Cisco ASA 5500 LAB Guide: Ingram Micro
Cisco ASA 5500 LAB Guide: Ingram Micro
MICRO
Cisco ASA 5500 LAB Guide
Ingram Micro
4/1/2009
The following LAB Guide will provide you with the basic steps involved in performing some
fundamental configurations on a Cisco ASA 5500 series security appliance.
Table of Contents
Select yes by hitting enter to configure the ASA via interactive prompts.
There are two options when configuring the firewall mode: routed and transparent. Traditionally, a
firewall is a routed hop and acts as a default gateway for hosts that connect to one of its screened
subnets. A transparent firewall, on the other hand, is a Layer 2 firewall that acts like a "bump in
the wire" and is not seen as a router hop to connected devices. The security appliance connects
the same network on its inside and outside interfaces. Because the firewall is not a routed hop,
you can easily introduce a transparent firewall into an existing network; IP readdressing is
unnecessary. In routed mode, the security appliance can perform NAT between connected
networks, and can use OSPF or RIP.
Select “transparent” as the firewall mode for this portion of the lab.
Configure the time and date settings for the appliance. The correct time is an important factor for
Syslog time stamps, certificate time stamps, logging of audit and messaging data, etc.
Configure the IP address and network mask of the management interface. Give the ASA a
hostname and domain. Configure the IP address of the management station. For this lab, we are
configuring the following:
You will notice that the security level of the inside interface is set by default. This is actually
setting the security level of VLAN 1, and not a specific interface.
You will also notice that the HTTP server has not been enabled on the appliance. In order to
connect to the ASA via ASDM, the HTTP server will need to be enabled.
From here, you can continue to configure the ASA 5505 from the command line. It is not
necessary to go through the initial configuration dialogue every time you set up an ASA. If you
like, you can opt out of the script by entering “no” when you’re asked if you want to configure the
firewall through interactive prompts.
Because we want to continue the lab by configuring the ASA from ASDM, we will want to restore
the factory default configuration.
If you need to revert back to these changes after a configuration, you can do so by entering the
configure factory-default command.
Reset the ASA to factory default by entering Configuration mode and entering the configure
factory-default command.
You can then save the configuration by entering the write memory command, or by entering the
reload command and selecting the yes option to save the changed configuration.
Launch the Cisco Adaptive Security Device Manager from Start > Programs.
When ASDM loads, connect to the default IP address of the appliance (192.168.1.1). By default,
the username is blank and the password is cisco.
Accept the security certificate by selecting Always in the Security Warning dialogue box.
When ASDM loads, you will be brought to the Home screen of the application.
At this time, spend time navigating ASDM to become familiar with the screens and available
options.
Because the configuration is presently set to factory default, there are some basic configuration
changes that need to be made. We will set up the basic configuration from the Startup Wizard.
Step 1 will ask you if you would like to modify the existing configuration, or if you would like to
reset the appliance to factory default.
Since we’ve already set the box to factory default, we will proceed by selecting the Modify
Existing Configuration option. When you are done, click Next.
Step 2 will ask us to provide a hostname, domain name, and Privileged Exec level passwords for
the appliance.
Since the default password is cisco, we will not be changing it in this lab.
The hostname is the name used to identify the appliance. It will appear in the command line
prompt.
The domain name will be appended to all unqualified domain names.
The Auto Update specification allows the Auto Update server to either push configuration
information to the security appliance, or to pull configuration information by causing the security
appliance to periodically poll the Auto Update server. The Auto Update server can also send a
command to the security appliance to send an immediate polling request at any time.
For the purpose of this lab, we will not be configuring an Auto Update Server. Click Next to
continue.
The Outside interface is the untrusted interface that connects to the Internet, and is identified by
the VLAN a particular interface belongs to. Untrusted interfaces are assigned a security level of 0.
By default, the ASA 5505’s configuration specifies that VLAN 2 is an untrusted VLAN with a
security level of 0, and applies these settings to E0/0. Verify the settings are correct and that the
Outside interface is configured to accept an IP address via DHCP, and then click next.
Inside interfaces are the trusted interfaces belonging to your network, and are also identified by
the VLAN a particular interface belongs to. Trusted interfaces are assigned a security level of
100. By default, the ASA 5505’s configuration specifies that VLAN 1 is a trusted VLAN with a
security level of 100, and applies these settings to interfaces E0/1 – E0/7. Verify the settings are
correct and that the Inside interface is configured to have an IP address of 192.168.1.1 with a
mask of 255.255.255.0.
