Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others



Similar documents
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Configuring Static and Dynamic NAT Simultaneously

Virtual Fragmentation Reassembly

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Firewall Stateful Inspection of ICMP

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Securing Networks with PIX and ASA

Lab Creating a Network Map using CDP Instructor Version 2500

Lab Configuring Syslog and NTP (Instructor Version)

BRI to PRI Connection Using Data Over Voice

LAN-Cell to Cisco Tunneling

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Configuring DNS on Cisco Routers

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Cisco Configuring Commonly Used IP ACLs

Table of Contents. Configuring IP Access Lists

Configuring a Cisco 2509-RJ Terminal Router

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Lab Configure Local AAA on Cisco Router

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

Sample Configuration Using the ip nat outside source static

Lab Configure Cisco IOS Firewall CBAC

Lab Load Balancing Across Multiple Paths Instructor Version 2500

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

Lab 5.5 Configuring Logging

Document ID: Introduction

Skills Assessment Student Training Exam

IOS NAT Load Balancing for Two ISP Connections

Configuring the MNLB Forwarding Agent

Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router

Lab Developing ACLs to Implement Firewall Rule Sets

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

Basic Router Configuration Using Cisco Configuration Professional

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

Lab Exercise Configure the PIX Firewall and a Cisco Router

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Firewall Authentication Proxy for FTP and Telnet Sessions

Cisco Secure PIX Firewall with Two Routers Configuration Example

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

Lab Load Balancing Across Multiple Paths

Troubleshooting the Firewall Services Module

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Lab 8: Confi guring QoS

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

Lab Configure IOS Firewall IDS

Lab Configure Syslog on AP

isco Connecting Routers Back to Back Through the AUX P

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Sample Configuration Using the ip nat outside source list C

Lab QoS Classification and Policing Using CAR

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

PIX/ASA 7.x with Syslog Configuration Example

Lab 5.3.9b Managing Router Configuration Files Using TFTP

LAB Configuring NAT. Objective. Background/Preparation

Lab Advanced Telnet Operations

Remote Access VPN Business Scenarios

Lab Introductory Lab 1 Getting Started and Building Start.txt

Introduction to Network Address Translation

Troubleshooting the Firewall Services Module

Network Security Knowledge is Everything! Network Operations

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

Firewall Technologies. Access Lists Firewalls

Brest. Backup : copy flash:ppe_brest1 running-config

Firewall Support for SIP

SDM: Site to Site IPsec VPN Between ASA/PIX and an IOS Router Configuration Example

How To Configure A Cisco Router With A Cio Router

- The PIX OS Command-Line Interface -

Lab Configure Basic AP Security through IOS CLI

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Cisco Configuring Secure Shell (SSH) on Cisco IOS Router

Device Interface IP Address Subnet Mask Default Gateway

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

Lab Diagramming External Traffic Flows

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Reverse Proxy Caching

Connecting to the Firewall Services Module and Managing the Configuration

Lab Configuring Access Policies and DMZ Settings

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Lab Organizing CCENT Objectives by OSI Layer

FIREWALLS & CBAC. philip.heimer@hh.se

Lab Diagramming Intranet Traffic Flows

Configuring a Leased Line

Interconnecting Cisco Network Devices 1 Course, Class Outline

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.

How To Secure Network Threads, Network Security, And The Universal Security Model

RSA Security Analytics

Transcription:

Cisco IOS Firewall to Allow Java Applets From Known Sites w

Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java Applets from the Internet:...1 Hardware and Software Versions...1 Network...2 Diagram...2 debug and show Commands...3 Sample Debug Output...3 Tools Information...4 Related Information...5 i

Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others Introduction To Deny Java Applets from the Internet: Hardware and Software Versions Network Diagram Router A Configuration debug and show Commands Sample Debug Output Tools Information Related Information Introduction This sample configuration demonstrates how to use the Context based Access Control (CBAC) feature of the Cisco IOS Firewall to allow Java applets from specified sites from the Internet, while denying all others. This type of blocking denies access to Java applets that are not embedded in an archived or compressed file. Cisco IOS Firewall was introduced in 11.3.3.T and 12.0.5.T, and is only present when certain feature sets are purchased. You can see which Cisco IOS feature sets support IOS Firewall by using Software Advisor, which is linked from the Cisco TAC Tools for Security Technologies page. To use Software Advisor, you must be a registered user and you must be logged in. To Deny Java Applets from the Internet: 1. Create access control lists (ACLs). 2. Add ip inspect http java commands to the configuration. 3. Apply ip inspect and access list commands to the outside interface. Note: In this example, ACL 3 allows Java from a friendly site (216.157.100.247) while implicitly denying Java from other sites. Addresses shown on the outside of the router are not Internet routable because this example was configured and tested in a lab. Hardware and Software Versions This configuration was developed and tested using the software and hardware versions below. Cisco 1700 router Cisco IOS Software version c1700 o3sy756i mz.121 5.yB1.bin

