Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition

Jazib Frahim, CCIE No. 5459
Omar Santos

image

800 East 96th Street
Indianapolis, IN 46240

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance, Second Edition

Jazib Frahim, Omar Santos

Copyright © 2010 Cisco Systems, Inc.

Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review.

Printed in the United States of America

Third Printing July 2011

Library of Congress Cataloging-in-Publication data is on file.

ISBN-13: 978-1-58705-819-6
ISBN-10: 1-58705-819-7

Warning and Disclaimer

This book is designed to provide information about Cisco ASA. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied.

The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc., shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it.

The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Trademark Acknowledgments

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Corporate and Government Sales

The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:

U.S. Corporate and Government Sales
1-800-382-3419
[email protected]

For sales outside the United States please contact:

International Sales
[email protected]

Feedback Information

At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at [email protected]. Please make sure to include the book title and ISBN in your message.

We greatly appreciate your assistance.

Publisher: Paul Boger

Associate Publisher: Dave Dusthimer

Executive Editor: Brett Bartow

Managing Editor: Patrick Kanouse

Project Editor: Seth Kerney

Book and Cover Designer: Louisa Adair

Composition: Mark Shirar

Proofreaders: Water Crest Publishing, Inc., Apostrophe Editing Services

Business Operation Manager, Cisco Press: Anand Sundaram

Manager Global Certification: Erik Ullanderson

Technical Editors: Randy Ivener, Jay Johnston

Development Editors: Kimberley Debus, Dayna Isley

Copy Editor: Margo Catts

Editorial Assistant: Vanessa Evans

Indexer: Ken Johnson

image

Americas Headquarters
Cisco Systems, Inc.
San Jose, CA

Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore

Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)

About the Authors

Jazib Frahim, CCIE No. 5459, has been with Cisco Systems for more than ten years. With a bachelor’s degree in computer engineering from Illinois Institute of Technology, he started out as a TAC engineer in the LAN Switching team. He then moved to the TAC Security team, where he acted as a technical leader for the security products. He led a team of 20 engineers in resolving complicated security and VPN technologies. He is currently working as a technical leader in the Worldwide Security Services Practice of Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks with a focus on network security. He holds two CCIEs, one in routing and switching and the other in security. He has written numerous Cisco online technical documents and has been an active member on the Cisco online forum NetPro. He has presented at Networkers on multiple occasions and has taught many on-site and online courses to Cisco customers, partners, and employees.

While working for Cisco, he pursued his master of business administration (MBA) degree from North Carolina State University.

He is also an author of the following Cisco Press books:

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

SSL Remote Access VPNs

Omar Santos is an incident manager at Cisco’s Product Security Incident Response Team (PSIRT). Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government, including the United States Marine Corps (USMC) and the U.S. Department of Defense (DoD). He is also the author of many Cisco online technical documents and configuration guidelines. Prior to his current role, he was a technical leader within the World Wide Security Practice and Cisco’s Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.

Omar has also delivered numerous technical presentations to Cisco customers and partners; as well as executive presentations to CEOs, CIOs, and CSOs of many organizations. He is also the author of the following Cisco Press books:

Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

End-to-End Network Security: Defense-in-Depth

About the Technical Reviewers

Randy Ivener, CCIE No. 10722, is a security engineer in the Cisco Security Research and Operations team. He is a CISSP and PMI PMP. He has spent many years as a network security consultant helping companies understand and secure their networks. Randy has presented security topics at industry events including Blackhat and Cisco Networkers. Before becoming immersed in information security, he spent time in software development and as a training instructor. Randy graduated from the U.S. Naval Academy and holds an MBA.

Jay Johnston, CCIE No. 17663, is a security specialist in the Cisco TAC center located in Research Triangle Park, North Carolina. His networking career began in 2002 when he joined Cisco as a co-op while attending North Carolina State University. After graduating with a bachelors of computer science in 2004, he joined Cisco full time as a TAC Engineer. He obtained his Security CCIE in 2007. He enjoys working for Cisco, especially the constant technical challenges that working with customers in the TAC provides.

