index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
1,523 | Literal TCP or UDP? Value Description
Remote Authentication Dial-In User Service
(accounting)
radius-acct UDP 1646
rip UDP 520 Routing Information Protocol
rsh TCP 514 Remote Shell
rtsp TCP 554 Real Time Streaming Protocol
secureid-udp UDP 5510 SecureID over UDP
sip TCP, UDP 5060 Session Initiation Protocol
smtp TCP 25... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,524 | Local Ports and Protocols
The following table lists the protocols, TCP ports, and UDP ports that the ASA may open to process traffic
destined to the ASA. Unless you enable the features and services listed in this table, the ASA does not open
any local protocols or any TCP or UDP ports. You must configure a feature or s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,525 | Feature or Service Protocol Port Number Comments
Telnet TCP 23 —
VPN Load Balancing UDP 9023 Configurable.
VPN Individual User UDP 1645, 1646 Port accessible only over VPN tunnel.
Authentication Proxy
ICMP Types
The following table lists the ICMP type numbers and names that you can enter in ASA commands.
Table 90: ICMP... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
0 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
2 | CONTENTS
PREF ACE About This Guide xix
Document Objectives xix
Related Documentation xix
Document Conventions xix
Communications, Services, and Additional Information xxi
CHAPTER 1 Introduction to Cisco ASA Firewall Services 1
How to Implement Firewall Services 1
Basic Access Control 2
Application Filtering 2
URL Filte... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
3 | Configure a Service Group 13
Configure Local User Groups 15
Configure Security Group Object Groups 16
Configure Time Ranges 17
Monitoring Objects 18
History for Objects 19
CHAPTER 3 Access Control Lists 21
About ACLs 21
ACL Types 21
ACL Names 22
Access Control Entry Order 23
Permit/Deny vs. Match/Do Not Match 23
Access... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
4 | Examples for EtherType ACLs 39
Edit ACLs in an Isolated Configuration Session 40
Monitoring ACLs 41
History for ACLs 42
CHAPTER 4 Access Rules 45
Controlling Network Access 45
General Information About Rules 46
Interface Access Rules and Global Access Rules 46
Inbound and Outbound Rules 46
Rule Order 47
Implicit Permit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
5 | About the Identity Firewall 61
Architecture for Identity Firewall Deployments 62
Features of the Identity Firewall 63
Deployment Scenarios 65
Guidelines for the Identity Firewall 67
Prerequisites for the Identity Firewall 69
Configure the Identity Firewall 70
Configure the Active Directory Domain 70
Configure Active Di... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
6 | Configure the AAA Server for Cisco TrustSec Integration 96
Import a PAC File 98
Configure the Security Exchange Protocol 99
Add an SXP Connection Peer 101
Refresh Environment Data 102
Configure the Security Policy 103
Configure Layer 2 Security Group Tagging Imposition 104
Usage Scenarios 105
Configure a Security Group... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
7 | Access the ASA FirePOWER CLI 124
Configure ASA FirePOWER Basic Settings 124
Configure the ASA FirePOWER Module for ASDM Management 126
Configure the ASA FirePOWER Module 128
Configure the Security Policy on the ASA FirePOWER Module 128
Redirect Traffic to the ASA FirePOWER Module 128
Configure Inline or Inline Tap Moni... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
8 | Network Object NAT 151
Twice NAT 151
Comparing Network Object NAT and Twice NAT 152
NAT Rule Order 152
NAT Interfaces 154
Guidelines for NAT 154
Firewall Mode Guidelines for NAT 155
IPv6 NAT Guidelines 155
IPv6 NAT Best Practices 155
Additional Guidelines for NAT 156
Network Object NAT Guidelines for Mapped Address Obj... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
9 | Configure Identity Network Object NAT 188
Configure Identity Twice NAT 190
Monitoring NAT 192
History for NAT 193
CHAPTER 9 NAT Examples and Reference 197
Examples for Network Object NAT 197
Providing Access to an Inside Web Server (Static NAT) 197
NAT for Inside Hosts (Dynamic NAT) and NAT for an Outside Web Server (S... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
10 | NAT66 Example, Static Translation between Networks 221
NAT66 Example, Simple IPv6 Interface PAT 222
Rewriting DNS Queries and Responses Using NAT 223
DNS Reply Modification, DNS Server on Outside 223
DNS Reply Modification, DNS Server, Host, and Server on Separate Networks 225
DNS Reply Modification, DNS Server on Host... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
