SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
LAB 14: Cut-Through-Proxy on ASA
Task
1. Configure Cut-Through-Proxy on ASA.
Figure 1 Topology
LAB 14: Cut-Through-Proxy on ASA
Solution
R1
Int f0/0
Ip add 10.0.0.100
No shut
Exit
Ip route 0.0.0.0 0.0.0.0 10.0.0.1
ASA
Int g0
Nameif outside
Ip add 192.168.150.1 255.255.255.0
No shut
Exit
Int g1
Nameif inside
Ip add 10.0.0.1 255.255.255.0
No shut
Exit
Int g2
Nameif dmz
Ip add 192.168.100.1 255.255.255.0
No shut
Exit
Access-list OUT permit icmp any any
Access-group OUT in interface outside
Access-group OUT in interface dmz
(Note: Ping R1 to ISE, R1 to TestPC successfully after above commands.)
LAB 14: Cut-Through-Proxy on ASA
ISE configuration on ASA
Aaa-server ISE protocol radius
Exit
Aaa-server ISE (dmz) host 192.168.100.20
Key cisco
Exit
Virtual telnet 172.16.1.100
access-list OUT extended permit tcp any host 172.16.1.100 eq telnet
access-list CUT extended permit tcp any host 172.16.1.100 eq telnet
aaa authentication match CUT dmz ISE
access-group OUT in interface dmz per-user-override
Verification
1. Telnet 10.0.0.100 from TestPC, It will show failed connection.
2. Telnet 172.16.1.100 from TestPC, It will show successfully connection.
ISE Configuration Steps:
1. Login to authentication on TestPC using browser.
Go to
1. Administrator > Network Resource > Network Device > Add.
Add a Network Device use
Name = ASA
IP Address = 192.168.100.1/32
Location = All Location
Device Type = All Device Types
Authentication Settings:
Protocol = RADIUS
*Shared Secret = cisco
Submit/Save
2. Administrator > Identity Management > Group > User Identity Group > Add
Name = CTP
Submit
LAB 14: Cut-Through-Proxy on ASA
3. Administrator > Identity Management > Identities > Users > Add
Name = test
Password = Cisco@123
Re-Enter Password = Cisco@123
User Groups = CTP
Submit/Save
After this go on Firewall and test your Configuration
Ciscoasa# test aaa-server authentication ISE host 192.168.100.20 username test password Cisco@123
INFO: Attempting Authentication test to IP address <192.168.100.20> (timeout: 12 seconds)
INFO: Authentication Successful
Create Authorization Profile on ISE
1. Policy > Policy Elements > Results > Authorization > Authorization profile > Add.
Name = CTP
Access Type = ACCESS_ACCEPT
Advanced Attributes Settings:
Cisco:cisco-av-pair = ip:inacl#1=permit tcp any any eq 23
Save
2. Policy > Authorization
Click on Edit and then, Click Insert Rules Below
Then name rule as CTP and in ,if column call user from User Identity Group <CTP>,
permission column call Authorization Profile created before which is to be found in Standard
list <CTP>.
Now initiate Telnet Connection from TestPC to Virtual IP 172.16.1.100
Username = test
Password = Cisco@123
It will authenticate Successfully.
Now Check the dynamic access-list on ASA. It will download after successfully connect with
virtual ip.
Now again Telnet from TestPC to R1 host. It will authenticate successfully and you will
connect with R1.
Necessary Commands
1. Sh uauth
2. Clear uauth

Mais conteúdo relacionado

Mais procurados

Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiNetwax Lab
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiNetwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNetwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsNetwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNetwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewallNetwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Netwax Lab
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeNetwax Lab
 
Báo cáo thực tập athena trần trọng thái
Báo cáo thực tập athena   trần trọng tháiBáo cáo thực tập athena   trần trọng thái
Báo cáo thực tập athena trần trọng tháitran thai
 
Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Naoto MATSUMOTO
 

Mais procurados (20)

Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing ProtocolsEincop Netwax Lab: Site 2 Site VPN with Routing Protocols
Eincop Netwax Lab: Site 2 Site VPN with Routing Protocols
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
DMVPN
DMVPNDMVPN
DMVPN
 
Báo cáo thực tập athena trần trọng thái
Báo cáo thực tập athena   trần trọng tháiBáo cáo thực tập athena   trần trọng thái
Báo cáo thực tập athena trần trọng thái
 
Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -Unbreakable VPN using Vyatta/VyOS - HOW TO -
Unbreakable VPN using Vyatta/VyOS - HOW TO -
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 

Destaque

Computer Ports
Computer PortsComputer Ports
Computer PortsNetwax Lab
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionNetwax Lab
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+Netwax Lab
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of NetworkingNetwax Lab
 

Destaque (9)

Switching
SwitchingSwitching
Switching
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
 
Securing Switch Access
Securing Switch Access Securing Switch Access
Securing Switch Access
 
Remote VPN
Remote VPNRemote VPN
Remote VPN
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Radius vs. Tacacs+
Radius vs. Tacacs+Radius vs. Tacacs+
Radius vs. Tacacs+
 
IP Address
IP AddressIP Address
IP Address
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 

Semelhante a Nxll14 cut through-proxy on asa

5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec greSagarR24
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListHamed Moghaddam
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructorSalem Trabelsi
 
ClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
ClickHouse Defense Against the Dark Arts - Intro to Security and PrivacyClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
ClickHouse Defense Against the Dark Arts - Intro to Security and PrivacyAltinity Ltd
 
1.4.2-basic-configuration-with-mikrotik-cli.pdf
1.4.2-basic-configuration-with-mikrotik-cli.pdf1.4.2-basic-configuration-with-mikrotik-cli.pdf
1.4.2-basic-configuration-with-mikrotik-cli.pdfDeivysVargas
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mppSagarR24
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overviewali raza
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdfadityacommunication1
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace securitySagarR24
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A RouterNghiep Lam
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS devicescooby_doo
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)NetProtocol Xpert
 
Cisco asa firewall command line technical guide
Cisco asa firewall command line technical guideCisco asa firewall command line technical guide
Cisco asa firewall command line technical guideMDEMARCOCCIE
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partbSagarR24
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornmentAsif
 
Openstack 101
Openstack 101Openstack 101
Openstack 101POSSCON
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco IosF.l. Yu
 

Semelhante a Nxll14 cut through-proxy on asa (20)

5 ip security ipsec gre
5 ip security ipsec gre5 ip security ipsec gre
5 ip security ipsec gre
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
Cisco CCNA-Standard Access List
Cisco CCNA-Standard Access ListCisco CCNA-Standard Access List
Cisco CCNA-Standard Access List
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
 
Netmiko library
Netmiko libraryNetmiko library
Netmiko library
 
ClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
ClickHouse Defense Against the Dark Arts - Intro to Security and PrivacyClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
ClickHouse Defense Against the Dark Arts - Intro to Security and Privacy
 
1.4.2-basic-configuration-with-mikrotik-cli.pdf
1.4.2-basic-configuration-with-mikrotik-cli.pdf1.4.2-basic-configuration-with-mikrotik-cli.pdf
1.4.2-basic-configuration-with-mikrotik-cli.pdf
 
5 ip security copp-mpp
5 ip security copp-mpp5 ip security copp-mpp
5 ip security copp-mpp
 
Chapter 4 overview
Chapter 4 overviewChapter 4 overview
Chapter 4 overview
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
 
5 ip security dataplace security
5 ip security dataplace security5 ip security dataplace security
5 ip security dataplace security
 
