Introduction |
|
Chapter 1 Introduction to Security Technologies |
|
1 | (28) |
|
|
2 | (7) |
|
|
2 | (1) |
|
Packet-Filtering Techniques |
|
|
2 | (1) |
|
|
3 | (1) |
|
Network Address Translation |
|
|
3 | (3) |
|
Stateful Inspection Firewalls |
|
|
6 | (1) |
|
Demilitarized Zones (DMZ) |
|
|
7 | (1) |
|
|
8 | (1) |
|
Next-Generation Context-Aware Firewalls |
|
|
8 | (1) |
|
|
9 | (1) |
|
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) |
|
|
9 | (5) |
|
Pattern Matching and Stateful Pattern-Matching Recognition |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (2) |
|
Global Threat Correlation Capabilities |
|
|
14 | (1) |
|
|
14 | (11) |
|
Technical Overview of IPsec |
|
|
16 | (1) |
|
|
16 | (4) |
|
|
20 | (3) |
|
|
23 | (1) |
|
|
23 | (2) |
|
Cisco AnyConnect Secure Mobility |
|
|
25 | (1) |
|
Cloud and Virtualization Security |
|
|
26 | (3) |
Chapter 2 Cisco ASA Product and Solution Overview |
|
29 | (30) |
|
|
30 | (1) |
|
|
31 | (4) |
|
|
35 | (3) |
|
|
38 | (2) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (4) |
|
Cisco Catalyst 6500 Series ASA Services Module |
|
|
51 | (1) |
|
Cisco ASA 1000V Cloud Firewall |
|
|
52 | (1) |
|
Cisco ASA Next-Generation Firewall Services (Formerly Cisco ASA CX) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Cisco ASA Gigabit Ethernet Modules |
|
|
55 | (4) |
|
|
55 | (1) |
|
Cisco ASA 5580 Expansion Cards |
|
|
56 | (1) |
|
Cisco ASA 5500-X Series 6-Port GE Interface Cards |
|
|
57 | (2) |
Chapter 3 Licensing |
|
59 | (22) |
|
|
59 | (9) |
|
Basic Platform Capabilities |
|
|
61 | (2) |
|
Advanced Security Features |
|
|
63 | (2) |
|
|
65 | (1) |
|
Displaying License Information |
|
|
66 | (2) |
|
Managing Licenses with Activation Keys |
|
|
68 | (5) |
|
Permanent and Time-Based Activation Keys |
|
|
68 | (1) |
|
|
69 | (1) |
|
Time-Based Key Expiration |
|
|
70 | (1) |
|
|
71 | (2) |
|
Combined Licenses in Failover and Clustering |
|
|
73 | (2) |
|
License Aggregation Rules |
|
|
73 | (2) |
|
Aggregated Time-Based License Countdown |
|
|
75 | (1) |
|
Shared Premium VPN Licensing |
|
|
75 | (6) |
|
Shared Server and Participants |
|
|
76 | (1) |
|
|
76 | (1) |
|
Shared Licensing Operation |
|
|
76 | (2) |
|
Configuring Shared Licensing |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
Monitoring Shared Licensing Operation |
|
|
80 | (1) |
Chapter 4 Initial Setup |
|
81 | (38) |
|
Accessing the Cisco ASA Appliances |
|
|
81 | (6) |
|
Establishing a Console Connection |
|
|
82 | (3) |
|
|
85 | (2) |
|
|
87 | (3) |
|
|
90 | (10) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
94 | (3) |
|
Functional Screens of ASDM |
|
|
97 | (3) |
|
|
100 | (14) |
|
Setting Up a Device Name and Passwords |
|
|
100 | (2) |
|
|
102 | (1) |
|
Configuring a Data-Passing Interface |
|
|
102 | (4) |
|
Configuring a Subinterface |
|
|
106 | (3) |
|
Configuring an EtherChannel Interface |
|
|
109 | (2) |
|
Configuring a Management Interface |
|
|
111 | (1) |
|
|
112 | (2) |
|
Setting Up the System Clock |
|
|
114 | (5) |
|
|
114 | (1) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Automatic Clock Adjustment Using the Network Time Protocol |
|
|
116 | (3) |
Chapter 5 System Maintenance |
|
119 | (54) |
|
|
119 | (7) |
|
|
119 | (4) |
|
|
123 | (1) |
|
Removing the Device Configuration |
|
|
124 | (2) |
|
|
126 | (6) |
|
|
126 | (3) |
|
|
129 | (3) |
|
|
132 | (12) |
|
|
132 | (1) |
|
Image Upgrade via Cisco ASDM |
|
|
132 | (1) |
|
Image Upgrade via the Cisco ASA CLI |
|
|
133 | (3) |
|
Image Upload Using ROMMON |
|
|
136 | (1) |
|
Password Recovery Process |
|
|
137 | (4) |
|
Disabling the Password Recovery Process |
|
|
141 | (3) |
|
|
144 | (21) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
149 | (4) |
|
|
153 | (1) |
|
|
154 | (1) |
|
Storing Logs Internally and Externally |
|
|
154 | (2) |
|
|
156 | (1) |
|
NetFlow Secure Event Logging (NSEL) |
|
|
156 | (1) |
|
Step 1: Define a NetFlow Collector |
|
|
157 | (2) |
|
Step 2: Define a NetFlow Export Policy |
|
|
159 | (1) |
|
Simple Network Management Protocol (SNMP) |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (1) |
