Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    7-7
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Licensing Requirements for Access Rules
    Access Rules for Returning Traffic
    Because EtherTypes are connectionless, you need to apply the rule to both interfaces if you want traffic 
    to pass in both directions.
    Allowing MPLS
    If you allow MPLS, ensure that Label Distribution Protocol and Tag Distribution Protocol TCP 
    connections are established through the ASA by configuring both MPLS routers connected to the ASA 
    to use the IP address on the ASA interface as the router-id for LDP or TDP sessions. (LDP and TDP 
    allow MPLS routers to negotiate the labels (addresses) used to forward packets.)
    On Cisco IOS routers, enter the appropriate command for your protocol, LDP or TDP. The interface is 
    the interface connected to the ASA.
    ciscoasa(config)# mpls ldp router-id interface force
    Or
    ciscoasa(config)# tag-switching tdp router-id interface force
    Licensing Requirements for Access Rules
    Guidelines and Limitations
    This section includes the guidelines and limitations for this feature.
    Context Mode Guidelines
    Supported in single and multiple context mode.
    Firewall Mode Guidelines
    Supported in routed and transparent firewall modes.
    IPv6 Guidelines
    Supports IPv6. (9.0 and later) The source and destination addresses can include any mix of IPv4 and IPv6 
    addresses. For pre-9.0 versions, you must create a separate IPv6 access rule.
    Default Settings
    See the “Implicit Permits” section on page 7-2. Model License Requirement
    All models Base License. 
    						
    							 
    7-8
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    Configuring Access Rules
    This section includes the following topics:
    Adding an Access Rule, page 7-8
    Adding an EtherType Rule (Transparent Mode Only), page 7-9
    Configuring Management Access Rules, page 7-10
    Advanced Access Rule Configuration, page 7-11
    Configuring HTTP Redirect, page 7-12
    Configuring Transactional Commit Model, page 7-13
    Adding an Access Rule
    To apply an access rule, perform the following steps.
    Detailed Steps
    Step 1Choose Configuration > Firewall > Access Rules.
    Step 2Click Add, and choose one of the following options:
    The Add Access Rule dialog box appears.
    Step 3From the Interface drop-down list, choose the interface on which to apply the rule. Choose Any to apply 
    a global rule.
    Step 4In the Action field, click one of the following radio buttons next to the desired action:
    Permit—Permits access if the conditions are matched.
    Deny—Denies access if the conditions are matched.
    Step 5In the Source field, enter an IP address that specifies the network, interface IP, or any address from which 
    traffic is permitted or denied to the specified destination. You may use either an IPv4 or IPv6 address.
    For more information about enabling IPv6 on an interface, see the “Configuring IPv6 Addressing” 
    section on page 13-18 in the general operations configuration guide.
    Step 6In the User field, enter a user name or group to the ACL. Enter the user name in the format 
    domain_NetBIOS_name\user_name. Enter the group name in the format 
    domain_NetBIOS_name\group_name. 
    You can configure access rules based on user names and user group names rather than through source IP 
    addresses. The ASA applies the security policies based on an association of IP addresses to Windows 
    Active Directory login information and reports events based on the mapped user names instead of 
    network IP addresses.
    See the “Configuring Identity-Based Security Policy” section on page 38-23 in the general operations 
    configuration guide for more information. 
    Step 7To browse for a user name or user group, click the ellipsis (...) button. The Browse User dialog box 
    appears.
    Step 8In the Destination field, enter an IP address that specifies the network, interface IP, any address to which 
    traffic is permitted or denied from the source specified in the Source field. You may use either an IPv4 
    or IPv6 address. 
    						
