Cisco Secure Pix Firewall Administration Cspfa: Lab Manual
Cisco Secure Pix Firewall Administration Cspfa: Lab Manual
Cisco Secure Pix Firewall Administration Cspfa: Lab Manual
CSPFA
Lab Manual
Developed by:
ESPpix> ena
Password: ****
Note!!! Enable password can not be removed but we can recover it from TFTP server
(PASSWORD RECOVERY).
Telnet password can be set and clear in both privilege and configuration mode.
ESPpix# config t
ESPpix(config)# passwd pix
ESPpix# sh passwd
passwd H8FagjK1gVCNRzBO encrypted
ESPpix# conf t
ESPpix(config)#Telnet 10.0.0.1 [netmask]
Note!!!! Enable you to specify which host can access the pix firewall console via
telnet.
ESPpix(config)#kill [telnet-id]
Note!!!!! It enable you to view which ip address are currently accessing the pix.
ESPpix# sh int e1
interface ethernet1 "inside" is admi
Hardware is i82559 ethernet, address is 0008.a34d.7499 (cable is attached)
IP address 10.1.3.1, subnet mask 255.0.0.0
MTU 1500 bytes, BW 10000 Kbit full duplex
ESPpix(config)# sh int e1
interface ethernet1 "inside" is up, line protocol is up
Hardware is i82559 ethernet, address is 0008.a34d.7499
IP address 10.0.0.1, subnet mask 255.0.0.0
MTU 1500 bytes, BW 10000 Kbit full duplex
ESPpix(config)# sh int e0
interface ethernet0 "outside" is up, line protocol is down
Hardware is i82559 ethernet, address is 0008.a34d.7497
IP address 20.0.0.1, subnet mask 255.0.0.0
MTU 1500 bytes, BW 10000 Kbit half duplex
ESPpix#
ESPpix# conf t
ESPpix(config)# hostname ESPpix
ESPpix(config)# exit
ESPpix# sh nameif
nameif ethernet0 outside security0
nameif ethernet1 inside security100
ESPpix # conf t
ESPpix(config)# nameif e0 remote 0
ESPpix (config)# nameif e1 local 100
Error!
security 100 is reserved for the "inside" interface
Type help or '?' for a list of available commands.
ESPpix# sh nameif
ESPpix# sh int e0
ESPpix # conf t
ESPpix(config)# no nameif
ESPpix(config)# exit
ESPpix# conf t
ESPpix(config)# clock set 14:15:05 aug 14 2002
ESPpix(config)# exit
ESPpix # sh clock
14:15:13 Aug 14 2002
ESPpix# ping 10.0.0.1
OR
Building configuration...
: Saved
:
PIX Version 6.1(1)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 0YvvkDz2sdCxrJJB encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname ESPpix
names
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
mtu outside 1500
mtu inside 1500
ip address outside 20.0.0.1 255.0.0.0
ip address inside 10.0.0.1 255.0.0.0
ip audit info action alarm
[OK]
Building configuration...
Cryptochecksum: 8b14435d fdfe0df4 7427e2a0 d180be47
[OK]
ESPpix(config)# sh int e1
ESPpix(config)# sh int e0
Rebooting....
Cisco Secure PIX Firewall BIOS (4.2) #6: Mon Aug 27 15:09:54 PDT 2001
Platform PIX-501
Flash=E28F640J3 @ 0x3000000
-----------------------------------------------------------------------
|| ||
|| ||
|||| ||||
..:||||||:..:||||||:..
ciscoSystems
Private Internet eXchange
-----------------------------------------------------------------------
Cisco PIX Firewall
Licensed Features:
Failover: Disabled
VPN-DES: Enabled
VPN-3DES: Enabled
Maximum Interfaces: 2
Cut-through Proxy: Enabled
Guards: Enabled
Cannot select private keyType help or '?' for a list of available commands.
ESPpix#show history
ESPpix#show memory
ESPpix#show version
ESPpix#show xlate
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 10.0.0.1:
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 10.0.0.1:
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 10.0.0.1:
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
Windows 98 Operating System
PIX IOS V6.2
File Name: pix622.bin
PIXFirewall Configuration:
Esppix(config)# ip address inside 10.0.0.10 255.0.0.0
Esppix(config)# ip address outside 20.0.0.10 255.0.0.0
Esppix(config)# int e1 10full
Esppix(config)# int e0 10full
Esppix(config)# nat (inside) 1 10.0.0.0. 255.0.0.0
Esppix(config)# global (outside) 1 interface e0
Esppix(config)# conduit permit icmp any any
At Machine 10.0.0.1:
Go the Command Prompt & type “ping 20.0.0.4” OR
Can browse to web server of and type 20.0.0.4
Repeat same procedure on the Machine 10.0.0.2 & verify result
Verification Commands:
Esppix(config)# debug icmp trace
Esppix(config)# show global
Esppix(config)# show nat
Esppix(config)# show xlate
Esppix(config)# show conduit
10.0.0.10 20.0.0.10
Temporary E1 E0
WWW
Server
20.0.0.4
10.0.0.1
10.0.0.2
20.0.0.60
Translated
Local
Address
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 20.0.0.4:
Go to Internet Explorer & browse to the http://20.0.0.60 & the pix will directs you to the
temporary webserver.
