CCIE Security v6 Technology Lab Guide
CCIE Security v6 Technology Lab Guide
TABLE OF CONTENTS
Lab Guidelines ................................................................................................................................................................ 8
Lab Instructions .............................................................................................................................................................. 9
Lab Restrictions .............................................................................................................................................................. 9
About the Trainer......................................................................................................................................................... 12
Loading Initial Config .................................................................................................................................................. 12
Hardware and Software List ....................................................................................................................................... 13
Nitiz Sharma
CCIE SEC/DC 48846
CCIE SECURITY V5
Lab-Setup ........................................................................................................................................................................ 76
Task1 Configure the ASAp1 with Multi-Context mode ................................................................................................... 79
Task2 Configure the class for the context....................................................................................................................... 83
Task3 Make sure from R7 to R5 and R8 to R6 Ping ......................................................................................................... 88
Lab-1.7: - Active/Active failover (R9, R10,R11,R12 ASAp2 & ASAp3) .................................................. 109
Lab-Setup ...................................................................................................................................................................... 110
Task1 Configure ASA for Active/Active failover ............................................................................................................ 115
Task2 Configure context on the ASAp2 ........................................................................................................................ 116
Task3 Address Translation ............................................................................................................................................ 118
Task4 Traffic Filtering .................................................................................................................................................... 118
Task4 Monitor Interface ............................................................................................................................................... 133
3
CCIE SECURITY V5
........................................................................................................................................................................ 161
Lab-4.8: - Configure ISE and ASA for TrustSec Classification and Enforcement ............................ 469
Task1 Configure ISE SGT tag.......................................................................................................................................... 469
Task2 Configure ASA for ACL......................................................................................................................................... 475
Task3 Configure ISE for Trustsec ................................................................................................................................... 477
Lab-5.4: - Creating URL list for allowing and blocking traffic ............................................................. 557
Lab-5.6: - Creating the Identification profile for allowing Mozilla firefox......................................... 557
Lab-5.7: - Creating the Identification profile for Blocking Internet Explorer.................................... 557
7
CCIE SECURITY V5
LAB GUIDELINES
The following scenarios are practice labs designed to test your readiness for the Cisco Systems
CCIE Security Lab Exam. However, remember, these practice labs should be used as a learning tool.
Instead of rushing through the labs to complete all the configuration steps, take the time to research the
networking technology and gain a deeper understanding of the principles behind its operation. For
each lab of the CCIE Security Practice Labs Workbook, follow these guidelines:
Read the entire lab before starting the configuration, and correlate tasks within a section to get a
complete overview of the lab objectives.
There are dependencies between tasks of the same section and between tasks from different
sections. Carefully read throughout the lab to identify and make notes of it
The lab consists of Seven sections that don't necessarily need to be completed in the presented
order. However, some tasks must be completed before others (such as initialization of ASA
firewalls).
Some tasks present a set of requirements for implementing a technology, and some tasks present
outputs to be matched.
Labs include both configuration and troubleshooting tasks; the number of faults relevant to each
troubleshooting task may or not be specified.
8
CCIE SECURITY V5
Before starting, verify that all equipment is functional, powered up and that you can access it at the
console.
Routers and switches are preconfigured, do not change it unless specifically allowed by the task.
On troubleshooting tickets, you may change any of the initial configurations.
IPv4/IPv6 static and default routes are allowed to complete any task, but only if this is the only
available option, and unless otherwise stated in any task.
Make sure you do not to lock yourself out of any device, because password recovery or device
reset is not available in the lab.
At the end of the Lab, ensure that all devices are accessible at the console by using preconfigured
credentials or the ones from specific task requirements.
LAB INSTRUCTIONS
Before you begin, make sure that the initial configuration scripts for each lab have been applied.
If you have any questions related to the scenario solutions, send an email to our support team at
[email protected]. Refer to the attached physical and logical diagrams on each
lab for interface and protocol assignments. Upon lab completion, end-to-end IPv4 connectivity is
not a requirement unless specifically asked for, but you are required to meet task requirements
and restrictions
LAB RESTRICTIONS
Each lab scenario contains explicit general restrictions that you must conform to while configuring
the lab. These restrictions are defined in the introductory section for each scenario. Examples of
such restrictions include, but are not limited to, not adding additional IP addressing, not changing
the default authentication methods, etc. There may also be certain restrictions for particular tasks
within a lab scenario. Examples of these restrictions include, but are not limited to, not issuing a
particular configuration command, not using the legacy configuration for a technology, etc.
9
CCIE SECURITY V5
TIP
You may do whatever is necessary to complete a task unless the general requirements for the lab
scenario or the specific requirements for the task explicitly prohibit you from doing so. All routers
and switches are accessible at the console without requiring any authentication; do not change this.
To access other devices within the lab, use the following tables as a reference:
Enable password
Sanfran@1234
Enable password
Sanfran@1234
10
CCIE SECURITY V5
11
CCIE SECURITY V5
Nitiz Sharma
Over 13 Years of experience in Cisco Network Technology. More than 6 years of proficiency in
CISCO Data Centre and Security Network Implementation, installation, configuration, support and
maintaining Cisco. Strong hands on experience on Cisco Devices like ASA, NGFW Firepower, ISE,
WSA, ESA, VPN, StealthWatch, Umbrella, SD-WAN, SDA, Cisco ACI, Nexus, UCS, Cloud Centre, as
12
CCIE SECURITY V5
All the devices can be loaded with the initial script, by logging into the ESXI Server with the
username and password mentioned in the reference sheet. Once login, revert the Base-config
Snapshot for all the device(VM) present in the server. How to revert the snapshot, you must be
any experiment.
Virtual Machines
Security Appliances
Core Devices
Others
13
CCIE SECURITY V5
AnyConnect 4.2
Physical Devices
Cisco Aironet
3500 Series
The most Common and effective way to implement a security domain is to place a firewall at the boundary
between the trusted and untrusted parts of a network.
Firewalls protect inside networks from unauthorized access by users on an outside network. A firewall can
also protect inside networks from each other, for example, by keeping a human resources network separate
from a user network.
In this Section we will configure all the Firewall related labs and clear our concepts.
14
CCIE SECURITY V5
LAB-SETUP
Configure R1 and R2 with the IP mentioned in the table
Configure the telnet on the respective routers using password “cisco”
Device Interface IP
R1 Fa0/0 10.1.1.10/24
Loopback0 1.1.1.1/24
R2 Fa0/0 20.1.1.10/24
Loopback0 2.2.2.2/24
15
CCIE SECURITY V5
Configuration of Router
R1:
hostname R1
interface f0/0
no shutdown
ip address 10.1.1.10 255.255.255.0
interface loop0
ip address 1.1.1.1 255.255.255.0
line vty 0 4
password cisco
transport input all
login
R2:
16
CCIE SECURITY V5
hostname R2
interface f0/0
no shutdown
ip address 20.1.1.10 255.255.255.0
interface loop0
line vty 0 4
password cisco
login
17
CCIE SECURITY V5
Verification
Configuration of Firewall
ASAv1:
hostname ASAv1
18
CCIE SECURITY V5
interface g0/0
no shutdown
nameif outside
interface g 0/1
no shutdown
nameif inside
Verifications:
R1#ping 10.1.1.1
!!!!!
19
CCIE SECURITY V5
R2#ping 20.1.1.1
!!!!!
R1#telnet 20.1.1.10
Password:
R2>
20
CCIE SECURITY V5
TCP outside 20.1.1.10:23 inside 10.1.1.10:15427, idle 0:00:52, bytes 102, flags UIO
R1#telnet 2.2.2.2
Password:
R2>
TCP outside 2.2.2.2:23 inside 10.1.1.10:55738, idle 0:00:03, bytes 106, flags UIO
Password:
R2>
21
CCIE SECURITY V5
TCP outside 2.2.2.2:23 inside 1.1.1.1:17916, idle 0:00:21, bytes 102, flags UIO
R1#ping 2.2.2.2
.....
R1#ping 20.1.1.10
.....
R2#ping 1.1.1.1
22
CCIE SECURITY V5
.....
R2#ping 10.1.1.10
.....
R2#telnet 1.1.1.1
R2#telnet 10.1.1.10
Verification
24
CCIE SECURITY V5
ASAv1:
host 1.1.1.1
host 2.2.2.2
port-object eq telnet
port-object eq ssh
access-list OUT-IN extended permit tcp object R2-loop object R1-loop object-group
TELNET-SSH
passwd cisco
domain-name cisco.com
25
CCIE SECURITY V5
Verifications:
R1#telnet 10.1.1.1
Password:
Logins over the last 1 days: 2. Last login: 11:05:33 UTC Aug 28 2018 from console
ASAv1>
26
CCIE SECURITY V5
Password:
ASAv1>
R2#telnet 20.1.1.1
“Telnet is not going to happen on the Outside interface of the ASA firewall”
Password:
Logins over the last 1 days: 2. Last login: 18:39:30 UTC Aug 28 2018 from 10.1.1.10
27
CCIE SECURITY V5
ASAv1>
Password:
R1>
TCP outside 2.2.2.2:11605 inside 1.1.1.1:23, idle 0:00:22, bytes 102, flags UIOB
.....
ASAv1:
access-list OUT-IN extended permit icmp host 2.2.2.2 host 1.1.1.1 echo
29
CCIE SECURITY V5
!!!!!
***NOTE: In the previous task, we allowed the ICMP traffic only from R2 to R1
If R1 sends ICMP to R2 it would not be successful as the traffic is not allowed in ASAv1. ***
30
CCIE SECURITY V5
.....
ASAv1:
access-list OUT-IN extended permit icmp host 2.2.2.2 host 1.1.1.1 echo-reply
!!!!!
ICMP outside 2.2.2.2:0 inside 1.1.1.1:9, idle 0:00:00, bytes 19008, flags
31
CCIE SECURITY V5
ASAv1:
banner motd *
banner motd *
32
CCIE SECURITY V5
Verification:
motd:
Welcome to Netmetric-Solutions
33
CCIE SECURITY V5
Remove the Default route from R1 and static route from ASA1v.
Configure Eigrp AS 10 on R1 and ASA1v
Addresses the Loopback and 10.1.1.0 network in AS
Eigrp Messages should be authenticate using MD5 with key “CCNP” and key-id as 1 on ASAv1
Create the Key chain and key string name as “CCNP” along with key 1 on R1.
Verification
Configuration on Router
R1:
R2:
Configuration on ASA
ASAv1:
34
CCIE SECURITY V5
R1-ASA:EIGRP
R1:
router eigrp 10
no auto-summary
key 1
key-string CCNP
35
CCIE SECURITY V5
interface FastEthernet0/0
ASAv1:
router eigrp 10
no auto-summary
interface GigabitEthernet0/1
Verification:
36
CCIE SECURITY V5
Remove the Default route from R1 and static route from ASA1v.
Configure OSPF Area 0 on the outside interface.
Authenticate using the interface authentication with password of “CCNP” and key ID 1.
37
CCIE SECURITY V5
Verification
Configuration on ASA
ASAv1:
router ospf 1
router-id 20.20.20.20
interface GigabitEthernet0/0
Configuration on Router
R2:
router ospf 1
router-id 2.2.2.2
log-adjacency-changes
interface FastEthernet0/0
Verifications:
39
CCIE SECURITY V5
40
CCIE SECURITY V5
Configuration on Firewall
ASAv1:
router eigrp 10
router ospf 1
41
CCIE SECURITY V5
Verification:
R1:
R1#show ip route
42
CCIE SECURITY V5
R2:
R2#show ip route
43
CCIE SECURITY V5
!!!!!
Password:
R1>
44
CCIE SECURITY V5
!!!!!
Password:
R2>
45
CCIE SECURITY V5
Device Interface IP
Nameif mgmt.
Security-level 100
Configuration on Firewall
46
CCIE SECURITY V5
47
CCIE SECURITY V5
“Check the connectivity between the candidate PC and the ASA1 firewall”
48
CCIE SECURITY V5
!!!!!
Accessing tftp://150.1.7.20/asdm-782-151.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!
49
CCIE SECURITY V5
Verification: -
After installing the ASDM to the flash, lets enable the ASDM feature for the ASA firewall
Once Done go to the desktop and double click on the ASDM icon and give the IP add
150.1.7.166
50
CCIE SECURITY V5
51
CCIE SECURITY V5
Once done the ASDM gui will open. You can explore the GUI for the moment.
52
CCIE SECURITY V5
53
CCIE SECURITY V5
LAB-SETUP
Configure R100, R200 and R300 as per the below mentioned addressing scheme.
Configure Telnet on All the router, with the password “Sanfran@1234”
Configure the default route on all the router, pointing towards ASA.
54
CCIE SECURITY V5
Loopback 3 55.55.55.55/24
Loopback 1 13.13.13.13/24
Loopback 2 133.133.133.133/24
Configuration on Router
R100:
int gi5
no sh
exit
int lo0
55
CCIE SECURITY V5
description DB-Server
int lo1
description App-Server
int lo2
description Inside-PC
Verification: -
R100#show ip int br
56
CCIE SECURITY V5
Configuration on Router
R200:
int gi5
no sh
exit
int lo0
ip add
description google.com
57
CCIE SECURITY V5
int lo1
int lo2
description Outside-PC1
int lo3
description Outside-PC2
Verification
R200#show ip int br
58
CCIE SECURITY V5
Configuration on Router
R300:
int gi5
ip add
no sh
int lo0
description Web-Server1
int lo1
59
CCIE SECURITY V5
description Web-Server2
int lo2
description Web-Server3
Verification
R300#show ip int br
Configuration On R100,R200,R300
60
CCIE SECURITY V5
line vty 0 4
password Sanfran@1234
login
LAB-SETUP
Device Interface IP
Nameif outside
Nameif inside
Nameif dmz
Sec-50
Configuration Firewall
ASA1
interface GigabitEthernet0/4
nameif inside
security-level 100
61
CCIE SECURITY V5
?!!!!
interface GigabitEthernet0/5
nameif outside
security-level 0
?!!!!
interface GigabitEthernet0/6
nameif dmz
62
CCIE SECURITY V5
security-level 50
?!!!!
