Cisco Systems ASA Services Module, ASA 5505, ASA 5545-X manual NAT Types Overview, Static NAT

Page 53

Chapter 3 Information About NAT (ASA 8.3 and Later)

NAT Types

NAT Types

NAT Types Overview, page 3-3

Static NAT, page 3-3

Dynamic NAT, page 3-8

Dynamic PAT, page 3-10

Identity NAT, page 3-12

NAT Types Overview

You can implement NAT using the following methods:

Static NAT—A consistent mapping between a real and mapped IP address. Allows bidirectional traffic initiation. See the “Static NAT” section on page 3-3.

Dynamic NAT—A group of real IP addresses are mapped to a (usually smaller) group of mapped IP addresses, on a first come, first served basis. Only the real host can initiate traffic. See the “Dynamic NAT” section on page 3-8.

Dynamic Port Address Translation (PAT)—A group of real IP addresses are mapped to a single IP address using a unique source port of that IP address. See the “Dynamic PAT” section on page 3-10.

Identity NAT—A real address is statically translated to itself, essentially bypassing NAT. You might want to configure NAT this way when you want to translate a large group of addresses, but then want to exempt a smaller subset of addresses. See the “Identity NAT” section on page 3-12.

Static NAT

This section describes static NAT and includes the following topics:

Information About Static NAT, page 3-3

Information About Static NAT with Port Translation, page 3-4

Information About One-to-Many Static NAT, page 3-6

Information About Other Mapping Scenarios (Not Recommended), page 3-7

Information About Static NAT

Static NAT creates a fixed translation of a real address to a mapped address. Because the mapped address is the same for each consecutive connection, static NAT allows bidirectional connection initiation, both to and from the host (if an access rule exists that allows it). With dynamic NAT and PAT, on the other hand, each host uses a different address or port for each subsequent translation, so bidirectional initiation is not supported.

Cisco ASA Series Firewall ASDM Configuration Guide

3-3

Image 53
Contents Software Version Cisco ASA Series Firewall Asdm Configuration GuideCisco ASA Series Firewall Asdm Configuration Guide N T E N T S NAT for VPN Guidelines and Limitations Default Settings NAT and Same Security Level Interfaces Configuring Access Rules Getting Started with Application Layer Protocol Inspection Select IM Map Add/Edit H.323 Match Criterion SIP Class Map Select Radius Accounting Map Cisco Unified Communications Manager Prerequisites ACL Rules Configuring the TLS Proxy for Encrypted Voice Inspection Creating the TLS Proxy TCP Intercept and Limiting Embryonic Connections Blocks Monitoring Cloud Web Security Related Documents IP Audit Policy Licensing Requirements for the ASA CX Module Operating Modes Management Access Host/Networks Related Documentation About This GuideDocument Objectives Bold font ConventionsConvention Indication Configuring Service Policies Page Supported Features Configuring a Service PolicyInformation About Service Policies Feature Traffic? See Feature DirectionalityFor Through Accounting onlyGlobal Direction Feature Matching Within a Service PolicyFeature ASA IPS ASA CX Order in Which Multiple Feature Actions are AppliedFeature Matching for Multiple Service Policies Licensing Requirements for Service PoliciesIncompatibility of Certain Feature Actions Guidelines and Limitations Default Configuration Default SettingsAdding a Service Policy Rule for Through Traffic Task Flows for Configuring Service PoliciesDefault Traffic Classes Task Flow for Configuring a Service Policy RuleCisco ASA Series Firewall Asdm Configuration Guide Click Next Click Match or Do Not Match Cisco ASA Series Firewall Asdm Configuration Guide Configuring a Service Policy Rule for Management Traffic Adding a Service Policy Rule for Management TrafficClick Match or Do Not Match Managing the Order of Service Policy Rules Moving an ACE Feature Name Releases Feature Information Feature History for Service PoliciesIntroduced class-map type management, and inspect Radius-accountingPage Information About Inspection Policy Maps Default Inspection Policy Maps Choose Configuration Firewall Objects Class Maps Choose Configuration Firewall Objects Inspect MapsDefining Actions in an Inspection Policy Map Identifying Traffic in an Inspection Class MapFeature History for Inspection Policy Maps Where to Go NextConfiguring Network Address Translation Page Information About NAT ASA 8.3 and Later Why Use NAT?NAT Terminology NAT Types Overview NAT TypesStatic NAT Information About Static NATInformation About Static NAT with Port Address Translation Information About Static NAT with Port TranslationStatic NAT with Identity Port Translation Static Interface NAT with Port Translation Information About One-to-Many Static NATInformation About Other Mapping Scenarios Not Recommended 6shows a typical few-to-many static NAT scenario Dynamic NAT209.165.201.10 Information About Dynamic NATInformation About Dynamic PAT Dynamic PATDynamic NAT Disadvantages and Advantages Dynamic PAT Disadvantages and Advantages Per-Session PAT vs. Multi-Session PAT Version 9.01 and LaterIdentity NAT NAT in Routed and Transparent ModeNAT in Transparent Mode NAT in Routed Mode13 NAT Example Transparent Mode Main Differences Between Network Object NAT and Twice NAT NAT and IPv6How NAT is Implemented Information About Twice NAT Information About Network Object NAT14 Twice NAT with Different Destination Addresses 15 Twice NAT with Different Destination Ports 16 Twice Static NAT with Destination Address Translation Rule Type Order of Rules within the Section NAT Rule Order10.1.2.0 NAT InterfacesMapped Addresses and Routing Routing NAT Packets18 Proxy ARP Problems with Identity NAT Determining the Egress Interface Transparent Mode Routing Requirements for Remote NetworksNAT for VPN NAT and Remote Access VPNSrc 203.0.113.16070 4. Http request to Dst NAT and Site-to-Site VPNSee the following sample NAT configuration for ASA1 Boulder Subnet 10.2.2.0 NAT and VPN Management Access25 VPN Management Access DNS and NAT Troubleshooting NAT and VPNEnter show nat detail and show conn all Repeat show nat detail and show conn all26 DNS Reply Modification, DNS Server on Outside 192.168.1.10 28 DNS Reply Modification, DNS Server on Host Network 2001DB8D1A5C8E1 30 PTR Modification, DNS Server on Host Network Information About Network Object NAT Configuring Network Object NAT ASA 8.3 and LaterPrerequisites for Network Object NAT Licensing Requirements for Network Object NATAdditional Guidelines Configuring Dynamic NAT or Dynamic PAT Using a PAT Pool Configuring Network Object NATDetailed Steps Check the Add Automatic Translation Rules check box Configuring Network Object NAT ASA 8.3 and Later Configuring Dynamic PAT Hide Configuring Network Object NAT ASA 8.3 and Later Check the Add Automatic Translation Rules check box Add NAT to a new or existing network object Configuring Static NAT or Static NAT-with-Port-TranslationConfiguring Network Object NAT ASA 8.3 and Later Check the Add Automatic Translation Rules check box Configuring Network Object NAT ASA 8.3 and Later Configuring Identity NAT From the Type drop-down list, choose Static Configuring Network Object NAT ASA 8.3 and Later Defaults Configuring Per-Session PAT RulesFields Monitoring Network Object NATConfiguration Examples for Network Object NAT Static NAT for an Inside Web Server Providing Access to an Inside Web Server Static NATCisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Dynamic NAT for Inside, Static NAT for Outside Web Server Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Static NAT with One-to-Many for an Inside Load