SlideShare uma empresa Scribd logo
1 de 21
ASA55xx Series
Cisco’s series of Adaptive Security Appliances
Bryley Systems Inc.
Business Technology Solutions Since 1987
Agenda
• Default Capabilities
• Models
• Optional Capabilities
ASA Capabilities
• Stateful/Deep Packet Inspection Firewall
• IPSec VPN Endpoint
• SSL VPN Endpoint
• Virtualization
• Anti-X
• Intrusion Prevention
Firewall
• Default firewall rules
– Outbound traffic is allowed unless otherwise
specified
– Inbound traffic is denied unless otherwise
specified
• Stateful packet inspection ensures that
responses to outbound traffic match outgoing
requests
ASA Firewall
• ASA assigns a security level to each interface
– inside is 100, outside (Interent) is 0, DMZ is
typically assigned 50
– Default rules allow free flow from higher security
level to lower security 0 level
• NAT/PAT
– Allows for more servers with fewer public Ips
• Deep packet inspection
IPSec VPN
• Used for LAN-to-LAN connections
• Workstation clients for Windows, Macintosh,
Linux
• Maximum connections depends on model
• No additional licenses required
• EasyVPN
– Simplified configuration
– Inbound connections only
SSL VPN
• No pre-installed client – connect with web
browser
• Licensed by simultaneous connections (2
connections permitted for testing)
• Clientless connection
– Simplest configuration
– Limited to web applications
– Some client-server applications are SSL VPN aware
SSL VPN
• Cisco AnyConnect VPN client
• Downloaded on-the-fly
• Full network access (if desired)
• Windows/Macintosh/Linux
• May not function of user rights on client
computer limited
IPSec vs SSL
IPSec
• Workstation configuration
required
• Administrator can configure
VPN then restrict user
access
• Access as if client machine
on LAN
• Has pre-shared key in
addition to user password
• No additional cost
SSL
• Browser-based from any
computer
• Limited access if user does
not have right to install
applications
• Need to use web applictions
to ensure access
• Vulnerable to password
compromise
• Extra cost feature
ASA Models
• ASA550x - SOHO/Telecommuter
• ASA551x
• ASA552x
• ASA554x
• ASA555x - Large enterprise
• ASA558x - Datacenter/ISP
Main Office, Integrated
Protection
http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
ASA550x – Base License
• 10/50/Unlimited internal devices
• 10 Simultaneous VPNs
• 8 10/100 Ethernet ports – assigned to VLANs
• 2 Power over Ethernet
• 3 VLANs
• One VLAN must be isolated from
communicating with one of the others.
ASA550x – Telecommuter setup
ASA550x – Security Plus
• 25 Simultaneous VPNs
• Ports must be assigned to one of three
interfaces, up to 20 trunked VLANs permitted
• Communications between interfaces restriced
by standard firewall rules
• Failover to backup ISP for outbound access
ASA551x – Base License
• 250 Simultaneous VPNs
• 3 – 10/100 Ethernet ports – Firewall interfaces
• 1 – 10/100 Ethernet port – Management only
• Up to 50 Trunked VLANs
• SSM Slot for Content Filter or Intrusion
Prevention Module
ASA551x – Security Plus License
• 250 Simultaneous VPNs
• 3 – 10/100 Ethernet ports
• 2 – 10/100/1000 Ethernet ports
• Up to 100 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/5 maximum Security Contexts
ASA552x
• 750 Simultaneous VPNs
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• Up to 150 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/20 maximum Security Contexts
ASA554x
• 5000 Simultaneous VPNs (2500 SSL)
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• Up to 200 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/50 maximum Security Contexts
ASA555x
• 5000 Simultaneous VPNs
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• 4 ports selectable 1000T/SFP Fiber ports
• Up to 250 Trunked VLANs
• No SSM Slot
• 2 included/50 maximum Security Contexts
Content Security and Control Module
• Standard License
– Anti-virus
– Anti-Spyware
– File blocking
• Plus License adds
– Anti-SPAM
– URL Filter
– E-mail content control
Content Security and Control Module
• CSC-SSM-10
– 50/100/250/500 users
– ASA5510 and ASA5520
• CSC-SSM-20
– 750/1000 users
– ASA5510 , ASA5520, ASA5540
• Subscription required for updates
Advanced Intrusion Prevention
• Compares every packet against a signature
database
• Alerting or automatic blocking
• Update subscription required

