Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    Contents
    19
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Feature History for the ASA CX Module30-33
    CHAPTER 31Configuring the ASA IPS Module31-1
    Information About the ASA IPS Module31-1
    How the ASA IPS Module Works with the ASA31-2
    Operating Modes31-3
    Using Virtual Sensors (ASA 5510 and Higher)31-3
    Information About Management Access31-4
    Licensing Requirements for the ASA IPS module31-5
    Guidelines and Limitations31-5
    Default Settings31-6
    Configuring the ASA IPS module31-7
    Task Flow for the ASA IPS Module31-7
    Connecting the ASA IPS Management Interface31-8
    Sessioning to the Module from the ASA (May Be Required)31-11
    (ASA 5512-X through ASA 5555-X) Booting the Software Module31-12
    Configuring Basic IPS Module Network Settings31-12
    Configuring the Security Policy on the ASA IPS Module31-15
    Assigning Virtual Sensors to a Security Context (ASA 5510 and Higher)31-17
    Diverting Traffic to the ASA IPS module31-18
    Managing the ASA IPS module31-19
    Installing and Booting an Image on the Module31-20
    Shutting Down the Module31-22
    Uninstalling a Software Module Image31-22
    Resetting the Password31-23
    Reloading or Resetting the Module31-24
    Monitoring the ASA IPS module31-24
    Feature History for the ASA IPS module31-25
    CHAPTER 32Configuring the ASA CSC Module32-1
    Information About the CSC SSM32-1
    Determining What Traffic to Scan32-3
    Licensing Requirements for the CSC SSM32-5
    Prerequisites for the CSC SSM32-5
    Guidelines and Limitations32-6
    Default Settings32-6
    Configuring the CSC SSM32-7
    Before Configuring the CSC SSM32-7 
    						
    							 
    Contents
    20
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Connecting to the CSC SSM32-8
    Determining Service Policy Rule Actions for CSC Scanning32-9
    CSC SSM Setup Wizard32-10
    Activation/License32-11
    IP Configuration32-11
    Host/Notification Settings32-12
    Management Access Host/Networks32-13
    Password32-13
    Restoring the Default Password32-14
    Wizard Setup32-15
    Using the CSC SSM GUI32-20
    Web32-20
    Mail32-21
    SMTP Tab32-21
    POP3 Tab32-22
    File Transfer32-22
    Updates32-23
    Monitoring the CSC SSM32-24
    Threats32-24
    Live Security Events32-25
    Live Security Events Log32-25
    Software Updates32-26
    Resource Graphs32-27
    Troubleshooting the CSC Module32-27
    Additional References32-31
    Feature History for the CSC SSM32-31
    INDEX 
    						
    							 
    3
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    About This Guide
    This preface introduces Cisco ASA Series Firewall ASDM Configuration Guide and includes the 
    following sections:
    •Document Objectives, page 3
    Related Documentation, page 3
    Conventions, page 4
    Obtaining Documentation and Submitting a Service Request, page 4
    Document Objectives
    The purpose of this guide is to help you configure the firewall features for ASA using ASDM. This guide 
    does not cover every feature, but describes only the most common configuration scenarios.
    This guide applies to the Cisco ASA series. Throughout this guide, the term “ASA” applies generically 
    to supported models, unless specified otherwise.
    NoteASDM supports many ASA versions. The ASDM documentation and online help includes all of the 
    latest features supported by the ASA. If you are running an older version of ASA software, the 
    documentation might include features that are not supported in your version. Similarly, if a feature was 
    added into a maintenance release for an older major or minor version, then the ASDM documentation 
    includes the new feature even though that feature might not be available in all later ASA releases. Please 
    refer to the feature history table for each chapter to determine when features were added. For the 
    minimum supported version of ASDM for each ASA version, see Cisco ASA Series Compatibility. 
    Related Documentation
    For more information, see Navigating the Cisco ASA Series Documentation at 
    http://www.cisco.com/go/asadocs. 
    						