Balancer Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Static NAT-with-Port-Translation Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Create a network object for the FTP server address Cisco ASA Series Firewall Asdm Configuration Guide DNS Reply Modification Using Outside NAT Cisco ASA Series Firewall Asdm Configuration Guide 2001DB8D1A5C8E1 IPv6 Net DNS Reply Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide No-proxy-arp and route-lookup keywords, to maintain Feature History for Network Object NATPlatform Feature Name Releases Feature Information This feature is not available in 8.51 or Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Page Information About Twice NAT Configuring Twice NAT ASA 8.3 and LaterPrerequisites for Twice NAT Licensing Requirements for Twice NATIPv6 Guidelines Configuring Twice NAT Choose Configuration Firewall NAT Rules, and then click Add Configuring Twice NAT ASA 8.3 and Later Source Destination Source Destination Configuring Twice NAT ASA 8.3 and Later Configuring Twice NAT ASA 8.3 and Later Click OK To configure dynamic PAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later Source Destination Configuring Twice NAT ASA 8.3 and Later Source Destination Configuring Twice NAT ASA 8.3 and Later To configure static NAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later Source Destination Source Destination Configuring Twice NAT ASA 8.3 and Later Configuring Twice NAT ASA 8.3 and Later To configure identity NAT, perform the following steps Configuring Twice NAT ASA 8.3 and Later 10.1.2.2 Source Destination Configuring Twice NAT ASA 8.3 and Later Monitoring Twice NAT Configuration Examples for Twice NAT Twice NAT with Different Destination Addresses Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Click Apply Twice NAT with Different Destination Ports Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Cisco ASA Series Firewall Asdm Configuration Guide Click Apply Feature History for Twice NAT This feature is not available in 8.51 or Platform Feature Name Releases Feature Information Platform Feature Name Releases Feature Information Page Introduction to NAT Configuring NAT ASA 8.2 and EarlierNAT Overview NAT Example Routed Mode NAT in Transparent Mode 209.165.201.1 NAT ControlNAT Control and Same Security Traffic Dynamic NAT NAT TypesRemote Host Attempts to Connect to the Real Address PAT Static PAT Static NATBypassing NAT When NAT Control is Enabled Policy NAT Policy NAT with Different Destination Addresses 11 Policy Static NAT with Destination Address Translation NAT and Same Security Level InterfacesDNS and NAT Order of NAT Rules Used to Match Real AddressesMapped Address Guidelines 12 DNS Reply Modification 13 DNS Reply Modification Using Outside NAT Configuring NAT ControlDynamic NAT Implementation Using Dynamic NATGlobal Pools on Different Interfaces with the Same Pool ID Real Addresses and Global Pools Paired Using a Pool IDGlobal 1 16 Different NAT IDs Multiple Addresses in the Same Global Pool17 NAT and PAT Together Outside NAT18 Outside NAT and Inside NAT Combined Managing Global Pools19 Dynamic NAT Scenarios Configuring Dynamic NAT, PAT, or Identity NATConfiguring NAT ASA 8.2 and Earlier Using Dynamic NAT 20 Dynamic Policy NAT Scenarios Configuring Dynamic Policy NAT or PATConfiguring NAT ASA 8.2 and Earlier Using Dynamic NAT Using Static NAT Inside Configuring Static NAT, PAT, or Identity NATUse Interface IP Address Use IP AddressClick OK 22 Static Policy NAT Scenarios Configuring Static Policy NAT, PAT, or Identity NATUse IP Address Click Action Exempt Using NAT ExemptionClick Action Do not exempt Configuring Access Control Page Information About Access Rules Configuring Access RulesImplicit Permits General Information About RulesNAT and Access Rules Using RemarksRule Order Implicit DenyOutbound ACL Transactional-Commit ModelAdditional Guidelines and Limitations Information About Access RulesAccess Rules for Returning Traffic Information About EtherType Rules Management Access RulesSupported EtherTypes and Other Traffic Traffic Type Protocol or PortAllowing Mpls Licensing Requirements for Access RulesDefault Settings Choose Configuration Firewall Access Rules Configuring Access RulesAdding an Access Rule Adding an EtherType Rule Transparent Mode Only Configuring Management Access Rules Prerequisites Advanced Access Rule ConfigurationCheck the Enable Object Group Search Algorithm check box Configuring Http RedirectAccess Rule Explosion Configuring Transactional Commit Model Edit HTTP/HTTPS SettingsFeature History for Access Rules Platform Feature Name Releases Feature Information Page Licensing Requirements for AAA Rules Configuring AAA Rules for Network AccessAAA Performance Information About Authentication Configuring Authentication for Network AccessASA Authentication Prompts One-Time AuthenticationAAA Prompts and Identity Firewall Deployment Supporting Cut-through Proxy AuthenticationStatic PAT and Http AAA Rules as a Backup Authentication MethodAuthenticate Do not Authenticate Configuring Network Access AuthenticationClick OK Enabling Secure Authentication of Web Clients Authenticating Https Connections with a Virtual Server Authenticating Directly with the ASAAuthenticating Telnet Connections with a Virtual Server Choose Configuration Firewall AAA Rules, then click Advanced Configuring the Authentication Proxy LimitAuthorize Do not Authorize Configuring Authorization for Network AccessConfiguring TACACS+ Authorization Configuring Radius Authorization About the Downloadable ACL Feature and Cisco Secure ACS Configuring Cisco Secure ACS for Downloadable ACLs Configuring Any Radius Server for Downloadable ACLs Configuring Accounting for Network Access Account Do not Account