    							 
    7-9
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    Step 9Select the service type.
    Step 10(Optional) To add a time range to your access rule that specifies when traffic can be allowed or denied, 
    click More Options to expand the list.
    a.To the right of the Time Range drop down list, click the browse button. 
    The Browse Time Range dialog box appears.
    b.Click Add.
    The Add Time Range dialog box appears.
    c.In the Time Range Name field, enter a time range name, with no spaces.
    d.Choose the Start Time and the End Time.
    e.To specify additional time constraints for the time range, such as specifying the days of the week or 
    the recurring weekly interval in which the time range will be active, click Add, and choose the 
    specifications.
    f.Click OK to apply the optional time range specifications.
    Step 11(Optional) In the Description field, add a text description about the access rule.
    The description can contain multiple lines; however, each line can be no more than 100 characters in 
    length.
    Step 12(Optional) Logging is enabled by default. You can disable logging by unchecking the check box, or you 
    can change the logging level from the drop-down list. The default logging level is Informational.
    Step 13Click OK. The access rule appears with the newly configured access rules.
    Step 14Click Apply to save the access rule to your configuration.
    You can edit or delete a particular access rule by selecting the rule and then clicking Edit or Delete.
    Adding an EtherType Rule (Transparent Mode Only) 
    The EtherType Rules window shows access rules based on packet EtherTypes. EtherType rules are used 
    to configure non-IP related traffic policies through the ASA when operating in transparent mode. In 
    transparent mode, you can apply both extended and EtherType access rules to an interface. EtherType 
    rules take precedence over the extended access rules.
    For more information about EtherType rules, see the “Information About Access Rules” section on 
    page 7-1.
    To add an EtherType rule, perform the following steps:
    Step 1Choose Configuration > Device Management > Management Access > EtherType Rules. 
    Step 2Click Add.
    The Add EtherType rules window appears.
    Step 3(Optional) To specify the placement of the new EtherType rule, select an existing rule, and click Insert... 
    to add the EtherType rule before the selected rule, or click Insert After... to add the EtherType rule after 
    the selected rule. 
    Step 4From the Interface drop-down list, choose the interface on which to apply the rule. Choose Any to apply 
    a global rule. 
    						
    							 
    7-10
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    Step 5In the Action field, click one of the following radio buttons next to the desired action:
    Permit—Permits access if the conditions are matched.
    Deny—Denies access if the conditions are matched.
    Step 6In the EtherType field, choose an EtherType value from the drop-down list.
    Step 7(Optional) In the Description field, add a test description about the rule.
    The description can contain multiple lines; however, each line can be no more than 100 characters in 
    length.
    Step 8(Optional) To specify the direction for this rule, click More Options to expand the list, and then specify 
    the direction by clicking one of the following radio buttons:
    In—Incoming traffic
    Out—Outgoing traffic
    Step 9Click OK.
    Configuring Management Access Rules   
    You can configure an interface ACL that supports access control for to-the-box management traffic from 
    a specific peer (or set of peers) to the security appliance. One scenario in which this type of ACL would 
    be useful is when you want to block IKE Denial of Service attacks.
    To configure an extended ACL that permits or denies packets for to-the-box traffic, perform the 
    following steps:
    Step 1Choose Configuration > Device Management > Management Access > Management Access Rules. 
    Step 2Click Add, and choose one of the following actions:
    The Add Management Access Rule dialog box appears.
    Step 3From the Interface drop-down list, choose an interface on which to apply the rule. Choose Any to apply 
    a global rule.
    Step 4In the Action field, click one of the following radio buttons to choose the action:
    Permit—Permits access if the conditions are matched.
    Deny—Denies access if the conditions are matched.
    Step 5In the Source field, enter an IP address that specifies the network object group, interface IP, or any 
    address from which traffic is permitted or denied. You may use either an IPv4 or IPv6 address. 
    NoteIPv6 must be enabled on at least one interface before you can configure an extended ACL with 
    an IPv6 address. For more information about enabling IPv6 on an interface, see the “Configuring 
    IPv6 Addressing” section on page 13-18 in the general operations configuration guide.
    Step 6In the Service field, add a service name for rule traffic, or click the ellipsis (...) to browse for a service.
    Step 7(Optional) In the Description field, add a description for this management access rule.
    The description can contain multiple lines; however, each line can be no more than 100 characters in 
    length. 
    						
