博威---云架构决胜云计算

 找回密码
 注册

QQ登录

只需一步,快速开始

搜索
楼主: network

Cisco Catalyst 6509交换机FWSM防火墙模块配置资料 大全

[复制链接]
 楼主| 发表于 2007-5-9 10:08:28 | 显示全部楼层
6503/6506/6509高端防火墙解决方案应用


6503/6506/6509 高端防火墙可以采用虚拟防火墙以及透明防火墙的技术,从而更加有效地支持用户的安全需求。利用虚拟防火墙的特性,将一个或者多个互联网的接入线路直接终结在 C6500 交换机上,利用一个或两个以上的虚拟防火墙分别完成线路接入、路由处理以及地址翻译等工作,姑且将这一类虚拟防火墙称为外部防火墙。在这些外部防火墙的设置中,我们通常采用两端口或三端口的方式,后者主要考虑到对外服务器群的DMZ区域连接的问题,如图2所示。
同时我们将外部防火墙的内部端口分别与 C6500 的 MSFC 进行 L3 的连接,注意此处一定是分别连接,在路由处理方面可以采用静态路由的方式即可,这样比较简单有效。
在处理好外部接入与防护问题之后,我们可以有选择性地保护一些内部资源,例如关键性服务器资源以及重要的用户群等。此时,我们可以利用虚拟防火墙去分别连接此类资源,不同的是这些内部防火墙是用外部接口与 MSFC 分别互连,这样它们所保护的对象就处于防火墙的内部网段了,如图3所示。
C6500 作为网络的核心设备,MSFC 是一个中心的 L3 对象。以此为中心,对外可以通过外部防火墙进行外部的互连,此时整个网络均作为被保护对象处于外部防火墙的内部网段;同时,在面对内部需要保护的对象时,FWSM 防火墙模块可以通过 VLAN 的灵活划分,利用内部防火墙有选择性地加以保护,此时的保护连接可以是 L2,也可以是 L3 方式。比如说,普通的汇聚层交换机此时仍然可以通过 L3 的方式与 C6500 的 MSFC 进行连接,双方可以完成动态路由的交换,这样普通用户可以不受限制的接入,与传统网络设计没有什么区别。但是,如果我们认为某一台汇聚交换机所接入的用户安全等级比较高,此时就可以在 MSFC 与该汇聚交换机之间加入一个虚拟防火墙,只是此时防火墙的内部端口接的是汇聚交换机,外部端口接的是 MSFC 而矣。此时,该用户群就可以得到专门的防火墙保护了,任何针对该用户群的攻击都必须首先突破防火墙的防御,这样就可以有效提高内部的安全防护等级。当然,如果说保护的是一些关键性服务器等对象,也是可以采用内部防火墙的防护的,只是此时防火墙内部端口可以通过 VLAN 或 VLAN Trunk 方式连接,只要将服务器的网关设为防火墙内部端口的IP地址就可以了。
当在电信 POP 点应用 6503/6506/6509 高端防火墙时,可以通过 FWSM 的 VFW 功能,提供针对每个用户的安全保护增值服务,例如图4所示,我们可以在PE-CE之间加入VFW的保护,具体的安全策略可以由各个用户自行制定,也可以由电信运营商代理。
思科CAT6K集成安全系统
防火墙技术的发展有两个主要趋势,一是将 IDS/IPS 集成到防火墙中,提供单一设备的网络防护整体方案;另外一个趋势是防火墙与交换机的整合,或者说是防火墙功能在网络中向分布式发展,交换机中会有更多,更强大的防火墙功能。
思科公司的 CAT6K 交换机里部署 FWSM 防火墙模块和 IDS 入侵监测模块是这两种技术趋势的完美结合,具有独特的优势。
FWSM防火墙模块部署在CAT6K中的好处
  • FWSM 防火墙模块具有非常高的性能,提供 5.5G 的容量,同时支持共 1,000,000 个连接,每秒 100,000 连接响应,实现安全和性能的完美结合
  • FWSM 防火墙模块具有丰富的安全功能,支持虚拟防火墙,透明模式和路由模式,资源控制,日志监控,内容过滤等业界领先的功能
  • FWSM 防火墙模块本身不带有任何端口,通过 6GE 的背板总线和 CAT6K 其他部件通讯,可以插在 CAT6K 交换机或 OSR 的任何一个交换槽位中,CAT6K 交换机的任何端口都可以定义成防火墙端口。因此在采用 CAT6K 或 OSR 搭建网络的时后,可以非常方便的部署安全策略和实施,控制需要管理的流量。
  • 简化用户网络的同时,真正实现对用户的投资保护。对于已经购买 CAT6K 交换机 /OSR 的用户,不需要对原有产品进行更换,只需购买 FWSM 防火墙模块,就可获得思科提供的所有防火墙特性和非常高的性能。
  • FWSM 防火墙模块融合在 CAT6K 交换机中,其融合之美在应用上为用户提供了特别的方便,如下图所示
  • 最早的串接结构模式,明显的防火墙成为了网络的瓶颈,而且部署非常不灵活,所有的流量均需要通过,可能需要部署多个防火墙;串接模式的改进型为单臂模式,解决了瓶颈和部署不灵活的问题,但网络逻辑结构复杂,有时还需要交换机支持PBR策略路由来控制流量,因此在动态环境下,会有路由无法备份,无法支持热备份等问题,同时交换机和防火墙之间的安全相关的互联互通有时也会出现问题;思科公司的融合模式,即将 FWSM 防火墙模块和 CAT6K 交换机融为一体,逻辑结构清晰,容易管理和部署,交换机的每个端口均可作为防火墙的端口,流量很容易控制,方便灵活,真正完全满足用户的需要
IDSM-2入侵监测模块部署在CAT6K中的好处
  • IDSM-2 入侵监控模块提供 600Mbps 业界领先的处理性能,在 CAT6K 中可以部署多块,可达 6G 的处理能力
  • CAT6K 支持广域网接口,IDSM-2 工作在 CAT6K 中,可以非常轻松的监控来自于广域网模块的流量
  • IDSM-2 入侵监控模块本身没有物理端口,通过多个 GE 和背板总线连接,可以同时监控多个 VLAN 和 VLAN ID,通过 VLAN 访问控制列表 VACL 获取功能来提供对数据流的访问权限 VACL 可以支持无限个 VLAN
  • 采用多种用于获取和响应的技术包括 SPAN/RSPAN 和 VACL 获取功能,以及屏蔽和 TCP 重置功能,从而让用户可以监控不同的网段和流量,同时让产品可以采取及时的措施以消除威胁
  • IDSM-2 入侵监控模块在硬件设计上已经支持 IPS 技术模式,当 IPS 技术成熟后,可以通过简单的软件升级就可以实现从 IDS 到 IPS 的平滑过渡,保护投资
FWSM防火墙模块和IDSM-2入侵监测模块在CAT6K中的优势
  • 融合最前面两种技术发展趋势的优点,在单一设备中提供业界领先的安全保护
  • 具有非常高的性价比,是单独部署防火墙和IDS入侵监测投资的50%
  • FWSM 和 IDSM 具有业界领先的性能,完全匹配 CAT6K 的高性能交换,提供完美的解决方案
  • IDSM-2 和 FWSM 防火墙模块之间可以非常容易的实现互动,IDSM-2 在监测到网络攻击之后,可以直接控制 FWSM 防火墙模块和 CAT6K 做出相应的安全防护动作,有效的防护网络攻击,解决了不同厂家之间 IDS 和防火墙之间无法互动的问题
  • 思科这种集成化网络安全解决方案让企业可以提高生产率,降低运营成本
 楼主| 发表于 2007-5-9 10:11:20 | 显示全部楼层
问题主题: FWSM透明模式配置遇到问题
提问者: EA110297
提问时间: 2006-3-30 19:13:24
提问内容: 你好,我按照FWSM Guide book里面的参考配置对FWSM作transparent,遇到一些问题,请专家帮忙:
step1. MSFC的VLAN与FWSM的VLAN关联已成功
step2. 已将single mode改成multiple mode
(问题A:我已经在single mode下作transparent试过不成功,表现为由FWSM managment_ip可以ping通inside的PC,也能PING通MSFC的outside vlan,但就是inside的PC怎么都ping不到outside的MSFC,且我已经作了icmp permit any和ACL permit any in int inside/outside了,FWSM作transparent时是否必须使用multiple mode呢?)
step3. 在multiple mode下成功转换成transparent mode.
