1-12
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter1 Introduction to the Cisco ASA 5500 Series
New Features
Table 1 -5 lists the new features for ASA Version 8.4(2)/ASDM Version 6.4(5).
Table1-5 New Features for ASA Version 8.4(2)/ASDM Version 6.4(5)
Feature Description
Firewall Features
Identity Firewall Typically, a firewall is not aware of the user identities and, therefore, cannot apply security
policies based on identity.
The Identity Firewall in the ASA provides more granular access control based on users’
identities. You can configure access rules and security policies based on usernames and user
groups name rather than through source IP addresses. The ASA applies the security policies
based on an association of IP addresses to Windows Active Directory login information and
reports events based on the mapped usernames instead of network IP addresses.
The Identity Firewall integrates with Window Active Directory in conjunction with an external
Active Directory (AD) Agent that provides the actual identity mapping. The ASA uses
Windows Active Directory as the source to retrieve the current user identity information for
specific IP addresses.
In an enterprise, some users log onto the network by using other authentication mechanisms,
such as authenticating with a web portal (cut-through proxy) or by using a VPN. You can
configure the Identity Firewall to allow these types of authentication in connection with
identity-based access policies.
Identity NAT configurable
proxy ARP and route lookup
In earlier releases for identity NAT, proxy ARP was disabled, and a route lookup was always
used to determine the egress interface. You could not configure these settings. In 8.4(2) and
later, the default behavior for identity NAT was changed to match the behavior of other static
NAT configurations: proxy ARP is enabled, and the NAT configuration determines the egress
interface (if specified) by default. You can leave these settings as is, or you can enable or
disable them discretely. Note that you can now also disable proxy ARP for regular static NAT.
For pre-8.3 configurations, the migration of NAT exempt rules (the nat 0 access-list command)
to 8.4(2) and later now includes the following keywords to disable proxy ARP and to use a
route lookup: no-proxy-arp and route-lookup. The unidirectional keyword that was used for
migrating to 8.3(2) and 8.4(1) is no longer used for migration. When upgrading to 8.4(2) from
8.3(1), 8.3(2), and 8.4(1), all identity NAT configurations will now include the no-proxy-arp
and route-lookup keywords, to maintain existing functionality. The unidirectional keyword
is removed.
PAT pool and round robin
address assignment
You can now specify a pool of PAT addresses instead of a single address. You can also
optionally enable round-robin assignment of PAT addresses instead of first using all ports on a
PAT address before using the next address in the pool. These features help prevent a large
number of connections from a single PAT address from appearing to be part of a DoS attack
and makes configuration of large numbers of PAT addresses easy.
Note Currently in 8.4(2), the PAT pool feature is not available as a fallback method for
dynamic NAT or PAT. You can only configure the PAT pool as the primary method for
dynamic PAT (CSCtq20634).