© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-1 Lesson 7 Access Control Lists and Content Filtering.

Slides:



Advertisements
Similar presentations
© 2004, Cisco Systems, Inc. All rights reserved.
Advertisements

Chapter 9: Access Control Lists
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Basic IP Traffic Management with Access Lists
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
Standard, Extended and Named ACL.  In this lesson, you will learn: ◦ Purpose of ACLs  Its application to an enterprise network ◦ How ACLs are used to.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
CISCO PIX FIREWALL Configuration for DCSL Tuan Anh Nguyen CSCI 5234 University of Houston Clear Lake Fall Semester, 2005.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—7-1 Address Space Management Scaling the Network with NAT and PAT.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 8 – PIX Security Appliance Contexts, Failover, and Management.
RE © 2003, Cisco Systems, Inc. All rights reserved.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Chapter 6: Packet Filtering
© 2002, Cisco Systems, Inc. All rights reserved..
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Mr. Mark Welton.  Firewalls are devices that prevent traffic from entering or leaving a network  Firewalls are often used between networks, or when.
Access Control Lists (ACLs)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Access Control List (ACL)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Firewalls & Network Monitoring Advanced Registry Operations Curriculum.
© 2002, Cisco Systems, Inc. CSPFA 2.1—3-1 PIX Firewall.
Configuring the PIX Firewall Presented by Drew Spesard.
ACCESS CONTROL LIST.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—10-1 Lesson 10 Attack Guards, Intrusion Detection, and Shunning.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—8-1 Lesson 8 Object Grouping.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—6-1 Lesson 6 Translations and Connections.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—13-1 Lesson 13 Switching and Routing.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—5-1 Lesson 5 Getting Started with the Cisco PIX Firewall.
© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—6-1 Lesson 6 Object Grouping.
Lesson 4 © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—4-1 Understanding Translations and Connections.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—5-1 Lesson 5 Configuring Inbound Access Thru a Cisco Security Appliance.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2001, Cisco Systems, Inc. CSPFA 2.0—6-1 Chapter 6 Configuring Multiple Interfaces.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—9-1 Lesson 9 Advanced Protocol Handling.
Only Two Ways through the PIX Firewall
Access Control Configuration and Content Filtering
Cisco IOS Firewall Context-Based Access Control Configuration
Access Control Lists CCNA 2 v3 – Module 11
Presentation transcript:

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-1 Lesson 7 Access Control Lists and Content Filtering

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-2 Objectives

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-3 Objectives Upon completion of this lesson, you will be able to perform the following tasks: Configure and explain the function of ACLs. Configure and explain the function of Turbo ACLs. Configure and explain the function of NAT 0 ACLs. Configure active code filtering (ActiveX and Java applets). Configure the PIX Firewall for URL filtering. Configure the PIX Firewall for long URL filtering.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-4 ACLs

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-5 Security Levels Revisited Security levels tag a PIX Firewall interface with a number, 0 being the least secure and 100 being the most secure. Security levels enable the PIX Firewall to identify whether a requested session is inbound or outbound: Inbound session is a session from a less secure to a more secure interface Outbound session is a session from a more secure to a less secure interface Outside security level 0 Inside security level 100 Internet More secure Less secure More secure Less secure Outbound Inbound

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-6 PIX Firewall ACL Configuration Outside Inside Internet ACL for inbound access ACL for outbound access No ACL - Outbound permitted by default - Inbound denied by default PIX Firewall configuration philosophy is interface based. Interface ACL permits or denies the initial packet incoming on that interface. ACL needs to describe only the initial packet of the application; no need to think about return traffic. If no ACL is attached to an interface, the following ASA policy applies: -Outbound packet is permitted by default. -Inbound packet is denied by default.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-7 ACL Usage Guidelines Higher to lower security level: –Use an ACL to restrict outbound traffic. –The ACL source address is the actual (untranslated) address of the host or network. Lower to higher security level: –Use an ACL to enable inbound traffic. –Use an ACL to restrict inbound protocols. –The ACL destination address is the translated global IP address.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-8 Inbound HTTP Traffic to DMZ Web Server Public web server Internet DMZ Inside Outside.2.1 Inbound X By default, inbound access is denied — no ACL. To permit inbound traffic, complete the following steps: Configure static translation for WWW server address. Configure inbound access control list. Apply access control list to outside interface.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-9 Create a Static Translation for Web Server Public web server Internet DMZ Inside Outside Map an inside private address to an outside public address pixfirewall(config)# static (DMZ,outside)