step4: 在multiple mode-transparent mode下并不如Guide book所说的,像基本的nameif和security-level命令都不能用,且no shutdown端口根本无效,以下是我的配置输出:
FWSM# show run
: Saved
:
FWSM Version 2.3(2)
firewall transparent
resource acl-partition 12
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname FWSM
ftp mode passive
pager lines 24
logging buffer-size 4096
class default
limit-resource IPSec 5
limit-resource Mac-addresses 65535
limit-resource PDM 5
limit-resource SSH 5
limit-resource Telnet 5
limit-resource All 0
!
no failover
failover lan unit secondary
failover polltime unit 1 holdtime 15
failover polltime interface 15
failover interface-policy 50%
arp timeout 14400
!
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 rpc 0:10:00 h3
23 0:05:00 h225 1:00:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
terminal width 80
admin-context admin
context admin
description admin
member default
allocate-interface vlan500-vlan501
config-url disk:/admin.cfg
!
Cryptochecksum:a7163d8d21a3001d59096a68a1144623
: end
FWSM# show interface
Interface eobc "eobc", is up, line protocol is up
MAC address 0000.1300.0000, MTU 1500
IP address 127.0.0.31, subnet mask 255.255.255.0
Received 22182 packets, 1448847 bytes
Transmitted 46400 packets, 1416323 bytes
Dropped 0 packets
Interface vlan500 "", is administratively down, line protocol is up
Available for allocation to a context
Interface vlan501 "", is administratively down, line protocol is up
Available for allocation to a context
Interface vlan502 "", is administratively down, line protocol is up
Available for allocation to a context
FWSM# config t
FWSM(config)# interface vlan501
FWSM(config-interface)# ?
At the end of show , use the pipe character '|' followed by:
begin|include|exclude|grep [-v] , to filter show output.
shutdown Shutdown an interface.
FWSM(config-interface)# nameif inside
Type help or '?' for a list of available commands.
FWSM(config-interface)# security-level 100
Type help or '?' for a list of available commands.
FWSM(config-interface)# exit
FWSM(config)# interface vlan500
FWSM(config-interface)# nameif outside
Type help or '?' for a list of available commands.
FWSM(config-interface)# security-level 0
Type help or '?' for a list of available commands.
FWSM(config-interface)# no shutdown
FWSM(config-interface)# interface vlan501
FWSM(config-interface)# no shutdown
FWSM(config-interface)# exit
FWSM(config)# exit
FWSM# show interface
Interface eobc "eobc", is up, line protocol is up
MAC address 0000.1300.0000, MTU 1500
IP address 127.0.0.31, subnet mask 255.255.255.0
Received 22555 packets, 1472782 bytes
Transmitted 47304 packets, 1442451 bytes
Dropped 0 packets
Interface vlan500 "", is administratively down, line protocol is up
Available for allocation to a context
Interface vlan501 "", is administratively down, line protocol is up
Available for allocation to a context
Interface vlan502 "", is administratively down, line protocol is up
Available for allocation to a context
FWSM# show mode
Firewall mode: multiple
The flash mode is the SAME as the running mode.
FWSM# show firewall
Firewall mode: Transparent
FWSM#
以上是我配置的截屏
问题B:为何我明明no shut了vlan,但show int还是显示admin down呢?但line protocol is up ?
问题C:在int vlan里连nameif和security-level命令都没有,只有no shut的命令是为什么呢?
问题D:请帮忙根据上述输出定位一下问题所在吧,我真一愁莫展了,谢谢!
问题E:总是听讲transparent mode没有router mode安全,也听讲cisco以前认为桥接模式不安全才一直不支持transparent的,顺便在这里向各位专家权威求证一 下:是不是transparent比router mode安全性要差呢?cisco后来终于支持transparent mode了是不是受市场商业因素驱动而至,而始终来讲transparent的安全性始终要比router mode低呢?
问题很多,谢谢各位专家!


