150 likes | 289 Vues
In this lesson, you'll learn how to configure attack guards on the PIX Security Appliance, including SNMP inspection. This guide covers the setup of SNMP traps and how to deny specific SNMP versions to enhance security. You'll also implement global policies for DNS inspection, enabling detailed monitoring of UDP transactions on port 53. Key focus areas include connection management, DNS record translation, and handling flood attacks through techniques like SYN cookies and embryonic connection limits. Strengthen your network’s defense with these essential configurations.
E N D
Network Security 2 Module 2: Configure Network Intrusion Detection and Prevention
Module 2: Configure Network Intrusion Detection and Prevention Lesson 2.2 Configure Attack Guards on the PIX Security Appliance
SNMP Inspection SNMP- Managed Device 10.0.0.11 .19 Traps Internet SNMP manager 10.0.0.3 SNMP v1 • snmp-map: To deny a specific version of SNMP • inspect snmp: To enable SNMP application inspection asa1(config)# snmp-map SNMP_DENY_V1 asa1(config-snmp-map)# deny version 1 . . . asa1(config)# policy-map global_policy asa1(config-pmap)# class class-default asa1(config-pmap-c)# inspectsnmpSNMP_DENY_V1 . . . asa1(config)# service-policy global_policy global
DNS Inspection DNS Server Client 53 1050 Request Response • Monitors all UDP transactions on port 53: • Tracks DNS request ID and opens a connection slot • Closes connection slot immediately after answer is received • Translates the DNS A record • Before release 6.2: alias command • Release 6.2 and later: DNS record translation • Reassembles the DNS packet to verify its length (default = 512 bytes)