bxm's IT Story

프로젝트 본문

Network/Cisco (KEDU)

프로젝트

bxmsta9ram 2021. 7. 28. 10:38


## VTP ##

공통]

conf t

no ip domain lookup

line c 0

  logg sy

  exec-timeout 0

  exit

line vty 0 4

  pass cisco

  exit

 

vtp mo tr

end

wr

 

DSW1, DSW2, R4]

conf t

ip routing

end

wr

 

ASW1, ASW2, S_SW]

conf t

no ip routing

end

wr


## VLAN ##

## INSIDE (DSW1,2-VLAN 10,20,30,40,50 // ASW1-VLAN 10,20 // ASW2-VLAN 30,40)

DSW1, DSW2]

conf t

vlan 10

  exit

vlan 20

  exit

vlan 30

  exit

vlan 40

  end

wr

 

ASW1]

conf t

vlan 10

  exit

vlan 20

  end

wr

 

ASW2]

conf t

vlan 30

  exit

vlan 40

  end

wr


## DMZ (실제로는 안해도 된다. 다이렉트로 연결된 것이 ASA밖에 없기 때문에)

S_SW] 

vlan 50

  end

wr


## OUTSIDE

R4]

conf t

vlan 70

  end

wr


## Access & bpduguard ##

ASW1]

conf t

int f1/1

  sw mo ac

  sw ac vlan 10

  spanning-tree portfast 

  exit

int f1/2

  sw mo ac

  sw ac vlan 20

  spanning-tree portfast 

  exit

 

spanning-tree portfast bpduguard

end

wr

## f1/1과 f1/2 쪽으로 bpdu를 보내지 않겠다 라는 뜻임.


ASW2]

conf t

int f1/3

  sw mo ac

  sw ac vlan 30

  spanning-tree portfast

  exit

int f1/4

  sw mo ac

  sw ac vlan 40

  spanning-tree portfast

  exit

 

spanning-tree portfast bpduguard

end

wr


S_SW]

conf t

int range f1/1 - 4

  sw mo ac

  sw ac vlan 50

  spanning-tree portfast

  exit

 

spanning-tree portfast bpduguard

end

wr

 

R4]

conf t

int range f1/9 - 10

  sw mo ac

  sw ac vlan 70

  spanning-tree portfast

  exit

 

spanning-tree portfast bpduguard

end

wr

 


## Trunking ## 

DSW1]

conf t

int range f1/10 - 11

  sw tr enc dot

  sw mo tr

  channel-group 1 mo on

  exit

 

int range f1/14 - 15

  sw tr enc dot

  sw mo tr

  channel-group 2 mo on

  exit

 

int range f1/12 - 13

  sw tr enc dot

  sw mo tr

  channel-group 4 mo on

  end

wr

 

show ether summary

 

DSW2]

conf t

int range f1/10 - 11

  sw tr enc dot

  sw mo tr

  channel-group 1 mo on

  exit

 

int range f1/12 - 13

  sw tr enc dot

  sw mo tr

  channel-group 3 mo on

  exit

 

int range f1/14 - 15

  sw tr enc dot

  sw mo tr

  channel-group 5 mo on

  end

wr

 

show ether summary

 

ASW1]

conf t

int range f1/14 - 15

  sw tr enc dot

  sw mo tr

  channel-group 2 mo on

  exit

 

int range f1/12 - 13

  sw tr enc dot

  sw mo tr

  channel-group 3 mo on

  end

wr

 

show ether summary

 

ASW2]

conf t

int range f1/12 - 13

  sw tr enc dot

  sw mo tr

  channel-group 4 mo on

  exit

 

int range f1/14 - 15

  sw tr enc dot

  sw mo tr

  channel-group 5 mo on

  end

wr

 

show ether summary


## Inside IP & OSPF ##

In_Router]

conf t

int f0/0

  no shut

  ip add 172.16.10.131 255.255.255.248

  exit

 

int f0/1

  no shut

  ip add 172.16.10.139 255.255.255.248

  exit

 

int f1/0

  no shut

  ip add 172.16.10.145 255.255.255.248

  exit

 