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-10 access-list Command Public web server Internet DMZ Inside Outside Permit inbound HTTP Permit outside HTTP access to public web server pixfirewall(config)# access-list aclout permit tcp any host eq www pixfirewall(config)# access-list acl_ID line line-num {deny | permit} protocol source_addr source_mask [operator port[port]] destination_addr destination_mask [operator port [port]]

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-11 access-list Command Public web server Internet DMZ Inside Outside Permit inbound HTTP Permit outside HTTP access to public web server pixfirewall(config)# access-list aclout permit tcp any host eq 80 pixfirewall(config)# access-list acl_ID line line-num {deny | permit} protocol source_addr source_mask [operator port[port]] destination_addr destination_mask [operator port [port]]

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-12 access-group Command Public web server Internet DMZ Inside Outside.2.1 Apply ACL to outside interface pixfirewall(config)# access-group aclout in interface outside Apply access control list to interface pixfirewall(config)# access-group acl_ID in interface interface_name

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-13 show access-list Command chicago(config)# show access-list access-list ACLOUT; 4 elements access-list ACLOUT line 1 permit tcp host eq www (hitcnt=4) access-list ACLOUT line 2 permit tcp host host eq ftp (hitcnt=1) access-list ACLOUT line 3 permit tcp any host eq www (hitcnt=4) access-list ACLOUT line 4 deny ip any any (hitcnt=0) access-list ICMPDMZ; 1 elements access-list ICMPDMZ line 1 permit icmp host bastionhost any echo-reply (hitcnt=12) access-list ACLIN; 1 elements access-list ACLIN line 1 deny tcp any any eq www (hitcnt=0) ICMPDMZ ACLINACLOUT Internet

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-14 ACL Line Number Insert ACE into existing ACL pixfirewall(config)# access-list aclout line 4 permit tcp any host eq www access-list acl_ID line line-num deny | permit protocol source_addr source_mask [operator port[port]] destination_addr destination_mask operator port [port] pixfirewall(config)# show access-list access-list aclout line 2 permit tcp any host eq www (hitcnt=0) access-list aclout line 3 permit tcp any host eq www (hitcnt=0) access-list aclout line 4 permit tcp any host eq www (hitcnt=0) access-list aclout line 5 permit tcp any host eq www (hitcnt=0) Insert

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-15 ACL Comments ACL remark pixfirewall(config)# access-list outside line 1 remark web server http access-list pixfirewall(config)# access-list id [line line-num] remark text pixfirewall(config)# show access-list access-list aclout line 1 remark web server 1 http access-list access-list aclout line 2 permit tcp any host eq www (hitcnt=0) access-list aclout line 3 remark web server 2 http access-list access-list aclout line 4 permit tcp any host eq www (hitcnt=0)

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-16 ACL Logging Log option enabled for inbound ICMP to pixfirewall(config)# access-list outside-acl permit icmp any host log 7 interval 600 pixfirewall(config)# access-list acl_ID line line-num {deny | permit} protocol source_addr source_mask [operator port[port]] destination_addr destination_mask operator port [port] [log [[disable |default] | [level]]] [interval secs]] Syslog server ACL Syslog messages Internet

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-17 Inbound HTTP Access Solution Permit outside HTTP access to public web server pixfirewall(config)# static (DMZ,outside) pixfirewall(config)# access-list aclout permit tcp any host eq www pixfirewall(config)# access-group aclout in interface outside Public WWW Server Internet DMZ Inside Outside Inbound

