Cisco ASA Adaptive Security Appliance Overview - CCNP Security FIREWALL 642-618 Official Cert Guide (2012)

CCNP Security FIREWALL 642-618 Official Cert Guide (2012)

Chapter 1. Cisco ASA Adaptive Security Appliance Overview

This chapter covers the following topics:

Firewall Overview: This section provides an overview of protecting networks by establishing security domains and positioning firewalls to protect them.

Firewall Techniques: This section describes various firewall and network security methods.

Cisco ASA Features: This section covers the long list of security features that a Cisco ASA can provide.

Selecting a Cisco ASA Model: This section presents an overview and specifications of each ASA model so that the appropriate device can be selected.

Selecting ASA Licenses: Once an ASA model is selected to secure a network, it must be licensed to perform everything that is required. This section explains the variety of feature licenses and how to select them, based on the ASA model.

The Cisco Adaptive Security Appliance (ASA) is a versatile device that is used to secure a network. This chapter explains the concepts behind firewalls and other security tools, as they apply to the Cisco ASA. In addition, this chapter covers how to select an ASA model, the appropriate ASA features, and the correct ASA licenses based on high-level design requirements.

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz allows you to assess whether you should read this entire chapter thoroughly or jump to the “Exam Preparation Tasks” section. If you are in doubt about your answers to these questions or your own assessment of your knowledge of the topics, read the entire chapter. Table 1-1 lists the major headings in this chapter and their corresponding “Do I Know This Already?” quiz questions. You can find the answers in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes.”

Table 1-1. “Do I Know This Already?” Section-to-Question Mapping

image


Caution

The goal of self-assessment is to gauge your mastery of the topics in this chapter. If you do not know the answer to a question or are only partially sure of the answer, you should mark that question wrong for purposes of the self-assessment. Giving yourself credit for an answer you correctly guess skews your self-assessment results and might provide you with a false sense of security.


1. Which of the following are recommended tasks for making a security domain secure? (Choose all that apply.)

a. Place a router at the boundary of trusted and untrusted areas of the network, and then place a firewall inside the trusted area.

b. Place a firewall at the boundary of trusted and untrusted areas of the network.

c. Make the firewall the only path into and out of the security domain.

d. Make the firewall the only path into and out of the untrusted domain.

e. Harden the firewall against attacks.

f. Force protected traffic through the firewall and bypass other traffic around it.

2. Which one of the following is considered to be the most secure?

a. Logically separating a network with a firewall.

b. Physically separating a network with a firewall.

c. Putting the trusted and untrusted areas on different VLANs that are connected to a firewall over a trunk link.

d. None of these answers are correct.

3. Consider the following list of rules, and then choose the answer that best describes it.

10 Permit all HTTP traffic
20 Permit all SMTP traffic to host 10.10.1.10
30 Permit all DNS queries
40 Deny everything

a. Reactive access control

b. Permissive access control

c. Restrictive access control

d. Protective access control

4. Which one of the following techniques would be the best choice for filtering HTTP (TCP port 80) sessions?

a. Stateless packet filtering

b. Stateful packet filtering

c. Stateful packet filtering with application inspection and control

d. Network intrusion protection system

e. Network behavior analysis

5. Which of the following is not typically used for a restrictive approach to traffic filtering?

a. Stateless packet filtering

b. Stateful packet filtering

c. Stateful packet filtering with AIC

d. Network IPS

e. Network behavior analysis

6. A company wants to join its network with another business partner, but wants to place a firewall between the two. Users within the company’s home network should appear to use the business partner’s IP address space when they access the partner’s servers. Which of the following Cisco ASA features should be used to meet this requirement?

a. Stateful packet filtering

b. NAT

c. IPS

d. AIC

e. NBA

7. A business has been the target of several attacks recently, where its network was scanned or probed to find unsuspecting victims. Which Cisco ASA feature should you leverage to detect and prevent further attacks?