Configure ASA so that when someone from the outside (network segment behind ASA’s
OUTSIDE interface) tries to connect to IP address of 20.1.1.50 he/she will be pointed to Web-
Server1.
Configuration on Firewall
ASA1:
host 3.3.3.3
R200#telnet 20.1.1.50
Password:
R300>show users
64
CCIE SECURITY V5
translate_hits = 0, untranslate_hits = 1
TCP outside 20.1.1.10:46594 dmz 3.3.3.3:23, idle 0:03:46, bytes 553, flags UIOB
Configure ASA so that when someone from the outside (network segment behind ASA’s
OUTSIDE interface) tries to connect to IP address of 20.1.1.51 using TELNET he/she will be pointed
to Web-Server2.
Configuration on Firewall
ASA1:
host 13.13.13.13
Verification
R200#telnet 20.1.1.51
R300>show user
Line User Host(s) Idle Location
TCP outside 20.1.1.10:23554 dmz 13.13.13.13:23, idle 0:01:42, bytes 466, flags UIOB
Configure ASA so that when Inside-PC from the inside network tries to connect to Web-Server3,
the Inside-PC ip should change to mapped interface, and Web-Server3 ip should remain same
and intact.
The translation must be enforced only for traffic going between Inside-PC and Web-Server3 only.
66
CCIE SECURITY V5
Configuration on Firewall
ASA1:
host 133.133.133.133
host 122.122.122.122
nat (inside,dmz) source static Inside-PC interface destination static Web-Server3 Web-
Server3
Verification:
R100#telnet 133.133.133.133
R300>show user
67
CCIE SECURITY V5
As we can see that the it is using the interface ip of R100 instead of 122.122.122.122.
Verification:
translate_hits = 0, untranslate_hits = 1
2 (dmz) to (outside) source static Web-Server2 20.1.1.51 service tcp telnet telnet
translate_hits = 0, untranslate_hits = 0
TCP dmz 133.133.133.133:23 inside 122.122.122.122:47106, idle 0:02:14, bytes 540, flags
UIO
Password:
R300>
R300>show users
69
CCIE SECURITY V5
TASK-4 CONFIGURE STATIC AUTO NAT ON ASA1 BETWEEN DMZ NETWORK AND
DB SERVER
Configure ASA so that when someone from the DMZ network segment tries to connect to DB-
Server using port 2323, he/she will be redirected to DB-Server using port 23.
Configuration on Firewall
ASA1:
host 2.2.2.2
70
CCIE SECURITY V5
Password:
R100>show users
1 (inside) to (dmz) source static Inside-PC interface destination static Web-Server3 Web-
Server3
translate_hits = 1, untranslate_hits = 1
71
CCIE SECURITY V5
1 (inside) to (dmz) source static DB-Server interface service tcp telnet 2323
translate_hits = 0, untranslate_hits = 5
translate_hits = 0, untranslate_hits = 0
3 (dmz) to (outside) source static Web-Server2 20.1.1.51 service tcp telnet telnet
translate_hits = 0, untranslate_hits = 0
72
CCIE SECURITY V5
TCP dmz 30.1.1.10:57346 inside 2.2.2.2:23, idle 0:00:47, bytes 524, flags UIOB
Configure ASA so that when someone from the Outside-PC1 try to do telnet to DMZ Web-Server1,
the Outside-PC1 identity should change to 20.1.1.100 and the Web-Server1 identity should change
to 30.1.1.100. (Twice NAT)
Configuration on Firewall
ASA1:
73
CCIE SECURITY V5
host 3.3.3.3
host 45.45.45.45
host 30.1.1.100
host 20.1.1.100
Verification:
translate_hits = 1, untranslate_hits = 1
TCP outside 20.1.1.100(45.45.45.45):30210 dmz 3.3.3.3:23, idle 0:02:14, bytes 484, flags
UIOB
Password:
R300>show users
75
CCIE SECURITY V5
LAB-SETUP
Configure R5, R6, R7 and R8 as per the below mentioned addressing scheme.
Configure Telnet on All the router, with the password “cisco”
Configure the default route on all the router, pointing towards ASA.
76
CCIE SECURITY V5
R5 Fa0/0 50.1.1.10/24
Loopback0 5.5.5.5/24
R6 Fa0/0 60.1.1.10/24
Loopback0 6.6.6.6/24
R7 Fa0/0 70.1.1.10/24
Loopback0 7.7.7.7/24
R8 Fa0/0 80.1.1.10/24
Loopback0 8.8.8.8/24
Configuration on Router
R5:
interface f0/0
no shut
ip address 50.1.1.10 255.255.255.0
interface loopback 0
ip address 5.5.5.5 255.255.255.0
R6:
77
CCIE SECURITY V5
interface f0/0
no shut
ip address 60.1.1.10 255.255.255.0
interface loopback 0
ip address 6.6.6.6 255.255.255.0
R7:
interface f0/0
no shut
ip address 70.1.1.10 255.255.255.0
interface loopback 0
ip address 7.7.7.7 255.255.255.0
R8:
interface f0/0
no shut
ip address 80.1.1.10 255.255.255.0
78
CCIE SECURITY V5
interface loopback 0
ip address 8.8.8.8 255.255.255.0
Url :- CNTX1
79
CCIE SECURITY V5
Configuration on Firewall
ASAp1:
hostname ASAp1
mode multiple
interface Ethernet0
no shutdown
interface Ethernet1
no shutdown
interface Ethernet2
no shutdown
context CNTX1
80
CCIE SECURITY V5
config-url disk0:/CNTX1.cfg
context CNTX2
config-url disk0:/CNTX2.cfg
Verification
81
CCIE SECURITY V5
Real Interfaces:
Virtual254
Real Interfaces:
Mapped Interfaces:
82
CCIE SECURITY V5
Real Interfaces:
Mapped Interfaces:
83
CCIE SECURITY V5
Telnet Sessions 1
Xlate Objects 200
Connections 2000
SSH Sessions 4
Telnet Sessions 1
Xlate Objects 300
Configuration on Firewall
ASAp1:
class CNTX1
limit-resource asdm 2
limit-resource ssh 3
limit-resource telnet 1
84
CCIE SECURITY V5
class CNTX2
limit-resource asdm 4
limit-resource ssh 4
limit-resource telnet 1
Verification: -
class default
limit-resource All 0
limit-resource ASDM 5
limit-resource SSH 5
limit-resource Telnet 5
class CNTX1
limit-resource ASDM 2
limit-resource SSH 3
85
CCIE SECURITY V5
limit-resource Telnet 1
class CNTX2
limit-resource ASDM 4
limit-resource SSH 4
limit-resource Telnet 1
CNTX1 0 2 0000
CNTX2 0 3 0000
86
CCIE SECURITY V5
CNTX1 1 2 0000
CNTX2 1 3 0000
87
CCIE SECURITY V5
Check the difference between the output, with respect to visible and invisible interface.
Verification:
88
CCIE SECURITY V5
Ensure the ping from the Higher Security Level to Lower Security level from R7to R5 and R8 to R6.
We are not allowed to configure any type of access list or address translation to make this ping
happen.
Configuration on ASA
ASAp1
interface inside
nameif inside
security-level 100
interface outside
nameif outside
security-level 0
Verification:
89
CCIE SECURITY V5
!!!!!
!!!!!
outside outside 0
90
CCIE SECURITY V5
!!!!!
!!!!!
policy-map global_policy
class inspection_default
inspect icmp
91
CCIE SECURITY V5
policy-map global_policy
class inspection_default
inspect icmp
Verification:
R7#ping 50.1.1.10
.....
R8#ping 60.1.1.10
.....
92
CCIE SECURITY V5
0 packets dropped
Verification:
93
CCIE SECURITY V5
0 packets dropped
Because of the shared interface, the mac address on both the context, for the outside
interface is same. To change the mac address on both the context we need to use either auto
or manual option.
Verification:
16 packets dropped
Verification:
26 packets dropped
Verification:
95
CCIE SECURITY V5
R7#ping 50.1.1.10
!!!!!
R8#ping 60.1.1.10
!!!!!
R7#telnet 50.1.1.10
Password:
R5>
R8#telnet 60.1.1.10
96
CCIE SECURITY V5
Password:
R6>
LAB-SETUP
Configure the default route on all the router, pointing towards ASA.
R3 Fa0/0 10.1.1.10/24
Loopback0 3.3.3.3/24
R4 Fa0/0 20.1.1.10/24
Loopback0 4.4.4.4/24
Configuration on Router
R3:
hostname R3
interface f 0/0
no shut
interface loopback 0
98
CCIE SECURITY V5
R4:
hostname R4
interface f 0/0
no shut
interface loopback 0
99
CCIE SECURITY V5
Sec – 10.10.10.11/24
Configuration on ASA
ASAv2
hostname ASAv2
interface g 0/0
no shut
nameif outside
interface g0/1
no shut
nameif inside
101
CCIE SECURITY V5
interface g 0/2
no shut
interface g0/3
no shut
102
CCIE SECURITY V5
failover
ASAv3:
hostname ASAv3
interface g 0/2
no shut
interface g0/3
no shut
failover
103
CCIE SECURITY V5
ASAv2
ASAv2(config)# failover
ASAv3(config)# failover
ASAv3(config)# .
104
CCIE SECURITY V5
WARNING: Local user database is empty and there are still 'aaa' commands for 'LOCAL'.
ASAv2/stby#
Verifications: -
Active None
105
CCIE SECURITY V5
====Configuration State===
Sync Done
====Communication State===
Mac set
Other host: 1
Other host: 7
Failover On
106
CCIE SECURITY V5
Interface Policy 1
slot 0: empty
General 23 0 22 0
107
CCIE SECURITY V5
sys cmd 22 0 22 0
up time 0 0 0 0
RPC services 0 0 0 0
TCP conn 0 0 0 0
UDP conn 0 0 0 0
ARP tbl 0 0 0 0
Xlate_Timeout 0 0 0 0
IPv6 ND tbl 0 0 0 0
VPN IKEv1 SA 0 0 0 0
VPN IKEv1 P2 0 0 0 0
VPN IKEv2 SA 0 0 0 0
VPN IKEv2 P2 0 0 0 0
SIP Session 0 0 0 0
SIP Tx 0 0 0 0
SIP Pinhole 0 0 0 0
Route Session 0 0 0 0
Router ID 0 0 0 0
User-Identity 1 0 0 0
108
CCIE SECURITY V5
CTS SGTNAME 0 0 0 0
CTS PAC 0 0 0 0
TrustSec-SXP 0 0 0 0
IPv6 Route 0 0 0 0
STS Table 0 0 0 0
Recv Q: 0 17 192
Xmit Q: 0 37 184
109
CCIE SECURITY V5
LAB-SETUP
Configure R9, R10, R11 and R12 as per the below mentioned addressing scheme.
Configure Telnet on All the router, with the password “cisco”
Configure the default route on all the router, pointing towards ASA.
R9 Fa0/0 10.1.1.10/24
110
CCIE SECURITY V5
Configuration on Router
R9:
in f0/0
no shut
R10:
in f0/0
no shut
111
CCIE SECURITY V5
R11:
in f0/0
no shut
R12:
in f0/0
no shut
R9-11:
line vty 0 4
password cisco
login
112
CCIE SECURITY V5
SW4
vlan 20
vlan 40
no sh
interface GigabitEthernet0/2
no sh
interface GigabitEthernet0/3
113
CCIE SECURITY V5
no sh
SW5
vlan 10
vlan 30
no sh
interface GigabitEthernet0/0
no sh
114
CCIE SECURITY V5
interface GigabitEthernet0/1
no sh
Interface eth0.20
vlan: 20
Interface eth0.40
vlan: 40
Interface eth1.10
vlan: 10
Interface eth1.30
vlan: 30
Failover:
o Unit: Primary
o Lan Interface: eth2
o Primary‐ Standby:1.1.1.1-1.1.1.2/24
o Name: LAN
o Link Interfaces: eth3
o Primary‐ Standby:2.2.2.1-2.2.2.2
115
CCIE SECURITY V5
o Name: STATE
Failover Group1: Primary
Failover Group2: Secondary
Failover:
o ASAp3‐ system
o Failover:
o Unit: Secondary
o Lan Interface: eth2
o Primary‐ Standby:1.1.1.1-1.1.1.2/24
o Name: LAN
o Name: STATE
Name: c1
o Allocate Interfaces: eth0.20, eth1.10 and provide Labels Respectively: outside_c1, inside_c1
o Join Failover Group: 1
o URL: c1.cfg
116
CCIE SECURITY V5
o Name: inside
o Interface outside_c1:
o Address Primary‐ Standby:20.1.1.1-20.1.1.2
o Name: outside
ASA1‐ c2
o Interface inside_c2:
o Address Primary‐ Standby:30.1.1.1-30.1.1.2
o Name: inside
o Interface outside_c2:
o Address Primary‐ Standby:40.1.1.1-40.1.1.2
o Name: outside
Eth0.40 – outside-invisible
Url :- c1.cfg
117
CCIE SECURITY V5
For c1 context
R9 (10.1.1.10) should be accessible from outside using outside interface with NAT IP 50.50.50.50. Network
object used for the translation should be named "R9_c1". Use Auto NAT
For c2 context
R10 (30.1.1.10) should be accessible from outside using the outside interface with NAT IP 60.60.60.60. Use the
network object for the translation, can use any name. Use Manual NAT
For c1context
R9 should be accessible only from 20.1.1.10/24 network for the telnet traffic at port 23 and ICMP Echo
message.
For c2 context
R10 should be accessible only from 40.1.1.10/24 network for the telnet traffic at port 23 and ICMP Echo
message.
ACL for the traffic filtering should be named "O-I".
ACL should be network and host specific.
ASA2p/ASA3p
118
CCIE SECURITY V5
mode multiple
ASA2p
hostname ASAp2
interface Ethernet 0
no shut
119
CCIE SECURITY V5
interface Ethernet 1
no shut
interface Ethernet 2
no shut
interface Ethernet 3
no shut
vlan 20
vlan 40
vlan 10
vlan 30
120
CCIE SECURITY V5
failover group 1
preempt
primary
failover group 2
preempt
secondary
context c1
config-url c1.cfg
join-failover-group 1
121
CCIE SECURITY V5
context c2
config-url c2.cfg
join-failover-group 2
changeto context c1
interface inside_c1
nameif inside
no sh
interface outside_c1
nameif outside
no sh
122
CCIE SECURITY V5
host 10.1.1.10
changeto context c2
123
CCIE SECURITY V5
interface inside_c2
nameif inside
no sh
interface outside_c2
nameif outside
no sh
host 30.1.1.10
124
CCIE SECURITY V5
changeto system
ASAp3:
interface e 2
no shut
interface e 3
no shut
125
CCIE SECURITY V5
failover group 1
preempt
secondary
failover group 2
preempt
primary
failover
126
CCIE SECURITY V5
Verifications:
Ethernet1.10
Ethernet1.30
127
CCIE SECURITY V5
====Configuration State===
Sync Done
====Communication State===
Mac set
R9#telnet 20.1.1.10
Password:
R11>show user
R11>show users
128
CCIE SECURITY V5
TCP outside 20.1.1.10:23 inside 10.1.1.10:57020, idle 0:00:20, bytes 474, flags UIO
TCP outside 20.1.1.10:23 inside 10.1.1.10:57020, idle 0:00:13, bytes 474, flags U
translate_hits = 1, untranslate_hits = 0
R10#telnet 40.1.1.10
129
CCIE SECURITY V5
Password:
R12>show user
TCP outside 40.1.1.10:23 inside 30.1.1.10:25837, idle 0:00:26, bytes 340, flags UIO
TCP outside 40.1.1.10:23 inside 30.1.1.10:25837, idle 0:00:15, bytes 340, flags U
translate_hits = 1, untranslate_hits = 0
130
CCIE SECURITY V5
R11#ping 50.50.50.50
!!!!!
R11#telnet 50.50.50.50
Password:
R9>show user
TCP outside 20.1.1.10:19973 inside 10.1.1.10:23, idle 0:00:30, bytes 396, flags UIOB
131
CCIE SECURITY V5
R12#ping 60.60.60.60
!!!!!
R12#telnet 60.60.60.60
Password:
R10>show user
132
CCIE SECURITY V5
TCP outside 40.1.1.10:28941 inside 30.1.1.10:23, idle 0:00:41, bytes 395, flags UIOB
Make sure that all the interfaces are being monitored for this failover implementation on both context.
Failover On
Interface Policy 1
133
CCIE SECURITY V5
134
CCIE SECURITY V5
up time 0 0 0 0
RPC services 0 0 0 0
TCP conn 9 0 5 0
UDP conn 0 0 0 0
ARP tbl 2 0 2 0
Xlate_Timeout 0 0 0 0
IPv6 ND tbl 0 0 0 0
VPN IKEv1 SA 0 0 0 0
VPN IKEv1 P2 0 0 0 0
VPN IKEv2 SA 0 0 0 0
VPN IKEv2 P2 0 0 0 0
SIP Session 0 0 0 0
135
CCIE SECURITY V5
Route Session 0 0 0 0
User-Identity 3 0 0 0
CTS SGTNAME 0 0 0 0
CTS PAC 0 0 0 0
TrustSec-SXP 0 0 0 0
IPv6 Route 0 0 0 0
Recv Q: 0 3 2502
Xmit Q: 0 3 2533
136
CCIE SECURITY V5
Verification
Failover On
Interface Policy 1
137
CCIE SECURITY V5
139
CCIE SECURITY V5
140
CCIE SECURITY V5
o CCL : eth3
IP Add : 10.100.10.1/24
o Interface Po.1.20
Nameif : Outside
IP Add : 10.100.20.1/24
o Interface Mgmt
Nameif : Management
Ip Add : 150.1.7.158
Sec-Level : 100
Type : Management-Only
Configure the Router
o Router R31
Interface : fa0/0
IP add : 10.100.10.10/24
Default Route: 10.100.10.1
o Router R32
Interface : fa0/0
141
CCIE SECURITY V5
IP add : 10.100.20.20/24
Default Route: 10.100.20.1
Configure the Switch
o Switch-C
Vlan : 10,20,150
Po : Po1 - Trunk
Interface : eth0/1-1/0-0/3-1/2
Vlan 20 : 10.100.20.100/24
Follow the Topology for the Links information.
NTP protocol should uses MD5 authentication with the key-id 1and password of “cisco”
Configuration on Router
142
CCIE SECURITY V5
DC-Router:
ntp authenticate
ntp trusted-key 1
ntp master
Configuration on Firewall
ASA1:
ntp authenticate
ntp trusted-key 1
Verification:
143
CCIE SECURITY V5
nominal freq is 99.9984 Hz, actual freq is 99.9984 Hz, precision is 2**6
our mode client, peer mode server, our poll intvl 64, peer poll intvl 64
root delay 0.00 msec, root disp 2.33, reach 3, sync dist 7893.951
144
CCIE SECURITY V5
Configuration on Firewall
ASA1:
domain-name cisco.com
145
CCIE SECURITY V5
Verification:
!!!!!
Create a log filter list to send all IKE, IPSec, and VPN client warning messages to a syslog server at 10.1.1.101.
Send only critical EIGRP and RIP messages to the buffer and change the buffer size to 32768. Messages
should be saved to the flash when the buffer gets full.
Send debug messages to the ASDM. The ASA should buffer 300 messages.
146
CCIE SECURITY V5
Confuguration on Firewall
ASA1:
loggin enable
logging flash-bufferwrap
The goal of this hands-on lab is to give a deployment engineer the skills necessary to
successfully install and configure Cisco’s latest version of Next Generation Firewall
(NGFW). You will deploy Firepower Management Center (FMC) and Firepower Threat
Defence (FTD) devices in a realistic network topology. Once the devices have a basic
configuration you will learn how to use some of the new features and benefits of the
integrated Firewall (FW) and Intrusion Prevention System (IPS). Though this lab is geared
to teach the basics of FTD, throughout this lab there are questions and roadblocks to help
you learn what should/shouldn’t (or can/can’t) be done. When approaching this lab
148
CCIE SECURITY V5
Download the FMC, NGIPS and FTD from the cisco.com, with the valid credentials.
Once being downloaded, Install the OVF template on the VMware ESXI Server.
149
CCIE SECURITY V5
“The Firepower Threat Defence (FTD) devices are not configurable via their CLI beyond
setting up their Management Interfaces. In order to configure the data plane, you must
either use the Firepower Device Manager (a new feature in Firepower version 6.1) or the
For detail solution please refer to the “avi” file uploaded on the resource portal
o Manage locally
Interface Name IP
150
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
The Firepower Threat Defense (FTD) devices are not configurable via their CLI beyond setting up their
Management Interfaces. In order to configure the data plane, you must either use the Firepower Device
Manager (a new feature in Firepower version 6.1) or the Firepower Management Center (FMC).
o Login Banner
151
CCIE SECURITY V5
o Time Synchronization
NTP Server :- 150.1.7.164
Time Zone :- ASIA/Kolkatta
o Email Notification
For detail solution please refer to the “avi” file uploaded on the resource portal
Notes: -
Base: A perpetual license that is automatically included. This license covers anything that isn’t considered an “optional
term license”. In other words, it covers everything but that which is discussed (covered) by the following term-based licenses.
Threat: A term-based license that analyzes network traffic for intrusions and exploits. It also has the ability to identify the
file type of files being sent through the FTD device, such as documents, executables, PDFs, etc.
Malware: A term-based license that allows file policies to check for malware. This license is required if the use of
Advanced Malware Protection (AMP) or AMP Threat Grid is desired.
152
URL: A term-based license that allows the use of categories and/or reputation-based URL filtering, such as gambling,
social media, or using a “5 star” reputation system to filter URLs.
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
Product Update
Rule Update
Geolocation Update
Check the respective ip address and check who owns it, and from what part of the world is it from
o 1.1.1.1
o 2.2.2.2
o 5.5.5.5
o 64.1.1.1
153
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
154
CCIE SECURITY V5
Configure the OSPF on the Inside and DMZ zone of the HA FTD.
OFPF area should be 0 in ABR, use Topology to advertise the required network.
R100 and R200 are already configured for the same.
For detail solution please refer to the “avi” file uploaded on the resource portal
Make the EIGRP Routing process up between R200 and R300 through NGIPS.
R300 should in the Internal Zone of the NGIPS and R200 should be in the External Zone of the NGIPS.
Enable the logging at the beginning of the connection
Allow HTTP, ICMP and FTP traffic from Client-PC to the respective servers.
For detail solution please refer to the “avi” file uploaded on the resource portal
155
CCIE SECURITY V5
Configure the Static NAT, with the DMZ as the “destination” interface and implementation should be
AUTO NAT, going from Inside Zone to DMZ Zone.
Web Server1 (1.1.1.1) should be accessible through the ip of 50.50.50.50.
Cisco recommends you use Auto NAT unless you need the extra features of Manual NAT. It is easier to configure and might
be more stable for services such as VoIP.
Comparing Auto NAT and Manual NAT. The main differences between these two NAT types are:
Auto NAT – The NAT rule becomes a parameter for a network object. The network object IP address serves as
the original (real) address.
Manual NAT – You identify a network object, or network group, for both the real and mapped addresses. In this case NAT
is not a parameter of the network object; the network object (or network group) is a parameter of the NAT configuration. The ability
to use a network object group for the real address means that manual NAT is more scalable.
Auto NAT – Each rule can apply to either the source or destination of the packet. So two rules might be used; one for
the source IP address and one for the destination IP address. These two rules cannot be tied together to enforce a specific
translation for a source/destination combination.
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
Though your routing and interfaces are correct the Access Control Policy assigned to this FTD,
currently the Base Policy Access Control Policy, has no rules so it takes the Default Action rule which
is BLOCK All the Traffic.
For detail solution please refer to the “avi” file uploaded on the resource portal
o Name :- Fastpath_Policy
o Action :- Fastpath
o Apply :- Base Policy of FTD
For detail solution please refer to the “avi” file uploaded on the resource portal
TASK4 CONFIGURE THE ACCESS POLICY WITH ALLOW RULE FOR ICMP
157
CCIE SECURITY V5
Remove the previously created the Pre-filter policy and continue with the task.
Create a New rule in Mandatory Category of the ACP base Policy.
o Name :- ICMP
Notes :-
For detail solution please refer to the “avi” file uploaded on the resource portal
When you click the dropdown menu button notice all the options you have to choose from. A whole
lab could be created around implementing and testing all these combinations of options. In short
use the following list to get an idea of what each are for:
Allow: Permit through the Firewall but check it against the SNORT rules.
Trust: Check it against the Firewall rules but don’t check it against the SNORT rules.
Monitor: Send the traffic to SNORT for analysis and then determine whether to process through
the Firewall rules.
Block: Don’t allow through the Firewall (and thus don’t sent to SNORT either) and don’t send any
sort of acknowledgement back to the source that you are blocking.
Block with Reset: Don’t allow through the Firewall and let the source know its connection has
been terminated.
Interactive Block: Notify the user that the action that triggered this rule is recommended to be
blocked but that the user
can choose to continue with this action should they feel it is okay to proceed.
Interactive Block with reset: The same as the Interactive Block but this time, if the user chooses
to not proceed with their action send a reset to the source.
158
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
TASK6 CONFIGURE THE ACCESS POLICY WITH ALLOW RULE FOR HTTP
o Action :- Allow
o Source Zone :- Inside
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
159
CCIE SECURITY V5
TASK8 CONFIGURE THE ACCESS POLICY WITH ALLOW RULE FOR FTP
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
TASK10 CONFIGURE THE ACCESS POLICY WITH BLOCK RULE FOR GEOLOCATION OF
GERMANY
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
Here is a quick reference list of the different actions and some of their extended options:
Detect = checks first 1460 Bytes, determines the type of file and generates a log
Malware Cloud Lookup = Sends the SHA-256 hash of a file to the cloud for analysis and depending on the answer
generates a log if the file is bad. Optionally, msexe files can be sent to cloud for Dynamic Analysis and/or SPERO
analysis.
Block Malware = Sends the SHA-256 hash of a file to the cloud for analysis and depending on the answer blocks it if the
f ile is bad. Optionally, msexe files can be sent to cloud for Dynamic Analysis and/or SPERO analysis.
Spero analysis = checks apart from SHA-256 also some other parameters (e.g. DLLs that are called etc)
Dynamic analysis = sends the file to the cloud for analysis. This can take 20-30 minutes
161
CCIE SECURITY V5
TASK2 USE THE SAME FILE POLICY WITH NAME “PDF-MALWARE” TO BLOCK ANY
MALWARE
Create and add new Rule
o Application Protocol :- Any
162
CCIE SECURITY V5
Create the general block rule, so that the user cannot open the Gambling sites.
o Action :- Block
For detail solution please refer to the “avi” file uploaded on the resource portal
Create the general block rule, so that the user cannot open the Social Media sites.
Create the Rule
o Action :- Block
o Source Zone :- Inside
For detail solution please refer to the “avi” file uploaded on the resource portal
o URL :- www.facebook.com
o Logging :- Beginning of the Connection
Verify and Test URL filtering
For detail solution please refer to the “avi” file uploaded on the resource portal
o State :- KR
o City :- Bangalore
o Org :- Netmetric
o Dep :- Training
Download the Certificate into the Client-PC and Use password as Sanfran1234.
Associate the SSL Policy to the ACP and Deploy the configuration
For detail solution please refer to the “avi” file uploaded on the resource portal
o With :- FMC_CA
165
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
Edit the SSL Policy to ACP and save the configuration then Deploy.
Edit the SSL Policy to ACP and save the configuration then Deploy.
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
Section 3 – VPN
166
CCIE SECURITY V5
Virtual Private Networks is intended to help you master the VPN technologies that are available on IOS
and the ASA. You will be configuring Site-to-Site, Remote Access, DMVPN, GetVPN, CA and Flex VPNs
along with some advanced features related to these technologies.
It is recommended that you create your own diagram at the beginning of each lab so any potential
information you find useful during your preparations can be reflected on this drawing, making it much
easier when you step into the real lab.