|
Device Monitoring and Troubleshooting |
|
|
165 | (8) |
|
CPU and Memory Monitoring |
|
|
165 | (3) |
|
Troubleshooting Device Issues |
|
|
168 | (1) |
|
Troubleshooting Packet Issues |
|
|
168 | (4) |
|
Troubleshooting CPU Issues |
|
|
172 | (1) |
Chapter 6 Cisco ASA Services Module |
|
173 | (18) |
|
Cisco ASA Services Module Overview |
|
|
173 | (3) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (4) |
|
Assigning VLAN Interfaces |
|
|
177 | (1) |
|
|
178 | (2) |
|
Common Deployment Scenarios |
|
|
180 | (3) |
|
Internal Segment Firewalling |
|
|
181 | (1) |
|
|
182 | (1) |
|
Trusted Flow Bypass with Policy Based Routing |
|
|
183 | (8) |
|
|
185 | (1) |
|
|
185 | (6) |
Chapter 7 Authentication, Authorization, and Accounting (AAA) Services |
|
191 | (38) |
|
AAA Protocols and Services Supported by Cisco ASA |
|
|
192 | (6) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
Active Directory and Kerberos |
|
|
197 | (1) |
|
Lightweight Directory Access Protocol |
|
|
197 | (1) |
|
Defining an Authentication Server |
|
|
198 | (6) |
|
Configuring Authentication of Administrative Sessions |
|
|
204 | (5) |
|
Authenticating Telnet Connections |
|
|
204 | (2) |
|
Authenticating SSH Connections |
|
|
206 | (1) |
|
Authenticating Serial Console Connections |
|
|
207 | (1) |
|
Authenticating Cisco ASDM Connections |
|
|
208 | (1) |
|
Authenticating Firewall Sessions (Cut-Through Proxy Feature) |
|
|
209 | (5) |
|
|
214 | (1) |
|
Customizing Authentication Prompts |
|
|
214 | (1) |
|
Configuring Authorization |
|
|
215 | (4) |
|
|
217 | (1) |
|
Configuring Downloadable ACLs |
|
|
218 | (1) |
|
|
219 | (3) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Troubleshooting Administrative Connections to Cisco ASA |
|
|
222 | (7) |
|
Troubleshooting Firewall Sessions (Cut-Through Proxy) |
|
|
225 | (1) |
|
ASDM and CLI AAA Test Utility |
|
|
226 | (3) |
Chapter 8 Controlling Network Access: The Traditional Way |
|
229 | (38) |
|
|
229 | (14) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
Through-the-Box-Traffic Filtering |
|
|
235 | (5) |
|
To-the-Box-Traffic Filtering |
|
|
240 | (3) |
|
|
243 | (12) |
|
|
243 | (1) |
|
|
243 | (2) |
|
Configuration of Object Types |
|
|
245 | (3) |
|
|
248 | (2) |
|
|
250 | (1) |
|
|
251 | (3) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Deployment Scenario for Traffic Filtering |
|
|
255 | (5) |
|
Using ACLs to Filter Inbound Traffic |
|
|
255 | (2) |
|
Configuration Steps with ASDM |
|
|
257 | (2) |
|
Configuration Steps with CLI |
|
|
259 | (1) |
|
Monitoring Network Access Control |
|
|
260 | (7) |
|
|
260 | (7) |
Chapter 9 Implementing Next-Generation Firewall Services with ASA CX |
|
267 | (70) |
|
|
268 | (5) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (4) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Application Inspection Engine |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Preparing ASA CX for Configuration |
|
|
277 | (5) |
|
Managing ASA CX with PRSM |
|
|
282 | (11) |
|
|
283 | (3) |
|
Configuring User Accounts |
|
|
286 | (2) |
|
|
288 | (2) |
|
Component and Software Updates |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
291 | (1) |
|
Configuration Database Backup |
|
|
292 | (1) |
|
Defining CX Policy Elements |
|
|
293 | (16) |
|
|
295 | (1) |
|
|
296 | (2) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Application-Service Objects |
|
|
303 | (1) |
|
|
304 | (1) |
|
Destination Object Groups |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (2) |
|
Enabling User Identity Services |
|
|
309 | (7) |
|
Configuring Directory Servers |
|
|
310 | (2) |
|
Connecting to AD Agent or CDA |
|
|
312 | (1) |
|
Tuning Authentication Settings |
|
|
313 | (1) |
|
Defining User Identity Discovery Policy |
|
|
314 | (2) |
|
|
316 | (7) |
|
Configuring Decryption Settings |
|
|
318 | (2) |
|
Defining a Decryption Policy |
|
|
320 | (3) |
|
|
323 | (1) |
|
Defining Context-Aware Access Policies |
|
|
324 | (3) |
|
Configuring ASA for CX Traffic Redirection |
|
|
327 | (2) |
|
|
329 | (8) |
|
|
329 | (2) |
|
Connection and System Events |
|
|
331 | (1) |
|
|
332 | (5) |
Chapter 10 Network Address Translation |
|
337 | (42) |
|
Types of Address Translation |
|
|
338 | (3) |
|
Network Address Translation |
|
|
338 | (2) |
|
|
340 | (1) |
|
Address Translation Methods |
|
|
341 | (4) |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Security Protection Mechanisms Within Address Translation |
|
|
345 | (1) |
|
Randomization of Sequence Numbers |
|
|
345 | (1) |
|
|
346 | (1) |
|
Understanding Address Translation Behavior |
|
|
346 | (4) |
|
Address Translation Behavior Prior to Version 8.3 |
|
|
346 | (1) |
|
Packet Flow Sequence in Pre-8.3 Version |
|
|
347 | (1) |
|
NAT Order of Operation for Pre-8.3 Versions |
|
|
348 | (1) |
|
Redesigning Address Translation (Version 8.3 and Later) |
|
|
349 | (1) |
|
NAT Modes in Version 8.3 and Later |
|
|
349 | (1) |
|
NAT Order of Operation for Version 8.3 and Later |
|
|
350 | (1) |
|
Configuring Address Translation |
|
|
350 | (22) |
|
|
351 | (1) |
|
Available Auto NAT Settings |
|
|
351 | (2) |
|
Auto NAT Configuration Example |
|
|
353 | (3) |
|
|
356 | (1) |
|
Available Manual NAT Settings |
|
|
356 | (1) |
|
Manual NAT Configuration Example |
|
|
357 | (2) |
|
|
359 | (1) |
|
Pre-8.3 Behavior for NAT and ACL Integration |
|
|
359 | (2) |
|
Behavior of NAT and ACL Integration in Version 8.3 and Later |
|
|
361 | (1) |
|
|
362 | (1) |
|
Use Case 1: Dynamic PAT for Inside Network with Static NAT for a DMZ Web Server |
|
|
363 | (1) |
|
Use Case 2: Static PAT for a Web Server Located on the DMZ Network |
|
|
364 | (2) |
|
Use Case 3: Static NAT for Overlapping Subnets Using Twice NAT |
|
|
366 | (1) |
|
Use Case 4: Identity NAT for Site-to-Site VPN Tunnel |
|
|
367 | (2) |
|
Use Case 5: Dynamic PAT for Remote-Access VPN Clients |
|
|
369 | (3) |
|
|
372 | (3) |
|
Monitoring Address Translations |
|
|
375 | (4) |
Chapter 11 IPv6 Support |
|
379 | (12) |
|
IP Version 6 Introduction |
|
|
379 | (3) |
|
|
380 | (1) |
|
Supported IPv6 Address Types |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
382 | (9) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
385 | (1) |
|
Neighbor Solicitation Messages |
|
|
385 | (1) |
|
|
385 | (1) |
|
Router Advertisement Transmission Interval |
|
|
385 | (1) |
|
|
386 | (3) |
|
|
389 | (2) |
Chapter 12 IP Routing |
|
391 | (74) |
|
Configuring Static Routes |
|
|
392 | (8) |
|
|
395 | (4) |
|
Displaying the Routing Table |
|
|
399 | (1) |
|
|
400 | (12) |
|
|
401 | (2) |
|
|
403 | (3) |
|
|
406 | (3) |
|
Configuring RIP Redistribution |
|
|
409 | (1) |
|
|
409 | (1) |
|
Scenario 1: RIP Version Mismatch |
|
|
410 | (1) |
|
Scenario 2: RIP Authentication Mismatch |
|
|
411 | (1) |
|
Scenario 3: Multicast or Broadcast Packets Blocked |
|
|
411 | (1) |
|
|
412 | (29) |
|
|
413 | (1) |
|
|
414 | (5) |
|
|
419 | (3) |
|
Configuring OSPF Authentication |
|
|
422 | (4) |
|
Configuring OSPF Redistribution |
|
|
426 | (2) |
|
|
428 | (1) |
|
OSPF Type 3 LSA Filtering |
|
|
429 | (2) |
|
OSPF neighbor Command and Dynamic Routing over a VPN Tunnel |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
433 | (1) |
|
Useful Troubleshooting Commands |
|
|
433 | (7) |
|
|
440 | (1) |
|
OSPF Authentication Mismatch |
|
|
440 | (1) |
|
Troubleshooting Virtual Link Problems |
|
|
440 | (1) |
|
|
441 | (24) |
|
|
441 | (1) |
|
|
441 | (4) |
|
Configuring Route Filtering for EIGRP |
|
|
445 | (2) |
|
|
447 | (1) |
|
Defining Static EIGRP Neighbors |
|
|
448 | (1) |
|
Route Summarization in EIGRP |
|
|
448 | (2) |
|
|
450 | (1) |
|
Route Redistribution in EIGRP |
|
|
450 | (3) |
|
Controlling Default Information |
|
|
453 | (1) |
|
|
454 | (1) |
|
Useful Troubleshooting Commands |
|
|
454 | (4) |
|
Scenario 1: Link Failures |
|
|
458 | (1) |
|
Scenario 2: Misconfigured Hello and Hold Intervals |
|
|
459 | (3) |
|
Scenario 3: Misconfigured Authentication Parameters |
|
|
462 | (3) |
Chapter 13 Application Inspection |
|
465 | (66) |
|
Enabling Application Inspection |
|
|
468 | (1) |
|
|
469 | (4) |
|
|
473 | (3) |
|
|
476 | (1) |
|
|