回答者: JiangXing_cisco
回答时间: 2006-3-31 10:28:13
回答内容:
问题A的答复:FWSM作transparent时不需要multiple mode。
问题B,C,D的答复:在step4中,你还处在System Context中,System context 是用来管理用的,不适用于用户的流量保护,所以你说的这些命令无效,请进入使用命令“changeto context admin”进入admin context就可以了。
问题E的答复:transparent 模式有很多缺点:不支持Active-Active,不支持NAT,不支持Qos。
 楼主| 发表于 2007-5-9 10:13:43 | 显示全部楼层
Table Of ContentsConfiguring the Switch for the Firewall Services Module
Switch Overview
Verifying the Module Installation
Assigning VLANs to the Firewall Services Module
VLAN Guidelines
Assigning VLANs to the FWSM in Cisco IOS Software
Assigning VLANs to the FWSM in Catalyst Operating System Software
Adding Switched Virtual Interfaces to the MSFC
SVI Overview
Configuring SVIs for Cisco IOS Software on the Supervisor Engine
Configuring SVIs for Catalyst Operating System Software on the Supervisor Engine
Customizing the FWSM Internal Interface
Configuring the Switch for Failover
Assigning VLANs to the Secondary Firewall Services Module
Adding a Trunk Between a Primary Switch and Secondary Switch
Ensuring Compatibility with Transparent Firewall Mode
Managing the Firewall Services Module Boot Partitions
Flash Memory Overview
Setting the Default Boot Partition
Resetting the FWSM or Booting from a Specific Partition

Configuring the Switch for the Firewall Services Module This chapter describes how to configure the Catalyst 6500 series switch or the Cisco 7600 series router for use with the FWSM. Before completing the procedures in this chapter, configure the basic properties of your switch, including assigning VLANs to interfaces, according to the documentation that came with your switch.
This chapter includes the following sections:
• Switch Overview
• Verifying the Module Installation
• Assigning VLANs to the Firewall Services Module
• Adding Switched Virtual Interfaces to the MSFC
• Customizing the FWSM Internal Interface
• Configuring the Switch for Failover
• Managing the Firewall Services Module Boot Partitions
Switch Overview You can install the FWSM in the Catalyst 6500 series switches or the Cisco 7600 series routers. The configuration of both series is identical, and the series are referred to generically in this guide as the "switch." The switch includes a switch (the supervisor engine) as well as a router (the MSFC).
The switch supports two software modes:
•Cisco IOS software on both the switch supervisor engine and the integrated MSFC router.
•Catalyst operating system software on the supervisor engine, and Cisco IOS software on the MSFC.
Both modes are described in this guide.
The FWSM runs its own operating system.
See the "Using the MSFC" section for more information about the MSFC.

Note For each FWSM in a switch, the SPAN reflector feature is enabled. This feature enables multicast traffic (and other traffic that requires central rewrite engine) to be switched when coming from the FWSM. The SPAN reflector feature uses one SPAN session. To disable this feature, enter the following command:
Router(config)# no monitor session servicemodule


Verifying the Module Installation To verify that the switch acknowledges the FWSM and has brought it online, view the module information according to your operating system:
•Cisco IOS software
Router> show module [mod-num | all]


The following is sample output from the show module command:
Router> show module
Mod Ports Card Type                              Model              Serial No.
--- ----- -------------------------------------- ------------------ -----------
  1    2  Catalyst 6000 supervisor 2 (Active)    WS-X6K-SUP2-2GE    SAD0444099Y
  2   48  48 port 10/100 mb RJ-45 ethernet       WS-X6248-RJ-45     SAD03475619
  3    2  Intrusion Detection System             WS-X6381-IDS       SAD04250KV5
  4    6  Firewall Module                        WS-SVC-FWM-1       SAD062302U4


•Catalyst operating system software
Console> show module [mod-num]