General Rules: - This lab will focus strictly on the Virtual Private Networks. You will need to pre-configure
the network with the base configuration files.
LAB-SETUP
Configure R51, R53 & R52(ISP) with the IP mentioned in the table
167
CCIE SECURITY V5
Device Interface IP
Configuration on Router: -
R51:
hostname R51
interface gi1
no shut
interface loop 0
R53:
hostname R53
interface gi1
no shut
interface loop 0
R52:
hostname R52
169
CCIE SECURITY V5
interface gi1
no shut
interface gi3
no shut
Verifications:
R51#show ip int br
170
CCIE SECURITY V5
171
CCIE SECURITY V5
R51#ping 20.1.15.1
!!!!!
R53#ping 20.1.14.1
!!!!!
Configure basic Site to Site IPSec VPN in Main Mode to protect traffic between IP addresses 14.14.14.14 and
15.15.15.15 using the following policy:
172
CCIE SECURITY V5
Configuration on Router: -
R51:
encryption aes
authentication pre-share
hash sha
group 5
lifetime 1800
mode tunnel
173
CCIE SECURITY V5
set transform-set TS
interface gi1
%CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
ISAKMP is enabled and working. The router will be processing IKE packets (UDP protocol, port 500) for establishing
ISAKMP “auxiliary” tunnel which will be used to negotiate securely parameters of an IPSec tunnel.
R53:
encryption aes
authentication pre-share
hash sha
group 5
174
CCIE SECURITY V5
lifetime 1800
mode tunnel
set transform-set TS
interface gi1
%CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
ISAKMP is enabled and working. The router will be processing IKE packets (UDP protocol, port 500) for establishing
ISAKMP “auxiliary” tunnel which will be used to negotiate securely parameters of an IPSec tunnel.
175
CCIE SECURITY V5
“The first ICMP packet triggers ISAKMP process as this is our interesting traffic matching our ACL. Before actually start
sending IKE packets to the peer the router first checks if there is any local SA (Security Association) matching that traffic.
Note that this check is against IPSec SA not IKE SA.
OK, no SA means there must be IKE packet send out.”
“The router has tried to find any IPSec SA matching outgoing connection but no valid SA has been found in Security
Association Database (SAD) on the router. “
*Mar 1 00:19:47.067: ISAKMP: Created a peer struct for 20.1.15.1, peer port 500
*Mar 1 00:19:47.087: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
“Pre-shared key for remote peer has been found. ISAKMP will use it to authenticate the peer during one of the last stages
of IKE Phase 1. “
*Mar 1 00:19:47.099: ISAKMP:(0): sending packet to 20.1.15.1 my_port 500 peer_port 500
(I) MM_NO_STATE
177
CCIE SECURITY V5
“The router initiating IKE exchange is called “the initiator”.
The router responding to IKE request is called “the
responder”.
The initiator (R1) has sent ISAKMP policy along with vendor specific IDs which are a part of IKE packet
payload. MM_NO_STATE indicates that ISAKMP SA has been created, but nothing else has happened yet. “
*Mar 1 00:19:47.503: ISAKMP (0:0): received packet from 20.1.15.1 dport 500 sport 500
Global (I) MM_NO_STATE
“The responder (R2) has responded with IKE packet that contains negotiated ISAKMP policy along with its vendor specific
IDs. Note that the IKE Main Mode state is still MM_NO_STATE. “
R14#
“The router is processing ISAKMP parameters that have been sent as the reply.
Vendor IDs are processed to determine
if peer supports e.g. NAT- Traversal, Dead Peer Detection feature. ISAKMP policy is checked against policies defined
locally.
“atts are acceptable” indicates that ISAKMP policy matches with remote peer. Remember that comparing the policy that
has been obtained from remote peer with locally defined polices starting from the lowest index (number) of policy
defined in the running config. “
“The lifetime timer has been started. Note that default value of “lifetime” is used (86400 seconds). This is lifetime for
ISAKMP SA. Note that IPSEC SAs have their own lifetime parameters which may be defined as number of seconds or
kilobytes of transmitted traffic.”
179
CCIE SECURITY V5
“IKE Phase 1 (Main Mode) message 3
The third message is sent out containing KE (Key Exchange)
information for DH (Diffie-Hellman) secure key exchange process. “
*Mar 1 00:19:47.587: ISAKMP:(0): sending packet to 20.1.15.1 my_port 500 peer_port 500
(I) MM_SA_SETUP
4th message has been received from the peer. This message contains KE payload and base on that
information both peers can generate a common session key to be used in securing further
communication. The pre-shared key configured locally for the peer is used in this
calculation.
After receiving this message peers can also be able to determine if there is a NAT
along the path.
*Mar 1 00:19:48.043: ISAKMP (0:0): received packet from 20.1.15.1 dport 500 sport 500
Global (I) MM_SA_SETUP
“MM_SA_SETUP” idicates that the peers have agreed on parameters for the ISAKMP SA.
“IKE Phase 1 (Main Mode) message 5
Fifth message is used for sending out authentication
information the peer. This information is transmitted under the protection of the common shared
secret. “
181
CCIE SECURITY V5
next-payload : 8
type :1
address : 20.1.14.1
protocol : 17
port : 500
length : 12
“MM_KEY_EXCH” indicates that the peers have exchanged Diffie-Hellman public keys and have generated a shared
secret. The ISAKMP SA remains unauthenticated. Note that the process of authentication has been just started.
182
CCIE SECURITY V5
IKE Phase 1 (Main Mode) message 6
The peer identity is verified by the local router and SA is
established.
This message finishes ISAKMP Main Mode (Phase I) and the status is changed to
IKE_P1_COMPLETE.
*Mar 1 00:19:48.467: ISAKMP (0:1001): received packet from 20.1.15.1 dport 500 sport 500
Global (I) MM_KEY_EXCH
“Note that the process of peer authentication is still in progress (MM_KEY_EXCH). Remember that there is also one IKE
Main Mode state which is not visible in the debug output. It is “MM_KEY_AUTH” which indicates that the ISAKMP SA has
been authenticated. If the router initiated this exchange, this state transitions immediately to QM_IDLE and a Quick mode
exchange begins. “
next-payload : 8
type :1
address : 20.1.15.1
protocol : 17
port : 500
length : 12
authenticated
183
CCIE SECURITY V5
“The peer has been authenticated now. Note that SA number has been generated and inserted into SADB along with the
information relevant to the peer which has been agreed during IKE Main Mode.”
184
CCIE SECURITY V5
IKE Phase 2 (Quick Mode) message 2
Second QM message is a response from the peer. It contains
IPSec policy chosen by the peer and peer’s proxy ID. This is a next place where something can go
wrong if the Proxy IDs are different on both sides of the tunnel. The router cross-checks if its Proxy
ID is a mirrored peer’s Proxy ID.
*Mar 1 00:19:48.559: ISAKMP (0:1001): received packet from 20.1.15.1 dport 500 sport 500
Global (I) QM_IDLE
“The state of IKE is “QM_IDLE”. This indicates that the ISAKMP SA is idle. It remains authenticated with its peer and may
be used for subsequent quick mode exchanges. It is in a quiescent state. “
185
CCIE SECURITY V5
*Mar 1 00:19:48.571: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
“The routers are negotiating parameters for IPSec tunnel which will be used for traffic transmission. These parameters
are defined by “crypto ipsec transform-set” command. Note that lifetime values of IPSec SA are visible at this moment.
You are able to set it both: globally or in the crypto map entry.
“Attr are acceptable” indicates that IPSec parameters
defined as IPSec transform-set match at the both sides. “
The IPSec SA have been created and inserted in the router’s security associations database (SADB). SAs are distinguished
by SPI values which are also used to differentiate many tunnels terminated on the same router. Note that two SPI values
are generated for one tunnel: one SPI for inbound SA and one SPI for outbound SA. SPI value is inserted in the ESP header
of the packet leaving the router. At the second side of the tunnel, SPI value inserted into the ESP header enables the
router to reach parameters and keys which have been dynamically agreed during IKE negotiations or session key
refreshment in case of lifetime timeout. The SPI value is an index of entities in the router’s SADB.
All the negotiations have been completed. The tunnel is up and ready to pass the traffic.
187
CCIE SECURITY V5
*Mar 1 00:16:09.371: ISAKMP (0:0): received packet from 20.1.14.1 dport 500 sport 500
Global (N) NEW SA
*Mar 1 00:16:09.375: ISAKMP: Created a peer struct for 20.1.14.1, peer port 500
188
CCIE SECURITY V5
*Mar 1 00:16:09.403: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
*Mar 1 00:16:09.403: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
*Mar 1 00:16:09.407: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
189
CCIE SECURITY V5
*Mar 1 00:16:09.427: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
*Mar 1 00:16:09.431: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
*Mar 1 00:16:09.435: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
190
CCIE SECURITY V5
*Mar 1 00:16:09.447: ISAKMP:(0): sending packet to 20.1.14.1 my_port 500 peer_port 500
(R) MM_SA_SETUP
*Mar 1 00:16:09.751: ISAKMP (0:0): received packet from 20.1.14.1 dport 500 sport 500
Global (R) MM_SA_SETUP
191
CCIE SECURITY V5
*Mar 1 00:16:10.563: ISAKMP (0:1001): received packet from 20.1.14.1 dport 500 sport 500
Global (R) MM_KEY_EXCH
next-payload : 8
type :1
address : 20.1.14.1
protocol : 17
port : 500
192
CCIE SECURITY V5
length : 12
authenticated
authenticated
bring down existing phase 1 and 2 SA's with local 20.1.15.1 remote 20.1.14.1 remote port
500
next-payload : 8
193
CCIE SECURITY V5
type :1
address : 20.1.15.1
protocol : 17
port : 500
length : 12
*Mar 1 00:16:10.655: ISAKMP (0:1001): received packet from 20.1.14.1 dport 500 sport 500
Global (R) QM_IDLE
194
CCIE SECURITY V5
*Mar 1 00:16:10.663: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
195
CCIE SECURITY V5
*Mar 1 00:16:10.703: ISAKMP (0:1001): received packet from 20.1.14.1 dport 500 sport 500
Global (R) QM_IDLE
196
CCIE SECURITY V5
Verification:
C-id Local Remote I-VRF Status Encr Hash Auth DH Lifetime Cap.
interface: FastEthernet0/0
197
CCIE SECURITY V5
This command shows information regarding the interfaces and defined crypto.
The proxies (source and destination of interesitng traffic) are displayed. “0/0” after IP address and netmask indicates
that IP protocol is transported in the tunnel.
PERMIT, flags={origin_is_acl,}
#pkts encaps: 4, #pkts encrypt: 4, #pkts digest: 4
#pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4
Very important output usefull for the IPSec debugging and troubleshooting. This indicates that outgoing packets are:
encapsulated by ESP, encrypted and digested (the hash has been made to discover any alterations). The second marked
line indicates that incomming packets are: decapsulated (the IPSec header have been extracted), decrypted and
hash/digest has been verified.
198
CCIE SECURITY V5
This output contains useful information relevant to unidirectional SA. This shows the following: used IPSec protocol
(ESP), SPI value, used transform-set (encryption algorithm along with hash function), ESP mode (tunnel or transport),
connection ID, crypto map and lifetime values in second and kilobytes which remains to session key refreshment
(tunnel will be terminated instead of key refreshment if no packets need to be transported via tunnel when SA expired).
inbound ah sas:
outbound ah sas:
fvrf/address: (none)/20.1.15.1
protocol: ESP
spi: 0x1BCBC824(466339876)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2, flow_id: SW:2, crypto map: CMAP
sa timing: remaining key lifetime (k/sec): (4496797/3399)
IV size: 16 bytes
replay detection support: Y
Status: ACTIVE
2 Pregen Group 5 --
The Diffie-Hellman group and the time that remains to next DH key generation.
LAB-SETUP
Configure R51, R54 & R52(ISP) with the IP mentioned in the table
Configure the telnet on the respective routers using password “cisco”
For the Internet, configure the Default routes on R51 and R53 with the next hop as corresponding interface
IP of R52.
Device Interface IP
201
CCIE SECURITY V5
Loopback0 14.14.14.14/24
Configure basic Site to Site IPSec VPN in Aggressive Mode to protect traffic between IP addresses 14.14.14.14
and 16.16.16.16 using the following policy:
Configuration on Router: -
R51:
202
CCIE SECURITY V5
hostname R51
interface gi2
no shut
interface loop 0
R54:
hostname R54
interface gi1
no shut
interface loop 0
203
CCIE SECURITY V5
R52:
hostname R52
interface gi2
no shut
interface gi5
no shut
Verification
R51#ping 20.1.16.1
!!!!!
204
CCIE SECURITY V5
Configuration on Routers:
R51:
encr 3des
hash md5
authentication pre-share
group 2
lifetime 1800
mode tunnel
205
CCIE SECURITY V5
R54:
encr 3des
hash md5
authentication pre-share
group 2
lifetime 1800
mode tunnel
206
CCIE SECURITY V5
207
CCIE SECURITY V5
LAB-SETUP
Configure R51[CA], R53, R54, R52[ISP] with the IP mentioned in the table
Configure the telnet on the respective routers using password “cisco”
For the Internet, the BGP configuration should be as follows.
o R51 is in the BGP AS 3
Device Interface IP
208
CCIE SECURITY V5
Configuration on Routers:
R51(CA):
interface gi1
no shut
interface loop 0
router bgp 3
R53:
interface gi1
209
CCIE SECURITY V5
no shut
interface loop 1
router bgp 4
network 192.168.14.0
R54:
interface gi1
no shut
interface loop 1
210
CCIE SECURITY V5
router bgp 5
network 192.168.15.0
R52(ISP):
interface gi3
no shut
interface gi5
no shut
interface gi1
no shut
211
CCIE SECURITY V5
interface loop0
Verification:
R51#ping 20.15.15.1
!!!!!
R51#ping 20.14.14.1
212
CCIE SECURITY V5
!!!!!
R51#ping 20.13.13.1
!!!!!
