Contents
- Hostname
- Interface - IP Address
- Interface - Clock Rate
- DNS Lookup Disable
- Static default route
- Static route to simulated LAN (Loopback 1)
- VLAN Configuration
- Password Length
- Enable secret password
- Encrypt plaintext passwords
- Configure console lines
- Warning message / Banner
- Configure VTY lines
- Enable HTTP access on router
- Configure the local user database
- Enable AAA services
- Implement AAA services using RADIUS/TACACS+/local database
- Configure domain name
- Configure the incoming VTY lines
- Generate the RSA encryption key pair
- Configure the SSH version
- Secure against login attacks
- Configure the site-to-site VPN
- Generate a mirror configuration for the other router
- View security association
- Configure a ZPF Firewall
- Configure IPS on R3 Using CCP
- Configure Trunk Ports
- Change the native VLAN
- Prevent the use of DTP
- Enable storm control for broadcasts
- Disable trunking
- Enable PortFast on access ports that are in use
- Enable BPDU guard
- Configure basic port security
- Disable unused ports
- Configure ASA basic settings and firewall
- Configure basic ASA settings using the ASDM Startup Wizard
- Set the ASA Date and Time with ASDM
- Configure ASA AnyConnect SSL VPN Remote Access
Reference Topology
Reference Addressing Table
Command References
1. Hostname
2. Interface - IP Address
3. Interface - Clock Rate
Clock rate is applied to the DCE side of the serial connection
4. DNS Lookup Disable
5. Static default route
Static default route from R1 to R2
6. Static route to simulated LAN (Loopback 1)
Static routes from R2 to the R1 simulated LAN (Loopback 1)
7. VLAN Configuration
Interface details
8. Password Length
Configure a minimum password length of 10 characters on R1.
9. Enable secret password
Use an enable secret password of ciscoenapa55.
10. Encrypt plaintext passwords
11. Configure console lines
- Configure a console password of ciscoconpa55 and enable login
- Set the exec-timeout to log out after 15 minutes of inactivity
- Prevent console messages from interrupting command entry
12. Warning message / Banner
13. Configure VTY lines
- Configure the password for vty lines to be ciscovtypa55 and enable login
- Set the exec-timeout so a session is logged out after 15 minutes of inactivity
14. Enable HTTP access on router
15. Configure the local user database
- Create a local user account of Admin01 with a secret password of Admin01pa55
- privilege level of 15
16. Enable AAA services
17. Implement AAA services using RADIUS/TACACS+/local database
- Create the default login authentication method list using RADIUS as the first option
- TACACS+ as the second option
- case-sensitive local authentication as the third option
- enable password as the backup option to use if an error occurs in relation to local authentication
18. Configure domain name
19. Configure the incoming vty lines
- Specify that the router vty lines will accept only SSH connections
20. Generate the RSA encryption key pair
- Configure the RSA keys with 1024 as the number of modulus bits
21. Configure the SSH version
- Specify that the router accept only SSH version 2 connections
22. Secure against login attacks
23. Configure the site-to-site VPN
- From the CLI, configure an enable secret password of ciscoenapa55 for use with CCP on R3.
- Enable the HTTP server on R3.
- Add user Admin01 to the local database with a privileged level of 15, and a password of Admin01pa55.
- Configure local database authentication of HTTP sessions.
- From PC-C run CCP and access R3.
- Manage Devices window > R3 IP address 172.30.3.1 in the first IP address field.
- Enter Admin01 in the Username field, and Admin01pa55 in the Password field.
- At the CCP Dashboard, click the Discover button to discover and connect to R3.
- Click the Configure button at the top of the CCP screen.
- Choose Security > VPN > Site-to-Site VPN.
- Click the Launch the selected task button to begin the CCP Site-to-Site VPN wizard.
- From the initial Site-to-Site VPN wizard screen, choose the Step by step wizard, and then click Next.
- On the VPN Connection Information screen, select the interface for the connection, which should be R3 Serial0/0/1.
- In the Peer Identity section, select Peer with static IP address and enter the IP address of the remote peer, R1 interface S0/0/0, which is 10.10.10.1.
- Specify the pre-shared VPN key cisco12345.
- Encrypt traffic between the R3 LAN and the R1 Loopback 1 simulated LAN.