    							 
    4
    Cisco ASA Series Firewall ASDM Configuration Guide
     
          
      Obtaining Documentation and Submitting a Service Request
    Conventions
    This document uses the following conventions:
    NoteMeans reader take note.
    TipMeans the following information will help you solve a problem. 
    CautionMeans reader be careful. In this situation, you might perform an action that could result in equipment 
    damage or loss of data.
    Obtaining Documentation and Submitting a Service Request
    For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a 
    service request, and gathering additional information, see What’s New in Cisco Product Documentation.
    To receive new and revised Cisco technical content directly to your desktop, you can subscribe to 
    the What’s New in Cisco Product Documentation RSS feed. The RSS feeds are a free service. Convention Indication
    bold font Commands and keywords and user-entered text appear in bold font.
    italic  font Document titles, new or emphasized terms, and arguments for which you supply 
    values are in italic font.
    [   ] Elements in square brackets are optional.
    {x | y | z } Required alternative keywords are grouped in braces and separated by 
    vertical bars.
    [ x | y | z ] Optional alternative keywords are grouped in brackets and separated by 
    vertical bars.
    string A nonquoted set of characters. Do not use quotation marks around the string or 
    the string will include the quotation marks.
    courier font Terminal sessions and information the system displays appear in courier font.
    courier bold font Commands and keywords and user-entered text appear in bold courier font.
    courier italic font Arguments for which you supply values are in courier italic font.
    <   > Nonprinting characters such as passwords are in angle brackets.
    [   ] Default responses to system prompts are in square brackets.
    !, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code 
    indicates a comment line. 
    						
    							 
    PART 1
    Configuring Service Policies 
    						
    							CH A P T E R
     
    1-1
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    1
    Configuring a Service Policy
    Service policies provide a consistent and flexible way to configure ASA features. For example, you can 
    use a service policy to create a timeout configuration that is specific to a particular TCP application, as 
    opposed to one that applies to all TCP applications. A service policy consists of multiple service policy 
    rules applied to an interface or applied globally.
    This chapter includes the following sections:
    Information About Service Policies, page 1-1
    Licensing Requirements for Service Policies, page 1-5
    Guidelines and Limitations, page 1-6
    Default Settings, page 1-7
    Task Flows for Configuring Service Policies, page 1-8
    Adding a Service Policy Rule for Through Traffic, page 1-8
    Adding a Service Policy Rule for Management Traffic, page 1-13
    Managing the Order of Service Policy Rules, page 1-15
    Feature History for Service Policies, page 1-17
    Information About Service Policies
    This section describes how service policies work and includes the following topics:
    Supported Features, page 1-1
    Feature Directionality, page 1-2
    Feature Matching Within a Service Policy, page 1-3
    Order in Which Multiple Feature Actions are Applied, page 1-4
    Incompatibility of Certain Feature Actions, page 1-5
    Feature Matching for Multiple Service Policies, page 1-5
    Supported Features
    Ta b l e 1 - 1 lists the features supported by service policy rules. 
    						
    							 
    1-2
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Information About Service Policies
    Feature Directionality
    Actions are applied to traffic bidirectionally or unidirectionally depending on the feature. For features 
    that are applied bidirectionally, all traffic that enters or exits the interface to which you apply the policy 
    map is affected if the traffic matches the class map for both directions.
    Table 1-1  Service Policy Rule Features
    FeatureFor Through 
    Traffic?For Management 
    Traffic? See:
    Application inspection (multiple 
    types)
    All except 
    RADIUS 
    accountingRADIUS 
    accounting onlyChapter 10, “Getting Started with Application 
    Layer Protocol Inspection.”
    Chapter 11, “Configuring Inspection of Basic 
    Internet Protocols.”
    Chapter 12, “Configuring Inspection for Voice 
    and Video Protocols.”
    Chapter 13, “Configuring Inspection of Database 
    and Directory Protocols.”
    Chapter 14, “Configuring Inspection for 
    Management Application Protocols.”
    Chapter 25, “Configuring the ASA for Cisco 
    Cloud Web Security.”
    ASA CSC
    Ye sNoChapter 32, “Configuring the ASA CSC Module.”
    ASA IPS
    Ye sNoChapter 31, “Configuring the ASA IPS Module.”
    ASA CX
    Ye sNoChapter 30, “Configuring the ASA CX Module.”
    NetFlow Secure Event Logging 
    filtering
    Ye sYe sChapter 94, “Configuring NetFlow Secure Event 
    Logging (NSEL),” in the general operations 
    configuration guide.
    QoS input and output policing
    Ye sNoChapter 23, “Configuring QoS.”
    QoS standard priority queue
    Ye sNoChapter 23, “Configuring QoS.”
    QoS traffic shaping, hierarchical 
    priority queue
    Ye sYe sChapter 23, “Configuring QoS.”
    TCP and UDP connection limits 
    and timeouts, and TCP sequence 
    number randomization
    Ye sYe sChapter 22, “Configuring Connection Settings.”
    TCP normalization
    Ye sNoChapter 22, “Configuring Connection Settings.”
    TCP state bypass
    Ye sNoChapter 22, “Configuring Connection Settings.”
    User statistics for Identity 
    Firewall
    Ye sYe sSee the user-statistics command in the command 
    reference. 
    						