213
CCIE SECURITY V5
20.13.13.1 4 3 18 21 9 0 0 00:11:54 2
20.14.14.1 4 4 17 21 9 0 0 00:11:57 1
20.15.15.1 4 5 10 15 9 0 0 00:04:58 1
To ensure all devices in the network have the same time configure NTP server on R51.
The server should authenticate the clients with a password of “cisco”.
Configure rest of devices as NTP clients to the R51 as NTP source.
Make sure the time zone for all the device is PST with zone name as ccnp.
Configuration on Router
R51:
ntp authenticate
ntp trusted-key 1
ntp master 1
214
CCIE SECURITY V5
ntp authenticate
ntp trusted-key 1
Verification
nominal freq is 250.0000 Hz, actual freq is 250.0000 Hz, precision is 2**10
215
CCIE SECURITY V5
216
CCIE SECURITY V5
The server should have self-signed certificate with a lifetime of 5 years and grant certificates to the clients
with a lifetime of 3 years.
Configuration on Router
R51:
ip http server
217
CCIE SECURITY V5
grant auto
no shutdown
Password: Sanfran@1234
Verification
218
CCIE SECURITY V5
Status: enabled
State: enabled
Certificate uses for IPSec authentication should have at least 1024 bytes keys with rsa key as r53 and r54
Configure trustpoint with name trustr53 & trustr54
Configuration on Router
R53:
219
CCIE SECURITY V5
Ip http server
ip domain-name cisco.com
ip name-server 150.1.7.164
revocation-check none
rsakeypair r53
220
CCIE SECURITY V5
For security reasons your password will not be saved in the configuration.
Password:
Re-enter password:
% Include the router serial number in the subject name? [yes/no]: yes
% Skipping IP address
221
CCIE SECURITY V5
% The 'show crypto pki certificate verbose trustr53' command will show the
fingerprint.
R54:
Ip http server
ip domain-name cisco.com
ip name-server 150.1.7.164
revocation-check none
rsakeypair r54
For security reasons your password will not be saved in the configuration.
Password:
Re-enter password:
% Include the router serial number in the subject name? [yes/no]: yes
223
CCIE SECURITY V5
% The 'show crypto pki certificate verbose trustr54' command will show the
fingerprint.
Configuration on Route
R53
encr aes
authentication rsa-sig
group 2
224
CCIE SECURITY V5
mode tunnel
set transform-set ts
reverse-route static
int gi1
R54:
encr aes
authentication rsa-sig
group 2
mode tunnel
225
CCIE SECURITY V5
set transform-set ts
reverse-route static
int gi1
Verification
.!!!!
226
CCIE SECURITY V5
interface: GigabitEthernet1
PERMIT, flags={origin_is_acl,}
227
CCIE SECURITY V5
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet1
spi: 0x23EFC520(602916128)
conn id: 2001, flow_id: CSR:1, sibling_flags FFFFFFFF80004048, crypto map: CMAP
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
inbound ah sas:
228
CCIE SECURITY V5
spi: 0xB76F1473(3077510259)
conn id: 2002, flow_id: CSR:2, sibling_flags FFFFFFFF80004048, crypto map: CMAP
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
outbound ah sas:
LAB-3.3: - GRE
229
CCIE SECURITY V5
Device Interface IP
230
CCIE SECURITY V5
Fa0/1 20.19.19.2/24
Configuration on Routers
R18:
hostname R18
interface f 0/0
no shut
interface loop 0
interface tunnel 0
231
CCIE SECURITY V5
no auto-summary
network 192.168.189.0
network 192.168.18.0
R19:
hostname R19
interface f 0/0
no shut
interface loop 0
232
CCIE SECURITY V5
interface tunnel 0
no auto-summary
network 192.168.189.0
network 192.168.19.0
R21:
hostname R21
interface f 0/0
no shut
interface f 0/1
no shut
233
CCIE SECURITY V5
Verifications:
R18#ping 20.19.19.1
!!!!!
R19#ping 20.18.18.1
!!!!!
234
CCIE SECURITY V5
-------------------------------------------------------------------------------------------------------------------------
R18#ping 192.168.189.19
!!!!!
R19#ping 192.168.189.18
235
CCIE SECURITY V5
!!!!!
-------------------------------------------------------------------------------------------------------------------------
236
CCIE SECURITY V5
Protect the tunnel we configured on the previous task and ensure the traffic passing by the tunnel is
encrypted. Use the following parameters for IPSec protocol:
ISAKMP Parameters
o Authentication : Pre-shared
o Group :5
o Encryption : AES
o Hash : SHA
o Lifetime : 1800
o Key : Netmetric
IPSec Parameters
o Encryption : ESP-AES
o Authentication : ESP-SHA-HMAC
o Lifetime : 1800
Configuration on Routers
R18:
encryption aes
authentication pre-share
hash sha
group 5
237
CCIE SECURITY V5
lifetime 1800
mode transport
set transform-set TS
interface tunnel 0
R19:
encryption aes
authentication pre-share
hash sha
238
CCIE SECURITY V5
group 5
lifetime 1800
mode transport
set transform-set TS
interface tunnel 0
Verifications:
239
CCIE SECURITY V5
K - Keepalives, N - NAT-traversal
C-id Local Remote I-VRF Status Encr Hash Auth DH Lifetime Cap.
Engine-id:Conn-id = SW:2
Engine-id:Conn-id = SW:1
240
CCIE SECURITY V5
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
interface: Tunnel0
241
CCIE SECURITY V5
PERMIT, flags={origin_is_acl,}
spi: 0x9C392EFD(2620993277)
IV size: 16 bytes
Status: ACTIVE
242
CCIE SECURITY V5
inbound ah sas:
spi: 0x93BAD181(2478494081)
IV size: 16 bytes
Status: ACTIVE
outbound ah sas:
243
CCIE SECURITY V5
K - Keepalives, N - NAT-traversal
C-id Local Remote I-VRF Status Encr Hash Auth DH Lifetime Cap.
Engine-id:Conn-id = SW:1
Engine-id:Conn-id = SW:2
244
CCIE SECURITY V5
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
interface: Tunnel0
PERMIT, flags={origin_is_acl,}
245
CCIE SECURITY V5
spi: 0x93BAD181(2478494081)
IV size: 16 bytes
Status: ACTIVE
inbound ah sas:
246
CCIE SECURITY V5
spi: 0x9C392EFD(2620993277)
IV size: 16 bytes
Status: ACTIVE
outbound ah sas:
LAB-3.4: - DMVPN
247
CCIE SECURITY V5
Dynamic Multipoint Virtual Private Network (DMVPN) has been introduced by Cisco in late 2000. This technology has
been developed to address needs for automatically created VPN tunnels when dynamic IP addresses on the spokes are
in use.
In GRE over IPSec (described in the previous lab) both ends of the connection must have static/unchangeable IP address.
It is possible however, to create many GRE Site-to-Site tunnels from company’s branches to the Headquarters. This is
pure Hub-and-Spoke topology where all branches may communicate with each other securely through the Hub.
In DMVPN may have dynamic IP addresses on the spokes, but there must be static IP address on the Hub. There is also
an additional technology used to let the hub know what dynamic IP addresses are in use by the spokes. This is NHRP
(Next Hop Resolution Protocol) which works like ARP but for layer 3. All it does is building a dynamic database stored on
the hub with information about spokes’ IP addresses. Now the Hub knows IPSec peers and can build the tunnels with
them.
The Hub must be connected to many spokes at the same time so there was another issue to solve: how to configure the
Hub to not have many Tunnel interfaces (each for Site-to-Site tunnel with spoke). The answer is: use GRE multipoint type
of tunnel, where we do not need to specify the other end of the tunnel statically.
That being said, there are three DMVPN mutations called phases:
Phase 1: simple Hub and Spoke topology were dynamic IP addresses on the spokes may be used
Phase 2: Hub and Spoke with Spoke to Spoke direct communication allowed
Phase 3: Hub and Spoke with Spoke to Spoke direct communication allowed with better scalability using NHRP
Redirects
All above phases will be described in more detail in the next few labs.
248
CCIE SECURITY V5
LAB-SETUP
Configure R18 (HUB), R19 (Spoke1), R20 (Spoke2), R21 (ISP) with the IP mentioned in the table
For the Internet, the BGP configuration should be as follows.
o R18 is in the BGP AS 3
o R19 is in the BGP AS 4
Device Interface IP
Note: Erase the configuration of Basic GRE from R18 & R19
Configuration on Router
249
CCIE SECURITY V5
R18:
Hostname HUB
interface gi0/0
no shut
interface loop 0
router bgp 3
R19:
Hostname Spoke1
interface gi0/0
no shut
interface loop 0
router bgp 4
R20:
Hostname Spoke2
interface gi0/0
no shut
interface loop 0
router bgp 5
251
CCIE SECURITY V5
R21(ISP):
Hostname ISP
interface gi0/0
no shut
interface gi0/1
no shut
interface gi0/2
no shut
252
CCIE SECURITY V5
Verification
18.18.18.18 4 3 5 7 7 0 0 00:00:12 1
19.19.19.19 4 4 4 6 7 0 0 00:00:31 1
20.20.20.20 4 5 4 6 7 0 0 00:00:40 1
253
CCIE SECURITY V5
Configure Hub-and-Spoke GRE tunnels between R18, R19 and R20, where R18
is acting as a Hub.
Traffic originated from every Spoke’s loopback interface should be transmitted securely via the Hub to the
other spokes.
IP MTU : 1400
Tunnel Authentication Key : 12345
o NHRP Parameters
NHRP ID : 12345
NHRP Authentication key : DMVPN
Configuration on Routers:-
R18 (HUB):
interface tunnel 1
ip mtu 1400
R19 (Spoke1):
interface tunnel 1
255
CCIE SECURITY V5
ip mtu 1400
R20 (Spoke2):
interface tunnel 1
256
CCIE SECURITY V5
ip mtu 1400
Verification:
HUB#show dmvpn
C - CTS Capable
==========================================================================
257
CCIE SECURITY V5
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
HUB#show ip nhrp
258
CCIE SECURITY V5
NHRP Details:
259
CCIE SECURITY V5
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb Target Network
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb Target Network
R18(HUB) :
260
CCIE SECURITY V5
router eigrp 1
network 192.168.18.0
no auto-summary
R19:
router eigrp 1
network 192.168.19.0
no auto-summary
R20:
router eigrp 1
network 192.168.20.0
no auto-summary
Verification:
261
CCIE SECURITY V5
HUB#show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
262
CCIE SECURITY V5
EIGRP is a distance vector routing protocol so we have split horizon issues. The spoke routers don’t see each other’s
networks. Let’s fix this for now:
int tunnel1
no ip split-horizon eigrp 1
Since we use EIGRP between the Hub and the Spokes, we need to disable Split Horizon for that protocol to be able to
send routes gathered from one Spoke to the other Spoke. The Split Horizon rule says: “information about the routing is
never sent back in the direction from which it was received”. This is basic rule for loop prevention.
263
CCIE SECURITY V5
Spoke1#show ip route
a - application route
264
CCIE SECURITY V5
!!!!!
265
CCIE SECURITY V5
192.168.20.0/24
Spoke1#show ip nhrp
266
CCIE SECURITY V5
Configure Hub-and-Spoke GRE tunnels between R18, R19 and R20, where R18
is acting as a Hub.
Traffic originated from every Spoke’s loopback interface should be transmitted securely directly
to the other spokes.
You must use EIGRP dynamic routing protocol to let other spokes know about protected networks.
Use the following settings when configuring tunnels
Tunnel Parameters:
o IP address : 1.1.1.0/24
o IP MTU : 1400
o Tunnel Authentication Key : 12345
NHRP Parameters
o NHRP ID : 12345
o NHRP Authentication key : DMVPN
o NHRP Hub : R18
The difference is in routing protocol behaviour. The DMVPN Phase 2 allows for direct Spoke to Spoke communication.
Hence, one spoke must send the traffic to the other spoke using its routing table information. In DMVPN Phase 1 the
spoke sends all traffic up to the Hub and uses the Hub for Spoke to Spoke communication. However, in DMVPN Phase 2
a spoke must point to the other spoke directly.
This is achieved by changing the routing protocol behaviour. The EIGRP changes next hop in the routing update when
sending it further. So that, the Hub changes the next hop to itself when sending down the routing updates to the Spokes.
This behaviour can be changed by the command “no ip next-hop-self eigrp AS”.
Configuration on Routers: -
268
CCIE SECURITY V5
R18 (HUB):
interface Tunnel1
no ip redirects
ip mtu 1400
no ip next-hop-self eigrp 1
no ip split-horizon eigrp 1
end
The EIGRP changes next hop in the routing update when sending it further. So that, the Hub changes the next hop to itself
when sending down the routing updates to the Spokes. This behaviour can be changed by the command “no ip next-hop-
self eigrp AS”
269
CCIE SECURITY V5
R19 (Spoke1)
interface tunnel 1
ip mtu 1400
int tunnel 1
270
CCIE SECURITY V5
R20 (Spoke2):
interface tunnel 1
ip mtu 1400
271
CCIE SECURITY V5
int tunnel 1
Verification
272
CCIE SECURITY V5
HUB#show dmvpn
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb
273
CCIE SECURITY V5
HUB#ping 1.1.1.2
!!!!!
HUB#ping 1.1.1.3
!!!!!
HUB#show ip nhrp
274
CCIE SECURITY V5
Spoke1#show ip route
275
CCIE SECURITY V5
Known via "eigrp 1", distance 90, metric 310172416, type internal
276
CCIE SECURITY V5
192.168.20.0/24
1.1.1.0/24
attached to Tunnel1
20.20.20.0/24
Spoke1#show ip nhrp
277
CCIE SECURITY V5
(no-socket)
IP Tunnel1 1.1.1.1(11)
0 packets, 0 bytes
epoch 0
sourced in sev-epoch 3
Encap length 28
4500000000000000FF2F718513131313
278
CCIE SECURITY V5
121212122000080000003039
Tun endpt
IP Tunnel1 1.1.1.3(11)
0 packets, 0 bytes
epoch 0
sourced in sev-epoch 3
Encap length 28
4500000000000000FF2F6D8113131313
141414142000080000003039
Tun endpt
279
CCIE SECURITY V5
Configure Hub-and-Spoke GRE tunnels between R18, R19 and R20, where R18
is acting as a Hub.
