cisco pix firewall

20
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005

Upload: adonis

Post on 04-Feb-2016

86 views

Category:

Documents


6 download

DESCRIPTION

Cisco PIX firewall. Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu. August 23, 2005. Purpose - This is the most used PIX config. in use in most enterprise networks today - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cisco PIX firewall

Cisco PIX firewall Set up 3 security zones

***CS580***

John TrafecantyJules R. Nya Baweu

August 23, 2005

Page 2: Cisco PIX firewall

PIX with 3 interfaces - 3 security zones

Purpose - This is the most used PIX

config. in use in most enterprise networks today

- It allows company servers sitting on the DMZ interface to be accessed from the public network while other computers sitting on the inside remain secured and inaccessible by intruders.

Firewall policy rules - Inside users can initiate

connections to the outside and DMZ.

- Outside users can initiate connections only to the DMZ but not to the inside.

- DMZ servers can only initiate connections to the outside but not to the inside.

Page 3: Cisco PIX firewall

Pix with 3 interfaces - 3 security zones

Outside Inside DMZ

Page 4: Cisco PIX firewall

Our environment of work

Page 5: Cisco PIX firewall

Our setup

Page 6: Cisco PIX firewall

Our setup - Simplified

Page 7: Cisco PIX firewall

Config. on Switch S2 - Vlan

Page 8: Cisco PIX firewall

Config. on Router R5

Page 9: Cisco PIX firewall

Config. on Router R6

Page 10: Cisco PIX firewall

Detailed config. command On the Cisco PIX Firewall

nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security50

interface ethernet0 100basetx interface ethernet1 100basetx interface ethernet2 100basetx

ip address outside 209.165.201.3 255.255.255.224 ip address inside 10.0.0.1 255.255.255.0 ip address dmz 192.168.0.1 255.255.255.0

fixup protocol ftp 21 fixup protocol http 80 fixup protocol smtp 25 fixup protocol h323 1720 fixup protocol rsh 514 fixup protocol sqlnet 1521

arp timeout 14400

names name 192.168.0.2 webserver

pager lines 24

logging console 7

nat (inside) 1 10.0.0.0 255.255.255.0 nat (dmz) 1 192.168.0.0 255.255.255.0

global (outside) 1 209.165.201.10-209.165.201.30 global (outside) 1 209.165.201.5 global (dmz) 1 199.168.0.10-199.168.0.20

static (dmz,outside) 209.165.201.6 webserver

Page 11: Cisco PIX firewall

Detailed config. command On the Cisco PIX Firewall

access-list acl_out permit tcp any host 209.165.201.6 eq http

Access-group acl_out in interface outside

rip outside passive version 2

rip outside default version 2

rip inside passive version 1

rip dmz passive version 2

route outside 0.0.0.0 0.0.0.0 209.165.201.1 1

mtu outside 1500 mtu inside 1500 mtu dmz 1500

telnet 10.0.0.199 inside telnet timeout 5

terminal width 80

Page 12: Cisco PIX firewall

Config. on Pix firewall

Page 13: Cisco PIX firewall

Scenario of traffic from inside to the outside – Telnet to the router R4

“This traffic is allowed”

Page 14: Cisco PIX firewall

Scenario of traffic from inside to the outside – ping to the router R4

“This traffic is allowed”

Page 15: Cisco PIX firewall

Scenario of traffic from outside to the inside – Telnet to Router R6

“Dest. Unreachable, since R6 is using private ip”

Page 16: Cisco PIX firewall

Scenario of traffic from outside to the DMZ –ping to Router R5

“Only http traffic is allowed to the dmz from outside”

Page 17: Cisco PIX firewall

Scenario of traffic from outside to the DMZ – Status on the Pix firewall after ping to Router R5

“Only http traffic is allowed to the dmz from outside”

Page 18: Cisco PIX firewall

Scenario of traffic from outside to the DMZ – Telnet to Router R5

“Telnet is no allowed to the dmz from outside”

Page 19: Cisco PIX firewall

Scenario of traffic from outside to the DMZ – Status on the Pix firewall after telnet to Router R5

“Telnet is no allowed to the dmz from outside”

Page 20: Cisco PIX firewall

Conclusion

This lab project has shown an example of how to configure a stateful packet filter - Cisco PIX Firewall.

The set up of the Cisco PIX firewall through the 3 security zones scheme is used today in complex networks and can provide an effective security protection for enterprise networks .