SL Seminar PIX and Windows IAS

SL Seminar
By: Jim Gau
172.16.W.2
(DMZ)
.1
Outside: 192.168.0.1
Inside: 140.144.235.Z
Page 1 / 4
Remote Client 192.168.0.2
Switch
172.16.W.3
RadiusHost 140.144.235.X
TSHost 140.144.235.Y
Translated to: 192.168.0.Y
Install IAS in insidehost; choose Cisco as Radius client, allow access in policy 1, and add
authentication for pap and chap.
Remote user: aaauser
Password: aaapass
Remote Client try http://192.168.0.Y/tsweb PIX should prompt you with user name and
password before TS connection.
names
name 140.144.235.X RadiusHost
name 140.144.235.Y TSHost
name 192.168.0.Y TTSHost
interface ethernet0 100full
interface ethernet1 100full
interface ethernet2 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
ip address outside 192.168.0.1 255.255.255.0
ip address inside 140.144.235.Z 255.255.255.0
ip address dmz 172.16.W.1 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
global (outside) 1 interface
route outside 0.0.0.0 0.0.0.0 192.168.0.2
SL Seminar
By: Jim Gau
Page 2 / 4
Translate the host to outside option1:
access-list outside_access_in permit ip any host TTSHost
access-group outside_access_in in interface outside
static (inside,outside) TTSHost TSHost
Test and Attack:
Ping 192.168.0.Y from Remote Client
Ping 140.144.235.Y from Remote Client. It should fail.
Open the web page at: http://192.168.0.Y
Attack the 192.168.0.Y host from Remote Client station: rpctest 192.168.0.Y
Record the port 57005 and telnet to: telnet 192.168.0.Y 57005
_______________________________________________________________________
Before AAA authentication, enable VPN client in PIX firewall:
(2nd group needs to change the 192.168.5.0 to 192.168.6.0 or any network other than 5.0)
access-list inside_outbound_nat0_acl permit ip 140.144.235.0 255.255.255.0 192.168.5.0 255.255.255.0
ip local pool vpnclient 192.168.5.100-192.168.5.200
nat (inside) 0 access-list inside_outbound_nat0_acl
sysopt connection permit-pptp
vpdn group PPTP-VPDN-GROUP accept dialin pptp
vpdn group PPTP-VPDN-GROUP ppp authentication pap
vpdn group PPTP-VPDN-GROUP ppp authentication chap
vpdn group PPTP-VPDN-GROUP ppp authentication mschap
vpdn group PPTP-VPDN-GROUP ppp encryption mppe auto
vpdn group PPTP-VPDN-GROUP client configuration address local vpnclient
vpdn group PPTP-VPDN-GROUP client configuration dns 4.2.2.1 4.2.2.2
vpdn group PPTP-VPDN-GROUP pptp echo 60
vpdn group PPTP-VPDN-GROUP client authentication local
vpdn username remoteuser password remotepass
vpdn enable outside
From the Remote Client (192.168.0.2) create a PPTP client to VPN into the inside network. The Remote Client
should get 192.168.5.100 IP address after VPN into the PIX.
Ping and TS to 140.144.235.Y from Remote Client. It should work this time.
Right click the VPN icon at task bar of the Remote Client. Select disconnect to close the
VPN session.
_______________________________________________________________________
Wait for your instructor before entering the following commands to your Pix.
aaa-server myradius protocol radius
aaa-server myradius (inside) host RadiusHost secretkey
aaa authentication include any inbound 0 0 0 0 myradius
timeout uauth 0:05:00 absolute
At the RadiusHost, run Ethereal to capture and review the Radius authentication user
name and password (encrypted vs Cisco CSACS server in clear text).
Repeat the above test and attack. Compare the results.
Once authenticated, the attack still succeeded.
Translate the host to outside option2 (Wait for your instructor before entering commands):
access-list outside_access_in permit tcp any host TTSHost eq www
SL Seminar
By: Jim Gau
Page 3 / 4
access-list outside_access_in permit tcp any host TTSHost eq 3389
access-group outside_access_in in interface outside
static (inside,outside) tcp TTSHost 3389 TSHost 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp TTSHost www TSHost www netmask 255.255.255.255 0 0
Repeat the above test and attack. Compare the results.
Even authenticated, the attack should fail.
_______________________________________________________________________
Troubleshoot VPN client not working after enabling AAA authentication:
VPN to PIX from the Remote Client. After VPN connection established, the remote
desktop to 140.144.235.Y failed. Why?
Exclude the Remote Client from the authentication list.
aaa authentication exclude any inbound 0 0 192.168.0.2 255.255.255.255 myradius
When VPN to PIX from Remote Client. PIX still require authentication. Why?
At Pix firewall:
logging on
logging host inside RadiusHost
logging trap debugging
review the KiwiSyslog or the VPNRemoteDesktopKiwiSyslog.txt (What is the source
address try to remote desktop?)
At the RadiusHost use Ethereal to capture (or view VPNPingEtherealCapture.cap) while pinging the
140.144.235.X host from Remote Client. What is the source address you send to the PIX firewall after VPN?
(192.168.5.100)
From the KiwiSyslog and Ethereal Capture, we should update the exclude command to:
no aaa authentication exclude any inbound 0 0 192.168.0.2 255.255.255.255 myradius
aaa authentication exclude any inbound 0 0 192.168.5.100 255.255.255.255 myradius
VPN to PIX from the Remote Client. It should work without authentication. The remote
desktop to 140.144.235.Y should also work as well.
_______________________________________________________________________
SL Seminar
By: Jim Gau
Page 4 / 4
Follow other hand outs to configure Cisco 1242AP with Local Radius and WPA2Enterprise security.
Follow other hand outs to configure Cisco 1242AP with Repeater configuration.
Once the wireless work station authenticated and associated with the AP,
1. The wireless station can access the Internet (open web site of the Remote Client at
192.168.0.2
2. The wireless station cannot access inside network by default,
3. For the wireless station to access the inside network, it can VPN to the Pix firewall
and gain access the servers in the inside network. The VPN client could be Cisco
VPN client or Microsoft VPN client. The previous exercise also showed you how to
VPN to the inside network from the Remote Client with Microsoft PPTP VPN client.
(Both VPN clients are covered at CISN24 and CISS25 courses in details.)