Dedications

Jazib Frahim: I would like to dedicate this book to my lovely wife, Sadaf, who has patiently put up with me during the writing process.

I would also like to dedicate this book to my parents, Frahim and Perveen, who support and encourage me in all my endeavors.

Finally, I would like to thank my siblings, including my brother Shazib and sisters Erum and Sana, sister-in-law Asiya, my cute nephew Shayan, and my adorable nieces Shiza and Alisha. Thank you for your patience and understanding during the development of this book.

Omar Santos: I would like to dedicate this book to my lovely wife, Jeannette, and my two beautiful children, Hannah and Derek, who have inspired and supported me throughout the development of this book.

I also dedicate this book to my parents, Jose and Generosa. Without their knowledge, wisdom, and guidance, I would not have the goals that I strive to achieve today.

Acknowledgments

We would like to thank the technical editors, Randy Ivener and Jay Johnston, for their time and technical expertise. They verified our work and corrected us in all the major and minor mistakes that were hard to find. Special thanks go to Aun Raza for reviewing many chapters prior to final editing.

We would like to thank the Cisco Press team, especially Brett Bartow, Dayna Isley, Kimberley Debus, and Andrew Cupp for their patience, guidance, and consideration. Their efforts are greatly appreciated.

Many thanks to our Cisco management team, including David Philips, Ken Cavanagh, and Jean Reese for their continuous support. They highly encouraged us throughout this project.

Kudos to the Cisco ASA product development team for delivering such a great product. Their support is also greatly appreciated during the development of this book.

Finally, we would like to acknowledge the Cisco TAC. Some of the best and brightest minds in the networking industry work there, supporting our Cisco customers often under very stressful conditions and working miracles daily. They are truly unsung heroes, and we are all honored to have had the privilege of working side by side with them in the trenches of the TAC.

Contents at a Glance

Introduction

Part I: Product Overview

Chapter 1 Introduction to Security Technologies

Chapter 2 Cisco ASA Product and Solution Overview

Chapter 3 Initial Setup and System Maintenance

Part II: Firewall Technology

Chapter 4 Controlling Network Access

Chapter 5 IP Routing

Chapter 6 Authentication, Authorization, and Accounting (AAA)

Chapter 7 Application Inspection

Chapter 8 Virtualization

Chapter 9 Transparent Firewalls

Chapter 10 Failover and Redundancy

Chapter 11 Quality of Service

Part III: Intrusion Prevention System (IPS) Solutions

Chapter 12 Configuring and Troubleshooting Intrusion Prevention System (IPS)

Chapter 13 Tuning and Monitoring IPS

Part IV: Content Security

Chapter 14 Configuring Cisco Content Security and Control Security Services Module

Chapter 15 Monitoring and Troubleshooting the Cisco Content Security and Control Security Services Module

Part V: Virtual Private Network (VPN) Solutions

Chapter 16 Site-to-Site IPSec VPNs

Chapter 17 IPSec Remote-Access VPNs

Chapter 18 Public Key Infrastructure (PKI)

