Cisco Systems ASA 5580, ASA 5505, ASA 5545-X, ASA 5555-X manual AAA Prompts and Identity Firewall

Page 244

Chapter 8 Configuring AAA Rules for Network Access

Configuring Authentication for Network Access

Note If you use HTTP authentication, by default the username and password are sent from the client to the ASA in clear text; in addition, the username and password are sent on to the destination web server as well. See the “Enabling Secure Authentication of Web Clients” section on page 8-8for information to secure your credentials.

For FTP, a user has the option of entering the ASA username followed by an at sign (@) and then the FTP username (name1@name2). For the password, the user enters the ASA password followed by an at sign (@) and then the FTP password (password1@password2). For example, enter the following text:

name> name1@name2

password> password1@password2

This feature is useful when you have cascaded firewalls that require multiple logins. You can separate several names and passwords by multiple at signs (@).

AAA Prompts and Identity Firewall

In an enterprise, some users log into the network by using other authentication mechanisms, such as authenticating with a web portal (cut-through proxy). For example, users with a Mac and Linux client might log into a web portal (cut-through proxy). Therefore, you must configure the identity firewall to allow these types of authentication in connection with identity-based access policies.

Figure 8-1shows a deployment to support a cut-through proxy authentication captive portal. Active Directory servers and the AD Agent are installed on the main site LAN. However, the identity firewall is configured to support authentication of clients that are not part of the Active Directory domain.

Figure 8-1 Deployment Supporting Cut-through Proxy Authentication

Windows Clients

(Domain Members)

WAN / LAN

HTTP/HTTPS

Non-domain Member

Clients

Inside Enterprise

ASA

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RADIU

S

 

 

 

 

 

 

 

 

 

 

 

LDAP

mktg.sample.com

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.1.1.2

 

 

 

AD

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Agent

 

 

 

WMI

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

AD Agent

 

 

 

 

 

 

AD Servers

 

 

 

 

 

 

 

 

 

 

 

 

 

334548

The ASA designates users logging in through a web portal (cut-through proxy) as belonging to the Active Directory domain with which they authenticated.

The ASA reports users logging in through a web portal (cut-through proxy) to the AD Agent, which distributes the user information to all registered ASA devices. In this case, the identity firewall can associate the users with their Active Directory domain. Specifically, the user identity-IP address mappings of authenticated users are forwarded to all ASA contexts that contain the input interface where packets are received and authenticated.

Users can log in by using HTTP/HTTPS, FTP, Telnet, or SSH. When users log in with these authentication methods, the following guidelines apply:

For HTTP/HTTPS traffic, an authentication window appears for unauthenticated users.