MAC Exempt No MAC Exempt Feature History for AAA Rules Licensing Requirements for Public Servers Configuring Public ServersInformation About Public Servers Adding a Public Server that Enables Static NAT with PAT Adding a Public Server that Enables Static NATEditing Settings for a Public Server Feature History for Public Servers Configuring Application Inspection Page 10-1 Getting Started with Application Layer Protocol InspectionHow Inspection Engines Work 10-2 When to Use Application Protocol Inspection10-3 Failover Guidelines10-4 Default Settings and NAT Limitations323 H.225 IP Options NetBIOS NameServer over IP 10-5SQL*Net SmtpSun RPC over 10-610-7 Configuring Application Layer Protocol InspectionChoose Configuration Firewall Service Policy Rules 10-8 11-1 Configuring Inspection of Basic Internet ProtocolsDNS Inspection Information About DNS Inspection Default Settings for DNS InspectionGeneral Information About DNS DNS Inspection Actions11-3 Choose Configuration Firewall Objects Inspect Maps DNS11-4 Detailed Steps-Protocol Conformance11-5 Detailed Steps-Filtering11-6 Detailed Steps-Inspections11-7 11-8 11-9 11-10 Header Flag11-11 DNS Type Field ValueClass 11-12 11-13 Resource Record11-14 Domain Name11-15 11-16 Configuring DNS InspectionClick Configure FTP Inspection Using Strict FTPFTP Inspection Overview 11-1711-18 Select FTP MapFTP Class Map Configuration Global Objects Class Maps FTPAdd/Edit FTP Traffic Class Map 11-1911-20 Add/Edit FTP Match Criterion11-21 Configuration Global Objects Inspect Maps FTPFTP Inspect Map 11-22 File Type FilteringAdd/Edit FTP Policy Map Security Level 11-23 Add/Edit FTP Policy Map Details11-24 Add/Edit FTP Map11-25 Verifying and Monitoring FTP InspectionHttp Inspection Overview Http InspectionSelect Http Map 11-26Http Class Map Configuration Global Objects Class Maps HttpAdd/Edit Http Traffic Class Map 11-2711-28 Add/Edit Http Match Criterion11-29 11-30 11-31 11-32 Configuration Global Objects Inspect Maps HttpHttp Inspect Map 11-33 URI FilteringAdd/Edit Http Policy Map Security Level 11-34 Add/Edit Http Policy Map Details11-35 Add/Edit Http Map11-36 11-37 11-38 Icmp Inspection Icmp Error InspectionInstant Messaging Inspection 11-3911-40 IM Inspection OverviewAdding a Class Map for IM Inspection Select IM Map IP Options InspectionIP Options Inspection Overview 11-4111-42 Configuring IP Options Inspection11-43 Select IP Options Inspect Map11-44 IP Options Inspect MapAdd/Edit IP Options Inspect Map 11-45 IPsec Pass Through InspectionIPsec Pass Through Inspection Overview 11-46 Select IPsec-Pass-Thru MapIPsec Pass Through Inspect Map 11-47 Add/Edit IPsec Pass Thru Policy Map Security LevelAdd/Edit IPsec Pass Thru Policy Map Details Optional Configuring an IPv6 Inspection Policy Map Default Settings for IPv6 InspectionIPv6 Inspection Information about IPv6 Inspection11-49 Configuring IPv6 InspectionNetBIOS Inspection Overview NetBIOS InspectionSelect Netbios Map 11-50Add/Edit NetBIOS Policy Map NetBIOS Inspect MapConfiguration Global Objects Inspect Maps NetBIOS Pptp Inspection11-52 Smtp and Extended Smtp InspectionSmtp and Esmtp Inspection Overview 11-53 Select Esmtp Map11-54 Configuration Global Objects Inspect Maps EsmtpEsmtp Inspect Map 11-55 Mime File Type FilteringAdd/Edit Esmtp Policy Map Security Level 11-56 Add/Edit Esmtp Policy Map Details11-57 Add/Edit Esmtp Inspect11-58 11-59 11-60 Tftp Inspection11-61 11-62 Ctiqbe Inspection Configuring Inspection for Voice and Video ProtocolsCtiqbe Inspection Overview 12-112-2 InspectionLimitations and Restrictions 12-3 Inspection OverviewHow H.323 Works 12-4 Support in H.245 MessagesSelect H.323 Map Configuration Global Objects Class Maps H.323Class Map 12-512-6 Add/Edit H.323 Traffic Class MapAdd/Edit H.323 Match Criterion 12-7 Configuration Global Objects Inspect Maps H.323Inspect Map 12-8 Phone Number FilteringAdd/Edit H.323 Policy Map Security Level 12-9 Add/Edit H.323 Policy Map Details12-10 12-11 Add/Edit HSI GroupAdd/Edit H.323 Map 12-12 Mgcp InspectionMgcp Inspection Overview 12-13 Using NAT with MgcpSelect Mgcp Map Configuration Global Objects Inspect Maps MgcpMgcp Inspect Map 12-1412-15 Gateways and Call AgentsAdd/Edit Mgcp Policy Map 12-16 Rtsp InspectionAdd/Edit Mgcp Group 12-17 Using RealPlayerRtsp Inspection Overview Restrictions and Limitations Configuration Global Objects Inspect Maps RadiusSelect Rtsp Map Rtsp Inspect MapAdd/Edit Rtsp Policy Map Configuration Firewall Objects Class Maps RtspRtsp Class Map 12-1912-20 SIP InspectionAdd/Edit Rtsp Traffic Class Map 12-21 SIP Inspection Overview12-22 SIP Instant MessagingSelect SIP Map 12-23 Configuration Global Objects Class Maps SIPSIP Class Map 12-24 Add/Edit SIP Traffic Class MapAdd/Edit SIP Match Criterion 12-25 12-26 Configuration Global Objects Inspect Maps SIPSIP Inspect Map 12-27 Add/Edit SIP Policy Map Security Level12-28 Add/Edit SIP Policy Map Details12-29 12-30 Add/Edit SIP Inspect12-31 12-32 Skinny Sccp InspectionSccp Inspection Overview 12-33 Supporting Cisco IP PhonesSelect Sccp Skinny Map Configuration Global Objects Inspect Maps Sccp SkinnySccp Skinny Inspect Map 12-3412-35 Message ID Filtering12-36 Add/Edit Sccp Skinny Policy Map Security Level12-37 Add/Edit Sccp Skinny Policy Map Details12-38 Add/Edit Message ID Filter13-1 Configuring Inspection of Database Directory ProtocolsILS Inspection 13-2 SQL*Net InspectionSun RPC Inspection Configuration Properties Sunrpc ServerSun RPC Inspection Overview Sunrpc Server13-4 Add/Edit Sunrpc ServiceDcerpc Inspection Configuring Inspection for Management Application ProtocolsDcerpc Overview 14-1Select Dcerpc Map Configuration Global Objects Inspect Maps DcerpcDcerpc Inspect Map 14-214-3 Add/Edit Dcerpc Policy Map14-4 GTP