    							 
    1-3
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Information About Service Policies
    NoteWhen you use a global policy, all features are unidirectional; features that are normally bidirectional 
    when applied to a single interface only apply to the ingress of each interface when applied globally. 
    Because the policy is applied to all interfaces, the policy will be applied in both directions so 
    bidirectionality in this case is redundant.
    For features that are applied unidirectionally, for example QoS priority queue, only traffic that enters (or 
    exits, depending on the feature) the interface to which you apply the policy map is affected. See 
    Ta b l e 1 - 2 for the directionality of each feature.
    Feature Matching Within a Service Policy
    See the following information for how a packet matches rules in a policy for a given interface:
    1.A packet can match only one rule for an interface for each feature type.
    2.When the packet matches a rule for a feature type, the ASA does not attempt to match it to any 
    subsequent rules for that feature type.
    3.If the packet matches a subsequent rule for a different feature type, however, then the ASA also 
    applies the actions for the subsequent rule, if supported. See the “Incompatibility of Certain Feature 
    Actions” section on page 1-5 for more information about unsupported combinations.
    NoteApplication inspection includes multiple inspection types, and most are mutually exclusive. 
    For inspections that can be combined, each inspection is considered to be a separate feature.
    Table 1-2 Feature Directionality
    Feature Single Interface Direction Global Direction
    Application inspection (multiple types) Bidirectional Ingress
    ASA CSC Bidirectional Ingress
    ASA CX Bidirectional Ingress
    ASA CX authentication proxy Ingress Ingress
    ASA IPS Bidirectional Ingress
    NetFlow Secure Event Logging filtering N/A Ingress
    QoS input policing Ingress Ingress
    QoS output policing Egress Egress
    QoS standard priority queue Egress Egress
    QoS traffic shaping, hierarchical priority 
    queueEgress Egress
    TCP and UDP connection limits and timeouts, 
    and TCP sequence number randomizationBidirectional Ingress
    TCP normalization Bidirectional Ingress
    TCP state bypass Bidirectional Ingress
    User statistics for Identity Firewall Bidirectional Ingress 
    						
    							 
    1-4
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 1      Configuring a Service Policy
      Information About Service Policies
    For example, if a packet matches a rule for connection limits, and also matches a rule for an application 
    inspection, then both actions are applied.
    If a packet matches a rulefor HTTP inspection, but also matches another rule that includes HTTP 
    inspection, then the second rule actions are not applied.
    If a packet matches a rulefor HTTP inspection, but also matches another rule that includes FTP 
    inspection, then the second rule actions are not applied because HTTP and FTP inspections cannpt be 
    combined.
    If a packet matches a rule for HTTP inspection, but also matches another rule that includes IPv6 
    inspection, then both actions are applied because the IPv6 inspection can be combined with any other 
    type of inspection.
    Order in Which Multiple Feature Actions are Applied
    The order in which different types of actions in a service policy are performed is independent of the order 
    in which the actions appear in the table.
    NoteNetFlow Secure Event Logging filtering and User statistics for Identity Firewall are order-independent.
    Actions are performed in the following order:
    1.QoS input policing
    2.TCP normalization, TCP and UDP connection limits and timeouts, TCP sequence number 
    randomization, and TCP state bypass.
    NoteWhen a the ASA performs a proxy service (such as AAA or CSC) or it modifies the TCP payload 
    (such as FTP inspection), the TCP normalizer acts in dual mode, where it is applied before and 
    after the proxy or payload modifying service.
    3.ASA CSC
    4.Application inspections that can be combined with other inspections:
    a.IPv6
    b.IP options
    c.WAAS
    5.Application inspections that cannot be combined with other inspections. See the “Incompatibility of 
    Certain Feature Actions” section on page 1-5 for more information.
    6.ASA IPS
    7.ASA CX
    8.QoS output policing
    9.QoS standard priority queue
    10.QoS traffic shaping, hierarchical priority queue 
    						
    All Cisco manuals Comments (0)