Cisco ASA Series Firewall ASDM Configuration Guide

8-4

Image 244
Contents Cisco ASA Series Firewall Asdm Configuration Guide Software VersionCisco ASA Series Firewall Asdm Configuration Guide N T E N T S NAT for VPN Guidelines and Limitations Default Settings NAT and Same Security Level Interfaces Configuring Access Rules Getting Started with Application Layer Protocol Inspection Select IM Map Add/Edit H.323 Match Criterion SIP Class Map Select Radius Accounting Map Cisco Unified Communications Manager Prerequisites ACL Rules Configuring the TLS Proxy for Encrypted Voice Inspection Creating the TLS Proxy TCP Intercept and Limiting Embryonic Connections Blocks Monitoring Cloud Web Security Related Documents IP Audit Policy Licensing Requirements for the ASA CX Module Operating Modes Management Access Host/Networks Document Objectives About This GuideRelated Documentation Convention Indication ConventionsBold font Configuring Service Policies Page Information About Service Policies Configuring a Service PolicySupported Features Feature Directionality Feature Traffic? SeeFor Through Accounting onlyFeature Feature Matching Within a Service PolicyGlobal Direction Order in Which Multiple Feature Actions are Applied ASA IPS ASA CXIncompatibility of Certain Feature Actions Licensing Requirements for Service PoliciesFeature Matching for Multiple Service Policies Guidelines and Limitations Default Settings Default ConfigurationTask Flows for Configuring Service Policies Adding a Service Policy Rule for Through TrafficDefault Traffic Classes Task Flow for Configuring a Service Policy RuleCisco ASA Series Firewall Asdm Configuration Guide Click Next Click Match or Do Not Match Cisco ASA Series Firewall Asdm Configuration Guide Adding a Service Policy Rule for Management Traffic Configuring a Service Policy Rule for Management TrafficClick Match or Do Not Match Managing the Order of Service Policy Rules Moving an ACE Feature History for Service Policies Feature Name Releases Feature InformationIntroduced class-map type management, and inspect Radius-accountingPage Information About Inspection Policy Maps Default Inspection Policy Maps Choose Configuration Firewall Objects Inspect Maps Choose Configuration Firewall Objects Class MapsDefining Actions in an Inspection Policy Map Identifying Traffic in an Inspection Class MapWhere to Go Next Feature History for Inspection Policy MapsConfiguring Network Address Translation Page Why Use NAT? Information About NAT ASA 8.3 and LaterNAT Terminology NAT Types NAT Types OverviewStatic NAT Information About Static NATInformation About Static NAT with Port Translation Information About Static NAT with Port Address TranslationStatic NAT with Identity Port Translation Information About One-to-Many Static NAT Static Interface NAT with Port TranslationInformation About Other Mapping Scenarios Not Recommended Dynamic NAT 6shows a typical few-to-many static NAT scenarioInformation About Dynamic NAT 209.165.201.10Dynamic NAT Disadvantages and Advantages Dynamic PATInformation About Dynamic PAT Per-Session PAT vs. Multi-Session PAT Version 9.01 and Later Dynamic PAT Disadvantages and AdvantagesNAT in Routed and Transparent Mode Identity NATNAT in Routed Mode NAT in Transparent Mode13 NAT Example Transparent Mode How NAT is Implemented NAT and IPv6Main Differences Between Network Object NAT and Twice NAT Information About Network Object NAT Information About Twice NAT14 Twice NAT with Different Destination Addresses 15 Twice NAT with Different Destination Ports 16 Twice Static NAT with Destination Address Translation NAT Rule Order Rule Type Order of Rules within the SectionNAT Interfaces 10.1.2.0Routing NAT Packets Mapped Addresses and Routing18 Proxy ARP Problems with Identity NAT Transparent Mode Routing Requirements for Remote Networks Determining the Egress InterfaceNAT and Remote Access VPN NAT for VPNSrc 203.0.113.16070 4. Http request to NAT and Site-to-Site VPN DstSee the following sample NAT configuration for ASA1 Boulder NAT and VPN Management Access Subnet 10.2.2.025 VPN Management Access Troubleshooting NAT and VPN DNS and NATEnter show nat detail and show conn all Repeat show nat detail and show conn all26 DNS Reply Modification, DNS Server on Outside 192.168.1.10 28 DNS Reply Modification, DNS Server on Host Network 2001DB8D1A5C8E1 30 PTR Modification, DNS Server on Host Network Configuring Network Object NAT ASA 8.3 and Later Information About Network Object NATLicensing Requirements for Network Object NAT Prerequisites for Network Object NATAdditional Guidelines Configuring Network Object NAT Configuring Dynamic NAT or Dynamic PAT Using a PAT PoolDetailed Steps Check the Add Automatic Translation Rules check box Configuring Network Object NAT ASA 8.3 and Later Configuring Dynamic PAT Hide Configuring Network Object NAT ASA 8.3 and Later Check the Add Automatic Translation Rules check box Configuring Static NAT or Static NAT-with-Port-Translation Add NAT to a new or existing network objectConfiguring Network Object NAT ASA 8.3 and Later Check the Add Automatic Translation Rules check box Configuring Network Object NAT ASA 8.3 and Later Configuring Identity NAT From the Type drop-down list, choose Static Configuring Network Object NAT ASA 8.3 and Later Configuring Per-Session PAT Rules DefaultsMonitoring Network Object NAT FieldsConfiguration Examples for Network Object NAT Providing Access to an Inside Web Server Static NAT Static NAT for an Inside Web ServerCisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Dynamic NAT for Inside, Static NAT for Outside Web Server Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Static NAT with One-to-Many for an Inside Load