11 | Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers 250
Applying Inspection to HTTP Traffic with NAT 251
History for Service Policies 251
CHAPTER 1 1 Getting Started with Application Layer Protocol Inspection 253
Application Layer Protocol Inspection 253
When to Use Application Protocol Inspec... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
12 | HTTP Inspection Overview 286
Configure an HTTP Inspection Policy Map 286
ICMP Inspection 290
ICMP Error Inspection 290
ILS Inspection 291
Instant Messaging Inspection 291
IP Options Inspection 294
Defaults for IP Options Inspection 294
Configure an IP Options Inspection Policy Map 295
IPsec Pass Through Inspection 296
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
13 | Limitations for CTIQBE Inspection 311
H.323 Inspection 312
H.323 Inspection Overview 312
How H.323 Works 312
H.239 Support in H.245 Messages 313
Limitations for H.323 Inspection 314
Configure H.323 Inspection Policy Map 314
MGCP Inspection 317
MGCP Inspection Overview 317
Configure an MGCP Inspection Policy Map 318
RTS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
14 | SCTP Stateful Inspection 337
SCTP Access Control 337
SCTP NAT 337
SCTP Application Layer Inspection 337
Diameter Inspection 338
M3UA Inspection 338
M3UA Protocol Conformance 339
M3UA Inspection Limitations 339
RADIUS Accounting Inspection Overview 339
Licensing for Mobile Network Protocol Inspection 340
Defaults for GT... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
15 | CHAPTER 1 5 Connection Settings 377
What Are Connection Settings? 377
Configure Connection Settings 378
Configure Global Timeouts 379
Protect Servers from a SYN Flood DoS Attack (TCP Intercept) 380
Customize Abnormal TCP Packet Handling (TCP Maps, TCP Normalizer) 383
Bypass TCP State Checks for Asynchronous Routing (TC... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
16 | Monitor QoS 411
QoS Police Statistics 411
QoS Priority Statistics 412
QoS Priority Queue Statistics 412
Configuration Examples for Priority Queuing and Policing 413
Class Map Examples for VPN Traffic 413
Priority and Policing Example 414
History for QoS 415
CHAPTER 1 7 Threat Detection 417
Detecting Threats 417
Basic T... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
17 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
xviii
Contents | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
18 | About This Guide
The following topics explain how to use this guide.
• Document Objectives, on page xix
• Related Documentation, on page xix
• Document Conventions, on page xix
• Communications, Services, and Additional Information, on page xxi
Document Objectives
The purpose of this guide is to help you configure the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
19 | Convention Indication
Variables, for which you supply values, are presented in an italic typeface.
Italic type is also used for document titles, and for general emphasis.
italic
Terminalsessions and information that the system displays appear in monospace
type.
monospace
Required alternative keywords are grouped in bra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
20 | Communications, Services, and Additional Information
• To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
• To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
• To submit a service request, visit Cisco Support.
• To discover and brow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
21 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
xxii
About This Guide
Communications, Services, and Additional Information | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
22 | CHAPTER 1
Introduction to Cisco ASA Firewall Services
Firewall services are those ASA features that are focused on controlling access to the network, including
services that block traffic and services that enable traffic flow between internal and external networks. These
services include those that protect the network ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
23 | Step 6 Implement application inspection if the default settings are insufficient for your network. See Application
Inspection, on page 4.
Basic Access Control
Accessrules, applied per interface or globally, are your first line of defense. You can drop, upon entry,specific
types of traffic, or traffic from (or to) speci... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
24 | The purpose of URL filtering is primarily to completely block or allow access to a web site. Although you
can target individual pages, you typically specify a host name (such as www.example.com) or a URL category,
which defines a list of host names that provide a particular type of service (such as Gambling).
When tryi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
25 | in the internal private network into legal, routable addresses that can be used on the public Internet. In this
way, NAT conserves public addresses because you can advertise at a minimum only one public address for
the entire network to the outside world.
Other functions of NAT include:
• Security—Keeping internal IP a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
26 | Use Case: Expose a Server to the Public
You can make certain application services on a server available to the public. For example, you could expose
a web server, so that users can connect to the web pages but not make any other connections to the server.
To expose a server to the public, you typically need to create a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
27 | hostname(config)# access-list outside_access_in line 1 extended
permit tcp any4 object myWebServ eq http
Step 4 If you do not already have an access group on the outside interface, apply it using the access-group command:
hostname(config)# access-group outside_access_in in interface outside
CLI Book 2: Cisco ASA Series... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
28 | P ART I
Access Control
• Objects for Access Control, on page 9
• Access Control Lists, on page 21
• Access Rules, on page 45
• Identity Firewall, on page 61
• ASA and Cisco TrustSec, on page 85
• ASA FirePOWER Module, on page 113 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
29 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
30 | CHAPTER 2
Objects for Access Control
Objects are reusable components for use in your configuration. You can define and use them in Cisco ASA
configurations in the place of inline IPaddresses, services, names, and so on. Objects make it easy to maintain
your configurations because you can modify an object in one place a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
31 | Configure Objects
The following sections describe how to configure objects that are primarily used on access control.
Configure Network Objects and Groups
Network objects and groups identify IP addresses or host names. Use these objects in access control lists to
simplify your rules.
Configure a Network Object
A networ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
32 | Configure a Network Object Group
Network object groups can contain multiple network objects as well as inline networks or hosts. Network
object groups can include a mix of both IPv4 and IPv6 addresses.
However, you cannot use a mixed IPv4 and IPv6 object group for NAT, or object groups that include FQDN
objects.
Proced... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
33 | Create network object groupsfor privileged usersfrom various departments by entering the following
commands:
hostname (config)# object-group network eng
hostname (config-network)# network-object host 10.1.1.5
hostname (config-network)# network-object host 10.1.1.9
hostname (config-network)# network-object host 10.1.1.8... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
34 | • service {tcp | udp | sctp} [source operator port] [destination operator port]—For TCP, UDP or SCTP.
You can optionally specify ports for the source, destination, or both. You can specify the port by name
or number. The operator can be one of the following:
• lt—less than.
• gt—greater than.
• eq—equal to.
• neq—not e... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
35 | type. If you specify a type, you can optionally specify an ICMP code for that type (1-255). If you do not
specify the code, then all codes are used.
• service-object {tcp | udp | tcp-udp | sctp} [source operator port] [destination operator port]—For
TCP, UDP, or both, or for SCTP. You can optionally specify ports for t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
36 | hostname(config-service-object-group)# service-object object HTTPS
Configure Local User Groups
You can create local user groups for use in features that support the identity firewall by including the group
in an extended ACL, which in turn can be used in an access rule, for example.
The ASA sends an LDAP query to the A... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
37 | hostname(config-user-object-group)# user EXAMPLE\admin
hostname(config-user-object-group)# user-group EXAMPLE\\managers
hostname(config-user-object-group)# group-object local-admins
Step 3 (Optional) Add a description: description string
Configure Security Group Object Groups
You can create security group object groups... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
38 | Example:
hostname(config-security-object-group)# security-group tag 1
hostname(config-security-object-group)# security-group name mgkt
hostname(config-security-object-group)# group-object local-sg
Step 3 (Optional) Add a description: description string
Configure Time Ranges
A time range object defines a specific time c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
39 | You can repeat this command to configure more than one recurring period.
Examples
The following is an example of an absolute time range beginning at 8:00 a.m. on January 1, 2006.
Because no end time and date are specified, the time range is in effect indefinitely.
hostname(config)# time-range for2006
hostname(config-ti... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
40 | History for Objects
Description
Platform
Feature Name Releases
Object groups simplify ACL creation and maintenance.
