lab12 1 7

background image

Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX
Security Appliance

Estimated Time: 20 minutes

Number of Team Members: Two teams with four students per team

Objective

In this lab exercise, students will complete the following tasks:

• Display the fixup protocol configurations
• Change the fixup protocol configurations
• Test the outbound File Transfer Protocol (FTP) fixup protocol
• Test the inbound FTP fixup protocol
• Set the fixup protocols to the default settings

Scenario

Some applications embed addressing information into the application data stream and negotiate
randomly picked Transport Control Protocol (TCP) or User Datagram Protocol (UDP) port numbers
or IP addresses. In these cases application aware inspection, fixup, must be performed. This is to
ensure that only proper and expected traffic will be allowed through the filter inspection, in a secure
manner. The fixup function on a PIX Security Appliance allows a network administrator to configure
specific ports used by various applications. In this lab, students will configure fixup for FTP.

1 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

Topology

This figure illustrates the lab network environment.

Preparation

Begin with the standard lab topology and verify the standard configuration on the pod PIX Security
Appliances. Access the PIX Security Appliance console port using the terminal emulator on the
student PC. If desired, save the PIX Security Appliance configuration to a text file for later analysis.

Tools and resources

In order to complete the lab, the standard lab topology is required:

• Two pod PIX Security Appliances
• Two student PCs
• One SuperServer
• Backbone switch and one backbone router
• Two console cables
• HyperTerminal

Additional materials

Further information about the objectives covered in this lab can be found at,

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_62/config/fixup.pdf

.

Additional information on configuring firewalls can be found in, Cisco Secure PIX Firewall” by David
Chapman and Andy Fox (ISBN 1587050358).

Command list

In this lab exercise, the following commands will be used. Refer to this list if assistance or help is
needed during the lab exercise.

2 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

Command

Description

clear fixup

Resets fixup protocol command statements to their
default values.

fixup protocol

Modifies PIX Security Appliance protocol fixups to
add, delete, or change services and feature defaults.
Configuration mode.

no fixup protocol

Delete the PIX Security Appliance protocol fixups
services.

show fixup protocol

Displays the port values for the individual protocol
specified.

Step 1 List the Fixup Protocols

Complete the following step and enter the command as directed to see the current configurations of
the PIX Security Appliance:

a. List the fixup protocols that are running on the PIX Security Appliance:

PixP(config)# show fixup protocol

1. Complete the table with the ports assigned to the fixup protocols:

ftp

http

h323 h225

h323 ras

ils

rsh

rtsp

smtp

sqlnet

sip

skinny

3 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

Step 2

Disable the Fixup Protocols

Complete the following steps and enter the commands as directed to change some of the current
configurations of the PIX Security Appliance:

a. Disable the following fixup protocols:

PixP(config)# no fixup protocol http 80

PixP(config)# no fixup protocol smtp 25

PixP(config)# no fixup protocol h323 h225 1720

PixP(config)# no fixup protocol sqlnet 1521

b. Define a range of ports for SQL*Net connections:

PixP(config)# fixup protocol sqlnet 66-76

c. Verify the fixup protocol settings using the show fixup protocol command:

PixP(config)# show fixup protocol

fixup protocol ftp 21

fixup protocol h323 ras 1718-1719

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol sip 5060

fixup protocol skinny 2000

no fixup protocol http 80

no fixup protocol smtp 25

no fixup protocol h323 h225 1720

fixup protocol sqlnet 66-76

Step 3 Test the Outbound FTP Fixup Protocol

Complete the following steps and enter the commands as directed to test the outbound FTP fixup
protocol:

a. Enable console logging on the PIX Security Appliance:

PixP(config)# logging console debug

PixP(config)# logging on

b. FTP to the backbone server from the student PC using the Windows FTP client:

C:\> ftp 172.26.26.50

User (172.26.26.50:(none)): anonymous

Password: user@

c. Do a directory listing at the FTP prompt:

ftp> dir

2. What logging messages were generated on the PIX Security Appliance console?

_____________________________________________________________________________

4 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

d. Quit the FTP session:

ftp> quit

e. Turn off the FTP fixup protocol on the PIX Security Appliance:

PixP(config)# no fixup protocol ftp

f. Again, FTP to the backbone server from the student PC using the Windows FTP client:

C:\> ftp 172.26.26.50

User (172.26.26.50:(none)): anonymous

Password: user@

3. Was logging into the server successful? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

g. Do a directory listing at the FTP prompt:

ftp> dir

4. Was the file listing displayed? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

h. Quit the FTP session:

ftp> quit

i. If the FTP client has stopped, press Ctrl + C to break back to the C:\ prompt or close the

command prompt window.

j. FTP to the backbone server from the student PC using the web browser. To do this, enter the

following in the URL field:

ftp://172.26.26.50

5. Was the connection successful? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

6. Was the file listing available? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

k. Close the web browser.

5 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

Step 4 Test the Inbound FTP Fixup Protocol

Complete the following steps and enter the commands as directed to test the inbound FTP fixup
protocol:

a. Re-enable the FTP fixup protocol on the PIX Security Appliance:

PixP(config)# fixup protocol ftp 21

b. FTP to a peer pod bastion host from the student PC using the web browser. To do this, enter the

following in the URL field:
ftp://192.168.Q.11

(where Q = peer pod)

The instructor assigns the peer pod number.

7. What logging messages were generated on the PIX Security Appliance console?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

c. Close the web browser.

d. Turn off the FTP fixup protocol on the PIX Security Appliance:

PixP(config)# no fixup protocol ftp

e. FTP to a peer pod bastion host from the student PC using the web browser. To do this, enter the

following in the URL field:
ftp://192.168.Q.11

(where Q = peer pod)

The instructor assigns the peer pod number.

8. Was the connection to the peer pod inside FTP server successful? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

9. Was the file listing available? Why or why not?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

Step 5 Set All Fixups to the Factory Default

Complete the following steps and enter the commands as directed to set all fixups to the factory
default:

a. Set all fixup protocols to the factory defaults:

PixP(config)# clear fixup

b. Verify the fixup protocol settings:

PixP(config)# show fixup protocol

fixup protocol ftp 21

fixup protocol http 80

6 -

7 Fundamentals of Network Security v 1.1 - Lab 12.1.7 Copyright  2003, Cisco Systems, Inc.

background image

fixup protocol h323 h225 1720

fixup protocol h323 ras 1718-1719

fixup protocol ils 389

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol sip 5060

fixup protocol skinny 2000

7 - 7

Fundamentals of Network Security v 1.1 - Lab 12.1.7

Copyright

 2003, Cisco Systems, Inc.


Wyszukiwarka

Podobne podstrony:
Lab12 Applications
lab12 5 1
LAB12
LAB12 Regulator cyfrowy
lab12 RapidPrototyping EN
Lab12 4 1
12 (2), Elektrotechnika AGH, Semestr II letni 2012-2013, Fizyka II - Laboratorium, laborki, laborki
Lab12 RapidPrototyping
Lab12
lab12
TECH INT lab12 2014, Studia - Politechnika Opolska, Semestr 6, Techniki Internetowe
LAB12 , Modu˙ sztywno˙ci
lab12 SWBlab12
lab12
lab12 6 3
lab12 4 3
Lab12 RapidPrototyping
Lab12 13spr, PWr, III semestr, MUD
LAB12, TARASIUK

więcej podobnych podstron