    							 
    7-11
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    Step 8(Optional) Logging is enabled by default. You can disable logging by unchecking the check box, or you 
    can change the logging level from the drop-down list. The default logging level is Informational.
    Step 9(Optional) To add a source service (TCP, UDP, and TCP-UDP only) and a time range to your access rule 
    that specifies when traffic can be allowed or denied, click More Options to expand the list.If you want 
    to turn off this Management Access Rule, uncheck Enable Rule.
    Add a source service in the Source Service field, or click the ellipsis (...) to browse for a service. 
    The destination service and source service must be the same. Copy and paste the destination Service 
    field to the Source Service field.
    To configure the logging interval (if you enable logging and choose a non-default setting), enter a 
    value in seconds in the Logging Interval field.
    To select a predefined time range for this rule, from the Time Range drop-down list, choose a time 
    range; or click the ellipsis (...) to browse for a time range. You can also specify additional time 
    constraints for the time range, such as specifying the days of the week or the recurring weekly 
    interval in which the time range will be active.
    Step 10Click OK. The dialog box closes, and the Management Access rule is added.
    Step 11Click Apply. The rule is saved in the running configuration.
    Advanced Access Rule Configuration
    The Advanced Access Rule Configuration dialog box lets you to set global access rule logging options. 
    When you enable logging, if a packet matches the access rule, the ASA creates a flow entry to track the 
    number of packets received within a specific interval. The ASA generates a system log message at the 
    first hit and at the end of each interval, identifying the total number of hits during the interval and 
    reporting the time of the last hit. 
    NoteThe ASApane displays the hit count information in the “last rule hit” row. To view the rule hit count and 
    timestamp, choose Configuration > Firewall > Advanced > ACL Manager, and hover the mouse 
    pointer over a cell in the ACL Manager table. 
    At the end of each interval, the ASA resets the hit count to 0. If no packets match the access rule during 
    an interval, the ASA deletes the flow entry.
    A large number of flows can exist concurrently at any point of time. To prevent unlimited consumption 
    of memory and CPU resources, the ASA places a limit on the number of concurrent deny flows; the limit 
    is placed only on deny flows (and not permit flows) because they can indicate an attack. When the limit 
    is reached, the ASA does not create a new deny flow until the existing flows expire. If someone initiates 
    a denial of service attack, the ASA can create a very large number of deny flows in a very short period 
    of time. Restricting the number of deny-flows prevents unlimited consumption of memory and CPU 
    resources.
    Prerequisites
    These settings only apply if you enable the newer logging mechanism for the access rule.
    Fields
    Maximum Deny-flows—The maximum number of deny flows permitted before the ASA stops 
    logging, between 1 and the default value. The default is 4096. 
    						
    							 
    7-12
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    Alert Interval—The amount of time (1-3600 seconds) between system log messages (number 
    106101) that identify that the maximum number of deny flows was reached. The default is 300 
    seconds.
    Per User Override table—Specifies the state of the per user override feature. If the per user override 
    feature is enabled on the inbound access rule, the access rule provided by a RADIUS server replaces 
    the access rule configured on that interface. If the per user override feature is disabled, the access 
    rule provided by the RADIUS server is combined with the access rule configured on that interface. 
    If the inbound access rule is not configured for the interface, per user override cannot be configured.
    By default, VPN remote access traffic is not matched against interface ACLs. However, if you 
    deselect the Enable inbound VPN sessions to bypass interface access lists setting on the 
    Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Connection 
    Profiles pane), the behavior depends on whether there is a VPN filter applied in the group policy 
    (see the Configuration > Remote Access VPN > Network (Client) Access > Group Policies > 
    Add/Edit > General > More Options > Filter field) and whether you set the Per User Override option:
    –No Per User Override, no VPN filter —Traffic is matched against the interface ACL.
    –No Per User Override, VPN filter —Traffic is matched first against the interface ACL, then 
    against the VPN filter.
    –Per User Override, VPN filter —Traffic is matched against the VPN filter only.
    Object Group Search Setting—Reduces the amount of memory used to store service rules, but 
    lengthens the amount of time to search for a matching access rule.
    Access Rule Explosion
    The security appliance allows you to turn off the expansion of access rules that contain certain object 
    groups. When expansion is turned off, an object group search is used for lookup, which lowers the 
    memory requirements for storing expanded rules but decreases the lookup performance. Because of the 
    trade-off of performance for memory utilization, you can turn on and turn off the search.
    To configure the option of turning off the expansion of access rules that contain s, perform the following 
    steps:
    Step 1Choose Configuration > Firewall > Access Rules.
    Step 2Click the Advanced button.
    Step 3Check the Enable Object Group Search Algorithm check box.
    Configuring HTTP Redirect
    The HTTP Redirect table displays each interface on the ASA, shows whether it is configured to redirect 
    HTTP connections to HTTPS, and the port number from which it redirects those connections.
    NoteTo redirect HTTP, the interface requires an ACL that permits HTTP. Otherwise, the interface cannot 
    listen to the HTTP port. 
    						
