Implementing Firewall Technologies: CCNA Security v2.0
Implementing Firewall Technologies: CCNA Security v2.0
Implementing Firewall Technologies: CCNA Security v2.0
Implementing Firewall
Technologies
CCNA Security v2.0
4.0 Introduction
4.1 Access Control Lists
Chapter Outline
Cisco Public
Section 4.1:
Access Control List
Upon completion of this section, you should be able to:
Configure standard and extended IPv4 ACLs using CLI.
Use ACLs to mitigate common network attacks.
Configure IPv6 ACLs using CLI.
Cisco Public
Topic 4.1.1:
Configuring Standard and Extended
IPv4 ACLs with CLI
Cisco Public
Cisco Public
Cisco Public
Applying an ACL
Syntax - Apply an ACL
to an interface
Syntax - Apply an ACL
to the VTY lines
Cisco Public
Cisco Public
Cisco Public
Access list has been edited, which adds a new ACE and replaces ACE line
20.
Cisco Public
10
Access list has been edited, which adds a new ACE that permits a specific IP
address.
Cisco Public
11
Topic 4.1.2:
Mitigating Attacks with ACLs
Cisco Public
12
Cisco Public
13
Cisco Public
14
Cisco Public
15
Cisco Public
16
Topic 4.1.3:
IPv6 ACLs
Cisco Public
17
Cisco Public
18
Cisco Public
19
Cisco Public
20
Section 4.2:
Firewall Technologies
Upon completion of this section, you should be able to:
Explain how firewalls are used to help secure networks.
Describe the various types of firewalls.
Configure a classic firewall.
Explain design considerations for implementing firewall technologies.
Cisco Public
21
Topic 4.2.1:
Securing Networks with Firewalls
Cisco Public
22
Defining Firewalls
All firewalls:
Cisco Public
23
Cisco Public
24
Topic 4.2.2:
Types of Firewalls
Cisco Public
25
Stateful Firewall
NAT Firewall
Cisco Public
26
Cisco Public
27
Stateful Firewalls
Stateful Firewalls
State Tables
Cisco Public
28
Restricting web and web application use based on the reputation of the site
Enforcement of policies based on the user, device, role, application type, and threat profile
Use of an IPS
Cisco Public
29
Topic 4.2.3:
Classic Firewall
Cisco Public
30
Cisco Public
31
Cisco Public
32
external interfaces.
2. Configure ACLs for each
interface.
Inspection Rules
to an interface.
Cisco Public
33
Topic 4.2.4:
Firewalls in Network Design
Cisco Public
34
Cisco Public
35
Demilitarized Zones
Cisco Public
36
Cisco Public
37
Layered Defense
Considerations for network defense:
Network core security
Perimeter security
Endpoint security
Communications security
outside.
2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
38
Section 4.3:
Zone-Based Policy Firewalls
Upon completion of this section, you should be able to:
Explain how Zone-Based Policy Firewalls are used to help secure a network.
Explain the operation of a Zone-Based Policy Firewall.
Configure a Zone-Based Policy Firewall with CLI.
Cisco Public
39
Topic 4.3.1:
Zone-Based Policy Firewall Overview
Cisco Public
40
Benefits of ZPF
Not dependent on ACLs
Router security posture
is to block unless
explicitly allowed
Policies are easy to read
Cisco Public
41
ZPF Design
Common designs include:
LAN-to-Internet
Firewalls between public servers
Redundant firewalls
Complex firewalls
Design steps:
1.
2.
3.
4.
Cisco Public
42
Topic 4.3.2:
ZPF Operation
Cisco Public
43
ZPF Actions
Inspect - Configures Cisco IOS stateful packet inspections.
Drop - Analogous to a deny statement in an ACL. A log option is available to log
Cisco Public
44
Cisco Public
45
Topic 4.3.3:
Configuring a ZPF
Cisco Public
46
Configure ZPF
Cisco Public
47
Cisco Public
48
Sub-Configuration
Command Syntax for
class-map
Cisco Public
49
Cisco Public
50
Example policy-map
Configuration
Cisco Public
51
Example service-policy
Configuration
Cisco Public
52
Cisco Public
53
Cisco Public
54
Section 4.4:
Summary
Chapter Objectives:
Implement ACLs to filter traffic and mitigate network attacks on a network.
Configure a classic firewall to mitigate network attacks.
Implement ZPF using CLI.
Cisco Public
55
Thank you.
Instructor Resources
Remember, there are
1
2
Cisco Public
57