Lab assignment #2 IPSec and VPN Tunnels

Similar documents
- PIX Advanced IPSEC Lab -

Configuration Summary

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Lab - Remote Desktop in Windows 8

Lab - Remote Desktop in Windows 7 and Vista

Lab Student Lab Orientation

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

VPN Configuration Guide. Cisco ASA 5500 Series

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Lab Student Lab Orientation

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Lab Capturing and Analyzing Network Traffic

Cisco ASA 5500 LAB Guide

NetExtender for SSL-VPN

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

Configure ISDN Connectivity between Remote Sites

Lab Configure Basic AP security through GUI

Getting Started with VPN

1.1 Configuring HQ Router as Remote Access Group VPN Server

co Configuring PIX to Router Dynamic to Static IPSec with

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

Configuration and management of Networks LAB 1 Introduction to packet tracer

How to Configure a Cisco Router Behind a Non-Cisco Cable Modem

Business Connect Secure Remote Access Service (SRAS) Customer Information Package

SonicWALL VPN with Win2K using IKE Prepared by SonicWALL, Inc. 05/01/2001

Monitoring Remote Access VPN Services

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Installation procedure for Connect Tunnel client: Windows operating systems

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard

Configuring Management Access

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

PreLab for CS356 Lab NIL (Lam) (To be submitted when you come for the lab)

Classful Address Subnet Mask Number of Hosts per Subnet (2 x 2)

CS 326e Lab 2, Edmondson-Yurkanan, Spring 2004 Router Configuration, Routing and Access Lists

Skills Assessment Student Training Exam

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide

Manual Key Configuration for Two SonicWALLs

Cisco IOS Firewall Authentication Proxy

CCNA 1 Chapter 2 v5.0 Exam Answers %

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

Wireless-G Router User s Guide

VII. Corente Services SSL Client

CCNA Security 1.0 Student Packet Tracer Manual

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Configuring the VPN Client

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

CCNA Security PT Practice SBA

Chapter 6 Virtual Private Networking

4-Port Cable/DSL Router DX-E401. Product Name [French] Product Name [Spanish] USER GUIDE GUIDE DE L UTILISATEUR GUÍA DEL USUARIO

Greenbow VPN Client Example

Module 1 Device and Infrastructure Security Lab

Before you start the lab exercises see the lab administrator or EEE3080F tutor to get assigned to your routers.

Lab - Examining Telnet and SSH in Wireshark

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

OneSecure VPN Remote User Installation & Configuration Guide

D-Link (Europe) Ltd. 4 th Floor Merit House Edgware Road London HA7 1DP U.K. Tel: Fax:

Lab IP Addresses and Network Communication

Configuration Guide SuperStack 3 Firewall L2TP/IPSec VPN Client

Dr. Tom Hicks. Computer Science Department Trinity University

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

Requirements. Cisco VPN Client setup file. Cisco VPN Client software installation

Defining IPsec Networks and Customers

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

Lab Command Line Fundamentals Instructor Version 2500

Chapter 2. Switch Concepts and Configuration. Part II

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Yamaha Router Configuration Training ~ Web GUI ~

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

Site-to-Site VPN with SonicWall Firewalls 6300-CX

Managing the VPN Client

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

Configuring the Cisco VPN 5000 Concentrator and Implementing IPSec Main Mode LAN to LAN VPN Connectivity

Multiple Context Mode

How to Configure a Remote Management Tunnel for an F-Series Firewall

The purpose of this document is show the many ways to securely manage your Access Gateway (AG).

Aventail Connect Client with Smart Tunneling

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

APSCN VPN Settings for Windows 7 2. APSCN VPN Settings for Windows XP 8. APSCN VPN Settings for MAC OS 15

D-Link Central WiFiManager Configuration Guide

SonicWALL / Toshiba General Installation Guide

upgrade-mp through xlate-bypass Commands

WLAN Handset 2212 Installation and Configuration for VPN

How to Configure a Client-to-Site L2TP/IPsec VPN

VPN Connection through Zone based Firewall Router Configuration Example

V7610 TELSTRA BUSINESS GATEWAY

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

Configuring Authentication Proxy

Ingate Firewall. interworking with. SSH Sentinel

MRD-310 MRD G Cellular Modem / Router Web configuration reference guide. Web configuration reference guide

GSS Administration and Troubleshooting

RU-VPN2 - GlobalProtect Installation for Windows

Transcription:

