Friday, June 27, 2014

ASA transparent mode





1. check firewall mode: show firewall
2. change router mode to transparent mode: firewall transparent
3. create BVI(bridge virtual interface) for management interface just like a VSI(Virtual Switch Interface)
: interface BVI [number of BVI]
give ip address
4. turn on physical interface, and configure Bridge group 1 in physical interfaces
- int g0
security-level 100
nameif inside
bridge-broup 1
no sh
- int g4
same


5. configure bpdu to communicate with other switches for STP.(ASDM ehtertype rule)


6. configure ACLs that permit dhcp packets to be transfered between inside and outside interfaces.
- because dhcp uses broadcast packets, hosts in inside_1 and inside_2 networks are unable to get ip address from dhcp server.
(ASA, by default, drops all broadcast and multicast traffic)
- Therefore, you have to add access-lists that permit
dhcp broadcast packets(ip 255.255.255.255, port UDP 68) between inside and outside ports


Result
Success

7.configure ARP inspection
- mapping a host's ip address and mac-address
- If packets violates the ARP inspection rule, drop that packets.

ex)ip address 192.168.10.4 = mac address aaaa.bbbb.cccc)

first: map ip address and mac address


Second: enable ARP inspection


Ex) Inside_R router ip address 192.168.10.2 | mac-address c200.04fc.0000


         change the mac-address of 192.168.10.2
                        c200.04fc.0000 -> 1111.0022.0200

Result: failed to connect and ping to ASA.




         change the mac-address of 192.168.10.2
                        c200.04fc.0000 <- 1111.0022.0200 

Now, I can connect and ping to ASA.

No comments:

Post a Comment