SlideShare a Scribd company logo
08- IOS Firewall Fundamentals 
Ahmed Sultan 
CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH 
© 2009 Cisco Learning Institute. 1
ACL Topology and Types 
© 2009 Cisco Learning Institute. 2
Standard Numbered IP ACLs 
Router(config)# access-list {1-99} {permit | deny} 
source-addr [source-mask] 
• The first value specifies the ACL number 
• The second value specifies whether to permit or deny the configured 
source IP address traffic 
• The third value is the source IP address that must be matched 
• The fourth value is the wildcard mask to be applied to the previously 
configured IP address to indicate the range 
• All ACLs assume an implicit deny statement at the end of the ACL6+ 
• At least one permit statement should be included or all traffic will be 
dropped once that ACL is applied to an interface 
© 2009 Cisco Learning Institute. 3
Extended Numbered IP ACLs 
Router(config)# access-list {100-199} {permit | deny} 
protocol source-addr [source-mask] [operator operand] 
destination-addr [destination-mask] [operator operand] 
[established] 
• The first value specifies the ACL number 
• The second value specifies whether to permit or deny accordingly 
• The third value indicates protocol type 
• The source IP address and wildcard mask determine where traffic 
originates. The destination IP address and wildcard mask are used 
to indicate the final destination of the network traffic 
• The command to apply the standard or extended numbered ACL: 
Router(config-if)# ip access-group number {in | out} 
© 2009 Cisco Learning Institute. 4
Named IP ACLs 
Router(config)# ip access-list extended vachon1 
Router(config-ext-nacl)# deny ip any 200.1.2.10 
0.0.0.1 
Router(config-ext-nacl)# permit tcp any host 
200.1.1.11 eq 80 
Router(config-ext-nacl)# permit tcp any host 
200.1.1.10 eq 25 
Router(config-ext-nacl)# permit tcp any eq 25 host 
200.1.1.10 any established 
Router(config-ext-nacl)# permit tcp any 200.1.2.0 
0.0.0.255 established 
Router(config-ext-nacl)# permit udp any eq 53 
200.1.2.0 0.0.0.255 
Router(config-ext-nacl)# deny ip any any 
Router(config-ext-nacl)# interface ethernet 1 
Router(config-if)# ip access-group vachon1 in 
Router(config-if)# exit 
Standard 
Extended 
© 2009 Cisco Learning Institute. 5
Applying Standard ACLs 
Use a standard ACL to block all traffic from 
172.16.4.0/24 network, but allow all other traffic. 
r1 
R1(config)# access-list 1 deny 
172.16.4.0 0.0.0.255 
R1(config)# access-list 1 permit any 
R1(config)# interface ethernet 0 
R1(config-if)# ip access-group 1 out 
© 2009 Cisco Learning Institute. 6
Applying Extended ACLs 
Use an extended ACL to block all FTP traffic from 
172.16.4.0/24 network, but allow all other traffic. 
