index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
1,523
Literal TCP or UDP? Value Description Remote Authentication Dial-In User Service (accounting) radius-acct UDP 1646 rip UDP 520 Routing Information Protocol rsh TCP 514 Remote Shell rtsp TCP 554 Real Time Streaming Protocol secureid-udp UDP 5510 SecureID over UDP sip TCP, UDP 5060 Session Initiation Protocol smtp TCP 25...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,524
Local Ports and Protocols The following table lists the protocols, TCP ports, and UDP ports that the ASA may open to process traffic destined to the ASA. Unless you enable the features and services listed in this table, the ASA does not open any local protocols or any TCP or UDP ports. You must configure a feature or s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,525
Feature or Service Protocol Port Number Comments Telnet TCP 23 — VPN Load Balancing UDP 9023 Configurable. VPN Individual User UDP 1645, 1646 Port accessible only over VPN tunnel. Authentication Proxy ICMP Types The following table lists the ICMP type numbers and names that you can enter in ASA commands. Table 90: ICMP...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
0
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
2
CONTENTS PREF ACE About This Guide xix Document Objectives xix Related Documentation xix Document Conventions xix Communications, Services, and Additional Information xxi CHAPTER 1 Introduction to Cisco ASA Firewall Services 1 How to Implement Firewall Services 1 Basic Access Control 2 Application Filtering 2 URL Filte...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
3
Configure a Service Group 13 Configure Local User Groups 15 Configure Security Group Object Groups 16 Configure Time Ranges 17 Monitoring Objects 18 History for Objects 19 CHAPTER 3 Access Control Lists 21 About ACLs 21 ACL Types 21 ACL Names 22 Access Control Entry Order 23 Permit/Deny vs. Match/Do Not Match 23 Access...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
4
Examples for EtherType ACLs 39 Edit ACLs in an Isolated Configuration Session 40 Monitoring ACLs 41 History for ACLs 42 CHAPTER 4 Access Rules 45 Controlling Network Access 45 General Information About Rules 46 Interface Access Rules and Global Access Rules 46 Inbound and Outbound Rules 46 Rule Order 47 Implicit Permit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
5
About the Identity Firewall 61 Architecture for Identity Firewall Deployments 62 Features of the Identity Firewall 63 Deployment Scenarios 65 Guidelines for the Identity Firewall 67 Prerequisites for the Identity Firewall 69 Configure the Identity Firewall 70 Configure the Active Directory Domain 70 Configure Active Di...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
6
Configure the AAA Server for Cisco TrustSec Integration 96 Import a PAC File 98 Configure the Security Exchange Protocol 99 Add an SXP Connection Peer 101 Refresh Environment Data 102 Configure the Security Policy 103 Configure Layer 2 Security Group Tagging Imposition 104 Usage Scenarios 105 Configure a Security Group...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
7
Access the ASA FirePOWER CLI 124 Configure ASA FirePOWER Basic Settings 124 Configure the ASA FirePOWER Module for ASDM Management 126 Configure the ASA FirePOWER Module 128 Configure the Security Policy on the ASA FirePOWER Module 128 Redirect Traffic to the ASA FirePOWER Module 128 Configure Inline or Inline Tap Moni...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
8
Network Object NAT 151 Twice NAT 151 Comparing Network Object NAT and Twice NAT 152 NAT Rule Order 152 NAT Interfaces 154 Guidelines for NAT 154 Firewall Mode Guidelines for NAT 155 IPv6 NAT Guidelines 155 IPv6 NAT Best Practices 155 Additional Guidelines for NAT 156 Network Object NAT Guidelines for Mapped Address Obj...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
9
Configure Identity Network Object NAT 188 Configure Identity Twice NAT 190 Monitoring NAT 192 History for NAT 193 CHAPTER 9 NAT Examples and Reference 197 Examples for Network Object NAT 197 Providing Access to an Inside Web Server (Static NAT) 197 NAT for Inside Hosts (Dynamic NAT) and NAT for an Outside Web Server (S...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
10
NAT66 Example, Static Translation between Networks 221 NAT66 Example, Simple IPv6 Interface PAT 222 Rewriting DNS Queries and Responses Using NAT 223 DNS Reply Modification, DNS Server on Outside 223 DNS Reply Modification, DNS Server, Host, and Server on Separate Networks 225 DNS Reply Modification, DNS Server on Host...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
11
Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers 250 Applying Inspection to HTTP Traffic with NAT 251 History for Service Policies 251 CHAPTER 1 1 Getting Started with Application Layer Protocol Inspection 253 Application Layer Protocol Inspection 253 When to Use Application Protocol Inspec...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
12
HTTP Inspection Overview 286 Configure an HTTP Inspection Policy Map 286 ICMP Inspection 290 ICMP Error Inspection 290 ILS Inspection 291 Instant Messaging Inspection 291 IP Options Inspection 294 Defaults for IP Options Inspection 294 Configure an IP Options Inspection Policy Map 295 IPsec Pass Through Inspection 296 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
13
Limitations for CTIQBE Inspection 311 H.323 Inspection 312 H.323 Inspection Overview 312 How H.323 Works 312 H.239 Support in H.245 Messages 313 Limitations for H.323 Inspection 314 Configure H.323 Inspection Policy Map 314 MGCP Inspection 317 MGCP Inspection Overview 317 Configure an MGCP Inspection Policy Map 318 RTS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
14