Balancer Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Static NAT-with-Port-Translation Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Create a network object for the FTP server address Cisco ASA Series Firewall Asdm Configuration Guide DNS Reply Modification Using Outside NAT Cisco ASA Series Firewall Asdm Configuration Guide 2001DB8D1A5C8E1 IPv6 Net DNS Reply Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Platform Feature Name Releases Feature Information Feature History for Network Object NATNo-proxy-arp and route-lookup keywords, to maintain This feature is not available in 8.51 or Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Page Configuring Twice NAT ASA 8.3 and Later Information About Twice NATLicensing Requirements for Twice NAT Prerequisites for Twice NATIPv6 Guidelines Configuring Twice NAT Choose Configuration Firewall NAT Rules, and then click Add Configuring Twice NAT ASA 8.3 and Later Source Destination Source Destination Configuring Twice NAT ASA 8.3 and Later Configuring Twice NAT ASA 8.3 and Later Click OK To configure dynamic PAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later Source Destination Configuring Twice NAT ASA 8.3 and Later Source Destination Configuring Twice NAT ASA 8.3 and Later To configure static NAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later Source Destination Source Destination Configuring Twice NAT ASA 8.3 and Later Configuring Twice NAT ASA 8.3 and Later To configure identity NAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later 10.1.2.2 Source Destination Configuring Twice NAT ASA 8.3 and Later Monitoring Twice NAT Configuration Examples for Twice NAT Twice NAT with Different Destination Addresses Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Click Apply Twice NAT with Different Destination Ports Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Click Apply Feature History for Twice NAT This feature is not available in 8.51 or Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Page NAT Overview Configuring NAT ASA 8.2 and EarlierIntroduction to NAT NAT Example Routed Mode NAT in Transparent Mode NAT Control 209.165.201.1NAT Control and Same Security Traffic NAT Types Dynamic NATRemote Host Attempts to Connect to the Real Address PAT Static NAT Static PATBypassing NAT When NAT Control is Enabled Policy NAT Policy NAT with Different Destination Addresses NAT and Same Security Level Interfaces 11 Policy Static NAT with Destination Address TranslationMapped Address Guidelines Order of NAT Rules Used to Match Real AddressesDNS and NAT 12 DNS Reply Modification Configuring NAT Control 13 DNS Reply Modification Using Outside NATUsing Dynamic NAT Dynamic NAT ImplementationReal Addresses and Global Pools Paired Using a Pool ID Global Pools on Different Interfaces with the Same Pool IDGlobal 1 Multiple Addresses in the Same Global Pool 16 Different NAT IDsOutside NAT 17 NAT and PAT TogetherManaging Global Pools 18 Outside NAT and Inside NAT CombinedConfiguring Dynamic NAT, PAT, or Identity NAT 19 Dynamic NAT ScenariosConfiguring NAT ASA 8.2 and Earlier Using Dynamic NAT Configuring Dynamic Policy NAT or PAT 20 Dynamic Policy NAT ScenariosConfiguring NAT ASA 8.2 and Earlier Using Dynamic NAT Using Static NAT Configuring Static NAT, PAT, or Identity NAT InsideUse IP Address Use Interface IP AddressClick OK Configuring Static Policy NAT, PAT, or Identity NAT 22 Static Policy NAT ScenariosUse IP Address Using NAT Exemption Click Action ExemptClick Action Do not exempt Configuring Access Control Page Configuring Access Rules Information About Access RulesGeneral Information About Rules Implicit PermitsUsing Remarks NAT and Access RulesRule Order Implicit DenyTransactional-Commit Model Outbound ACLAccess Rules for Returning Traffic Information About Access RulesAdditional Guidelines and Limitations Management Access Rules Information About EtherType RulesSupported EtherTypes and Other Traffic Traffic Type Protocol or PortDefault Settings Licensing Requirements for Access RulesAllowing Mpls Adding an Access Rule Configuring Access RulesChoose Configuration Firewall Access Rules Adding an EtherType Rule Transparent Mode Only Configuring Management Access Rules Advanced Access Rule Configuration PrerequisitesAccess Rule Explosion Configuring Http RedirectCheck the Enable Object Group Search Algorithm check box Edit HTTP/HTTPS Settings Configuring Transactional Commit ModelFeature History for Access Rules Platform Feature Name Releases Feature Information Page AAA Performance Configuring AAA Rules for Network AccessLicensing Requirements for AAA Rules Configuring Authentication for Network Access Information About AuthenticationOne-Time Authentication ASA Authentication PromptsDeployment Supporting Cut-through Proxy Authentication AAA Prompts and Identity FirewallAAA Rules as a Backup Authentication Method Static PAT and HttpConfiguring Network Access Authentication Authenticate Do not AuthenticateClick OK Enabling Secure Authentication of Web Clients Authenticating Directly with the ASA Authenticating Https Connections with a Virtual ServerAuthenticating Telnet Connections with a Virtual Server Configuring the Authentication Proxy Limit Choose Configuration Firewall AAA Rules, then click AdvancedConfiguring TACACS+ Authorization Configuring Authorization for Network AccessAuthorize Do not Authorize Configuring Radius Authorization About the Downloadable ACL Feature and Cisco Secure ACS Configuring Cisco Secure ACS for Downloadable ACLs Configuring Any Radius Server for Downloadable ACLs Configuring Accounting for Network Access Account Do not Account MAC Exempt No MAC Exempt Feature History for AAA Rules Information About