r1 
R1(config)# access-list 101 deny tcp 172.16.4.0 
0.0.0.255 172.16.3.0 0.0.0.255 eq 21 
R1(config)# access-list 101 deny tcp 172.16.4.0 
0.0.0.255 172.16.3.0 0.0.0.255 eq 20 
R1(config)# access-list 101 permit ip any any 
© 2009 Cisco Learning Institute. 7
Attacks Mitigated 
ACLs can be used to: 
• Mitigate IP address spoofing—inbound/outbound 
• Mitigate Denial of service (DoS) TCP synchronizes (SYN) attacks— 
blocking external attacks 
• Mitigate DoS TCP SYN attacks—using TCP intercept 
• Mitigate DoS smurf attacks 
• Filter Internet Control Message Protocol (ICMP) messages—inbound 
• Filter ICMP messages—outbound 
• Filter traceroute 
© 2009 Cisco Learning Institute. 8
Inbound 
CLI Commands 
R1(config)#access-list 150 deny ip 0.0.0.0 0.255.255.255 any 
R1(config)#access-list 150 deny ip 10.0.0.0 0.255.255.255 any 
R1(config)#access-list 150 deny ip 127.0.0.0 0.255.255.255 any 
R1(config)#access-list 150 deny ip 172.16.0.0 0.15.255.255 any 
R1(config)#access-list 150 deny ip 192.168.0.0 0.0.255.255 any 
R1(config)#access-list 150 deny ip 224.0.0.0 15.255.255.255 any 
R1(config)#access-list 150 deny ip host 255.255.255.255 any 
Outbound 
R1(config)#access-list 105 permit ip 192.168.1.0 0.0.0.255 any 
© 2009 Cisco Learning Institute. 9
Allowing Common Services 
R1 
Internet 
Serial 0/0/0 
F0/0 
R1 
DNS, SMTP, FTP 
192.168.20.2/24 
F0/1 
PC A 
200.5.5.5/24 
R1(config)#access-list 122 permit udp any host 192.168.20.2 eq domain 
R1(config)#access-list 122 permit tcp any host 192.168.20.2 eq smtp 
R1(config)#access-list 122 permit tcp any host 192.168.20.2 eq ftp 
R1(config)#access-list 180 permit tcp host 200.5.5.5 host 10.0.1.1 eq telnet 
R1(config)#access-list 180 permit tcp host 200.5.5.5 host 10.0.1.1 eq 22 
R1(config)#access-list 180 permit udp host 200.5.5.5 host 10.0.1.1 eq syslog 
R1(config)#access-list 180 permit udp host 200.5.5.5 host 10.0.1.1 eq snmptrap 
© 2009 Cisco Learning Institute. 10
Controlling ICMP Messages 
200.5.5.5/24 
Inbound on S0/0/0 
R1 
Internet 
Serial 0/0/0 
F0/0 
R1 
192.168.20.2/24 
F0/1 
PC A 
R1(config)#access-list 112 permit icmp any any echo-reply 
R1(config)#access-list 112 permit icmp any any source-quench 
R1(config)#access-list 112 permit icmp any any unreachable 
R1(config)#access-list 112 deny icmp any any 
Outbound on S0/0/0 
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any echo 
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any parameter-problem 
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any packet-too-big 
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any source-quench 
© 2009 Cisco Learning Institute. 11
Firewalls 
• A firewall is a system that enforces an access 
control policy between network 
• Common properties of firewalls: 
- The firewall is resistant to attacks 
- The firewall is the only transit point between networks 
- The firewall enforces the access control policy 
© 2009 Cisco Learning Institute. 12
Benefits of Firewalls 
• Prevents exposing sensitive 
hosts and applications to 
untrusted users 
• Prevent the exploitation of 
protocol flaws by sanitizing the 
protocol flow 
• Firewalls prevent malicious 
data from being sent to servers 
and clients. 
• Properly configured firewalls 
make security policy 
enforcement simple, scalable, 
and robust. 
• A firewall reduces the 
complexity of security 
management by offloading 
most of the network access 
control to a couple of points in 
the network. 
© 2009 Cisco Learning Institute. 13
Types of Filtering Firewalls 
• Packet-filtering firewall—is typically a router that has the capability to 
filter on some of the contents of packets (examines Layer 3 and 
sometimes Layer 4 information) 
• Stateful firewall—keeps track of the state of a connection: whether 
the connection is in an initiation, data transfer, or termination state 
• Application gateway firewall (proxy firewall) —filters information at 
Layers 3, 4, 5, and 7. Firewall control and filtering done in software. 
• Address-translation firewall—expands the number of IP addresses 
available and hides network addressing design. 
© 2009 Cisco Learning Institute. 14
Types of Filtering Firewalls 
• Host-based (server and personal) firewall—a PC or server with 
firewall software running on it. 
• Transparent firewall—filters IP traffic between a pair of bridged 
interfaces. 
• Hybrid firewalls—some combination of the above firewalls. For 
example, an application inspection firewall combines a stateful 
firewall with an application gateway firewall. 