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-18 Inbound HTTPS Access Solution Permit outside HTTPs access to e-banking web server pixfirewall(config)# static (DMZ,outside) pixfirewall(config)# access-list aclout permit tcp any host eq https pixfirewall(config)# access-group aclout in interface outside E-Banking web server Internet DMZ InsideOutside Inbound

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-19 NAT 0 Access Control List The NAT 0 access control list statement turns on identity NAT only for connections that match a permit statement of a specified access control list, such as branch office to corporate office. Internet /24 VPN Branch office Corporate office /24.11

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-20 nat 0 access-list Command nat [(if_name)] 0 access-list acl_name [outside] pixfirewall(config)# pixfirewall(config)# access-list VPN-NO-NAT permit ip pixfirewall(config)# nat (inside) 0 access-list VPN-NO- NAT Exempt traffic that is matched by an access-list command statement from NAT Internet /24 (VPN) /

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-21 Home Office—NAT 0 Access Control List Scenario SOHO(config)# access-list VPN-NO-NAT permit ip SOHO(config)# nat (inside) 0 access-list VPN-NO-NAT SOHO(config)# nat (inside) SOHO(config)# global (outside) 1 interface Internet /24 NAT 0 (VPN) /24 Small office/ home office Web

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-22 Turbo ACLs Regular ACL processing ACL A Entry 1 Entry 2 Entry 3 Entry N Compiled data table Packet header value IndexACL Entry Bit Maps ACLs organized internally as linked lists Linear search to find matching entry to deny or permit packet Increased search time when ACL A contains large number of elements, which leads to performance degradation ACLs compiled into sets of lookup data tables Improved search time for large ACLs Required minimum of 2.1 MB of memory Turbo ACL processing ACL A

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-23 Configuring Turbo ACLs access-list compiled access-list acl_ID compiled pixfirewall(config)# Enables the Turbo ACL feature for a specific ACL Enables the Turbo ACL feature on all ACLs Turbo compiles all ACLs with 19 or more entries

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-24 Using ACLs

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-25 Deny Web Access to the Internet Denies web traffic on port 80 from the inside network to the Internet Permits all other IP traffic from the inside network to the Internet Web IP Internet pixfirewall# write terminal... access-list acl_inside deny tcp any any eq www access-list acl_inside permit ip any any access-group acl_inside in interface inside nat (inside) global (outside) netmask

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-26 Permit Web Access to the DMZ pixfirewall# write terminal... static (dmz,outside) access-list acl_outside permit tcp any host eq www access-group acl_outside in interface outside... The ACL acl_outside permits web traffic on port 80 from the Internet to the DMZ web server. The ACL acl_outside denies all other IP traffic from the Internet. Web server / Internet Inbound HTTP only

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-27 Partner Web Access to DMZ and DMZ Access to Internal Mail The ACL acl_partner permits web traffic from the partner subnet to the DMZ intranet web server. The ACL acl_dmz_in permits host mail access to Client / Mail server Partnernet Internet web only DMZ SMTP only /24 pixfirewall# write terminal... nameif ethernet2 dmz sec50 nameif ethernet3 partnernet sec40 static (dmz,partnernet) access-list acl_partner permit tcp host eq www access-group acl_partner in interface partnernet static (inside,dmz) access-list acl_dmz permit tcp host host eq smtp access-group acl_dmz in interface dmz...

