17-Firewall, NAT, and IPS-16-03-2024
17-Firewall, NAT, and IPS-16-03-2024
17-Firewall, NAT, and IPS-16-03-2024
[https://www.youtube.com/watch?v=ohvGuTPQ1SM]
1. The steps followed in configuring each device [Two PCs, one Switch, one
NAT router (both g0/0 and g0/1) and PC1 from PC0.
4. Add screenshot of NAT configuration in NAT router, where you have to
Router#en
Router#conf t
Router(config)#int g0/0
Router(config-if)#ip nat inside
Router(config-if)#exit
Router(config)#int g0/1
Router(config-if)#ip nat outside
Router(config-if)#end
Router#wr
Building configuration…
[OK]
Router#
5. Add screenshot of NAT configuration in NAT router, where you have to
mention the translation from the private IP address to public IP address on PC0.
Router(config)#end
6. Include the screenshots of pinging the router1 address from PC0 and show
7. Enable the debug option and include the screenshots of the translations.
Router#debug ip ?
eigrp IP-EIGRP information
icmp ICMP transactions
nat NAT events
ospf OSPF information
packet Packet information
rip RIP protocol transactions
routing Routing table events
Router#debug ip nat
IP NAT debugging is on
Router#
NAT: s=192.168.10.10->10.0.0.1, d=10.0.0.2 [25]
NAT*: s=10.0.0.2, d=10.0.0.1->192.168.10.10 [17]
NAT: s=192.168.10.10->10.0.0.1, d=10.0.0.2 [26]
NAT*: s=10.0.0.2, d=10.0.0.1->192.168.10.10 [18]
NAT: s=192.168.10.10->10.0.0.1, d=10.0.0.2 [27]
NAT*: s=10.0.0.2, d=10.0.0.1->192.168.10.10 [19]
NAT: s=192.168.10.10->10.0.0.1, d=10.0.0.2 [28]
NAT*: s=10.0.0.2, d=10.0.0.1->192.168.10.10 [20]
NAT: expiring 10.0.0.1 (192.168.10.10) icmp 20 (20)
NAT: expiring 10.0.0.1 (192.168.10.10) icmp 21 (21)
NAT: expiring 10.0.0.1 (192.168.10.10) icmp 22 (22)
NAT: expiring 10.0.0.1 (192.168.10.10) icmp 23 (23)
Router(config)#ip nat ?
inside Inside address translation
outside Outside address translation
pool Define pool of addresses
Router(config)#ipnat_add_static_cfg: id 2, flag 6
Router(config)#exit
9. Include the screenshots of pinging the router1 address from PC1 and show the
address translations.
Router#show ip nat translations
10. Enable the debug option and include the screenshots of the translations.
Router#debug ip nat
IP NAT debugging is on
Router#
Router#
1. The steps followed in configuring each device [Two PCs, one Switch, one
NAT router (both g0/0 and g0/1), router 1 and PC1 from PC0.
4. Add screenshot of NAT configuration in NAT router, where you have to
Router#en
Router#conf t
Router(config)#int g0/0
Router(config-if)#ip nat inside
Router(config-if)#exit
Router(config)#int g0/1
Router(config-if)#ip nat outside
Router(config-if)#end
Router#wr
Building configuration…
[OK]
Router#
5. Create a standard access list to permit the PCs [PC1 & PC2]
Router#en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#access-list 10 ?
deny Specify packets to reject
permit Specify packets to forward
remark Access list entry comment
Router(config)#access-list 10 permit ?
A.B.C.D Address to match
any Any source host
host A single host address
Router(config)#ip nat ?
inside Inside address translation
outside Outside address translation
pool Define pool of addresses
8. Include the screenshots of pinging the router1 address from PC0 and show the
address translations
Router#sh ip ?
access-lists List access lists
arp IP ARP table
bgp BGP information
cache IP fast-switching route cache
cef Cisco Express Forwarding
dhcp Show items in the DHCP database
eigrp IP-EIGRP show commands
interface IP interface status and configuration
nat IP NAT information
nbar Network-Based Application Recognition
ospf OSPF information
protocols IP routing protocol process parameters and statistics
rip IP RIP show commands
route IP routing table
ssh Information on SSH
Router#sh ip nat ?
statistics Translation statistics
translations Translation entries
9. Enable the debug option and include the screenshots of the translations.
Router#
Router#debug ?
aaa AAA Authentication, Authorization and Accounting
custom-queue Custom output queueing
eigrp EIGRP Protocol information
frame-relay Frame Relay
ip IP information
ipv6 IPv6 information
ntp NTP information
ppp PPP (Point to Point Protocol) information
standby Hot Standby Router Protocol (HSRP)
Router#debug ip ?
eigrp IP-EIGRP information
icmp ICMP transactions
nat NAT events
ospf OSPF information
packet Packet information
rip RIP protocol transactions
routing Routing table events
Router#debug ip nat
IP NAT debugging is on
Router#
NAT: s=192.168.10.10->10.0.0.10, d=10.0.0.2 [21]
NAT*: s=10.0.0.2, d=10.0.0.10->192.168.10.10 [8]
NAT: s=192.168.10.10->10.0.0.10, d=10.0.0.2 [22]
NAT*: s=10.0.0.2, d=10.0.0.10->192.168.10.10 [9]
NAT: s=192.168.10.10->10.0.0.10, d=10.0.0.2 [23]
NAT*: s=10.0.0.2, d=10.0.0.10->192.168.10.10 [10]
NAT: s=192.168.10.10->10.0.0.10, d=10.0.0.2 [24]
NAT*: s=10.0.0.2, d=10.0.0.10->192.168.10.10 [11]
C. Configure IOS Intrusion Prevention System (IPS) Using the CLI in Cisco Packet
Tracer. [https://www.youtube.com/watch?v=_nPwKE72QHk]
Objectives
• Enable IOS IPS.
• Configure logging.
• Modify an IPS signature.
• Verify IPS.
Background / Scenario
Your task is to enable IPS on R1 to scan traffic entering the 192.168.1.0 network.
The server labeled Syslog is used to log IPS messages. You must configure the router to
identify the syslog server to receive logging messages. Displaying the correct time and date
in syslog messages is vital when using syslog to monitor the network. Set the clock and
configure the timestamp service for logging on the routers. Finally, enable IPS to produce an
alert and drop ICMP echo reply packets inline.
Step 3: Create an IOS IPS configuration directory in flash. On R1, create a directory in flash
using the mkdir command. Name the directory ipsdir. [The flash file system (default) is a
single flash device on which you can store files].
R1# mkdir ipsdir
create directory filename [ipsdir]? <Enter> Created
dir flash:ipsdir
Step 4: Configure the IPS signature storage location. On R1, configure the IPS
signature storage location to be the directory you just created.
R1(config)# ip ips config location flash:ipsdir