© 2009 Cisco Learning Institute. 15
Packet-Filtering Firewall 
• Are based on simple permit or deny rule set 
• Have a low impact on network performance 
• Are easy to implement 
• Are supported by most routers 
• Afford an initial degree of security at a low 
network layer 
• Perform 90% of what higher-end firewalls do, at 
a much lower cost 
© 2009 Cisco Learning Institute. 16
Stateful Firewall 
10.1.1.1 200.3.3.3 
source port 1500 destination port 80 
Inside ACL 
(Outgoing Traffic) 
Outside ACL 
(Incoming Traffic) 
permit ip 10.0.0.0 0.0.0.255 any 
Dynamic: permit tcp host 200.3.3.3 
eq 80 host 10.1.1.1 eq 1500 
permit tcp any host 10.1.1.2 eq 25 
permit udp any host 10.1.1.2 eq 53 
deny ip any any 
© 2009 Cisco Learning Institute. 17
Cisco Systems Firewall Solutions 
• IOS Firewall 
–Zone-based policy framework for intuitive management 
–Instant messenger and peer-to-peer application filtering 
–VoIP protocol firewalling 
–Virtual routing and forwarding (VRF) firewalling 
–Wireless integration 
–Stateful failover 
–Local URL whitelist and blacklist support 
–Application inspection for web and e-mail traffic 
• PIX 500 Series 
• ASA 5500 Series 
© 2009 Cisco Learning Institute. 18
Design with DMZ 
DMZ 
Public-DMZ 
Policy 
Private-DMZ 
DMZ-Private 
Policy 
Policy 
Trusted Untrusted 
Private-Public 
Policy 
Internet 
© 2009 Cisco Learning Institute. 19
CBAC Example 
© 2009 Cisco Learning Institute. 20
Configuration of CBAC 
Four Steps to Configure 
• Step 1: Pick an Interface 
• Step 2: Configure IP ACLs at the Interface 
• Step 3: Define Inspection Rules 
• Step 4: Apply an Inspection Rule to an Interface 
© 2009 Cisco Learning Institute. 21
Step 1: Pick an Interface 
Two-Interface 
Three-Interface 
© 2009 Cisco Learning Institute. 22
Step 2: Configure IP ACLs 
at the Interface 
© 2009 Cisco Learning Institute. 23
Step 3: Define Inspection Rules 
Router(config)# 
ip inspect name inspection_name protocol [alert {on | off}] [audit-trail 
{on | off}] [timeout seconds] 
© 2009 Cisco Learning Institute. 24
Step 4: Apply an Inspection Rule 
to an Interface 
© 2009 Cisco Learning Institute. 25
Zone Based Firewall 
Each zone holds only 
one interface. 
• If an additional interface is added to the private zone, the hosts 
connected to the new interface in the private zone can pass traffic to 
all hosts on the existing interface in the same zone. 
• Additionally, hosts connected to the new interface in the private zone 
must adhere to all existing “private” policies related to that zone when 
passing traffic to other zones. 
© 2009 Cisco Learning Institute. 26
Benefits 
Two Zones 
• Zone-based policy firewall is not dependent on ACLs 
• The router security posture is now “block unless explicitly allowed” 
• C3PL (Cisco Common Classification Policy Language) makes 
policies easy to read and troubleshoot 
• One policy affects any given traffic, instead of needing multiple 
ACLs and inspection actions. 
