Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Securing Cisco IOS Networks Study Guide - Carl Timm.pdf
Скачиваний:
71
Добавлен:
24.05.2014
Размер:
9.74 Mб
Скачать

Hands-On Labs 293

Hands-On Labs

This section will test your ability to configure IPSec with pre-shared keys. Use the following graphic as your guide.

Lab_A

HostA HostB

172.16.2.0/24

 

Perimeter

WWW Server

DNS Server

10.1.1.0/24

Router

172.16.1.2/24

172.16.1.3/24

Internet

 

 

 

 

 

Lab_B

 

 

 

 

 

 

172.16.1.0/24

 

F0/0

"Dirty DMZ"

 

172.16.1.254/24

 

 

 

 

Protected DMZ

 

 

 

 

PIX

 

Bastion Host

 

 

 

F0/0

 

 

 

192.168.254.254/24

 

Bastion Host

 

 

 

NAS

 

 

 

 

 

F0/0

 

 

 

192.168.254.252/24

 

 

 

 

CiscoSecure ACS 3.0

Management Station

 

192.168.254.253/24

192.168.254.251/24

The following interfaces will be used:

Lab_A interface Serial 0/0 with IP address 10.1.1.1 /24

Lab_B interface Serial 1/0 with IP address 10.1.1.2 /24 This section includes the following labs:

Lab 8.1: Configure IKE on Lab_A and Lab_B

Lab 8.2: Configure IPSec on Lab_A and Lab_B

Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501.

www.sybex.com

294 Chapter 8 Cisco IOS IPSec Pre-Shared Keys and Certificate Authority Support

Lab 8.1: Configure IKE on Lab_A and Lab_B

This lab will have you configure IKE on routers Lab_A and Lab_B from the previous graphic.

1.Create an IKE policy on Lab_A and Lab_B with priority 2.

2.Use 3DES encryption, MD5 message hash, and pre-shared authentication on Lab_A and Lab_B.

3.Use the pre-shared key cisco on Lab_A and Lab_B.

Lab 8.2: Configure IPSec on Lab_A and Lab_B

This lab will have you configure IPSec on routers Lab_A and Lab_B from the previous graphic.

1.Create a transform set named test using esp-des and tunnel mode on Lab_A and Lab_B.

2.Create a symmetrical extended access list that will permit traffic from networks 172.16.2.0 /24 and 172.16.1.0 /24 on Lab_A and Lab_B.

3.Create a crypto map using the name test1 and sequence number 100 on Lab_A and Lab_B.

4.The crypto maps created should use the transform set test and the extended access list just created, and set the peer to the IP address of the outgoing interface of the remote device.

5.Apply the crypto map to Lab_A’s and Lab_B’s outgoing interfaces.

Copyright ©2003 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501.

www.sybex.com