Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.

Similar presentations


Presentation on theme: "Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005."— Presentation transcript:

1 Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005

2 PIX with 3 interfaces - 3 security zones Purpose - This is the most used PIX config. in use in most enterprise networks today - It allows company servers sitting on the DMZ interface to be accessed from the public network while other computers sitting on the inside remain secured and inaccessible by intruders. Firewall policy rules - Inside users can initiate connections to the outside and DMZ. - Outside users can initiate connections only to the DMZ but not to the inside. - DMZ servers can only initiate connections to the outside but not to the inside.

3 Pix with 3 interfaces - 3 security zones Outside Inside DMZ

4 Our environment of work

5 Our setup

6 Our setup - Simplified

7 Config. on Switch S2 - Vlan

8 Config. on Router R5

9 Config. on Router R6

10 Detailed config. command On the Cisco PIX Firewall nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 dmz security50 interface ethernet0 100basetx interface ethernet1 100basetx interface ethernet2 100basetx ip address outside 209.165.201.3 255.255.255.224 ip address inside 10.0.0.1 255.255.255.0 ip address dmz 192.168.0.1 255.255.255.0 fixup protocol ftp 21 fixup protocol http 80 fixup protocol smtp 25 fixup protocol h323 1720 fixup protocol rsh 514 fixup protocol sqlnet 1521 arp timeout 14400 names name 192.168.0.2 webserver pager lines 24 logging console 7 nat (inside) 1 10.0.0.0 255.255.255.0 nat (dmz) 1 192.168.0.0 255.255.255.0 global (outside) 1 209.165.201.10-209.165.201.30 global (outside) 1 209.165.201.5 global (dmz) 1 199.168.0.10-199.168.0.20 static (dmz,outside) 209.165.201.6 webserver

11 Detailed config. command On the Cisco PIX Firewall access-list acl_out permit tcp any host 209.165.201.6 eq http Access-group acl_out in interface outside rip outside passive version 2 rip outside default version 2 rip inside passive version 1 rip dmz passive version 2 route outside 0.0.0.0 0.0.0.0 209.165.201.1 1 mtu outside 1500 mtu inside 1500 mtu dmz 1500 telnet 10.0.0.199 inside telnet timeout 5 terminal width 80

12 Config. on Pix firewall

13 Scenario of traffic from inside to the outside – Telnet to the router R4 “This traffic is allowed”

14 Scenario of traffic from inside to the outside – ping to the router R4 “This traffic is allowed”

15 Scenario of traffic from outside to the inside – Telnet to Router R6 “Dest. Unreachable, since R6 is using private ip”

16 Scenario of traffic from outside to the DMZ – ping to Router R5 “Only http traffic is allowed to the dmz from outside”

17 Scenario of traffic from outside to the DMZ – Status on the Pix firewall after ping to Router R5 “Only http traffic is allowed to the dmz from outside”

18 Scenario of traffic from outside to the DMZ – Telnet to Router R5 “Telnet is no allowed to the dmz from outside”

19 Scenario of traffic from outside to the DMZ – Status on the Pix firewall after telnet to Router R5 “Telnet is no allowed to the dmz from outside”

20 Conclusion This lab project has shown an example of how to configure a stateful packet filter - Cisco PIX Firewall. The set up of the Cisco PIX firewall through the 3 security zones scheme is used today in complex networks and can provide an effective security protection for enterprise networks.


Download ppt "Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005."

Similar presentations


Ads by Google