Lab - Mitigating Data Plane Attacks by Using ACL
Lab - Mitigating Data Plane Attacks by Using ACL
Lab - Mitigating Data Plane Attacks by Using ACL
10.1.1.0/24
SW1
Fa0/0 10.2.2.0/28
Fa0/1
Fa0/5 Fa0/10 .1 .1
PC1
DHCP Client Fa0/2 Router PC3
DHCP server .2
Pool1: 10.1.1.0/24
PC2 (Analyzer)
.100
monitor session 1 source int fa0/10 the switch port that you want to monitor
monitor session 1 destination int fa0/2 network analyzer’s port
6. Capture PC1’s Telnet messages to Router from Analyzer. Set a Display filter so
as to figure out the telnet Username/password from the captured messages.
Successful? ___________ .
7. Can you find out the TCP 3-way handshake messages triggered by Telnet?
____________. If yes, fill up the Table 1.
3Way Handshake Messages
Table 1.
1st 2nd 3rd
Source IP address
Destination IP address
TCP source port
TCP destination port
TCP Sequence
number
TCP Acknowledgment
number
Ack bit (0 or 1)
Syn bit (0 or 1)
Analyzing Network Traffic
8. Turn Analyzer Capture session on. Now analyze DHCP messages. Issue
release/renew commands on PC1 (DOS Window) to renew IP settings.
Analyze DHCP PDUs, and answer the following:
How many different types of DHCP PDUs have you observed? ______________.
List here: _______________________________________________________ .
Is DHCP UDP or TCP based? _______ .
DHCP Server end Port Number is _____ .
DHCP Client end Port Number is ______.
10. Set a Access Control List on router so that Remote Connection to PC3 is allowed,
the rest traffic flows are blocked.
Testing
10. Set an Access Control List on router so that Remote Connection to
PC3 is allowed, the rest traffic flows are blocked.
Q1: Your ACL configuration
Q3: How does this ACL affect PC1 to PC3 Remote Desktop
Connection (RDP) service?
Note:
Lab report submission is required.
Please remove passwords, shutdown systems, and unplug and warp all cables. Thanks!