476 | (5) |
|
|
481 | (3) |
|
|
484 | (2) |
|
General Packet Radio Service Tunneling Protocol |
|
|
486 | (6) |
|
|
487 | (2) |
|
|
489 | (1) |
|
Configuring GTP Inspection |
|
|
490 | (2) |
|
|
492 | (7) |
|
|
493 | (2) |
|
H.323 Version Compatibility |
|
|
495 | (1) |
|
Enabling H.323 Inspection |
|
|
496 | (3) |
|
Direct Call Signaling and Gatekeeper Routed Control Signaling |
|
|
499 | (1) |
|
|
499 | (1) |
|
Cisco Unified Communications Advanced Support |
|
|
499 | (8) |
|
|
500 | (5) |
|
|
505 | (1) |
|
|
506 | (1) |
|
Presence Federation Proxy |
|
|
506 | (1) |
|
|
507 | (8) |
|
|
507 | (3) |
|
|
510 | (1) |
|
|
510 | (1) |
|
content-type-verification Command |
|
|
511 | (1) |
|
max-header-length Command |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (2) |
|
transfer-encoding type Command |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (2) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
524 | (1) |
|
|
525 | (2) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (2) |
Chapter 14 Virtualization |
|
531 | (60) |
|
|
533 | (11) |
|
|
533 | (2) |
|
|
535 | (1) |
|
|
535 | (3) |
|
|
538 | (1) |
|
Packet Classification Criteria |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
Packet Flow in Multiple Mode |
|
|
541 | (1) |
|
Forwarding Without a Shared Interface |
|
|
541 | (1) |
|
Forwarding with a Shared Interface |
|
|
542 | (2) |
|
Configuration of Security Contexts |
|
|
544 | (15) |
|
Step 1: Enable Multiple Security Contexts Globally |
|
|
544 | (3) |
|
Step 2: Set Up the System Execution Space |
|
|
547 | (2) |
|
Step 3: Configure Interfaces |
|
|
549 | (1) |
|
Step 4: Specify a Configuration URL |
|
|
550 | (2) |
|
Step 5: Configure an Admin Context |
|
|
552 | (1) |
|
Step 6: Configure a User Context |
|
|
553 | (1) |
|
Step 7: Manage the Security Contexts (Optional) |
|
|
554 | (1) |
|
Step 8: Resource Management (Optional) |
|
|
555 | (1) |
|
Step 1: Define a Resource Class |
|
|
556 | (2) |
|
Step 2: Map the Resource Class to a Context |
|
|
558 | (1) |
|
|
559 | (27) |
|
Virtual Firewall with Non-Shared Interfaces |
|
|
559 | (2) |
|
Configuration Steps with ASDM |
|
|
561 | (8) |
|
Configuration StepS with CLI |
|
|
569 | (3) |
|
Virtual Firewall with a Shared Interface |
|
|
572 | (2) |
|
Configuration Steps with ASDM |
|
|
574 | (8) |
|
Configuration Steps Using CLI |
|
|
582 | (4) |
|
Monitoring and Troubleshooting the Security Contexts |
|
|
586 | (5) |
|
|
586 | (2) |
|
|
588 | (1) |
|
Security Contexts Are Not Added |
|
|
588 | (1) |
|
Security Contexts Are Not Saved on the Local Disk |
|
|
588 | (1) |
|
Security Contexts Are Not Saved on the FTP Server |
|
|
589 | (1) |
|
User Having Connectivity Issues When Shared Security Contexts Are Used |
|
|
590 | (1) |
Chapter 15 Transparent Firewalls |
|
591 | (50) |
|
|
594 | (5) |
|
Single-Mode Transparent Firewalls |
|
|
594 | (1) |
|
|
595 | (2) |
|
Multimode Transparent Firewalls |
|
|
597 | (1) |
|
|
597 | (2) |
|
Restrictions When Using Transparent Firewalls |
|
|
599 | (3) |
|
Transparent Firewalls and VPNs |
|
|
599 | (1) |
|
Transparent Firewalls and NAT |
|
|
600 | (2) |
|
Configuration of Transparent Firewalls |
|
|
602 | (14) |
|
|
602 | (1) |
|
|
603 | (1) |
|
Step 1: Enable Transparent Firewalls |
|
|
603 | (1) |
|
Step 2: Set Up Interfaces |
|
|
604 | (1) |
|
Step 3: Configure an IP Address |
|
|
605 | (1) |
|
|
606 | (2) |
|
Step 5: Configure Interface ACLs |
|
|
608 | (3) |
|
Step 6: Configure NAT (Optional) |
|
|
611 | (1) |
|
Step 7: Add Static L2F Table Entries (Optional) |
|
|
612 | (1) |
|
Step 8: Enable ARP Inspection (Optional) |
|
|
613 | (2) |
|
Step 9: Modify L2F Table Parameters (Optional) |
|
|
615 | (1) |
|
|
616 | (20) |
|
|
617 | (1) |
|
Configuration Steps Using ASDM |
|
|
618 | (4) |
|
Configuration Steps Using CLI |
|
|
622 | (1) |
|
MMTF Deployment with Security Contexts |
|
|
623 | (2) |
|
Configuration Steps Using ASDM |
|
|
625 | (7) |
|
Configuration Steps Using CLI |
|
|
632 | (4) |
|
Monitoring and Troubleshooting Transparent Firewalls |
|
|
636 | (1) |
|
|
636 | (1) |
|
|
