Cisco ASA Firewall Best Practices For Firewall Deployment
Cisco ASA Firewall Best Practices For Firewall Deployment
Cisco ASA Firewall Best Practices For Firewall Deployment
Page 1 of 10
by
What's my IP Address?
Your request has come from IP Address: 188.72.40.243
- HOME - ARTICLES - PRODUCTS --- VISIO DRAWINGS --- THOSE BUTTONS --- EXCEL PLUGIN --- DISK CLOCKS - CHECKOUT - CONTACT
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
Page 2 of 10
The link to the configuration file is here: Link: Cisco ASA Firewall Best Practices Configuration for Firewall Deployment 1 - Check The Network
Contents
Interfaces Types and Naming Interfaces Security Level and inter / intra interface Connections to the ASA - L2 and L3 Device Access ACS Configuration Redundant Pair / Failover Setup Routing Protocols and Static Routes Enable Traffic without NAT -- nat-control versus no nat-control Bypassing Nat when nat-control is enabled Access-List versus Inspection Rules Enabling ICMP to Firewall Interfaces Enabling ICMP through the Firewall Traceroute and Enabling Cisco IOS traceroute Reverse Route Verification
Interface configuration example trunk on g0/2: interface GigabitEthernet0/2 speed 1000 duplex full no shutdown Interface GigabitEthernet0/2.65
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
vlan 65 no shutdown description our applications production only nameif dmz65_our_applications security-level 55 ip address 10.30.86.33 255.255.255.240 standby 10.30.86.34 Where ASAs will be deployed in multiple locations supporting ACTIVE/ACTIVE or DR, the VLAN assignments should be the same at each location if possible. This will simplify the security policy assignments.
Page 3 of 10
Complete CCIE Training Over 80 hours of R&S CCIE Training Videos for only $299. Download Now. www.INE.com/cisco_training Network Intelligence Understand better yr telco network efficiency & prepare migration plan www.networkmining.com easyCMDB Config, Change & Incident Mgmt - Your ITIL-based ITSM Solution www.easycmdb.com
no
Security levels to be applied: inside Security 100 most trusted. outside Security 0 least trusted. dmzXXX Security 50 organization-purpose dmzXXX Security 50 organization-purpose (No default communication between same security) We make a design / security choice here: dmzXXX Security 60 organization-purpose dmzXXX Security 70 organization-purpose (communication possible between security levels)
Note we are using same security levels for DMZs. This opens other considerations. Normally, interfaces on the same security level cannot communicate without access-list entries. This command: same-security-traffic permit interinterface will allow communication between same security level interfaces additionally, without the need for accesslists. Reference Cisco ASA Command same-security-traffic ( 7.2 ) We generally do not want this feature enabled. An example case being in a Vendor-DMZ firewall, 2 banks connected to our network on different DMZs, setting security 50 on both interfaces. If same-security-traffic permit inter-interface is enabled bank A would see bank B without access-lists, interfaces at the same security level are not required to use NAT to communicate. For security, we always want to use access lists.
no
Best practice Apply the keep it simple theory here. Enabling this feature allows traffic entering an interface to exit the same interface, most useful for VPN and hairpinning. Unless this is a VPN device, leave the hair-pinning to L3 devices. Best practice Do not use the firewall for router functions, do not bounce traffic off of the firewall. When the firewall has a large L2 VLAN attached and hosts are using the firewall interface as a Default route, and further it has routes to networks via the same connected interface, the firewall can allow this traffic under other correct configuration conditions (NAT and ACL). This is much like a router forwarding a packet and sending ICMP redirects. Best practice Avoid a difficult configuration and allows firewall log entries to reflect true meaning with reference to intra-interface.
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
L2 additional port settings on connecting switches o o spanning-tree portfast Spanning-tree bpduguard enable
Page 4 of 10
If there is not a dedicated security management network in place, the Management interface is not in use. The 7.2(4) code revision does not support a vrf environement. The static routing required for the management network(s) could interfere with production traffic. Management of further devices past acl ruleset could also be upset. This port can presently support a truly isolated, non routed management network. G0/3 - failover+stateful, this is direct cabled. You may find Cisco documentation that indicates connecting via L2 switches is preferred / mandatory. This was true in Pix 6.x days but is not required / recommended now. Some of the new ASA 8.03 documentation is wrong.