Traffic originated from every Spoke’s loopback interface should be transmitted securely directly
to the other spokes.
You must use EIGRP dynamic routing protocol to let other spokes know about protected networks.
You must ensure that every traffic is CEF switched.
Use the following settings when configuring tunnels
o Tunnel Parameters:
IP address : 1.1.1.0/24
IP MTU : 1400
Tunnel Authentication Key : 12345
o NHRP Parameters
NHRP ID : 12345
NHRP Authentication key : DMVPN
NHRP Hub : R18
NHRP Holdtime : 5 Minutes
DMVPN Phase 3 is the latest method of configuration. It was introduced by Cisco to fix some disadvantages of Phase 2
like:
- Scalability: Phase 2 allows Hubs daisy-chaining, OSPF single area, limited number of hubs due to OSPF DR/BDR
election
- Scalability: Phase 2 does not allow route summarization on the Hub, all prefixes must be distributed to
all spokes to be able to set up
direct spoke to spoke tunnels.
280
CCIE SECURITY V5
- Performance: Phase 2 sends first packets through the Hub using
process-switching (not CEF) causing
CPU spikes. DMVPN Phase 3 uses two NHRP “hacks” to make it happen:
- NHRP Redirect (HUB) – a new messages send from the Hub to the Spoke to let the Spoke know that
there is a better path to the other spoke than through the Hub
- NHRP Shortcut – a new way of changing (overwriting) CEF information on the Spoke
In DMVPN Phase
3 all Spokes must point to the Hub for the networks behind the other spokes (just like it was in Phase 1).
Packet is sent from Spoke’s 19 network to Spoke’s 20 network via Hub (according to routing table)
Hub routes packet to Spoke2 but in parallel sends back the NHRP Redirect message to Spoke19
containing information about suboptimal path to Spoke20 and tunnel IP of Spoke2
Spoke19 then issues the NHRP Resolution request of Spoke’s 20 NBMA IP address to NHS with
destination IP of Spoke’s 2 tunnel, this NHRP Resolution request is sent targeted to Spoke20 via
NHS (according to routing table) – it is normal hop by hop NHRP forwarding process
Spoke2 after receiving resolution request including NBMA IP of Spoke19 sends the NHRP Resolution
reply directly to Spoke19 – Reply does not traverse the Hub!
Spoke19 after receiving correct NBMA IP of Spoke2 rewrites the CEF entry for destination prefix – this
procedure is called NHRP Shortcut
Spokes don’t trigger NHRP by glean adjacencies but NHRP replies updates the CEF
Configuration on Routers: -
R18 (HUB):
interface Tunnel1
281
CCIE SECURITY V5
no ip redirects
ip mtu 1400
no ip next-hop-self eigrp 1
no ip split-horizon eigrp 1
ip nhrp redirect
NHRP Redirect is a special NHRP message sent by the Hub to the spoke to tell the spoke that there is a better path to the
remote spoke than through the Hub. All it does is enforces the spoke to trigger an NHRP resolution request to IP destination.
The “ip nhrp redirect” command should be configured on the Hub only!
R19 (Spoke1):
interface Tunnel1
no ip redirects
ip mtu 1400
282
CCIE SECURITY V5
ip nhrp shortcut
end
The only difference on the spoke is that the spoke has NHRP Shortcut configured. This will work together with NHRP Redirect
on the Hub to send a new Resolution Request NHRP message and overwrite CEF entry to use direct spoke to spoke tunnel
instead of the Hub. This command should be configured on spokes only.
R20 (Spoke2):
interface Tunnel1
no ip redirects
283
CCIE SECURITY V5
ip mtu 1400
ip nhrp shortcut
end
284
CCIE SECURITY V5
HUB#show ip route
a - application route
285
CCIE SECURITY V5
HUB#show ip nhrp
Before PING
Spoke1#show ip route
286
CCIE SECURITY V5
a - application route
287
CCIE SECURITY V5
192.168.20.0/24
Before PING
Spoke1#show ip nhrp
!!!!!
288
CCIE SECURITY V5
192.168.20.0/24
Spoke1#show ip nhrp
(no-socket)
289
CCIE SECURITY V5
(no-socket)
The NHRP datatbase shows new dynamic entries for the remote spoke and the “local” entry for Spoke which is created
when sending an NHRP resolution reply.
Spoke1#show ip route
a - application route
290
CCIE SECURITY V5
291
CCIE SECURITY V5
a - application route
292
CCIE SECURITY V5
Configuration on ASA
ASA1v
int gi0/0
nameif outside
no sh
294
CCIE SECURITY V5
int gi0/1
nameif inside
no sh
router eigrp 1
GigabitEthernet0/0 outside 0
295
CCIE SECURITY V5
domain-name cisco.com
enrollment self
keypair ccnp
296
CCIE SECURITY V5
subject-name CN=asa1.cisco.com
% Include the device serial number in the subject name? [yes/no]: yes
vpn-idle-timeout 1440
vpn-session-timeout 1440
vpn-tunnel-protocol ssl-clientless
webvpn
exit
297
CCIE SECURITY V5
default-group-policy ccnp
webvpn
enable outside
tunnel-group-list enable
Repeat Task 1.3 for ASDM image as, we cannot create the bookmarks from the CLI.
298
CCIE SECURITY V5
299
CCIE SECURITY V5
300
CCIE SECURITY V5
301
CCIE SECURITY V5
302
CCIE SECURITY V5
303
CCIE SECURITY V5
from the client-pc open the internet explorer and give https://20.1.1.1
304
CCIE SECURITY V5
305
CCIE SECURITY V5
306
CCIE SECURITY V5
Public IP : 20.1.1.6
Protocol : Clientless
Duration : 0h:02m:18s
Inactivity : 0h:00m:00s
308
CCIE SECURITY V5
Configure the ASA1 with the following IP address and nameif mentioned in the above diagram
Use Eigrp as the routing protocol between the ASA1 and DC-Router and advertise the 10.1.10.0/24
network with AS 1.
Your configuration should meet the following requirements on ASA1V:
The tunnel should negotiate IKEv2 policy and IPsec proposal for AES-256 encryption.
The tunnel should only secure traffic for server1 and server2.
The client address pool should be 100.10.1.1-100.10.1.10/24.
The session tunnel should remain connected for 24 hours even without any activity.
The connection profile name should be “ConnectionP”
The group alias for the session should be “ccnpprofile”.
The trustpoint for the implementation should be named “trust” using RSA key pair “ccnp”
ASA should authenticate the session locally for Credential :- username cisco password cisco.
Use the FireFox browser to test your connectivity with server1 and server2
Any information not
provided for this task can be assumed by the candidate.
For detail solution please refer to the “avi” file uploaded on the resource portal
Configuration on ASA1: -
R27(KS):
Ip vrf mgmt
309
CCIE SECURITY V5
rd 20:20
GET VPN is a technology used to encrypt traffic going through unsecured networks. It leverages
IPSec protocol suite to enforce Integrity and Confidentiality of data. Typical GET deployment
consists a router called Key Server (KS) and a couple of routers called Group Members (GMs). The
KS is used to create, maintain and send a “policy” to GMs. The policy is an information what traffic
should be encrypted by GM and what encryption algorithms must be used. The most important
function of KS is generation of encryption keys. There are two keys used:
TEK – Transport Encryption Key – used by GM to encrypt the data
KEK – Key Encryption Key –
used to encrypt information between KS and GM
A very important aspect of GET is that it does
310
CCIE SECURITY V5
not set up any IPSec tunnels between GMs! It is NOT like DMVPN. Every GM has the policy (what
to encrypt, what encryption algorithm to use, what key is used by the encryption algorithm) and
just encrypt every packet conforming its policy and sends it out to the network using ESP
(Encapsulated Security Payload). Note that it uses original IP addresses to route the packet out
(this is called IP Header Preservation mechanism), hence the packet can be routed towards every
other router in the network as long as the routing table has such information.
Notes:
Prefer to the topology for addressing VLAN and EIGRP routing information. SW_GET is
preconfigured for this task.
Configuration on Routers: -
311
CCIE SECURITY V5
R27(KS):
Ip vrf mgmt
rd 20:20
Interface fa0/0
ip vrf forwarding mgmt
First we need RSA keys to be used by our KS for Rekey process. The KS must send out a new TEK (and KEK) before TEK is
expired (default is 3600 seconds). It does this in so-called Rekey phase. This phase is authenticated and secured by ISAKMP
SA which is established between KS and GM. This ISAKMP uses GDOI messages (think of this like a mutation of IKE) to build
SA and encrypt GM registration. The GDOI uses UDP/848 instead of UDP/500 like IKE does. The RSA keys are used to
authenticated the KS to GM in the Rekey process.
Remember that to generate new RSA keys you must have Hostname and
Domain-name configured on the router.
ip domain-name cisco.com
312
CCIE SECURITY V5
Then we need ISAKMP parameters, just like in regular IPSec configuration. Pre-shared key must be specified on both KS and
GM to be able to authenticate. This will be used to establish ISAKMP SA to secure further GDOI messages.
authentication pre-share
encryption aes
group 5
exit
The IPSec parameters must be configured on KS. These parameters are not used by KS itself. They are part of policy that will
be send down to the GMs. The IPSec profile tells the GM what encryption algorithm use.
Now it’s time to configure KS. To do that we need to specify The Group. One KS may have many groups and each group may
have different security policy.
server local
313
CCIE SECURITY V5
Here we need to specify Rekey parameters. The Rekey phase can be performed in two ways:
- Unicast Rekey – when we do not have multicast support in our infrastructure (may be a case when ISP
does not support multicast in its IP VPN cloud). The KS sends down a Rekey packet to every GM it knows of.
- Multicast Rekey – when we have multicast ready infrastructure, then we can enable multicast Rekey and
the KS generates only one packet and sends it down to all GMs at one time
Now it’s time to configure policy for our GMs. Encryption policy is created by IPSec Profile configured earlier. To tell the
GMs what packets they should encrypt, we need another ACL (extended this time). Our ACL is named site_a. The last
parameter important is KS’s IP address. This parameter must as well be send don to the GMs as KS may be run on different
IP address (like Loopback).
sa ipsec 1
profile IPSPROFILE
match address ipv4 site_a
address ipv4 20.1.20.3
identity number 20
server local
314
CCIE SECURITY V5
sa ipsec 1
profile IPSPROFILE
match address ipv4 site_b
address ipv4 20.1.20.3
R29(GM):
Hostname R29
int gi0/0
no sh
315
CCIE SECURITY V5
ip vrf mgmt
rd 20:20
ip vrf site_a
rd 100:100
ip vrf site_b
rd 200:200
interface Loopback100
ip vrf forwarding site_a
ip address 192.168.29.29 255.255.255.255
interface Loopback200
interface gi0/0.20
encapsulation dot1Q 20
ip vrf forwarding mgmt
316
CCIE SECURITY V5
interface gi0/0.100
encapsulation dot1Q 100
ip vrf forwarding site_a
interface gi0/0.200
encapsulation dot1Q 200
ip vrf forwarding site_b
router eigrp 55
address-family ipv4 vrf site_a autonomous-system 505
317
CCIE SECURITY V5
network 192.168.29.0
exit-address-family
R30(GM):
Hostname R30
int gi0/0
no sh
ip vrf mgmt
rd 20:20
ip vrf site_a
rd 100:100
ip vrf site_b
rd 200:200
318
CCIE SECURITY V5
key 1
key-string ccnp
interface Loopback100
ip vrf forwarding site_a
ip address 192.168.30.30 255.255.255.255
interface Loopback200
interface gi0/0.20
encapsulation dot1Q 20
ip vrf forwarding mgmt
interface gi0/0.100
encapsulation dot1Q 100
ip vrf forwarding site_a
319
CCIE SECURITY V5
interface gi0/0.200
encapsulation dot1Q 200
ip vrf forwarding site_b
router eigrp 55
network 192.168.30.0
exit-address-family
Verification:
Configuration on R29: -
R29 is our first GM. We need the following to be configured on every GM:
- ISAKMP policy and pre-shared key (in case of PSK) - the Group to which the GM needs to be registered to
- (optional) ACL
to exclude some traffic from encryption
323
CCIE SECURITY V5
authentication pre-share
encryption aes
group 5
exit
int gi0/0.100
crypto map site_a
int gi0/0.200
Configuration on R30:
authentication pre-share
encryption aes
group 5
exit
325
CCIE SECURITY V5
int gi0/0.100
crypto map site_a
int gi0/0.200
crypto map site_b
326
CCIE SECURITY V5
Group Identity : 10
Group Members :2
IPSec SA Direction : Both
Active Group Server : Local
Group Rekey Lifetime : 86400 secs
Group Rekey
Remaining Lifetime : 86224 secs
Rekey Retransmit Period : 10 secs
Rekey Retransmit Attempts :2
Group Retransmit
Remaining Lifetime : 0 secs
IPSec SA Number :1
IPSec SA Rekey Lifetime : 3600 secs
Profile Name : IPSPROFILE
Replay method : Count Based
Replay Window Size : 64
SA Rekey
Group Identity : 20
Group Members :2
IPSec SA Direction : Both
Active Group Server : Local
Group Rekey Lifetime : 86400 secs
Group Rekey
Remaining Lifetime : 86195 secs
Rekey Retransmit Period : 10 secs
Rekey Retransmit Attempts :2
Group Retransmit
Remaining Lifetime : 0 secs
IPSec SA Number :1
328
CCIE SECURITY V5
SA Rekey
Remaining Lifetime : 3396 secs
ACL Configured : access-list site_b
spi : 0x26778C2AF4A83B1747C42DAC7CEA8D6
spi : 0x91BA0BFE365FEBEB1CF752BBD5C726ED
330
CCIE SECURITY V5
See both keys: TEK and KEK.
KEK – for Rekey encryption, default lifetime 24 hours, default enrytpion algorithm 3DES
TEK
– for traffic encryption between GMs, default lifetime 1 hour, encryption elgorith depends on configured policy (no
defaults).