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
Windows 98 Operating System
PIX IOS V6.2
PIX IOS filename “pix622.bin”
PIXFirewall Configuration:
ESPpix(config)# ip address inside 10.0.0.10 255.0.0.0
ESPpix(config)# ip address outside 20.0.0.10 255.0.0.0
ESPpix(config)# int e1 10full
ESPpix(config)# int e0 10full
ESPpix(config)# nat (inside) 0 10.0.0.1 255.0.0.0
ESPpix(config)# conduit permit icmp any any
At Machine 10.0.0.1:
Go the Command Prompt & type “ping 20.0.0.4” OR
Can browse to web server of and type 20.0.0.4
Repeat same procedure on the Machine 10.0.0.2 & verify result
Verification Commands:
ESPpix(config)# debug icmp trace
ESPpix(config)# show nat
ESPpix(config)# show global
ESPpix(config)# show xlate
ESPpix(config)# show conduit
PC A
10.0.0.51 10.0.0.10
to E1
10.0.0.60
PC B
REQUIREMENTS:
PIXFirewall Configuration:
Go to the command prompt & type a command “ipconfig /release” it will release the
current IP address & type “ipconfig /renew” and type “ipconfig” again it will show you
the IP address which you will get from the DHCP server.
Repeat same procedure on Machine PCB & verify results.
Verification Commands:
DHCP Server
E0
20.0.0.4
20.0.0.51
to
20.0.0.60
PIXFirewall Configuration:
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
Syslog
Server
20.0.0.4
10.0.0.1
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
At PIXFirewall:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
PIXFirewall Configuration:
Esppix(config)# ip address inside 10.0.0.10 255.0.0.0
Esppix(config)# ip address outside 20.0.0.10 255.0.0.0
Esppix(config)# int e0 10baset
Esppix(config)# int e1 10full
Esppix(config)# outbound 1 permit 10.0.0.1 255.255.255.255 http
Esppix(config)# outbound 1 deny 10.0.0.2 255.255.255.255 http
Esppix(config)# apply (inside) 1 outgoing_src
OR
Esppix(config)# outbound 1 permit 20.0.0.4 255.255.255.255 http
Esppix(config)# apply (inside) 1 outgoing_dest
At Machine 10.0.0.1:
Go to Internet Explorer & type address “20.0.0.4” in Address bar & repeat same procedure on Machine
10.0.0.2
Verification Commands:
Esppix(config)# sh apply
Esppix(config)# sh outbound
Esppix(config)# clear outbound
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Local
WWW
Server
PIXFirewall Configuration:
At Machine 10.0.0.1:
Go to the Internet Explorer and type and type “20.0.0.4” in address bar
Repeat same procedure on Machine 10.0.0.2 & verify result.
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
AAA
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 10.0.0.1
Go to the command prompt & ping the inside interface which is “ping 10.0.0.10”
& at machine 20.0.0.4 repeat same procedure & type “ping 20.0.0.10”
Verification Command:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
AAA
Server
REQUIREMENTS:
Windows 98 Operating System
PIX IOS V6.2, 500 Series
IOS file name “pix622.bin”
Putty Software
PIXFirewall Configuration:
ESPpix(config)# ip address inside 10.0.0.10 255.0.0.0
ESPpix(config)# ip address outside 20.0.0.10 255.0.0.0
ESPpix(config)# int e1 10full
ESPpix(config)# int e0 10full
ESPpix(config)# domain-name esp.com
ESPpix(config)# ca generate rsa key 1024
ESPpix(config)# ssh 10.0.0.1 inside
ESPpix(config)# ssh 20.0.0.4 255.255.255.255 outside
Verification Commands:
Or if you want secure shell from outside interface you have to specify the outbound
interface which is 20.0.0.10 in the hostname parameter of Putty
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
Requirements:
PIXFirewall Configuration:
Filter Java
ESPpix(config)# filter java 80 0 0 0 0
Filter ActiveX
ESPpix(config)# filter activex 80 0 0 0 0
At Machine 10.0.0.1:
Go to the Internet Explorer and type and type “20.0.0.4” in address bar
Repeat same procedure on Machine 10.0.0.2 & verify result.