Network Diagram Router A Configuraton Current configuration : 1110 bytes version 12.1 no service single slot reload enable service timestamps debug uptime service timestamps log uptime no service password encryption hostname spock no logging buffered logging rate limit console 10 except errors memory size iomem 25 ip subnet zero no ip finger no ip domain lookup ip inspect name firewall tcp ip inspect name firewall udp ACL used for Java ip inspect name firewall http java list 3 audit trail on ip audit notify log

ip audit po max events 100 no ip dhcp client network discovery interface Ethernet0 ip address 192.168.10.1 255.255.255.0 ip nat inside half duplex interface FastEthernet0 ip address 10.64.10.18 255.255.255.224 ACL used to block inbound traffic except that permitted by inspects ip access group 100 in ip nat outside ip inspect firewall out speed auto half duplex ACL used for NAT ip nat inside source list 1 interface FastEthernet0 overload ip classless ip route 0.0.0.0 0.0.0.0 10.64.10.1 no ip http server ACL used for NAT access list 1 permit 192.168.10.0 0.0.0.255 ACL used for Java access list 3 permit 216.157.100.247 ACL used to block inbound traffic except that permitted by inspects access list 100 deny ip any any line con 0 exec timeout 0 0 transport input none line aux 0 line vty 0 4 login end debug and show Commands Before issuing any debug commands, please see Important Information on Debug Commands. no ip inspect alert off Enables CBAC alert messages. If http denies are configured, you can view them from the console. debug ip inspect Shows messages about CBAC events. show ip inspect sessions [detail] Shows existing sessions currently being tracked and inspected by CBAC. The optional keyword detail shows additional information about these sessions. Sample Debug Output The following is sample debug output from the debug ip inspect detail command after trying to connect to web servers on 216.157.100.247 and 207.207.217.230. This shows what is to be expected of the debug from friendly Java, and Java being blocked from a non friendly site (as defined on the ACL).

spock# 00:35:17: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1771) sent 255 bytes responder (216.157.100.247:80) sent 4072 bytes 00:35:18: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1772) sent 343 bytes responder (216.157.100.247:80) sent 204 bytes 00:35:18: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1773) sent 344 bytes responder (216.157.100.247:80) sent 204 bytes 00:35:19: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1774) sent 343 bytes responder (216.157.100.247:80) sent 204 bytes 00:35:19: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1775) sent 344 bytes responder (216.157.100.247:80) sent 0 bytes 00:35:32: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1777) sent 360 bytes responder (216.157.100.247:80) sent 206 bytes 00:35:32: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1776) sent 265 bytes responder (216.157.100.247:80) sent 16906 bytes 00:35:33: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1780) sent 369 bytes responder (216.157.100.247:80) sent 206 bytes 00:35:33: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1784) sent 354 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:34: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1788) sent 309 bytes responder (216.157.100.247:80) sent 206 bytes 00:35:34: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1787) sent 294 bytes responder (216.157.100.247:80) sent 206 bytes 00:35:34: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1794) sent 315 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:34: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1795) sent 314 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:35: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1796) sent 315 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:35: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1797) sent 316 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:36: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1798) sent 316 bytes responder (216.157.100.247:80) sent 205 bytes 00:35:42: %FW 3 HTTP_JAVA_BLOCK: JAVA applet is blocked from (207.207.217.230:80) to (192.168.10.2:1804). 00:35:42: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1804) sent 215 bytes responder (207.207.217.230:80) sent 0 bytes 00:35:44: %FW 3 HTTP_JAVA_BLOCK: JAVA applet is blocked from (207.207.217.230:80) to (192.168.10.2:1808). 00:35:44: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1808) sent 215 bytes responder (207.207.217.230:80) sent 0 bytes 00:35:46: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1801) sent 285 bytes responder (207.207.217.230:80) sent 211 bytes 00:35:46: %FW 3 HTTP_JAVA_BLOCK: JAVA applet is blocked from (207.207.217.230:80) to (192.168.10.2:1812). 00:35:46: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1812) sent 215 bytes responder (207.207.217.230:80) sent 0 bytes 00:35:46: %FW 6 SESS_AUDIT_TRAIL: http session initiator (192.168.10.2:1803) sent 362 bytes responder (207.207.217.230:80) sent 162 bytes 00:35:47: %FW 3 HTTP_JAVA_BLOCK: JAVA applet is blocked from (207.207.217.230:80) to (192.168.10.2:1815). Tools Information For additional resources, refer to Cisco TAC Tools for Security Technologies.

Related Information IOS Firewall in IOS Documentation More IOS Firewall Technical Tips IOS Firewall Product Support Page Context Based Access Control: Introduction and Configuration Improving Security on Cisco Routers Cisco Secure Integrated Software Configuration Cookbook All contents are Copyright 1992 2002 Cisco Systems Inc. All rights reserved.important Notices and Privacy Statement. Updated: May 07, 2002 Document ID: 13815