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-28 icmp Command Enables or disables pinging to an interface All ping requests denied at the outside interface, and all unreachable messages permitted at the outside interface pixfirewall(config)# icmp deny any echo outside pixfirewall(config)# icmp permit any unreachable outside pixfirewall(config)# icmp {permit | deny} src_addr src_mask [icmp-type] if_name Outside Inside Internet ICMP echo ICMP unreachable X

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-29 Malicious Active Code Filtering

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-30 Java Applet Filtering Java applet filtering enables an administrator to prevent the downloading of Java applets by an inside system. Java programs can provide a vehicle through which an inside system can be invaded. Java applets are executable programs that are banned within some security policies.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-31 ActiveX Blocking ActiveX controls are applets that can be inserted in web pages or other applications. ActiveX controls can provide a way for someone to attack servers. The PIX Firewall can be used to block ActiveX controls.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-32 filter activex | java Command Filters out ActiveX usage from outbound packets Filters out Java applets that return to the PIX Firewall from an outbound connection pixfirewall(config)# filter {activex | java} port [-port] local_ip mask foreign_ip mask

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-33 ActiveX filter Command pixfirewall(config)# filter activex Specifies that the ActiveX blocking applies to web traffic on port 80 from any local host and for connections to any foreign host Engineering Executive Marketing DMZ Internet Block ActiveX

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-34 URL Filtering

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-35 HTTP URL Filtering Websense and N2H2 HTTP URL-filtering applications used to block specific URLs responses URL filtering can be configured on PIX Firewall - Designate a URL-filtering server - Enable filtering URL-filtering server Request access to Deny access web server Internet X

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-36 pixfirewall(config)# url-server [(if_name)] [vendor websense] host local_ip [timeout seconds] [protocol {TCP | UDP} version [1 | 4]] Designate the URL-Filtering Server Designates a server that runs a Websense URL-filtering application pixfirewall(config)# url-server (dmz) vendor n2h2 host protocol TCP pixfirewall(config)# url-server [(if_name)] vendor n2h2 host local_ip [port number][timeout seconds][protocol {TCP | UDP}] Designates a server that runs an N2H2 URL-filtering application URL-filtering server TCP X

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-37 X Enable HTTP URL Filtering Prevents outbound users from accessing URLs that are designated with the URL-filtering application pixfirewall(config)# pixfirewall(config)# filter url http allow filter url [http | port[-port]] local_ip local_mask foreign_ip foreign_mask [allow] URL-filtering server Filter HTTP— all hosts

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-38 HTTPS and FTP Filtering Prevents outbound users from accessing HTTPS and FTP URLs that are designated with the Websense-based URL-filtering application pixfirewall(config)# pixfirewall(config)# filter https allow filter [ https | ftp ] dest-port local_ip local_mask foreign_ip foreign_mask [allow] URL-filtering server HTTPS and FTP filtering (Websense only) X

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-39 URL Filtering Configuration Example Designate URL server Enable filtering pixfirewall(config)# url-server (dmz) vendor websense host timeout 10 protocol TCP version 4 pixfirewall(config)# filter url http allow URL-filtering server Request access to Deny access web server Internet X

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-40 Long URL Filtering pixfirewall(config)# url-server (inside) vendor websense host timeout 5 protocol TCP version 1 pixfirewall(config)# filter url http longurl-truncate cgi-truncate pixfirewall(config)# url-block url-mempool 1500 pixfirewall(config)# url-block url-size 4 url-block url-size long_url_size url-block url-mempool memory_pool_size pixfirewall(config)# Enables you to increase the maximum allowable length of a single URL Enables you to configure the maximum memory available for buffering long URLs and pending URLs

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-41 Summary

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-42 Summary ACLs enable you to determine which systems can establish connections through your PIX Firewall. Turbo ACLs improve search time for large ACLs. With ICMP ACLs, you can disable pinging to a PIX Firewall interface so that your PIX Firewall cannot be detected on your network. The PIX Firewall can be configured to filter malicious active code. The PIX Firewall can work with URL-filtering software to control and monitor Internet activity.

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—7-43 Lab Exercise

© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2— Q P.0 Lab Visual Objective Student PC.2.1 Student PC PIX Firewall Web/FTP CSACS PIX Firewall.1 Local: 10.0.P.11 Local: 10.0.Q P Q.0 RTS.100 RTS.100 Pods 1-5 Pods Web FTP RBB.2 “bastionhost”: Web FTP P Q.0 “bastionhost”: Web FTP.1