a. Remote Access VPNs

b. Virtualization

c. Traffic policing

d. Botnet Traffic Filtering

e. Threat detection

8. A company wants to begin using a firewall to protect its network, but it doesn’t want to disrupt its operations with any IP address reconfiguration. In fact, it doesn’t want to change the IP addresses on any of its existing network devices when the firewall is installed. Which Cisco ASA feature could you use to meet this requirement?

a. NAT

b. Virtualization

c. IP routing

d. Transparent firewall mode

e. AIC

9. A medium-sized business would like to implement a firewall where it borders the public Internet. The business also plans to add intrusion prevention at the border. Assuming the business’s Internet bandwidth will not exceed 350 Mbps, which of the following ASA models in combination with an integrated IPS module should you select?

a. ASA 5505 with an AIP-SSC-5

b. ASA 5510 with an AIP-SSM-10

c. ASA 5520 with an AIP-SSM-20

d. ASA 5550 with an AIP-SSM-40

e. Any of the combinations in these answers will work.

10. Which one of the following represents a typical environment or application for an ASA 5550?

a. A remote office

b. A teleworker’s home

c. A data center requiring 10-Gbps throughput

d. A large enterprise requiring 5-Gbps throughput

e. A large enterprise requiring 1-Gbps throughput

11. Assuming the correct license has been purchased and activated, which of the following ASA models can support 50 virtual firewalls or security contexts? (Choose all that apply.)

a. ASA 5510

b. ASA 5520

c. ASA 5540

d. ASA 5550

e. ASA 5580

f. ASA 5585-X

12. Which one of the following functions requires the purchase of an additional feature license for a Cisco ASA 5520?

a. Strong encryption

b. Botnet Traffic Filtering

c. DHCP server

d. Threat protection

e. Stateful packet filtering with AIC

Foundation Topics

To preserve the integrity and stability of resources on a network, they must be protected from things that can’t always be trusted or controlled. Rather than begin with a list of possible network attacks, exploits, and vulnerabilities, this chapter presents an overview of a firewall, its features, and how it fits into various scenarios to protect a network. Individual security threats are described throughout this book as the appropriate firewall features to protect against those threats are introduced.

Firewall Overview

Network security engineers must protect valuable resources within a network. For example, corporate data might be confidential or critical to the operation of a business or to offering patient care, in which case it must be kept from prying eyes and protected from tampering. Similarly, the computers in a network might need to be protected from outside interference so that they are kept stable and in good working order.

image

To protect these resources, the network must somehow be divided into trusted and untrusted parts. The trusted portions of the network are known as security domains; everything inside the security domain is protected from everything outside the domain. As a simple example, a small company decides to protect itself from the public Internet. The security domain forms where the company’s network meets the Internet, and everything inside the company network resides within a secure boundary. Figure 1-1 illustrates this scenario.

image

Figure 1-1. A Simple Security Domain

The most common and effective way to implement a security domain is to place a firewall at the boundary between the trusted and untrusted parts of a network. By definition, a firewall is a device that enforces an access control policy between two or more security domains. Firewalls have interfaces that connect into the network. In order for a firewall to do its job, all traffic that crosses a security domain boundary must pass through the firewall. In effect, a firewall becomes the only pathway or “chokepoint” to get in or out of the security domain.

For the simple network shown in Figure 1-1, a firewall would sit on the trust boundary and become the only path between Company A’s internal trusted network and the un-trusted public Internet, as shown in Figure 1-2. Although Figure 1-2 shows the addition of the firewall, several things must happen before the firewall can make the security domain truly secure:

image

Figure 1-2. Implementing a Security Domain with a Firewall

• The firewall must be the only path into and out of the secured network. No other paths around the firewall or “backdoors” into the network behind the firewall can exist. The firewall can enforce security policies on only the traffic that passes through it, not around or behind it.

• The firewall itself must be hardened or made resistant to attack or compromise. Otherwise, malicious users on the untrusted side might take control of the firewall and alter its security policies.

