Sis security lab introductory session
1 / 24

SIS - Security Lab Introductory Session - PowerPoint PPT Presentation

  • Uploaded on

SIS - Security Lab Introductory Session. University of Pittsburgh 2006. Agenda. Description of lab infrastructure Equipment configuration basics Text based connection / configuration Graphical configuration environment Cabling description Useful commands Cisco IOS Windows / Linux

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'SIS - Security Lab Introductory Session' - scott

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Sis security lab introductory session

SIS - Security Lab Introductory Session

University of Pittsburgh



  • Description of lab infrastructure

  • Equipment configuration basics

    • Text based connection / configuration

    • Graphical configuration environment

  • Cabling description

  • Useful commands

    • Cisco IOS

    • Windows / Linux

  • Recommendations

Access modes
Access modes

  • The PIX firewalls (and other CISCO equipment) have four administrative access modes:

    • Unprivileged mode: Available at first access. Provides a restricted, limited view of system settings. (Prompt = ‘>’)

    • Privileged mode: Allows you to change system settings. (Prompt = ‘#’)

    • Configuration mode: Enables you to change system configurations. (Prompt = ‘(config)#’

    • Monitor mode: Special mode that allows you to update system configuration image over the network (using a TFTP server)

Access modes 2
Access modes (2)

  • To access privilege mode


  • To access configuration mode

    configure terminal

  • Use the exit command to exit from one mode to the previous one


  • System or group of systems that manage access between two networks





Outside Network

Inside Network

Pix firewalls
PIX Firewalls

  • Proprietary operating system

  • Stateful inspection

  • Protocol and application inspection

  • User-based authentication

  • Virtual private networking

  • Web-based management

  • Stateful failover capabilities

Graphical configuration environment pix 501 firewall
Graphical configuration environment (PIX 501 Firewall)

  • Important: To access the GUI configuration environment on the PIX 501 use a PC connected to the PIX and a browser with the MICROSOFT JAVA VM enabled !!

  • Activate GUI environment via browser

Viewing saving configurations
Viewing / Saving configurations

  • There are two configuration memories, running-configuration and startup-configuration

  • show running-config displays the current configuration in the RAM memory of the equipment. Any configuration changes are written to the running-configuration

  • write memorysaves the current running-configuration to the flash memory startup-configuration

  • show configureshows the configuration that is in flash memory

  • show historydisplays previously entered commands

Cabling description
Cabling description

  • Networking ports for each computer are numbered

  • Correspondence (see picture)

  • Move the patch cords to where you need them if they are not properly set.

Basic cisco ios commands
Basic CISCO IOS commands

  • ip address if_name ip_address [netmask]

    ip address ethernet2

  • show ip address

    • Displays the IP adresses assigned to all interfaces

  • show interface

    • allows you to view the network interface information and status

  • ping ip_address

    • To determine reachability of a system

Basic windows linux networking commands
Basic Windows/Linux networking commands

  • ipconfig (windows) / ifconfig (linux)

    • To obtain ip configuration information of a PC

  • ping

  • netstat –r

    • To obtain routing configuration and statistics

  • netstat

    • Gives you information on active ports and established connections on a system

Lab procedures
Lab procedures

  • Lab assignments will be given a couple of days in advance to the start of the lab working period

  • Lab working periods = 1 or 2 weeks

  • Lab groups should be composed of two persons (no more, no less)

  • Use sign-up sheet to schedule the time in which you will be using lab equipment

  • Lab reports can be written in any format but should include answers to the questions presented in the assignment and equipment configuration files

Important recommendations
Important recommendations

  • Never change a password (you’ll be held accountable) unless its for your own user account

  • Discharge often – get rid of static electricity build up before touching equipment

  • For questions:

    • Check CISCO web site

    • Ask GSA:

      • E-mail: