Cisco 877 in place of the crappy thing given to us by our service provider. Here's the setup CORPORATE NETWORK ---> ISA 2006 ---> Cisco 877 Router ...................................................... Wireless Access Points .....................................................GUEST WIRELESS NETWORK So I hope this crude representation is ok. Basically, I want to configure a basic IOS Firewall on the Cisco 877 which allows only HTTP traffic through for people on the Corporate network And then protect everything in the GUEST network from the internet. Between the ISA box and Cisco 877, everything is 192.168.1.x So ISA sits on 192.168.1.101 GUEST Wireless is DHCP'ed from the Cisco 877 for 192.168.1.201 -> 192.168.1.249 So all Guest clients can get straight to the internet, and then the ISA box protects the internal network. I suppose it is like a DMZ, but I dont want access from outside to anything inside. The problem I've got is configuring the firewall on the Cisco 877 so it still allows ISA to work. The way our ISP works is that we have a static pool of IP addresses on the internet, so to get that working I have basically done a NAT Translation for our ISA box for one of the IP's outside (so straight translation, and the firewall is looking after the corp network) But no matter how I seem to configure the Cisco 877, I end up denying access to the internet for anything on the ISA server. Any ideas?
notgoing2fail wrote: » Sorry for this dumb question, but what is an ISA 2006?
gorebrush wrote: » /tips hat to fellow Welsh man. To answer your questions 1. ISA Route or NAT - It is performing NAT from Local Networks out to Remote Network I think this is where the problem occurs, I have no problem with dual NAT myself, but I think this is where my configuration is getting unstuck Would I be better off getting ISA to route? 2. ACL or CBAC I was hoping to configure just CBAC - i.e. open the protocols outwards such as HTTP/HTTPS/FTP etc only - the documentation in the exam guides then say to apply a tough ACL the other way. Am I missing something - sure hope not as my exam is Monday, and I will be looking somewhat foolish
knwminus wrote: » I think Zone based might be better for this particular setup. CBAC was kind of difficult to set up well (at least for me). You could run the SDM on this thing and set up zone based firewalls in 30 minutes.
mikem2te wrote: » I think you need to explicitly define an inward ACL to allow CBAC to allow return traffic.
mikem2te wrote: » I think you need to explicitly define an inward ACL to allow CBAC to allow return traffic. I'm going to have a play, I have an 2801 running with a CBAC firewall here at home running my internet connection. Also I just remembered I have ISA 2006 configured up on a Hyper-V VM, I'll fire it up!!
ip inspect name firewall icmp ip inspect name firewall dns ip inspect name firewall http ip inspect name firewall https ip inspect name firewall smtp ip inspect name firewall tcp ip inspect name firewall udp ip inspect name firewall ftp ip inspect name firewall sip interface FastEthernet0/1 description OUTSIDE$ETH-WAN$$FW_OUTSIDE$ ip address X.X.X.X 255.255.255.248 ip access-group 101 in ip access-group 102 out ip verify unicast reverse-path no ip redirects no ip unreachables no ip proxy-arp ip flow ingress ip nat outside ip inspect firewall out ip virtual-reassembly duplex auto speed auto snmp trap ip verify drop-rate no cdp enable no mop enabled interface Vlan1 description $FW_INSIDE$ ip address X.X.X.X 255.255.255.0 ip access-group 100 in no ip redirects no ip unreachables no ip proxy-arp ip flow ingress ip nat inside ip virtual-reassembly ! access-list 100 remark Internal outbound fraffic access-list 100 permit ip 10.0.0.0 0.255.255.255 any access-list 100 permit ip 172.16.0.0 0.0.255.255 any access-list 100 permit udp any any eq bootps access-list 100 deny ip any any log access-list 101 permit icmp any host X.X.X.X echo-reply access-list 101 deny ip 0.0.0.0 0.255.255.255 any access-list 101 deny ip any any access-list 102 deny ip any 10.0.0.0 0.255.255.255 access-list 102 deny ip any 172.16.0.0 0.15.255.255 access-list 102 deny ip any 192.168.0.0 0.0.255.255 access-list 102 permit ip any any
gorebrush wrote: » HOWEVER - is the configuration of CBAC basically a ip inspect <name> <protocol> and a relevant ACL ??