University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels Lab GSA: Carlos Caicedo Page I. Lab resources for this assignment... 1 II. Preliminary questions... 2 III. Lab objective:... 2 Part A:... 2 Part B:... 3 Compliance criteria for Part A:... 3 Compliance criteria for Part B:... 3 IV. Technical details... 4 Address pools... 4 IP addresses for the PIX firewalls... 4 Routing information and default route settings... 4 Configuring the PIX firewalls... 4 Erasing previous configurations on the PIX firewall... 5 Log in for the Windows machines... 5 Telnet and FTP service activation... 5 Establishing an FTP session... 6 Establishing a Telnet Session... 6 VPN Tunnel parameters... 6 Running Ethereal to capture packets... 6 V. Lab report... 7 I. Lab resources for this assignment 2 PIX 501 Firewalls (PIX1, PIX2) 3 Windows 2000 PC (PC1, PC2, PC3) 2 WS 2940 Workgroup switches (SW1, SW4) 1 WS 3550 Workgroup switch 1 Hub Cables and patch cords 1

II. Preliminary questions 1. What are the benefits or disadvantages of VPNs? Briefly mention the ways in which VPNs can be implemented. 2. What are the characteristics of each one of the phases of the ISAKMP/IKE protocol setup? What information is required during the setup of each phase? III. Lab objective: The network structure for this lab is shown in figure 1. All computers shown have the IP addresses displayed in the figure and are configured as FTP 1 and Telnet servers. Figure 1 You must establish an IPSec VPN tunnel between the two firewalls (PIX 501) so that the traffic that flows through the tunnel from LAN1 to LAN2 is encrypted and cannot be interpreted by any intruder in the public network. Part A: Requirements 1. Allow telnet access to PC1 from any PC outside LAN1. a. PC1s true IP address should not be revealed so it is recommended that you create a static NAT entry for PC1 2. Configure NAT in PIX 1 and PIX2 1 FTP service is not started automatically when you log in. You ll have to activate it by following the procedures mentioned later in this document 2

3. Establish a telnet session from PC3 to PC1 and capture the session s traffic with Ethereal on PC2 (The Intruder s PC). Login from PC3 to PC1 with your seclab account. Tasks 1. Analyze the captured traffic and determine the packets in which the seclab s account password is being sent. Part B: Requirements 1. Reconfigure PIX1 and PIX2 to establish an IPSec VPN tunnel between them that will secure traffic flowing from LAN1 to LAN2. This means, securing traffic that will flow from 10.10.10.0 to 10.10.3.0 Note: For true VPN functionality, NO address translation must affect traffic flow between LAN1 and LAN2 ONLY. Additionally, services on LAN1 and LAN2 should work for any user of either LAN. 2. Establish a telnet session from PC3 to PC1 and capture the session s traffic with Ethereal on PC2. Login from PC3 to PC1 with your seclab account. Tasks 1. Analyze the captured traffic and determine the differences with the packets captured for a similar session in part A. 2. Can you access any service on the PCs of LAN1 or LAN2 from PC4? Can the PCs from either LAN access services on PC4? What does this tell you about the security of the VPN tunnel you have configured? Compliance criteria for Part A: 1. Users from the networks outside LAN1 (PC3 and PC4) can telnet to PC1 2. Traffic from the private network that goes into the public network must not reveal the private network s IP addresses. 3. The traffic flow between LAN 1 and LAN 2 can be captured for your analysis. Compliance criteria for Part B: 1. Telnet and FTP access among the computers on LAN1 and LAN 2 works. (PC1 can Telnet to PC3 and vice versa, PC1 can FTP to PC3 and vice versa) 2. The captured traffic flow between LAN1 and LAN2 shows encrypted packets. 3

IV. Technical details Address pools LAN1 s internal (private) address pool for its network is 10.10.10.0 with a netmask of 255.255.255.0 LAN1 s external (public) address pool is 192.168.2.1 192.168.2.63 However, 192.168.2.1 has to be assigned to PIX1 s outside interface LAN2 s internal (private) address pool for its network is 10.10.3.0 with a netmask of 255.255.255.0 LAN2 s external (public) address pool is 192.168.10.1 192.168.10.63 However, 192.168.10.1 has to be assigned to PIX2 s outside interface IP addresses for the PIX firewalls PIX1 Inside interface : 10.10.10.1 Outside interface: 192.168.2.1 PIX2 Inside interface : 10.10.3.1 Outside interface: 192.168.10.1 Routing information and default route settings Traffic between LAN1 and LAN2 has to go through a public routed network in this assignment. The routing settings for this network have been set for you but you must take care of indicating the correct default gateways to the firewalls that will take care of the traffic of LAN1 and LAN2. On PIX1 set the default gateway to be 192.168.2.65 On PIX2 set the default gateway to be 192.168.10.65 Configuring the PIX firewalls In order to configure the PIX firewalls you will connect the blue cable that ends in a serial adapter to the serial port on the back of PC1. Once you log in to your user account (explained later) you can activate the Connect to Serial Port icon located on your desktop. Press the Enter key several times to wake up the connection. When you are finished configuring one of the PIX, simply pull out the blue cable and connect it to the Console port of any other PIX you need to configure. 4

