CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP SelfStudy CCSP CSI: Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Tebyan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید





  • Answers to Scenario 21-2


    1:

    On the public interface of the edge router, allow IPSec traffic from the remote-site peers 10.10.1.1 and 10.10.2.1 (not shown). Also allow remote-access VPN traffic.

    A1:

    The edge router's public interface filtering is configured as follows:


    edge_rtr(config)#access-list 100 permit udp host 10.10.1.1
    host 172.31.254.2 eq isakmp

    edge_rtr(config)#access-list 100 permit udp host 10.10.2.1
    host 172.31.254.2 eq isakmp

    edge_rtr(config)#access-list 100 permit esp host 10.10.1.1
    host 172.31.254.2

    edge_rtr(config)#access-list 100 permit esp host 10.10.1.1
    host 172.31.254.2

    edge_rtr(config)#access-list 100 permit udp any
    host 172.31.254.3 eq isakmp

    edge_rtr(config)#access-list 100 permit esp any
    host 172.31.254.3

    edge_rtr(config)#interface s0/0
    edge_rtr(config-if)#ip access-group 100 in

    2:

    On the PIX Firewall, permit outside users access to the public services. Note that the public server, 10.1.3.2, appears publicly as 172.31.254.4 via static NAT on the PIX Firewall.

    A2:

    The correct configuration is as follows:


    PIX_FW(config)#access-list outside_access_in permit
    tcp any host 172.31.254.4 eq ftp

    PIX_FW(config)#access-list outside_access_in permit
    tcp any host 172.31.254.4 eq www

    PIX_FW(config)#access-list outside_access_in permit
    tcp any host 172.31.254.4 eq smtp

    PIX_FW(config)#access-list outside_access_in permit
    udp any host 172.31.254.4 eq domain

    3:

    Allow only legitimate traffic from remote-access users to the public services segment. Note that the VPN concentrator is configured with a remote-access address pool of 192.168.1.1 to 192.168.1.254.

    A3:

    The correct configuration is as follows:

    [View full width]

    PIX_FW(config)#access-list remote_access_in permit
    tcp 192.168.1.0 255.255.255.0 host 172
    .31.254.4 eq ftp

    PIX_FW(config)#access-list remote_access_in permit
    tcp 192.168.1.0 255.255.255.0 host 172
    .31.254.4 eq www

    PIX_FW(config)#access-list remote_access_in permit
    tcp 192.168.1.0 255.255.255.0 host 172
    .31.254.4 eq smtp

    PIX_FW(config)#access-list remote_access_in permit
    udp 192.168.1.0 255.255.255.0 host 172
    .31.254.4 eq domain

    4:

    Allow remote-access user traffic to the Internet and internal network.

    A4:

    The correct configuration is as follows:


    PIX_FW(config)#access-list remote_access_in permit ip
    192.168.1.0 255.255.255.0 any


  • / 290