Chapter 19 Clientless Remote-Access SSL VPNs

Chapter 20 Client-Based Remote-Access SSL VPNs

Index

Contents

Introduction

Part I: Product Overview

Chapter 1 Introduction to Security Technologies

Firewalls

Network Firewalls

Stateful Inspection Firewalls

Deep Packet Inspection

Personal Firewalls

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

Pattern Matching and Stateful Pattern-Matching Recognition

Protocol Analysis

Heuristic-Based Analysis

Anomaly-Based Analysis

Virtual Private Networks

Technical Overview of IPSec

SSL VPNs

Summary

Chapter 2 Cisco ASA Product and Solution Overview

Cisco ASA 5505 Model

Cisco ASA 5510 Model

Cisco ASA 5520 Model

Cisco ASA 5540 Model

Cisco ASA 5550 Model

Cisco ASA 5580-20 and 5580-40 Models

Cisco ASA 5580-20

Cisco ASA 5580-40

Cisco ASA AIP-SSM Module

Cisco ASA AIP-SSM-10

Cisco ASA AIP-SSM-20

Cisco ASA AIP-SSM-40

Cisco ASA Gigabit Ethernet Modules

Cisco ASA 4GE-SSM

Cisco ASA 5580 Expansion Cards

Cisco ASA CSC-SSM Module

Summary

Chapter 3 Initial Setup and System Maintenance

Accessing the Cisco ASA Appliances

Establishing a Console Connection

Command-Line Interface

Managing Licenses

Initial Setup

Initial Setup via CLI

Initial Setup of ASDM

Device Setup

Setting Up Device Name and Passwords

Configuring an Interface

DHCP Services

IP Version 6

IPv6 Header

Configuring IPv6

Setting Up the System Clock

Manual Clock Adjustment

Automatic Clock Adjustment Using the Network Time Protocol

Configuration Management

Running Configuration

Startup Configuration

Removing the Device Configuration

Remote System Management

Telnet

Secure Shell (SSH)

System Maintenance

Software Installation

Password Recovery Process

Disabling the Password Recovery Process

System Monitoring

System Logging

NetFlow Secure Event Logging (NSEL)

Simple Network Management Protocol (SNMP)

Device Monitoring and Troubleshooting

CPU and Memory Monitoring

Troubleshooting Device Issues

Summary

Part II: Firewall Technology

Chapter 4 Controlling Network Access

Packet Filtering

Types of ACLs

Comparing ACL Features

Configuring Traffic Filtering

Thru-Traffic Filtering via CLI

Thru-Traffic Filtering via ASDM

To-The-Box-Traffic Filtering

Set Up an IPv6 ACL (Optional)

Advanced ACL Features

Object Grouping

Standard ACLs

Time-Based ACLs

Downloadable ACLs

ICMP Filtering

Content and URL Filtering

Content Filtering

URL Filtering

Deployment Scenarios for Traffic Filtering

Using ACLs to Filter Inbound Traffic

Using Websense to Enable Content Filtering

Monitoring Network Access Control

Monitoring ACLs

Monitoring Content Filtering

Understanding Address Translation

Network Address Translation

Port Address Translation

Address Translation and Interface Security Levels

Packet Flow Sequence

Security Protection Mechanisms Within Address Translation

Configuring Address Translation

Bypassing Address Translation

NAT Order of Operation

Integrating ACLs and NAT

DNS Doctoring

Monitoring Address Translations

Summary

Chapter 5 IP Routing

Configuring Static Routes

Static Route Monitoring

Displaying the Routing Table

RIP

Configuring RIP

RIP Authentication

RIP Route Filtering

Configuring RIP Redistribution

Troubleshooting RIP

OSPF

Configuring OSPF

Troubleshooting OSPF

EIGRP

Configuring EIGRP

Troubleshooting EIGRP

IP Multicast

IGMP Stub Mode

PIM Sparse Mode

Configuring Multicast Routing

Troubleshooting IP Multicast Routing

Summary

Chapter 6 Authentication, Authorization, and Accounting (AAA)

AAA Protocols and Services Supported by Cisco ASA

RADIUS

TACACS+

RSA SecurID

Microsoft Windows NT

Active Directory and Kerberos

Lightweight Directory Access Protocol

HTTP Form Protocol

Defining an Authentication Server

Configuring Authentication of Administrative Sessions

Authenticating Telnet Connections

Authenticating SSH Connections

Authenticating Serial Console Connections

Authenticating Cisco ASDM Connections

Authenticating Firewall Sessions (Cut-Through Proxy Feature)

