IPS在线模式实验2-Interface Pair

简介:

1.拓扑图:

2.接口配置:

R1(config)#int f0/0
R1(config-if)#ip add 10.1.1.11 255.255.255.0
R1(config-if)#no sh

R2(config)#int f0/0
R2(config-if)#ip add 10.1.1.12 255.255.255.0
R2(config-if)#no sh

R3#vlan database
R3(vlan)#vlan 10
VLAN 10 added:
    Name: VLAN0010
R3(vlan)#exit
APPLY completed.
Exiting....

R3(config)#int f0/0
R3(config-if)#switchport mode access 
R3(config-if)#switchport access vlan 10
R3(config-if)#int f0/15
R3(config-if)#swi mo acc
R3(config-if)#swi acc vlan 10

R4#vlan data 
R4(vlan)#vlan 20
VLAN 20 added:
    Name: VLAN0020
R4(vlan)#exit
APPLY completed.
Exiting....
R4#

R4#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R4(config)#int f0/0
R4(config-if)#swi mo acc
R4(config-if)#swi acc vlan 20
R4(config-if)#int f0/15
R4(config-if)#swi mo acc
R4(config-if)#swi acc vlan 20

3.IPS配置:
A.确认g0/1和g/2接口都已经enabled
 

B.创建接口对,将g0/1和g/2接口加入接口对
 

C.将接口对关联到virtual sensor

 
4.测试:
A.在R1上连续ping R2

R1#ping 10.1.1.12 repeat 100

Type escape sequence to abort.
Sending 100, 100-byte ICMP Echos to 10.1.1.12, timeout is 2 seconds:
.!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Success rate is 99 percent (99/100), round-trip min/avg/max = 12/27/108 ms

B.在IPS上能看到攻击事件
 

 





本文转自 碧云天 51CTO博客,原文链接:http://blog.51cto.com/333234/880641,如需转载请自行联系原作者

相关文章
|
网络安全 网络虚拟化 数据安全/隐私保护
Cisco Packet Tracer模拟:ASA5505 IP Sec VPN实验
Cisco Packet Tracer模拟:ASA5505 IP Sec VPN实验
626 0
Cisco Packet Tracer模拟:ASA5505 IP Sec VPN实验
|
网络虚拟化
IRF典型配置举例(BFD MAD检测方式)
使用两台交换机进行IRF的最简配置,两台交换机适合于BFD的检测模式。
1839 0
|
测试技术 Shell 网络虚拟化
|
网络虚拟化 Shell 传感器
|
测试技术 网络安全 网络协议