Seguridad y Redes

Tips, Video Tutoriales, Wifislax, VMware, Linux, GNS3, Eve-NG, CCNA, Cisco Routers, Switches

CCNA Security: GNS3 & Cisco Configuration Professional (CCP)

By 21:58 , ,

En la nueva versión del CCNA de Seguridad 640-554 se han agregado los siguientes features.

(1)Describe IPv4 to IPv6 transition
(2)Describe VLAN security
(3)Implement VLANs and trunking
(4)Implement spanning tree
(5)Implement zone-based policy firewall using CCP
(6)Implement the Cisco Adaptive Security Appliance (ASA)
(7)Implement Network Address Translation (NAT) and Port Address Translation (PAT)
(8)Configure Cisco IOS IPS using CCP
(9)Implement Secure Sockets Layer (SSL) VPN using ASA device manager


Se le ha quitado todo lo relacionado con SDM y agregaron Cisco Configuration Professional (CCP). Para configurar CCP en GNS3 debemos realizar los pasos similares a la configuración de SDM.
  1. Agregar un Router.
  2. Agregar una Nube configurada con una interface Loopback.
  3. Crear una cuenta de usuario local en el router con permisos de "nivel 15" permisos (modo privilegiado)
  4. Establer un hostname al router (opcional).
  5. Configurar una interface para conectividad con la interface Loopback
  6. Habilitar el servicio HTTP en el router.
  7. Habilita el servicio HTTPS en el router si la imagen IOS del router soporta cifrado crypto.
  8. Habilitar la autenticación HTTP utilizando la base de datos local.
R1#show ip int brief
Interface                  IP-Address      OK? Method Status                Protocol
FastEthernet0/0            unassigned      YES unset  administratively down down
FastEthernet0/1            unassigned      YES unset  administratively down down

R1#conf t
R1(config)#int f0/0
R1(config-if)#ip add 192.168.10.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#end
R1#
*Mar  1 00:00:38.975: %SYS-5-CONFIG_I: Configured from console by console
*Mar  1 00:00:40.347: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
*Mar  1 00:00:41.347: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1#ping 192.168.10.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.10.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/4 ms

R1#conf t
R1(config)#username delfirosales privilege 15 secret cisco
R1(config)#ip http server
R1(config)#ip http secure-server
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
*Mar  1 00:03:24.239: %SSH-5-ENABLED: SSH 1.99 has been enabled
*Mar  1 00:03:24.431: %PKI-4-NOAUTOSAVE: Configuration was modified.  Issue "write memory" to save new certificate
R1(config)#ip http authentication local   
R1(config)#line vty 0 4
R1(config-line)#privilege level 15
R1(config-line)#transport input ssh telnet
R1(config-line)#login local
R1(config-line)#end
R1#


Video utilizando CCP One-Step Lockdown & Security Audit
https://www.youtube.com/watch?v=UOASz3-NIj8

You Might Also Like

0 comentarios