Authentication Timeouts

Customizing Authentication Prompts

Configuring Authorization

Command Authorization

Configuring Downloadable ACLs

Configuring Accounting

RADIUS Accounting

TACACS+ Accounting

Troubleshooting Administrative Connections to Cisco ASA

Troubleshooting Firewall Sessions (Cut-Through Proxy)

Summary

Chapter 7 Application Inspection

Enabling Application Inspection

Selective Inspection

Computer Telephony Interface Quick Buffer Encoding Inspection

Distributed Computing Environment Remote Procedure Calls (DCERPC)

Domain Name System

Extended Simple Mail Transfer Protocol

File Transfer Protocol

General Packet Radio Service Tunneling Protocol

GTPv0

GTPv1

Configuring GTP Inspection

H.323

H.323 Protocol Suite

H.323 Version Compatibility

Enabling H.323 Inspection

Direct Call Signaling and Gatekeeper Routed Control Signaling

T.38

Unified Communications Advanced Support

Phone Proxy

TLS Proxy

Mobility Proxy

Presence Federation Proxy

HTTP

Enabling HTTP Inspection

ICMP

ILS

Instant Messenger (IM)

IPSec Pass-Through

MGCP

NetBIOS

PPTP

Sun RPC

RSH

RTSP

SIP

Skinny (SCCP)

SNMP

SQL*Net

TFTP

WAAS

XDMCP

Summary

Chapter 8 Virtualization

Architectural Overview

System Execution Space

Admin Context

User Context

Packet Classification

Packet Flow in Multiple Mode

Configuration of Security Contexts

Step 1: Enable Multiple Security Contexts Globally

Step 2: Set Up the System Execution Space

Step 3: Allocate Interfaces

Step 4: Specify a Configuration URL

Step 5: Configure an Admin Context

Step 6: Configure a User Context

Step 7: Manage the Security Contexts (Optional)

Step 8: Resource Management (Optional)

Deployment Scenarios

Virtual Firewalls That Use Non-Shared Interfaces

Virtual Firewalls That Use a Shared Interface

Monitoring and Troubleshooting the Security Contexts

Monitoring

Troubleshooting

Summary

Chapter 9 Transparent Firewalls

Architectural Overview

Single-Mode Transparent Firewalls

Multimode Transparent Firewalls

Restrictions Within Transparent Firewalls

Transparent Firewalls and VPNs

Transparent Firewalls and NAT

Configuration of Transparent Firewalls

Configuration Guidelines

Configuration Steps

Deployment Scenarios

SMTF Deployment

MMTF Deployment with Security Contexts

Monitoring and Troubleshooting the Transparent Firewalls

Monitoring

Troubleshooting

Summary

Chapter 10 Failover and Redundancy

Architectural Overview

Conditions that Trigger Failover

Failover Interface Tests

Stateful Failover

Hardware and Software Requirements

Types of Failover

Interface-Level Failover

Failover Configuration

Device-Level Redundancy Configuration

ASDM Failover Wizard Configuration

Interface Level Redundancy Configuration

Optional Failover Commands

Zero-Downtime Software Upgrade

Deployment Scenarios

Active/Standby Failover in Single Mode

Active/Active Failover in Multiple Security Contexts

Monitoring and Troubleshooting Failovers

Monitoring

Troubleshooting

Summary

Chapter 11 Quality of Service

QoS Types

Traffic Prioritization

Traffic Policing

Traffic Shaping

QoS Architecture

Packet Flow Sequence

Packet Classification

QoS and VPN Tunnels

Configuring Quality of Service

QoS Configuration via ASDM

QoS Configuration via CLI

QoS Deployment Scenarios

QoS for VoIP Traffic

QoS for the Remote-Access VPN Tunnels

Monitoring QoS

Summary

Part III: Intrusion Prevention System (IPS) Solutions

Chapter 12 Configuring and Troubleshooting Intrusion Prevention System (IPS)

Overview of the Adaptive Inspection Prevention Security Services Module (AIP-SSM) and Adaptive Inspection Prevention Security Services Card (AIP-SSC)

AIP-SSM and AIP-SSC Management

Inline Versus Promiscuous Mode

Cisco IPS Software Architecture

MainApp

SensorApp

Attack Response Controller

AuthenticationApp

cipsWebserver

Logger

EventStore

CtlTransSource

Configuring the AIP-SSM

Introduction to the CIPS CLI

User Administration

AIP-SSM Maintenance

Adding Trusted Hosts

Upgrading the CIPS Software and Signatures

Displaying Software Version and Configuration Information

Backing Up Your Configuration

Displaying and Clearing Events

Advanced Features and Configuration

Custom Signatures

IP Logging

Configuring Blocking (Shunning)

Cisco Security Agent Integration

Anomaly Detection

Cisco ASA Botnet Detection

Dynamic and Administrator Blacklist Data

DNS Snooping

Traffic Classification

Summary

Chapter 13 Tuning and Monitoring IPS

IPS Tuning

Disabling IPS Signatures

Retiring IPS Signatures

Monitoring and Tuning the AIP-SSM Using CS-MARS

Adding the AIP-SSM in CS-MARS

Tuning the AIP-SSM Using CS-MARS

Displaying and Clearing Statistics

Summary

Part IV: Content Security

Chapter 14 Configuring Cisco Content Security and Control Security Services Module

Initial CSC SSM Setup

Configuring CSC SSM Web-Based Features

URL Blocking and Filtering

File Blocking

HTTP Scanning

Configuring CSC SSM Mail-Based Features

SMTP Scanning

SMTP Anti-Spam

SMTP Content Filtering

POP3 Support

Configuring CSC SSM File Transfer Protocol (FTP)

Configuring FTP Scanning

FTP File Blocking

Summary

Chapter 15 Monitoring and Troubleshooting the Cisco Content Security and Control Security Services Module

Monitoring the CSC SSM

Detailed Live Event Monitoring

Configuring Syslog

Troubleshooting the CSC SSM

Re-Imaging the CSC SSM

Password Recovery

Configuration Backup

Upgrading the CSC SSM Software

CLI Troubleshooting Tools

Summary

Part V: Virtual Private Network (VPN) Solutions

Chapter 16 Site-to-Site IPSec VPNs

Preconfiguration Checklist

Configuration Steps

Step 1: Enable ISAKMP

Step 2: Create the ISAKMP Policy

Step 3: Set Up the Tunnel Groups

Step 4: Define the IPSec Policy

Step 5: Create a Crypto Map

Step 6: Configure Traffic Filtering (Optional)

Step 7: Bypass NAT (Optional)

Alternate Configuration Methods Through ASDM

Advanced Features

OSPF Updates over IPSec

Reverse Route Injection

NAT Traversal

Tunnel Default Gateway

Management Access

Perfect Forward Secrecy

Modifying Default Parameters

Security Association Lifetimes

Phase 1 Mode

Connection Type

ISAKMP Keepalives

IPSec and Packet Fragmentation

Deployment Scenarios

Single Site-to-Site Tunnel Configuration Using NAT-T

Fully Meshed Topology with RRI

Monitoring and Troubleshooting Site-to-Site IPSec VPNs

Monitoring Site-to-Site VPNs

Troubleshooting Site-to-Site VPNs

Summary

Chapter 17 IPSec Remote-Access VPNs

Cisco IPSec Remote Access VPN Solution

IPSec Remote-Access Configuration Steps

Step 2: Create the ISAKMP Policy

Step 3: Set Up Tunnel and Group Policies

Step 4: Define the IPSec Policy

Step 5: Configure User Authentication

Step 6: Assign an IP Address

Step 7: Create a Crypto Map

Step 8: Configure Traffic Filtering (Optional)

Step 9: Bypass NAT (Optional)

Step 10: Set Up Split Tunneling (Optional)

Step 11: Assign DNS and WINS (Optional)

Alternate Configuration Method through ASDM

Cisco VPN Client Configuration

Advanced Cisco IPSec VPN Features

Tunnel Default Gateway

Transparent Tunneling

IPSec Hairpinning

VPN Load Balancing

Client Firewalling

Hardware-Based Easy VPN Client Features

L2TP Over IPSec Remote Access VPN Solution

L2TP over IPSec Remote-Access Configuration Steps

Windows L2TP over IPSec Client Configuration

Deployment Scenarios

Load Balancing of Cisco IPSec Clients and Site-to-Site Integration

L2TP over IPSec with Traffic Hairpinning

Monitoring and Troubleshooting Cisco Remote-Access VPN

Monitoring Cisco Remote Access IPSec VPNs

Troubleshooting Cisco IPSec VPN Clients

Summary

Chapter 18 Public Key Infrastructure (PKI)

Introduction to PKI

Certificates

Certificate Authority (CA)

Certificate Revocation List

Simple Certificate Enrollment Protocol

Installing Certificates

Installing Certificates Through ASDM

Installing Certificates Using the CLI

The Local Certificate Authority

Configuring the Local CA Through ASDM

Configuring the Local CA Using the CLI

Enrolling Local CA Users Through ASDM

Enrolling Local CA Users Through the CLI

Configuring IPSec Site-to-Site Tunnels Using Certificates

Configuring the Cisco ASA to Accept Remote-Access IPSec VPN Clients Using Certificates

Enrolling the Cisco VPN Client

Configuring the Cisco ASA

Troubleshooting PKI

Time and Date Mismatch

SCEP Enrollment Problems

CRL Retrieval Problems

Summary

Chapter 19 Clientless Remote-Access SSL VPNs

SSL VPN Design Considerations

User Connectivity

ASA Feature Set

Infrastructure Planning

Implementation Scope

SSL VPN Prerequisites

SSL VPN Licenses

Client Operating System and Browser and Software Requirements

Infrastructure Requirements

Pre-SSL VPN Configuration Guide

Enroll Digital Certificates (Recommended)

Set Up Tunnel and Group Policies

Set Up User Authentication

Clientless SSL VPN Configuration Guide

Enable Clientless SSL VPN on an Interface

Configure SSL VPN Portal Customization

Configure Bookmarks

Configure Web-Type ACLs

Configure Application Access

Configure Client-Server Plug-ins

Cisco Secure Desktop

CSD Components

CSD Requirements

CSD Architecture

Configuring CSD

Host Scan

Host Scan Modules

Configuring Host Scan

Dynamic Access Policies

DAP Architecture

DAP Sequence of Events

Configuring DAP

Deployment Scenarios

Step 1: Define Clientess Connections

Step 2: Configure DAP

Monitoring and Troubleshooting SSL VPN

Monitoring SSL VPN

Troubleshooting SSL VPN

Summary

Chapter 20 Client-Based Remote-Access SSL VPNs

SSL VPN Deployment Considerations

AnyConnect Licenses

Cisco ASA Design Considerations

SSL VPN Prerequisites

Client Operating System and Browser and Software Requirements

Infrastructure Requirements

Pre-SSL VPN Configuration Guide

Enrolling Digital Certificates (Recommended)

Setting Up Tunnel and Group Policies

Setting Up User Authentication

AnyConnect VPN Client Configuration Guide

Loading the AnyConnect Package

Defining AnyConnect SSL VPN Client Attributes

Advanced Full Tunnel Features

AnyConnect Client Configuration

Deployment Scenario of AnyConnect Client

Step 1: Set Up CSD For Registry Check

Step 2: Set Up RADIUS for Authentication

Step 3: Configure AnyConnect SSL VPN

Step 4: Enable Address Translation for Internet Access

Monitoring and Troubleshooting AnyConnect SSL VPNs

Monitoring SSL VPN

Troubleshooting SSL VPN

Summary

Index

Icons Used in This Book

image

Command Syntax Conventions

The conventions used to present command syntax in this book are the same conventions used in the IOS Command Reference. The Command Reference describes these conventions as follows:

Boldface indicates commands and keywords that are entered literally as shown. In actual configuration examples and output (not general command syntax), boldface indicates commands that are manually input by the user (such as a show command).

Italic indicates arguments for which you supply actual values.

• Vertical bars (|) separate alternative, mutually exclusive elements.

• Square brackets ([ ]) indicate an optional element.

• Braces ({ }) indicate a required choice.

• Braces within brackets ([{ }]) indicate a required choice within an optional element.

Introduction

Network security has always been a challenge for many organizations that cannot deploy separate devices to provide firewall, intrusion prevention, and virtual private network (VPN) services. The Cisco ASA is a high-performance, multifunction security appliance that offers firewall, IPS, network antivirus, and VPN services. The Cisco ASA delivers these features through improved network integration, resiliency, and scalability.

This book is an insider’s guide to planning, implementing, configuring, and troubleshooting the Cisco Adaptive Security Appliances. It delivers expert guidance from senior Cisco network security consulting engineers. It demonstrates how adaptive identification and mitigation services on the Cisco ASA provide a sophisticated network security solution to small, medium, and large organizations. This book brings together expert guidance for virtually every challenge you will face—from building basic network security policies to advanced VPN and IPS implementations.

Who Should Read This Book?

This book serves as a guide for any network professional who manages network security or installs and configures firewalls, VPN devices, or intrusion detection/prevention systems. It encompasses topics from an introductory level to advanced topics on security and VPNs. The requirements of the reader include a basic knowledge of TCP/IP and networking.

How This Book Is Organized

This book has five parts, which provide a Cisco ASA product introduction and then focus on firewall features, intrusion prevention, content security, and VPNs. Each part includes many sample configurations, accompanied by in-depth analyses of design scenarios. Your learning is further enhanced by a discussion of a set of debugs included in each technology. Ground-breaking features, such as SSL VPN and virtual and Layer 2 firewalls, are discussed extensively.

The core chapters, Chapters 2 through 12, cover the following topics:

Part I, “Product Overview,” includes the following chapters:

Chapter 1, “Introduction to Security Technologies”—This chapter provides an overview of different technologies that are supported by the Cisco ASA and widely used by today’s network security professionals.

Chapter 2, “Cisco ASA Product and Solution Overview”—This chapter describes how the Cisco ASA incorporates features from each of these products, integrating comprehensive firewall, intrusion detection and prevention, and VPN technologies in a cost-effective, single-box format. Additionally, it provides a hardware overview of the Cisco ASA, including detailed technical specifications and installation guidelines. It also covers an overview of the Adaptive Inspection and Prevention Security Services Module (AIP-SSM) and Content Security and Control Security Services Module (CSC-SSM).

Chapter 3, “Initial Setup and System Maintenance”—A comprehensive list of initial setup tasks and system maintenance procedures is included in this chapter. These tasks and procedures are intended to be used by network professionals who will be installing, configuring, and managing the Cisco ASA.

Part II, “Firewall Technology,” includes the following chapters:

Chapter 4, “Controlling Network Access”—The Cisco ASA can protect one or more networks from intruders. Connections between these networks can be carefully controlled by advanced firewall capabilities, enabling you to ensure that all traffic from and to the protected networks passes only through the firewall based on the organization’s security policy. This chapter shows you how to implement your organization’s security policy, using the features the Cisco ASA provides.

Chapter 5, “IP Routing”—This chapter covers the different routing capabilities of the Cisco ASA.

Chapter 6, “Authentication, Authorization, and Accounting (AAA)”—The Cisco ASA supports a wide range of AAA features. This chapter provides guidelines on how to configure AAA services by defining a list of authentication methods applied to various implementations.

Chapter 7, “Application Inspection”—The Cisco ASA stateful application inspection helps to secure the use of applications and services in your network. This chapter describes how to use and configure application inspection.

Chapter 8, “Virtualization”—The Cisco ASA virtual firewall feature introduces the concept of operating multiple instances of firewalls (contexts) within the same hardware platform. This chapter shows how to configure and troubleshoot each of these security contexts.

Chapter 9, “Transparent Firewalls”—This chapter introduces the transparent (Layer 2) firewall model within the Cisco ASA. It explains how users can configure the Cisco ASA in transparent single mode and multiple mode while accommodating their security needs.

Chapter 10, “Failover and Redundancy”—This chapter discusses the different redundancy and failover mechanisms that the Cisco ASA provides. It includes not only the overview and configuration, but also detailed troubleshooting procedures.

Chapter 11, “Quality of Service”—QoS is a network feature that lets you give priority to certain types of traffic. This chapter covers how to configure and troubleshoot QoS in the Cisco ASA.

Part III, “Intrusion Prevention System (IPS) Solutions,” includes the following chapters:

Chapter 12, “Configuring and Troubleshooting Intrusion Prevention System (IPS)”—Intrusion detection and prevention systems provide a level of protection beyond the firewall by securing the network against internal and external attacks and threats. This chapter describes the integration of Intrusion Prevention System (IPS) features within the Cisco ASA and expert guidance on how to configure the AIP-SSM IPS software. Troubleshooting scenarios are also included to enhance learning.

Chapter 13, “Tuning and Monitoring IPS”—This chapter covers the IPS tuning process, as well as best practices on how to monitor IPS events.

Part IV, “Content Security,” includes the following chapters:

Chapter 14, “Configuring Cisco Content Security and Control Security Services Module”—The Content Security and Control Security Services Module (CSCSSM) is used to detect and take action on viruses, worms, Trojans, and other security threats. It supports the inspection of SMTP, POP3, HTTP, and FTP network traffic. This chapter provides configuration and troubleshooting guidelines to successfully deploy the CSC-SSM within your organization.

Chapter 15, “Monitoring and Troubleshooting the Cisco Content Security and Control Security Services Module”—This chapter provides best practices and methodologies used while monitoring the CSC-SSM and troubleshooting any problems you may encounter.

Part V, “Virtual Private Network (VPN) Solutions,” includes the following chapters:

Chapter 16, “Site-to-Site IPSec VPNs”—The Cisco ASA supports IPSec VPN features that enable you to connect networks in different geographic locations. This chapter provides configuration and troubleshooting guidelines to successfully deploy site-to-site IPSec VPNs.

Chapter 17, “IPSec Remote-Access VPNs”—This chapter discusses two IPSec remote-access VPN solutions (Cisco IPSec and L2TP over IPSec) that are supported on the Cisco ASA. A large number of sample configurations and troubleshooting scenarios are provided.

Chapter 18, “Public Key Infrastructure (PKI)”—This chapter starts by introducing PKI concepts. It then covers the configuration and troubleshooting of PKI in the Cisco ASA.

Chapter 19, “Clientless Remote-Access SSL VPNs”—This chapter provides details about the Clientless SSL VPN functionality in Cisco ASA. This chapter covers the Cisco Secure Desktop (CSD) solution in detail and also discusses the Host Scan feature that is used to collect posture information about end-workstations. The dynamic access policy (DAP) feature, its usage, and detailed configuration examples are also provided. To reinforce learning, many different deployment scenarios are presented along with their configurations.

Chapter 20, “Client-Based Remote-Access SSL VPNs”—This chapter provides details about the AnyConnect SSL VPN functionality in Cisco ASA.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.96.188