SCTP Stateful Inspection 337 SCTP Access Control 337 SCTP NAT 337 SCTP Application Layer Inspection 337 Diameter Inspection 338 M3UA Inspection 338 M3UA Protocol Conformance 339 M3UA Inspection Limitations 339 RADIUS Accounting Inspection Overview 339 Licensing for Mobile Network Protocol Inspection 340 Defaults for GT...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
15
CHAPTER 1 5 Connection Settings 377 What Are Connection Settings? 377 Configure Connection Settings 378 Configure Global Timeouts 379 Protect Servers from a SYN Flood DoS Attack (TCP Intercept) 380 Customize Abnormal TCP Packet Handling (TCP Maps, TCP Normalizer) 383 Bypass TCP State Checks for Asynchronous Routing (TC...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
16
Monitor QoS 411 QoS Police Statistics 411 QoS Priority Statistics 412 QoS Priority Queue Statistics 412 Configuration Examples for Priority Queuing and Policing 413 Class Map Examples for VPN Traffic 413 Priority and Policing Example 414 History for QoS 415 CHAPTER 1 7 Threat Detection 417 Detecting Threats 417 Basic T...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
17
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 xviii Contents
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
18
About This Guide The following topics explain how to use this guide. • Document Objectives, on page xix • Related Documentation, on page xix • Document Conventions, on page xix • Communications, Services, and Additional Information, on page xxi Document Objectives The purpose of this guide is to help you configure the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
19
Convention Indication Variables, for which you supply values, are presented in an italic typeface. Italic type is also used for document titles, and for general emphasis. italic Terminalsessions and information that the system displays appear in monospace type. monospace Required alternative keywords are grouped in bra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
20
Communications, Services, and Additional Information • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager. • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services. • To submit a service request, visit Cisco Support. • To discover and brow...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
21
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 xxii About This Guide Communications, Services, and Additional Information
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
22
CHAPTER 1 Introduction to Cisco ASA Firewall Services Firewall services are those ASA features that are focused on controlling access to the network, including services that block traffic and services that enable traffic flow between internal and external networks. These services include those that protect the network ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
23
Step 6 Implement application inspection if the default settings are insufficient for your network. See Application Inspection, on page 4. Basic Access Control Accessrules, applied per interface or globally, are your first line of defense. You can drop, upon entry,specific types of traffic, or traffic from (or to) speci...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
24
The purpose of URL filtering is primarily to completely block or allow access to a web site. Although you can target individual pages, you typically specify a host name (such as www.example.com) or a URL category, which defines a list of host names that provide a particular type of service (such as Gambling). When tryi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
25
in the internal private network into legal, routable addresses that can be used on the public Internet. In this way, NAT conserves public addresses because you can advertise at a minimum only one public address for the entire network to the outside world. Other functions of NAT include: • Security—Keeping internal IP a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
26
Use Case: Expose a Server to the Public You can make certain application services on a server available to the public. For example, you could expose a web server, so that users can connect to the web pages but not make any other connections to the server. To expose a server to the public, you typically need to create a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
27
hostname(config)# access-list outside_access_in line 1 extended permit tcp any4 object myWebServ eq http Step 4 If you do not already have an access group on the outside interface, apply it using the access-group command: hostname(config)# access-group outside_access_in in interface outside CLI Book 2: Cisco ASA Series...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
28
P ART I Access Control • Objects for Access Control, on page 9 • Access Control Lists, on page 21 • Access Rules, on page 45 • Identity Firewall, on page 61 • ASA and Cisco TrustSec, on page 85 • ASA FirePOWER Module, on page 113
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
29
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
30
CHAPTER 2 Objects for Access Control Objects are reusable components for use in your configuration. You can define and use them in Cisco ASA configurations in the place of inline IPaddresses, services, names, and so on. Objects make it easy to maintain your configurations because you can modify an object in one place a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
31
Configure Objects The following sections describe how to configure objects that are primarily used on access control. Configure Network Objects and Groups Network objects and groups identify IP addresses or host names. Use these objects in access control lists to simplify your rules. Configure a Network Object A networ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
32
