09 - Implementing Firewall Technologies
09 - Implementing Firewall Technologies
09 - Implementing Firewall Technologies
Chapter Four
Implementing Firewall Technologies
• Implement ACLs
• Describe the purpose and operation of firewall
technologies
• Implement CBAC
• Zone-based Policy Firewall using SDM and CLI
Router(config-if)# exit
Extended
r1
r1
R2
Serial 0/0/0
PO
F0/1 P3
R1
R3
PO F0/0
P3
192.168.20.2/24
PC A POP3 Server
Rule types:
• Access Rules
• NAT Rules
• Ipsec Rules
• NAC Rules
• Firewall Rules
• QoS Rules
• Unsupported Rules
• Externally Defined Rules
• Cisco SDM Default Rules
11. Click OK
3. Choose a direction
• Standard IP ACLs
• Extended IP ACLs
• Extended IP ACLs using TCP established
• Reflexive IP ACLs
• Dynamic ACLs
• Time-Based ACLs
• Context-based Access Control (CBAC) ACLs
Serial0/0/0 R Serial0/0/1
2
R R
HT rt Set
1
F0/1 3 F0/1
Po lag
TP wi t
F
S hC
So o
ur ntr
ce ol
R
1
PC A
PC C
192.168.1.3/24
R R
rn o
F0/1
af R
(ACEs)
fic ef
Pe lex
rm ive
R
itt
ed
1
PC A PC C
192.168.1.3/24
r n e ed
R
HT rm
1
TP itte
an d –
d A
DN ll
S
PC A
Dynamic ACL
entry added that
grants user access
R Serial0/0/1
Serial0/0/0 2
PC C
IP packet debugging is on
Inbound
R1(config)#access-list 150 deny ip 0.0.0.0 0.255.255.255 any
R1(config)#access-list 150 deny ip 10.0.0.0 0.255.255.255 any
R1(config)#access-list 150 deny ip 127.0.0.0 0.255.255.255 any
R1(config)#access-list 150 deny ip 172.16.0.0 0.15.255.255 any
R1(config)#access-list 150 deny ip 192.168.0.0 0.0.255.255 any
R1(config)#access-list 150 deny ip 224.0.0.0 15.255.255.255 any
R1(config)#access-list 150 deny ip host 255.255.255.255 any
Outbound
R1(config)#access-list 105 permit ip 192.168.1.0 0.0.0.255 any
Internet
Serial 0/0/0
200.5.5.5/24
F0/1 R1 F0/0
Internet
Serial 0/0/0
200.5.5.5/24
F0/1 R1 F0/0
192.168.20.2/24
R1 PC A
Inbound on S0/0/0
R1(config)#access-list 112 permit icmp any any echo-reply
R1(config)#access-list 112 permit icmp any any source-quench
R1(config)#access-list 112 permit icmp any any unreachable
R1(config)#access-list 112 deny icmp any any
Outbound on S0/0/0
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any echo
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any parameter-problem
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any packet-too-big
R1(config)#access-list 114 permit icmp 192.168.1.0 0.0.0.255 any source-quench
10.1.1.1 200.3.3.3
• IOS Firewall
– Zone-based policy framework for intuitive management
– Instant messenger and peer-to-peer application filtering
– VoIP protocol firewalling
– Virtual routing and forwarding (VRF) firewalling
– Wireless integration
– Stateful failover
– Local URL whitelist and blacklist support
– Application inspection for web and e-mail traffic
Private-DMZ
Policy DMZ
DMZ-Private
Policy Public-DMZ
Policy
Private-Public
Policy
Endpoint security:
Provides identity and device
security policy compliance
Communications security:
Provides information assurance
Network
Perimeter security:
Core
Secures boundaries between
zones
Internet
R
2
Cisco
Serial Serial0/0/1 Router
Cisco Router 0/0/0 F0/ F0/ with
with 0 0 IOS
IOS Firewall R R Firewall
F0/ 1 3 F0/
1 1
F0/ F0/
5 5
S S
F0/6 1 3 F0/1
F0/1 8
F0/1 S
F0/12
8
PC A PC
(RADIUS/TACACS+) C
Fa0/0
S0/0/0
Two-Interface
Three-Interface
Router(config)#
ip inspect name inspection_name protocol [alert {on | off}] [audit-trail
{on | off}] [timeout seconds]
Two Zones
Source Destination
Zone-
interface interface Policy
pair RESULT
member of member of exists?
exists?
zone? zone?
ROUTER YES NO - PASS
ROUTER YES YES NO PASS
policy
ROUTER YES YES YES
actions
YES ROUTER NO - PASS
YES ROUTER YES NO PASS
policy
YES ROUTER YES YES
actions
2. Click Add
2. Click Add
3. Click Next. If the Allow Secure SDM Access check box is checked,
the Configuring Firewall for Remote Access window appears
Click Finish