Public Servers Configuring Public ServersLicensing Requirements for Public Servers Adding a Public Server that Enables Static NAT Adding a Public Server that Enables Static NAT with PATEditing Settings for a Public Server Feature History for Public Servers Configuring Application Inspection Page How Inspection Engines Work Getting Started with Application Layer Protocol Inspection10-1 When to Use Application Protocol Inspection 10-2Failover Guidelines 10-3323 H.225 Default Settings and NAT Limitations10-4 NetBIOS Name IP OptionsServer over IP 10-5Smtp SQL*NetSun RPC over 10-6Choose Configuration Firewall Service Policy Rules Configuring Application Layer Protocol Inspection10-7 10-8 DNS Inspection Configuring Inspection of Basic Internet Protocols11-1 Default Settings for DNS Inspection Information About DNS InspectionGeneral Information About DNS DNS Inspection ActionsChoose Configuration Firewall Objects Inspect Maps DNS 11-3Detailed Steps-Protocol Conformance 11-4Detailed Steps-Filtering 11-5Detailed Steps-Inspections 11-611-7 11-8 11-9 Header Flag 11-10Class DNS Type Field Value11-11 11-12 Resource Record 11-13Domain Name 11-1411-15 Click Configure Configuring DNS Inspection11-16 Using Strict FTP FTP InspectionFTP Inspection Overview 11-17Select FTP Map 11-18Configuration Global Objects Class Maps FTP FTP Class MapAdd/Edit FTP Traffic Class Map 11-19Add/Edit FTP Match Criterion 11-20FTP Inspect Map Configuration Global Objects Inspect Maps FTP11-21 Add/Edit FTP Policy Map Security Level File Type Filtering11-22 Add/Edit FTP Policy Map Details 11-23Add/Edit FTP Map 11-24Verifying and Monitoring FTP Inspection 11-25Http Inspection Http Inspection OverviewSelect Http Map 11-26Configuration Global Objects Class Maps Http Http Class MapAdd/Edit Http Traffic Class Map 11-27Add/Edit Http Match Criterion 11-2811-29 11-30 11-31 Http Inspect Map Configuration Global Objects Inspect Maps Http11-32 Add/Edit Http Policy Map Security Level URI Filtering11-33 Add/Edit Http Policy Map Details 11-34Add/Edit Http Map 11-3511-36 11-37 11-38 Icmp Error Inspection Icmp InspectionInstant Messaging Inspection 11-39Adding a Class Map for IM Inspection IM Inspection Overview11-40 IP Options Inspection Select IM MapIP Options Inspection Overview 11-41Configuring IP Options Inspection 11-42Select IP Options Inspect Map 11-43Add/Edit IP Options Inspect Map IP Options Inspect Map11-44 IPsec Pass Through Inspection Overview IPsec Pass Through Inspection11-45 IPsec Pass Through Inspect Map Select IPsec-Pass-Thru Map11-46 Add/Edit IPsec Pass Thru Policy Map Details Add/Edit IPsec Pass Thru Policy Map Security Level11-47 Default Settings for IPv6 Inspection Optional Configuring an IPv6 Inspection Policy MapIPv6 Inspection Information about IPv6 InspectionConfiguring IPv6 Inspection 11-49NetBIOS Inspection NetBIOS Inspection OverviewSelect Netbios Map 11-50NetBIOS Inspect Map Add/Edit NetBIOS Policy MapConfiguration Global Objects Inspect Maps NetBIOS Pptp InspectionSmtp and Esmtp Inspection Overview Smtp and Extended Smtp Inspection11-52 Select Esmtp Map 11-53Esmtp Inspect Map Configuration Global Objects Inspect Maps Esmtp11-54 Add/Edit Esmtp Policy Map Security Level Mime File Type Filtering11-55 Add/Edit Esmtp Policy Map Details 11-56Add/Edit Esmtp Inspect 11-5711-58 11-59 Tftp Inspection 11-6011-61 11-62 Configuring Inspection for Voice and Video Protocols Ctiqbe InspectionCtiqbe Inspection Overview 12-1Limitations and Restrictions Inspection12-2 How H.323 Works Inspection Overview12-3 Support in H.245 Messages 12-4Configuration Global Objects Class Maps H.323 Select H.323 MapClass Map 12-5Add/Edit H.323 Match Criterion Add/Edit H.323 Traffic Class Map12-6 Inspect Map Configuration Global Objects Inspect Maps H.32312-7 Add/Edit H.323 Policy Map Security Level Phone Number Filtering12-8 Add/Edit H.323 Policy Map Details 12-912-10 Add/Edit H.323 Map Add/Edit HSI Group12-11 Mgcp Inspection Overview Mgcp Inspection12-12 Using NAT with Mgcp 12-13Configuration Global Objects Inspect Maps Mgcp Select Mgcp MapMgcp Inspect Map 12-14Add/Edit Mgcp Policy Map Gateways and Call Agents12-15 Add/Edit Mgcp Group Rtsp Inspection12-16 Rtsp Inspection Overview Using RealPlayer12-17 Configuration Global Objects Inspect Maps Radius Restrictions and LimitationsSelect Rtsp Map Rtsp Inspect MapConfiguration Firewall Objects Class Maps Rtsp Add/Edit Rtsp Policy MapRtsp Class Map 12-19Add/Edit Rtsp Traffic Class Map SIP Inspection12-20 SIP Inspection Overview 12-21Select SIP Map SIP Instant Messaging12-22 SIP Class Map Configuration Global Objects Class Maps SIP12-23 Add/Edit SIP Match Criterion Add/Edit SIP Traffic Class Map12-24 12-25 SIP Inspect Map Configuration Global Objects Inspect Maps SIP12-26 Add/Edit SIP Policy Map Security Level 12-27Add/Edit SIP Policy Map Details 12-2812-29 Add/Edit SIP Inspect 12-3012-31 Sccp Inspection Overview Skinny Sccp Inspection12-32 Supporting Cisco IP Phones 12-33Configuration Global Objects Inspect Maps Sccp Skinny Select Sccp Skinny MapSccp Skinny Inspect Map 12-34Message ID Filtering 12-35Add/Edit Sccp Skinny Policy Map Security Level 12-36Add/Edit Sccp Skinny Policy Map Details 12-37Add/Edit Message ID Filter 12-38ILS Inspection Configuring Inspection of Database Directory Protocols13-1 SQL*Net Inspection 13-2Configuration Properties Sunrpc Server Sun RPC InspectionSun RPC Inspection Overview Sunrpc ServerAdd/Edit Sunrpc Service 13-4Configuring Inspection for Management Application Protocols Dcerpc InspectionDcerpc Overview 14-1Configuration Global Objects Inspect Maps Dcerpc Select Dcerpc MapDcerpc Inspect Map 14-2Add/Edit Dcerpc Policy Map 14-3GTP Inspection 14-4Select GTP Map GTP Inspection Overview14-5 GTP