Inspection14-5 GTP Inspection OverviewSelect GTP Map 14-6 Configuration Global Objects Inspect Maps GTPGTP Inspect Map 14-7 Imsi Prefix FilteringAdd/Edit GTP Policy Map Security Level 14-8 Add/Edit GTP Policy Map Details14-9 Add/Edit GTP Map14-10 Radius Accounting InspectionSelect Radius Accounting Map Radius Accounting Inspection OverviewAdd Radius Accounting Policy Map 14-1114-12 Radius Inspect MapRadius Inspect Map Host Snmp Inspection RSH InspectionRadius Inspect Map Other 14-13Select Snmp Map Snmp Inspection OverviewSnmp Inspect Map Add/Edit Snmp Map14-15 Xdmcp Inspection14-16 Configuring Unified Communications Page 15-1 15-2 15-3 TLS Proxy Applications in Cisco Unified Communications15-4 Model License Requirement115-5 15-6 16-1 Using the Cisco Unified Communication Wizard16-2 16-3 Licensing Requirements for the Unified Communication Wizard16-4 16-5 Configuring the Private Network for the Phone Proxy16-6 Configuring Servers for the Phone ProxyClick the Generate and Export LDC Certificate button 16-7 Address Default Port Description16-8 16-9 Configuring the Public IP Phone Network16-10 16-11 16-12 16-13 16-14 16-15 Certificate,16-16 16-17 16-18 Basic DeploymentOff-path Deployment 16-19 16-20 16-21 16-22 16-23 Installing a CertificateExporting an Identity Certificate 16-24 Click Install Certificate16-25 Saving the Identity Certificate Request16-26 16-27 16-28 Information About the Cisco Phone Proxy Configuring the Cisco Phone ProxyPhone Proxy Functionality 17-1TCP/RTP TLS/SRTP 17-2Cisco Unified Communications Manager Supported Cisco UCM and IP Phones for the Phone ProxyCisco Unified IP Phones 17-317-4 Licensing Requirements for the Phone Proxy17-5 17-6 Prerequisites for the Phone ProxyMedia Termination Instance Prerequisites DNS Lookup Prerequisites Certificates from the Cisco UCMCisco Unified Communications Manager Prerequisites ACL RulesAddress Port Protocol Description NAT and PAT PrerequisitesNAT Prerequisites PAT Prerequisites17-9 Prerequisites for IP Phones on Multiple Interfaces7940 IP Phones Support 17-10 Cisco IP Communicator PrerequisitesPrerequisites for Rate Limiting Tftp Requests End-User Phone Provisioning Rate Limiting Configuration ExampleWays to Deploy IP Phones to End Users 17-1117-12 Phone Proxy Guidelines and LimitationsGeneral Guidelines and Limitations 17-13 Media Termination Address Guidelines and Limitations17-14 Configuring the Phone ProxyTask Flow for Configuring the Phone Proxy 17-15 Creating the CTL File17-16 Adding or Editing a Record Entry in a CTL File17-17 Creating the Media Termination Instance17-18 Creating the Phone Proxy Instance17-19 17-20 Adding or Editing the Tftp Server for a Phone Proxy17-21 Configuring Your RouterLinksys Routers Application Start End Protocol IP Address Enabled Feature History for the Phone ProxyChecked 17-2218-1 TLS Proxy Flow Cisco IP Phone Cisco ASA 18-218-3 Supported Cisco UCM and IP Phones for the TLS Proxy18-4 Licensing for the TLS Proxy18-5 18-6 CTL Provider18-7 Add/Edit CTL Provider18-8 Configure TLS Proxy Pane18-9 Add TLS Proxy Instance Wizard Server ConfigurationAdding a TLS Proxy Instance 18-10 Add TLS Proxy Instance Wizard Client Configuration18-11 18-12 Add TLS Proxy Instance Wizard Other Steps18-13 Edit TLS Proxy Instance Server Configuration18-14 Edit TLS Proxy Instance Client Configuration18-15 18-16 TLS ProxyAdd/Edit TLS Proxy 18-17 18-18 19-1 Configuring Cisco Mobility AdvantageCisco Mobility Advantage Proxy Functionality 19-2 Mobility Advantage Proxy Deployment ScenariosMMP/SSL/TLS 19-319-4 Mobility Advantage Proxy Using NAT/PATTrust Relationships for Cisco UMA Deployments 19-5 19-6 Configuring Cisco Mobility Advantage19-7 Feature History for Cisco Mobility AdvantageTask Flow for Configuring Cisco Mobility Advantage 19-8 20-1 Configuring Cisco Unified PresenceInformation About Cisco Unified Presence Typical Cisco Unified Presence/LCS Federation Scenario 20-2SIP/TLS 20-320-4 Trust Relationship in the Presence Federation20-5 Xmpp Federation Deployments20-6 Configuration Requirements for Xmpp Federation20-7 Licensing for Cisco Unified Presence20-8 Configuring Cisco Unified Presence Proxy for SIP Federation20-9 Feature History for Cisco Unified Presence20-10 21-1 Configuring Cisco Intercompany Media Engine ProxyFeatures of Cisco Intercompany Media Engine Proxy 21-2 How the UC-IME Works with the Pstn and the Internet21-3 Tickets and Passwords21-4 21-5 Call Fallback to the PstnArchitecture 21-6 Basic Deployment21-7 Off Path Deployment21-8 Licensing for Cisco Intercompany Media Engine21-9 21-10 21-11 Configuring Cisco Intercompany Media Engine ProxyTask Flow for Configuring Cisco Intercompany Media Engine 21-12 Configuring NAT for Cisco Intercompany Media Engine Proxy21-13 Command PurposeCommand Purpose Configuring PAT for the Cisco UCM ServerWhat to Do Next 21-1421-15 Address of Cisco UCM that you want to translate21-16 Creating ACLs for Cisco Intercompany Media Engine Proxy21-17 ProcedureGuidelines 21-18 Creating the Cisco Intercompany Media Engine Proxy21-19 See Creating the Media Termination Instance21-20 Show running-config uc-ime command21-21 Creating Trustpoints and Generating Certificates21-22 Prerequisites for Installing Certificates21-23 Certified21-24 Creating the TLS Proxy21-25 21-26 ACLs for Cisco Intercompany Media Engine Proxy21-27 Optional Configuring TLS within the Local Enterprise21-28 Commands Purpose21-29 Where proxytrustpoint for the server trust-pointWhere proxytrustpoint for the client trust-point 21-30 Optional Configuring Off Path Signaling21-31 Engine Proxy,21-32 21-33 21-34 Show uc-ime signaling-sessions21-35 Show uc-ime signaling-sessions statisticsShow uc-ime media-sessions detail Show uc-ime mapping-service-sessions