ASA Firewall Configuration and Management Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

119 Terms

1
New cards

Objects

Reusable components for use in configurations.

2
New cards

Object Groups

Support objects and object groups in Cisco ASA configurations.

3
New cards

host

A host address.

4
New cards

fqdn

A fully-qualified domain name.

5
New cards

range

A range of IP addresses.

6
New cards

subnet

An entire IP network or subnet.

<p>An entire IP network or subnet.</p>
7
New cards

Service Object

Specifies an IP protocol name or number.

8
New cards

Object Group

Objects can be grouped together to create an object group.

9
New cards

Access Control Entry (ACE)

An object group can be used in an access control entry instead of having to enter an ACE for each object separately.

10
New cards

Network Object Group

A network-based object group specifies a list of IP host, subnet, or network addresses.

11
New cards

User Object Group

Locally created, as well as imported Active Directory user groups can be defined for use in features that support the identity firewall.

12
New cards

Service Object Group

A service-based object group is used to group TCP, UDP, or TCP and UDP ports into an object.

13
New cards

ICMP-Type Object Group

The ICMP protocol uses unique types to send control messages (RFC 792).

14
New cards

Security Object Group

A security group object group can be used in features that support Cisco TrustSec by including the group in an extended ACL.

15
New cards

ACEs

ACEs are applied to a protocol, a source and destination IP address, a network, or the source and destination ports.

16
New cards

Sequential Processing of ACLs

ACLs are processed sequentially from top down.

17
New cards

Criteria Match

A criteria match will cause the ACL to be exited.

18
New cards

Implicit Deny

There is an implicit deny any at the bottom of an ACL.

19
New cards

Remarks in ACLs

Remarks can be added per ACE or ACL.

20
New cards

Time-Based ACLs

ACLs can be enabled/disabled based on time ranges.

21
New cards

Network Mask in ASA

The ASA uses a network mask (e.g., 255.255.255.0) and not a wildcard mask (e.g. 0.0.0.255).

22
New cards

Named ACLs

ACLs are always named instead of numbered.

23
New cards

Default Security Levels

By default, interface security levels apply access control without an ACL configured.

24
New cards

Through-Traffic Filtering

Traffic passing through the ASA from one interface to another interface.

25
New cards

To-the-Box-Traffic Filtering

Management access rule that applies to traffic that terminates at the ASA.

26
New cards

Extended Access List

The most common type of ACL.

27
New cards

Standard Access List

ASA standard ACLs are used to identify the destination IP addresses.

28
New cards

EtherType Access List

An EtherType ACL can be configured only if the security appliance is running in transparent mode.

29
New cards

Webtype Access List

Used for filtering for clientless SSL VPN traffic.

30
New cards

IPv6 Access List

Used to determine which IPv6 traffic to block and which traffic to forward at router interfaces.

31
New cards

Control Network Access for IP Traffic

The ASA does not allow any traffic from a lower security interface to a higher security interface unless it is explicitly permitted by an extended access list.

32
New cards

Identify Traffic for AAA Rules

AAA rules use access lists to identify traffic.

<p>AAA rules use access lists to identify traffic.</p>
33
New cards

Identify Addresses for NAT

Policy NAT lets you identify local traffic for address translation by specifying the source and destination addresses in an extended access list.

<p>Policy NAT lets you identify local traffic for address translation by specifying the source and destination addresses in an extended access list.</p>
34
New cards

Establish VPN Access

Extended access list can be used in VPN commands.

<p>Extended access list can be used in VPN commands.</p>
35
New cards

Modular Policy Framework (MPF)

A framework that uses class maps to identify traffic for features such as TCP, general connection settings, and inspection.

36
New cards

Standard ACLs

Access lists that include only the destination address and can control the redistribution of OSPF routes.

37
New cards

VPN filters

Filters traffic for LAN-to-LAN (L2L), Cisco VPN Client, and the Cisco AnyConnect Secure Mobility Client traffic.

<p>Filters traffic for LAN-to-LAN (L2L), Cisco VPN Client, and the Cisco AnyConnect Secure Mobility Client traffic.</p>
38
New cards

ACL id

The name of the ACL.

<p>The name of the ACL.</p>
39
New cards

Action

Can be permit or deny.

<p>Can be permit or deny.</p>
40
New cards

Protocol number - Source

Can be IP for all traffic, or the name/IP protocol number (0-250) including icmp (1), tcp (6), udp (17), or a protocol object-group.

<p>Can be IP for all traffic, or the name/IP protocol number (0-250) including icmp (1), tcp (6), udp (17), or a protocol object-group.</p>
41
New cards

Source

Identifies the source and can be any, a host, a network, or a network object group.

<p>Identifies the source and can be any, a host, a network, or a network object group.</p>
42
New cards

Source port operator

(Optional) Operand used in conjunction with the source port, valid operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range for an inclusive range.

43
New cards

Source port

(Optional) Can be the actual TCP or UDP port number, select port names, or service object group.

44
New cards

Destination

Identifies the destination and can be any, a host, a network, or a network object group.

45
New cards

Destination port operator

(Optional) Operand used in conjunction with the destination port, valid operands are the same as the source port operands.