- On the IKE Proposals screen, click Next to continue.
- On the Transform Set screen, click Next to continue.
- On the Traffic to protect screen, enter the following information:
- Local Network (R3 LAN) : IP address: 172.30.3.1 Subnet Mask: 255.255.255.0
- Remote Network (R1 Loopback) : IP address: 172.20.1.1 Subnet Mask: 255.255.255.0
24. Generate a mirror configuration for the other router
- Click the Configure button at the top of the CCP screen.
- Choose Security > VPN > Site-to-Site VPN. Click the Edit Site to Site VPN tab.
- Select the VPN policy you just configured on R1 and click the Generate Mirror button in the lower right of the window.
The Generate Mirror window displays the commands necessary to configure R3 as a VPN peer. Scroll through the window to see all the commands generated.
- Click the Save button to create a text file. Name it VPN-Mirror-Cfg-for-R3.txt.
-
Apply the crypto map to the R1 VPN interface.
- On R1, enter privileged EXEC mode and then global config mode.
-
Copy the commands from the text file into the R1 CLI.
- To apply the crypto map to R1 VPN interface, enter the following:
25. View security association
- Issue the show crypto isakmp sa command on R3 to view the security association created.
- Issue the show crypto ipsec sa command on R1 to verify packets are being received from R3 and decrypted by R1.
26. Configure a ZPF Firewall
- Configure a Basic firewall with Fa0/1 interface as the Inside interface and S0/0/1 as the Outside interface.
- Configure > Security > Firewall > Firewall. Select Basic Firewall.
- Click the Launch the selected task button. Click Next to continue.
- Check the Inside (trusted) check box for Fast Ethernet0/1 and the Outside (untrusted) check box for Serial0/0/1. Click Next.
- Click OK when the warning is displayed informing you that you cannot launch CCP from the S0/0/1 interface after the Firewall wizard completes.
- Use the Low Security setting, and complete the Firewall wizard.
- Move the slider to Low Security and click the Preview Commands button to preview the commands that are delivered to the router. Click Next to continue.
- On the Review the Firewall Configuration Summary screen, click Finish to complete the Firewall wizard.
27. Configure IPS on R3 Using CCP
- Verify or create the IPS directory, ipsdir, in router flash on R3.
- Launch the IPS wizard and apply the IPS rule in the inbound direction for Serial0/0/1.
- Click the Configure button at the top of the CCP screen.
- Choose Security > Intrusion Prevention > Create IPS.
- Click Launch IPS Rule Wizard. Click Next to continue.
- In the Select Interfaces window, check the Inbound check box for Fast Ethernet0/1 and Serial0/0/1. Click Next.
- Specify the signature file with a URL and use TFTP to retrieve the file from PC-C.
- Signature File and Public Key window, click the ellipsis (…) button next to Specify the Signature File You Want to Use with IOS IPS to open the Specify Signature File window. Confirm that the Specify signature file using URL option is chosen.
- For Protocol, select tftp from the drop-down menu.
- Enter the IP address of the PC-C TFTP server and the filename. The address is 172.30.3.3/IOS-Sxxx-CLI.pkg (where xxx is the number of the package)
- Click OK to return to the Signature File and Public Key window. Name the public key file realm-cisco.pub.
- In the Configure Public Key section of the Signature File and Public Key window, enter realm-cisco.pub in the Name field.
- Copy the text from the public key file to the CCP IPS wizard.
- Open the realm-cisco-pub-key.txt file located on PC-C.
- Copy the text between the phrase key-string and the word quit into the Key field in the Configure Public Key section.
- Click Next to display the Config Location and Category window. Specify the flash:/ipsdir/ directory name as the location to store the signature information.
- In the Config Location and Category window in the Config Location section, click the ellipsis (…) button next to Config Location to add the location.
- Verify that Specify the config location on this router is selected. Click the ellipsis (…) button.
- Click the plus sign (+) next to flash. Choose ipsdir and then click OK.
- Choose the basic category.
- In the Choose Category field of the Config Location and Category window, choose basic.
- Complete the wizard.
- Click Next in the Cisco CCP IPS Policies Wizard window.
- Click Finish in the IPS Policies Wizard window and review the commands that will be delivered to the router.
