14/22 Configuring Basic Firewall Policies on Cisco ASA (CCNA Security 640-554 Exam Cram)


14.1 Key Terms

stateful filtering = More than just a simple packet filter check, stateful inspection can determine whether a network flow exists and can look at information up to the application layer. A stateful filtering firewall dynamically allows the return traffic to the user, from the server they were accessing on the other side of the firewall. This is implemented in the ASA firewall and in the Zone-Based Firewall feature on an IOS router.
security levels = Numeric levels used in the ASA to define a relationship of more secure or less secure.
SVI = Switched virtual interface, or “interface VLAN,” on a switch
Modular Policy Framework (MPF) = Modular policy framework. A newer technique using the class map and policy map framework to bring about all sorts of manipulations or additional functions to a router. This is what the ASA refers to when using class maps, policy maps, and the service policy commands. On an IOS router, these are referred to as C3PL components.
class map = The portion of modular policy framework (MPF) in the ASA, or C3PL on routers and switches, that defines what types of traffic belong to a certain class. Policy maps rely on class maps for the classification of traffic.
policy map = The portion of MPF or C3PL that defines what actions occur to traffic belonging to each class.
service policy = Just like in MQC for quality of service (QoS), this is the device that ties a policy to an interface (QoS) or to a zone pair (ZBF). On an ASA, this is the command element that links a policy to one or more interfaces.

14.2 Things to Remember

14.2.1 ASA Models

Model > Description
ASA 5505 > This is the entry-level device. It is relatively small compared to the other appliances, and is not large enough (that is, not wide enough) to be rack mounted in a 19-inch-wide rack. It comes with a built-in switch that has 8 ports, and 2 of those provide support for Power over Ethernet. By default, all the interfaces on the switch port belong to VLAN 1, and the method used to connect this device to multiple networks is to assign the switch ports to at least 2 separate VLANs and then create switched virtual interfaces (SVI), which are logical Layer 3 interfaces just like on a management interface for a switch, for each logical Layer 3 interface you want the ASA to use. This is the only ASA 55xx series appliance with a built-in switch and with this behaviour. This device has a single slot allowing the addition of a compatible module.
ASA 5510 > This firewall has 4 built-in routable interfaces, and a management Ethernet interface that can be used as a dedicated interface for management only or can be converted to be a fifth routable interface on the ASA. This firewall has an option slot that supports a compatible module, such as an intrusion prevention system (IPS) module, which is like having an IPS appliance (if installed) that lives inside the ASA.
ASA 5520, 5540, 5550 > These firewalls are like the 5510, with the exception that they have more capacity.
ASA 5585 > High-performance, high-capacity firewall devices that support multiple add-ons – such as modules compatible with these appliances. These appliances take a more vertical space in a rack compared the 5510 to 5550.
Firewall Services Module (FWSM) and the ASA Services Module > These are blade firewalls that fit into a compatible switch, such as a 6500. They support many of the same features of the standalone ASA appliances in the 55xx family.

14.3 Command References

Command > Description
nameif bubba > Assign a name bubba to a Layer 3 interface, done from interface configuration mode
security-level 50 > Assign a security level to an interface, done from interface configuration mode
no shutdown > Bring an interface up out of shutdown mode

14.4 Command Examples

Initial Boot of the 5505 ASA
Running the Initial Setup Script on the ASA
Issuing an ICMP Echo Request (Ping) from the ASA
KI-ASA# ping 192.168.1.100

Implementing Additional Firewall Interfaces
KI-ASA (config)# configure terminal
KI-ASA (config)#
KI-ASA (config)# interface Vlan1
KI-ASA (config-if)# no shutdown
KI-ASA (config-if)# description connect to the dmz
KI-ASA (config-if)# nameif dmz
KI-ASA (config-if)# security-level 50
KI-ASA (config-if)# ip address 192.168.1.254 255.255.255.0
KI-ASA (config-if)# exit
KI-ASA (config)# interface Vlan2
KI-ASA (config-if)# no shutdown
KI-ASA (config-if)# description connects to my private network
KI-ASA (config-if)# nameif inside
KI-ASA (config-if)# security-level 100
KI-ASA (config-if)# ip address 10.0.0.1 255.255.255.0
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Vlan4
KI-ASA (config-if)# no shutdown
KI-ASA (config-if)# description connects to the internet
KI-ASA (config-if)# no forward interface Vlan2
KI-ASA (config-if)# nameif outside
KI-ASA (config-if)# security-level 0
KI-ASA (config-if)# ip address 23.1.2.3 255.255.255.240
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/1
KI-ASA (config-if)# switchport access vlan 4
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/2
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/3
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/4
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/5
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/6
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# interface Ethernet0/7
KI-ASA (config-if)# switchport access vlan 2
KI-ASA (config-if)# exit
KI-ASA (config)#
KI-ASA (config)# show run interface

Configuring the ASA as a DHCP Server for Inside Clients
KI-ASA (config)# dhcpd address 10.0.0.101-10.0.0.132 inside
KI-ASA (config)# dhcpd enable inside
KI-ASA (config)# dhcpd dns 8.8.8.8 interface inside
KI-ASA (config)# dhcpd domain iins.com interface inside

CLI Equivalent for Adding a Static Route
KI-ASA (config)# route outside 0.0.0.0 0.0.0.0 23.1.2.7

CLI Equivalent for Implementing Dynamic PAT
KI-ASA (config)# object network Inside_Hosts
KI-ASA (config-network-object)# subnet 10.0.0.0 255.255.255.0
KI-ASA (config-network-object)# description Inside_Hosts
KI-ASA (config-network-object)# exit
KI-ASA (config)# nat (inside,outside) 1 source dynamic Inside_Hosts interface

Creating and Applying an ACL at the CLI
KI-ASA (config)# access-list inside_access_in deny tcp any any eq telnet
KI-ASA (config)# access-list inside_access_in permit ip any any
KI-ASA (config)# access-group inside_access_in in interface inside

Using the Packet Tracer Utility at the CLI
KI-ASA# packet-tracer input inside tcp 10.0.0.101 1065 22.33.44.55 80

Comments