Since both default VLANs have been assigned to the Outside and Inside interfaces, we will need
to create a new VLAN. Accept the default VLAN of 3, and then enable the interface by clicking the
radio button. Accept the default security level of 50. Security levels will be discussed in the next
few steps.
On this screen, you will see which switch ports belong to which VLANs. Here you can add or
remove interfaces under each configured VLAN.
You should notice that VLAN 3, which is our newly created DMZ VLAN, does not have any
interfaces assigned to it. Select interface E0/1, and assign it to VLAN 3 (the DMZ VLAN).
In the ASA 5505’s default configuration, the DMZ is seen as a home network, with the Outside
interface being the Internet connection, and the Inside interface a business network. By design,
an interface with a high security level can communicate down to an interface with a lower security
level, but not vice versa.
The default security level for the DMZ is 50. This means that the Inside interface (security level of
100) can initiate communication to the DMZ and the Outside interface (security level of 0), the
DMZ can initiate communication to the Outside interface but not the Inside interface, and the
Outside interface cannot initiate communication to either the Inside interface or the DMZ.
On the General Interface Configuration you can control how interfaces with different security level
interact.
Check the options to enable traffic between 2 or more interfaces with the same security level, and
to enable traffic between 2 or more hosts connected to the same interface.
Restricted traffic is not an optional configuration. If you only have a restricted license, you must
restrict from one interface to any of the other interfaces. Typically, this is the traffic from the DMZ
to the inside interface, but any pair can be chosen. The Restrict Traffic area fields are hidden if
you have a full license or if the device is in transparent mode. Restrict traffic from VLAN 3 to
VLAN 1.
The static routes configured here will use the Outside interface to send all traffic to the next hop.
If you want to configure a default route, you can set the IP address and network mask to 0.0.0.0.
In this step, we will configure the DHCP settings of the ASA server. Since we currently have no
reason to change the settings, select the default values and click Next.
At this time we will not be setting up Network Address Translation, but we will be configuring Port
Address Translation. Verify the options to configure PAT are selected, and then click Next.
Here you can configure an IP address range or a specific host for ASDM administrative
permissions to the appliance.
If you want to maintain the appliance via ASDM, you will need to make sure the Enable HTTP
server for HTTPS/ASDM access box is checked.
Check the box to enable ASDM History Metrics. History metrics will keep a history of various
statistics, which can be displayed by ASDM on any Graph/Table. If you do not enable history
metrics, you can only monitor statistics in real time. Enabling history metrics lets you view
statistics graphs from the last 10 minutes, 60 minutes, 12 hours, and 5 days.
Accept the default IP range of 192.168.1.0 with a mask of 255.255.255.0, and click Next.
Step 14 will ask you to verify the configuration, and then send your changes to the ASA.
When you are prompted for a username and password, use the following credentials:
Username: [blank]
Password: cisco
To see the changes you’ve made, click Tools > Command Line Interface
1. Physical interfaces – The 5505 has eight switch ports, two of which are PoE ports. This
switching is done in hardware at layer 2.
2. Logical VLAN interfaces – The 5505 supports a variable number of VLANs depending
on your license and the firewall mode. If you’re operating in transparent mode, you have
a maximum of 2 allowable VLANs. If you are operating in routed mode, you can configure
up to 3 VLANs with the Base license, and 20 VLANs with the Security Plus License.
If you are unsure of which license you have, click the Home button on the navigation pane, and
click the License tab.
Some of the VLANs and interfaces have already been configured in the Startup Wizard. If you
click the Interfaces button on the navigation pane, you can view or make changes to your
configuration.
The Interfaces tab gives you an idea of which VLAN, security level, and IP address belong to a
particular interface. You can add or edit the interfaces by clicking the appropriate buttons on the
right.
The Switch Ports tab gives you information on a per interface basis, as well as speed and duplex
information for each physical interface.
You can also edit the properties of an interface by clicking the Edit button.
Since all of the switching was preconfigured, you have completed this section of the lab.
In the Startup Wizard, we configured PAT. In this lab we will be configuring NAT.
Start by clicking the Configure button, and then clicking the NAT button.
We will want to add an entry for the Inside VLAN. Click the default NAT rule, and then click the
Edit button.
Click Tools > Command Line, and enter the command sho run to see what changes you have
made.
Go back to the NAT rule you just created. Click the Edit button.
Under Dynamic Translation, select the Outside interface and click Edit. This will bring up a new
window where you can edit the translation rules.
Remove the generic Outside interface address pool by highlighting it, and selecting the Delete
option.
If you go back to Tools > Command Line and execute the sho run command, you will now see the
complete NAT configuration.