637 | (1) |
|
Hosts Are Not Able to Communicate |
|
|
637 | (2) |
|
Moved Host Is Not Able to Communicate |
|
|
639 | (1) |
|
|
640 | (1) |
Chapter 16 High Availability |
|
641 | (92) |
|
|
642 | (4) |
|
Using Redundant Interfaces |
|
|
642 | (1) |
|
|
643 | (1) |
|
Configuration and Monitoring |
|
|
644 | (2) |
|
|
646 | (6) |
|
Configuring Static Routes with an SLA Monitor |
|
|
647 | (2) |
|
Floating Connection Timeout |
|
|
649 | (1) |
|
Sample Backup ISP Deployment |
|
|
649 | (3) |
|
|
652 | (33) |
|
Unit Roles and Functions in Failover |
|
|
652 | (1) |
|
|
653 | (1) |
|
Active/Standby and Active/Active Failover |
|
|
654 | (2) |
|
Failover Hardware and Software Requirements |
|
|
656 | (1) |
|
Zero Downtime Upgrade in Failover |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Data Interface Addressing |
|
|
660 | (2) |
|
Asymmetric Routing Groups |
|
|
662 | (2) |
|
Failover Health Monitoring |
|
|
664 | (2) |
|
State and Role Transition |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (3) |
|
Data Interface Configuration |
|
|
671 | (2) |
|
Failover Policies and Timers |
|
|
673 | (1) |
|
|
674 | (4) |
|
Monitoring and Troubleshooting Failover |
|
|
678 | (2) |
|
Active/Standby Failover Deployment Scenario |
|
|
680 | (5) |
|
|
685 | (48) |
|
Unit Roles and Functions in Clustering |
|
|
685 | (1) |
|
|
685 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
Clustering Hardware and Software Requirements |
|
|
687 | (1) |
|
Zero Downtime Upgrade in Clustering |
|
|
688 | (1) |
|
|
689 | (1) |
|
|
690 | (1) |
|
Control and Data Interfaces |
|
|
690 | (3) |
|
Spanned EtherChannel Mode |
|
|
693 | (2) |
|
|
695 | (2) |
|
|
697 | (1) |
|
Cluster Health Monitoring |
|
|
697 | (1) |
|
Network Address Translation |
|
|
698 | (2) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
701 | (1) |
|
|
702 | (1) |
|
TCP Connection Processing |
|
|
702 | (1) |
|
UDP Connection Processing |
|
|
703 | (2) |
|
Centralized Connection Processing |
|
|
705 | (1) |
|
|
705 | (1) |
|
|
706 | (1) |
|
|
707 | (1) |
|
Management Access for ASDM Deployment |
|
|
708 | (2) |
|
|
710 | (4) |
|
Data Interface Configuration |
|
|
714 | (3) |
|
Monitoring and Troubleshooting Clustering |
|
|
717 | (3) |
|
Spanned EtherChannel Cluster Deployment Scenario |
|
|
720 | (13) |
Chapter 17 Implementing Cisco ASA Intrusion Prevention System (IPS) |
|
733 | (54) |
|
|
733 | (6) |
|
|
735 | (1) |
|
|
735 | (1) |
|
|
736 | (1) |
|
Inline and Promiscuous Modes |
|
|
737 | (2) |
|
|
739 | (1) |
|
Cisco IPS Software Architecture |
|
|
739 | (5) |
|
|
741 | (1) |
|
|
741 | (1) |
|
Attack Response Controller |
|
|
742 | (1) |
|
|
742 | (1) |
|
|
742 | (1) |
|
|
743 | (1) |
|
|
743 | (1) |
|
|
743 | (1) |
|
|
744 | (1) |
|
|
744 | (1) |
|
Preparing ASA IPS for Configuration |
|
|
744 | (9) |
|
Installing CIPS System Software |
|
|
744 | (3) |
|
Accessing CIPS from the ASA CLI |
|
|
747 | (1) |
|
Configuring Basic Management Settings |
|
|
748 | (4) |
|
Setting Up ASDM for IPS Management |
|
|
752 | (1) |
|
Installing the CIPS License Key |
|
|
752 | (1) |
|
Configuring CIPS Software on ASA IPS |
|
|
753 | (15) |
|
|
755 | (3) |
|
|
758 | (5) |
|
|
763 | (3) |
|
|
766 | (2) |
|
|
768 | (10) |
|
User Account Administration |
|
|
769 | (1) |
|
|
769 | (1) |
|
|
769 | (1) |
|
|
769 | (1) |
|
|
770 | (1) |
|
Adding, Changing and Deleting Users |
|
|
770 | (1) |
|
Displaying CIPS Software and Process Information |
|
|
771 | (1) |
|
Upgrading CIPS Software and Signatures |
|
|
772 | (1) |
|
|
773 | (1) |
|
|
774 | (2) |
|
Backing Up ASA IPS Configuration |
|
|
776 | (1) |
|
Displaying and Clearing Events |
|
|
776 | (2) |
|
Configuring ASA for IPS Traffic Redirection |
|
|
778 | (2) |
|
|
780 | (7) |
|
Dynamic and Local Blacklist Data |
|
|
781 | (1) |
|
|
782 | (1) |
|
|
783 | (4) |
Chapter 18 Tuning and Monitoring IPS |
|
787 | (14) |
|
|
787 | (2) |
|
|
789 | (2) |
|
|
790 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
|
791 | (1) |
|
|
791 | (1) |
|
|
791 | (1) |
|
|
791 | (1) |
|
|
792 | (1) |
|
Tools to Help with Monitoring and Tuning |