Configure a Network Object Group Network object groups can contain multiple network objects as well as inline networks or hosts. Network object groups can include a mix of both IPv4 and IPv6 addresses. However, you cannot use a mixed IPv4 and IPv6 object group for NAT, or object groups that include FQDN objects. Proced...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
33
Create network object groupsfor privileged usersfrom various departments by entering the following commands: hostname (config)# object-group network eng hostname (config-network)# network-object host 10.1.1.5 hostname (config-network)# network-object host 10.1.1.9 hostname (config-network)# network-object host 10.1.1.8...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
34
• service {tcp | udp | sctp} [source operator port] [destination operator port]—For TCP, UDP or SCTP. You can optionally specify ports for the source, destination, or both. You can specify the port by name or number. The operator can be one of the following: • lt—less than. • gt—greater than. • eq—equal to. • neq—not e...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
35
type. If you specify a type, you can optionally specify an ICMP code for that type (1-255). If you do not specify the code, then all codes are used. • service-object {tcp | udp | tcp-udp | sctp} [source operator port] [destination operator port]—For TCP, UDP, or both, or for SCTP. You can optionally specify ports for t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
36
hostname(config-service-object-group)# service-object object HTTPS Configure Local User Groups You can create local user groups for use in features that support the identity firewall by including the group in an extended ACL, which in turn can be used in an access rule, for example. The ASA sends an LDAP query to the A...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
37
hostname(config-user-object-group)# user EXAMPLE\admin hostname(config-user-object-group)# user-group EXAMPLE\\managers hostname(config-user-object-group)# group-object local-admins Step 3 (Optional) Add a description: description string Configure Security Group Object Groups You can create security group object groups...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
38
Example: hostname(config-security-object-group)# security-group tag 1 hostname(config-security-object-group)# security-group name mgkt hostname(config-security-object-group)# group-object local-sg Step 3 (Optional) Add a description: description string Configure Time Ranges A time range object defines a specific time c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
39
You can repeat this command to configure more than one recurring period. Examples The following is an example of an absolute time range beginning at 8:00 a.m. on January 1, 2006. Because no end time and date are specified, the time range is in effect indefinitely. hostname(config)# time-range for2006 hostname(config-ti...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
40
History for Objects Description Platform Feature Name Releases Object groups simplify ACL creation and maintenance. We introduced or modified the following commands: object-group protocol, object-group network, object-group service, object-group icmp_type. Object groups 7.0(1) Regular expressions and policy maps were i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
41
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 20 Access Control History for Objects
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
42
CHAPTER 3 Access Control Lists Access control lists (ACLs) are used by many different features. When applied to interfaces or globally as access rules, they permit or deny traffic that flows through the appliance. For other features, the ACL selects the traffic to which the feature will apply, performing a matching ser...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
43
• Standard ACLs—Standard ACLs identify traffic by destination address only. There are few features that use them: route maps and VPN filters. Because VPN filters also allow extended accesslists, limitstandard ACL use to route maps. See Configure Standard ACLs, on page 34. The following table lists some common uses for ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
44
Develop a naming convention that will help you identify the intended purpose of the ACL. For example, ASDM uses the convention interface-name_purpose_direction, such as “outside_access_in”, for an ACL applied to the “outside” interface in the inbound direction. Traditionally, ACL IDs were numbers. Standard ACLs were in...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
45
For EtherType ACLs, the implicit deny at the end of the ACL does not affect IP traffic or ARPs; for example, if you allow EtherType 8037, the implicit deny at the end of the ACL does not now block any IP traffic that you previously allowed with an extended ACL (or implicitly allowed from a high security interface to a ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
46
Time-Based ACEs You can apply time range objects to extended and webtype ACEs so that the rules are active for specific time periods only. These types of rules let you differentiate between activity that is acceptable at certain times of the day but that is unacceptable at other times. For example, you could provide ad...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
47
Additional Guidelines • When you specify a network mask, the method is different from the Cisco IOS software access-list command. The ASA uses a network mask (for example, 255.255.255.0 for a Class C mask). The Cisco IOS mask uses wildcard bits (for example, 0.0.0.255). • Normally, you cannot reference an object or obj...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
48
Add an ACE The command for adding an ACE is access-list name [line line-num] type parameters. The line number argument works for extended ACLs only. If you include the line number, the ACE is inserted at that location in the ACL, and the ACE that was at that location is moved down, along with the remainder of the ACEs ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
49
extended ACLs is as access groups applied globally or to interfaces, which determine the traffic that will be denied or permitted to flow through the box. But extended ACLs are also used to determine the traffic to which other services will be provided. Because extended ACLs are complex, the following sectionsfocus on ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
50
• host ip_address—Specifies an IPv4 host address. • ip_address mask—Specifies an IPv4 network address and subnet mask, such as 10.100.10.0 255.255.255.0. • ipv6-address/prefix-length—Specifies an IPv6 host or network address and prefix. • any, any4, and any6—any specifies both IPv4 and IPv6 traffic; any4 specifies IPv4...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
51
Example: hostname(config)# access-list ACL_IN extended deny tcp any host 209.165.201.29 eq www The port_argument option specifies the source or destination port. If you do not specify ports, all ports are matched. Available arguments include: • operator port—The port can be the integer or name of a port. The operator c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
52
hostname(config)# access-list abc extended permit icmp any any object-group obj_icmp_1 hostname(config)# access-list abc extended permit icmp any any echo The icmp_argument option specifies the ICMP type and code. • icmp_type [icmp_code]—Specifies the ICMP type by name or number, and the optional ICMP code for that typ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
53
• user-group [domain_nickname\\]user_group_name—Specifies a user group name. Note the double \\ separating the domain and group name. For an explanation of the other keywords,see Add an Extended ACE for IP Address orFully-Qualified Domain Name-Based Matching, on page 28. Tip You can include both user and Cisco Trustsec...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
54
hostname(config)# access-list ACL_IN extended permit ip any any The following ACL prevents hosts on 192.168.1.0/24 from accessing the 209.165.201.0/27 network for TCP-based traffic. All other addresses are permitted. hostname(config)# access-list ACL_IN extended deny tcp 192.168.1.0 255.255.255.0 209.165.201.0 255.255....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
55
Example of Converting Addresses to Objects for Extended ACLs The following normal ACL that does not use object groups restricts several hosts on the inside network from accessing several web servers. All other traffic is allowed. hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.29 e...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
56
The options are: • Name—The access_list_name argument specifies the name of number of an ACL. Traditional numbers for standard ACLs are 1-99 or 1300-1999, but you can use any name or number. You create a new ACL if the ACL does not already exist, otherwise, you are adding the entry to the end of the ACL. • Permit or De...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
57
• You can use these protocols: cifs://, citrix://, citrixs://, ftp://, http://, https://, imap4://, nfs://, pop3://, smart-tunnel://, and smtp://. You can also use wildcards in the protocol; for example, htt* matches http and https, and an asterisk * matches all protocols. For example, *://*.example.com matches any typ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
58
• Destination Address—The dest_address_argument specifies the IP address to which the packet is being sent: • host ip_address—Specifies an IPv4 host address. • dest_ip_address mask—Specifies an IPv4 network address and subnet mask, such as 10.100.10.0 255.255.255.0. • ipv6-address/prefix-length—Specifies an IPv6 host o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
59
access-list test webtype permit url *://ww?.e*co*/ • The following example matches URLs such as http://www.cisco.com:80 and https://www.cisco.com:81: access-list test webtype permit url *://ww?.c*co*:8[01]/ The range operator “[]” in the preceding example specifies that either character 0 or 1 can occur at that locatio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
60
access-list access_list_name ethertype {deny | permit} {any | bpdu | dsap hex_address | ipx | isis | mpls-multicast | mpls-unicast | hex_number} Example: hostname(config)# access-list ETHER ethertype deny mpls-multicast The options are: • access_list_name—The name of the new or existing ACL. If the ACL already exists, ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
61
hostname(config)# access-list nonIP ethertype deny 1256 hostname(config)# access-list nonIP ethertype permit any hostname(config)# access-group nonIP in interface inside hostname(config)# access-group nonIP in interface outside Edit ACLs in an Isolated Configuration Session When you edit an ACL used for access rules or...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
62
If you cannot open an existing session because someone else is editing it, you can clear the flag that indicates the session is being edited. Do this only if you are certain the session is not actually being edited. Use the clear session session_name access command to reset the flag. Step 2 (Uncommitted sessions only.)...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
63
History for ACLs Feature Name Releases Description ACLs are used to control network access or to specify traffic for many features to act upon. An extended access control list is used for through-the-box access control and several other features. Standard ACLs are used in route maps and VPN filters. Webtype ACLs are us...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
64
