Lab 14: Cut-Through-Proxy on ASA - NetwaxLab

Breaking

Facebook Popup

BANNER 728X90

Tuesday, November 17, 2015

Lab 14: Cut-Through-Proxy on ASA

Task

Topology


1.     Configure Cut-Through-Proxy on ASA.


Solution

R1
==

int f0/0
ip add 10.0.0.100
No shut
Exit

ip route 0.0.0.0 0.0.0.0 10.0.0.1

ASA
====

int g0
Nameif outside
Ip add 192.168.150.1 255.255.255.0
No shut
Exit

Int g1
Nameif inside
Ip add 10.0.0.1 255.255.255.0
No shut
Exit

Int g2
Nameif dmz
Ip add 192.168.100.1 255.255.255.0
No shut
Exit

Access-list OUT permit icmp any any
Access-group OUT in interface outside
Access-group OUT in interface dmz

(Note: Ping R1 to ISE, R1 to TestPC successfully after above commands.)

ISE configuration on ASA
======================

Aaa-server ISE protocol radius
Exit

Aaa-server ISE(dmz) host 192.168.100.20
key cisco
Exit

Virtual telnet 172.16.1.100

access-list OUT extended permit tcp any host 172.16.1.100 eq telnet
access-list CUT extended permit tcp any host 172.16.1.100 eq telnet

aaa authentication match OUT dmz ISE

access-group OUT in interface dmz per-user-override

Verification
==========

  1. Telnet 10.0.0.100 from TestPC, It will show failed connection. 
  2. Telnet 172.16.1.100 from TestPC, It will show successfully connection.

ISE Configuration Steps:
======================

1. Login to authentication on TestPC using browser.

Go to

1. Administrator>Network Resource> Network Device> Add.
    Add a Network Device use
    Name = ASA
    IP Address = 192.168.100.1/32
    Location = All Location
    Device Type = All Device Types
    Authentication Settings:
    Protocol = RADIUS
    *Shared Secret = cisco
    Submit/Save

2. Administrator> Identity Management> Group> User Identity Group> Add Name = CTP
    Submit

3. Administrator> Identity Management> Identities> Users> Add
    Name = test
    Password = Cisco@123
    Re-Enter Password = Cisco@123
    User Groups = CTP
    Submit/Save

After this go on Firewall and test your Configuration

Ciscoasa# test aaa-server authentication ISE host 192.168.100.20 username test password Cisco@123
INFO: Attempting Authentication test to IP address <192.168.100.20> (timeout 12 seconds)
INFO: Authentication Successful

Create Authorization Profile on ISE
==============================

1. Policy > Policy Elements > Results > Authorization > Authorization profile> Add.

   Name = CTP
   Access Type = ACCESS_ACCEPT
   Advanced Attributes Settings:
   Cisco:cisco-av-pair = ip:inacl#1=permit tcp any any eq 23
   Save

2. Policy > Authorization

   Click on Edit and then, Click Insert Rules Below
   Then name rule as CTP and in if column call user from User Identity Group <CTP>, permission column call Authorization Profile created before which is to be found in Standard list <CTP>.
   Now initiate Telnet Connection from TestPC to Virtual IP 172.16.1.100

   Username = test
   Password = Cisco@123

   It will authenticate Successfully.
   Now Check the dynamic access-list on ASA. It will download after successfully connection with virtual ip.
   Now again Telnet from TestPC to R1 host. It will authenticate successfully and you will connect with R1.

Necessary Commands
====================

1. Sh uauth
2. Clear uauth


4 comments:

  1. Great Post !Free Online Skill Test, e Tutorial, Video Tutorial & Training on CCNA,CCNP & CCIE-
    Hub4tech.com

    ReplyDelete
  2. Hello Admin, You are doing a great Job!. I used to practice labs with the help of your website earlier which was really helpful. Now I could not see the download link for these labs. Where can I get the answers. Please help

    ReplyDelete
    Replies
    1. We're working on portal, thats why you didn't find links. but now all settled.
      Thanks for making our effort fruitful

      Delete
    2. Hello admin, great job. This blog is very educational and helpful for us but still unable to downlabs..

      Delete