! ! Last configuration change at 15:18:10 BST Wed Apr 7 2010 by david ! NVRAM config last updated at 13:26:54 BST Wed Apr 7 2010 by david ! version 15.0 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname ROC-MA-INTERNET ! boot-start-marker boot-end-marker ! logging buffered 51200 warnings ! no aaa new-model ! ! ! clock summer-time BST recurring ! crypto pki trustpoint TP-self-signed-560339304 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-560339304 revocation-check none rsakeypair TP-self-signed-560339304 ! ! <snip> dot11 syslog ip source-route ! ! ip dhcp excluded-address 192.168.1.64 192.168.1.255 ! ip dhcp pool GUEST network 192.168.1.0 255.255.255.0 default-router 192.168.1.254 dns-server 192.168.1.254 lease 0 8 ! ! ip cef ip domain name rocialle.local ip name-server 194.72.0.114 ip name-server 62.6.40.162 ip inspect audit-trail ip inspect name protect tcp ip inspect name protect http java-list 10 ip inspect name protect udp ip inspect name FW http alert on audit-trail on timeout 600 ip inspect name FW https alert on audit-trail on timeout 600 ip inspect name FW nntp alert on audit-trail on timeout 600 ip inspect name FW imap3 alert on audit-trail on timeout 600 ip inspect name FW imaps alert on audit-trail on timeout 600 ip inspect name FW tcp alert on audit-trail on timeout 600 ip inspect name FW ftp alert on audit-trail on timeout 600 ip inspect name FW time alert on audit-trail on timeout 600 ip inspect name FW ftps alert on audit-trail on timeout 600 ip inspect name FW pop3 alert on audit-trail on timeout 600 ip inspect name FW pop3s alert on audit-trail on timeout 600 ip inspect name FW udp alert on audit-trail on timeout 600 ip inspect name FW ntp alert on audit-trail on timeout 600 ip inspect name FW timed alert on audit-trail on timeout 600 no ipv6 cef ! multilink bundle-name authenticated ! ! ! archive log config hidekeys vtp mode client username David privilege 15 secret 5 $1$MJII$VQeek3gCWe4K5m3PhqDIY. ! ! ! ! ! ! ! ! ! interface ATM0 no ip address no ip redirects no ip unreachables no ip proxy-arp no atm ilmi-keepalive ! pvc 0/38 encapsulation aal5mux ppp dialer dialer pool-member 1 ! ! interface FastEthernet0 ! ! interface FastEthernet1 ! ! interface FastEthernet2 ! ! interface FastEthernet3 ! ! interface Vlan1 description INSIDE_INT ip address 192.168.1.254 255.255.255.0 ip nat inside ip inspect FW in ip virtual-reassembly ip tcp adjust-mss 1452 ! ! interface Dialer1 ip address negotiated ip nat outside ip virtual-reassembly encapsulation ppp dialer pool 1 dialer-group 1 ppp authentication pap chap callin ppp chap hostname B283051@ ppp chap password 0 ppp pap sent-username B283051@ ppp ipcp mask request ppp ipcp route default ppp ipcp address accept no cdp enable ! ! ip forward-protocol nd ip http server ip http access-class 23 ip http authentication local ip http secure-server ip http timeout-policy idle 60 life 86400 requests 10000 ! ! ip dns server ip nat pool GUESTNAT 217.40.235.57 217.40.235.58 netmask 255.255.255.252 ip nat inside source static 192.168.1.101 217.40.235.61 ip route 0.0.0.0 0.0.0.0 Dialer1 ip route 10.8.8.0 255.255.254.0 192.168.1.101 ip route 172.16.0.0 255.255.0.0 192.168.1.101 ip route 172.16.4.0 255.255.255.0 192.168.1.101 ip route 172.16.8.0 255.255.255.0 192.168.1.101 ! ip access-list extended GUEST ip access-list extended OUTSIDE_IN permit ip any host 217.40.xxx.xxx ! no cdp run ! ! ! ! ! control-plane ! ! banner motd ^CCC ************************************* *** WARNING ** WARNING ** WARNING *** ************************************* This system is monitored and any access made by you will be logged Your attept to use this sIf you are not an authorised user please log out now. ^C ! line con 0 logging synchronous login local no modem enable line aux 0 line vty 0 4 privilege level 15 logging synchronous login local transport input telnet ssh ! scheduler max-task-time 5000 ntp logging ntp master 2 ntp server ntp1.uk.uu.net ntp server extntp0.inf.ed.ac.uk ntp server ntp.cis.strath.ac.uk end
gorebrush wrote: » Ah-ha! I've fixed it. ISA Server was telling me about DNS errors... For some reason DNS requests were not getting through, so my OUTSIDE_IN rule now looks like this: - ip access-list extended OUTSIDE_IN permit ip any host 217.40.235.61 permit ip any host 192.168.1.101 permit ip host 194.72.0.114 any permit ip host 62.6.40.162 any And now it works... Think I can ditch that 2nd line of the ACL though
gorebrush wrote: » OK I've added ip inspect DNS in there (DOH, that was stupid) And then dropped the two lines out of the ACL (Much neater solution) But that doesn't seem to work...
Session 67B7BB28 (10.20.0.220:51051)=>(212.23.6.100:53) dns SIS_OPEN Session 67B80BD0 (10.20.0.220:51115)=>(212.23.6.100:53) dns SIS_OPEN Session 67B7DC88 (10.20.0.220:53302)=>(212.23.6.100:53) dns SIS_OPEN
udp x..x.x.x:51069 10.20.0.220:51069 212.23.6.100:53 212.23.6.100:53 udp x.x.x.x:52013 10.20.0.220:52013 212.23.6.100:53 212.23.6.100:53 udp x.x.x.x:52254 10.20.0.220:52254 212.23.6.100:53 212.23.6.100:53 udp x.x.x.x:52581 10.20.0.220:52581 212.23.6.100:53 212.23.6.100:53 udp x.x.x.x:52754 10.20.0.220:52754 212.23.6.100:53 212.23.6.100:53
mikem2te wrote: » Does 'show ip inspect sessions' show any port 53 / DNS entries? Session 67B7BB28 (10.20.0.220:51051)=>(212.23.6.100:53) dns SIS_OPEN Session 67B80BD0 (10.20.0.220:51115)=>(212.23.6.100:53) dns SIS_OPEN Session 67B7DC88 (10.20.0.220:53302)=>(212.23.6.100:53) dns SIS_OPEN I have the above after my client performs a DNS lookup
gorebrush wrote: » Don't get anything like that, just no DNS resolution...
gorebrush wrote: » The ISA box is looking at 192.168.1.254 for DNS - so your spot on, CBAC would be no good for that Perhaps this is where I am getting stuck!
gorebrush wrote: » And for the other rule - yes I'll change that - but why is it best to have it out the Dialer and not in the VLAN?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.