SlideShare una empresa de Scribd logo
1 de 21
ASA55xx Series
Cisco’s series of Adaptive Security Appliances
Bryley Systems Inc.
Business Technology Solutions Since 1987
Agenda
• Default Capabilities
• Models
• Optional Capabilities
ASA Capabilities
• Stateful/Deep Packet Inspection Firewall
• IPSec VPN Endpoint
• SSL VPN Endpoint
• Virtualization
• Anti-X
• Intrusion Prevention
Firewall
• Default firewall rules
– Outbound traffic is allowed unless otherwise
specified
– Inbound traffic is denied unless otherwise
specified
• Stateful packet inspection ensures that
responses to outbound traffic match outgoing
requests
ASA Firewall
• ASA assigns a security level to each interface
– inside is 100, outside (Interent) is 0, DMZ is
typically assigned 50
– Default rules allow free flow from higher security
level to lower security 0 level
• NAT/PAT
– Allows for more servers with fewer public Ips
• Deep packet inspection
IPSec VPN
• Used for LAN-to-LAN connections
• Workstation clients for Windows, Macintosh,
Linux
• Maximum connections depends on model
• No additional licenses required
• EasyVPN
– Simplified configuration
– Inbound connections only
SSL VPN
• No pre-installed client – connect with web
browser
• Licensed by simultaneous connections (2
connections permitted for testing)
• Clientless connection
– Simplest configuration
– Limited to web applications
– Some client-server applications are SSL VPN aware
SSL VPN
• Cisco AnyConnect VPN client
• Downloaded on-the-fly
• Full network access (if desired)
• Windows/Macintosh/Linux
• May not function of user rights on client
computer limited
IPSec vs SSL
IPSec
• Workstation configuration
required
• Administrator can configure
VPN then restrict user
access
• Access as if client machine
on LAN
• Has pre-shared key in
addition to user password
• No additional cost
SSL
• Browser-based from any
computer
• Limited access if user does
not have right to install
applications
• Need to use web applictions
to ensure access
• Vulnerable to password
compromise
• Extra cost feature
ASA Models
• ASA550x - SOHO/Telecommuter
• ASA551x
• ASA552x
• ASA554x
• ASA555x - Large enterprise
• ASA558x - Datacenter/ISP
Main Office, Integrated
Protection
http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
ASA550x – Base License
• 10/50/Unlimited internal devices
• 10 Simultaneous VPNs
• 8 10/100 Ethernet ports – assigned to VLANs
• 2 Power over Ethernet
• 3 VLANs
• One VLAN must be isolated from
communicating with one of the others.
ASA550x – Telecommuter setup
ASA550x – Security Plus
• 25 Simultaneous VPNs
• Ports must be assigned to one of three
interfaces, up to 20 trunked VLANs permitted
• Communications between interfaces restriced
by standard firewall rules
• Failover to backup ISP for outbound access
ASA551x – Base License
• 250 Simultaneous VPNs
• 3 – 10/100 Ethernet ports – Firewall interfaces
• 1 – 10/100 Ethernet port – Management only
• Up to 50 Trunked VLANs
• SSM Slot for Content Filter or Intrusion
Prevention Module
ASA551x – Security Plus License
• 250 Simultaneous VPNs
• 3 – 10/100 Ethernet ports
• 2 – 10/100/1000 Ethernet ports
• Up to 100 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/5 maximum Security Contexts
ASA552x
• 750 Simultaneous VPNs
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• Up to 150 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/20 maximum Security Contexts
ASA554x
• 5000 Simultaneous VPNs (2500 SSL)
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• Up to 200 Trunked VLANs
• SSM Slot for Content Filter, Intrusion
Prevention Module, or 4 x 10/100/1000
Ethernet Port module
• 2 included/50 maximum Security Contexts
ASA555x
• 5000 Simultaneous VPNs
• 1 – 10/100 Ethernet port
• 4 – 10/100/1000 Ethernet ports
• 4 ports selectable 1000T/SFP Fiber ports
• Up to 250 Trunked VLANs
• No SSM Slot
• 2 included/50 maximum Security Contexts
Content Security and Control Module
• Standard License
– Anti-virus
– Anti-Spyware
– File blocking
• Plus License adds
– Anti-SPAM
– URL Filter
– E-mail content control
Content Security and Control Module
• CSC-SSM-10
– 50/100/250/500 users
– ASA5510 and ASA5520
• CSC-SSM-20
– 750/1000 users
– ASA5510 , ASA5520, ASA5540
• Subscription required for updates
Advanced Intrusion Prevention
• Compares every packet against a signature
database
• Alerting or automatic blocking
• Update subscription required

Más contenido relacionado

La actualidad más candente

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall conceptsMostafa El Lathy
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptxaungyekhant1
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy conceptsMostafa El Lathy
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Joud Khattab
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)Mostafa El Lathy
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANToshal Dudhwala
 

La actualidad más candente (20)

Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
SD WAN
SD WANSD WAN
SD WAN
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
01- intro to firewall concepts
01- intro to firewall concepts01- intro to firewall concepts
01- intro to firewall concepts
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Vlan
VlanVlan
Vlan
 
2 what is the best firewall (sizing)
2 what is the best firewall (sizing)2 what is the best firewall (sizing)
2 what is the best firewall (sizing)
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 

Similar a Cisco ASA Firewalls

4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdfssuser88346b
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 
Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Rogelio Gomez
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskInductive Automation
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWSTeri Radichel
 
Aruba 650 ds_a650651
Aruba 650 ds_a650651Aruba 650 ds_a650651
Aruba 650 ds_a650651opptecnologia
 
Adopting Modern SSL / TLS
Adopting Modern SSL / TLSAdopting Modern SSL / TLS
Adopting Modern SSL / TLSAvi Networks
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgEric Vanderburg
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgEric Vanderburg
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptxPrakash Singh
 

Similar a Cisco ASA Firewalls (20)

4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf4.1-cnse-study-guide.pdf
4.1-cnse-study-guide.pdf
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...Wi Fi Technology - What you don't see you don't care...
Wi Fi Technology - What you don't see you don't care...
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Unit08
Unit08Unit08
Unit08
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
Aruba 650 ds_a650651
Aruba 650 ds_a650651Aruba 650 ds_a650651
Aruba 650 ds_a650651
 
Adopting Modern SSL / TLS
Adopting Modern SSL / TLSAdopting Modern SSL / TLS
Adopting Modern SSL / TLS
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Guide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric VanderburgGuide to protecting networks - Eric Vanderburg
Guide to protecting networks - Eric Vanderburg
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall
FirewallFirewall
Firewall
 
Vpn
VpnVpn
Vpn
 
TP Link Load Balancer.pptx
TP Link Load Balancer.pptxTP Link Load Balancer.pptx
TP Link Load Balancer.pptx
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cisco ASA Firewalls

  • 1. ASA55xx Series Cisco’s series of Adaptive Security Appliances Bryley Systems Inc. Business Technology Solutions Since 1987
  • 2. Agenda • Default Capabilities • Models • Optional Capabilities
  • 3. ASA Capabilities • Stateful/Deep Packet Inspection Firewall • IPSec VPN Endpoint • SSL VPN Endpoint • Virtualization • Anti-X • Intrusion Prevention
  • 4. Firewall • Default firewall rules – Outbound traffic is allowed unless otherwise specified – Inbound traffic is denied unless otherwise specified • Stateful packet inspection ensures that responses to outbound traffic match outgoing requests
  • 5. ASA Firewall • ASA assigns a security level to each interface – inside is 100, outside (Interent) is 0, DMZ is typically assigned 50 – Default rules allow free flow from higher security level to lower security 0 level • NAT/PAT – Allows for more servers with fewer public Ips • Deep packet inspection
  • 6. IPSec VPN • Used for LAN-to-LAN connections • Workstation clients for Windows, Macintosh, Linux • Maximum connections depends on model • No additional licenses required • EasyVPN – Simplified configuration – Inbound connections only
  • 7. SSL VPN • No pre-installed client – connect with web browser • Licensed by simultaneous connections (2 connections permitted for testing) • Clientless connection – Simplest configuration – Limited to web applications – Some client-server applications are SSL VPN aware
  • 8. SSL VPN • Cisco AnyConnect VPN client • Downloaded on-the-fly • Full network access (if desired) • Windows/Macintosh/Linux • May not function of user rights on client computer limited
  • 9. IPSec vs SSL IPSec • Workstation configuration required • Administrator can configure VPN then restrict user access • Access as if client machine on LAN • Has pre-shared key in addition to user password • No additional cost SSL • Browser-based from any computer • Limited access if user does not have right to install applications • Need to use web applictions to ensure access • Vulnerable to password compromise • Extra cost feature
  • 10. ASA Models • ASA550x - SOHO/Telecommuter • ASA551x • ASA552x • ASA554x • ASA555x - Large enterprise • ASA558x - Datacenter/ISP Main Office, Integrated Protection http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html
  • 11. ASA550x – Base License • 10/50/Unlimited internal devices • 10 Simultaneous VPNs • 8 10/100 Ethernet ports – assigned to VLANs • 2 Power over Ethernet • 3 VLANs • One VLAN must be isolated from communicating with one of the others.
  • 13. ASA550x – Security Plus • 25 Simultaneous VPNs • Ports must be assigned to one of three interfaces, up to 20 trunked VLANs permitted • Communications between interfaces restriced by standard firewall rules • Failover to backup ISP for outbound access
  • 14. ASA551x – Base License • 250 Simultaneous VPNs • 3 – 10/100 Ethernet ports – Firewall interfaces • 1 – 10/100 Ethernet port – Management only • Up to 50 Trunked VLANs • SSM Slot for Content Filter or Intrusion Prevention Module
  • 15. ASA551x – Security Plus License • 250 Simultaneous VPNs • 3 – 10/100 Ethernet ports • 2 – 10/100/1000 Ethernet ports • Up to 100 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/5 maximum Security Contexts
  • 16. ASA552x • 750 Simultaneous VPNs • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • Up to 150 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/20 maximum Security Contexts
  • 17. ASA554x • 5000 Simultaneous VPNs (2500 SSL) • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • Up to 200 Trunked VLANs • SSM Slot for Content Filter, Intrusion Prevention Module, or 4 x 10/100/1000 Ethernet Port module • 2 included/50 maximum Security Contexts
  • 18. ASA555x • 5000 Simultaneous VPNs • 1 – 10/100 Ethernet port • 4 – 10/100/1000 Ethernet ports • 4 ports selectable 1000T/SFP Fiber ports • Up to 250 Trunked VLANs • No SSM Slot • 2 included/50 maximum Security Contexts
  • 19. Content Security and Control Module • Standard License – Anti-virus – Anti-Spyware – File blocking • Plus License adds – Anti-SPAM – URL Filter – E-mail content control
  • 20. Content Security and Control Module • CSC-SSM-10 – 50/100/250/500 users – ASA5510 and ASA5520 • CSC-SSM-20 – 750/1000 users – ASA5510 , ASA5520, ASA5540 • Subscription required for updates
  • 21. Advanced Intrusion Prevention • Compares every packet against a signature database • Alerting or automatic blocking • Update subscription required

Notas del editor

  1. ASA is a stateful packet inspection firewall. Some protocols are inspected at a other layers Anti-X – anti-virus, anti-spy, file filter, anti-spam, url filter
  2. Stateful packet inspection has been standard for ALMOST 10 years, some early low-cost NAT devices lacked it.
  3. Typical firewalls allow for one of each type of server on a single pubic IP. Multiple Ips must be assigned one to one to internal servers. PAT allows for one server per protocol per public IP. Not exclusive to Cisco, but not typically found on low end fuirewalls. Deep packet inspection performs basic checks for validity on some protocols.