Inspect Map Configuration Global Objects Inspect Maps GTP14-6 Add/Edit GTP Policy Map Security Level Imsi Prefix Filtering14-7 Add/Edit GTP Policy Map Details 14-8Add/Edit GTP Map 14-9Radius Accounting Inspection 14-10Radius Accounting Inspection Overview Select Radius Accounting MapAdd Radius Accounting Policy Map 14-11Radius Inspect Map Host Radius Inspect Map14-12 RSH Inspection Snmp InspectionRadius Inspect Map Other 14-13Snmp Inspection Overview Select Snmp MapSnmp Inspect Map Add/Edit Snmp MapXdmcp Inspection 14-1514-16 Configuring Unified Communications Page 15-1 15-2 TLS Proxy Applications in Cisco Unified Communications 15-3Model License Requirement1 15-415-5 15-6 Using the Cisco Unified Communication Wizard 16-116-2 Licensing Requirements for the Unified Communication Wizard 16-316-4 Configuring the Private Network for the Phone Proxy 16-5Click the Generate and Export LDC Certificate button Configuring Servers for the Phone Proxy16-6 Address Default Port Description 16-716-8 Configuring the Public IP Phone Network 16-916-10 16-11 16-12 16-13 16-14 Certificate, 16-1516-16 16-17 Off-path Deployment Basic Deployment16-18 16-19 16-20 16-21 16-22 Exporting an Identity Certificate Installing a Certificate16-23 Click Install Certificate 16-24Saving the Identity Certificate Request 16-2516-26 16-27 16-28 Configuring the Cisco Phone Proxy Information About the Cisco Phone ProxyPhone Proxy Functionality 17-117-2 TCP/RTP TLS/SRTPSupported Cisco UCM and IP Phones for the Phone Proxy Cisco Unified Communications ManagerCisco Unified IP Phones 17-3Licensing Requirements for the Phone Proxy 17-417-5 Media Termination Instance Prerequisites Prerequisites for the Phone Proxy17-6 Certificates from the Cisco UCM DNS Lookup PrerequisitesCisco Unified Communications Manager Prerequisites ACL RulesNAT and PAT Prerequisites Address Port Protocol DescriptionNAT Prerequisites PAT Prerequisites7940 IP Phones Support Prerequisites for IP Phones on Multiple Interfaces17-9 Prerequisites for Rate Limiting Tftp Requests Cisco IP Communicator Prerequisites17-10 Rate Limiting Configuration Example End-User Phone ProvisioningWays to Deploy IP Phones to End Users 17-11General Guidelines and Limitations Phone Proxy Guidelines and Limitations17-12 Media Termination Address Guidelines and Limitations 17-13Task Flow for Configuring the Phone Proxy Configuring the Phone Proxy17-14 Creating the CTL File 17-15Adding or Editing a Record Entry in a CTL File 17-16Creating the Media Termination Instance 17-17Creating the Phone Proxy Instance 17-1817-19 Adding or Editing the Tftp Server for a Phone Proxy 17-20Linksys Routers Configuring Your Router17-21 Feature History for the Phone Proxy Application Start End Protocol IP Address EnabledChecked 17-2218-1 18-2 TLS Proxy Flow Cisco IP Phone Cisco ASASupported Cisco UCM and IP Phones for the TLS Proxy 18-3Licensing for the TLS Proxy 18-418-5 CTL Provider 18-6Add/Edit CTL Provider 18-7Configure TLS Proxy Pane 18-8Adding a TLS Proxy Instance Add TLS Proxy Instance Wizard Server Configuration18-9 Add TLS Proxy Instance Wizard Client Configuration 18-1018-11 Add TLS Proxy Instance Wizard Other Steps 18-12Edit TLS Proxy Instance Server Configuration 18-13Edit TLS Proxy Instance Client Configuration 18-1418-15 Add/Edit TLS Proxy TLS Proxy18-16 18-17 18-18 Cisco Mobility Advantage Proxy Functionality Configuring Cisco Mobility Advantage19-1 Mobility Advantage Proxy Deployment Scenarios 19-219-3 MMP/SSL/TLSTrust Relationships for Cisco UMA Deployments Mobility Advantage Proxy Using NAT/PAT19-4 19-5 Configuring Cisco Mobility Advantage 19-6Task Flow for Configuring Cisco Mobility Advantage Feature History for Cisco Mobility Advantage19-7 19-8 Information About Cisco Unified Presence Configuring Cisco Unified Presence20-1 20-2 Typical Cisco Unified Presence/LCS Federation Scenario20-3 SIP/TLSTrust Relationship in the Presence Federation 20-4Xmpp Federation Deployments 20-5Configuration Requirements for Xmpp Federation 20-6Licensing for Cisco Unified Presence 20-7Configuring Cisco Unified Presence Proxy for SIP Federation 20-8Feature History for Cisco Unified Presence 20-920-10 Features of Cisco Intercompany Media Engine Proxy Configuring Cisco Intercompany Media Engine Proxy21-1 How the UC-IME Works with the Pstn and the Internet 21-2Tickets and Passwords 21-321-4 Architecture Call Fallback to the Pstn21-5 Basic Deployment 21-6Off Path Deployment 21-7Licensing for Cisco Intercompany Media Engine 21-821-9 21-10 Task Flow for Configuring Cisco Intercompany Media Engine Configuring Cisco Intercompany Media Engine Proxy21-11 Configuring NAT for Cisco Intercompany Media Engine Proxy 21-12Command Purpose 21-13Configuring PAT for the Cisco UCM Server Command PurposeWhat to Do Next 21-14Address of Cisco UCM that you want to translate 21-15Creating ACLs for Cisco Intercompany Media Engine Proxy 21-16Guidelines Procedure21-17 Creating the Cisco Intercompany Media Engine Proxy 21-18See Creating the Media Termination Instance 21-19Show running-config uc-ime command 21-20Creating Trustpoints and Generating Certificates 21-21Prerequisites for Installing Certificates 21-22Certified 21-23Creating the TLS Proxy 21-2421-25 ACLs for Cisco Intercompany Media Engine Proxy 21-26Optional Configuring TLS within the Local Enterprise 21-27Commands Purpose 21-28Where proxytrustpoint for the client trust-point Where proxytrustpoint for the server trust-point21-29 Optional Configuring Off Path Signaling 21-30Engine Proxy, 21-3121-32 21-33 Show uc-ime signaling-sessions 21-34Show uc-ime media-sessions detail Show uc-ime signaling-sessions statistics21-35 Show uc-ime mapping-service-sessions Show uc-ime mapping-service-sessions