Asa Essentials Part 1
Asa Essentials Part 1
Asa Essentials Part 1
July, 2018
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Introduction to the ASA Firewall
Technical Demo
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Adaptive Security Appliance - Cisco’s lead dedicated firewall
solution (All-in-One solution)
Firewall
VPN concentrator
IPS
• Advanced features
Virtual Firewalling
Transparent/Routed mode
High Availability
Advanced Threat Control (AIP-SSM, AIP-SSC modules)
Identity Firewall
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Also monitors the state of connections
Initiation, data transfer, termination
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
• Routed-mode
• the ASA is a layer 3 device
• all the ASA features and capabilities are active
• Transparent-mode
• the ASA is a layer 2 device(works with VLANs instead of IP Subnets)
• can have a global IP used for remote management
• is invisible to any attacker coming from the Internet
• Some functionalities are disabled: routing protocols, VPNs, QoS, DHCP
Relay.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Same modular structure as IOS
Unprivileged mode
Limited rights
Privileged mode
Generaly used for show commands
Global configuration
Used for “general” configurations (e.g password for priviledged mode, static routes,
banners, hostname configuration etc)
Configuration sub-modes
Used for advanced configurations of specific features (firewall, VPN, routing
protocols etc)
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
ciscoasa>enable 15
Password:
ciscoasa#configure terminal
ciscoasa(config)#interface fa0/1
ciscoasa(config-if)#exit
ciscoasa(config)#exit
ciscoasa#exit
ciscoasa>
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
ciscoasa > ?
address
USAGE:
enable [<priv_level>]
DESCRIPTION:
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
• First we delete…
startup-config running- config
Flash RAM
Deleting configurations
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
• Then we save!
startup-config running- config
ciscoasa# show running
ciscoasa# show startup Flash RAM
Salvarea configurației
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
• Configuring a hostname
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
• An ASA interface that has no name or security level does not
have L3 connectivity
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• Can be configured using the security-level command
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
ciscoasa(config)#interface e0/1
ciscoasa(config-if)#nameif DMZ
INFO: Security level for "DMZ" set to 0 by default.
ciscoasa(config-if)#security-level 50
ciscoasa(config-if)#ip address 192.168.2.1 255.255.255.0
ciscoasa(config-if)#no shutdown
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
• By default access is not allowed
ciscoasa# who
0: 10.10.0.132
ciscoasa# kill 0
ciscoasa# who
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
• Permitted on any interface
• Step 1: generate the keys
ciscoasa(config)# crypto key generate rsa modulus 1024
WARNING: You have a RSA keypair already defined named
<Default-RSA-Key>.
Do you really want to replace them? [yes/no]: yes
Keypair generation process begin. Please wait...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• Configuring a specific interface
asa1# show run interface E0/3
interface Ethernet0/3
speed 10
duplex full
nameif outside
security-level 0
ip address 192.168.3.1 255.255.255.0
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• All the parameters of an interface
asa1# show interface
Interface GigabitEthernet0/0 "outside", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps
Full-Duplex(Full-duplex), 100 Mbps(100 Mbps)
MAC address 0013.c482.2e4c, MTU 1500
IP address 192.168.1.2, subnet mask 255.255.255.0
8 packets input, 1078 bytes, 0 no buffer
Received 8 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 L2 decode drops
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions
0 late collisions, 0 deferred
input queue (curr/max blocks): hardware (8/0) software (0/0)
output queue (curr/max blocks): hardware (0/0) software (0/0)
Traffic Statistics for "outside":
8 packets input, 934 bytes
0 packets output, 0 bytes
8 packets dropped
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• What command did we use in IOS to see the L2 and 3 status of
interfaces in a "brief" output?
show ip interface brief
22
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
• IOS Q: can we run a show command from config mode?
A: yes, using the argument “do” in front of the command
ciscoasa(config-if)# sh clock
15:54:01.139 UTC Thu Feb 17 2011
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ASA
R1 e0/0 e0/0
R2
G0 G1
outside
inside
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24