The following is sample output from the show module command:
Console> show module
Mod Slot Ports Module-Type               Model               Sub Status
--- ---- ----- ------------------------- ------------------- --- ------
1   1    2     1000BaseX Supervisor      WS-X6K-SUP1A-2GE    yes ok
15  1    1     Multilayer Switch Feature WS-F6K-MSFC         no  ok
4   4    2     Intrusion Detection Syste WS-X6381-IDS        no  ok
5   5    6     Firewall Module           WS-SVC-FWM-1        no  ok
6   6    8     1000BaseX Ethernet        WS-X6408-GBIC       no  ok



Note The show module command shows six ports for the FWSM; these are internal ports that are grouped together as an EtherChannel. See the "Customizing the FWSM Internal Interface" section for more information.
Assigning VLANs to the Firewall Services Module This section describes how to assign VLANs to the FWSM. The FWSM does not include any external physical interfaces. Instead, it uses VLAN interfaces. Assigning VLANs to the FWSM is similar to assigning a VLAN to a switch port; the FWSM includes an internal interface to the Switch Fabric Module (if present) or the shared bus.

Note See the switch documentation for information about adding VLANs to the switch and assigning them to switch ports.
This section includes the following topics:
• VLAN Guidelines
• Assigning VLANs to the FWSM in Cisco IOS Software
• Assigning VLANs to the FWSM in Catalyst Operating System Software
VLAN Guidelines See the following guidelines for using VLANs with the FWSM:
•You can use private VLANs with the FWSM. Assign the primary VLAN to the FWSM; the FWSM automatically handles secondary VLAN traffic.
•You cannot use reserved VLANs.
•You cannot use VLAN 1.
•If you are using FWSM failover within the same switch chassis, do not assign the VLAN(s) you are reserving for failover and stateful communications to a switch port. However, if you are using failover between chassis, you must include the VLANs in the trunk port between the chassis.
•If you do not add the VLANs to the switch before you assign them to the FWSM, the VLANs are stored in the supervisor engine database and are sent to the FWSM as soon as they are added to the switch.
•Assign VLANs to the FWSM before you assign them to the MSFC.
VLANs that do not satisfy this condition are discarded from the range of VLANs that you attempt to assign on the FWSM. See the "Adding Switched Virtual Interfaces to the MSFC" section for more information.
Assigning VLANs to the FWSM in Cisco IOS Software In Cisco IOS software, create up to 16 firewall VLAN groups, and then assign the groups to the FWSM. For example, you can assign all the VLANs to one group, or you can create an inside group and an outside group, or you can create a group for each customer. Each group can contain unlimited VLANs.
You cannot assign the same VLAN to multiple firewall groups; however, you can assign multiple firewall groups to an FWSM and you can assign a single firewall group to multiple FWSMs. VLANs that you want to assign to multiple FWSMs, for example, can reside in a separate group from VLANs that are unique to each FWSM.
To assign VLANs to the FWSM, perform the following steps:
Step 1 To assign VLANs to a firewall group, enter the following command:
Router(config)# firewall vlan-group
firewall_group vlan_range


The vlan_range can be one or more VLANs (2 to 1000 and from 1025 to 4094) identified in one of the following ways:
•A single number (n)
•A range (n-x)
Separate numbers or ranges by commas. For example, enter the following numbers:
5,7-10,13,45-100



Note Routed ports and WAN ports consume internal VLANs, so it is possible that VLANs in the 1020-1100 range might already be in use.
Step 2 To assign the firewall groups to the FWSM, enter the following command:
Router(config)# firewall module module_number vlan-group firewall_group


The firewall_group isone or more group numbers:
•A single number (n)
•A range (n-x)
Separate numbers or ranges by commas. For example, enter the following numbers:
5,7-10


This example shows how you can create three firewall VLAN groups: one for each FWSM, and one that includes VLANs assigned to both FWSMs.
Router(config)# firewall vlan-group 50 55-57
Router(config)# firewall vlan-group 51 70-85
Router(config)# firewall vlan-group 52 100
Router(config)# firewall module 5 vlan-group 50,52
Router(config)# firewall module 8 vlan-group 51,52


The following is sample output from the show firewall vlan-group command:
Router# show firewall vlan-group
Group vlans
----- ------
   50 55-57
   51 70-85
   52 100


The following is sample output from the show firewall module command, which shows all VLAN groups:
Router# show firewall module
Module Vlan-groups
  5    50,52
  8    51,52


Assigning VLANs to the FWSM in Catalyst Operating System Software In Catalyst operating system software, you assign a list of VLANs to the FWSM. You can assign the same VLAN to multiple FWSMs if desired. The list can contain unlimited VLANs.
To assign VLANs to the FWSM, enter the following command:
Console> (enable) set vlan vlan_list firewall-vlan mod_num


The vlan_list can be one or more VLANs (2 to 1000 and from 1025 to 4094) identified in one of the following ways:
•A single number (n)
•A range (n-x)
Separate numbers or ranges by commas. For example:
5,7-10,13,45-100



Note Routed ports and WAN ports consume internal VLANs, so it is possible that VLANs in the 1020-1100 range might already be in use.
This example shows a typical configuration:
Console> (enable) set vlan 55-57,100
firewall-vlan
5
Console> (enable) set vlan 70-85,100
firewall-vlan
8


The following is sample output from the show vlan firewall-vlan command:
Console> show vlan firewall-vlan 5
Secured vlans by firewall module 5
55-57, 100


