SIC Practical 5
SIC Practical 5
Practical No. 5
Aim: Configuring a Zone-Based Policy Firewall .
Topology:
PCB Config:
R1 Config:
Server Config:
a. On R1, issue the show version command to view the Technology Package license
information.
b. If the Security Technology package has not been enabled, use the following command to
enable the package.
d. Save the running-config and reload the router to enable the security license.
e. Verify that the Security Technology package has been enabled by using the show version
command.
R1(config-sec-zone) # exit
R1(config-sec-zone) # exit
R1(config-ext-nacl) # exit
Use the class-map type inspect command with the match-all option. Use the match access-
group command to match ACL 101.
R1(config-cmap) # exit
1: Create a policy map to determine what to do with matched traffic. Use the policy-map
type inspect command and create a policy map named 101.
The use of the inspect command invokes context-based access control (other options include
pass and drop).
R1(config-pmap-c) #inspect
%No specific protocol configured in class 101 for inspection. All protocols will be inspected
R1(config-pmap-c) #ex
R1(config-pmap) #ex
Using the zone-pair security command, create a zone pair named 101.
2: Specify the policy map for handling the traffic between the two zones.
Attach a policy-map and its associated actions to the zone pair using the service-policy type
inspect command and reference the policy map previously created, 101.
R1(config-sec-zone-pair) # exit
Use the zone-member security command in interface configuration mode to assign gi 0/0 to
internal and gi 0/1 to external.
R3(config-if) # exit
R3(config-if) # exit
From the PC-A command prompt, ping Server at 10.10.10.2. The ping should succeed.
From the Server command prompt, ping PC-A at 192.168.0.3 The ping should fail
Step 2: Check results. Your completion percentage should be 100%. Click Check Results
to see feedback and verification of which required components have been completed.