statistics Show uc-ime mapping-service-sessionsShow uc-ime fallback-notification statistics 21-3621-37 Feature History for Cisco Intercompany Media Engine Proxy21-38 Configuring Connection Settings and QoS Page 22-1 Configuring Connection SettingsInformation About Connection Settings 22-2 TCP Intercept and Limiting Embryonic ConnectionsDead Connection Detection DCD TCP Normalization TCP Sequence RandomizationTCP State Bypass 22-322-4 Licensing Requirements for Connection SettingsMaximum Concurrent and Embryonic Connection Guidelines TCP State Bypass Unsupported FeaturesTCP State Bypass 22-5Task Flow For Configuring Connection Settings Configuring Connection SettingsCustomizing the TCP Normalizer with a TCP Map 22-622-7 22-8 Configuring Connection Settings22-9 Configuring Global Timeouts22-10 Introduced set connection advanced-options Feature History for Connection SettingsTcp-state-bypass 22-1122-12 23-1 Configuring QoSInformation About QoS 23-2 Supported QoS FeaturesWhat is a Token Bucket? 23-3 Information About PolicingInformation About Priority Queuing 23-4 How QoS Features InteractInformation About Traffic Shaping Dscp and DiffServ Preservation Licensing Requirements for QoSModel Guidelines 23-523-6 Configuring QoS23-7 12523-8 Configuring the Standard Priority Queue for an Interface23-9 Click Enable priority for this flow23-10 23-11 Monitoring QoSClick Enforce priority to selected shape traffic 23-12 Viewing QoS Police StatisticsViewing QoS Standard Priority Statistics 23-13 Viewing QoS Shaping StatisticsViewing QoS Standard Priority Queue Statistics 23-14 Feature History for QoSTesting Your Configuration Troubleshooting Connections and ResourcesPinging ASA Interfaces 24-124-2 Network Diagram with Interfaces, Routers, and Hosts24-3 Information About PingPinging From an ASA Interface Troubleshooting the Ping ToolPinging to an ASA Interface Pinging Through the ASA Interface24-5 Using the Ping Tool24-6 Output Symbol DescriptionDetermining Packet Routing with Traceroute 24-7 Tracing Packets with Packet Tracer24-8 Monitoring Performance24-9 Monitoring System ResourcesBlocks 24-10 Memory24-11 Monitoring Connections24-12 Monitoring Per-Process CPU UsageConfiguring Advanced Network Protection Page 25-1 Configuring the ASA for Cisco Cloud Web SecurityInformation About Cisco Cloud Web Security User Authentication and Cloud Web SecurityRedirection of Web Traffic to Cloud Web Security 25-225-3 Authentication KeysCompany Authentication Key Group Authentication Key Directory Groups ScanCenter PolicyCustom Groups 25-425-5 How Groups and the Authentication Key InteroperateCloud Web Security Actions Licensing Requirements for Cisco Cloud Web Security Failover from Primary to Backup Proxy ServerBypassing Scanning with Whitelists IPv4 and IPv6 SupportPrerequisites for Cloud Web Security Optional User Authentication PrerequisitesOptional Fully Qualified Domain Name Prerequisites 25-725-8 Configuring Cisco Cloud Web Security25-9 Choose Configuration Device Management Cloud Web Security25-10 25-11 25-12 25-13 25-14 25-15 25-16 25-17 Examples25-18 25-19 Check Cloud Web Security and click Configure25-20 25-21 Tcp/http25-22 25-23 Optional Configuring Whitelisted Traffic25-24 25-25 Optional Configuring the User Identity Monitor25-26 Configuring the Cloud Web Security PolicyMonitoring Cloud Web Security Related Documents Feature History for Cisco Cloud Web SecurityRelated Documents 25-2725-28 26-1 Configuring the Botnet Traffic FilterInformation About the Botnet Traffic Filter Botnet Traffic Filter Actions for Known Addresses Botnet Traffic Filter Address TypesBotnet Traffic Filter Databases Information About the Dynamic Database26-3 Information About the Static Database26-4 26-5 How the Botnet Traffic Filter Works26-6 Licensing Requirements for the Botnet Traffic FilterPrerequisites for the Botnet Traffic Filter 26-7 Configuring the Botnet Traffic FilterTask Flow for Configuring the Botnet Traffic Filter 26-8 Configuring the Dynamic Database26-9 Adding Entries to the Static DatabaseEnabling DNS Snooping 26-10 26-11 Recommended Configuration26-12 Blocking Botnet Traffic ManuallyVery Low Moderate High Very High 26-13 Searching the Dynamic Database26-14 Monitoring the Botnet Traffic FilterBotnet Traffic Filter Syslog Messaging 26-15 Botnet Traffic Filter Monitor Panes26-16 Feature History for the Botnet Traffic FilterInformation About Threat Detection Configuring Threat DetectionLicensing Requirements for Threat Detection 27-127-2 Configuring Basic Threat Detection StatisticsInformation About Basic Threat Detection Statistics Guidelines and Limitations Trigger Settings Packet Drop Reason Average Rate Burst RateSecurity Context Guidelines Types of Traffic MonitoredMonitoring Basic Threat Detection Statistics Configuring Basic Threat Detection StatisticsPath Purpose 27-4Feature History for Basic Threat Detection Statistics Configuring Advanced Threat Detection StatisticsInformation About Advanced Threat Detection Statistics 27-527-6 Configuring Advanced Threat Detection StatisticsChoose the Configuration Firewall Threat Detection pane 27-7 Monitoring Advanced Threat Detection StatisticsLast 24 hour 27-8 Configuring Scanning Threat DetectionFeature History for Advanced Threat Detection Statistics 27-9 Information About Scanning Threat Detection27-10 Configuring Scanning Threat DetectionAverage Rate Burst Rate 27-11 Feature History for Scanning Threat Detection27-12 Configuration Firewall Advanced Anti-Spoofing Fields Using Protection ToolsPreventing IP Spoofing 28-128-2 Configuring the Fragment SizeShow Fragment 28-3 Configuring TCP Options28-4 TCP Reset SettingsAdd/Edit IP Audit Policy Configuration Configuring IP Audit for Basic IPS SupportIP Audit Policy 