Adding Switched Virtual Interfaces to the MSFC A VLAN defined on the MSFC is called a switched virtual interface. If you assign the VLAN used for the SVI to the FWSM (see the "Assigning VLANs to the Firewall Services Module" section), then the MSFC routes between the FWSM and other Layer 3 VLANs.
This section includes the following topics:
• SVI Overview
• Configuring SVIs for Cisco IOS Software on the Supervisor Engine
• Configuring SVIs for Catalyst Operating System Software on the Supervisor Engine
SVI Overview For security reasons, by default, only one SVI can exist between the MSFC and the FWSM. For example, if you misconfigure the system with multiple SVIs, you could accidentally allow traffic to pass around the FWSM by assigning both the inside and outside VLANs to the MSFC. (See Figure 2-1.)
Figure 2-1 Multiple SVI Misconfiguration


However, you might need to bypass the FWSM in some network scenarios. Figure 2-2 shows an IPX host on the same Ethernet segment as IP hosts. Because the FWSM in routed firewall mode only handles IP traffic and drops other protocol traffic like IPX (transparent firewall mode can optionally allow non-IP traffic), you might want to bypass the FWSM for IPX traffic. Make sure to configure the MSFC with an access list that allows only IPX traffic to pass on VLAN 201.
Figure 2-2 Multiple SVIs for IPX


For transparent firewalls in multiple context mode, you need to use multiple SVIs because each context requires a unique VLAN on its outside interface (See Figure 2-3). You might also choose to use multiple SVIs in routed mode so you do not have to share a single VLAN for the outside interface.
Figure 2-3 Multiple SVIs in Multiple Context Mode


Configuring SVIs for Cisco IOS Software on the Supervisor Engine If you are running Cisco IOS software on the supervisor engine, perform the following steps to add an SVI to the MSFC:
Step 1 (Optional) To allow you to add more than one SVI to the FWSM, enter the following command:
Router(config)# firewall multiple-vlan-interfaces


Step 2 To add a VLAN interface to the MSFC, enter the following command:
Router(config)# interface vlan vlan_number


Step 3 To set the IP address for this interface on the MSFC, enter the following command:
Router(config-if)# ip address address mask


Step 4 To enable the interface, enter the following command:
Router(config-if)# no shutdown


The following example shows a typical configuration with multiple SVIs:
Router(config)# firewall vlan-group 50 55-57
Router(config)# firewall vlan-group 51 70-85
Router(config)# firewall module 8 vlan-group 50-51
Router(config)# firewall multiple-vlan-interfaces
Router(config)# interface vlan 55
Router(config-if)# ip address 10.1.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# interface vlan 56
Router(config-if)# ip address 10.1.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# end
Router#


The following is sample output from the show interface command:
Router# show interface vlan 55
Vlan55 is up, line protocol is up
  Hardware is EtherSVI, address is 0008.20de.45ca (bia 0008.20de.45ca)
  Internet address is 55.1.1.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  ARP type:ARPA, ARP Timeout 04:00:00
  Last input never, output 00:00:08, output hang never
  Last clearing of "show interface" counters never
  Input queue:0/75/0/0 (size/max/drops/flushes); Total output drops:0
  Queueing strategy:fifo
  Output queue :0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
  L2 Switched:ucast:196 pkt, 13328 bytes - mcast:4 pkt, 256 bytes
  L3 in Switched:ucast:0 pkt, 0 bytes - mcast:0 pkt, 0 bytes mcast
  L3 out Switched:ucast:0 pkt, 0 bytes
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     4 packets output, 256 bytes, 0 underruns
     0 output errors, 0 interface resets
     0 output buffer failures, 0 output buffers swapped out


Configuring SVIs for Catalyst Operating System Software on the Supervisor Engine If you are running Catalyst operating system software on the supervisor engine, perform the following steps to add an SVI to the MSFC:
Step 1 (Optional) To allow you to add more than one SVI to the FWSM, enter the following command:
Console> (enable) set firewall multiple-vlan-interfaces enable


To disable this setting, enter the following command:
Console> (enable) set firewall multiple-vlan-interfaces disable


Step 2 To access the MSFC interface, enter one of the following commands:
Console> (enable) switch console


or
Console> (enable) session {15 | 16}


If you are accessing the switch using Telnet or SSH, you must use the session command.
Step 3 To enter enable mode and then configuration mode on the MSFC, enter the following commands:
Router> enable
Router# configure terminal


Step 4 To add a VLAN interface to the MSFC, enter the following command:
Router(config)# interface vlan vlan_number


Step 5 To set the IP address for this interface on the MSFC, enter the following command:
Router(config-if)# ip address address mask


Step 6 To enable the interface, enter the following command:
Router(config-if)# no shutdown


Step 7 To return to privileged EXEC mode, enter the following command:
Router(config-if)# end


Step 8 To return to the switch CLI, type Ctrl-C three times.
The following example shows a typical configuration:
Console> (enable) set vlan 55-57,70-85
firewall-vlan
8
Console> (enable) set firewall multiple-vlan-interfaces enable
Console> (enable) switch console
Router> enable
Password: ******
Router# configure terminal
Router(config)# interface vlan 55
Router(config-if)# ip address 10.1.1.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# interface vlan 56
Router(config-if)# ip address 10.1.2.1 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# end
Router# ^C^C^C
Console> (enable)


The following is sample output from the show interface command that you enter at the MSFC prompt:
Router# show interface vlan 55
Vlan55 is up, line protocol is up
  Hardware is EtherSVI, address is 0008.20de.45ca (bia 0008.20de.45ca)
  Internet address is 55.1.1.1/24
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  ARP type:ARPA, ARP Timeout 04:00:00
  Last input never, output 00:00:08, output hang never
  Last clearing of "show interface" counters never
  Input queue:0/75/0/0 (size/max/drops/flushes); Total output drops:0
  Queueing strategy:fifo
  Output queue :0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
  L2 Switched:ucast:196 pkt, 13328 bytes - mcast:4 pkt, 256 bytes
  L3 in Switched:ucast:0 pkt, 0 bytes - mcast:0 pkt, 0 bytes mcast
  L3 out Switched:ucast:0 pkt, 0 bytes
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     4 packets output, 256 bytes, 0 underruns
     0 output errors, 0 interface resets
     0 output buffer failures, 0 output buffers swapped out


Customizing the FWSM Internal Interface The connection between the FWSM and the switch is a 6-GB 802.1Q trunking EtherChannel. This EtherChannel is automatically created when you install the FWSM. On the FWSM side, two NPs connect to three Gigabit Ethernet interfaces each, and these interfaces comprise the EtherChannel. The switch distributes traffic to the interfaces in the EtherChannel according to a distribution algorithm based on session information; load sharing is not performed on a per-packet basis, but rather on a flow basis. In some cases, the algorithm assigns traffic unevenly between the interfaces and, therefore, between the two NPs. Aside from not utilizing the full processing potential of the FWSM, consistent inequity can result in unexpected behavior when you apply resource management to multiple contexts. (See the "Configuring a Class" section for more information.)
•Cisco IOS Software
Router(config)# port-channel load-balance {dst-ip | dst-mac | dst-port | src-dst-ip | src-dst-mac | src-dst-port | src-ip | src-mac | src-port}


The default is src-dst-ip.
•Catalyst operating system software
Console>(enable) set port channel all distribution {ip | mac | session | ip-vlan-session} [source | destination | both]


The default is ip both.
Configuring the Switch for Failover To configure the switch for failover, see the following topics:
• Assigning VLANs to the Secondary Firewall Services Module
• Adding a Trunk Between a Primary Switch and Secondary Switch
• Ensuring Compatibility with Transparent Firewall Mode
Assigning VLANs to the Secondary Firewall Services Module Because both units require the same access to the inside and outside networks, you must assign the same VLANs to both FWSMs on the switch(es). See the "Assigning VLANs to the Firewall Services Module" section.
Adding a Trunk Between a Primary Switch and Secondary Switch If you are using inter-switch failover (see the "Intra- and Inter-Chassis Module Placement" section), then you should configure an 802.1Q VLAN trunk between the two switches to carry the failover and state links. The trunk should have QoS enabled so that failover VLAN packets, which have the CoS value of 5 (higher priority), are treated with higher priority in these ports.
To configure the EtherChannel and trunk, see the documentation for your switch.
Ensuring Compatibility with Transparent Firewall Mode To avoid loops when you use failover in transparent mode, use switch software that supports BPDU forwarding. See the "Switch Hardware and Software Compatibility" section for more information about switch support for transparent firewall mode.
Managing the Firewall Services Module Boot Partitions This section describes how to reset the FWSM from the switch, and how to manage the boot partitions on the Flash memory card. This section includes the following topics:
• Flash Memory Overview
• Setting the Default Boot Partition
• Resetting the FWSM or Booting from a Specific Partition
Flash Memory Overview The FWSM has a 128-MB Flash memory card that stores the operating system, configurations, and other data. The Flash memory includes six partitions, called cf:n in Cisco IOS and Catalyst operating system software commands:
•Maintenance partition (cf:1)—Contains the maintenance software. Use the maintenance software to upgrade or install application images if you cannot boot into the application partition, to reset the application image password, or to display the crash dump information.
•Network configuration partition (cf:2)—Contains the network configuration of the maintenance software. The maintenance software requires IP settings so that the FWSM can reach the TFTP server to download application software images.
•Crash dump partition (cf:3)—Stores the crash dump information.
•Application partitions (cf:4 and cf:5)—Stores the application software image, system configuration, and ASDM. By default, Cisco installs the images on cf:4. You can use cf:5 as a test partition. For example, if you want to upgrade your software, you can install the new software on cf:5, but maintain the old software as a backup in case you have problems. Each partition includes its own startup configuration.
•Security context partition (cf:6)—64 MB are dedicated to this partition, which stores security context configurations (if desired) and RSA keys in a navigable file system. Other partitions do not have file systems that allow you to perform common tasks such as listing files. This partition is called disk when using the copy command.
Setting the Default Boot Partition By default, the FWSM boots from the cf:4 application partition. However, you can choose to boot from the cf:5 application partition or into the cf:1 maintenance partition. To change the default boot partition, enter the command for your operating system:
•Cisco IOS software
Router(config)# boot device module mod_num cf:n


Where n is 1 (maintenance), 4 (application), or 5 (application).
•Catalyst operating system software
Console>(enable) set boot device cf:n mod_num


Where n is 1 (maintenance), 4 (application), or 5 (application).
To view the current boot partition, enter the command for your operating system:
•Cisco IOS software
Router# show boot device [mod_num]


