【IT168 专稿】试验环境:
1、 拓扑图:
2、 拓扑说明:
1) router 1为出口路由器,做NAT出局。
2) SW1为局域网交换机,做了端口镜像,把E0/1镜像到端口E0/24对攻击的数据做分析。
3) 攻击机:IP 10.0.0.5 MAC: Giga-Byt_15:84:f3 (00:1d:7d:15:84:f3)
4) 受害机1:IP 10.0.0.4 MAC: Dell_c0:fc:55 (00:21:70:c0:fc:55)
5) 受害机2:IP 10.0.0.6 MAC:SamsungE_9c:25:d3 (00:13:77:9c:25:d3)
6) 网关:IP 10.0.0.1 MAC: Hangzhou_4b:bf:4a (00:0f:e2:4b:bf:4a)
3、 测试用软件:
采用了目前常见的局域网攻击软件:网络守护神4.0.0.0,聚生网管2.1 。经分析此2软件的做法基本雷同,因此文中不做特别的指出均表示此2软件。
4、 相关路由交换配置:
Router1:
#
sysname Router1
#
nat address-group 0 192.168.1.223 192.168.1.224
#
dhcp server ip-pool 1
network 10.0.0.0 mask 255.255.255.0
gateway-list 10.0.0.1
dns-list 202.102.134.68 61.134.1.4
#
acl number 2000
rule 0 permit source 10.0.0.0 0.0.0.255
#
interface Ethernet0/0
ip address 192.168.1.222 255.255.255.0
nat outbound 2000 address-group 0
#
interface Ethernet0/1
ip address 10.0.0.1 255.255.255.0
#
ip route-static 0.0.0.0 0.0.0.0 192.168.1.1 preference 60
SW1:
#
sysname SW1
#
acl number 4000
rule 0 permit ingress interface Ethernet0/1 egress any
rule 1 permit ingress any egress interface Ethernet0/1
#
vlan 1
#
vlan 10
#
interface Vlan-interface1
ip address 10.0.0.2 255.255.255.0
#
interface Ethernet0/1
#
interface Ethernet0/2
#
interface Ethernet0/3
#
interface Ethernet0/23
port access vlan 10
#
interface Ethernet0/24
#
ip route-static 0.0.0.0 0.0.0.0 10.0.0.1 preference 60
#
mirrored-to link-group 4000 rule 0 interface Ethernet0/23
mirrored-to link-group 4000 rule 1 interface Ethernet0/23