Mais conteúdo relacionado

Mais procurados

10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy conceptsMostafa El Lathy
 
TechWiseTV Workshop: Software-Defined Access
TechWiseTV Workshop: Software-Defined AccessTechWiseTV Workshop: Software-Defined Access
TechWiseTV Workshop: Software-Defined AccessRobb Boyd
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces conceptsMostafa El Lathy
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus seriesAnwesh Dixit
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptxEmanHashem6
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersNetProtocol Xpert
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 

Mais procurados (20)

10 palo alto nat policy concepts
10 palo alto nat policy concepts10 palo alto nat policy concepts
10 palo alto nat policy concepts
 
TechWiseTV Workshop: Software-Defined Access
TechWiseTV Workshop: Software-Defined AccessTechWiseTV Workshop: Software-Defined Access
TechWiseTV Workshop: Software-Defined Access
 
A Software Defined WAN Architecture
A Software Defined WAN ArchitectureA Software Defined WAN Architecture
A Software Defined WAN Architecture
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
SD WAN
SD WANSD WAN
SD WAN
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus series
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Aruba Netwrok(1).pptx
Aruba Netwrok(1).pptxAruba Netwrok(1).pptx
Aruba Netwrok(1).pptx
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
ASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & AnswersASA Firewall Interview- Questions & Answers
ASA Firewall Interview- Questions & Answers
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
What is NAC
What is NACWhat is NAC
What is NAC
 

Semelhante a Cisco ASA Firewalls

4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdfssuser88346b
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Rogelio Gomez
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWSTeri Radichel
 
Aruba 650 ds_a650651
Aruba 650 ds_a650651Aruba 650 ds_a650651
Aruba 650 ds_a650651opptecnologia
 
Adopting Modern SSL / TLS
Adopting Modern SSL / TLSAdopting Modern SSL / TLS
Adopting Modern SSL / TLSAvi Networks
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgEric Vanderburg
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgEric Vanderburg
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptxPrakash Singh
 

Semelhante a Cisco ASA Firewalls (20)

4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Unit08
Unit08Unit08
Unit08
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
Aruba 650 ds_a650651
Aruba 650 ds_a650651Aruba 650 ds_a650651
Aruba 650 ds_a650651
 
Adopting Modern SSL / TLS
Adopting Modern SSL / TLSAdopting Modern SSL / TLS
Adopting Modern SSL / TLS
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall
FirewallFirewall
Firewall
 
Vpn
VpnVpn
Vpn
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptx
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Cisco ASA Firewalls

