Network Security v1.0 - Module 20
Network Security v1.0 - Module 20
the ASA
Module Objective: Explain how the ASA operates as an advanced stateful firewall.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
20.1 ASA Solutions
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
ASA Solutions
ASA Firewall Models
The Cisco ASA with FirePOWER Services family of products provides dedicated firewall services in one
device. These are next-generation firewall (NGFW) devices that deliver integrated threat defense across
the entire attack continuum. They combine proven ASA firewalls with Sourcefire threat and advanced
malware protection in a single device. These include Cisco Firepower 1000, Cisco Firepower 2100,
Cisco Firepower 4100, Cisco Firepower 9300. All models provide advanced stateful firewall features and
VPN functionality. The biggest difference between the models is the maximum traffic throughput handled
by each model and the number and types of interfaces.
Cisco also supports the virtualization of computing infrastructure by taking advantage of the increased
power availability of modern x86 servers. The Cisco Adaptive Security Virtual Appliance (ASAv) brings
the power of ASA appliances to the virtual domain.
To provide a suitable fit for customer needs, Cisco ASAv is available in five models: Cisco ASAv5, Cisco
ASAv10, Cisco ASAv30, Cisco ASAv50, Cisco ASAv100. The focus of this module will be on the ASA
5506-X which is designed for small business, branch office, and enterprise teleworker implementations.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
ASA Solutions
Video - Cisco ASA Next-Generation Firewall Appliances
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
ASA Solutions
Advanced ASA Firewall Features
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
ASA Solutions
Advanced ASA Firewall Features (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
ASA Solutions
Cisco Firepower Series
Cisco has introduced a new line of next-generation firewalls (NGFW) which combines their
proven firewall technology with Sourcefire advanced threat and malware detection capabilities.
These NGFWs consolidate multiple security layers into a single platform, eliminating the cost of
buying and managing multiple solutions. This integrated approach combines best-in-class
security technology with multilayer protection that is integrated into a single device.
The Cisco ASA 5500-X with FirePOWER Services devices are part of the new Cisco NGFWs.
Designed for small to medium branch offices, the ASA 5500-X with FirePOWER Services
merges the ASA 5500 stateful firewall features with some of the following advanced threat and
malware detection capabilities:
• Next-generation IPS (NGIPS)
• Advanced Malware Protection (AMP)
• Application control and URL filtering
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
ASA Solutions
Video - Collect Firepower Threat Defense (FTD) Packet Captures with
Firepower Management Center (FMC)
This video explains Firepower Threat Defense Packet Captures with Firepower Management
Center.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
ASA Solutions
Review of Firewalls in Network Design
When discussing networks that are connected to a firewall, there are some general terms to consider:
• Outside network - The network/zone that is outside the protection of the firewall.
• Inside network - The network/zone that is protected and behind the firewall.
• DMZ - The demilitarized zone that allows both inside and outside users access to protected network
resources.
Firewalls protect inside networks from unauthorized access by users who are on an outside network. They also
protect inside network users from each other. For example, by creating zones, an administrator can keep the
network that is hosting the accounting servers separate from other networks in an organization.
The figure illustrates how these zones interact for
permitted traffic:
• Traffic originating from the inside network going to the
outside network is permitted.
• Traffic originating from the inside network going to the
DMZ network is permitted.
• Traffic originating from the outside network going to
the DMZ network is selectively permitted.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
ASA Solutions
Review of Firewalls in Network Design (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
ASA Solutions
ASA Firewall Modes of Operation
Routed Mode
There are two firewall interface modes of operation
available on ASA devices: routed mode and
transparent mode.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
ASA Solutions
ASA Firewall Modes of Operation (Cont.)
Transparent Mode
An ASA in transparent mode is often
referred to as a “bump in the wire,” or a
“stealth firewall” because the ASA functions
like a Layer 2 device and is not considered
a router hop. In the figure below, the ASA is
only assigned an IP address on the local
network for management purposes. This
mode is useful to simplify a network
configuration, or when the existing IP
addressing cannot be altered. However, the
drawbacks include no support for dynamic
routing protocols, VPNs, QoS, or DHCP
Relay.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
ASA Solutions
ASA Licensing Requirements
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
20.2 The ASA 5506-X with
FirePOWER Services
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
The ASA 5506-X with FirePOWER Services
Overview of ASA 5506-X
The Cisco ASA 5506-X delivers a high-performance firewall, SSL VPN, IPsec VPN, and rich
networking services in a modular, plug-and-play appliance. The default DRAM memory is 4 GB and
the default internal flash memory is 8 GB. In a failover configuration, the two units must be identical
models with the same hardware configuration, the same number and types of interfaces, and the
same amount of RAM. Failover is available with the Security Plus license.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
The ASA 5506-X with FirePOWER Services
Overview of ASA 5506-X
The figure illustrates the back panel of the Cisco ASA 5506-X.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
The ASA 5506-X with FirePOWER Services
Overview of ASA 5506-X (Cont.)
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
The ASA 5506-X with FirePOWER Services
ASA Security Levels
Security levels define the level of
trustworthiness of an interface. Each
operational interface must have a
name and a security level from 0
(lowest) to 100 (highest) assigned.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
The ASA 5506-X with FirePOWER Services
ASA Security Levels (Cont.)
Security levels help to control many aspects of network traffic as shown in the table
below.
Aspect Effect
Network Access By default, there is an implicit permit from a higher security interface to a lower security interface (outbound). Hosts on
the higher security interface can access hosts on a lower security interface. Multiple interfaces can be assigned the
same security level. If communication is enabled for interfaces with the same security level, there is an implicit permit
for traffic between the interfaces.
Inspection Engines Some application inspection engines are dependent on the security level. When interfaces have the same security level,
the ASA inspects traffic in either direction.
Application Filtering HTTPS and FTP filtering applies only for outbound connections that are from a higher level to a lower level. If
communication is enabled for interfaces with the same security level, traffic can be filtered in either direction.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
The ASA 5506-X with FirePOWER Services
ASA 5506-X Deployment Scenarios
Small Branch
The ASA 5506-X is commonly used as an
edge security device. It connects a small
business to an ISP device, such as a DSL
or cable modem, for access to the
internet. It can be deployed to
interconnect and protect several
workstations, network printers, and IP
phones.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
The ASA 5506-X with FirePOWER Services
ASA 5506-X Deployment Scenarios (Cont.)
Small Business
In the small business, shown here, the
ASA 5505 can be deployed with two
different protected network segments. One
segment is the inside network (VLAN 1),
which connects workstations and IP
phones. The other segment is the DMZ
(VLAN 3), which connects a company web
server. The outside interface (VLAN 2) is
used to connect to the internet.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
The ASA 5506-X with FirePOWER Services
ASA 5506-X Deployment Scenarios (Cont.)
Enterprise
In an enterprise deployment, as shown
here, the ASA 5505 can be used by
telecommuters and home users to connect
to a centralized location using a VPN.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
20.3 Introduction to the ASA
Summary
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Introduction to the ASA Summary
What Did I Learn in this Module?
• The choice of ASA model depends on an organization’s requirements, such as maximum throughput,
maximum connections per second, and budget.
• When discussing networks connected to a firewall, terms to consider include outside network, inside
network, and the DMZ.
• There are two firewall interface modes of operation available on ASA devices: routed mode and
transparent mode.
• Advanced ASA firewall features include ASA virtualization, high availability with failover, identity firewall,
and threat control and containment services.
• Most ASA appliances come pre-installed with either a Base license or a Security Plus license.
• The Cisco ASA 5506-X delivers a high-performance firewall, SSL VPN, IPsec VPN, and rich networking
services in a plug-and-play appliance.
• The security level numbers range from 0 (untrustworthy) to 100 (very trustworthy).
• The ASA 5506-X is commonly used as an edge security device. It connects a small business to an ISP
device, such as a DSL or cable modem, for access to the internet.
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Introduction to the ASA Summary
New Terms and Commands
• Security Services Module (SSM)
• Content Security and Control (CSC) module
• Advanced Inspection and Prevention Security Services Module (AIP-SSM)
• Advanced Inspection and Prevention Security Services Card (AIP-SSC)
• Next-generation IPS (NGIPS)
• Outside network
• Inside network
• context-based access control (CBAC)
• routed mode
• transparent mode
• show activation-key
• inspection engines
• application filtering
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28