Firewall Configuration

Configuring a Simple Firewall


The Cisco 1800 integrated services routers support network traffic filtering by means of access lists. The router also supports packet inspection and dynamic temporary access lists by means of Context-Based Access Control (CBAC).
Basic traffic filtering is limited to configured access list implementations that examine packets at the network layer or, at most, the transport layer, permitting or denying the passage of each packet through the firewall. However, the use of inspection rules in CBAC allows the creation and use of dynamic temporary access lists. These dynamic lists allow temporary openings in the configured access lists at firewall interfaces. These openings are created when traffic for a specified user session exits the internal network through the firewall. The openings allow returning traffic for the specified session (that would normally be blocked) back through the firewall.
.

8-1 Router with Firewall Configured
1.    Multiple networked devices—Desktops, laptop PCs, switches.
2.    Fast Ethernet LAN interface (the inside interface for NAT)
3.    PPPoE or PPPoA client and firewall implementation—Cisco 1811/1812 or Cisco 1801/1802/1803 series integrated services router, respectively
4.    Point at which NAT occurs
5.    Protected network
6.    Unprotected network
7.    Fast Ethernet or ATM WAN interface (the outside interface for NAT)
In the configuration example that follows, the firewall is applied to the outside WAN interface (FE0) on the Cisco 1811 or Cisco 1812 and protects the Fast Ethernet LAN on FE2 by filtering and inspecting all traffic entering the router on the Fast Ethernet WAN interface FE1. Note that in this example, the network traffic originating from the corporate network, network address 10.1.1.0, is considered safe traffic and is not filtered.
Configuration Tasks
Perform the following tasks to configure this network scenario:
·                 Configure Access Lists
·                 Configure Inspection Rules
·                 Apply Access Lists and Inspection Rules to Interfaces
More Click on:- http://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/firewall.html


Comments

Popular posts from this blog

Information Security Interview Questions & Answers

MCSE INTERVIEW QUESTIONS AND ANSWER

OSI MODEL (Open Systems Interconnection model )