|
|
793 | (2) |
|
|
793 | (1) |
|
|
794 | (1) |
|
Removing False Positive IPS Events from the Event Table |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
794 | (1) |
|
Displaying and Clearing Statistics in the Cisco ASA IPS |
|
|
795 | (6) |
Chapter 19 Site-to-Site IPsec VPNs |
|
801 | (58) |
|
Preconfiguration Checklist |
|
|
802 | (3) |
|
|
805 | (17) |
|
|
806 | (1) |
|
Step 2: Create the ISAKMP Policy |
|
|
807 | (1) |
|
Step 3: Set Up the Tunnel Groups |
|
|
808 | (2) |
|
Step 4: Define the IPsec Policy |
|
|
810 | (2) |
|
Step 5: Create a Crypto Map |
|
|
812 | (4) |
|
Step 6: Configure Traffic Filtering (Optional) |
|
|
816 | (1) |
|
Step 7: Bypass NAT (Optional) |
|
|
817 | (2) |
|
Step 8: Enable Perfect Forward Secrecy (Optional) |
|
|
819 | (1) |
|
Alternative Configuration Methods Through ASDM |
|
|
820 | (1) |
|
Defining Site-to-Site Tunnel Using the IPsec VPN Wizard |
|
|
820 | (1) |
|
Defining a Site-to-Site Tunnel Through a Connection Profile |
|
|
821 | (1) |
|
Optional Attributes and Features |
|
|
822 | (8) |
|
|
823 | (1) |
|
|
824 | (2) |
|
|
826 | (1) |
|
|
827 | (1) |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
830 | (18) |
|
Single Site-to-Site Tunnel Configuration Using NAT-T, RRI, and IKEv2 |
|
|
831 | (1) |
|
Configuration Steps Through ASDM |
|
|
831 | (2) |
|
Configuration Steps Through CLI |
|
|
833 | (3) |
|
Hub and Spoke Using Security Contexts |
|
|
836 | (1) |
|
Configuration Steps Through ASDM |
|
|
837 | (5) |
|
Configuration Steps Through CLI |
|
|
842 | (6) |
|
Monitoring and Troubleshooting Site-to-Site IPsec VPNs |
|
|
848 | (11) |
|
Monitoring Site-to-Site VPNs |
|
|
848 | (4) |
|
Troubleshooting Site-to-Site VPNs |
|
|
852 | (2) |
|
ISAKMP Proposal Unacceptable |
|
|
854 | (1) |
|
Mismatched Preshared Keys |
|
|
854 | (1) |
|
Incompatible IPsec Transform Set |
|
|
854 | (1) |
|
Mismatched Proxy Identities |
|
|
855 | (1) |
|
|
856 | (3) |
Chapter 20 IPsec Remote-Access VPNs |
|
859 | (72) |
|
Cisco IPsec Remote Access VPN Solution |
|
|
860 | (36) |
|
IPsec (IKEv1) Remote-Access Configuration Steps |
|
|
862 | (1) |
|
Using the ASDM IPsec IKEvl Remote Access VPN Wizard |
|
|
863 | (8) |
|
Manually Configuring IPsec (IKEv1) VPN Using ASDM and CLI |
|
|
871 | (4) |
|
Configuring Group Policies |
|
|
875 | (1) |
|
Configuring a Tunnel Group |
|
|
876 | (13) |
|
IPsec (IKEv2) Remote-Access Configuration Steps |
|
|
889 | (1) |
|
|
889 | (1) |
|
Step 2: Connection Profile Identification |
|
|
890 | (1) |
|
|
890 | (3) |
|
|
893 | (1) |
|
Step 5: Specify User Authentication Method |
|
|
893 | (1) |
|
Step 6: Specify an Address Pool |
|
|
893 | (1) |
|
Step 7: Network Name Resolution Servers |
|
|
893 | (1) |
|
|
894 | (1) |
|
Step 9: AnyConnect Client Deployment |
|
|
894 | (1) |
|
Hardware-Based VPN Clients |
|
|
894 | (2) |
|
Advanced Cisco IPsec VPN Features |
|
|
896 | (14) |
|
|
896 | (1) |
|
|
897 | (1) |
|
|
898 | (1) |
|
|
898 | (1) |
|
|
899 | (1) |
|
|
899 | (2) |
|
|
901 | (3) |
|
|
904 | (1) |
|
|
904 | (2) |
|
Central Protection Policy |
|
|
906 | (1) |
|
Hardware-Based Easy VPN Client Features |
|
|
907 | (1) |
|
Interactive Client Authentication |
|
|
907 | (1) |
|
Individual User Authentication |
|
|
908 | (1) |
|
|
909 | (1) |
|
|
909 | (1) |
|
Hardware Client Network Extension Mode |
|
|
909 | (1) |
|
L2TP over IPsec Remote-Access VPN (IKEv1) |
|
|
910 | (6) |
|
L2TP over IPsec Remote-Access Configuration Steps |
|
|
912 | (1) |
|
Step 1: Select Tunnel Interface |
|
|
913 | (1) |
|
Step 2: Select Remote Access Client |
|
|
914 | (1) |
|
Step 3: Select VPN Client Authentication Method |
|
|
914 | (1) |
|
Step 4: Specify User Authentication Method |
|
|
914 | (1) |
|
|
914 | (1) |
|
Step 6: Specify an Address Pool |
|
|
915 | (1) |
|
Step 7: Specify Attributes Pushed to Clients |
|
|
915 | (1) |
|
Step 8: Select the IPsec Settings (Optional) |
|
|
915 | (1) |
|
Step 9: Verify the Configuration |
|
|
915 | (1) |
|
Windows L2TP over IPsec Client Configuration |
|
|
915 | (1) |
|
|
916 | (6) |
|
Load Balancing of Cisco IPsec Clients and Site-to-Site Integration |