Feature Name Releases Description ICMP traffic can now be permitted/denied based on ICMP code. We introduced or modified the following commands: access-list extended , service-object, service. Extended ACL and object enhancement 9.0(1) to filter ICMP traffic by ICMP code You can now edit ACLs and objectsin an isolated ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
65
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 44 Access Control History for ACLs
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
66
CHAPTER 4 Access Rules This chapter describes how to control network access through or to the ASA using access rules. You use access rules to control network access in both routed and transparent firewall modes. In transparent mode, you can use both access rules (for Layer 3 traffic) and EtherType rules (for Layer 2 tr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
67
access for non-IP traffic. An EtherType rule permits or denies traffic based on the EtherType. You can also apply extended access rules to bridge group member interfaces to control Layer 3+ traffic. General Information About Rules The following topics provide general information about access rules and EtherType rules. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
68
Figure 2: Outbound ACL See the following commands for this example: hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.1.14 host 209.165.200.225 eq www hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.2.67 host 209.165.200.225 eq www hostname(config)# access-list OUTSIDE extended per...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
69
• ARPs in both directions. (You can control ARP traffic using ARP inspection, but you cannot control it by access rule.) • BPDUs in both directions. For other traffic, you need to use either an extended accessrule (IPv4 and IPv6) or an EtherType rule (non-IP). Implicit Deny ACLs have an implicit deny at the end of the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
70
• Connections with the same ingress and egress interfaces are subject to the same-security-traffic intra-interface check. To allow these connections, enter the same-security-traffic permit intra-interface command. To allow these connections, choose Configuration > Device Setup > Interface Settings > Interfaces, then se...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
71
Traffic Type Protocol or Port Notes RIP (v1 or v2) UDP port 520 — Management Access Rules You can configure access rules that control management traffic destined to the ASA. Access control rules for to-the-box management traffic (defined by such commands as http, ssh, or telnet) have higher precedence than a management...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
72
Allowing MPLS If you allow MPLS, ensure that Label Distribution Protocol and Tag Distribution Protocol TCP connections are established through the ASA by configuring both MPLSrouters connected to the ASA to use the IPaddress on the ASA interface asthe router-id for LDPor TDPsessions. (LDPand TDPallow MPLSroutersto nego...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
73
For each connection, both the source and destination IP addresses are matched against network objects. If the number of objects matched by the source address times the number matched by the destination address exceeds 10,000, the connection is dropped. This check is to prevent performance degradation. Configure your ru...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
74
interface ACL denies all traffic from 10.0.0.0, but the dynamic ACL permits all traffic from 10.0.0.0, then the dynamic ACL overrides the interface ACL for that user. By default, VPN remote access traffic is not matched against interface ACLs. However, if you use the no sysopt connection permit-vpn command to turn off ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
75
Procedure Step 1 Create rules for ICMP traffic. icmp {permit | deny} {host ip_address | ip_address mask | any} [icmp_type] interface_name If you do not specify an icmp_type, the rule applies to all types. You can enter the number or the name. To control ping, specify echo-reply (0) (ASA-to-host) or echo (8) (host-to-AS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
76
The following example shows how to deny all ping requests and permit all packet-too-big messages (to support path MTU discovery) at the outside interface: hostname(config)# ipv6 icmp deny any echo-reply outside hostname(config)# ipv6 icmp permit any packet-too-big outside The following example shows how to permit host ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
77
Permitted packets that belong to established connections do not need to be checked against ACLs; only the initial packet is logged and included in the hit count. For connectionless protocols, such as ICMP, all packets are logged, even if they are permitted, and all denied packets are logged. See the syslog messages gui...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
78
hostname (config-service)# service-object tcp source range 2000 3000 hostname (config-service)# service-object tcp source range 3000 3010 destinatio$ hostname (config-service)# service-object ipsec hostname (config-service)# service-object udp destination range 1002 1006 hostname (config-service)# service-object icmp e...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
79
Feature Name Platform Releases Description In transparent firewall mode, the ASA can now passIS-IStraffic using an EtherType ACL. We modified the following command: access-list ethertype {permit | deny} isis. EtherType ACL support for IS-IStraffic 8.4(5), 9.1(2) You can now use TrustSec security groups for the source a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
80
Feature Name Platform Releases Description You can now write Ethertype access control rules for the IEEE 802.2 Logical Link Control packet's DestinationService AccessPoint address. Because of this addition, the bpdu keyword no longer matches the intended traffic. Rewrite bpdu rules for dsap 0x42. We modified the follow...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