For example:
Router# show boot device
[mod:1 ]:
[mod:2 ]:
[mod:3 ]:
[mod:4 ]: cf:4
[mod:5 ]: cf:4
[mod:6 ]:
[mod:7 ]: cf:4
[mod:8 ]:
[mod:9 ]:


•Catalyst operating system software
Console>(enable) show boot device mod_num


For example:
Console>(enable) show boot device 6
Device BOOT variable = cf:5


Resetting the FWSM or Booting from a Specific Partition This section describes how to reset the FWSM or boot from a specific partition. You might need to reset the FWSM if you cannot reach it through the CLI or an external Telnet session. You might need to boot from a non-default boot partition if you need to access the maintenance partition or if you want to boot from a different software image in the backup application partition. The maintenance partition is valuable for troubleshooting.
The reset process might take several minutes.
For Cisco IOS software, when you reset the FWSM, you can also choose to run a full memory test. When the FWSM initially boots, it only runs a partial memory test. A full memory test takes approximately six minutes.
To reset the FWSM, see the section for your operating system:
• Resetting the FWSM in Cisco IOS Software
• Resetting the FWSM in Catalyst Operating System Software

Note To reload the FWSM when you are logged into the FWSM, enter reload or reboot. You cannot boot from a non-default boot partition with these commands.
Resetting the FWSM in Cisco IOS Software To reset the FWSM, enter the following command:
Router# hw-module module mod_num reset [cf:n] [mem-test-full]


The cf:n argument is the partition, either 1 (maintenance), 4 (application), or 5 (application). If you do not specify the partition, the default partition is used (typically cf:4).
The mem-test-full option runs a full memory test, which takes approximately 6 minutes.
This example shows how to reset the FWSM installed in slot 9. The default boot partition is used.
Router# hw-mod module 9 reset


Proceed with reload of module? [confirm] y
% reset issued for module 9


Router#
00:26:55:%SNMP-5-MODULETRAP:Module 9 [Down] Trap
00:26:55:SP:The PC in slot 8 is shutting down. Please wait ...


Resetting the FWSM in Catalyst Operating System Software To reset the FWSM from the switch CLI, enter the following command:
Console> (enable) reset mod_num [cf:n]
发表于 2007-6-8 23:34:20 | 显示全部楼层
超强学习资料,顶!!!!!!!!!!!!
发表于 2007-6-11 00:38:03 | 显示全部楼层

呵呵

哪天看个帖子还中病毒了..诶
 楼主| 发表于 2007-10-4 20:21:22 | 显示全部楼层
前一段时间实施过两个关于FWSM调试的项目,现总结以下几点值得注意的地方:
1、FWSM与pix和ASA不同,默认FWSM不允许ping虚拟防火墙的任何端口,若想让ping,需要必须在端口上打
  开(icmp permit any inside/outside);
2、FWSM与pix和ASA的另一个不同是:默认FWSM不允许从安全级别高的端口到安全级别底网络的访问,除
   非用acl明确允许(从安全级别高到安全级别底方向的访问也需要写acl并应用到高安全级别端口上明
   确允许,才能访问);而pix和asa默认是允许许从安全级别高的端口到安全级别底网络的访问,并不
   需要写acl应用到高安全级别端口明确允许;
3、FWSM默认只支持两个security context(不包括 admin context)。
4、从single 转换成 multiple模式时,有时输入mode multiple防火墙模块自动重起后,使用show mode
   命令查看时仍然显示为single模式,需多次输入命令mode multiple时,才能转换成multiple context
   模式(用show mode命令会显示),这个现象比较怪,版本为2.3(3)。
5、FWSM配置为透明模式时,尽管与透明防火墙的FWSM的inside和outside两个逻辑端口关联的vlan是两个
   不同的vlan(如nameif vlan88 inside security100 nameif vlan100 outside security0),但是从
   cat6500上互连出去的ip与inside 或outside(取决于mfsc和fwsm的逻辑位置)互连的mfsc侧的逻辑
   端口ip必须是同一网段的ip。上次做项目时就是忽略这个细节,还是LeoLi帮检查出来的。前一段时间实施过两个关于FWSM调试的项目,现总结以下几点值得注意的地方:
1、FWSM与pix和ASA不同,默认FWSM不允许ping虚拟防火墙的任何端口,若想让ping,需要必须在端口上打
  开(icmp permit any inside/outside);
2、FWSM与pix和ASA的另一个不同是:默认FWSM不允许从安全级别高的端口到安全级别底网络的访问,除
   非用acl明确允许(从安全级别高到安全级别底方向的访问也需要写acl并应用到高安全级别端口上明
   确允许,才能访问);而pix和asa默认是允许许从安全级别高的端口到安全级别底网络的访问,并不
   需要写acl应用到高安全级别端口明确允许;
3、FWSM默认只支持两个security context(不包括 admin context)。
4、从single 转换成 multiple模式时,有时输入mode multiple防火墙模块自动重起后,使用show mode
   命令查看时仍然显示为single模式,需多次输入命令mode multiple时,才能转换成multiple context
   模式(用show mode命令会显示),这个现象比较怪,版本为2.3(3)。
5、FWSM配置为透明模式时,尽管与透明防火墙的FWSM的inside和outside两个逻辑端口关联的vlan是两个
   不同的vlan(如nameif vlan88 inside security100 nameif vlan100 outside security0),但是从
   cat6500上互连出去的ip与inside 或outside(取决于mfsc和fwsm的逻辑位置)互连的mfsc侧的逻辑
   端口ip必须是同一网段的ip。
 楼主| 发表于 2007-10-5 03:31:55 | 显示全部楼层
分享一个现场调试FWSM的小经验(关于CISCO FW与Microsoft exchange邮件系统的兼容性)


Cisco防火墙缺省下,会对stmp协议做深度检测,保证stmp在内部时,可以对外部进行访问(过程中,应用端口会有变化),但这个特性与微软exchang邮件系统不兼容,如果用于保护exchang邮件服务器,必须将该功能关闭,命令如下:
No fixup protocol smtp 25
或是:
No inspection protocol stmp 25
 楼主| 发表于 2007-10-5 03:33:16 | 显示全部楼层

FWSM作为Internet双出口项目配置案例

FWSM作为Internet双出口项目配置案例

项目背景:
    高校园区网一般都申请两个出口:其中一个出口为教育网出口,另一个出口为网通或电信。由于校园网内的用户访问国际网络资源是需要付费的,故设计时要求访问教育网资源时则从园区网的教育出口出去,而其他流量则从网通出口出去。这样只需要把所有到教育网的路由配置为静态,其他流量则默认路由到网通。
    另外一个需要解决的问题:由于目前服务器使用的都是从教育网分配的公有IP,所以当从Internet上非教育网上的用户访问高校园区网内服务器上的资源时,则只能从教育网入口进入高校园区网,但返回流量则可能会走网通出口出去,也就是说从FWSM1近来的流量,而返回流量则可能会从FWSM2出去,这样在防火墙上则会出现非对称路由问题。解决方案在MSFC做策略路由,保证从FWSM1近来的流量一定再从FWSM1返回去。

详细拓扑图以及配置文档见附件。

高校FWSM双出口配置文档.rar

27.76 KB, 下载次数: 22

 楼主| 发表于 2007-10-5 03:46:40 | 显示全部楼层

正在测试FWSM和ASA,趁机学习学习

正在测试FWSM和ASA,趁机学习学习

先附上FWSM学习笔记,见笑了

1、进入FWSM了,如何获得PAK以便申请License??
老李答应帮忙,多谢老李!!

不需要申请,使用默认的就可以了,支持2个虚拟FW

2、哈哈炫耀一下----有谁破解过76上Sup720引擎的密码?
见附件

3.FWSM支持一次性的用户口令吗?怎么做?
是否需要跟认证服务器比如ACS结合?
答:需要

4、FWSM里创建的Context之间,可以作Failover吗?
答:不可以,FWSM模块之间可以A/A、A/S

5、我的FWSM是DEMO版的,好像Context里没法配置OSPF?
答:FWSM在Single mode时,支持动态路由协议,ospf、rip、多播路由、AsymmetricRouting
在multiple模式下,context不支持动态路由

6.FWSM在透明模式,BVI不配置IP,仪表的其中一个inside接口 到1个outside打流量,发现仪表的所有outside接口都收到流量,
把BVI接口配置随意IP,就只有指定的outside接口收到数据了,没有"广播"了
老赵老李,能否帮解释一下,多谢

[ 本帖最后由 netyourlife2007 于 2007-7-11 06:35 PM 编辑 ]



附件: 思科FWSM_笔记0001.txt (2007-6-23 07:47 AM, 6.71 K)
该附件被下载次数 27, 阅读权限 20


图片附件: MSFC位置-01.png (2007-6-23 09:08 AM, 142.27 K)



图片附件: MSFC位置-02-多Contexts.png (2007-6-23 09:08 AM, 158.43 K)



图片附件: Routed Firewall Mode.png (2007-6-23 09:08 AM, 58.25 K)



图片附件: Transparent Firewall Mode.png (2007-6-23 09:08 AM, 43.66 K)



图片附件: Intra- and Inter-Chassis Failover.png (2007-6-23 09:08 AM, 59.15 K)



附件: 记录--0001.txt (2007-6-23 09:08 AM, 2.87 K)
该附件被下载次数 15


图片附件: FWSM 和MSFC 的关系图.jpg (2007-6-23 09:08 AM, 127.64 K)



图片附件: 注意 FWSM配置为透明模式时.png (2007-6-23 11:56 AM, 19.62 K)



附件: Cisco7600上Sup720的密码恢复.txt (2007-7-4 08:02 AM, 5.03 K)
该附件被下载次数 5, 阅读权限 30
 楼主| 发表于 2007-10-5 03:48:09 | 显示全部楼层
FWSM 结构及虚拟防火墙

























ARP精髓............


1.不设网关...............................不向本网段以外的地址发包
2.网关设为自己.........................proxy arp, 被动情况下只会对目的地址为我的时候发ARP请求,路由器响应
3.网关设为路由器地址................普通模式,PC ARP解释路由器地址,然后跨网段数据包交路由器转发
4.网关设为未使用的本网段地址....普通模式,PC ARP解释路由器地址,失败,无法跨网段访问
5.网关设为非本网段地址.............proxy arp, 只会对设置的这个网关发送ARP请求,路由器响应
以上条件的前提::ROUTER的proxy arp must enable......

FWSM 结构及虚拟防火墙.rar

52.22 KB, 下载次数: 10

您需要登录后才可以回帖 登录 | 注册

本版积分规则

小黑屋|手机版|Archiver|boway Inc. ( 冀ICP备10011147号 )

GMT+8, 2024-5-5 00:56 , Processed in 0.122523 second(s), 16 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表