© 2009 Cisco Learning Institute. 27
Common Designs 
LAN-to-Internet Public Servers 
Redundant Firewalls Complex Firewall 
© 2009 Cisco Learning Institute. 28
Actions 
Inspect – This action configures Cisco IOS stateful packet inspection 
Drop – This action is analogous to deny in an ACL 
Pass – This action is analogous to permit in an ACL 
© 2009 Cisco Learning Institute. 29
Manually Implementing Zone-based 
Policy Firewall with CCP 
• Step 1: Define zones 
• Step 2: Configure class maps to describe traffic 
between zones 
• Step 3: Create policy maps to apply actions to 
the traffic of the class maps 
• Step 4: Define zone pairs and assign policy 
maps to the zone pairs 
© 2009 Cisco Learning Institute. 30
Implementing Zone-based Policy 
Firewall with CLI 
1. Create the zones for the firewall 
with the zone security 
command 
3. Specify firewall policies with 
the policy-map type 
inspect command 
2. Define traffic classes with the 
class-map type inspect 
command 
4. Apply firewall policies to pairs of 
source and destination zones with 
zone-pair security 
5. Assign router interfaces to zones using the zone-member security 
interface command 
© 2009 Cisco Learning Institute. 31
Step 1: Create the Zones 
FW(config)# zone security Inside 
FW(config-sec-zone)# description Inside network 
FW(config)# zone security Outside 
FW(config-sec-zone)# description Outside network 
© 2009 Cisco Learning Institute. 32
Step 2: Define Traffic Classes 
FW(config)# class-map type inspect FOREXAMPLE 
FW(config-cmap)# match access-group 101 
FW(config-cmap)# match protocol tcp 
FW(config-cmap)# match protocol udp 
FW(config-cmap)# match protocol icmp 
FW(config-cmap)# exit 
FW(config)# access-list 101 permit ip 10.0.0.0 
0.0.0.255 any 
© 2009 Cisco Learning Institute. 33
Step 3: Define Firewall Policies 
FW(config)# policy-map type inspect InsideToOutside 
FW(config-pmap)# class type inspect FOREXAMPLE 
FW(config-pmap-c)# inspect 
© 2009 Cisco Learning Institute. 34
Step 4: Assign Policy Maps to Zone Pairs 
and Assign Router Interfaces to Zones 
FW(config)# zone-pair security InsideToOutside source Inside 
destination Outside 
FW(config-sec-zone-pair)# description Internet Access 
FW(config-sec-zone-pair)# service-policy type inspect 
InsideToOutside 
FW(config-sec-zone-pair)# interface F0/0 
FW(config-if)# zone-member security Inside 
FW(config-if)# interface S0/0/0.100 point-to-point 
FW(config-if)# zone-member security Outside 
© 2009 Cisco Learning Institute. 35
CCNA Security 09- ios firewall fundamentals

More Related Content

PPT
CCNA Security 05- securing the management plane
PPT
CCNA Security 06- AAA
PPT
CCNA Security 012- cryptographic systems
PPTX
Cisco CCNA Security 210-260 Practice Exam
PDF
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
PPT
CCNA Security 011- implementing ios-based ips
PPT
CCNA Security 010-configuring cisco asa
PPT
CCNA Security - Chapter 3
CCNA Security 05- securing the management plane
CCNA Security 06- AAA
CCNA Security 012- cryptographic systems
Cisco CCNA Security 210-260 Practice Exam
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security 011- implementing ios-based ips
CCNA Security 010-configuring cisco asa
CCNA Security - Chapter 3

What's hot (19)

PPT
CCNA Security - Chapter 2
PPT
Chapter 3 overview
PPT
CCNA Security 07-Securing the local area network
PPT
CCNA Security - Chapter 4
PPTX
ASA Multiple Context Training
PPT
Chapter 2 overview
PPTX
Cisco ASA Firewalls
PPTX
Ccna security
PPT
Understanding and Troubleshooting ASA NAT
PDF
CCNP Security-VPN
PPT
Chapter 8 overview
PPT
Chapter 5 overview
DOCX
How to configure cisco asa virtual firewall
PPTX
Cisco asa cx firwewall
PDF
Brkcrt 1160 c3-rev2
PPTX
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