(Used to mark up or to fix drawbacks in the existing protocol going from inside to outside)
10.0.0.10 20.0.0.10
20.0.0.1
10.0.0.1
HTTP
Server
E1 E0
20.0.0.2
FTP
Server
HTTP FIXUP
ESPpix(config)# no fixup protocol http 80
Still you can view the web site
ESPpix(config)# fixup protocol http 8080
You can view the website that is either
running on port 80 or 8080
FTP FIXUP
ESPpix(config)# no fixup protocol ftp 21
Now you are unable to view the ftp site
ESPpix(config)# fixup protocol ftp 2021
Now you are able to view the ftp site at port
2021
H.323 FIXUP
ESPpix(config)# no fixup protocol h323 1720
Still you can call on NetMeeting
10.0.0.10 20.0.0.10
E1 E0
20.0.0.1
20.0.0.50
10.0.0.1
20.0.0.2
FTP
Server
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 20.0.0.1:
Go to the Internet Explorer & browse to “ftp://20.0.0.50” & copy the folder to the local
hard disk & at the same time go to Machine 20.0.0.2 & browse to the “ftp://20.0.0.5”
after some interval of time it will unable to retrieve the desired page.
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.1
20.0.0.2
REQUIREMENTS:
PIXFirewall Configuration:
At Machine 20.0.0.4:
Go to command prompt & type “ping 20.0.0.10” or you can ping to the internal host also
& see the logging messages on the Syslog Server.
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
AAA
Server
20.0.0.4
10.0.0.1
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
Pixfirewall Configuration:
At Machine 10.0.0.1:
Verification Commands:
Esppix(config)# sh uauth
Esppix(config)# clear uauth
Esppix(config)# clear aaa-server
10.0.0.10 20.0.0.10
E1 E0
AAA
Server
20.0.0.4
10.0.0.1
10.0.0.2
Remote
WWW
Server
Local
WWW
Server
Pixfirewall Configuration:
First go to the web browser and type 20.0.0.8 and provide the right username and
password.
Go to the command prompt and type ‘telnet 20.0.0.9’, you will be prompted for username
and password, provide it and the message will come ‘Authentication Successful’
Verification Commands:
Esppix(config)# sh aaa
Esppix(config)# sh aaa-server
Esppix(config)# sh uauth
Esppix(config)# sh virtual
Outside E0
11.0.0.1 11.0.0.2
PIX Firewall Router ESPA
PIXFirewall Configuration:-
ESPA Configuration:
Key:
ESPA(config)#crypto isakmp key cisco123 address 11.0.0.1
ESPA(config)#int e0
ESPA(config-if)# crypto map ESPAmap
Verification Commands:
Certificate Authority
Server
10.0.0.10
E0
PIX Firewall
Computer
10.0.0.1
REQUIREMENTS:
PIXFirewall Configuration:
Verification Commands:
10.0.0.1
10.0.0.10
E1
TFTP
Server
PIXFirewall Configuration:
Monitor> interface 1
Monitor> address 10.0.0.10
Monitor> server 10.0.0.1
Monitor> file np61.bin
Monitor> ping 10.0.0.1
Monitor> tftp
10.0.0.1
10.0.0.10
E1
TFTP
Server
PIXFirewall Configuration:
PIXFirewall Configuration:
ESPpix(config)# ip address inside 10.0.0.10 255.0.0.0
ESPpix(config)# int e1 10baset
ESPpix(config)# copy tftp flash:pdm
ESPpix(config)# sh ver
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
ICMP-Type:
Go to command prompt and type ‘ping 20.0.0.4’ and repeat same procedure at machine
20.0.0.4 and type ‘ping 20.0.0.1’
Network-Type:
At Machine 20.0.0.4:
Go to the Internet Explorer and type “ftp://20.0.0.21” in address bar the ftp site brings up
to the screen but if you want to access another server or another service at the same
server, you can’t have such permissions.
Protocol-Type:
At Machine 20.0.0.4:
This object-group only allow traffic of tcp and udp but not others like ICMP for outside
users.
Service-Type:
This object group permit the outside users to access only http service and if they have
port range from 1024 65535
Verification Commands:
10.0.0.10 20.0.0.10
E1 E0
10.0.0.1
20.0.0.4
10.0.0.2
Local
WWW
Server
REQUIREMENTS:
PIXFirewall Configuration:
Esppix(config)# http server enable
Esppix(config)# http 10.0.0.1
At Machine 20.0.0.4: