LAB Configuration - Saif Final1.2 Rata - Doc - 0
LAB Configuration - Saif Final1.2 Rata - Doc - 0
interface gig0/0
nameif outside
ip address 20.1.1.1 255.255.255.0 standby 20.1.1.2
no shut
!
interface gi0/1
nameif inside
ip address 10.1.11.1 255.255.255.0 standby 10.1.11.2
no shutdown
!
interface management 0/0
nameif mgmt
security-level 100
ip address 150.1.7.53 255.255.255.0 standby 150.1.7.54
no shutdown
--------- EIGRP_Configuration -----------------
router eigrp 12
no auto
network 10.1.11.0 255.255.255.0
!
interface gig0/1
authentication key eigrp 12 cisco key-id 1
authentication mode eigrp 12 md5
--------- Failover _Configuration --------------
interface gig0/2
no shutdown
!
failover lan unit primary
failover lan interface FO gig0/2
failover link FO gig0/2
failover interface ip FO 10.10.11.1 255.255.255.0 standby 10.10.11.2
failover
!
monitor-interface inside
monitor-interface mgmt
monitor-interface outside
==========ASA11_V:
interface gig0/2
no shutdown
==========ASA2v:
hostname ASA2_V
interface gig0/0
nameif outside
ip address 20.1.2.1 255.255.255.0 standby 20.1.2.2
no shut
!
interface gi0/1
nameif inside
ip address 10.1.22.1 255.255.255.0 standby 10.1.22.2
no shutdown
!
interface management 0/0
nameif mgmt
security-level 100
ip address 150.1.7.55 255.255.255.0 standby 150.1.7.56
no shutdown
----------------- EIGRP_Configuration ---------
router eigrp 12
no au
network 10.1.22.0 255.255.255.0
!
interface gig0/1
authentication key eigrp 12 cisco key-id 1
authentication mode eigrp 12 md5
----------------- Failover_Configuration --------
interface gig0/2
no shutdown
!
failover lan unit primary
failover lan interface FO gig0/2
failover link FO gig0/2
failover interface ip FO 10.10.22.1 255.255.255.0 standby 10.10.22.2
failover
!
monitor-interface inside
monitor-interface mgmt
monitor-interface outside
*******************************
dns domain-lookup mgmt
dns name-server 150.1.7.200
domain-name cisco.com
interface Gig0/0
no shutdown
interface Gig0/1
no shutdown
interface Gig0/2
no shutdown
Interface Management0/0
no shut
Interface Gig0/0.1
vlan 2
Interface Gig0/0.2
vlan 3
interface Gig0/1.1
vlan 4
interface Gig0/1.2
vlan 5
interface Gig0/2.1
vlan 6
interface Gig0/2.2
vlan 7
----------------Failover_Configuration
interface Gig0/3
no shutdown
interface Gig0/4
no shutdown
!
failover lan unit primary
failover lan interface LAN Gig0/3
failover link STATE Gig0/4
failover interface ip LAN 10.100.201.1 255.255.255.0 standby 10.100.201.2
failover interface ip STATE 10.100.202.1 255.255.255.0 standby 10.100.202.2
!
failover group 1
primary
preempt
failover group 2
secondary
preempt
------------------ Context_Configuration
admin-context admin
!
context admin
allocate-interface mamangement0/0
config-url disk0:/admin.cfg
!
context c1
allocate-interface gig0/0.1 inside_c1
allocate-interface gig0/1.1 dmz_c1
allocate-interface gig0/2.1 outside_c1
config-url disk0:/c1.cfg
join-failover-group 1
!
context c2
allocate-interface gig0/0.2 inside_c2
allocate-interface gig0/1.2 dmz_c2
allocate-interface gig0/2.2 outside_c2
config-url disk0:/c2.cfg
join-failover-group 2
------------------- Admin Context_Config:
changeto context admin
!
interface Management0/0
nameif Management
security-level 100
ip address 150.1.7.57 255.255.255.0 standby 150.1.7.58
-------------------- C1 Context_Config:
changeto context c1
!
interface inside_c1
nameif inside
ip address 10.100.2.1 255.255.255.0 standby 10.100.2.2
!
interface dmz_c1
nameif dmz
security-level 50
ip add 10.100.4.1 255.255.255.0 standby 10.100.4.2
!
interface outside_c1
nameif outside
ip address 10.100.6.1 255.255.255.0 standby 10.100.6.2
!
monitor-interface inside
monitor-interface dmz
monitor-interface outside
!
route outside 192.168.10.0 255.255.255.0 10.100.6.9
route dmz 192.168.105.7 255.255.255.255 10.100.4.7
-------------------------NAT & Traffic Filter:
object network server5_c1
host 192.168.105.7
nat (dmz,outside) static interface
!
access-list server5_c1 extended permit tcp 192.168.10.0 255.255.255.0 object
server5_c1 eq www
access-list server5_c1 extended permit icmp 192.168.10.0 255.255.255.0 object
server5_c1 echo
!
access-group server5_c1 in interface outside
hostname ASA3
cluster interface-mode spanned force
!
interface Gig0/0
channel-group 1 mode active
no shutdown
!
interface Gig0/1
channel-group 1 mode active
no shutdown
interface Management0/0
no shutdown
!
interface port-channel1
port-channel span-cluster
!
interface port-channel1.8
vlan 8
!
interface port-channel1.9
vlan 9
!
interface port-channel1.10
vlan 10
!
admin-context admin
context admin
allocate-interface Management0/0
allocate-interface port-channel1.8
allocate-interface port-channel1.9
allocate-interface port-channel1.10
config-url disk0:/admin.cfg
!
interface Gig0/2
no shutdown
!
cluster group ccie
local-unit ASA3
cluster-interface Gig0/2 ip 10.100.203.1 255.255.255.0
priority 1
--------------------Admin Context_Config:
changeto context admin
!
ip local pool mgmt-pool 150.1.7.60-150.1.7.61
!
interface Management0/0
management-only
nameif mgmt
ip address 150.1.7.59 255.255.255.0 cluster-pool mgmt-pool
!
interface port-channel1.8
nameif inside
ip address 10.100.8.1 255.255.255.0
!
interface port-channel1.9
nameif outside
ip address 10.100.9.1 255.255.255.0
!
interface port-channel1.10
nameif dmz
security-level 50
ip address 10.100.10.1 255.255.255.0
!
route dmz 192.168.103.14 255.255.255.255 10.100.10.14
route dmz 192.168.104.14 255.255.255.255 10.100.10.14
!
object network server3_t
host 19.16.103.14
object network server4_t
host 19.16.104.14
Verification:
R14:
Ip http server
Ip route 10.100.8.0 255.255.255.0 10.100.10.1
R13:
Ip route 19.16.103.14 255.255.255.0 10.100.8.1
Ip route 19.16.104.14 255.255.255.0 10.100.8.1
R13#telnet 19.16.103.14 80
R14#sh tcp brief
R13#telnet 19.16.104.14 80
R14#sh tcp brief
=========================================================
Task 2.1/2.2:WCCP (Monitor & Block Policy) R2 & WSA
Hostname R2
interface Gi2
ip address 10.1.12.2 255.255.255.0
ip wccp 50 redirect in
=================================================================
Task 3.2: Configure Site-To-Site Certificate Based VPN Between R15,R16 and R17
On R17
#show crypto key mypubkey rsa if No then
#crypto key generate rsa label ccier17 modulus 1024
Ip http server
crypto pki server ccier17
database level complete
issuer-name CN=r17 O=cisco.com
grant auto
shutdown
no shutdown
password cisco123
!
R17#show crypto pki server
R17#show crypto key mypubkey rsa
==========================================
On R15
==========================================
ip domain-name cisco.com
ip name-server 150.1.7.200
!
crypto key generate rsa label ccier15 modulus 1024
!
crypto pki trustpoint ccier15
enrollment url http://172.16.100.17:80
ip-address Loopback0
source interface Loopback0
subject-name CN=r15 O=cisco.com
rsakeypair ccier15
On R16
!==========================================
ip domain-name cisco.com
ip name-server 150.1.7.200
!
crypto key generate rsa label ccier16 modulus 1024
!
crypto pki trustpoint ccier16
enrollment url http://172.16.100.17:80
ip-address Loopback0
source interface Loopback0
subject-name CN=r16 O=cisco.com
rsakeypair ccier16
R4 R5
Key chain ccie ==
Key 1 Key chain ccie
Key-string ccie Key 1
! Key-string ccie
ip vrf mgmt !
rd 20:20 ip vrf mgmt
! rd 20:20
ip vrf site_a !
rd 100:100 ip vrf site_a
! rd 100:100
ip vrf site_b !
rd 200:200 ip vrf site_b
! rd 200:200
interface Loopback100 !
ip vrf forwarding site_a interface Loopback100
ip address 192.168.4.4 255.255.255.0 ip vrf forwarding site_a
! ip address 192.168.5.5 255.255.255.0
interface Loopback200 !
ip vrf forwarding site_b interface Loopback200
ip address 192.168.4.4 255.255.255.0 ip vrf forwarding site_b
! ip address 192.168.5.5 255.255.255.0
interface Gi2.20 !
encapsulation dot1Q 20 interface Gi2.20
ip vrf forwarding mgmt encapsulation dot1Q 20
ip address 10.1.20.4 255.255.255.0 ip vrf forwarding mgmt
! ip address 10.1.20.5 255.255.255.0
interface Gi2.100 !
encapsulation dot1Q 100 interface Gi2.100
ip vrf forwarding site_a encapsulation dot1Q 100
ip address 10.1.45.4 255.255.255.0 ip vrf forwarding site_a
ip authentication mode eigrp 405 md5 ip address 10.1.45.5 255.255.255.0
ip authentication key-chain eigr 405 ccie ip authentication mode eigrp 405 md5
! ip authentication key-chain eigrp 405 ccie
interface Gi2.200 !
encapsulation dot1Q 200 interface Gi2.200
ip vrf forwarding site_b encapsulation dot1Q 200
ip address 10.1.45.4 255.255.255.0 ip vrf forwarding site_b
ip authentication mode eigrp 405 md5 ip address 10.1.45.5 255.255.255.0
ip authentication key-chain eigr 405 ccie ip authentication mode eigrp 405 md5
! ip authentication key-chain eigrp 405 ccie
router eigrp 45 !
address-family ipv4 vrf site_a autonomous- router eigrp 45
system 405 address-family ipv4 vrf site_a autonomous-
network 10.1.45.0 0.0.0.255 system 405
network 192.168.4.0 network 10.1.45.0 0.0.0.255
exit-address-family network 192.168.5.0
! exit-address-family
address-family ipv4 vrf site_b autonomous- !
system 405 address-family ipv4 vrf site_b autonomous-
network 10.1.45.0 0.0.0.255 system 405
network 192.168.4.0 network 10.1.45.0 0.0.0.255
exit-address-family network 192.168.5.0
exit-address-family
On R3 GETVPN (Key Server)
=========================
ip vrf mgmt
rd 20:20
!
interface GigabitEthernet3
ip vrf forwarding mgmt
ip address 10.1.20.3 255.255.255.0
no shut
!
crypto key generate rsa label cciekey modulus 1024
!
crypto keyring mgmt vrf mgmt
pre-shared-key address 10.1.20.0 255.255.255.0 key cisco
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
!
crypto ipsec transform-set TS esp-aes esp-sha-hmac
mode tunnel
!
crypto ipsec profile prof
set transform-set TS
!
ip access-list extended site_a
permit ip 192.168.4.0 0.0.0.255 192.168.5.0 0.0.0.255
permit ip 192.168.5.0 0.0.0.255 192.168.4.0 0.0.0.255
==========================================
On R4 R5 GETVPN Group Member
==========================================
crypto keyring mgmt vrf mgmt
pre-shared-key address 10.1.20.3 key cisco
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
!
crypto gdoi group site_a
identity number 100
server address ipv4 10.1.20.3
client registration interface Gi.20
!
crypto gdoi group site_b
identity number 200
server address ipv4 10.1.20.3
client registration interface Gi2.20
!
crypto map map1 1 gdoi
set group site_a
!
crypto map map2 1 gdoi
set group site_b
!
interface Gi2.100
crypto map map1
!
interface Gi2.200
crypto map map2
======================================================
Task 3.4: Configure FLEXVPN Between R9, R10 and R11
======================================================
On HUB R9
crypto ikev2 keyring key
peer R10
address 20.1.4.10
pre-shared-key ccier10
peer R11
address 20.1.5.11
pre-shared-key ccier11
!
crypto ikev2 profile prof
match identity remote address 0.0.0.0
authentication remote pre-share
authentication local pre-share
keyring local key
!
crypto ipsec transform-set TS esp-aes esp-sha-hmac
mode tunnel
!
crypto ipsec profile prof
set transform-set TS
set ikev2-profile prof
!
interface Tunnel34
ip address 172.16.2.9 255.255.255.0
tunnel source Gi3
tunnel destination 20.1.4.10
tunnel protection ipsec profile prof shared
!
interface Tunnel35
ip address 172.16.3.9 255.255.255.0
tunnel source Gi3
tunnel destination 20.1.5.11
tunnel protection ipsec profile prof shared
!
router eigrp 34
network 10.100.6.0 0.0.0.255
network 172.16.2.0 0.0.0.255
network 192.168.9.0 0.0.0.255
passive-interface Gi2.1
no au
!
router eigrp 35
network 10.100.7.0 0.0.0.255
network 172.16.3.0 0.0.0.255
network 192.168.9.0 0.0.0.255
passive-interface Gi2.2
no au
==========================================
On R10
==========================================
crypto ikev2 keyring key
peer R9
address 20.1.3.9
pre-shared-key ccier10
!
crypto ikev2 profile prof
match identity remote address 20.1.3.9 255.255.255.255
authentication remote pre-share
authentication local pre-share
keyring local key
!
crypto ipsec transform-set TS esp-aes esp-sha-hmac
mode tunnel
!
crypto ipsec profile prof
set transform-set TS
set ikev2-profile prof
!
interface Tunnel34
ip address 172.16.2.10 255.255.255.0
tunnel source Gi2
tunnel destination 20.1.3.9
tunnel protection ipsec profile prof
!
router eigrp 34
network 172.16.2.0 0.0.0.255
network 192.168.10.0
===========================
On R11
===========================
crypto ikev2 keyring key
peer R9
address 20.1.3.9
pre-shared-key ccier11
!
crypto ikev2 profile prof
match identity remote address 20.1.3.9 255.255.255.255
authentication remote pre-share
authentication local pre-share
keyring local key
!
crypto ipsec transform-set TS esp-aes esp-sha-hmac
mode tunnel
!
crypto ipsec profile prof
set transform-set TS
set ikev2-profile prof
!
interface Tunnel35
ip address 172.16.3.11 255.255.255.0
tunnel source Gi2
tunnel destination 20.1.3.9
tunnel protection ipsec profile prof
!
router eigrp 35
network 172.16.3.0 0.0.0.255
network 192.168.11.0
Verification:
R10#sh cry ipse sa
R10#ping 10.100.6.1 sou loopback 1 repeat 100
R10#telnet 10.100.6.1 80 /sou loo 1
R11#sh cry ipse sa
R11#ping 10.100.7.1 sou loopback 1 repeat 100
R11#telnet 10.100.7.1 80 /sou loo 1
ASA1vc1/c2#sh access-list
===============================================
Task 3.5: Configure SXP between SW2_P and ASA3
==============================================
On SW2_P
show cts credentials
clear cts crddentials
clear cts pac all
clear cts environment-data
aaa new-model
!
No radius-server vsa send authentication
!
aaa authentication login NOAUTH line none
!
line con 0
login authentication NOAUTH
line aux 0
login authentication NOAUTH
!
radius server ISE
address ipv4 150.1.7.212 auth-port 1645 acct-port 1646
key ccie
!
aaa group server radius ISE
server name ISE
!
aaa authentication login FOR_SSH group ISE
aaa authorization exec FOR_SSH group ISE
!
line vty 0 4
authorization exec FOR_SSH
login authentication FOR_SSH
transport input ssh
session-timeout 2880
exec-timeout 2880 0
=========SW2_P Complete Configuration=======
------------Task 1.3: Solution:
vlan 8
vlan 9
vlan 10
vlan 150
vlan 215
vlan 102
!
interface Port-channel1
switchport mode trunk
switchport trunk allowed vlan 8-10
no shut
-----------------
aaa new-model
!
!
aaa authentication login NOAUTH line none
line con 0
login authentication NOAUTH
!
aaa authentication dot1x default group ISE
aaa authorization network default group ISE
interface Gigabitethernet1/0/9
shut
switchport mode access
switchport voice vlan 215
authen event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
mab
dot1x pae authenticator
spanning-tree portfast
no shut
!
int gi1/0/7
shut
switchport mode access
switchport access vlan 102
authentication host-mode multi-auth
authentication order mab
authentication priority mab
authentication port-control auto
mab
no shut
-----------------------------------------
#####
ip dhcp pool VLAN102
default-router 10.100.102.22
network 10.100.215.0 255.255.255.0
option 43 ip 10.100.102.1
!==========================================
On AP CLI console
!==========================================
capwap ap ip address 10.100.102.33 255.255.255.0
capwap ap ip default-gateway 10.100.102.1
capwap ap controller ip address 10.100.102.1
if u face problem
AP#clear lwapp private-config
AP#clear capwap private-con
AP#reload
i) Administration ---> Sytem ---> Deployment ---> Select the ISE ---> Edit ---> General
Settings
Tick the i) Enable SXP Service (ii) Enable Device Admin Service (iii) Enable Passive
Identity Service ---> Save
ii) Administration ---> Sytem ---> Deployment ---> Select the ISE ---> Edit --->
Profiling Configurations
-------------------------------------------------------------------------------
2. Disable the Restrictions on the User Authentications & System Authentication
-------------------------------------------------------------------------------
-----------------------------------------------------
3. Add the AD
-----------------------------------------------------
-----------------------------------------------------
4. Add all 4 devices in ISE
-----------------------------------------------------
-----------------------------------------------------
5. Add the PC1 & PC2 Security Group Total = 2
-----------------------------------------------------
-----------------------------------------------------
6. Add the Endpoint Identity Groups Total 3:
-----------------------------------------------------
i) Administration ---> Identity Management ---> Groups ---> Endpoint Identity Groups
i) MAB-Phone
ii) MAB-PC
iii) MAB-AP
-----------------------------------------------------
7. Add the Users Identity Groups Total = 3( Anyconnect, Dot1x, Lab_Admin)
-----------------------------------------------------
Administration ---> Identity Management ---> Groups ---> Users Identity Groups
i) Anyconnect
ii) Dot1x
iii) Lab_Admin
-----------------------------------------------------
8. Add the Users Total = 3
-----------------------------------------------------
-----------------------------------------------------
9. Add the Mac Address of all 3 (MAB-AP, MAB-PC, MAB-PHONE)
-----------------------------------------------------
i) MAB-AP - Ways to get the Mac address - From SW2 # show mac address-table dynamic
int g1/0/7 or from AP console
ii) MAB-PC ---> Take the RDP of the MAB PC and ipconfig/all - Make sure to copy the
mab-nic mac
iii) MAB-PHONE ---> show cdp neigh on the switch and copy last 4 octect
-----------------------------------------------------------------------------------------
------------
10. Add the Authorization Profiles for 5 - (MAB-AP, MAB-PC, MAB-PHONE, Anyconnect,
Dot1x) for Anyconnect Permitaccess
-----------------------------------------------------------------------------------------
------------
Policy ---> Policy Elements ---> Results ---> Authorization ---> Authorization Profiles
i) MAB-AP
Name: MAB-AP
Common Tasks: Tick the DACL Name ---> PERMIT_ALL_TRAFFIC
Tick the VLAN ---> ID/Name 102
ii) MAB-PC
Name: MAB-PC
Common Tasks: Tick the DACL Name ---> PERMIT_ALL_TRAFFIC
Tick the VLAN ---> ID/Name 8
iii) MAB-PHONE
Name: MAB-PHONE
Common Tasks: Tick the DACL Name ---> PERMIT_ALL_TRAFFIC
Tick the Voice Domain Permission
iv) DOT1X
Name: Dot1x
Common Tasks: Tick the DACL Name ---> PERMIT_ALL_TRAFFIC
Tick the VLAN ---> ID/Name 8
v) SSH
Name: R1-SSH
Common Tasks: Advance Attributes Settings
Cisco:cisco-av-pair (1) = shell:priv-lvl=15 (manually type)
Radius:Service-Type (6) = Login
Radius Idle Timeout: 172800
-----------------------------------------------------------------------------------------
------------
11. Add the Authentication Policies - Total will be 3 (1) MAB (2) Dot1x (3) Anyconnect
& SSH
-----------------------------------------------------------------------------------------
------------
12. Add the Authorization Profiles - Total will be 6 (1) MAB-AP (2) MAB-PC (3) MAB-PHONE
(4) DOt1x (5) Anyconnect (6) SSH
Name Conditions Permissions
Anyconnet if: Anyconnect AND Radius:NAS-IP-Address EQUALS 150.1.7.53 PermitAccess
R1-SSH if: Lab_Admin AND Radius:NAS-IP-Address EQUALS 150.1.7.231 R1-SSH
Dot1x if: Dot1x AND Wired_802.1X AND Radius:NAS-IP-Address EQUALS Dot1x AND PC2
150.1.7.45
MAB_Phone if: MAB_Phone AND Wired_MAB AND Radius:NAS-IP-Address EQUALS MAB_Phone
150.1.7.45 then:
MAB-PC if: MAB_PC AND Wired_MAB AND Radius:NAS-IP-Address EQUALS MAB-PC AND PC1
150.1.7.45
Https://151.1.7.217 ([email protected])/Cisco123
FMC # ifconfig
NGIPS# show network
# Configure manager add 151.17.211 cisco
# Show managers
Zone Networks Ports Logging
Rules Sou Des Sou Des Sou Des
R2(10.1.12.2/32)
R1(10.1.12.1/32)
Rule 1 Ext/Inte Inter/Ext R1(10.1.12.1/32) any Eigrp(88) yes
R2(10.1.12.2/32)
EM(224.0.0.10/32)
Annyconnect S1(192.168.101.3)
Rule 2 External Internal TCP(6):8080 yes
(172.16.10/24) S2(192.168.102.3)
SSL-Clientless S1(192.168.101.3)
Rule 3 External Internal any TCP(6):8080 yes
(10.1.22.0/24) S2(192.168.102.3)