Muestra las diferencias entre dos versiones de la página.
Ambos lados, revisión anteriorRevisión previaPróxima revisión | Revisión previa | ||
redes:ids_ips [2024/11/22 16:38] – thejuanvisu | redes:ids_ips [2024/11/22 16:43] (actual) – thejuanvisu | ||
---|---|---|---|
Línea 90: | Línea 90: | ||
< | < | ||
ip access-list extended ACL-PING-AND-TRACEROUTE //ACL 1 | ip access-list extended ACL-PING-AND-TRACEROUTE //ACL 1 | ||
- | permit icmp any any echo | + | |
- | permit icmp any any echo-reply | + | permit icmp any any echo-reply |
- | permit icmp any any ttl-exceeded | + | permit icmp any any ttl-exceeded |
- | permit icmp any any port-unreachable | + | permit icmp any any port-unreachable |
- | permit icmp any any range 33434 33463 ttl eq 1 | + | permit icmp any any range 33434 33463 ttl eq 1 |
ip access-list extend ACL-DHCP-IN //ACL 2 | ip access-list extend ACL-DHCP-IN //ACL 2 | ||
- | permit udp any eq bootps any eq bootpc | + | |
// | // | ||
class-map type inspect match-any CLASS-OUTSIDE-TO-SELF-PASS | class-map type inspect match-any CLASS-OUTSIDE-TO-SELF-PASS | ||
- | match access-group name ACL-PING-AND-TRACEROUTE | + | |
- | match access-group name ACL-DHCP-IN | + | match access-group name ACL-DHCP-IN |
</ | </ | ||
Línea 113: | Línea 113: | ||
class class-default //clase | class class-default //clase | ||
drop //acción | drop //acción | ||
+ | </ | ||
+ | |||
+ | Finalmente, hay que crear las parejas de zonas de seguridad: | ||
+ | < | ||
+ | zone-pair security OUTSIDE-TO-SELF source OUTSIDE destination self | ||
+ | service-policy tyoe inspect POLICY-OUTSIDE-TO-SELF | ||
+ | </ | ||
+ | |||
+ | Con esto ya tendríamos definida una política OUTSIDE -> self. Finalmente habría que asignar las interfaces a las zonas: | ||
+ | < | ||
+ | interface GigabitEthernet 0/2 | ||
+ | zone-member security OUTSIDE | ||
+ | </ | ||
+ | |||
+ | Finalmente podemos usar los siguientes comandos para hacer diagnóstico: | ||
+ | < | ||
+ | show class-map type inspect | ||
+ | show policy-map type inspect | ||
</ | </ | ||