We introduced or modified the following commands: object-group
protocol, object-group network, object-group service, object-group
icmp_type.
Object groups 7.0(1)
Regular expressions and policy maps were i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
41 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
20
Access Control
History for Objects | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
42 | CHAPTER 3
Access Control Lists
Access control lists (ACLs) are used by many different features. When applied to interfaces or globally as
access rules, they permit or deny traffic that flows through the appliance. For other features, the ACL selects
the traffic to which the feature will apply, performing a matching ser... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
43 | • Standard ACLs—Standard ACLs identify traffic by destination address only. There are few features that
use them: route maps and VPN filters. Because VPN filters also allow extended accesslists, limitstandard
ACL use to route maps. See Configure Standard ACLs, on page 34.
The following table lists some common uses for ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
44 | Develop a naming convention that will help you identify the intended purpose of the ACL. For example,
ASDM uses the convention interface-name_purpose_direction, such as “outside_access_in”, for an ACL
applied to the “outside” interface in the inbound direction.
Traditionally, ACL IDs were numbers. Standard ACLs were in... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
45 | For EtherType ACLs, the implicit deny at the end of the ACL does not affect IP traffic or ARPs; for example,
if you allow EtherType 8037, the implicit deny at the end of the ACL does not now block any IP traffic that
you previously allowed with an extended ACL (or implicitly allowed from a high security interface to a ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
46 | Time-Based ACEs
You can apply time range objects to extended and webtype ACEs so that the rules are active for specific time
periods only. These types of rules let you differentiate between activity that is acceptable at certain times of
the day but that is unacceptable at other times. For example, you could provide ad... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
47 | Additional Guidelines
• When you specify a network mask, the method is different from the Cisco IOS software access-list
command. The ASA uses a network mask (for example, 255.255.255.0 for a Class C mask). The Cisco
IOS mask uses wildcard bits (for example, 0.0.0.255).
• Normally, you cannot reference an object or obj... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
48 | Add an ACE
The command for adding an ACE is access-list name [line line-num] type parameters. The line number
argument works for extended ACLs only. If you include the line number, the ACE is inserted at that
location in the ACL, and the ACE that was at that location is moved down, along with the remainder of
the ACEs ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
49 | extended ACLs is as access groups applied globally or to interfaces, which determine the traffic that will be
denied or permitted to flow through the box. But extended ACLs are also used to determine the traffic to
which other services will be provided.
Because extended ACLs are complex, the following sectionsfocus on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
50 | • host ip_address—Specifies an IPv4 host address.
• ip_address mask—Specifies an IPv4 network address and subnet mask, such as 10.100.10.0
255.255.255.0.
• ipv6-address/prefix-length—Specifies an IPv6 host or network address and prefix.
• any, any4, and any6—any specifies both IPv4 and IPv6 traffic; any4 specifies IPv4... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
51 | Example:
hostname(config)# access-list ACL_IN extended deny tcp any host 209.165.201.29 eq www
The port_argument option specifies the source or destination port. If you do not specify ports, all ports are
matched. Available arguments include:
• operator port—The port can be the integer or name of a port. The operator c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
52 | hostname(config)# access-list abc extended permit icmp any any object-group obj_icmp_1
hostname(config)# access-list abc extended permit icmp any any echo
The icmp_argument option specifies the ICMP type and code.
• icmp_type [icmp_code]—Specifies the ICMP type by name or number, and the optional ICMP code for
that typ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
53 | • user-group [domain_nickname\\]user_group_name—Specifies a user group name. Note the double \\
separating the domain and group name.
For an explanation of the other keywords,see Add an Extended ACE for IP Address orFully-Qualified Domain
Name-Based Matching, on page 28.