|
|
916 | (1) |
|
Configuration Steps Through ASDM |
|
|
917 | (2) |
|
Configuration Steps Using the CLI |
|
|
919 | (3) |
|
Monitoring and Troubleshooting Cisco Remote-Access VPNs |
|
|
922 | (9) |
|
Monitoring Cisco Remote-Access IPsec VPNs |
|
|
922 | (4) |
|
Troubleshooting Cisco IPsec VPN Clients |
|
|
926 | (5) |
Chapter 21 Configuring and Troubleshooting PKI |
|
931 | (48) |
|
|
931 | (5) |
|
|
932 | (1) |
|
|
933 | (2) |
|
Certificate Revocation List |
|
|
935 | (1) |
|
Simple Certificate Enrollment Protocol |
|
|
936 | (1) |
|
|
936 | (21) |
|
Installing Certificates Through ASDM |
|
|
936 | (1) |
|
Installing a CA Certificate from a File |
|
|
937 | (1) |
|
Installing an Identity Certificate from a File |
|
|
938 | (1) |
|
Installing a CA Certificate by the Copy-and-Paste Method |
|
|
939 | (1) |
|
Installing a CA Certificate Using SCEP |
|
|
940 | (3) |
|
Installing an Identity Certificate Using SCEP |
|
|
943 | (2) |
|
Installing Certificates Using the CLI |
|
|
945 | (1) |
|
Generating the RSA Key Pair in the CLI |
|
|
945 | (1) |
|
|
946 | (5) |
|
Manual (Cut-and-Paste) Enrollment via the CLI |
|
|
951 | (3) |
|
Configuring CRL Options via the CLI |
|
|
954 | (3) |
|
The Local Certificate Authority |
|
|
957 | (9) |
|
Configuring the Local CA Through ASDM |
|
|
958 | (2) |
|
Configuring the Local CA Using the CLI |
|
|
960 | (3) |
|
Enrolling Local CA Users Through ASDM |
|
|
963 | (2) |
|
Enrolling Local CA Users Through the CLI |
|
|
965 | (1) |
|
Configuring IPsec Site-to-Site Tunnels Using Certificates |
|
|
966 | (5) |
|
Configuring the Cisco ASA to Accept Remote-Access IPsec VPN Clients Using Certificates |
|
|
971 | (1) |
|
|
972 | (7) |
|
|
972 | (3) |
|
|
975 | (2) |
|
|
977 | (2) |
Chapter 22 Clientless Remote-Access SSL VPNs |
|
979 | (106) |
|
SSL VPN Design Considerations |
|
|
980 | (2) |
|
|
981 | (1) |
|
|
981 | (1) |
|
|
981 | (1) |
|
|
981 | (1) |
|
|
982 | (5) |
|
|
983 | (1) |
|
|
984 | (1) |
|
|
984 | (1) |
|
|
984 | (1) |
|
|
985 | (1) |
|
|
985 | (1) |
|
Client Operating System and Browser and Software Requirements |
|
|
986 | (1) |
|
Infrastructure Requirements |
|
|
987 | (1) |
|
Pre-SSL VPN Configuration Guide |
|
|
987 | (17) |
|
Enroll Digital Certificates (Recommended) |
|
|
988 | (1) |
|
Step 1: Obtaining a CA Certificate |
|
|
988 | (1) |
|
Step 2: Request a Certificate |
|
|
989 | (4) |
|
Step 3: Apply Identity Certificate for SSL VPN Connections |
|
|
993 | (1) |
|
Set Up Tunnel and Group Policies |
|
|
994 | (1) |
|
|
995 | (3) |
|
|
998 | (2) |
|
Set Up User Authentication |
|
|
1000 | (4) |
|
Clientless SSL VPN Configuration Guide |
|
|
1004 | (37) |
|
Enable Clientless SSL VPN on an Interface |
|
|
1005 | (1) |
|
Configure SSL VPN Portal Customization |
|
|
1006 | (1) |
|
|
1007 | (5) |
|
|
1012 | (3) |
|
|
1015 | (1) |
|
Portal Customization and User Group |
|
|
1016 | (3) |
|
|
1019 | (5) |
|
|
1024 | (2) |
|
|
1026 | (2) |
|
|
1028 | (1) |
|
Apply a Bookmark List to a Group Policy |
|
|
1029 | (1) |
|
|
1030 | (1) |
|
|
1031 | (3) |
|
Configure Application Access |
|
|
1034 | (1) |
|
Configure Port Forwarding |
|
|
1035 | (2) |
|
|
1037 | (3) |
|
Configure Client-Server Plug-ins |
|
|
1040 | (1) |
|
|
1041 | (13) |
|
|
1043 | (1) |
|
|
1043 | (1) |
|
|
1043 | (1) |
|
|
1043 | (1) |
|
|
1044 | (1) |
|
Supported Operating Systems |
|
|
1044 | (1) |
|
|
1044 | (1) |
|
Supported Internet Browsers |
|
|
1045 | (1) |
|
Internet Browser Settings |
|
|
1045 | (1) |
|
|
1045 | (1) |
|
|
1046 | (1) |
|
Step 1: Load the CSD Package |
|
|
1047 | (1) |
|
Step 2: Define Prelogin Sequences |
|
|
1048 | (6) |
|
|
1054 | (6) |
|
|
1054 | (1) |
|
|
1055 | (1) |
|
|
1055 | (1) |
|
Advanced Endpoint Assessment |
|
|
1055 | (1) |
|
|
1056 | (1) |
|
|
1057 | (1) |
|
Enable Endpoint Host Scan |
|
|
1058 | (1) |
|
Set Up an Advanced Endpoint Host Scan |
|
|
1058 | (2) |
|
|
1060 | (15) |
|
|
1061 | (1) |
|
|
1062 | (1) |
|
|
1062 | (1) |
|
|
1063 | (3) |
|
Choose Endpoint Attributes |
|
|
1066 | (2) |
|
|
1068 | (7) |
|
|
1075 | (3) |
|