You will not be using the PIX Device Manager s graphical user interface to configure the firewall in this assignment. Erasing previous configurations on the PIX firewall Before starting to configure the PIX firewall you should erase any previous configuration already stored on it so that you can start your work from an unconfigured system. To do this enter privileged mode on the PIX firewall and use the following commands: write erase reload These commands erase the current configuration from the flash memory of the PIX and reboot the firewall. To start configuring the PIX answer yes to any prompt that shows up except for the one that says Pre-configure PIX Firewall now through iterative prompts? to which you should answer no. After all this you ll be left at the prompt of the unprivileged mode of the PIX. Since there is no configuration stored on it, the enable (privileged mode) password is blank. When asked for the enable password just press the Enter key. When you have finished this lab assignment, erase the configuration that you have provided to the PIX firewall so the next student team will also start from an unconfigured system. Log in for the Windows machines For your work in this lab you will use the username seclab with password seclab1 on all Windows 2000 based machines. Telnet and FTP service activation The PCs for this lab are the Windows 2000 Professional machines that have been labeled PC1, PC2 and PC3. These machines have the Telnet service installed and activated. However, for this lab you have to manually activate the FTP Server service on a machine if it has not previously been activated. You can do this by clicking on the Start FTP Server icon on the Desktop screen of each PC. When you activate the FTP Server, you should see the initial screen of the Quick n easy FTP server. If not, check to see if you have a small icon on the lower right hand corner of your screen and click on it to activate the initial screen (the icon looks like a small world globe with a stripe running diagonal across it). Once on the initial screen of the Quick n easy FTP server click on the Start button to start the FTP service on that machine. 5

Establishing an FTP session To establish an FTP session from machine A to machine B do the following: 1. Open a command screen from machine A: Select Start -> Run and write cmd in the Run command window. A black text based window should open up. 2. On the command screen start an FTP session of machine B by executing: ftp <ip_address_of_machine_b> 3. Login as user anonymous, there is no password so you can press the Enter key at the password prompt. 4. When you want to logout of the FTP server type quit Establishing a Telnet Session To establish a Telnet session from machine A to machine B do the following: 1. Open a command screen from machine A: Select Start -> Run and write cmd in the Run command window. A black text based window should open up. 2. On the command screen start an FTP session of machine B by executing: telnet <ip_address_of_machine_b> 3. Login as user seclab, the login password is seclab1. If you are prompted for a domain, just press the Enter key 4. When you want to exit the telnet session type exit. VPN Tunnel parameters 1. Use only ESP since traffic is going through a public network. 2. Use pre-shared keys for device authentication. The key can be a string of characters and numbers selected by you. Example: cisco123. 3. For encryption use DES only. All other parameter values (DH group, HMAC standard, etc) should be chosen by each student group. Running Ethereal to capture packets The software application Ethereal is installed on all computers of the security lab. However for this lab you will only need to activate it in PC2. To activate Ethereal and start a packet capture, do the following: 6

1. Login into each machine as seclab 2. Activate the Ethereal icon that is on the Desktop 3. Go to the Capture menu and click on the OK button to start the packet capture. A capture progress window should pop-up. 4. Once enough packets have been captured or enough time has elapsed, click on the Stop button. Capture only the packets you need in order to make your analysis easier. 5. Once you have stopped the packet capture, you should be able to recognize three different screen sections: The packet list section (upper section), the packet details section (middle section) and the packet bytes section (lower section). Each time you select a packet in the packet list section the other two sections will change accordingly. You can now analyze the captured packets as you wish. Note: The Filter: text field on the main screen allows you to specify which packets should be displayed on the packet list section of the screen. Use this to get a view of only those packets that you are interested in. For example, if you write telnet in this field you will only see the packets related to a captured telnet session. V. Lab report The lab report for this assignment should include. 1. Answers to the questions posted in the Preliminary Questions section of this assignment. 2. Printout or screen capture of one of the packets captured with ethereal for part A and another for part B. 3. Include the configuration file that satisfies the requirements of Part A and the configuration file that satisfies the requirements of Part B (or a list of changes that you had to do to Part A s configuration). Include a list of the VPN parameters that were chosen by you and their respective values. 4. Explain the information contained in at least one of the packets that relate to task 1 of part A 5. Write down the analysis you completed for task 1 of part B 6. Answer the questions mentioned in task 2 of part B Tip: To capture the configuration of the firewall, open a Terminal connection through the console port of the firewall (as explained in the introductory session), enter privileged mode and execute the show running configuration command (The short version is sh run). Then select the configuration text and press Ctrl-C. Open a text editor (like Wordpad) and paste the configuration text with Crl-V. Save the file and include its contents in the report. 7