Lab - Ccna Security
Lab - Ccna Security
Lab - Ccna Security
Network Devices need to be accurately synchronized with a reliable time source such as an
NTP server. It is very important as we want to be confirmed that logging information and
timestamps have the accurate time and date.
The router can be updated and synchronized with a public NTP server. This will ensure the
router's time is constantly synchronized, however it will not act as an NTP server for internal
hosts. The Internal hosts can be synchronized with the router.
Be noted that, here loopback adapter is accessible to Internet through our Ethernet LAN Card
of Local host. So that NTP Server can be updated with the server located in the Internet.
Follow this step before go to the GNS3 –
Find your host Ethernet Adapter > Right click on it > Properties
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Check as follows, select your Loopback Adapter. Here I have renamed it to Virtual Adapter. At
the end I will show you how to add Loopback Adapter in your PC.
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Finally mark the IP Address of your Loopback Adapter. It will be the default Gateway for your
Routers stated as below figure on GNS3 !
Device Manager > right Click on your PC (Here Ashish-PC) > Add legacy Hardware
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Click Next
Click Next
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Wait for a bit. A window will comes, from here select Microsoft from left Pannel and select
Microsoft loopback Adapter from the right panel as shown in figure
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Click next
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
A brief discussion:
Domain-lookup will allow the Cisco to resolve domains, ip domain-lookup command to enable
DNS host name-to-IP address translation.
Here 8.8.8.8 takes care of internet resolving. Name server is to define the DNS to query for
unknown host.
At this state any DNS request will be forwarded to 8.8.8.8 and the Cisco will act as the
"middle man" between the client and the DNS.
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
There is a nice way to use a Cisco as a DNS server. This is the way to save some money
without the need for additional devices.
Verification
Configuration on R2
R2#conf t
R2(config)#interface fastEthernet 0/1
R2(config-if)#ip address 172.16.10.2 255.255.255.0
R2(config-if)#no shutdown
OSPF Configuration on R1
R1(config)#router ospf 1
R1(config-router)#network 172.16.10.0 0.0.0.255 area 0
R1(config-router)#default-information originate
R1(config-router)#end
Here, the OSPF router does not, by default, generate a default route into the OSPF domain. In
order for OSPF to generate a default route, you must use the default-information originate
command.
Configure NAT on R1 Router so that R2 Router can be connected with the Internet
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Verification
Apply ping to Google to ensure that the R2 is connected to the Internet
NTP Configuration
First we will check the time on R1 Router
R1#show clock detail
*00:18:45.843 UTC Fri Mar 1 2002
No time source
A stratum 2 device because it’s one NTP hop further away from the source.
R1(config)#ntp server pool.ntp.org
Translating "pool.ntp.org"...domain server (8.8.8.8) [OK]
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
We can see that R1 time is synchronized with the Internet NTP Server
Apply show ntp associations on R1 and verify
Configuration on R2
Here we call the R1 as a NTP Server which will synchronized with Local Router (R2)
R2(config)#ntp server 172.16.10.1
R2(config)#exit
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
AUTHENTICATION
Authentication is used to prevent tampering with the timestamps on the logs generated by
devices. To implement an attack on NTP, a hacker would make their rogue host appear to be
a valid NTP server.
R1(config)# ntp authenticate
R1(config)# ntp authentication-key 1 md5 cisco123
R1(config)# ntp trusted-key 1
Parameters
Key-id
Md5 md5-string
Specifies a string for the MD5 message-digest algorithm. The string can be a maximum of 15
ASCII characters.
Ntp trusted-key: An additional subset of trusted keys which can be used for NTP authentication.
I have used
JavaJDK 6
Run as an Administrator
Edit
Preferences
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Click on QEMU > Check mark on Use the local server > OK
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Browse the Image File (Keep the image file other than C Drive)
Select as following
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Click on “No”
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Drag and drop the ASA in the right panel > clikc on Start button (green arrow)
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Now we need to activate the ASA. So follow the commands and Enter Activation Key as
following steps
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
After Reload the following will appear. Now ASA is ready for working!!