Step 1: Define Clientless Connections |
|
|
1076 | (1) |
|
|
1077 | (1) |
|
Monitoring and Troubleshooting SSL VPN |
|
|
1078 | (7) |
|
|
1078 | (3) |
|
|
1081 | (1) |
|
Troubleshooting SSL Negotiations |
|
|
1081 | (1) |
|
Troubleshooting Clientless Issues |
|
|
1081 | (2) |
|
|
1083 | (1) |
|
|
1083 | (2) |
Chapter 23 Client-Based Remote-Access SSL VPNs |
|
1085 | (34) |
|
SSL VPN Deployment Considerations |
|
|
1086 | (2) |
|
Cisco AnyConnect Secure Mobility Client Licenses |
|
|
1086 | (1) |
|
Cisco ASA Design Considerations |
|
|
1086 | (1) |
|
|
1086 | (1) |
|
|
1086 | (1) |
|
|
1087 | (1) |
|
|
1088 | (2) |
|
Client Operating System and Browser and Software Requirements |
|
|
1088 | (1) |
|
Supported Operating Systems |
|
|
1088 | (1) |
|
|
1089 | (1) |
|
Infrastructure Requirements |
|
|
1089 | (1) |
|
ASA Placement and Requirements |
|
|
1089 | (1) |
|
|
1089 | (1) |
|
Administrative Privileges |
|
|
1090 | (1) |
|
Pre-SSL VPN Configuration Guide |
|
|
1090 | (6) |
|
Enrolling Digital Certificates (Recommended) |
|
|
1090 | (1) |
|
Setting Up Tunnel and Group Policies |
|
|
1090 | (1) |
|
Configuring Group Policies |
|
|
1091 | (1) |
|
Configuring a Tunnel Group |
|
|
1092 | (2) |
|
Setting Up User Authentication |
|
|
1094 | (2) |
|
Cisco AnyConnect Secure Mobility Client Configuration Guide |
|
|
1096 | (16) |
|
Loading the Cisco AnyConnect Secure Mobility Client Package |
|
|
1096 | (2) |
|
Defining the Cisco AnyConnect Secure Mobility Client Attributes |
|
|
1098 | (1) |
|
Enabling Cisco AnyConnect Secure Mobility Client VPN Client Functionality |
|
|
1099 | (2) |
|
Defining a Pool of Addresses |
|
|
1101 | (2) |
|
Advanced Full Tunnel Features |
|
|
1103 | (1) |
|
|
1103 | (3) |
|
|
1106 | (1) |
|
Keeping the SSL VPN Client Installed |
|
|
1107 | (1) |
|
|
1108 | (1) |
|
Configuring Traffic Filters |
|
|
1109 | (1) |
|
AnyConnect Client Configuration |
|
|
1109 | (1) |
|
Creating AnyConnect Client Profile |
|
|
1110 | (2) |
|
Connecting from AnyConnect Client |
|
|
1112 | (1) |
|
Deployment Scenario of AnyConnect Client |
|
|
1112 | (4) |
|
Step 1: Set Up CSD for Registry Check |
|
|
1114 | (1) |
|
Step 2: Set Up RADIUS for Authentication |
|
|
1114 | (1) |
|
Step 3: Configure AnyConnect SSL VPN |
|
|
1115 | (1) |
|
Step 4: Enable Address Translation for Internet Access |
|
|
1116 | (1) |
|
Monitoring and Troubleshooting AnyConnect SSL VPNs |
|
|
1116 | (3) |
|
|
1116 | (1) |
|
Troubleshooting SSL Negotiations |
|
|
1116 | (1) |
|
Troubleshooting AnyConnect Client Issues |
|
|
1117 | (2) |
Chapter 24 IP Multicast Routing |
|
1119 | (12) |
|
|
1120 | (1) |
|
|
1120 | (1) |
|
Configuring IP Multicast Routing |
|
|
1120 | (7) |
|
Enabling Multicast Routing |
|
|
1121 | (1) |
|
Statically Assigning an IGMP Group |
|
|
1122 | (1) |
|
|
1122 | (1) |
|
|
1123 | (1) |
|
Defining the IGMP Version |
|
|
1123 | (1) |
|
|
1124 | (1) |
|
Configuring Rendezvous Points |
|
|
1125 | (1) |
|
|
1126 | (1) |
|
Configuring a Static Multicast Route |
|
|
1127 | (1) |
|
Troubleshooting IP Multicast Routing |
|
|
1127 | (4) |
|
|
1128 | (1) |
|
|
1129 | (2) |
Chapter 25 Quality of Service |
|
1131 | |
|
|
1133 | (3) |
|
|
1133 | (1) |
|
|
1134 | (1) |
|
|
1135 | (1) |
|
|
1136 | (6) |
|
|
1136 | (1) |
|
|
1137 | (1) |
|
|
1137 | (1) |
|
|
1138 | (3) |
|
|
1141 | (1) |
|
|
1141 | (1) |
|
|
1141 | (1) |
|
|
1142 | (1) |
|
Configuring Quality of Service |
|
|
1142 | (13) |
|
QoS Configuration via ASDM |
|
|
1143 | (1) |
|
Step 1: Tune Priority Queue |
|
|
1143 | (1) |
|
Step 2: Define a Service Policy |
|
|
1144 | (1) |
|
Step 3: Specify Traffic Classification Criteria |
|
|
1145 | (3) |
|
Step 4: Apply an Action Rule |
|
|
1148 | (4) |
|
QoS Configuration via CLI |
|
|
1152 | (1) |
|
Step 1: Tune the Priority Queue |
|
|
1152 | (1) |
|
Step 2: Set Up a Class Map |
|
|
1152 | (1) |
|
Step 3: Configure a Policy Map |
|
|
1153 | (2) |
|
Step 4: Apply the Policy Map on the Interface |
|
|
1155 | (1) |
|
|
1155 | (7) |
|
Configuration Steps Through ASDM |
|
|
1157 | (3) |
|
Configuration Steps Through the CLI |
|
|
1160 | (2) |
|
|
1162 | |