Tip You can include both user and Cisco Trustsec... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
54 | hostname(config)# access-list ACL_IN extended permit ip any any
The following ACL prevents hosts on 192.168.1.0/24 from accessing the 209.165.201.0/27 network for
TCP-based traffic. All other addresses are permitted.
hostname(config)# access-list ACL_IN extended deny tcp 192.168.1.0 255.255.255.0
209.165.201.0 255.255.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
55 | Example of Converting Addresses to Objects for Extended ACLs
The following normal ACL that does not use object groups restricts several hosts on the inside network from
accessing several web servers. All other traffic is allowed.
hostname(config)# access-list ACL_IN extended deny tcp host 10.1.1.4 host 209.165.201.29
e... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
56 | The options are:
• Name—The access_list_name argument specifies the name of number of an ACL. Traditional numbers
for standard ACLs are 1-99 or 1300-1999, but you can use any name or number. You create a new ACL
if the ACL does not already exist, otherwise, you are adding the entry to the end of the ACL.
• Permit or De... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
57 | • You can use these protocols: cifs://, citrix://, citrixs://, ftp://, http://, https://, imap4://, nfs://, pop3://,
smart-tunnel://, and smtp://. You can also use wildcards in the protocol; for example, htt* matches
http and https, and an asterisk * matches all protocols. For example, *://*.example.com matches
any typ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
58 | • Destination Address—The dest_address_argument specifies the IP address to which the packet is being
sent:
• host ip_address—Specifies an IPv4 host address.
• dest_ip_address mask—Specifies an IPv4 network address and subnet mask, such as 10.100.10.0
255.255.255.0.
• ipv6-address/prefix-length—Specifies an IPv6 host o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
59 | access-list test webtype permit url *://ww?.e*co*/
• The following example matches URLs such as http://www.cisco.com:80 and https://www.cisco.com:81:
access-list test webtype permit url *://ww?.c*co*:8[01]/
The range operator “[]” in the preceding example specifies that either character 0 or 1 can occur at that
locatio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
60 | access-list access_list_name ethertype {deny | permit} {any | bpdu | dsap hex_address | ipx | isis |
mpls-multicast | mpls-unicast | hex_number}
Example:
hostname(config)# access-list ETHER ethertype deny mpls-multicast
The options are:
• access_list_name—The name of the new or existing ACL. If the ACL already exists, ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
61 | hostname(config)# access-list nonIP ethertype deny 1256
hostname(config)# access-list nonIP ethertype permit any
hostname(config)# access-group nonIP in interface inside
hostname(config)# access-group nonIP in interface outside
Edit ACLs in an Isolated Configuration Session
When you edit an ACL used for access rules or... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
62 | If you cannot open an existing session because someone else is editing it, you can clear the flag that indicates
the session is being edited. Do this only if you are certain the session is not actually being edited. Use the
clear session session_name access command to reset the flag.
Step 2 (Uncommitted sessions only.)... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
63 | History for ACLs
Feature Name Releases Description
ACLs are used to control network access or to specify traffic for many
features to act upon. An extended access control list is used for
through-the-box access control and several other features. Standard
ACLs are used in route maps and VPN filters. Webtype ACLs are us... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
64 | Feature Name Releases Description
ICMP traffic can now be permitted/denied based on ICMP code.
We introduced or modified the following commands: access-list
extended , service-object, service.
Extended ACL and object enhancement 9.0(1)
to filter ICMP traffic by ICMP code
You can now edit ACLs and objectsin an isolated ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
65 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
44
Access Control
History for ACLs | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
66 | CHAPTER 4
Access Rules
This chapter describes how to control network access through or to the ASA using access rules. You use
access rules to control network access in both routed and transparent firewall modes. In transparent mode,
you can use both access rules (for Layer 3 traffic) and EtherType rules (for Layer 2 tr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
67 | access for non-IP traffic. An EtherType rule permits or denies traffic based on the EtherType. You can
also apply extended access rules to bridge group member interfaces to control Layer 3+ traffic.
General Information About Rules
The following topics provide general information about access rules and EtherType rules.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
68 | Figure 2: Outbound ACL
See the following commands for this example:
hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.1.14 host 209.165.200.225
eq www
hostname(config)# access-list OUTSIDE extended permit tcp host 10.1.2.67 host 209.165.200.225
eq www
hostname(config)# access-list OUTSIDE extended per... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
69 | • ARPs in both directions. (You can control ARP traffic using ARP inspection, but you cannot control it
by access rule.)