NOTE: If you’re doing a packet trace, make sure the traffic type you’re attempting to send is
permitted by the firewall. If it is not, you will see the flow dropped by an ACL configuration.
Every inbound packet is checked using the Adaptive Security Algorithm unless a connection is
already established. By default on the security appliance, no traffic can pass through the firewall
unless you add an access list to allow it.
To allow traffic that is normally denied by the Adaptive Security Algorithm, you can add an access
list; for example, you can allow public access to a web server on a DMZ network by adding an
access list to the outside interface.
Check the implicit rules by clicking Security Policy on the navigation pane.
Here you can see how access lists have been created to manipulate the behaviour of traffic
flowing from a VLAN with one security level to another. If you want to see how these access lists
behave, you can test them in Packet tracer. You will need an external connection to test packet
flow with Packet tracer.
For the sake of this lab, let’s assume you had an FTP server residing on the DMZ. In order for the
FTP server to be accessible from the outside world, we would need to add an access list to the
configuration.
In the Add Access Rule dialogue box, configure the following parameters:
Source
Source – any
Destination
Type – IP address
IP Address –172.16.1.100
Netmask – 255.255.255.255
Options
Logging – enable
Syslog Level – informational
Log Interval – 300
When FTP is operating in active mode, it uses port 21 for control and port 20 for data. We have
completed the portion of the access list that permits control information, but what about data?
Go back and create a new access rule. The parameters for the new access list will be exactly the
same as the one you have just created, but instead of a destination port service of ftp, we will
select the ftp-data service.
NOTE: Creating a rule by itself will NOT permit traffic to a DMZ. Either NAT has to be configured,
or NAT has to be disabled on the DMZ. The ASA is heavily reliant on NAT to get traffic through
the firewall.
You should now see two new access lists applied to the Outside interface.
2. We have identified that any source protocol can access the FTP server, and have
permitted these sources to access the FTP control and data protocols at 172.16.1.100.
The ASA 5505 supports URL filtering by tying in functionality with either a Websense or Secure
Computing SmartFilter server. URL filtering can be leveraged to control internet usage by
blocking access to particular sites or web applications.
When filtering is enabled and a request for content is directed through the security appliance, the
request is sent to the content server and to the filtering server at the same time. If the filtering
server allows the connection, the security appliance forwards the response from the content
server to the originating client. If the filtering server denies the connection, the security appliance
drops the response and sends a message or return code indicating that the connection was not
successful.
The first step to creating a web filter is to identify the filtering server.
Click on Properties in the left hand navigation panel, and then click URL Filtering.
Click the Add button to add a filtering server. When the dialogue box comes up, add the following
information for your server:
Interface – inside
IP Address – 192.168.1.200
Timeout – 30
Protocol – TCP
TCP Connections – 5
Go back to the Secuirty Policies screen, and click the Filter Rules tab.
We are going to set up a web filter to prohibit ActiveX from the Outside interface to the Inside
interface. Instead of blocking entire websites because of content, we are going to filter specific
web applications (in this case, ActiveX) from the ASA.
Click on the Add button, and select the Add Filter for ActiveX Rule option.
If you want to view your changes in CLI, click Tools > Command Line, and enter the command
sho run | be url.
With ASDM, you can use a VPN wizard to configure either of the following types of VPN:
1. Site to Site – creates a LAN to LAN VPN configuration, which is used between two
IPSec gateways.
To set up a new VPN, click the VPN button in the navigation pane on the left, and then click VPN
Wizard.
Step 1 will ask you to select the type of VPN you would like to configure. Since we will be
creating a site to site VPN for this lab, select the option for a site to site setup and then click Next.
What we are doing is identifying the device on the other end of the tunnel, setting a preshared
key which will be used for authentication, and naming the tunnel group.
Using a preshared key is a quick and easy way to set up communication with remote peers. Each
pair of IPSec peers must exchange preshared keys to establish secure tunnels.
The tunnel group name will create a record containing connection properties for this tunnel. This
tunnel group can identify AAA servers, a default group policy, and IKE attributes.
Step 3 will ask you to configure the IKE policy. IKE is the security negotiation protocol that lets
two hosts agree on how to build an IPSec SA (security association). IKE is broken into 2 phases
(the first phase creates a tunnel to protect further IKE messages, and the second phase creates a
tunnel to protect data). To create the policy for Phase 1, we need three pieces of information:
1. An encryption method – The options are DES, 3DES, AES-128, AES-192, and AES-256.
The number specifies how long the keys are in bits.
2. An authentication method – The options are SHA or MD5, and both are hash algorithms.
SHA is considered more secure, but MD5 is faster.
