Technical and Configuration Specifications
Technical and Configuration Specifications
• ciscoasa> enable
• Password:
• [Enter into “Privileged Mode”. This will require to enter the
“enable” password]
• [Configure PAT for all (“any”) networks to access the Internet using the
outside interface]
Network Address Translation (NAT)
• ciscoasa(config)# object network web_server_static
• ciscoasa(config-network-object)# host 192.168.1.1
• ciscoasa(config-network-object)# nat (DMZ , outside) static 100.1.1.1
• [Configure static Port NAT. The private IP 192.168.1.1 in DMZ will be mapped
statically to public IP 100.1.1.1 in outside zone only for port 80]
Access Control Lists (ACL)
• ciscoasa(config)# access-list OUTSIDE_IN extended permit tcp any host
192.168.1.1 eq 80
• [Apply the ACL above at the “outside” interface for traffic coming “in” the
interface]
Access Control Lists (ACL)
• ciscoasa(config)# access-list INSIDE_IN extended deny ip host
192.168.1.1 any
• ciscoasa(config)# access-list INSIDE_IN extended permit ip any any
• ciscoasa(config)# access-group INSIDE_IN in interface inside
• [Create an ACL to deny all traffic from host 192.168.1.1 to any destination
and allow everything else. This ACL is then applied at the “inside”
interface for traffic coming “in” the interface]
Object Groups
• ciscoasa(config)# object-group network WEB_SRV
• ciscoasa(config-network)# network-object host 192.168.1.1
• ciscoasa(config-network)# network-object host 192.168.1.2
• [Create a service group having several ports. This group can be used in
other configuration commands such as ACLs]
Subinterfaces and VLANs
• ciscoasa(config)# interface gigabitethernet 0/1
• ciscoasa(config-if)# no nameif
• ciscoasa(config-if)# no security-level
• ciscoasa(config-if)# no ip address
• ciscoasa(config-if)# exit
• [Create a DHCP address pool to assign to clients. This address pool must
be on the same subnet as the ASA interface]
• [Shows hit-counts on ACL with name “OUTSIDE-IN”. It shows how many hits
each entry has on the ACL]
• Sample output:
• access-list OUTSIDE-IN line 1 extended permit tcp 100.100.100.0
255.255.255.0 10.10.10.0 255.255.255.0 eq telnet (hitcnt=15) 0xca10ca21
• [The show conn command displays the number of active TCP and UDP
connections, and provides information about connections of various types.]
Useful Verification and Troubleshooting
Commands
• ciscoasa# show cpu usage
• [show CPU utilization]
https://www.youtube.com/watch?v=nA8SjOhE5Ys
https://www.youtube.com/watch?v=jwjCufzgseI&t=319s
Security in Firewall
https://www.youtube.com/watch?v=dTUNJejeMxI