28-5IP Audit Signature List IP Audit SignaturesSignature Message Number Signature Title 28-628-7 28-8 Message Number Signature Title28-9 28-10 28-11 28-12 29-1 Configuring Filtering ServicesInformation About Web Traffic Filtering 29-2 Filtering URLs and FTP Requests with an External ServerInformation About URL Filtering Guidelines and Limitations for URL Filtering Licensing Requirements for URL FilteringIdentifying the Filtering Server 29-329-4 Configuring Additional URL Filtering Settings29-5 Buffering the Content Server ResponseCaching Server Addresses 29-6 Configuring Filtering RulesFiltering Http URLs 29-7 29-8 29-9 29-10 29-11 Filtering the Rule Table29-12 Feature History for URL FilteringDefining Queries Configuring Modules Page 30-1 Configuring the ASA CX ModuleInformation About the ASA CX Module 30-2 How the ASA CX Module Works with the ASAService Policy in Monitor-Only Mode Monitor-Only ModeTraffic-Forwarding Interface in Monitor-Only Mode 30-330-4 Initial ConfigurationInformation About ASA CX Management Compatibility with ASA Features Information About Authentication ProxyPolicy Configuration and Management Information About VPN and the ASA CX Module30-6 Licensing Requirements for the ASA CX ModulePrerequisites 30-7 Monitor-Only Mode GuidelinesASA Clustering Guidelines Parameters Default Configuring the ASA CX ModuleTask Flow for the ASA CX Module 30-830-9 Connecting the ASA CX Management InterfaceASA 5585-X Hardware Module 30-10 If you have an inside routerIf you do not have an inside router 30-11 ASA 5512-X through ASA 5555-X Software Module30-12 30-13 Example30-14 Multiple Context ModeASA 5585-X Changing the ASA CX Management IP Address Sets the ASA CX management IP address, mask, and gateway Single Context ModeExample ASDM, choose Wizards Startup Wizard30-16 Configuring Basic ASA CX Settings at the ASA CX CLI30-17 30-18 Optional Configuring the Authentication Proxy Port30-19 Creating the ASA CX Service PolicyRedirecting Traffic to the ASA CX Module 30-20 Click the ASA CX Inspection tab30-21 Check the Enable ASA CX for this traffic flow check box30-22 Configuring Traffic-Forwarding Interfaces Monitor-Only ModeChoose Tools Command Line Interface 30-23 Resetting the PasswordManaging the ASA CX Module 30-24 Reloading or Resetting the Module30-25 Shutting Down the Module30-26 30-27 Admin123Monitoring the ASA CX Module Showing Module Statistics Showing Module StatusMonitoring Module Connections ModuleCiscoasa# show asp table classify domain cxsc Input Table 30-2930-30 Ciscoasa# show asp drop 30-31Problems with the Authentication Proxy Troubleshooting the ASA CX ModuleCapturing Module Traffic 30-3230-33 Feature History for the ASA CX Module30-34 Capture interface asadataplane command31-1 Configuring the ASA IPS ModuleInformation About the ASA IPS Module 31-2 How the ASA IPS Module Works with the ASA31-3 Using Virtual Sensors ASA 5510 and HigherOperating Modes 31-4 Information About Management Access31-5 Licensing Requirements for the ASA IPS module31-6 Vlan31-7 Configuring the ASA IPS moduleTask Flow for the ASA IPS Module 31-8 Connecting the ASA IPS Management Interface31-9 31-10 ASA31-11 Sessioning to the Module from the ASA May Be Required31-12 ASA 5512-X through ASA 5555-X Booting the Software ModuleConfiguring Basic IPS Module Network Settings 31-13 ASA 5510 and Higher Configuring Basic Network SettingsChoose Wizards Startup Wizard 31-14 ASA 5505 Configuring Basic Network SettingsASDM, choose Configuration Device Setup SSC Setup 31-15 Configuring the Security Policy on the ASA IPS Module31-16 Click Continue31-17 31-18 Diverting Traffic to the ASA IPS module31-19 Managing the ASA IPS module31-20 Installing and Booting an Image on the Module31-21 31-22 Uninstalling a Software Module Image31-23 31-24 Monitoring the ASA IPS module31-25 Feature History for the ASA IPS module31-26 32-1 Configuring the ASA CSC ModuleInformation About the CSC SSM 32-2 ASA32-3 Determining What Traffic to Scan32-4 Common Network Configuration for CSC SSM Scanning32-5 Licensing Requirements for the CSC SSMPrerequisites for the CSC SSM 32-6 Parameter Default32-7 Configuring the CSC SSMBefore Configuring the CSC SSM 32-8 Connecting to the CSC SSM32-9 Determining Service Policy Rule Actions for CSC Scanning32-10 CSC SSM Setup Wizard32-11 IP ConfigurationActivation/License 32-12 Host/Notification Settings32-13 Management Access Host/NetworksPassword 32-14 Restoring the Default PasswordChoose Tools CSC Password Reset 32-15 Wizard SetupCSC Setup Wizard Activation Codes Configuration 32-16 CSC Setup Wizard IP ConfigurationCSC Setup Wizard Host Configuration CSC Setup Wizard Password Configuration CSC Setup Wizard Management Access ConfigurationCSC Setup Wizard Traffic Selection for CSC Scan 32-1732-18 Specifying Traffic for CSC Scanning32-19 CSC Setup Wizard SummaryChoose Configuration Trend Micro Content Security Web Using the CSC SSM GUIWeb 32-2032-21 MailSmtp Tab 32-22 File Transfer32-23 UpdatesMonitoring the CSC SSM Choose Monitoring Trend Micro Content Security ThreatsThreats 32-2432-25 Live Security EventsLive Security Events Log 32-26 Software UpdatesResource Graphs Troubleshooting the CSC ModuleCSC Memory 32-2732-28 Installing an Image on the ModuleRecover command 32-29 Resetting the PasswordShutting Down the Module Reloading or Resetting the ModuleShuts down the module 32-30Feature Name Platform Releases Feature Information Feature History for the CSC SSMAdditional References Related Topic Document Title32-32 IN-1 D EIN-2 FTP HttpIN-3 CSC CPUIN-4 CSC SSM GUIIN-5 Application inspectionIN-6 IPSIN-7 See also class mapIN-8 See IcmpIN-9 See QoSIN-10 See PATIN-11 URLIN-12
Related manuals
Manual 712 pages 25.77 Kb Manual 52 pages 35.74 Kb