PDF
CCNP Security-Firewall
PPT
CCNA Security - Chapter 6
PPT
CCNA Security - Chapter 8
CCNA Security - Chapter 2
Chapter 3 overview
CCNA Security 07-Securing the local area network
CCNA Security - Chapter 4
ASA Multiple Context Training
Chapter 2 overview
Cisco ASA Firewalls
Ccna security
Understanding and Troubleshooting ASA NAT
CCNP Security-VPN
Chapter 8 overview
Chapter 5 overview
How to configure cisco asa virtual firewall
Cisco asa cx firwewall
Brkcrt 1160 c3-rev2
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
CCNP Security-Firewall
CCNA Security - Chapter 6
CCNA Security - Chapter 8
Ad

Viewers also liked (19)

PPTX
CCNA RS_ITN - Chapter 4
PPT
CCNA Discovery 1 - Chapter 4
PPT
CCNA Exploration 4 - Chapter 8
PPTX
CCNA RS_NB - Chapter 8
PPTX
VMware vShield - Overview
PPT
CCNA Exploration 4 - Chapter 7
PPT
CCNA Security - Chapter 7
PPT
CCNA Security - Chapter 9
PPT
CCNA Security - Chapter 5
PPTX
OSPF v3
PPT
ITE - Chapter 9
PPT
ITE - Chapter 7
PPT
ITE - Chapter 2
PPT
CCNA Discovery 1 - Chapter 1
PPT
CCNA Exploration 4 - Chapter 6
PPT
CCNA Exploration 2 - Chapter 11
PPT
CCNA Discovery 3 - Chapter 2
PPT
CCNA Discovery 3 - Chapter 1
PPT
CCNA Discovery 3 - Chapter 3
CCNA RS_ITN - Chapter 4
CCNA Discovery 1 - Chapter 4
CCNA Exploration 4 - Chapter 8
CCNA RS_NB - Chapter 8
VMware vShield - Overview
CCNA Exploration 4 - Chapter 7
CCNA Security - Chapter 7
CCNA Security - Chapter 9
CCNA Security - Chapter 5
OSPF v3
ITE - Chapter 9
ITE - Chapter 7
ITE - Chapter 2
CCNA Discovery 1 - Chapter 1
CCNA Exploration 4 - Chapter 6
CCNA Exploration 2 - Chapter 11
CCNA Discovery 3 - Chapter 2
CCNA Discovery 3 - Chapter 1
CCNA Discovery 3 - Chapter 3
Ad

Similar to CCNA Security 09- ios firewall fundamentals (20)

PDF
Ch4-Implementing Firewall Technologies.pdf
PPT
Chapter 4 overview
PPT
redes telematicas CISCO para ingenieros parte 2
PPTX
Ccna sv2 instructor_ppt_ch4
PPT
CCNA Discovery 3 - Chapter 8
PPT
CCNP 642-732 Training
PPTX
Guide to protecting networks - Eric Vanderburg
PPT
Firewall - Network Defense in Depth Firewalls
PPTX
CCNA3 Verson6 Chapter7
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PDF
CCNAv5 - S2: Chapter 9 Access Control Lists
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
PDF
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1 Instructor (1).pdf
PDF
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
PDF
4.1.1.10 packet tracer configuring extended ac ls scenario 1
PPT
Icnd210 s06l01
DOCX
A firewall is a network security device.
PPTX
CCNA_RSE_Chp7.pptx
PDF
5 ip security ipsec gre
PPTX
CNv6_instructorPPT_Chapter4.pptx
Ch4-Implementing Firewall Technologies.pdf
Chapter 4 overview
redes telematicas CISCO para ingenieros parte 2
Ccna sv2 instructor_ppt_ch4
CCNA Discovery 3 - Chapter 8
CCNP 642-732 Training
Guide to protecting networks - Eric Vanderburg
Firewall - Network Defense in Depth Firewalls
CCNA3 Verson6 Chapter7
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1 Instructor (1).pdf
4.1.1.10 Packet Tracer - Configuring Extended ACLs Scenario 1.pdf
4.1.1.10 packet tracer configuring extended ac ls scenario 1
Icnd210 s06l01
A firewall is a network security device.
CCNA_RSE_Chp7.pptx
5 ip security ipsec gre
CNv6_instructorPPT_Chapter4.pptx

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PPTX
Institutional Correction lecture only . . .
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharma ospi slides which help in ospi learning
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Anesthesia in Laparoscopic Surgery in India
O7-L3 Supply Chain Operations - ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
Basic Mud Logging Guide for educational purpose
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Institutional Correction lecture only . . .