• BPDUs in both directions.
For other traffic, you need to use either an extended accessrule (IPv4 and IPv6) or an EtherType rule (non-IP).
Implicit Deny
ACLs have an implicit deny at the end of the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
70 | • Connections with the same ingress and egress interfaces are subject to the same-security-traffic
intra-interface check.
To allow these connections, enter the same-security-traffic permit intra-interface command.
To allow these connections, choose Configuration > Device Setup > Interface Settings > Interfaces,
then se... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
71 | Traffic Type Protocol or Port Notes
RIP (v1 or v2) UDP port 520 —
Management Access Rules
You can configure access rules that control management traffic destined to the ASA. Access control rules for
to-the-box management traffic (defined by such commands as http, ssh, or telnet) have higher precedence
than a management... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
72 | Allowing MPLS
If you allow MPLS, ensure that Label Distribution Protocol and Tag Distribution Protocol TCP connections
are established through the ASA by configuring both MPLSrouters connected to the ASA to use the IPaddress
on the ASA interface asthe router-id for LDPor TDPsessions. (LDPand TDPallow MPLSroutersto nego... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
73 | For each connection, both the source and destination IP addresses are matched against network objects.
If the number of objects matched by the source address times the number matched by the destination
address exceeds 10,000, the connection is dropped. This check is to prevent performance degradation.
Configure your ru... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
74 | interface ACL denies all traffic from 10.0.0.0, but the dynamic ACL permits all traffic from 10.0.0.0,
then the dynamic ACL overrides the interface ACL for that user.
By default, VPN remote access traffic is not matched against interface ACLs. However, if you use the
no sysopt connection permit-vpn command to turn off ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
75 | Procedure
Step 1 Create rules for ICMP traffic.
icmp {permit | deny} {host ip_address | ip_address mask | any} [icmp_type] interface_name
If you do not specify an icmp_type, the rule applies to all types. You can enter the number or the name. To
control ping, specify echo-reply (0) (ASA-to-host) or echo (8) (host-to-AS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
76 | The following example shows how to deny all ping requests and permit all packet-too-big messages
(to support path MTU discovery) at the outside interface:
hostname(config)# ipv6 icmp deny any echo-reply outside
hostname(config)# ipv6 icmp permit any packet-too-big outside
The following example shows how to permit host ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
77 | Permitted packets that belong to established connections do not need to be checked against ACLs; only the
initial packet is logged and included in the hit count. For connectionless protocols, such as ICMP, all packets
are logged, even if they are permitted, and all denied packets are logged.
See the syslog messages gui... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
78 | hostname (config-service)# service-object tcp source range 2000 3000
hostname (config-service)# service-object tcp source range 3000 3010 destinatio$
hostname (config-service)# service-object ipsec
hostname (config-service)# service-object udp destination range 1002 1006
hostname (config-service)# service-object icmp e... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
79 | Feature Name Platform Releases Description
In transparent firewall mode, the ASA can now passIS-IStraffic using
an EtherType ACL.
We modified the following command: access-list ethertype {permit
| deny} isis.
EtherType ACL support for IS-IStraffic 8.4(5), 9.1(2)
You can now use TrustSec security groups for the source a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
80 | Feature Name Platform Releases Description
You can now write Ethertype access control rules for the IEEE 802.2
Logical Link Control packet's DestinationService AccessPoint address.
Because of this addition, the bpdu keyword no longer matches the
intended traffic. Rewrite bpdu rules for dsap 0x42.
We modified the follow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
81 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
60
Access Control
History for Access Rules | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
82 | CHAPTER 5
Identity Firewall
This chapter describes how to configure the ASA for the Identity Firewall.