statisticsShow uc-ime fallback-notification statistics 21-36Feature History for Cisco Intercompany Media Engine Proxy 21-3721-38 Configuring Connection Settings and QoS Page Information About Connection Settings Configuring Connection Settings22-1 Dead Connection Detection DCD TCP Intercept and Limiting Embryonic Connections22-2 TCP Sequence Randomization TCP NormalizationTCP State Bypass 22-3Licensing Requirements for Connection Settings 22-4TCP State Bypass Unsupported Features Maximum Concurrent and Embryonic Connection GuidelinesTCP State Bypass 22-5Configuring Connection Settings Task Flow For Configuring Connection SettingsCustomizing the TCP Normalizer with a TCP Map 22-622-7 Configuring Connection Settings 22-8Configuring Global Timeouts 22-922-10 Feature History for Connection Settings Introduced set connection advanced-optionsTcp-state-bypass 22-1122-12 Information About QoS Configuring QoS23-1 What is a Token Bucket? Supported QoS Features23-2 Information About Priority Queuing Information About Policing23-3 Information About Traffic Shaping How QoS Features Interact23-4 Licensing Requirements for QoS Dscp and DiffServ PreservationModel Guidelines 23-5Configuring QoS 23-6125 23-7Configuring the Standard Priority Queue for an Interface 23-8Click Enable priority for this flow 23-923-10 Click Enforce priority to selected shape traffic Monitoring QoS23-11 Viewing QoS Standard Priority Statistics Viewing QoS Police Statistics23-12 Viewing QoS Standard Priority Queue Statistics Viewing QoS Shaping Statistics23-13 Feature History for QoS 23-14Troubleshooting Connections and Resources Testing Your ConfigurationPinging ASA Interfaces 24-1Network Diagram with Interfaces, Routers, and Hosts 24-2Information About Ping 24-3Troubleshooting the Ping Tool Pinging From an ASA InterfacePinging to an ASA Interface Pinging Through the ASA InterfaceUsing the Ping Tool 24-5Determining Packet Routing with Traceroute Output Symbol Description24-6 Tracing Packets with Packet Tracer 24-7Monitoring Performance 24-8Blocks Monitoring System Resources24-9 Memory 24-10Monitoring Connections 24-11Monitoring Per-Process CPU Usage 24-12Configuring Advanced Network Protection Page Configuring the ASA for Cisco Cloud Web Security 25-1User Authentication and Cloud Web Security Information About Cisco Cloud Web SecurityRedirection of Web Traffic to Cloud Web Security 25-2Company Authentication Key Group Authentication Key Authentication Keys25-3 ScanCenter Policy Directory GroupsCustom Groups 25-4Cloud Web Security Actions How Groups and the Authentication Key Interoperate25-5 Failover from Primary to Backup Proxy Server Licensing Requirements for Cisco Cloud Web SecurityBypassing Scanning with Whitelists IPv4 and IPv6 SupportOptional User Authentication Prerequisites Prerequisites for Cloud Web SecurityOptional Fully Qualified Domain Name Prerequisites 25-7Configuring Cisco Cloud Web Security 25-8Choose Configuration Device Management Cloud Web Security 25-925-10 25-11 25-12 25-13 25-14 25-15 25-16 Examples 25-1725-18 Check Cloud Web Security and click Configure 25-1925-20 Tcp/http 25-2125-22 Optional Configuring Whitelisted Traffic 25-2325-24 Optional Configuring the User Identity Monitor 25-25Monitoring Cloud Web Security Configuring the Cloud Web Security Policy25-26 Feature History for Cisco Cloud Web Security Related DocumentsRelated Documents 25-2725-28 Information About the Botnet Traffic Filter Configuring the Botnet Traffic Filter26-1 Botnet Traffic Filter Address Types Botnet Traffic Filter Actions for Known AddressesBotnet Traffic Filter Databases Information About the Dynamic DatabaseInformation About the Static Database 26-326-4 How the Botnet Traffic Filter Works 26-5Prerequisites for the Botnet Traffic Filter Licensing Requirements for the Botnet Traffic Filter26-6 Task Flow for Configuring the Botnet Traffic Filter Configuring the Botnet Traffic Filter26-7 Configuring the Dynamic Database 26-8Enabling DNS Snooping Adding Entries to the Static Database26-9 26-10 Recommended Configuration 26-11Very Low Moderate High Very High Blocking Botnet Traffic Manually26-12 Searching the Dynamic Database 26-13Botnet Traffic Filter Syslog Messaging Monitoring the Botnet Traffic Filter26-14 Botnet Traffic Filter Monitor Panes 26-15Feature History for the Botnet Traffic Filter 26-16Configuring Threat Detection Information About Threat DetectionLicensing Requirements for Threat Detection 27-1Information About Basic Threat Detection Statistics Configuring Basic Threat Detection Statistics27-2 Trigger Settings Packet Drop Reason Average Rate Burst Rate Guidelines and LimitationsSecurity Context Guidelines Types of Traffic MonitoredConfiguring Basic Threat Detection Statistics Monitoring Basic Threat Detection StatisticsPath Purpose 27-4Configuring Advanced Threat Detection Statistics Feature History for Basic Threat Detection StatisticsInformation About Advanced Threat Detection Statistics 27-5Choose the Configuration Firewall Threat Detection pane Configuring Advanced Threat Detection Statistics27-6 Last 24 hour Monitoring Advanced Threat Detection Statistics27-7 Feature History for Advanced Threat Detection Statistics Configuring Scanning Threat Detection27-8 Information About Scanning Threat Detection 27-9Average Rate Burst Rate Configuring Scanning Threat Detection27-10 Feature History for Scanning Threat Detection 27-1127-12 Using Protection Tools Configuration Firewall Advanced Anti-Spoofing FieldsPreventing IP Spoofing 28-1Show Fragment Configuring the Fragment Size28-2 Configuring TCP Options 28-3TCP Reset Settings 28-4Configuring IP Audit for Basic IPS Support Add/Edit IP Audit Policy ConfigurationIP Audit Policy 28-5IP Audit