Cisco Systems ASA 5500 manual Getting Started with the CSC SSM, 19-7

Page 7

Chapter 19 Managing the AIP SSM and CSC SSM

Managing the CSC SSM

Figure 19-2

CSC SSM Deployment with a Management Network

 

Security

 

 

 

Appliance

 

Trend Micro

 

inside

 

 

 

Update Server

 

192.168.100.1

 

 

 

 

HTTP

Main System

outside

Internet

 

10.6.13.67

Proxy

management port

 

 

192.168.50.1

 

 

ASDM

CSC SSM

 

 

 

 

 

 

192.168.50.38 SSM

 

 

 

management

 

Syslog

port

 

 

 

 

 

Notifications

 

 

148387

 

 

 

SMTP Server

 

 

 

CSC SSM cannot suport stateful failover, because the CSC SSM does not maintain connection information and therefore cannot provide the failover unit with information necessary for stateful failover. The connections that a CSC SSM is scanning are dropped upon failure of the security appliance that the CSC SSM is installed in. When the standby adaptive security appliance becomes active, it will forward the scanned traffic to its CSC SSM and the connections will be reset.

Getting Started with the CSC SSM

Before you receive the security benefits provided by a CSC SSM, you must perform several steps beyond simple hardware installation of the SSM. This procedure provides an overview of those steps.

To configure the adaptive security appliance and the CSC SSM, follow these steps:

Step 1 If the CSC SSM did not come pre-installed in a Cisco ASA 5500 series adaptive security appliance, install it and connect a network cable to the management port of the SSM. For assistance with installation and connecting the SSM, see the Cisco ASA 5500 Series Hardware Installation Guide.

The management port of the CSC SSM must be connected to your network to allow management of and automatic updates to the CSC SSM software. Additionally, the CSC SSM uses the management port for email notifications and syslogging.

Step 2 With the CSC SSM, you should have received a Product Authorization Key (PAK). Use the PAK to register the CSC SSM at the following URL.

http://www.cisco.com/go/license

After you register, you will receive activation keys by email. The activation keys are required before you can complete Step 6

Step 3 Gather the following information, for use in Step 6.

Activation keys, received after completing Step 2.

SSM management port IP address, netmask, and gateway IP address.

Cisco Security Appliance Command Line Configuration Guide

 

OL-8629-01

19-7

 

 

 

Image 7
Contents About the AIP SSM Managing the AIP SSM19-1 Diverting Traffic to the AIP SSM Getting Started with the AIP SSM19-2 19-3 19-4 Sessioning to the AIP SSM and Running SetupAbout the CSC SSM Managing the CSC SSM19-5 Flow of Scanned Traffic with CSC SSM 19-619-7 Getting Started with the CSC SSM19-8 19-9 Determining What Traffic to Scan19-10 Common Network Configuration for CSC SSM ScanningDiverting Traffic to the CSC SSM Limiting Connections Through the CSC SSM19-11 19-12 19-13 Checking SSM Status19-14 Transferring an Image onto an SSM19-15 19-16
Related manuals
Manual 49 pages 36.1 Kb Manual 144 pages 23.87 Kb Manual 16 pages 48.09 Kb

ASA 5500 specifications

Cisco Systems ASA 5500 is a robust security appliance designed to provide advanced network security and protection against both internal and external threats. Ideal for organizations of various sizes, the ASA 5500 series offers a wide range of features that combine firewall capabilities with intrusion prevention, VPN support, and application control, among others.

One of the key features of the ASA 5500 is its stateful firewall technology. This allows the device to monitor active connections and enforce security policies based on the state of the traffic. By maintaining the context of network sessions, the firewall can make informed decisions on whether to allow or deny traffic based on established rules.

In addition to traditional firewall functionalities, the ASA 5500 series integrates advanced intrusion prevention capabilities. By analyzing traffic patterns and identifying known threats, the IPS functionality helps organizations defend against a variety of malicious activities, such as DDoS attacks, malware, and unauthorized access attempts. The ASA 5500 continuously updates its threat intelligence through Cisco's global threat database, enhancing its ability to detect emerging threats in real-time.

Virtual Private Network (VPN) support is another significant aspect of the ASA 5500 series. The device offers secure, encrypted connections for remote users and branch offices, ensuring safe access to corporate resources over the Internet. It supports both IPsec and SSL VPN protocols, allowing organizations to choose the best option for their specific needs. This capability is crucial for businesses that require a secure environment for remote work.

The ASA 5500 series also features extensive application control and visibility tools. These tools enable organizations to manage and control the applications running on their network, ensuring that only authorized applications can communicate through the firewall. This level of control helps to mitigate risks associated with unauthorized applications, which can lead to data breaches or reduced productivity.

Moreover, the ASA 5500 is designed with high availability and scalability in mind. Its clustering support ensures that multiple units can work together to provide redundancy and load balancing, enhancing both performance and reliability. This characteristic is especially important for organizations looking to maintain continuous operation during traffic spikes or hardware failures.

In summary, Cisco Systems ASA 5500 is an all-in-one security solution that combines stateful firewall protection, intrusion prevention, VPN capabilities, and application control. With its robust feature set and focus on security, it is well-suited for organizations seeking to protect their networks from an ever-evolving landscape of cyber threats. Whether for small businesses or large enterprises, the ASA 5500 provides the necessary tools to create a secure networking environment.