Info
Imagen Topologia
Sobre
Implementacion Firewall ASA
Requerimientos
- Asignar direccionamiento IPv4 en las interfaces correspondiente de routers y firewall.
- Implementar seguridad de puerto dinámica, con máximo de dos direcciones MAC, y en caso de exceder la interfaz debe apagar.
- Interfaces que conectan a equipos finales implementar mecanismos de estabilización de STP.
- Implementar solución de DHCP Snooping, donde equipos finales no pidan más de 3 IP.
- Crear las zonas en Firewall, con prioridades a elección.
- Firewall debe asignar DHCP a VLAN1.
- Modificar MPF para permitir la conectividad hacia zona outside.
- Crear un PAT en firewall para que red LAN de VLAN1 salga por red 192.168.1.0/29.
- Crear un NAT estático para que DMZ salga por IP sobrante en red 192.168.1.0/29.
- Implementar protocolo estado de enlace, autenticando a nivel de interfaz.
- Realizar configuraciones para permitir llegar a Internet.
- Debe existir conectividad completa en la topologia.
Configuracion
Configuracion Dispositivos Finales
PC0
- IP: DHCP
SERVER
- IP: 172.16.20.20
- dec-mask: 255.255.255.0
- DG: 172.16.20.1
- DNS: 8.8.8.8
RA
enable
config t
hostname RA
int g0/0
ip address 192.168.1.2 255.255.255.248
no shut
exit
int s0/0/0
ip address 192.168.2.2 255.255.255.0
no shut
exit
router ospf 1
router-id 1.1.1.1
network 192.168.1.0 255.255.255.248 area 0
network 192.168.2.0 255.255.255.252 area 0
exit
int s0/0/0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 modopera
exit
BORDE
enable
config t
hostname BORDE
int s0/0/0
ip address 192.168.2.1 255.255.255.252
no shut
exit
int s0/0/1
ip address 200.0.0.1 255.255.255.252
no shut
exit
router ospf 1
router-id 2.2.2.2
network 192.168.2.0 255.255.255.252 area 0
default-information originate
exit
ip route 0.0.0.0 0.0.0.0 200.0.0.2
int s0/0/0
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 modopera
exit
ip access-list standard INTERNET
permit 192.168.1.0 0.0.0.7
exit
ip nat inside source list INTERNET int s0/0/1 overload
int s0/0/0
ip nat inside
exit
int s0/0/1
ip nat outside
exit
ISP
enable
config t
hostname ISP
int s0/0/1
ip address 200.0.0.2 255.255.255.252
no shut
exit
int loopback 0
ip address 8.8.8.8 255.255.255.255
no shut
exit
SWA
Nota: En esta topologia estos switch no llevan vlan
enable
config t
hostname SWA
int f0/10
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation shutdown
spanning-tree bpduguard enable
spanning-tree portfast
ip dhcp snooping limit rate 3
exit
SWB
Nota: No lleva ip
enable
config t
hostname SWB
int f0/1
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation shutdown
spanning-tree bpduguard enable
spanning-tree portfast
ip dhcp snooping limit rate 3
exit
ip dhcp snooping
ip dhcp snooping vlan 1
no ip dhcp snooping information option
int f0/18
ip dhcp snooping trust
exit
ASA
enable
!# Password: !# Enter with no password
config t
hostname ASA
enable password perita
domain-name www.duoc.cl
clock set 17:10:00 01 JUN 2024
no dhcpd address 192.168.1.5-192.168.1.36 inside
int vlan 1
nameif INSIDE
security-level 90
ip address 172.16.10.1 255.255.255.0
exit
int vlan 2
nameif OUTSIDE
security-level 8
ip address 192.168.1.1 255.255.255.248
exit
int vlan 3
no forward interface vlan 1
nameif DMZ
security-level 60
ip address 172.16.20.1 255.255.255.0
exit
!# revisar las interfaces con las vlan
do show switch vlan
!# int OUTSIDE
int e0/1
switchport access vlan 2
exit
int e0/4
switchport access vlan 3
exit
route OUTSIDE 0.0.0.0 0.0.0.0 192.168.1.2
dhcpd address 172.16.10.2-172.16.10.30 INSIDE
dhcpd dns 8.8.8.8 interface INSIDE
dhcpd enable INSIDE
exit
!# Implementar NAT
object network INTERNET
subnet 172.16.10.0 255.255.255.0
nat (INSIDE,OUTSIDE) dynamic interface
exit
config t
class-map inspection_default
match default-inspection-traffic
exit
policy-map global_policy
class inspection_default
inspect icmp
exit
service-policy global_policy global
!
object network DMZ
host 172.16.20.20
nat (DMZ,OUTSIDE) static 192.168.1.3
exit
config t
access-list DMZ permit ip any host 172.16.20.20
access-group DMZ in interface OUTSIDE
end
config t
username ASA password telnet
aaa authentication telnet console LOCAL
telnet 172.16.20.20 255.255.255.255 DMZ
telnet 172.16.10.0 255.255.255.0 INSIDE
telnet timeout 5
Visualizacion
PC0
Desde Desktop > Command Prompt
ping 192.168.1.2
Ver NAT desde ASA
show xlate
Probar telnet desde Server y PC0
telnet 172.16.10.1
!# Username: ASA
!# Password: telnet
enable
!# Password: perita