01c. Starting A Router
01c.  Starting A  Router01c.  Starting A  Router
01c. Starting A Router
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
operating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS deviceoperating and configuring cisco a cisco IOS device
operating and configuring cisco a cisco IOS device
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Cisco asa firewall command line technical guide
Cisco asa firewall command line technical guideCisco asa firewall command line technical guide
Cisco asa firewall command line technical guide
 
5 ip security asa-partb
5 ip security asa-partb5 ip security asa-partb
5 ip security asa-partb
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornment
 
Openstack 101
Openstack 101Openstack 101
Openstack 101
 
第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios第6讲 操作与配置Cisco Ios
第6讲 操作与配置Cisco Ios
 

Nxll14 cut through-proxy on asa

  • 1. LAB 14: Cut-Through-Proxy on ASA Task 1. Configure Cut-Through-Proxy on ASA. Figure 1 Topology
  • 2. LAB 14: Cut-Through-Proxy on ASA Solution R1 Int f0/0 Ip add 10.0.0.100 No shut Exit Ip route 0.0.0.0 0.0.0.0 10.0.0.1 ASA Int g0 Nameif outside Ip add 192.168.150.1 255.255.255.0 No shut Exit Int g1 Nameif inside Ip add 10.0.0.1 255.255.255.0 No shut Exit Int g2 Nameif dmz Ip add 192.168.100.1 255.255.255.0 No shut Exit Access-list OUT permit icmp any any Access-group OUT in interface outside Access-group OUT in interface dmz (Note: Ping R1 to ISE, R1 to TestPC successfully after above commands.)
  • 3. LAB 14: Cut-Through-Proxy on ASA ISE configuration on ASA Aaa-server ISE protocol radius Exit Aaa-server ISE (dmz) host 192.168.100.20 Key cisco Exit Virtual telnet 172.16.1.100 access-list OUT extended permit tcp any host 172.16.1.100 eq telnet access-list CUT extended permit tcp any host 172.16.1.100 eq telnet aaa authentication match CUT dmz ISE access-group OUT in interface dmz per-user-override Verification 1. Telnet 10.0.0.100 from TestPC, It will show failed connection. 2. Telnet 172.16.1.100 from TestPC, It will show successfully connection. ISE Configuration Steps: 1. Login to authentication on TestPC using browser. Go to 1. Administrator > Network Resource > Network Device > Add. Add a Network Device use Name = ASA IP Address = 192.168.100.1/32 Location = All Location Device Type = All Device Types Authentication Settings: Protocol = RADIUS *Shared Secret = cisco Submit/Save 2. Administrator > Identity Management > Group > User Identity Group > Add Name = CTP Submit
  • 4. LAB 14: Cut-Through-Proxy on ASA 3. Administrator > Identity Management > Identities > Users > Add Name = test Password = Cisco@123 Re-Enter Password = Cisco@123 User Groups = CTP Submit/Save After this go on Firewall and test your Configuration Ciscoasa# test aaa-server authentication ISE host 192.168.100.20 username test password Cisco@123 INFO: Attempting Authentication test to IP address <192.168.100.20> (timeout: 12 seconds) INFO: Authentication Successful Create Authorization Profile on ISE 1. Policy > Policy Elements > Results > Authorization > Authorization profile > Add. Name = CTP Access Type = ACCESS_ACCEPT Advanced Attributes Settings: Cisco:cisco-av-pair = ip:inacl#1=permit tcp any any eq 23 Save 2. Policy > Authorization Click on Edit and then, Click Insert Rules Below Then name rule as CTP and in ,if column call user from User Identity Group <CTP>, permission column call Authorization Profile created before which is to be found in Standard list <CTP>. Now initiate Telnet Connection from TestPC to Virtual IP 172.16.1.100 Username = test Password = Cisco@123 It will authenticate Successfully. Now Check the dynamic access-list on ASA. It will download after successfully connect with virtual ip. Now again Telnet from TestPC to R1 host. It will authenticate successfully and you will connect with R1. Necessary Commands 1. Sh uauth 2. Clear uauth