天天看點

Zone-based User Based Firewall

User Group Firewall is a mechanism to authenticate each user and provide access privileges based on the type of user being authenticated. The authentication is done by a RADIUS server. The user initially has limited or no access to the protected network. When the user is authenticated, access privileges are established for the IP address from which the user is accessing the network. The access privileges depend on which user group the user belongs to on the RADIUS server.

<a href="http://blog.51cto.com/attachment/201110/150447103.jpg" target="_blank"></a>

教主配置執行個體介紹:

<a href="http://blog.51cto.com/attachment/201110/150500459.jpg" target="_blank"></a>

**********************任務目标***************************

**********************基本配置***************************

enable

config ter

hostname FW

interface FastEthernet0/0

ip address 202.100.1.10 255.255.255.0

no shut

interface FastEthernet1/0

ip address 10.1.1.10 255.255.255.0

**********************************************************

%%%%%%%%%%%%%%基本AAA%%%%%%%%%%%%%%%%%%%%%%%%%

aaa new

aaa authentication login noacs line none

line con 0

login authentication noacs

line aux 0

line vty 0 15

radius-server host 202.100.1.100 key cisco

radius-server vsa send

注意test

%%%%%%%%%%%%%auth-proxy部分%%%%%%%%%%%%%%%%%%%%%

-------------------比對使用者組------------------------

identity policy usergroup-policy1

user-group usergroup1

identity policy usergroup-policy2

user-group usergroup2

-------------------比對ACS傳回的tag------------------

class-map type control tag match-all class-usergroup2

match tag tag-usergroup2

class-map type control tag match-all class-usergroup1

match tag tag-usergroup1

-------------------把tag影射到使用者組-----------------

policy-map type control tag tag.policy

class type control tag class-usergroup1

class type control tag class-usergroup2

--------------------啟用auth-proxy-------------------

aaa authentication login default group radius

aaa authorization auth-proxy default group radius

ip admission name auth proxy http service-policy type tag tag.policy

--------------------運用auth-proxy-------------------

ip admission auth

--------------------啟用http服務---------------------

ip http server

ip http authentication aaa

%%%%%%%%%%%%%%%%%%%%配置ZBFW%%%%%%%%%%%%%%%%%%%%%%%%%

--------------------比對正規表達式---------------------------------

parameter-map type regex user1.regex

pattern sh/run

parameter-map type regex user2.regex

pattern sh/ip/inter/brie

--------------------通過class-map type http比對URI-----------------

class-map type inspect http match-any user1.class

match request uri regex user1.regex

class-map type inspect http match-any user2.class

match request uri regex user2.regex

--------------------通過policy-map typ http丢棄适當URI-------------

policy-map type inspect http user2.http

class type inspect http user2.class

reset 

policy-map type inspect http user1.http

class type inspect http user1.class

reset

-------------------通過class-map type inspect比對usergroup1的http流量-------- 

class-map type inspect match-all usergroup1-inspect

match user-group usergroup1

match protocol http

-------------------通過class-map type inspect比對usergroup2的http流量--------

class-map type inspect match-all usergroup2-inspect

match user-group usergroup2

-------------------通過policy-map type inspect配置zone-pair間政策------------

policy-map type inspect in-to-out

class type inspect usergroup1-inspect

inspect

service-policy http user1.http

class type inspect usergroup2-inspect

service-policy http user2.http

-------------------配置ZBFW--------------------------------------------------- 

zone security out

zone security in

zone-member security out

zone-member security in

zone-pair security in-to-out source in destination out

service-policy type inspect in-to-out

******************************ACS配置**************************************

傳統方法:

<a href="http://blog.51cto.com/attachment/201110/150557265.jpg" target="_blank"></a>

 RAC配置方法:

<a href="http://blog.51cto.com/attachment/201110/150613361.jpg" target="_blank"></a>

本文轉自Yeslab教主 51CTO部落格,原文連結:http://blog.51cto.com/xrmjjz/683524