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Now try to ping your computers Loopback IP from the ASA and also from your PC to
ASA to verify if it is successful
Download ASDM ( asdm-649.bin)
Install a TFTP server in your local PC and keep the above file in its root directory.
Now upload the asdm-649.bin to the ASA flash using the below commands:
Accessing tftp://192.168.10.1/asdm-
649.bin…!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Enter the commands to load ASDM on the ASA and enable http server:
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Click on ‘Run ASDM’ and enter with the username and password.
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
The following are the security levels used on the Cisco ASA:
The highest possible level and most trusted, it is used by the inside interface by default.
Security level 0
The lowest possible level, most untrusted, it’s used by the outside interface by default.
Can be assigned to any other interface on the ASA. The inside is typically 100, the outside is
0, and the dmz interface is 50.
An interface with a high security level can access an interface with a low security level but
the other way around is not possible unless we configure an access-list.
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
ciscoasa# conf t
Venus(config-if)# exit
Venus(config-if)# no shutdown
Venus(config-if)# exit
Venus(config-if)# security-level 50
Venus(config-if)# ip address 172.16.10.1 255.255.255.0
Venus(config-if)# no shutdown
Venus(config-if)#
Router Configuration
R1#conf t
R1(config)#hostname ISP
ISP(config-if)#exit
Now we will assign IP to all PCs and apply ping from ASA to all Hosts as follows :
!!!!!
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
!!!!!
By default ping is disabled from Inside to Outside, we will create an ACL to permit ICMP
from Inside to outside
Not Successful..right? Actually we never allow outside users to allow ICMP to inside hosts
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
The ASA supports remote administration trough SSH and Telnet. Telnet was designed to work
within a private network and not across a public network where threats can appear. Because
of this, all the data is transmitted in plain text, including passwords. This is a major security
issue and the developers of SSH used encryptions to make it harder for other people to sniff
the password and other relevant information.
Secure Shell (SSH) is a protocol which provides a secure remote access connection to network
devices. Communication between the client and server is encrypted in SSH.
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
There are two versions: version 1 and 2. Version 2 is more secure and commonly used.
Step 1: Create a username and password to manage the ASA with SSH/Telnet/ASDM
Step2: Enable SSH to generate a key, it will encrypt the traffic between the user and the ASA
Step 3:Use the username previously created to connect to the ASA with SSH
Step 5: Enable ASDM for GUI and define the IP addresses that are allowed to connect to the
ASA with ASDM
Verification:
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
2. Verify SSH Access from Outside Host, So we will open putty from our Desktop
The name of the RSA keypair will be the hostname and domain name of the router.
ISP(config)#hostname ISPRouter
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Key sizes of 1024 or smaller should be avoided. Larger key sizes take longer time to calculate
and enhance more security
ISPRouter(config)#aaa new-model
ISPRouter(config)#line vty 0 5
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
Contents
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
LAB 6: Configure routers to use Cisco Access Control Server (ACS) and TACACs+ Authentication ---------35
LAB 19: Static NAT to Multiple Service on same Outside IP Address such as HTTP, HTTPS, TELNET, SSH ...-
----------------------------------------------------------------------------------------------------------------------------------..115
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved
CCNA SECURITY LAB GUIDE
LAB 31: IPSec SITE-TO-SITE VPN BETWEEN TWO CISCO ROUTER ------------------------------------------------- 190
LAB 32: Clientless SSL VPN Remote Access (using a web browser) -----------------------------------------------195
LAB 33: SSL or IPsec (IKEv2) VPN Remote Access (using Cisco AnyConnect client)--------------------------- 211
Ashish Halder (CCNA RnS, CCNP RnS, CCNA Sec, CCNP Sec, CCIE Sec-written), All rights are reserved