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
You can now PING and nsLookup from within Microsoft Excel Also consider IP Tools for Excel Instant Productivity: IP Tools for Excel
Page 5 of 10
odc-4948-fwbuff-a/b:
ip route 192.168.90.0 255.255.255.0 10.10.11.14 Name odc-asa5540-dmz995-our_app1 ip prefix-list allowed-static-to-ospf permit 192.168.90.0/24
Best practice Single point of route administration A single point of administration allows for building the ASA firewall and injecting its required routes one time. If an additional network or service is added to the firewall later, we know how to handle and add the required route to the network and can do so in a controlled manner.
Where a firewall supports Extranet access, careful consideration must be given before injecting those foreign network numbers into route tables. Best practice Avoid route table additions and maintenance by the use of source address NAT. Provision and route NAT pool(s) at turn-up time. Source address routes from Extranets should not be routed through the entire network. The ASA should NAT the source addresses to predetermined pool addresses as policy requires. The pool addresses are routed internally as built during installation or added independently as required. Often we will sacrifice event logging granularity when we NAT many to one. Choose a NAT pool for growth if possible. We make a design / security choice here: NAT many to one and loose event logging granularity Use a Network pool and NAT one to one
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
Page 6 of 10
Once you enable any sort of dynamic NAT / PAT, 'no nat-control' rule no longer applies for that zone, now all traffic between this zone and any other zone either requires NAT rules or NAT exemption.
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
Page 7 of 10
WANT TO LEARN A LITTLE BIT MORE YOU MAY NOT HAVE KNOWN? SEE BELOW FOR NEW INFORMATION.
Cisco ASA5540-SSL2500-K9 Cisco 5540 Adaptive Security Appl. W/ 2500 Web SSL VPN Lic. $14,995 www.netechinc.net The DDOS Specialist Identify and block DDOS attacks automatically and in real time. www.riorey.com Computer Training Courses Microsoft, Cisco Networking Database Administration, CompTIA A+ www.newhorizons.com/dubai
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
icmppermit0.0.0.00.0.0.0timeexceededdmzg02_our_applications icmpdeny0.0.0.00.0.0.0dmzg02_our_applications
Page 8 of 10
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
Page 9 of 10
Best practice for ICMP is to allow only the minimum required however there is a critical tradeoff with ease of troubleshooting. Eliminating ping is not normally a favorable option, but doing so does increase security. Although not a recommended best practice, we will see permit any any svc_ICMP_types_allowed.
IP Audit
One of the main functions of a firewall is to protect the network from bad things. The ASA will perform basic intrusion protection even when the advanced IPS system is not installed in the system. Basic intrusion and protection must be configured and enabled. The best practice is to TURN IT ON. We create policies that are strict to start with. They will need to be tuned. The alarms will be reported via SYSLOG and can be should be interrogated on an ongoing basis. Note that on the outside interface we do not send a reset on attack. This aids in keeping us invisible. ip audit name thisnet_audit_outside_attack attack ip audit name thisnet_audit_outside_info ip audit name thisnet_audit_inside_attack ip audit name thisnet_audit_inside_info ip audit name thisnet_audit_dmz_attack ip audit name thisnet_audit_dmz_info info attack info attack info action alarm drop action alarm action alarm drop reset action alarm action alarm drop reset action alarm
ip audit interface outside ip audit interface outside ip audit interface inside ip audit interface inside
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011
Cisco ASA Firewall Best Practices for Firewall Deployment - Check The Network
! Set per configured dmz ip audit interface dmzXXXX ip audit interface dmzXXXX thisnet_audit_dmz_info thisnet_audit_dmz_attack
Page 10 of 10
! The below commands disable a few inspections we are not worried about ip audit signature 1002 disable ! Timestamp considered DOS but needed ! for RFC1323 support ip audit signature 2000 disable ip audit signature 2001 disable ip audit signature 2004 disable ip audit signature 2005 disable ip audit signature 6051 disable ! ICMP echo reply ! ICMP unreachable ! ICMP echo request ! ICMP time exceeded ! DNS zone transfer - we are likely doing ! these and do not want to drop
Be sure to enable the rest of the inspection signatures per the ASA Defaults configuration script. They are disabled by default. The command looks kind of backward but DOES enable the signature identified. no ip audit signature 2008
home
products
search
checkout
sitemap
contact
Published by Productive Solutions Inc. Copyright 1996-2011 All rights reserved The Productive Solutions Logo and How well do you communicate? are Trade Marks Other company names and products may be their respective trademarks.
http://www.checkthenetwork.com/networksecurity%20Cisco%20ASA%20Firewall%20Best%20Practi... 8/9/2011