3. A Diffie-Hellman group to establish the strength of the encryption key – This algorithm is
used to derive a shared secret between two peers without actually transmitting it to each
other. The options are 1, 2, 5, or 7.
Encryption: 3DES
Authentication: MD5
DH group: 2
The decision to uses these properties is usually governed by a corporate security policy.
Remember, the stronger the encryption, authentication, and DH groups, the greater the
processing requirement is for the security appliance.
Step 4 will ask you to select the IPSec Encryption and Authentication settings. These settings will
configure IKE for Phase 2, and require two pieces of information:
1. Encryption method – The options are DES, 3DES, AES-128, AES-192, and AES-256
Earlier in the lab we configured our Outside interface to obtain an IP address via DHCP. On the
remote side of this configuration, our peer would have to identify our interface by our hostname.
Configure the local side of the connection by entering an IP address of 192.168.1.0/24 in the IP
address and netmask fields. Optionally, you can select the inside interface by clicking the ellipsis
button.
Configure the remote side of the connection by entering the IP address of the remote network
(192.168.11.0/24) in the IP address and netmask fields.
The “Exempt ASA side host network from address translation” check box allows traffic to flow
through the ASA without address translation.
Step 6 will ask you to review your configuration. When you are done, click Finish
If you would like to verify your settings in CLI, click Tools > Command Line. Notice the new
access lists permitting you access to 192.168.11.0, and the new crypto map statements
associated with the newly configured VPN.
To begin, relaunch the VPN Wizard, selecting the VPN type as Remote Access in Step 1.
Step 2 will ask you to select the type of VPN client to be used by remote users. For this lab,
select Cisco VPN Client, and click Next.
Step 4 will ask you to select a user authentication method. Users can be authenticated by a local
database, or by using external AAA servers.
Since we don’t presently have an AAA server, select the local user database radio button, and
click Next.
Enter a username of vpnuser1 and a password of cisco, then click Add. Click Next to continue.
Step 6 will ask you to enter an address pool. For remote clients to gain access to the network,
you need to configure a pool of addressed that can be assigned to VPN clients as they are
successfully connected.
Step 7 will ask you to configure attributes to push out to clients. Each remote client will need a
basic network configuration including things like DNS and WINS servers.
DNS 1 – 192.168.1.125
DNS 2 – 192.169.1.126
WINS 1 – 192.168.1.127
WINS 2 – 192.168.1.128
Steps 8-9 will ask you to configure the IKE policy and IPSec encryption and authentication
methods. Since we’ve gone over this in the last VPN example, configure the following:
IKE Policy
Encryption: 3DES
Authentication: MD5
DH group: 2
Step 10 will ask you to configure any address translation exemptions and split tunneling. Split
tunneling allows remote users to access a VPN at the same time they are connected to a LAN.
The NAT exception will expose all or part of a network to your remote users.
Since we want our users to see the entire Inside network, add the Inside network to the list of
exceptions by entering the following information:
Interface – Inside
Source Type – IP address
Source IP Address – 192.168.1.0
Since we also want our users to be able to use split tunneling, check the checkbox allowing them
to do so.
Step 11 will ask you to verify the configuration. Click Finish to complete the Wizard.
A Cisco Easy VPN server is responsible for pushing out security policies to remote sites so a
remote site has up to date policies before the connection is established.
A Cisco Easy VPN client would maintain a minimal VPN configuration, and would use this
configuration to connect to an Easy VPN server to pull down a complete configuration.
Since the 5505 is a relatively small device, we will be configuring it as a client in this lab.
To begin, click VPN in the left-hand navigation pane, and the click Easy VPN Remote.
Check the enable Easy VPN Remote checkbox to begin the configuration.
NOTE: because of design, an ASA 5505 cannot run different types of tunnels if it is running Easy
VPN Remote. You will not be able to make changes to IPSec or remote access VPNs while Easy
VPN Remote is enabled.
Easy VPN Remote can operate in one of two modes: client and network extension modes.
Network extension mode makes the inside interface and all inside hosts routable across the
tunnel and on the enterprise network.
For the purpose of this lab, we will be configuring Easy VPN Remote to operate in client mode.
In the Group Setting, select the option for a pre-shared key. Specify a group name of EasyVPN,
and a group password of cisco.
Under User Settings, specify the username and password to be used by the ASA 5505 when
establishing a connection. We will be using EasyVPN1 with a password of cisco.
In the last option, specify an Easy VPN server to connect to. In this lab we will be using
192.168.1.111. When you are done, click the Add button.
When you are done this section, make sure you uncheck the Enable Easy VPN Remote box.