 

int s2/0

  int s2/0

  no shut

  encapsulation fram

  no fram inver

  clock rate 64000

 

  ip add 211.230.60.1 255.255.255.252

  fram map ip 211.230.60.2 102 br

  exit

 

ip route 172.16.60.0 255.255.255.0 s2/0 211.230.60.2

ip route 0.0.0.0  0.0.0.0 f1/0 172.16.10.149

end

wr


 

DSW1]

## In_Router와 연결된 곳

conf t

int f1/1

  no switchport

  ip add 172.16.10.132 255.255.255.248

  exit

 

int vlan 10

  ip add 172.16.10.29 255.255.255.224

int vlan 20

  ip add 172.16.10.61 255.255.255.224

int vlan 30

  ip add 172.16.10.93 255.255.255.224

int vlan 40

  ip add 172.16.10.125 255.255.255.224

  end

wr


DSW2]

## In_Router와 연결된 곳

conf t

int f1/2

  no switchport

  ip add 172.16.10.140 255.255.255.248

  exit

 

int vlan 10

  ip add 172.16.10.30 255.255.255.224

int vlan 20

  ip add 172.16.10.62 255.255.255.224

int vlan 30

  ip add 172.16.10.94 255.255.255.224

int vlan 40

  ip add 172.16.10.126 255.255.255.224

  end

wr


SCR]

conf t

int s1/0

  no shut

  enc fram

  no fram inver

  clock rate 64000

 

  ip add 211.230.60.2 255.255.255.252

  fram map ip 211.230.60.1 201 br

 

  

## SCR에서 외부로 빠져나가는 곳이 CE밖에 없으므로 Default를 줘야 한다.

ip route 0.0.0.0  0.0.0.0 s1/0 211.230.60.1

 

int f0/0

  no shut

  ip add 172.16.60.254 255.255.255.0

  end

wr


## 나머지 IP들 넣어주기. / ISP-NAT##

R4]

conf t

int vlan 70

  ip add 2.2.2.254 255.255.255.0

  exit

 

int f0/0

  no shut

  ip add 1.1.100.6 255.255.255.252

  exit

 

ip route 0.0.0.0 0.0.0.0 f0/0 1.1.100.5

 

 

SCR]

conf t

int f0/1

  no shut

  ip add 211.230.60.2 255.255.255.252

  exit

 

int f0/0

  no shut

  ip add 172.16.60.254 255.255.255.252

  end

wr

 

 

ISP]

conf t
int f0/0
  no shut
  ip add 1.1.100.2 255.255.255.252
  ip nat inside
  exit
int f0/1
  no shut
  ip add 1.1.100.5 255.255.255.252
  ip nat inside
  exit
int f1/0
  no shut
  mac-address 06ff.0010.06e8
  ip add dhcp
  ip nat outside
  exit

ip route 0.0.0.0 0.0.0.0 f1/0 10.0.0.1

ip route 2.2.2.0 255.255.255.0 f0/1 1.1.100.6

ip route 1.1.200.0 255.255.255.0 f0/0 1.1.100.1


## NAT
ip access-list standard DMZ_INSIDE              
  permit 1.1.100.0 0.0.0.3                
  permit 1.1.200.0 0.0.0.255
  permit 2.2.2.0 0.0.0.255 
  exit

ip nat inside source list DMZ_INSIDE int f1/0 overload

end

wr


## OSPF ##

## 60.0 대역은 Static 으로 주기. 211 대역이 사설이라서 안된다.

In_Router]

conf t

int f0/0

  ip os priority 100

  exit

 

int f0/1

  ip os priority 100

  exit

 

 

router ospf 1 

  router-id 1.1.1.1

  network 172.16.10.145 0.0.0.0 area 0

  network 172.16.10.131 0.0.0.0 area 0

  network 172.16.10.139 0.0.0.0 area 0

  network 211.230.60.1 0.0.0.0 area 0

  auto-cost reference-bandwidth 1000

 

  redistribute static subnets   

  default-information originate always

  end

wr

 