81
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 60 Access Control History for Access Rules
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
82
CHAPTER 5 Identity Firewall This chapter describes how to configure the ASA for the Identity Firewall. • About the Identity Firewall, on page 61 • Guidelines for the Identity Firewall, on page 67 • Prerequisites for the Identity Firewall, on page 69 • Configure the Identity Firewall, on page 70 • Collect User Statistic...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
83
• Providing the ability to easily identify user activities on network resources • Simplifying user activity monitoring Architecture for Identity Firewall Deployments The IdentityFirewall integrates with Window Active Directory in conjunction with an external Active Directory (AD) Agent that provides the actual identity...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
84
Client <-> ASA: The client logs into the network through Microsoft Active Directory. The AD Server authenticates users and generates user login security logs. Alternatively, the client can log into the network through a cut-through proxy or VPN. On the ASA: 4 Administrators configure local user groups and IdentityFirew...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
85
Flexibility • The ASA can retrieve user identity and IP address mapping from the AD Agent by querying the AD Agent for each new IP address or by maintaining a local copy of the entire user identity and IP address database. • Supports host group, subnet, or IP address for the destination of a user identity policy. • Sup...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
86
Deployment Scenarios You can deploy the components of the IdentityFirewall in the following ways, depending on your environmental requirements. The following figure shows how you can deploy the components of the Identity Firewall to allow for redundancy. Scenario 1 shows a simple installation without component redundan...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
87
Figure 6: LAN -based Deployment The following figure shows a WAN-based deployment to support a remote site. The Active Directory server and the AD Agent are installed on the main site LAN. The clients are located at a remote site and connect to the Identity Firewall components over a WAN. Figure 7: WAN-based Deployment...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
88
Figure 8: WAN-based Deployment with Remote AD Agent The following figure shows an expanded remote site installation. An AD Agent and Active Directory servers are installed at the remote site. The clients accessthese componentslocally when logging into network resources located at the main site. The remote Active Direct...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
89
• When a client is determined to be inactive by the active ASA, the information is propagated to the standby ASA. User statistics are not propagated to the standby ASA. • When you have failover configured, you must configure the AD Agent to communicate with both the active and standby ASAs. See the Installation and Set...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
90
“ERROR: one update active-user-database is already in progress.” You need to wait until the previoussession is completely finished, then you can issue anotheruser-identity update active-user-database command. Another example of this behavior occurs because of packet loss from the AD Agent to the ASA. When you issue a u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
91
Note Windows 2003 R2 is not supported for the AD Agent server. • For the steps to install and configure the AD Agent, see the Installation and Setup Guide for the Active Directory Agent. • Before configuring the AD Agent in the ASA, obtain the secret key value that the AD Agent and the ASA use to communicate. This valu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
92
Before you begin • Active Directory server IP address • Distinguished Name for LDAP base DN • Distinguished Name and password for the Active Directory user that the IdentityFirewall usesto connect to the Active Directory domain controller To configure the Active Directory domain, perform the following steps: Procedure ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
93
Step 6 Specify the name of the directory object that the system should bind this as. ldap-login-dn string Example: ciscoasa(config-aaa-server-host)# ldap-login-dn SAMPLE\user1 The ASA identifies itself for authenticated binding by attaching a Login DN field to the user authentication request. The Login DN field describ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
94
Step 11 Set the amount of time before LDAP queries time out. group-search-timeout seconds Example: ciscoasa(config-aaa-server-host)# group-search-timeout 300 Configure Active Directory Agents Configure the primary and secondary AD Agents for the AD Agent Server Group. When the ASA detects that the primary AD Agent is n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
95
Example: ciscoasa(config-aaa-server-host)# key mysecret Step 5 Define the server group of the AD Agent. user-identity ad-agent aaa-server aaa_server_group_tag Example: ciscoasa(config-aaa-server-hostkey# user-identity ad-agent aaa-server adagent The firstserver defined in the aaa_server_group_tag argument isthe primary...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
96
The default domain is used for all users and user groups when a domain has not been explicitly configured for those users or groups. When a default domain is not specified, the default domain for users and groups is LOCAL. For multiple context modes, you can set a default domain name for each context, as well as within...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf