Use GNS3 to perform the PIX Firewall ICMP Experiment

Source: Internet
Author: User

Basic interfaces and default routes for R1 and R2 configuration!

PIX Configuration:

 

Pixfirewall> en

Password: Press enter.

Pixfirewall #

Pixfirewall # conf t

Pixfirewall (config) # hostname PIX

PIX (config) # int e0

PIX (config-if) # ip address 220.171.1.2 255.255.255.0

PIX (config-if) # security-level 0 external interface, security level 0

PIX (config-if) # nameif outside external interface Name

PIX (config-if) # no sh

PIX (config-if) # int e1

PIX (config-if) # ip ad 10.0.1.1 255.255.255.0

PIX (config-if) # security-level 100 internal interface, security level 100

PIX (config-if) # nameif inside

PIX (config-if) # no sh

By default, internal devices can ping internal interfaces. Likewise, external devices can also ping external interfaces!

 

 

Now, the firewall's internal and external interfaces are rejected!

PIX

 

PIX (config) # icmp deny 0 0 outside or icmp deny any outside

PIX (config) # icmp deny 0 0 inside or icmp deny any inside

Ping again and the result is as follows:

 

 

 

We can see that ping is unavailable!

You can also use the following command to reject the command:

 

PIX (config) # icmp deny 0 0 echo outside/prevent external host from sending the echo packet

PIX (config) # icmp deny 0 0 echo inside/prevent internal host from sending echo packets

The same effect! When the PING command is used, an echo packet is sent to allow the target network to respond to check whether the network is smooth and fast! It is also called echo data, which is generally used to determine that the connection is normal!

------------------------------------------------------------------------

Next we will do the following: icmp traversal pix Experiment

PIX

 

 

PIX (config) # access-list k1 permit icmp any internal traffic filtering, allowing any internal traffic (at this moment, the ICMP packet can be outbound but cannot be returned, and the route can be returned after configuration)

PIX (config) # access-group k1 in interface outside allow the traffic specified by k1 on the outside interface

 

PIX (config) # nat (inside) 1 0 0

PIX (config) # global (outside) 1 interface use the outside interface IP address to implement port address translation

INFO: outside interface address added to PAT pool

 

PIX (config) # route inside 10.0.2.0 route 255.255.0 10.0.1.2/route to the internal network, Next Hop 10.0.1.2, otherwise the pix does not know how to return data packets

Note: The Source Address is converted by the outside interface address when the tag nat1 is sent from inside. The source address of the ping packet from the inside out will also be replaced, but the ping packet will be blocked by the outside interface when it comes back.

We can see that ping from the inside out is the same! Of course, you can also ping the PIX interface! If so

PIX (config) # global (outside) 1 220.171.1.3-220.171.1.3 255.255.255.0

PIX (config) # nat (inside) 1 10.1.1.0 255.255.255.0

Only the IP address pool or PAT can be used for the network traffic of the internal PC 10.1.1.0/24.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.