DSW1]

conf t

int vlan 10

  bandwidth 200000

  exit

int vlan 20

  bandwidth 200000

  exit

int vlan 30

  bandwidth 200000

  exit

int vlan 40

  bandwidth 200000

  exit

 

 

router ospf 1

  router-id 2.2.2.2

  network 172.16.10.29 0.0.0.0 area 0

  network 172.16.10.61 0.0.0.0 area 0

  network 172.16.10.93 0.0.0.0 area 0

  network 172.16.10.125 0.0.0.0 area 0

  network 172.16.10.132 0.0.0.0 area 0

  auto-cost reference-bandwidth 1000

  end

wr

 

 

DSW2]

conf t

int vlan 10

  bandwidth 200000

  exit

int vlan 20

  bandwidth 200000

  exit

int vlan 30

  bandwidth 200000

  exit

int vlan 40

  bandwidth 200000

  exit

 

 

router ospf 1

  router-id 3.3.3.3

  network 172.16.10.30 0.0.0.0 area 0

  network 172.16.10.62 0.0.0.0 area 0

  network 172.16.10.94 0.0.0.0 area 0

  network 172.16.10.126 0.0.0.0 area 0

  network 172.16.10.140 0.0.0.0 area 0

  auto-cost reference-bandwidth 1000

  end

wr


## HSRP ##

DSW1]

  ## 원래 ospf hello가 5초인데 10초로 변경해보자!
  ## 문제 생기면 우선순위값을 20을 깎아라. 그러면 얘가 standby가 된다.

conf t
int vlan 10
  standby 10 ip 172.16.10.28
  standby 10 priority 110
  standby 10 preempt delay minimum 10
  standby 10 track f1/1 20
  exit
  int vlan 20
  standby 20 ip 172.16.10.60
  standby 20 priority 110
  standby 20 preempt delay minimum 10
  standby 20 track f1/1 20
  exit
 


int vlan 30
  standby 30 ip 172.16.10.92
  standby 30 preempt
  exit

int vlan 40
  standby 40 ip 172.16.10.124
  standby 40 preempt
  end

wr

DSW2]

## VLAN 10과 20은 Standby
conf t
int vlan 10
  standby 10 ip 172.16.10.28
  standby 10 preempt
  exit

int vlan 20
  standby 20 ip 172.16.10.60
  standby 20 preempt
  exit

 


int vlan 30
  standby 30 ip 172.16.10.92
  standby 30 priority 110
  standby 30 preempt delay minimum 10
  standby 30 track f1/2 20
  exit

int vlan 40
  standby 40 ip 172.16.10.124
  standby 40 priority 110
  standby 40 preempt delay minimum 10
  standby 40 track f1/2 20
  end

wr




## ASA Interface 세팅 ##

ASA]

conf t

 

## Gigabit 0번 ## <Inside>

int g0

  no shut

  nameif Inside

  security-level 100

 

  desc ##Inside_Network##

  ip add 172.16.10.149 255.255.255.248

  exit

 

 

## Gigabit 1번 ## <DMZ>

int g1

  no shut

  nameif DMZ

  security-level 50

  

  desc ##DMZ_Network##

  ip add 172.16.50.254 255.255.255.0

  exit

 

 

## Gigabit 2번 ## <Outside>

int g2

no shut

  nameif Outside

  security-level 0

  

  desc ##Outside_Network##

  ip add 1.1.100.1 255.255.255.252

  exit

 

show int ip br

 

 

## 현재 Win701에서

ping 172.16.10.29 (O) - 게이트웨이 OK

ping 172.16.10.132 (O) - DSW1->In_Router

ping 172.16.10.131 (O) - In_Router->DSW1

ping 172.16.10.149 (O) - In_Router->ASA


 

## ASA Ping test 및 대역 알려주기 ##

## ASA에서의 Ping 허용 ##

ASA]

conf t

policy-map global_policy

  class inspection_default

    inspect icmp 

 

 

 

## Static NAT ##

object network DNS_SVR
  host 172.16.50.100
  nat (DMZ,Outside) static 1.1.200.100
  exit

object network WEB_FTP_SVR
  host 172.16.50.101
  nat (DMZ,Outside) static 1.1.200.101
  exit

 

object network Inside
 subnet 172.16.0.0 255.255.0.0
 nat (Inside,Outside) static interface

## 172.16.0.0 /16 을 해줘야지 172.16.xxx.xxx을 모두 알게 된다.

 

 

route Inside 172.16.0.0 255.255.0.0 172.16.10.145

route Outside 0.0.0.0 0.0.0.0 1.1.100.1


## Object_Group ##

1. Object

  특정 Network 혹은 Service를 Object로 정의하여 사용이 가능하며, Network와 Servcie object로 구분한다.

 

 

IP 대역을 'Network-Object'로 설정

172.16.10.0/24 본사 부서 (경영지원 / 디자인 / 고객지원 / 미케닉)
172.16.60.0/24 상도 대리점
172.16.50.100 DNS, FTP
172.16.50.101 Web, Mail

  

ASA]

object network Headquarters

  subnet 172.16.10.0 255.255.255.0

object network Agency

  subnet 172.16.60.0 255.255.255.0

 

object network DNS_SVR

  host 172.16.50.100

object network WEB_SVR

  host 172.16.50.101

 

 

 

FTP, DNS Service Object를 설정.

object service DNS_P

  service udp destination eq 53

object service FTP_P

  service tcp destination eq 21

 

 


2. Object-Group

  * 다수의 Network / Protocol / Service 등을 묶어서 하나의 Object-Group으로 정의할 수 있다. 

    또한 기존 Object / Object-Group을 포함하는 것도 가능하다.

 

## Inside (10, 60) 대역을 하나의 Network로 Group화 시키기.

network-object 172.16.10.0/24 본사
network-object 172.16.60.0/24 상도 대리점

 

ASA]

Object-Group network HQ_IN_NET

  network-object object Headquarters

  network-object object Agency

 

다음 조건에 맞도록 Service Object-Group를 설정하시오.

  - Web Service : HTTP, HTTPs

  - Mail Service : SMTP, POP3, IMAP

 

 

ASA]

Object-group service WEB_S

  service-object tcp destination eq 80

  service-object tcp destination eq 443

  exit

 

Object-group service MAIL_S

  service-object tcp destination eq 25

  service-object tcp destination eq 110

  service-object tcp destination eq 143

 

show run object-group

 



## Ping 용

access-list Admit_Ping_Test extended line 1 permit icmp 172.16.50.0 255.255.255.0 any 


## ASA 6가지 정책 ##

Inside -> Outside 모든 접근 허용
Inside -> DMZ 53번 : DNS(UDP)    - DNS_P

21번 : FTP(TCP)      - FTP_P


80번 : HTTP(TCP)    - WEB_S
443번 : HTTPS(TCP) - WEB_S


25번 : SMTP(TCP)   - MAIL_S
143번 : IMAP(TCP)  - MAIL_S
DMZ -> Inside 모든 접근 차단 / Ping test용 ICMP만 허용
DMZ -> Outside 53번 : DNS(UDP)    - DNS_P

21번 : FTP(TCP)      - FTP_P


80번 : HTTP(TCP)    - WEB_S
443번 : HTTPS(TCP) - WEB_S


25번 : SMTP(TCP)   - MAIL_S
143번 : IMAP(TCP)  - MAIL_S
Outside -> Inside 모든 접근 차단 / Ping test용 ICMP만 허용
Outside -> DMZ 53번 : DNS(UDP)    - DNS_P

21번 : FTP(TCP)      - FTP_P


80번 : HTTP(TCP)    - WEB_S
443번 : HTTPS(TCP) - WEB_S


25번 : SMTP(TCP)   - MAIL_S
143번 : IMAP(TCP)  - MAIL_S

1. Inside -> Outside : 모든 권한 허용

ASA]

access-list INSIDE->DMZ permit ip any any

access-group INSIDE->OUTSIDE in interface Inside

 

access-list INSIDE->DMZ deny ip object-group HQ_IN_NET 172.16.50.0 255.255.255.0 

## ???? 이거 deny인데 172.16.50.0 255.255.255.0 


2. Inside -> DMZ : FTP, SMTP, DNS, HTTP, IMAP, HTTPS

ASA]

access-list INSIDE->DMZ extended permit object DNS_P object-group HQ_IN_NET object DNS_SVR

## HQ_IN_NET(Inside 대역 : 본사+대리점)에서 DNS_SVR(172.16.50.100)으로 갈 때,

    DNS_P(53번:DNS)를 허락하라.

 

 

access-list INSIDE->DMZ extended permit object FTP_P object-group HQ_IN_NET object WEB_SVR

## HQ_IN_NET(Inside 대역 : 본사+대리점)에서 WEB_SVR(172.16.50.101)으로 갈 때,

    FTP_P(21번:FTP)를 허락하라.

 

 

access-list INSIDE->DMZ extended permit object-group WEB_S object-group HQ_IN_NET object WEB_SVR

## HQ_IN_NET(Inside 대역 : 본사+대리점)에서 WEB_SVR(172.16.50.101)으로 갈 때,

    WEB_S(80번:HTTP[www], 443번:HTTPS)를 허락하라.

 

 

access-list INSIDE->DMZ extended permit object-group MAIL_S object-group HQ_IN_NET object DNS_SVR

## HQ_IN_NET(Inside 대역 : 본사+대리점)에서 DNS_SVR(172.16.50.100)으로 갈 때,

    MAIL_S(25번:SMTP, 143번:IMAP)를 허락하라.

 

access-list INSIDE->DMZ extended permit ip any any 

 

## access-list INSIDE->DMZ deny ip object-group HQ_IN_NET 172.16.50.0 255.255.255.0 log 4 interval 60

access-group INSIDE->DMZ in interface Inside


4. DMZ -> Outside

ASA]

access-list DMZ->OUTSIDE extended permit icmp 172.16.50.0 255.255.255.0 any

access-list DMZ->OUTSIDE extended permit object DNS_P 172.16.50.100 255.255.255.255 any

access-list DMZ->OUTSIDE extended permit object FTP_P 172.16.50.101 255.255.255.255 any

access-list DMZ->OUTSIDE extended permit object-group WEB_S 172.16.50.0 255.255.255.0 any

access-list DMZ->OUTSIDE extended permit object-group MAIL_S 172.16.50.100 255.255.255.255 any

 

 

## access-list DMZ->OUTSIDE deny ip object-group HQ_IN_NET 172.16.50.0 255.255.255.0 log 4 interval 60

                                                                                                                               (일단 생략)

access-group DMZ->OUTSIDE in interface DMZ


6. Outside -> DMZ

ASA]

access-list OUTSIDE->DMZ extended permit icmp 2.2.2.0 255.255.255.0 any

access-list OUTSIDE->DMZ extended permit object DNS_P any object DNS_SVR

access-list OUTSIDE->DMZ extended permit object FTP_P any object WEB_SVR

access-list OUTSIDE->DMZ extended permit object-group WEB_S any object WEB_SVR

access-list OUTSIDE->DMZ extended permit object-group MAIL_S any object DNS_SVR

 

## access-list OUTSIDE_IN deny ip object-group HQ_IN_NET 172.16.50.0 255.255.255.0 log 4 interval 60

access-group OUTSIDE->DMZ in interface Outside


## PAT ##

object network Inside_NET
  subnet 172.16.0.0 255.255.0.0
  nat (Inside,Outside) dynamic interface

## 원래는 255.255.0.0 으로 해서 10+60 대역을 묶어주려 했는데, 대역을 좀 더 줄여서 깔끔하게 만드려고 192로 함.

 

 

## DNS Rewrite ##

object network DNS_RE

 host 172.16.50.101
 nat (DMZ,Outside) static 1.1.200.100 dns

 

인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호

인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호

인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호

인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호 인 터 넷 된 다 끼 야 호




 

 

 

## Apache Server 구축 ##

1. Apache

  특정 Network 혹은 Service를 Object로 정의하여 사용이 가