Signatures IP Audit Signature ListSignature Message Number Signature Title 28-628-7 Message Number Signature Title 28-828-9 28-10 28-11 28-12 Information About Web Traffic Filtering Configuring Filtering Services29-1 Information About URL Filtering Filtering URLs and FTP Requests with an External Server29-2 Licensing Requirements for URL Filtering Guidelines and Limitations for URL FilteringIdentifying the Filtering Server 29-3Configuring Additional URL Filtering Settings 29-4Caching Server Addresses Buffering the Content Server Response29-5 Filtering Http URLs Configuring Filtering Rules29-6 29-7 29-8 29-9 29-10 Filtering the Rule Table 29-11Defining Queries Feature History for URL Filtering29-12 Configuring Modules Page Information About the ASA CX Module Configuring the ASA CX Module30-1 How the ASA CX Module Works with the ASA 30-2Monitor-Only Mode Service Policy in Monitor-Only ModeTraffic-Forwarding Interface in Monitor-Only Mode 30-3Information About ASA CX Management Initial Configuration30-4 Information About Authentication Proxy Compatibility with ASA FeaturesPolicy Configuration and Management Information About VPN and the ASA CX ModulePrerequisites Licensing Requirements for the ASA CX Module30-6 ASA Clustering Guidelines Monitor-Only Mode Guidelines30-7 Configuring the ASA CX Module Parameters DefaultTask Flow for the ASA CX Module 30-8ASA 5585-X Hardware Module Connecting the ASA CX Management Interface30-9 If you do not have an inside router If you have an inside router30-10 ASA 5512-X through ASA 5555-X Software Module 30-1130-12 Example 30-13ASA 5585-X Changing the ASA CX Management IP Address Multiple Context Mode30-14 Single Context Mode Sets the ASA CX management IP address, mask, and gatewayExample ASDM, choose Wizards Startup WizardConfiguring Basic ASA CX Settings at the ASA CX CLI 30-1630-17 Optional Configuring the Authentication Proxy Port 30-18Redirecting Traffic to the ASA CX Module Creating the ASA CX Service Policy30-19 Click the ASA CX Inspection tab 30-20Check the Enable ASA CX for this traffic flow check box 30-21Choose Tools Command Line Interface Configuring Traffic-Forwarding Interfaces Monitor-Only Mode30-22 Managing the ASA CX Module Resetting the Password30-23 Reloading or Resetting the Module 30-24Shutting Down the Module 30-2530-26 Monitoring the ASA CX Module Admin12330-27 Showing Module Status Showing Module StatisticsMonitoring Module Connections Module30-29 Ciscoasa# show asp table classify domain cxsc Input Table30-30 30-31 Ciscoasa# show asp dropTroubleshooting the ASA CX Module Problems with the Authentication ProxyCapturing Module Traffic 30-32Feature History for the ASA CX Module 30-33Capture interface asadataplane command 30-34Information About the ASA IPS Module Configuring the ASA IPS Module31-1 How the ASA IPS Module Works with the ASA 31-2Operating Modes Using Virtual Sensors ASA 5510 and Higher31-3 Information About Management Access 31-4Licensing Requirements for the ASA IPS module 31-5Vlan 31-6Task Flow for the ASA IPS Module Configuring the ASA IPS module31-7 Connecting the ASA IPS Management Interface 31-831-9 ASA 31-10Sessioning to the Module from the ASA May Be Required 31-11Configuring Basic IPS Module Network Settings ASA 5512-X through ASA 5555-X Booting the Software Module31-12 Choose Wizards Startup Wizard ASA 5510 and Higher Configuring Basic Network Settings31-13 ASDM, choose Configuration Device Setup SSC Setup ASA 5505 Configuring Basic Network Settings31-14 Configuring the Security Policy on the ASA IPS Module 31-15Click Continue 31-1631-17 Diverting Traffic to the ASA IPS module 31-18Managing the ASA IPS module 31-19Installing and Booting an Image on the Module 31-2031-21 Uninstalling a Software Module Image 31-2231-23 Monitoring the ASA IPS module 31-24Feature History for the ASA IPS module 31-2531-26 Information About the CSC SSM Configuring the ASA CSC Module32-1 ASA 32-2Determining What Traffic to Scan 32-3Common Network Configuration for CSC SSM Scanning 32-4Prerequisites for the CSC SSM Licensing Requirements for the CSC SSM32-5 Parameter Default 32-6Before Configuring the CSC SSM Configuring the CSC SSM32-7 Connecting to the CSC SSM 32-8Determining Service Policy Rule Actions for CSC Scanning 32-9CSC SSM Setup Wizard 32-10Activation/License IP Configuration32-11 Host/Notification Settings 32-12Password Management Access Host/Networks32-13 Choose Tools CSC Password Reset Restoring the Default Password32-14 CSC Setup Wizard Activation Codes Configuration Wizard Setup32-15 CSC Setup Wizard Host Configuration CSC Setup Wizard IP Configuration32-16 CSC Setup Wizard Management Access Configuration CSC Setup Wizard Password ConfigurationCSC Setup Wizard Traffic Selection for CSC Scan 32-17Specifying Traffic for CSC Scanning 32-18CSC Setup Wizard Summary 32-19Using the CSC SSM GUI Choose Configuration Trend Micro Content Security WebWeb 32-20Smtp Tab Mail32-21 File Transfer 32-22Updates 32-23Choose Monitoring Trend Micro Content Security Threats Monitoring the CSC SSMThreats 32-24Live Security Events Log Live Security Events32-25 Software Updates 32-26Troubleshooting the CSC Module Resource GraphsCSC Memory 32-27Recover command Installing an Image on the Module32-28 Resetting the Password 32-29Reloading or Resetting the Module Shutting Down the ModuleShuts down the module 32-30Feature History for the CSC SSM Feature Name Platform Releases Feature InformationAdditional References Related Topic Document Title32-32 D E IN-1FTP Http IN-2CSC CPU IN-3CSC SSM GUI IN-4Application inspection IN-5IPS IN-6See also class map IN-7See Icmp IN-8See QoS IN-9See PAT IN-10URL IN-11IN-12
Related manuals
Manual 712 pages 25.77 Kb Manual 52 pages 35.74 Kb

