08.02.2015 Views

Table of Contents

Table of Contents

Table of Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 28<br />

ASA Firewall Configuration<br />

In this chapter, I will explain how to configure the most common features <strong>of</strong> an ASA<br />

firewall. Examples will be based on the ASA 5540, which uses the same commands as<br />

the entire ASA line. Most commands are the same on the PIX firewalls, but since they<br />

are no longer sold—with the exception <strong>of</strong> the Firewall Service Module (FWSM)—this<br />

chapter focuses on ASAs.<br />

There are slight differences among models. For example, the ASA 5505<br />

base model cannot be run in failover or multicontext mode. The FWSM<br />

also operates differently in that it is a module and has no configurable<br />

physical interfaces.<br />

ASA stands for Adaptive Security Appliance. This name indicates that these devices are<br />

capable <strong>of</strong> being a firewall, a VPN device, and an IPS/IDS device. In this chapter, I will<br />

concentrate on the basics <strong>of</strong> firewall services.<br />

Configuring an ASA can be a bit confusing for people whose experience is with IOSbased<br />

devices. While there are similarities in the way the command-line interpreter<br />

works, there are some pretty interesting differences, too. One <strong>of</strong> my favorite features<br />

<strong>of</strong> the ASA and even the PIX firewalls is the fact that you can execute the show runningconfig<br />

command from within configuration mode. Recent versions <strong>of</strong> IOS allow similar<br />

functionality using the do command (do show run, for example) from within configuration<br />

mode, but using the command in the ASA is, in my opinion, more natural. NX-<br />

OS, the operating system for Cisco Nexus switches, implements this feature as well.<br />

Around the time the ASAs were released, Cisco revamped the Adaptive Security Device<br />

Manager (ASDM) s<strong>of</strong>tware used to control its PIX firewalls and ASA appliances. For<br />

the first time, this s<strong>of</strong>tware became a viable tool for configuring and managing a Cisco<br />

firewall. While many <strong>of</strong> the examples in this chapter can also be accomplished with the<br />

ASDM, I tend to be an old-school command-line kind <strong>of</strong> guy. This chapter deals with<br />

configuring ASAs using the command line, and does not cover the ASDM. The ASDM<br />

is a pretty great tool, however, and I encourage you to explore its use on your own.<br />

469

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!