- Click Deliver.
- Click OK when the Commands Deliver Status window is ready.
- When the signature configuration process has completed, you return to the IPS window with the Edit IPS tab selected.
28. Configure Trunk Ports
- Configure trunk ports on S1 and S2.
29. Change the native VLAN
- Change the native VLAN to 99 for the trunk ports on S1 and S2.
30. Prevent the use of DTP
- Prevent the use of DTP on S1 and S2 trunk ports.
31. Enable storm control for broadcasts
- Enable storm control for broadcasts on S1 and S2 trunk ports.
32. Disable trunking
- Disable trunking on S1 access ports that are in use.
33. Enable PortFast on access ports that are in use
- Enable PortFast on S1 access ports that are in use.
34. Enable BPDU guard
- Enable BPDU guard on S1 access ports that are in use.
35. Configure basic port security
- Use the default port security options (set maximum MAC addresses to 1 and violation action to shutdown).
- Allow the secure MAC address that is dynamically learned on a port be added to the switch running configuration.
36. Disable unused ports
- Disable unused ports on S1.
37. Configure ASA basic settings and firewall
- Clear the previous ASA configuration settings.
- Bypass Setup Mode and configure the VLAN/routed interfaces using CLI.
- The VLAN 1 logical interface will be used by PC-B to access ASDM on ASA physical interface E0/1.
- Configure interface VLAN 1 and name it “inside”.
- Specify IP address 192.168.10.1 and subnet mask 255.255.255.0.
- Verify that the security level is set to 100.
- Pre-configure interface VLAN 2 and name it “outside”, and add physical interface E0/0 to VLAN 2.
- You will assign the IP address using ASDM. Verify that the security level is set to 0.
- Configure and verify access to the ASA from the inside network.
- Configure the ASA to accept HTTPS connections and to allow access to ASDM from any host on the inside network 192.168.10.0/24.
38. Configure basic ASA settings using the ASDM Startup Wizard
- Access the Configuration menu and launch the Startup wizard.
- Configure hostname, domain name, and enable password.
- Configure the ASA host name CCNAS-ASA and domain name of ccnasecurity.com.
- Change the enable mode password to ciscoenapa55.
- Configure the outside VLAN interface.
- Enter an outside IP address of 209.165.200.234 and mask 255.255.255.248.
- Configure DHCP, address translation and administrative access.
- Enable the DHCP server on the Inside Interface and specify a starting IP address of 192.168.10.5 and ending IP address of 192.168.10.30.
- Enter the DNS server 1 address of 10.3.3.3 and domain name ccnasecurity.com.
- Configure the ASA to use port address translation (PAT) using the IP address of the outside interface.
- Add Telnet access to the ASA for the inside network 192.168.10.0 with a subnet mask of 255.255.255.0.
- Add SSH access to the ASA from host 172.30.3.3 on the outside network.
39. Set the ASA Date and Time with ASDM
- Set the time zone, current date and time and apply the commands to the ASA.
- Configure a static default route for the ASA.
- Require authentication for HTTP/ASDM, SSH and Telnet connections and specify the “LOCAL” server group for each connection type.
- From PC-C, open an SSH client such as PuTTY and attempt to access the ASA outside interface at 209.165.200.234.
40. Configure ASA AnyConnect SSL VPN Remote Access
- Configure the SSL VPN user interface.
- Configure VPN-Con-Prof as the Connection Profile Name, and specify outside as the interface to which outside users will connect.
- Configure AAA user authentication.
- Use the local user database to authenticate remote access users and create a new user named VPNuser with a password of remote.
- Configure the VPN group policy.
- Create a new group policy named VPN-Grp-Pol.
- Configure the bookmark list.
- Add a bookmark list and name it WebServer-XX (where XX is your initials).
- Add a new Bookmark with Web Mail as the Bookmark Title.
- Specify the server destination IP address of PC-B 192.168.10.3 (simulating a web server).
- Verify VPN access from the remote host.
- Open the browser on PC-C and enter the login URL for the SSL VPN into the address field (https://209.165.200.234).
- The Logon window should appear.
- Enter the previously configured user name VPNuser and password remote and click Logon to continue.
- The Web Portal window should display.