    							 
    7-13
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Guidelines and Limitations
    The Configuration > Device Management > Advanced > HTTP Redirect > Edit pane lets you change the 
    HTTP redirect setting of an interface or the port from which it redirects HTTP connections. Select the 
    interface in the table and click Edit. You can also double-click an interface. The Edit HTTP/HTTPS 
    Settings dialog box opens.
    Edit HTTP/HTTPS Settings
    The Edit HTTP/HTTPS Settings dialog box lets you change the HTTP redirect setting of an interface or 
    the port number.
    Fields
    The Edit HTTP/HTTPS Settings dialog box includes the following fields:
    Interface—Identifies the interface on which the ASA redirects or does not redirect HTTP requests 
    to HTTPS.
    Redirect HTTP to HTTPS—Check to redirect HTTP requests to HTTPS, or uncheck to not redirect 
    HTTP requests to HTTPS.
    HTTP Port—Identifies the port from which the interface redirects HTTP connections. By default it 
    listens to port 80.
    For more information about access rules, see the “Information About Access Rules” section on page 7-1.
    Configuring Transactional Commit Model
    The ASA allows you to enable the Transactional commit model on the rule engine for access groups. 
    With this model, new rules will not take effect until the rules are compiled and stable. During 
    compilation packets will continue to match the old rules, but the connections per second limit will 
    remain unaffected. 
    To enable the Transactional Commit Model, perform the following steps:
    Step 1Choose Configuration > Device Management > Advanced > Rule Engine.
    Step 2Check the Enable Transactional commit model on Rule engine for Access Groups check box.
    Step 3Click Apply. 
    						
    							 
    7-14
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Feature History for Access Rules
    Feature History for Access Rules
    Ta b l e 7 - 2 lists each feature change and the platform release in which it was implemented. ASDM is 
    backwards-compatible with multiple platform releases, so the specific ASDM release in which support 
    was added is not listed.
    Table 7-2 Feature History for Access Rules
    Feature NamePlatform 
    Releases Feature Information
    Interface access rules 7.0(1) Controlling network access through the ASA using ACLs.
    We introduced the following screen: Configuration > 
    Firewall > Access Rules.
    Global access rules 8.3(1) Global access rules were introduced.
    We modified the following screen: Configuration > Firewall 
    > Access Rules.
    Support for Identity Firewall 8.4(2) You can now use identity firewall users and groups for the 
    source and destination. You can use an identity firewall 
    ACL with access rules, AAA rules, and for VPN 
    authentication.
    EtherType ACL support for IS-IS traffic 8.4(5), 9.1(2) In transparent firewall mode, the ASA can now pass IS-IS 
    traffic using an EtherType ACL.
    We modified the following screen: Configuration > Device 
    Management > Management Access > EtherType Rules.
    Support for TrustSec 9.0(1) You can now use TrustSec security groups for the source 
    and destination. You can use an identity firewall ACL with 
    access rules.
    Unified ACL for IPv4 and IPv6 9.0(1) ACLs now support IPv4 and IPv6 addresses. You can even 
    specify a mix of IPv4 and IPv6 addresses for the source and 
    destination. The any keyword was changed to represent 
    IPv4 and IPv6 traffic. The any4 and any6 keywords were 
    added to represent IPv4-only and IPv6-only traffic, 
    respectively. The IPv6-specific ACLs are deprecated. 
    Existing IPv6 ACLs are migrated to extended ACLs. See the 
    release notes for more information about migration.
    We modified the following screens:
    Configuration > Firewall > Access Rules
    Configuration > Remote Access VPN > Network (Client) 
    Access > Group Policies > General > More Options  
    						
    							 
    7-15
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Feature History for Access Rules
    Extended ACLand object enhancement to filter 
    ICMP traffic by ICMP code9.0(1) ICMP traffic can now be permitted/denied based on ICMP 
    code.
    We introduced or modified the following screens:
    Configuration > Firewall > Objects > Service 
    Objects/Groups
    Configuration > Firewall > Access Rule 
    Transactional Commit Model on Rule Engine 
    for Access groups9.1(5) When enabled, a rule update is applied after the rule 
    compilation is completed; without affecting the rule 
    matching performance.
    We introduced the following screen: Configuration > 
    Device Management > Advanced > Rule Engine.
    Table 7-2 Feature History for Access Rules (continued)
    Feature NamePlatform 
    Releases Feature Information 
    						
    							 
    7-16
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 7      Configuring Access Rules
      Feature History for Access Rules 
    						
    All Cisco manuals Comments (0)