  • 1. ASA55xx Series Cisco’s series of Adaptive Security Appliances Bryley Systems Inc. Business Technology Solutions Since 1987
  • 2. Agenda • Default Capabilities • Models • Optional Capabilities
  • 3. ASA Capabilities • Stateful/Deep Packet Inspection Firewall • IPSec VPN Endpoint • SSL VPN Endpoint • Virtualization • Anti-X • Intrusion Prevention
  • 4. Firewall • Default firewall rules – Outbound traffic is allowed unless otherwise specified – Inbound traffic is denied unless otherwise specified • Stateful packet inspection ensures that responses to outbound traffic match outgoing requests
  • 5. ASA Firewall • ASA assigns a security level to each interface – inside is 100, outside (Interent) is 0, DMZ is typically assigned 50 – Default rules allow free flow from higher security level to lower security 0 level • NAT/PAT – Allows for more servers with fewer public Ips • Deep packet inspection
  • 6. IPSec VPN • Used for LAN-to-LAN connections • Workstation clients for Windows, Macintosh, Linux • Maximum connections depends on model • No additional licenses required • EasyVPN – Simplified configuration – Inbound connections only
  • 7. SSL VPN • No pre-installed client – connect with web browser • Licensed by simultaneous connections (2 connections permitted for testing) • Clientless connection – Simplest configuration – Limited to web applications – Some client-server applications are SSL VPN aware
  • 8. SSL VPN • Cisco AnyConnect VPN client • Downloaded on-the-fly • Full network access (if desired) • Windows/Macintosh/Linux • May not function of user rights on client computer limited
  • 9. IPSec vs SSL IPSec • Workstation configuration required • Administrator can configure VPN then restrict user access • Access as if client machine on LAN • Has pre-shared key in addition to user password • No additional cost SSL • Browser-based from any computer • Limited access if user does not have right to install applications • Need to use web applictions to ensure access • Vulnerable to password compromise • Extra cost feature
  • 10. ASA Models • ASA550x - SOHO/Telecommuter • ASA551x • ASA552x • ASA554x • ASA555x - Large enterprise • ASA558x - Datacenter/ISP Main Office, Integrated Protection http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
  • 11. ASA550x – Base License • 10/50/Unlimited internal devices • 10 Simultaneous VPNs • 8 10/100 Ethernet ports – assigned to VLANs • 2 Power over Ethernet • 3 VLANs • One VLAN must be isolated from communicating with one of the others.
  • 13. ASA550x – Security Plus • 25 Simultaneous VPNs • Ports must be assigned to one of three interfaces, up to 20 trunked VLANs permitted • Communications between interfaces restriced by standard firewall rules • Failover to backup ISP for outbound access
  • 14. ASA551x – Base License • 250 Simultaneous VPNs • 3 – 10/100 Ethernet ports – Firewall interfaces • 1 – 10/100 Ethernet port – Management only • Up to 50 Trunked VLANs • SSM Slot for Content Filter or Intrusion Prevention Module
  • 15. ASA551x – Security Plus License • 250 Simultaneous VPNs • 3 – 10/100 Ethernet ports • 2 – 10/100/1000 Ethernet ports • Up to 100 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/5 maximum Security Contexts
  • 16. ASA552x • 750 Simultaneous VPNs • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • Up to 150 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/20 maximum Security Contexts
  • 17. ASA554x • 5000 Simultaneous VPNs (2500 SSL) • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • Up to 200 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/50 maximum Security Contexts
  • 18. ASA555x • 5000 Simultaneous VPNs • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • 4 ports selectable 1000T/SFP Fiber ports • Up to 250 Trunked VLANs • No SSM Slot • 2 included/50 maximum Security Contexts
  • 19. Content Security and Control Module • Standard License – Anti-virus – Anti-Spyware – File blocking • Plus License adds – Anti-SPAM – URL Filter – E-mail content control
  • 20. Content Security and Control Module • CSC-SSM-10 – 50/100/250/500 users – ASA5510 and ASA5520 • CSC-SSM-20 – 750/1000 users – ASA5510 , ASA5520, ASA5540 • Subscription required for updates
  • 21. Advanced Intrusion Prevention • Compares every packet against a signature database • Alerting or automatic blocking • Update subscription required

Notas do Editor

  1. ASA is a stateful packet inspection firewall. Some protocols are inspected at a other layers Anti-X – anti-virus, anti-spy, file filter, anti-spam, url filter
  2. Stateful packet inspection has been standard for ALMOST 10 years, some early low-cost NAT devices lacked it.
  3. Typical firewalls allow for one of each type of server on a single pubic IP. Multiple Ips must be assigned one to one to internal servers. PAT allows for one server per protocol per public IP. Not exclusive to Cisco, but not typically found on low end fuirewalls. Deep packet inspection performs basic checks for validity on some protocols.