网络通信 频道

实战案例:ARP攻防测试报告

  【IT168 专稿】试验环境:
  1、 拓扑图:
  
  2、 拓扑说明:
  1) router 1为出口路由器,做NAT出局。
  2) SW1为局域网交换机,做了端口镜像,把E0/1镜像到端口E0/24对攻击的数据做分析。
  3) 攻击机:IP 10.0.0.5   MAC: Giga-Byt_15:84:f3 (00:1d:7d:15:84:f3)
  4) 受害机1:IP 10.0.0.4  MAC: Dell_c0:fc:55 (00:21:70:c0:fc:55)
  5) 受害机2:IP 10.0.0.6  MAC:SamsungE_9c:25:d3 (00:13:77:9c:25:d3)
  6) 网关:IP 10.0.0.1  MAC: Hangzhou_4b:bf:4a (00:0f:e2:4b:bf:4a)
  3、 测试用软件:
  采用了目前常见的局域网攻击软件:网络守护神4.0.0.0,聚生网管2.1 。经分析此2软件的做法基本雷同,因此文中不做特别的指出均表示此2软件。
  4、 相关路由交换配置:
  Router1:
  #
   sysname Router1
  #
   nat address-group 0 192.168.1.223 192.168.1.224
  #
  dhcp server ip-pool 1
   network 10.0.0.0 mask 255.255.255.0
   gateway-list 10.0.0.1
   dns-list 202.102.134.68 61.134.1.4
  #
  acl number 2000
   rule 0 permit source 10.0.0.0 0.0.0.255
  #
  interface Ethernet0/0
   ip address 192.168.1.222 255.255.255.0
   nat outbound 2000 address-group 0
  #
  interface Ethernet0/1
   ip address 10.0.0.1 255.255.255.0
  #
   ip route-static 0.0.0.0 0.0.0.0 192.168.1.1 preference 60

  SW1:
  #
   sysname SW1
  #
  acl number 4000
   rule 0 permit ingress interface Ethernet0/1 egress any
   rule 1 permit ingress any egress interface Ethernet0/1
  #
  vlan 1
  #
  vlan 10
  #
  interface Vlan-interface1
   ip address 10.0.0.2 255.255.255.0
  #
  interface Ethernet0/1
  #
  interface Ethernet0/2
  #
  interface Ethernet0/3
  #
  interface Ethernet0/23
   port access vlan 10
  #
  interface Ethernet0/24
  #
   ip route-static 0.0.0.0 0.0.0.0 10.0.0.1 preference 60
  #
   mirrored-to link-group 4000 rule 0 interface Ethernet0/23
   mirrored-to link-group 4000 rule 1 interface Ethernet0/23

0
相关文章