Configured ACL:
331
CCIE SECURITY V5
Configured ACL:
Group ID : 10
Rekeys sent :0
Rekeys retries :0
332
CCIE SECURITY V5
Group ID : 10
Rekeys sent :0
Rekeys retries :0
Group ID : 20
333
CCIE SECURITY V5
Rekeys sent :0
Rekeys retries :0
Group ID : 20
Rekeys sent :0
Rekeys retries :0
Retransmit period : 10
Number of retransmissions :2
Retransmit period : 10
Number of retransmissions :2
We have configured that for Rekey phase. It is very important for Unicast Rekey that KS will retransmit Rekey message if it
335
CCIE SECURITY V5
Note that ISAKMP SA is established between KS and GMs only. There is no ISAKMP SA between GMs.
No SAs found
There are no IPSec SA between KS and GMs. All is done using ISAKMP SA. After IKE Phase 1 establishes the SA, the GDOI
protocol uses it for GM Registration and Rekey.
On R29
336
CCIE SECURITY V5
fvrf/ivrf : mgmt/mgmt
Version : 1.0.17
Succeeded registration :1
Attempted registration :1
337
CCIE SECURITY V5
fvrf/ivrf : mgmt/mgmt
Version : 1.0.17
Succeeded registration :1
Attempted registration :1
338
CCIE SECURITY V5
interface: GigabitEthernet0/0.100
340
CCIE SECURITY V5
Group: site_a
PERMIT, flags={}
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0.100
spi: 0xD17F4FD5(3514781653)
341
CCIE SECURITY V5
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
inbound ah sas:
spi: 0xD17F4FD5(3514781653)
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
342
CCIE SECURITY V5
outbound ah sas:
Group: site_a
PERMIT, flags={}
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0.100
343
CCIE SECURITY V5
spi: 0xD17F4FD5(3514781653)
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
inbound ah sas:
spi: 0xD17F4FD5(3514781653)
344
CCIE SECURITY V5
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
outbound ah sas:
interface: GigabitEthernet0/0.200
Group: site_b
PERMIT, flags={}
345
CCIE SECURITY V5
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0.200
spi: 0xD4615608(3563148808)
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
346
CCIE SECURITY V5
inbound ah sas:
spi: 0xD4615608(3563148808)
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
outbound ah sas:
347
CCIE SECURITY V5
Group: site_b
PERMIT, flags={}
plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb GigabitEthernet0/0.200
spi: 0xD4615608(3563148808)
348
CCIE SECURITY V5
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
inbound ah sas:
spi: 0xD4615608(3563148808)
IV size: 16 bytes
Status: ACTIVE(ACTIVE)
349
CCIE SECURITY V5
outbound ah sas:
!!!!!
interface: GigabitEthernet0/0.100
Group: site_a
350
CCIE SECURITY V5
PERMIT, flags={}
!!!!!
interface: GigabitEthernet0/0.200
Group: site_b
351
CCIE SECURITY V5
PERMIT, flags={}
Configuration of Routers: -
R14:
hostname R14
interface gi0/0
352
CCIE SECURITY V5
interface Loopback1
ip address 192.168.1.1 255.255.255.0
R15:
hostname R15
interface GigabitEthernet0/0
interface Loopback1
353
CCIE SECURITY V5
R16:
interface GigabitEthernet0/0
ip address 1.1.1.10 255.255.255.0
no sh
interface GigabitEthernet0/1
Configure the IKEv2 proposal, policy, profile and keyring for the secure communication between
the 192.168.1.1 and 192.168.2.2 device on R14 and R15 respectively.
Configuration of Routers
R14: -
354
CCIE SECURITY V5
integrity md5
group 2
int gi0/0
R15: -
crypto ikev2 proposal ccnp-pro
encryption aes-cbc-128
integrity md5
group 2
proposal ccnp-pro
356
CCIE SECURITY V5
pre-shared-key cisco
int gi0/0
crypto map CMAP
DH_GROUP_1024_MODP/Group 2
Proposal : default
Ref Count :2
Match criteria:
Fvrf : global
359
CCIE SECURITY V5
NAT-keepalive : disabled
Ivrf : none
Virtual-template : none
mode auto : none
AAA AnyConnect EAP authentication mlist : none
AAA EAP authentication mlist : none
360
CCIE SECURITY V5
interface: GigabitEthernet0/0
Crypto map tag: CMAP, local addr 1.1.1.1
spi: 0xF0070CCE(4026993870)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
conn id: 2, flow_id: SW:2, sibling_flags 80000040, crypto map: CMAP
sa timing: remaining key lifetime (k/sec): (4162318/3067)
IV size: 16 bytes
inbound ah sas:
362
CCIE SECURITY V5
spi: 0x2BDF8145(736067909)
transform: esp-aes esp-sha-hmac ,
in use settings ={Tunnel, }
outbound ah sas:
Section 4 – ISE
363
CCIE SECURITY V5
Describe Cisco ISE architecture, installation, and distributed deployment options
Configure Network
Access Devices (NADs), policy components, and basic authentication and authorization policies in Cisco
ISE - Implement Cisco ISE web authentication and guest services
Deploy Cisco ISE profiling, posture and
client provisioning services
Describe administration, monitoring, troubleshooting, and TrustSec SGA
security
364
CCIE SECURITY V5
Verify the Cisco ISE with the following IP address and setup using CLI
365
CCIE SECURITY V5
Device Interface IP
R1 MGMT 150.1.7.163
Activity Procedure
Step 1: - Access the Cisco ISE console according to your lab access procedures provided by
your instructor
Step 2: - At the login prompt, enter a username of admin and password of Sanfran@1234
Netmetric-ISE/admin#
366
CCIE SECURITY V5
Step 1: -Enter the following command and observe the following output and the status of
the services.
--------------------------------------------------------------------------------------------
367
CCIE SECURITY V5
VA Database disabled
VA Service disabled
If there is any other state than “is running” it means that there is something wrong with a
particular ISE subsystem/process. To fix that you can try to restart ISE application using
“application stop ise” and then “application start ise”. Be patient as it is going to take some
time.
Step 1: - Verify NTP synchronization. At the command prompt, type the following command:
368
CCIE SECURITY V5
Step 1: - Observe the following output paying attention to the * at the beginning of the line
and the text above indicating “synchronized to NTP Server...”
Step 2: - Verify DNS Name Resolution. At the command prompt enter the following
command:
369
CCIE SECURITY V5
;; QUESTION SECTION:
;ISE-P.cisco.com. IN ANY
;; ANSWER SECTION:
ISE-P.cisco.com. 3600 IN A 150.1.7.179
Cisco ISE is an application installed on underlying operating system called as Cisco ADE. Once
your connected with the ADE we must check what applications are installed. Then we can
use application name
<name> <Description>
370
CCIE SECURITY V5
---------------------------------------------
Version: 2.4.0.357
“The main version is 2.4 and the patch level is 357. The build depends on the development
stage. By default, the ISE is in Evaluation mode of 90 days. You can install production license
or use the evaluation license. We do not need to provide any license file for ISE to be
working.”
GigabitEthernet 0
flags=4163<UP, BROADCAST, RUNNING, MULTICAST> mtu 1500
inet 150.1.7.179 netmask 255.255.255.0 broadcast 150.1.7.255
inet6 fe80::20c:29ff:fe11:61bf prefixlen 64 scopeid 0x20<link>
ether 00:0c:29:11:61:bf txqueuelen 1000 (Ethernet)
RX packets 736959 bytes 69764199 (66.5 MiB)
RX errors 0 dropped 763 overruns 0 frame 0
TX packets 393432 bytes 523838004 (499.5 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
GigabitEthernet 1
flags=4098<BROADCAST, MULTICAST> mtu 1500
ether 00:0c:29:11:61:c9 txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
371
CCIE SECURITY V5
GigabitEthernet 2
flags=4098<BROADCAST, MULTICAST> mtu 1500
ether 00:0c:29:11:61:d3 txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
GigabitEthernet 3
flags=4098<BROADCAST, MULTICAST> mtu 1500
ether 00:0c:29:11:61:dd txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
Make sure that we see RX and TX packet and no error counters increasing. This is the first
indicator that something can be wrong with connectivity. If we do not see giga0 interface
that usually means the interface is down. We may see more interfaces depending on ISE
installation. Some interfaces may be used for profiling services.
Step 4: - Check the name server and domain configuration. Verify if the DNS works asking to
resolve the FQDN of Netmetric-ISE.cisco.com
hostname Netmetric-ISE
--
ip domain-name cisco.com
--
ip name-server 150.1.7.164
--
username admin password hash
$5$JRiHrdLV$EryTJHf3UBEhVNIb.SWSTvmaGApOkXNJc.0B6HU
QQm0 role admin
373
CCIE SECURITY V5
Activity Verification
You have completed this task when you obtain the following results:
Step 2: - Connect through the GUI and check the license. Open up the web browser (IE or FF)
and enter the following URL https://150.1.7.189 or https://netmetric-ise.cisco.com
Authenticate as admin/Sanfran@1234
Login to the GUI
For detail solution please refer to the “avi” file uploaded on the resource portal
374
CCIE SECURITY V5
Activity Procedure
Connect the GUI with the url https://150.1.7.179 from the Candidate-PC
Connect the GUI with the url https://150.1.7.179 from AD-DNS so that later in the task
we can check, whether the GUI opens from Candidate-PC only.
375
CCIE SECURITY V5
376
CCIE SECURITY V5
377
CCIE SECURITY V5
378
CCIE SECURITY V5
379
CCIE SECURITY V5
380
CCIE SECURITY V5
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Verification
Go Back to Active-Directory and check the ISE gui
381
CCIE SECURITY V5
Create the helpdesk administrative user name “Help_User”with the password Help123, with
“Helpdesk”group and access to operations menu only. You can pre-configured user settings.
Set the following password policy for all the accounts created on the ISE:
o Minimum password length is 6 characters.
o Password must not contain the admin name nor words like “cisco”or “test”.
o Password must contain at least one lowercase alphabetic character and one numeric
382
CCIE SECURITY V5
character.
Activity Procedure
383
CCIE SECURITY V5
384
CCIE SECURITY V5
385
CCIE SECURITY V5
386
CCIE SECURITY V5
387
CCIE SECURITY V5
388
CCIE SECURITY V5
Configure ISE to join Active Directory domain of cisco.com. Use AD user credentials as
administrator/Sanfran@1234 to join the AD domain.
o Use the AD name as “ad-ccnp”with domain as “cisco.com”
o Check the user credentials bob and password as Sanfran@1234 on ISE, by retrieving the
Activity Procedure
390
CCIE SECURITY V5
Credentials
Username: administrator
391
CCIE SECURITY V5
Password: Sanfran@1234
392
CCIE SECURITY V5
393
CCIE SECURITY V5
394
CCIE SECURITY V5
395
CCIE SECURITY V5
Configure new Identity Source Sequence with the name “ccnp_iss”and call the newly added
active directory into this Source Sequence.
Activity Procedure
396
CCIE SECURITY V5
397
CCIE SECURITY V5
Verification
398
CCIE SECURITY V5
Configuration on Router
DC-Router
aaa new-model
399
CCIE SECURITY V5
400
CCIE SECURITY V5
Network Devices
o Add the NAD device
Name : DC-Router
o IP Address : 150.1.7.163
Radius Authentication Password : cisco
401
CCIE SECURITY V5
402
CCIE SECURITY V5
403
CCIE SECURITY V5
Name : Lab_Netmetric
o Add Description as Per your Choice
404
CCIE SECURITY V5
Users
o Click on Add for the New User
405
CCIE SECURITY V5
Name : bob
o Password Type : ad-ccnp
Name : bob
o Password Type : ad-ccnp
Group : Lab_Netmetric
406
CCIE SECURITY V5
407
CCIE SECURITY V5
408
CCIE SECURITY V5
Click on Edit
o Insert new row above
Select Attribute
o Select Existing Condition from Library
409
CCIE SECURITY V5
410
CCIE SECURITY V5
411
CCIE SECURITY V5
Results
o Authorization Profile
Add
412
CCIE SECURITY V5
Name : SSH
o Web Authentication For privilege level 15
413
CCIE SECURITY V5
414
CCIE SECURITY V5
415
CCIE SECURITY V5
Policy
o Authorization
416
CCIE SECURITY V5
Policy
o Authorization Policy
Edit
417
CCIE SECURITY V5
Policy
o Authorization Policy
Edit
Inset New Rule Above or Below
418
CCIE SECURITY V5
Condition
Create New Condition
419
CCIE SECURITY V5
Radius: Nas-IP-Address
Equals
150.1.7.163
Permissions
o Call the SSH Authorization Profile
420
CCIE SECURITY V5
Ping dc-router.cisco.com
422
CCIE SECURITY V5
423
CCIE SECURITY V5
Download the CTS Pac on ASA for environmental data from ISE.
o Download the environment data in every 1 hr
o Re-Authenticate every 4 hr.
o Device-ID password ccnpccnp.
o Encryption Key ccnpccnp.
o Pac time-to-live 1 Day.
Switch will receive the Authentication and Authorization request.
Configure TrustSec-ASA with the following settings:
o Hostname: TrustSec-ASA
o Interface: mg0/0- name - mgmt. - ip 150.1.7.169/24 - sec-level 100
o Interface: gi0/1 – name - dmz – ip 10.100.10.100/24 – sec-level 50
o Interface: gi0/0 – name–inside – ip 10.100.8.100/24 – sec-level 100
Configure the SW_P with the following settings:
o VLAN id (Data) - 80
o VLAN id (Mgmt) - 1
o Int VLAN 80 - 10.100.8.80/24
o Use interface - Gi1/0/2
Configuration on SW_P: -
vlan 80
int vlan 80
Ip add 10.100.8.80 255.255.255.0
no sh
Int gi1/0/2
sw mode trunk
424
CCIE SECURITY V5
no sh
Configuration on TrustSec-ASA: -
hostname Trustsec-ASA
interface Management0/0
management-only
nameif mgmt
security-level 100
ip address 150.1.7.169 255.255.255.0
no sh
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 10.100.8.100 255.255.255.0
no sh
interface GigabitEthernet0/1
nameif dmz
security-level 50
ip address 10.100.10.100 255.255.255.0
no sh
Verification:-
Add the NAD in Cisco ISE and Generate the PAC file. Once done download the pac file
to the TrustSec-ASA.