ASA Services Module, ASA 5555-X, ASA 5545-X, ASA 5585-X, ASA 5580 specifications

Cisco Systems has long been a leader in the field of network security, and its Adaptive Security Appliance (ASA) series is a testament to this expertise. Within the ASA lineup, models such as the ASA 5505, ASA 5580, ASA 5585-X, ASA 5545-X, and ASA 5555-X stand out for their unique features, capabilities, and technological advancements.

The Cisco ASA 5505 is designed for small businesses or branch offices. It provides essential security features such as firewall protection, flexible VPN capabilities, and intrusion prevention. The ASA 5505 supports a user-friendly interface, allowing for straightforward management. Its built-in threat detection and prevention tools provide a layered defense, and with scalability in mind, it can accommodate various expansion options as organizational needs grow.

Moving up the line, the ASA 5580 delivers greater throughput and advanced security features. This model is suited for medium to large enterprises that require robust protection against increasingly sophisticated threats. Its multi-core architecture allows it to manage high volumes of traffic seamlessly while maintaining excellent performance levels. The ASA 5580 also supports application-layer security and customizable access policies, making it highly adaptable to diverse security environments.

The ASA 5585-X further enhances Cisco's security offerings with advanced malware protection and extensive security intelligence capabilities. It incorporates next-generation firewall features, including context-aware security, and supports advanced threat detection technologies. This model is ideal for large enterprises or data centers that prioritize security while ensuring uninterrupted network performance and availability.

For enterprises requiring a balance of performance and security, the ASA 5545-X presents a compelling option. This model features scalable performance metrics, high availability, and integrated advanced threat protection. Coupled with advanced endpoint protection and detailed monitoring capabilities, the ASA 5545-X enables organizations to manage their security posture effectively.

Lastly, the ASA 5555-X blends cutting-edge technologies with strong security infrastructures. It boasts high throughput and the ability to execute deep packet inspections. Its sophisticated architecture supports threat intelligence feeds that provide real-time security updates, making it a powerful tool against modern threats.

Each of these Cisco ASA models brings specific advantages to varied environments. Their integrative capabilities enable businesses to enhance their security postures while benefiting from seamless scalability and management. As cybersecurity threats evolve, these advanced appliances play a vital role in protecting valuable digital assets.