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPH.pptx obstetrics and gynecology in nursing

CCNA Security 09- ios firewall fundamentals

  • 1. 08- IOS Firewall Fundamentals Ahmed Sultan CCNA | CCNA Security | CCNP Security | JNCIA-Junos | CEH © 2009 Cisco Learning Institute. 1
  • 2. ACL Topology and Types © 2009 Cisco Learning Institute. 2
  • 3. Standard Numbered IP ACLs Router(config)# access-list {1-99} {permit | deny} source-addr [source-mask] • The first value specifies the ACL number • The second value specifies whether to permit or deny the configured source IP address traffic • The third value is the source IP address that must be matched • The fourth value is the wildcard mask to be applied to the previously configured IP address to indicate the range • All ACLs assume an implicit deny statement at the end of the ACL6+ • At least one permit statement should be included or all traffic will be dropped once that ACL is applied to an interface © 2009 Cisco Learning Institute. 3
  • 4. Extended Numbered IP ACLs Router(config)# access-list {100-199} {permit | deny} protocol source-addr [source-mask] [operator operand] destination-addr [destination-mask] [operator operand] [established] • The first value specifies the ACL number • The second value specifies whether to permit or deny accordingly • The third value indicates protocol type • The source IP address and wildcard mask determine where traffic originates. The destination IP address and wildcard mask are used to indicate the final destination of the network traffic • The command to apply the standard or extended numbered ACL: Router(config-if)# ip access-group number {in | out} © 2009 Cisco Learning Institute. 4
  • 5. Named IP ACLs Router(config)# ip access-list extended vachon1 Router(config-ext-nacl)# deny ip any 200.1.2.10 0.0.0.1 Router(config-ext-nacl)# permit tcp any host 200.1.1.11 eq 80 Router(config-ext-nacl)# permit tcp any host 200.1.1.10 eq 25 Router(config-ext-nacl)# permit tcp any eq 25 host 200.1.1.10 any established Router(config-ext-nacl)# permit tcp any 200.1.2.0 0.0.0.255 established Router(config-ext-nacl)# permit udp any eq 53 200.1.2.0 0.0.0.255 Router(config-ext-nacl)# deny ip any any Router(config-ext-nacl)# interface ethernet 1 Router(config-if)# ip access-group vachon1 in Router(config-if)# exit Standard Extended © 2009 Cisco Learning Institute. 5
  • 6. Applying Standard ACLs Use a standard ACL to block all traffic from 172.16.4.0/24 network, but allow all other traffic. r1 R1(config)# access-list 1 deny 172.16.4.0 0.0.0.255 R1(config)# access-list 1 permit any R1(config)# interface ethernet 0 R1(config-if)# ip access-group 1 out © 2009 Cisco Learning Institute. 6
  • 7. Applying Extended ACLs Use an extended ACL to block all FTP traffic from 172.16.4.0/24 network, but allow all other traffic. r1 R1(config)# access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 R1(config)# access-list 101 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 R1(config)# access-list 101 permit ip any any © 2009 Cisco Learning Institute. 7
  • 8. Attacks Mitigated ACLs can be used to: • Mitigate IP address spoofing—inbound/outbound • Mitigate Denial of service (DoS) TCP synchronizes (SYN) attacks— blocking external attacks • Mitigate DoS TCP SYN attacks—using TCP intercept • Mitigate DoS smurf attacks • Filter Internet Control Message Protocol (ICMP) messages—inbound • Filter ICMP messages—outbound • Filter traceroute © 2009 Cisco Learning Institute. 8
  • 9. Inbound CLI Commands R1(config)#access-list 150 deny ip 0.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 10.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 127.0.0.0 0.255.255.255 any R1(config)#access-list 150 deny ip 172.16.0.0 0.15.255.255 any R1(config)#access-list 150 deny ip 192.168.0.0 0.0.255.255 any R1(config)#access-list 150 deny ip 224.0.0.0 15.255.255.255 any R1(config)#access-list 150 deny ip host 255.255.255.255 any Outbound R1(config)#access-list 105 permit ip 192.168.1.0 0.0.0.255 any © 2009 Cisco Learning Institute. 9