427
CCIE SECURITY V5
Step 3 : Change the field in Advance TrustSec Settings > TrustSec Pass ccnpccnp
428
CCIE SECURITY V5
Step 8 :- Once the PAC is downloaded, Put it into the C Drive : TFTP-Root folder. Make
sure previous present Pac file should not be there, if there please delete and copy the
new one which is downloaded from the Browser.
Step 9 :- Make sure the TFTP Server is running. It should be Start and before importing
the pac make sure check the ping test with 150.1.7.169
430
CCIE SECURITY V5
431
CCIE SECURITY V5
Accessing tftp://150.1.7.20/TrustSec-ASA.pac...!!!
Writing file disk0:/TrustSec-ASA.pac...
!
360 bytes copied in 0.170 secs
432
CCIE SECURITY V5
PAC-Info:
Valid until: May 27 2019 19:37:12
AID: 7e556b3865dc073012f8d9ce8e29514c
I-ID: TrustSec-ASA
A-ID-Info: ISE
PAC-type: Cisco Trustsec
PAC-Opaque:
000200b800030001000400107e556b3865dc073012f8d9ce8e29514c0006009c00030
100410404a4c36b74fead87b867cfa77d38000000135ce2a26f00093a80e5b06361d8d
f9613bf15b1d1b526cdb2df15c8ea18a6cc3eee42fc1df762054e15925fcb31319e3694
eb10bf0db93e772f225e884b74412afd550e6d74c39cb0a8ad6b10137d08aa1df33594
b0903958f7450a937a77fc5286eb0005ef613be81ce01d459766939922b07e469af0dd
06b104d754e13d3a2244fd1508
Step 13 :- In case it not uploading from the CLI, use ASDM to import the pac
433
CCIE SECURITY V5
434
CCIE SECURITY V5
435
CCIE SECURITY V5
436
CCIE SECURITY V5
437
CCIE SECURITY V5
Authenticate the MAB-PC (Windows 7 host) using the MAC address on SW_P port 2/0/47 in a group of
“NetMetric-Workstation”.
Configure the SW_P to authenticate the MAB-PC on its MAC address.
After authentication, MAB-PC should get the IP from the DHCP pool name as “DATA” from SW_P in
vlan 80 network.
Make sure your implementation of AAA should not impact the console of the SW_P.
Configuration on SW_P: -
Step 1 :- Configure SW_P for the AAA commands and Dot1x configuration
Vlan 80
interface Vlan80
438
CCIE SECURITY V5
default-router 10.100.8.100
aaa new-model
line console 0
key cisco
439
CCIE SECURITY V5
ip routing
ip device tracking
dot1x system-auth-control
interface GigabitEthernet2/0/47
440
CCIE SECURITY V5
mab
no sh
---------------------------------------------------------------------------------------
---------------------
---------------------------------------------------------------------------------------
---------------------
442
CCIE SECURITY V5
443
CCIE SECURITY V5
444
CCIE SECURITY V5
445
CCIE SECURITY V5
Compound Condition
446
CCIE SECURITY V5
447
CCIE SECURITY V5
Save it.
448
CCIE SECURITY V5
449
CCIE SECURITY V5
Session count = 1
450
CCIE SECURITY V5
D - Awaiting Deletion
P - Pushed Session
X - Unknown Blocker
Hardware address/
User name
451
CCIE SECURITY V5
------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------
Enabled interfaces:
Gi2/0/47
452
CCIE SECURITY V5
453
CCIE SECURITY V5
Once the MAB-PC is authenticated in the previous question, create an Authorization Profile “MAB”
allowing it to access in VLAN 80.
ISE should do the authorization on the basis of the NAS-IP-Address of the Switch and with proper Internal
454
CCIE SECURITY V5
455
CCIE SECURITY V5
456
CCIE SECURITY V5
457
CCIE SECURITY V5
458
CCIE SECURITY V5
459
CCIE SECURITY V5
Go to SW_P and remove the vlan and put the port in shut status
460
CCIE SECURITY V5
int gi2/0/47
sh
no sh
461
CCIE SECURITY V5
462
CCIE SECURITY V5
Session count = 1
D - Awaiting Deletion
P - Pushed Session
X - Unknown Blocker
Interface : GigabitEthernet2/0/47
IIF-ID : 0x1070D8000000093
User-Name : 00-50-56-AF-47-0E
Status : Authorized
463
CCIE SECURITY V5
Domain : DATA
Handle : 0x0200000D
Local Policies:
Server Policies:
Method State
Create the ISE-Router with HTTP services to access the Server 3 and Server 4 and create user/password
“cisco/cisco”privledge 15
464
CCIE SECURITY V5
Configuration on ISE-Router
Hostname ISE-Router
interface FastEthernet0/0
no sh
interface Loopback100
interface Loopback200
ip http server
ip http secure-server
465
CCIE SECURITY V5
Configuration on TrustSec-ASA
466
CCIE SECURITY V5
467
CCIE SECURITY V5
468
CCIE SECURITY V5
Create the Security Group Name for the MAB-PC with the name “MAB_CCNP”
469
CCIE SECURITY V5
470
CCIE SECURITY V5
471
CCIE SECURITY V5
472
CCIE SECURITY V5
473
CCIE SECURITY V5
Showing 18 of 18 entries
Auditors 9 unicast
BYOD 15 unicast
Contractors 5 unicast
Developers 8 unicast
Development_Servers 12 unicast
Employees 4 unicast
Guests 6 unicast
MAB_CCNP 16 unicast
Network_Services 3 unicast
PCI_Servers 14 unicast
Point_of_Sale_Systems 10 unicast
Production_Servers 11 unicast
Production_Users 7 unicast
Test_Servers 13 unicast
TrustSec_Devices 2 unicast
Unknown 0 unicast
In Case the TAG is not showing make sure give this command
at port 80.
Create the Object-Group with name MAB_CCNP.
475
CCIE SECURITY V5
alert-interval 300
access-list server3-4 line 1 extended permit tcp security-group name MAB_CCNP(tag=16) 10.100.8.0
255.255.255.0 host 192.168.1.1 eq www (hitcnt=0) 0x99daeb4c
Check
477
CCIE SECURITY V5
478
CCIE SECURITY V5
479
CCIE SECURITY V5
480
CCIE SECURITY V5
Have patience over here, it can take appro 2-3 mins to come up.
----------------------------------------
481
CCIE SECURITY V5
Interface : GigabitEthernet2/0/47
IIF-ID: 0x104F38000000097
User-Name: 00-50-56-AF-47-0E
Status: Authorized
Domain: DATA
Handle: 0xCA000011
Local Policies:
482
CCIE SECURITY V5
Server Policies:
SGT Value: 16
Method State
============================================
483
CCIE SECURITY V5
================================================================
============================================
484
CCIE SECURITY V5
alert-interval 300
User name should be “dot1x_ccnp”with password Cisco123 belongs to group “Dot1x”present in the
Internal Database
Upon successful authentication the user and machine should get full access to the network
Enable 802.1x low impact mode on the port and allow only DHCP, DNS, TFTP and ICMP traffic
o MAB
The switch should time out 802.1x authentication method after 15 seconds.
Configuration on SW_P
remark DHCP
remark DNS
remark TFTP
remark PING
interface GigabitEthernet2/0/47
mab
end
Int gi2/0/47
Ip access-group DEFAULT in
authentication open
spanning-tree portfast
487
CCIE SECURITY V5
interface GigabitEthernet2/0/47
ip access-group DEFAULT in
authentication open
mab
spanning-tree portfast
end
488
CCIE SECURITY V5
489
CCIE SECURITY V5
490
CCIE SECURITY V5
491
CCIE SECURITY V5
492
CCIE SECURITY V5
493
CCIE SECURITY V5
494
CCIE SECURITY V5
495
CCIE SECURITY V5
496
CCIE SECURITY V5
497
CCIE SECURITY V5
498
CCIE SECURITY V5
499
CCIE SECURITY V5
500
CCIE SECURITY V5
501
CCIE SECURITY V5
502
CCIE SECURITY V5
503
CCIE SECURITY V5
504
CCIE SECURITY V5
505
CCIE SECURITY V5
506
CCIE SECURITY V5
507
CCIE SECURITY V5
508
CCIE SECURITY V5
509
CCIE SECURITY V5
Make sure after the connection is established you can browse to “server2.cisco.com” and not
“server1.cisco.com” from “dot1x_pc”.
Re-authentication should be there in every 6 minutes.
Building configuration...
interface GigabitEthernet2/0/47
ip access-group DEFAULT in
authentication open
mab
spanning-tree portfast
end
511
CCIE SECURITY V5
int gi2/0/47
authentication periodic
512
CCIE SECURITY V5
513
CCIE SECURITY V5
514
CCIE SECURITY V5
515
CCIE SECURITY V5
516
CCIE SECURITY V5
517
CCIE SECURITY V5
518
CCIE SECURITY V5
519
CCIE SECURITY V5
520
CCIE SECURITY V5
SW2_P(config)#int gi2/0/47
SW2_P(config-if)#shut
521
CCIE SECURITY V5
interface GigabitEthernet2/0/47
ip access-group DEFAULT in
shutdown
authentication open
authentication periodic
mab
spanning-tree portfast
end
SW2_P(config)#int gi2/0/47
SW2_P(config-if)#no sh
522
CCIE SECURITY V5
523
CCIE SECURITY V5
524
CCIE SECURITY V5
525
CCIE SECURITY V5
Interface: GigabitEthernet2/0/47
IIF-ID: 0x1035FC0000000FA
User-Name: dot1x_ccnp
Status: Authorized
Domain: DATA
Handle: 0x41000074
Local Policies:
Server Policies:
Method State
make sure on the Trustsec-ASA give an acl which permit all TCP connections
527
CCIE SECURITY V5
528
CCIE SECURITY V5
529
CCIE SECURITY V5
530
CCIE SECURITY V5
531
CCIE SECURITY V5
532
CCIE SECURITY V5
o Hostname : ccnpap
o IP : 10.100.202.100
o Default Gateway : 10.100.202.1
o Primary Controller : ccnp_wlc
o Controller Ip : 10.100.202.1
o Username : cisco
o Password : Cisco
o Enable Password : Cisco
IP Address 10.100.202.100
IP netmask 255.255.255.0
o Mode : Access
o Int vlan : 10.100.202.11/24
vlan 202
no sh
int gi2/0/7
sw mode access
no sh
SW2_P#show ip int br
SW2_P#ping 10.100.202.100
.!!!!
If ping not working go back to AP and check it should be up and running, not in booting
phase.
o Hostname : WLC
Enter the wlc with the username and password mentioned in the reference sheet
Reset the controller with the command reset, Hit enter and then system. We can give
one command also reset system also.
Once done, the system will reboot and once the wlcv is up give the username as
Recover-Config
Once the system will come’s up again after the reboot star giving the details from the
task.
Ignore the messages coming in between: Give the system name as WLC
536
CCIE SECURITY V5
537
CCIE SECURITY V5
Configure the WLC so that we can take the GUI of the WLC
538
CCIE SECURITY V5
540
CCIE SECURITY V5
-------------------------------------------
541
CCIE SECURITY V5
542
CCIE SECURITY V5
543
CCIE SECURITY V5
interface GigabitEthernet2/0/7
end
Remove the vlan 202 and add the mab commands on the interface
interface GigabitEthernet2/0/7
544
CCIE SECURITY V5
mab
end
After giving the commands on the switch, have patience, AP take a while to come up.
545
CCIE SECURITY V5
546
CCIE SECURITY V5
Once Done go back to switch and bounce the interface gi2/0/7. Once done check the
authentication sessions
Interface: GigabitEthernet2/0/7
IIF-ID: 0x1041B00000000C1
User-Name: C8-9C-1D-1B-0B-BA
Status: Authorized
Domain: DATA
Handle: 0xD2000036
Local Policies:
Server Policies:
Method State
Configure the ASA1 with the following IP address and nameif mentioned in the above diagram
Use Eigrp as the routing protocol between the ASA1 and DC-Router and advertise the 10.1.10.0/24
network with AS 1.
Your configuration should meet the following requirements on ASA1V:
.
The tunnel should only secure traffic for server1 and server2.
The client address pool should be 172.16.1.1-172.16.1.20/24.
The session tunnel should remain connected for 24 hours even without any activity.
The connection profile name should be “CP”
The group alias for the session should be “CP”.
The trustpoint for the implementation should be named “trust” using RSA key pair “ccnp”
549
CCIE SECURITY V5
ASA should authenticate the session from radius server ISE (150.1.7.189) for Credential :- username
bob password Sanfran@1234.
Use the FireFox browser to test your connectivity with server1 and server2
Any information not
provided for this task can be assumed by the candidate.
For detail solution please refer to the “avi” file uploaded on the resource portal
550
CCIE SECURITY V5
551
CCIE SECURITY V5
552
CCIE SECURITY V5
553
CCIE SECURITY V5
554
CCIE SECURITY V5
Section 5 – WSA
The Web Security appliance is a robust, secure, efficient device that protects corporate networks
against web-based malware and spyware programs that can compromise corporate security and
555
CCIE SECURITY V5
expose intellectual property. The Web Security appliance includes protection for standard
communication protocols, such as HTTP, HTTPS, and FTP.
Configure WSA installation and bootstrapping. Provide the following information during the
installation process.
o Username/Password :- Admin/ironport
o Hostname :- WSA.cisco.com
o Inteface :- M1
o IP :- 150.1.7.188/24
o Management Access :- HTTP/8081, HTTPS/8443, SSH/22, FTP/21
o Gateway :- 150.1.7.1
For detail solution please refer to the “avi” file uploaded on the resource portal
556
CCIE SECURITY V5
For detail solution please refer to the “avi” file uploaded on the resource portal
For detail solution please refer to the “avi” file uploaded on the resource portal
557
CCIE SECURITY V5
Section 6 – StealthWatch
558
CCIE SECURITY V5
559
CCIE SECURITY V5
560
CCIE SECURITY V5
561