Tamirat Atsemegiorgis Building a Secure Local Area Network



Download 0,7 Mb.
Pdf ko'rish
bet7/19
Sana09.07.2022
Hajmi0,7 Mb.
#764853
1   2   3   4   5   6   7   8   9   10   ...   19
Bog'liq
Building a Secure Local Area Network final - Copy

AP_pool_Guest
and 
AP_pool_Worker

AP_pool_Guest
is a pool of IP addresses of 
a subnet 192.168.30.0/24 that is assigned to the Guest VLAN (VLAN30) and the 
AP_pool_Worker
is an IP addresses pool of a subnet 192.168.40.0/24 which belongs 
to the Worker VLAN (VLAN40). The default gateways (192.168.30.1 and 192.168.40.1) 
are excluded from pools to avoid address overlap. The rest of the configuration is pre-
sented in appendixes 2 and 4. 


28 
As stated in section 4.2.2, the inside network uses private IP addresses to identify a 
network as well as a network device. Private IP addresses are used for intranet con-
nection and they are not routable over the gateway. To make the private IP addresses 
routable it is necessary to use the NAT (IP Network Address Translation) technology. 
Basically, NAT is used for translation of a real address (private address) of a device 
into a mapped address (public address) to be routable over networks.[15] In the simu-
lated network project, the firewall ASA is configured to be a NAT server and some of 
the configuration is shown below. 
object network inside-outside 
subnet 192.168.0.0 255.255.0.0 
nat (inside,outside) dynamic interface 
It is important to note that, on the Cisco ASA (Adaptive Security Appliance) 5505 ver-
sion 8.3 and later, the NAT configuration requires creating a network object which con-
tains a private IP address for a host or a subnet and defines the NAT rule to be fol-
lowed. In the above NAT configuration, an object 
inside-outside
is defined an inside 
subnet 192.168.0.0/16 and with a NAT rule that dynamically assign the ASA outside 
interface IP address (10.94.62.251/24) to the internal subnet to connect to the Internet. 
This and other configuration presented in appendix 1 help to create a working connec-
tion to the Internet. Example 1 below shows the output of NAT translations. 
Example 1: NAT translation. 
ASA# show xlate 
17 in use, 118 most used 
Flags: D - DNS, i - dynamic, r - portmap, s - static, 
I - identity, T – twice, e - extended 
NAT from inside:192.168.1.0/24 to out-
side:192.168.1.0/24 
flags sI idle 1:15:20 timeout 0:00:00 
TCP PAT from dmz:192.168.2.3 21-21 to out-
side:10.94.62.251 21-21 
flags sr idle 0:25:07 timeout 0:00:00 
TCP PAT from dmz:192.168.2.0/24 21-21 to out-
side:10.94.62.251 21-21 


29 
flags sr idle 0:25:07 timeout 0:00:00 
UDP PAT from inside:192.168.100.4/64375 to out-
side:10.94.62.251/64375 flags ri idle 0:00:55 timeout 
0:00:30 
TCP PAT from inside:192.168.30.2/50531 to out-
side:10.94.62.251/50531 flags ri idle 0:00:18 timeout 
0:00:30 
TCP PAT from inside:192.168.30.2/50530 to out-
side:10.94.62.251/50530 flags ri idle 0:00:18 timeout 
0:00:30 
TCP PAT from inside:192.168.30.2/50529 to out-
side:10.94.62.251/50529 flags ri idle 0:00:18 timeout 
0:00:30 
The output presented in example 1 shows, clients from dmz and inside networks are 
able to connect to the outside network through the ASA outside interface IP address 
10.94.62.251. That means the NAT rule translates the private IP addresses of the in-
ternal networks into a public IP address that is routable on the networks.
4.3 
Security Desigin and Implementation 
4.3.1 Basic Configuration of Network Devices 
For the sake of growth and well-being, owners as well as managers of a company need 
to pay special attention to the security system of their computer network. Network se-
curity is concerned with the protection of network resources and services from natural 
and human caused disasters. To do so, the security designer has to look carefully at 
the vulnerability of the network system and design security measures to protect disas-
ter on the company.
All network devices used in the simulated lab have been configured with a basic con-
figuration. The basic configuration includes the names of the devices, the IP addresses 
of the interfaces and VLANs, user names and their encrypted passwords, VTY and 
console ports passwords, default routes, access and trunk ports, banners of the day 


30 
and domain names. Some basic configuration of the core switch (CSW) are shown 
below. 
hostname CSW 

enable secret 5 $1$Nh/1$bmSgITR31VtxLu.4mc7Wo. 

ip routing 

interface FastEthernet0/1 
description "to the ASA device" 
no switchport 
ip address 192.168.1.2 255.255.255.0 

access-list 1 permit 192.168.100.0 
banner motd ^C unauthorized user is not prohibited ^C 

line con 0 
access-class 1 in 
exec-timeout 0 0 
password 7 06120E2C495A081400 
logging synchronous 
login 
line vty 0 4 
access-class 1 in 
exec-timeout 5 0 
privilege level 15 
password 7 06120E2C495A081400 
logging synchronous 
login local 
transport input ssh 
line vty 5 15 
no login 


31 
As stated above, the core switch named CSW configured for a secret privilege mode 
password, banner of the day, VTY and console port access passwords. A secured re-
mote communication protocol SSH (Secure Shell) has been configured on VTY port 
and the access has been protected by a standard access list 1. Besides that, the core 
switch is configured by the

Download 0,7 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   ...   19




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish