7
CBAC LAB

CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

Embed Size (px)

Citation preview

Page 1: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

Page 2: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB Nmap

Port scanner Nmap: the beef, Zenmap: GUI frontend

Findings before CBAC firewallc. What services are running and available on

R1 from the perspective of PC-C? Telnet and HTTP

d. In the Nmap scan output, refer to the TRACEROUTE information. How many hops are between PC-C and R1 and through what IP addresses? Three hops. The scan went from PC-C to the R3 Fa0/1 default gateway (192.168.3.1) to R2 S0/0/1 (10.2.2.2) and then to R1 S0/0/0 (10.1.1.1).

Page 3: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

In Part 2 of this lab you configured a CBAC firewall on R1 and then used Nmap again to test access from external host PC-C to R1.

You used the AutoSecure IOS feature to enable CBAC.A sort of a dialog mode, automatically do

things like disabling servicesConfigure CBAC Firewall feature? [yes/no]:

yes

Page 4: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

Automatically generated configuration requires fine tuning

The AutoSecure CBAC firewall on R1 does not permit EIGRP hellos and neighbor associations to occur permit eigrp any any permit udp any any eq bootpc

Page 5: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

After CBAC config the result of the port scan When the R1 CBAC firewall is in place, what

services are available on R1 and what is the status of R1 from the perspective of external PC-C? No services are detected. Nmap, run from PC-C, reports the status of host R1 10.1.1.1 as down.

Page 6: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

c. Which protocols did AutoSecure configure to be inspected as they leave the S0/0/0 interface? Cuseeme, FTP, HTTP, RCMD, Realaudio, SMTP, TFTP, UDP AND TCP.

d. To which interface is the ACL autosec_firewall_acl applied and in which direction? S0/0/0 inbound.

e. What is the purpose of the ACL autosec_firewall_acl? It allows bootp traffic to enter the S0/0/0 interface and blocks all other non-established connections from outside R1.

Page 7: CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from

CBAC LAB

Step 2: From PC-A, ping the R2 external WAN interface.

a. From PC-A, ping the R2 interface S0/0/0 at IP address 10.1.1.2.

C:\>ping 10.1.1.2

b. Were the pings successful? Why or why not? No. The ICMP protocol was not included in the autosec_inspect list, so the pings that PC-A sends are blocked from returning.

Step 3: Add ICMP to the autosec_inspect list.

R1(config)#ip inspect name autosec_inspect icmp timeout 5

Step 4: From PC-A, ping the R2 external WAN interface.

a. From PC-A, ping the R2 interface S0/0/0 at IP address 10.1.1.2.

C:\>ping 10.1.1.2

b. Were the pings successful? Why or why not? Yes, ICMP is now included in the autosec_inspect list, so the ICMP replies for ICMP requests originating from within the R1 LAN are allowed to return.