46
New cards

Destination port

(Optional) Can be the actual TCP or UDP port number, select port names, or service object group.

47
New cards

Log

Can set elements for syslog including severity level and log interval.

48
New cards

Time range

(Optional) Specify a time range for the ACE.

49
New cards

access-group

Keyword used to apply an ACL to an interface.

50
New cards

in

The ACL will filter inbound packets.

51
New cards

out

The ACL will filter outbound packets.

52
New cards

interface

Keyword to specify the interface to which to apply the ACL.

53
New cards

if_name

The name of the interface to which to apply an ACL.

54
New cards

per-user-override

Option that allows downloadable ACLs to override the entries on the interface ACL.

55
New cards

ACLs

Access Control Lists used to filter traffic.

56
New cards

ACE

Access Control Entry, a single rule in an ACL.

57
New cards

Inside NAT

NAT configuration where internal addresses are translated to external addresses.

58
New cards

Outside NAT

NAT configuration where external addresses are translated to internal addresses.

59
New cards

Bidirectional NAT

NAT configuration that allows translation in both directions.

60
New cards

Dynamic PAT

A many-to-one translation method, also known as NAT with overload.

61
New cards

Static NAT

A one-to-one translation method mapping an outside address to an internal server.

62
New cards

Policy NAT

NAT based on a set of defined rules.

63
New cards

Identity NAT

A NAT configuration where a real address is translated to itself.

64
New cards

Dynamic NAT Configuration

Requires two network objects: one for public IP addresses and one for internal addresses.

65
New cards

AAA

Authentication, authorization, and accounting (AAA) provides an extra level of protection and user control.

66
New cards

Authorization

Authorization controls access, per user, after users are authenticated.

67
New cards

Accounting

Accounting tracks traffic that passes through the ASA, enabling administrators to have a record of user activity.

68
New cards

Modular Policy Framework (MPF)

A Modular Policy Framework (MPF) configuration defines a set of rules for applying firewall features, such as traffic inspection and QoS, to the traffic that traverses the ASA.

69
New cards

Class Maps

Class Maps define what are we looking for in the traffic.

70
New cards

Policy Maps

Policy Maps define what shall we do with the identified traffic.

71
New cards

Service Policy

Service Policy defines where do we apply the policy.

72
New cards

Class Map

A configuration mode used to create a class map and identify traffic to match.

73
New cards

DHCP

A service that automatically assigns IP addresses to devices on a network.

74
New cards

Static NAT

A type of NAT that maps a private IP address to a public IP address.

75
New cards

ACLs

Access Control Lists that filter traffic based on defined rules.

76
New cards

Network Objects

Entities that represent host addresses, subnets, ranges of addresses, and FQDNs.

77
New cards

Service Objects

Entities that refer to different network services and protocols.

78
New cards

Object Groups

Collections of related objects used to simplify configurations.

79
New cards

NAT Deployment Methods

Three methods: inside NAT, outside NAT, and bidirectional NAT.

80
New cards

Dynamic NAT with Overload

A type of NAT that allows multiple devices to share a single public IP address.

81
New cards

Modular Policy Framework (MPF)

A configuration that defines rules for applying firewall features to traffic.

82
New cards

Class Maps in MPF

Used to identify the traffic that will be processed by MPF.

83
New cards

Policy Maps in MPF

Define actions to be taken on identified traffic.

84
New cards

Service Policies in MPF

Identify which interfaces the policy map should be applied to.

85
New cards

Interface Grouping for ACLs

ASA ACLs must be grouped with an interface to take effect.

86
New cards

Local User Database

A database used for authenticating access

87
New cards

External Server Authentication

An option for authenticating access on Cisco ASAs using an external server.

88
New cards

Stateful Packet Inspection

A firewall service that monitors the state of active connections and determines which network packets to allow through the firewall.

89
New cards

Zone-Based Policy Firewall (ZPF)

A firewall configuration method that applies security policies based on zones rather than individual interfaces.

90
New cards

Throughput

The maximum amount of traffic that can be processed by a firewall model, varying between different ASA models.

91
New cards

Manageability

The ease with which a firewall can be configured, monitored, and maintained.

92
New cards

Next-Generation Firewall (NGFW)

A firewall that provides advanced features such as integrated threat defense and malware protection.

93
New cards

Identity-based firewall services

These services enhance the existing access control and security policy mechanisms by allowing users, or groups, to be specified in place of source IP addresses.

94
New cards

Advanced Inspection and Prevention (AIP)

The ASA uses the Advanced Inspection and Prevention (AIP) modules.

95
New cards

Content Security and Control (CSC) module

Antimalware capabilities can be deployed by integrating the Content Security and Control (CSC) module.

96
New cards

Next-generation IPS (NGIPS)

An advanced threat and malware detection capability included in the ASA 5500-X with FirePOWER Services.

97
New cards

Advanced Malware Protection (AMP)

An advanced threat and malware detection capability included in the ASA 5500-X with FirePOWER Services.

98
New cards

Application control and URL filtering

An advanced threat and malware detection capability included in the ASA 5500-X with FirePOWER Services.

99
New cards

Outside network

The network/zone that is outside the protection of the firewall.

100
New cards

Inside network

The network/zone that is protected and behind the firewall.