ASA Services Module, ASA 5555-X, ASA 5545-X, ASA 5585-X, ASA 5580 specifications

Cisco Systems has long been a leader in the field of network security, and its Adaptive Security Appliance (ASA) series is a testament to this expertise. Within the ASA lineup, models such as the ASA 5505, ASA 5580, ASA 5585-X, ASA 5545-X, and ASA 5555-X stand out for their unique features, capabilities, and technological advancements.

The Cisco ASA 5505 is designed for small businesses or branch offices. It provides essential security features such as firewall protection, flexible VPN capabilities, and intrusion prevention. The ASA 5505 supports a user-friendly interface, allowing for straightforward management. Its built-in threat detection and prevention tools provide a layered defense, and with scalability in mind, it can accommodate various expansion options as organizational needs grow.

Moving up the line, the ASA 5580 delivers greater throughput and advanced security features. This model is suited for medium to large enterprises that require robust protection against increasingly sophisticated threats. Its multi-core architecture allows it to manage high volumes of traffic seamlessly while maintaining excellent performance levels. The ASA 5580 also supports application-layer security and customizable access policies, making it highly adaptable to diverse security environments.

The ASA 5585-X further enhances Cisco's security offerings with advanced malware protection and extensive security intelligence capabilities. It incorporates next-generation firewall features, including context-aware security, and supports advanced threat detection technologies. This model is ideal for large enterprises or data centers that prioritize security while ensuring uninterrupted network performance and availability.

For enterprises requiring a balance of performance and security, the ASA 5545-X presents a compelling option. This model features scalable performance metrics, high availability, and integrated advanced threat protection. Coupled with advanced endpoint protection and detailed monitoring capabilities, the ASA 5545-X enables organizations to manage their security posture effectively.

Lastly, the ASA 5555-X blends cutting-edge technologies with strong security infrastructures. It boasts high throughput and the ability to execute deep packet inspections. Its sophisticated architecture supports threat intelligence feeds that provide real-time security updates, making it a powerful tool against modern threats.

Each of these Cisco ASA models brings specific advantages to varied environments. Their integrative capabilities enable businesses to enhance their security postures while benefiting from seamless scalability and management. As cybersecurity threats evolve, these advanced appliances play a vital role in protecting valuable digital assets.