  • 10. Allowing Common Services R1 Internet Serial 0/0/0 F0/0 R1 DNS, SMTP, FTP 192.168.20.2/24 F0/1 PC A 200.5.5.5/24 R1(config)#access-list 122 permit udp any host 192.168.20.2 eq domain R1(config)#access-list 122 permit tcp any host 192.168.20.2 eq smtp R1(config)#access-list 122 permit tcp any host 192.168.20.2 eq ftp R1(config)#access-list 180 permit tcp host 200.5.5.5 host 10.0.1.1 eq telnet R1(config)#access-list 180 permit tcp host 200.5.5.5 host 10.0.1.1 eq 22 R1(config)#access-list 180 permit udp host 200.5.5.5 host 10.0.1.1 eq syslog R1(config)#access-list 180 permit udp host 200.5.5.5 host 10.0.1.1 eq snmptrap © 2009 Cisco Learning Institute. 10
  • 11. Controlling ICMP Messages 200.5.5.5/24 Inbound on S0/0/0 R1 Internet Serial 0/0/0 F0/0 R1 192.168.20.2/24 F0/1 PC A R1(config)#access-list 112 permit icmp any any echo-reply R1(config)#access-list 112 permit icmp any any source-quench R1(config)#access-list 112 permit icmp any any unreachable R1(config)#access-list 112 deny icmp any any Outbound on S0/0/0 R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any echo R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any parameter-problem R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any packet-too-big R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any source-quench © 2009 Cisco Learning Institute. 11
  • 12. Firewalls • A firewall is a system that enforces an access control policy between network • Common properties of firewalls: - The firewall is resistant to attacks - The firewall is the only transit point between networks - The firewall enforces the access control policy © 2009 Cisco Learning Institute. 12
  • 13. Benefits of Firewalls • Prevents exposing sensitive hosts and applications to untrusted users • Prevent the exploitation of protocol flaws by sanitizing the protocol flow • Firewalls prevent malicious data from being sent to servers and clients. • Properly configured firewalls make security policy enforcement simple, scalable, and robust. • A firewall reduces the complexity of security management by offloading most of the network access control to a couple of points in the network. © 2009 Cisco Learning Institute. 13
  • 14. Types of Filtering Firewalls • Packet-filtering firewall—is typically a router that has the capability to filter on some of the contents of packets (examines Layer 3 and sometimes Layer 4 information) • Stateful firewall—keeps track of the state of a connection: whether the connection is in an initiation, data transfer, or termination state • Application gateway firewall (proxy firewall) —filters information at Layers 3, 4, 5, and 7. Firewall control and filtering done in software. • Address-translation firewall—expands the number of IP addresses available and hides network addressing design. © 2009 Cisco Learning Institute. 14
  • 15. Types of Filtering Firewalls • Host-based (server and personal) firewall—a PC or server with firewall software running on it. • Transparent firewall—filters IP traffic between a pair of bridged interfaces. • Hybrid firewalls—some combination of the above firewalls. For example, an application inspection firewall combines a stateful firewall with an application gateway firewall. © 2009 Cisco Learning Institute. 15
  • 16. Packet-Filtering Firewall • Are based on simple permit or deny rule set • Have a low impact on network performance • Are easy to implement • Are supported by most routers • Afford an initial degree of security at a low network layer • Perform 90% of what higher-end firewalls do, at a much lower cost © 2009 Cisco Learning Institute. 16
  • 17. Stateful Firewall 10.1.1.1 200.3.3.3 source port 1500 destination port 80 Inside ACL (Outgoing Traffic) Outside ACL (Incoming Traffic) permit ip 10.0.0.0 0.0.0.255 any Dynamic: permit tcp host 200.3.3.3 eq 80 host 10.1.1.1 eq 1500 permit tcp any host 10.1.1.2 eq 25 permit udp any host 10.1.1.2 eq 53 deny ip any any © 2009 Cisco Learning Institute. 17
  • 18. Cisco Systems Firewall Solutions • IOS Firewall –Zone-based policy framework for intuitive management –Instant messenger and peer-to-peer application filtering –VoIP protocol firewalling –Virtual routing and forwarding (VRF) firewalling –Wireless integration –Stateful failover –Local URL whitelist and blacklist support –Application inspection for web and e-mail traffic • PIX 500 Series • ASA 5500 Series © 2009 Cisco Learning Institute. 18
  • 19. Design with DMZ DMZ Public-DMZ Policy Private-DMZ DMZ-Private Policy Policy Trusted Untrusted Private-Public Policy Internet © 2009 Cisco Learning Institute. 19
  • 20. CBAC Example © 2009 Cisco Learning Institute. 20
  • 21. Configuration of CBAC Four Steps to Configure • Step 1: Pick an Interface • Step 2: Configure IP ACLs at the Interface • Step 3: Define Inspection Rules • Step 4: Apply an Inspection Rule to an Interface © 2009 Cisco Learning Institute. 21
  • 22. Step 1: Pick an Interface Two-Interface Three-Interface © 2009 Cisco Learning Institute. 22
  • 23. Step 2: Configure IP ACLs at the Interface © 2009 Cisco Learning Institute. 23
  • 24. Step 3: Define Inspection Rules Router(config)# ip inspect name inspection_name protocol [alert {on | off}] [audit-trail {on | off}] [timeout seconds] © 2009 Cisco Learning Institute. 24
  • 25. Step 4: Apply an Inspection Rule to an Interface © 2009 Cisco Learning Institute. 25
  • 26. Zone Based Firewall Each zone holds only one interface. • If an additional interface is added to the private zone, the hosts connected to the new interface in the private zone can pass traffic to all hosts on the existing interface in the same zone. • Additionally, hosts connected to the new interface in the private zone must adhere to all existing “private” policies related to that zone when passing traffic to other zones. © 2009 Cisco Learning Institute. 26
  • 27. Benefits Two Zones • Zone-based policy firewall is not dependent on ACLs • The router security posture is now “block unless explicitly allowed” • C3PL (Cisco Common Classification Policy Language) makes policies easy to read and troubleshoot • One policy affects any given traffic, instead of needing multiple ACLs and inspection actions. © 2009 Cisco Learning Institute. 27
  • 28. Common Designs LAN-to-Internet Public Servers Redundant Firewalls Complex Firewall © 2009 Cisco Learning Institute. 28
  • 29. Actions Inspect – This action configures Cisco IOS stateful packet inspection Drop – This action is analogous to deny in an ACL Pass – This action is analogous to permit in an ACL © 2009 Cisco Learning Institute. 29
  • 30. Manually Implementing Zone-based Policy Firewall with CCP • Step 1: Define zones • Step 2: Configure class maps to describe traffic between zones • Step 3: Create policy maps to apply actions to the traffic of the class maps • Step 4: Define zone pairs and assign policy maps to the zone pairs © 2009 Cisco Learning Institute. 30
  • 31. Implementing Zone-based Policy Firewall with CLI 1. Create the zones for the firewall with the zone security command 3. Specify firewall policies with the policy-map type inspect command 2. Define traffic classes with the class-map type inspect command 4. Apply firewall policies to pairs of source and destination zones with zone-pair security 5. Assign router interfaces to zones using the zone-member security interface command © 2009 Cisco Learning Institute. 31
  • 32. Step 1: Create the Zones FW(config)# zone security Inside FW(config-sec-zone)# description Inside network FW(config)# zone security Outside FW(config-sec-zone)# description Outside network © 2009 Cisco Learning Institute. 32
  • 33. Step 2: Define Traffic Classes FW(config)# class-map type inspect FOREXAMPLE FW(config-cmap)# match access-group 101 FW(config-cmap)# match protocol tcp FW(config-cmap)# match protocol udp FW(config-cmap)# match protocol icmp FW(config-cmap)# exit FW(config)# access-list 101 permit ip 10.0.0.0 0.0.0.255 any © 2009 Cisco Learning Institute. 33
  • 34. Step 3: Define Firewall Policies FW(config)# policy-map type inspect InsideToOutside FW(config-pmap)# class type inspect FOREXAMPLE FW(config-pmap-c)# inspect © 2009 Cisco Learning Institute. 34
  • 35. Step 4: Assign Policy Maps to Zone Pairs and Assign Router Interfaces to Zones FW(config)# zone-pair security InsideToOutside source Inside destination Outside FW(config-sec-zone-pair)# description Internet Access FW(config-sec-zone-pair)# service-policy type inspect InsideToOutside FW(config-sec-zone-pair)# interface F0/0 FW(config-if)# zone-member security Inside FW(config-if)# interface S0/0/0.100 point-to-point FW(config-if)# zone-member security Outside © 2009 Cisco Learning Institute. 35