• About the Identity Firewall, on page 61
• Guidelines for the Identity Firewall, on page 67
• Prerequisites for the Identity Firewall, on page 69
• Configure the Identity Firewall, on page 70
• Collect User Statistic... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
83 | • Providing the ability to easily identify user activities on network resources
• Simplifying user activity monitoring
Architecture for Identity Firewall Deployments
The IdentityFirewall integrates with Window Active Directory in conjunction with an external Active Directory
(AD) Agent that provides the actual identity... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
84 | Client <-> ASA: The
client logs into the
network through
Microsoft Active
Directory. The AD Server
authenticates users and
generates user login
security logs.
Alternatively, the client
can log into the network
through a cut-through
proxy or VPN.
On the ASA: 4
Administrators configure
local user groups and
IdentityFirew... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
85 | Flexibility
• The ASA can retrieve user identity and IP address mapping from the AD Agent by querying the AD
Agent for each new IP address or by maintaining a local copy of the entire user identity and IP address
database.
• Supports host group, subnet, or IP address for the destination of a user identity policy.
• Sup... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
86 | Deployment Scenarios
You can deploy the components of the IdentityFirewall in the following ways, depending on your environmental
requirements.
The following figure shows how you can deploy the components of the Identity Firewall to allow for
redundancy. Scenario 1 shows a simple installation without component redundan... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
87 | Figure 6: LAN -based Deployment
The following figure shows a WAN-based deployment to support a remote site. The Active Directory server
and the AD Agent are installed on the main site LAN. The clients are located at a remote site and connect to
the Identity Firewall components over a WAN.
Figure 7: WAN-based Deployment... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
88 | Figure 8: WAN-based Deployment with Remote AD Agent
The following figure shows an expanded remote site installation. An AD Agent and Active Directory servers
are installed at the remote site. The clients accessthese componentslocally when logging into network resources
located at the main site. The remote Active Direct... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
89 | • When a client is determined to be inactive by the active ASA, the information is propagated to the standby
ASA. User statistics are not propagated to the standby ASA.
• When you have failover configured, you must configure the AD Agent to communicate with both the
active and standby ASAs. See the Installation and Set... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
90 | “ERROR: one update active-user-database is already in progress.”
You need to wait until the previoussession is completely finished, then you can issue anotheruser-identity
update active-user-database command.
Another example of this behavior occurs because of packet loss from the AD Agent to the ASA.
When you issue a u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
91 | Note Windows 2003 R2 is not supported for the AD Agent server.
• For the steps to install and configure the AD Agent, see the Installation and Setup Guide for the Active
Directory Agent.
• Before configuring the AD Agent in the ASA, obtain the secret key value that the AD Agent and the
ASA use to communicate. This valu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
92 | Before you begin
• Active Directory server IP address
• Distinguished Name for LDAP base DN
• Distinguished Name and password for the Active Directory user that the IdentityFirewall usesto connect
to the Active Directory domain controller
To configure the Active Directory domain, perform the following steps:
Procedure
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
93 | Step 6 Specify the name of the directory object that the system should bind this as.
ldap-login-dn string
Example:
ciscoasa(config-aaa-server-host)# ldap-login-dn SAMPLE\user1
The ASA identifies itself for authenticated binding by attaching a Login DN field to the user authentication
request. The Login DN field describ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
94 | Step 11 Set the amount of time before LDAP queries time out.
group-search-timeout seconds
Example:
ciscoasa(config-aaa-server-host)# group-search-timeout 300
Configure Active Directory Agents
Configure the primary and secondary AD Agents for the AD Agent Server Group. When the ASA detects
that the primary AD Agent is n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
95 | Example:
ciscoasa(config-aaa-server-host)# key mysecret
Step 5 Define the server group of the AD Agent.
user-identity ad-agent aaa-server aaa_server_group_tag
Example:
ciscoasa(config-aaa-server-hostkey# user-identity ad-agent aaa-server adagent
The firstserver defined in the aaa_server_group_tag argument isthe primary... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
96 | The default domain is used for all users and user groups when a domain has not been explicitly configured
for those users or groups. When a default domain is not specified, the default domain for users and groups is
LOCAL. For multiple context modes, you can set a default domain name for each context, as well as within... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.