Sometimes, a single security domain with a single firewall isn’t enough. Suppose Company A wants to secure itself from the public Internet, but it also has a data center that needs to be even more secure. Company A trusts its employees to perform their job functions, but it can’t risk letting anyone access its mission critical resources in an improper way or disrupt any services in its data center. Therefore, Company A decides to make a second security domain around the data center, as shown in Figure 1-3.

image

Figure 1-3. Multiple Security Domains and Firewalls

Each security domain is implemented with a firewall at its border. On the inside of the security domain or firewall, trusted resources exist; on the outside are untrusted things. This trust relationship is only locally significant, however. Consider the data center boundary firewall in Figure 1-3. The users just outside the data center are untrusted (at least from the perspective of that firewall), but they are still trusted from the perspective of the Internet boundary firewall. Each firewall has its own set of security policies and its own concept of a trust boundary.

Now consider a different scenario. Company A is surrounded by a security domain at the Internet boundary. It wants to allow its internal, trusted users to connect to resources out on the public Internet through the Internet firewall. Company A also has some web servers that it wants to have face the public so that untrusted Internet users can interact with the business.

If the web servers are located somewhere inside the security domain, then untrusted users would be granted access into the trusted environment. That isn’t necessarily bad, except that malicious users might be able to attack or compromise one of the web servers. Because the web server is already a trusted resource, the malicious users might then use that server to attack other trusted resources.

A better solution is to put the web servers into a security domain of their own, somewhere between the trusted internal network and the untrusted Internet. This is commonly called a demilitarized zone (DMZ). Figure 1-4 shows one solution that leverages the Internet firewall. With the addition of a third interface, the firewall can act as the boundary between a trusted domain, an untrusted public network, and a new “somewhat trusted” domain full of web servers.

image

Figure 1-4. Using a Single Firewall to Form Multiple Security Domains

Whenever a firewall is used to form a security domain boundary, it must somehow separate the network into distinct parts. This can be done in one of two ways: physical separation or logical separation.

Physical separation requires that each physical firewall interface must be connected into a distinct network infrastructure. This usually requires additional hardware and additional cost. For example, Figure 1-5 shows how a firewall physically separates a network into two distinct pieces, with each firewall interface connecting into a different switch. Physical separation provides the utmost security because traffic cannot pass between security domains without some sort of physical intervention—the firewall would have to be disconnected, cables rerouted, and so on.

image

Figure 1-5. Physical Separation of Security Domains

A firewall can also be positioned to offer logical separation. In this case, the security domains exist on the same physical network infrastructure, but are separated logically into different virtual local area networks (VLAN), virtual storage area networks (VSAN), or Multiprotocol Label Switching Virtual Private Networks (MPLS VPN). In Figure 1-6, a firewall forms a boundary between two security domains that are carried over two separate VLANs.

image

Figure 1-6. Logical Separation of Security Domains

While the firewall could use two physical interfaces to connect to the two VLANs, the VLANs could just as easily be carried over a single trunk link or one physical firewall interface. Logical networks are cost effective and can be flexible and complex. This makes logical separation less secure than physical separation, simply because a firewall might be bypassed or breached through a misconfiguration or failure of a logical network component or through an exploit of the logical separation itself.

Firewall Techniques

In its most basic form, a firewall strives to isolate its interfaces from each other and to carefully control how packets are forwarded from one interface to another. A firewall can enforce access control across a security boundary based on layers in the Open Systems Interconnection (OSI) model.

For example, a firewall performing network layer access control can make decisions based on Layers 2 through 4, or the data link, network, and transport layers. Such a firewall might control whether IP traffic can pass through, whether hosts on one side can open UDP or TCP connections to resources on the other side, and so on.

Firewalls that perform application layer access control enforce security policies at Layers 5 through 7, or the session, presentation, and application layers. Such a firewall can control what users do within applications that pass data from one side to another. For example, an application layer firewall might verify that a user’s web browsing sessions are conforming to the industry standard protocols, or that a user’s email or file transfers do not contain viruses or confidential material.

A firewall can take one of the following approaches to its access control:

image

Permissive access control: All traffic is allowed to pass through unless it is explicitly blocked.

Restrictive access control: No traffic is allowed to pass through unless it is explicitly allowed.

Permissive access control is also known as a reactive approach because it can react or block traffic only after potentially threatening things are identified and rules are put in place. Otherwise, everything else is allowed to pass through. Permissive rules are usually added to a firewall by intrusion prevention systems (IPS) and antivirus systems, which are tools that react to things that are detected on the network in real time.

Restrictive access control is also known as a proactive approach. Every acceptable type of traffic is identified ahead of time and entered into the firewall rules so that it may pass without further intervention. Any other traffic, whether it is malicious, undesirable, or just unidentified, is blocked by default. This is the same approach that is used by Cisco IOS access lists—traffic rules are processed in sequential order but always end with an implicit “deny all” rule.

A firewall can use its access control approach to evaluate and filter traffic based on the methods and techniques described in the following sections.

Stateless Packet Filtering

Some firewalls examine traffic based solely on values found in a packet’s header at the network or transport layer. Decisions to forward or block a packet are made on each packet independently. Therefore, the firewall has no concept of a connection state; it knows only whether each packet conforms to the security policies.

Stateless packet filtering is performed by using a statically configured set of firewall rules. Even if a connection involves dynamic negotiation of further sessions and protocol port numbers, the stateless firewall is unaware. Stateless packet filters can be characterized by the attributes listed inTable 1-2.

Table 1-2. Characteristics of a Stateless Packet Filter

image

Stateful Packet Filtering

Stateful packet filtering (SPF) requires that a firewall keep track of individual connections or sessions as packets are encountered. The firewall must maintain a state table for each active connection that is permitted, to verify that the pair of hosts is following an expected behavior as they communicate. As well, the firewall must inspect traffic at Layer 4 so that any new sessions that are negotiated as part of an existing connection can be validated and tracked. Tracking the negotiated sessions requires some limited inspection of the application layer protocol.

Stateful packet filters can be characterized by the attributes listed in Table 1-3.

Table 1-3. Characteristics of a Stateful Packet Filter

image

image

Stateful Packet Filtering with Application Inspection and Control

To move beyond stateful packet filtering, firewalls must add additional analysis at the application layer. Inspection engines in the firewall reassemble UDP and TCP sessions and look inside the application layer protocols that are passing through. Application inspection and control (AIC) filtering, also known as deep packet inspection (DPI), can be performed based on the application protocol header and its contents, allowing greater visibility into a user’s activity.

AIC comes at a price, as a firewall needs more processing power and more memory to be able to inspect and validate application sessions and they unfold.

SPF with AIC can be characterized by the attributes listed in Table 1-4.

Table 1-4. Characteristics of Stateful Packet Filtering with Application Inspection and Control

image

Network Intrusion Prevention System

A network intrusion prevention system (NIPS) examines and analyzes network traffic and compares it to a database of known malicious activity. The database contains a large number of signatures or patterns that describe specific known attacks or exploits. As new attacks are discovered, new signatures are added to the database.

In some cases, NIPS devices can detect malicious activity from single packets or atomic attacks. In other cases, groups or streams of packets must be collected, reassembled, and examined. A NIPS can also detect malicious activity based on packet and session rates, such as a denial-of-service TCP SYN flood, that differ significantly from normal activity on the network.

A network IPS usually operates with a permissive approach, where traffic is allowed to cross security domains unless something suspicious is detected. Once that occurs, the NIPS can generate firewall rules dynamically to block or reset malicious packets or connections.

A NIPS can be characterized by the attributes listed in Table 1-5.

Table 1-5. Characteristics of a Network Intrusion Prevention System

image

Network Behavior Analysis

Network behavior analysis (NBA) systems examine network traffic over time to build statistical models of normal, baseline activity. This isn’t a simple bandwidth or utilization average; rather, the models consider things like traffic volume, traffic rates, connection rates, and types of application protocols that are normally used. An NBA system continually examines traffic and refines its models automatically, although human intervention is needed to tune the results.

Once the models are built, an NBA system can trigger on any activity that it considers to be an anomaly or that falls outside the normal conditions. In fact, NBA systems are often called anomaly-based network IPSs. Even when malicious activity involves a previously unknown scheme, an NBA system can often detect it if it involves traffic patterns or volumes that fall outside the norm. An NBA system can be characterized by the attributes listed in Table 1-6.

Table 1-6. Characteristics of a Network Behavior Analysis System

image

Application Layer Gateway (Proxy)

An application layer gateway (ALG) or proxy is a device that acts as a gateway or intermediary between clients and servers. A client must send its application layer requests to the proxy, in place of any destination servers. The proxy masquerades as the client and relays the client’s requests on to the actual servers. Once the servers answer the requests, the proxy evaluates the content and decides what to do with them.

Because a proxy operates on application requests, it can filter traffic based on the IP addresses involved, the type of application request, and the content of any data that is returned from the server.

Proxies can perform detailed and thorough analysis of client-server connections. Traffic can be validated against protocol standards at Layers 3 through 7, and the results can be normalized or made to conform to the standards, as needed. An ALG or proxy can be characterized by the attributes listed in Table 1-7.

Table 1-7. Characteristics of an Application Layer Gateway (Proxy)

image

Cisco ASA Features

The Cisco ASA is the focus of the FIREWALL exam. Is the ASA a firewall? Yes. Is it more than a firewall? Yes! The Cisco ASA platform has the capability to perform any of the firewall techniques described in the previous sections.

Even further, the ASA has many features that go beyond the basic firewall techniques, giving it great versatility. A summary of the ASA features is presented in the following sections. You should become familiar with these features, as you will need to be able to select the appropriate ASA features and technologies on the exam, given some high-level design criteria:

image

Stateful packet filtering engine: The SPF engine tracks connections and their states, performing TCP normalization and conformity checks, as well as dynamic session negotiation. Chapter 9, “Inspecting Traffic,” covers the SPF engine in more detail.

Application inspection and control: The AIC function analyzes application layer protocols to track their state and to make sure they conform to protocol standards. Chapter 9 covers the AIC functionality in more detail.

User-based access control: The ASA can perform inline user authentication followed by Cut-through Proxy, which controls the access that specific users are allowed to have. Once a user is authenticated, Cut-through Proxy also accelerates inspection of a user’s traffic flows. Chapter 10, “Using Proxy Services to Control Access,” covers these functions in more detail.

Session auditing: Accounting records can be generated for user-based sessions, as well as for application layer connections and sessions. Chapter 6, “Recording ASA Activity,” covers session auditing in more detail. Session auditing can be used to generate audit trails, traffic accounting, and incident investigation.

Security Services Modules: The ASA platform supports several Security Services Modules (SSM) that contain specialized hardware to offload processor-intensive security functions. An ASA can contain one SSM, offloading either IPS or content security services. Chapter 15, “Integrating ASA Service Modules,” covers SSMs in more detail.

Reputation-based Botnet Traffic Filtering: An ASA can detect and filter traffic involved with botnet activity on infected hosts. The Botnet Traffic Filter database used to detect botnet threats is periodically updated by Cisco. Chapter 9 covers Botnet Traffic Filtering in more detail.

Category-based URL filtering: An ASA can leverage an external URL filtering server to enforce acceptable use policies and control user access to various types of web services.

Cryptographic Unified Communications (UC) proxy: When Cisco Unified Communications traffic must pass through an ASA, the ASA can be configured as an authorized UC proxy. The ASA can then terminate and relay cryptographically protected UC sessions between clients and servers.

Denial-of-service prevention: An ASA can leverage traffic-control features like protocol normalization, traffic policing, and connection rate controls to minimize the effects of denial-of-service (DoS) attacks. Chapter 9 covers DoS prevention in more detail.

Traffic correlation: The threat detection feature examines and correlates traffic from many different connections and sessions to detect and block anomalies stemming from network attacks and reconnaissance activity. Chapter 9 covers threat detection in more detail.

Remote access VPNs: An ASA can support secure VPN connections from trusted users located somewhere on an untrusted network. Clientless SSL VPNs can be used to offer a secure web portal for limited remote access to users, without requiring VPN client software. For complete secure network access, full tunneling of all user traffic is supported with either SSL VPNs or IPsec VPNs, which require VPN client software. Remote access VPNs are covered in the CCNP Security VPN 642-648 Official Cert Guide.

Site-to-site VPNs: An ASA can support IPsec VPN connections between sites or enterprises. Site-to-site or LAN-to-LAN VPN connections are usually built between firewalls or routers at each location. Site-to-site VPNs are covered in the CCNP Security VPN 642-648 Official Cert Guide.

High availability failover clustering: Two identical ASA devices can be configured to operate as a failover pair, making the ASA security functions redundant in case of a hardware failure. Chapter 14, “Deploying High Availability Features,” covers failover clustering in more detail.

Redundant interfaces: To increase availability within a single ASA, interfaces can be configured as redundant pairs so that one is always active, while the other takes over after an interface hardware failure. Redundant interfaces are covered in Chapter 3, “Configuring ASA Interfaces,” and can be used in conjunction with failover clustering.

EtherChannel: Multiple ASA interfaces can be aggregated or bundled together as a single logical interface. By connecting an EtherChannel between an ASA and a switch, you can scale the bandwidth and offer additional redundancy. EtherChannels are covered in Chapter 3.

Traffic and policy virtualization: An ASA can be configured to operate multiple virtual instances or security contexts, each acting as an independent firewall. Each virtual context has its own set of logical interfaces, security policies, and administrative control. Chapter 13, “Creating Virtual Firewalls on the ASA,” covers virtual security contexts in more detail.

Rich IP routing functionality: An ASA can forward traffic onto the local networks connected to each of its interfaces without any additional IP routing information. It can also be configured to use static routes or a dynamic routing protocol such as RIPv1, RIPv2, EIGRP, and OSPF to make more complex routing decisions. Chapter 4, “Configuring IP Connectivity,” covers IP routing in more detail.

Powerful Network Address Translation (NAT): As an ASA inspects and forwards packets, it can apply a rich set of NAT functions to alter source and destination addresses. Chapter 7, “Using Address Translation,” covers NAT in more detail.

Transparent (bridged) operation: An ASA can be configured to operate as a transparent firewall, effectively becoming a secure bridge between its interfaces. Transparent firewall mode allows an ASA to be wedged into an existing network without requiring any readdressing of the network. Chapter 12, “Using Transparent Firewall Mode,” covers transparent firewall mode in more detail.

Integrated DHCP, DDNS, and PPPoE: An ASA can be configured to act as a DHCP client or a PPP over Ethernet (PPPoE) client to obtain a dynamic IP address for its interfaces from the network, and as a Dynamic DNS (DDNS) client to record information for hostname-to-address resolution. As well, an ASA can act as a DHCP server to offer IP addressing services to other hosts on the network. Chapter 4 covers most of these features.

IPv6 support: An ASA can be configured to operate natively in an IPv6 network.

IP multicast support: An ASA can leverage the Internet Group Management Protocol (IGMP) and the Protocol Independent Multicast (PIM) protocol to participate in handling IP multicast traffic.

Management control and protocols: An ASA supports several different methods of management control, including a console port, Telnet, Secure Shell (SSH), Secure HTTP (HTTPS), and Simple Network Management Protocol (SNMP; Versions 1, 2c, and 3). A dedicated out-of-band management port is also available. An ASA can send event notifications using SNMP traps, NetFlow, and syslog. Chapter 5, “Managing a Cisco ASA,” covers management control in more detail.

Simple software management: An ASA supports a local file system and remote file transfers for software upgrades. Software upgrades can be performed manually, automatically, or in a zero-downtime fashion on a failover cluster of ASAs. Chapter 13 covers software management in more detail.

Configuration flexibility and scalability: Security policies and rules can be configured using reusable objects. Through the Modular Policy Framework (MPF), security features can be configured and applied in a flexible and versatile manner. Chapter 8, “Controlling Access Through the ASA,” and Chapter 9 cover these features in more detail.

Cisco Security Management Suite: Multiple ASAs can be managed from the Cisco Security Management Suite for ease of administration.

Selecting a Cisco ASA Model

The Cisco ASA family consists of seven different models. In the FIREWALL exam, you will probably have to select an appropriate ASA model based on some high-level design criteria. How can you learn all of the specifications about every model? Fortunately, the model numbers can be used as a crude guide because they increase as the firewall capabilities or capacities increase.

The following sections briefly describe each of the ASA models, presented in order of increasing performance. The ASA features are consistent across the entire platform range, with some models limited only by feature licensing. Therefore, when you need to select an ASA model for a given scenario, your decision will most often hinge on the type of environment and the performance that is required.

ASA 5505

The ASA 5505 is the smallest model in the ASA lineup, in both physical size and performance. It is designed for small offices and home offices (SOHO). For a larger enterprise, the ASA 5505 is frequently used to support teleworkers in remote locations. Figure 1-7 shows front and rear views of the ASA 5505.

image

Figure 1-7. ASA 5505 Front and Rear Views

There are eight FastEthernet ports on the ASA 5505, all connected to an internal switch. Two of the ports are capable of offering Power over Ethernet (PoE) to attached devices. (The ASA itself cannot be powered by PoE.) By default, all eight ports are connected to the same VLAN in the switch, allowing connected devices to communicate with each other at Layer 2 directly.

The switch ports can be broken up into multiple VLANs to support different areas or functions within a small office. The ASA connects to each VLAN through individual logical interfaces. Any traffic crossing between VLANs must pass through the ASA and its security policies.

The ASA 5505 has one Security Services Card (SSC) slot that can accept an optional AIPSSC-5 IPS module. With the module installed, the ASA can augment its security features with network IPS functions.

ASA 5510, 5520, and 5540

The ASA 5510, 5520, and 5540 models all use a common chassis and have identical front panel indicators and hardware connections. Figure 1-8 shows front and rear views of the common platform.

image

Figure 1-8. ASA 5510, 5520, and 5540 Front and Rear Views

The models differ in their security performance ratings, however. The ASA 5510 is designed for small to medium businesses (SMB) and remote offices for larger enterprises. The ASA 5520 is appropriate for medium-sized enterprises, while the ASA 5540 is more suited for medium- and large-sized enterprises and service provider networks.

The ASA 5520 and 5540 models has four 10/100/1000 Ethernet ports that can be used to connect into the network infrastructure. The four ports are dedicated firewall interfaces and are not connected to each other. An ASA 5510 can use all four Ethernet ports in FastEthernet (10/100) mode by default. If a Security Plus license is purchased and activated, two of the ports can operate as Gigabit Ethernet (10/100/1000) and two as FastEthernet. A fifth management Ethernet interface is also available.

The ASA 5510, 5520, and 5540 chassis have one SSM slot that can be populated with one of the following:

Four-port Gigabit Ethernet SSM: This module adds four additional physical firewall interfaces, as either 10/100/1000 RJ45 or small form-factor pluggable (SFP)-based ports.

Advanced Inspection and Prevention (AIP) SSM: This module adds inline network IPS capabilities to the ASA’s security suite.

Content Security and Control (CSC) SSM: This module adds comprehensive content control and antivirus services to the ASA’s security suite.

Each of the SSMs is described in more detail in the section, “Security Services Modules.

The ASA 5510, 5520, and 5540 models have one AUX port that can be used for out-of-band management through an asynchronous serial connection or a modem. It also has one FastEthernet port that is designated for management traffic but can be reconfigured for normal data traffic if needed.

ASA 5550

The ASA 5550 is designed to support large enterprises and service provider networks. Figure 1-9 shows both front and rear views. Notice that the ASA 5550 looks identical to the ASA 5510, 5520, and 5540 models. The most noticeable difference is that the ASA 5550 has one fixed four-port Gigabit Ethernet (4GE-SSM) module in the SSM slot, which cannot be removed or changed.

image

Figure 1-9. ASA 5550 Front and Rear Views

The ASA 5550 architecture features two groups of physical interfaces that connect to two separate internal buses. The interface groups are referred to as slot 0 and slot 1, corresponding to bus 0 and bus 1. Slot 0 consists of four built-in copper Gigabit Ethernet ports.

Slot 1 consists of four built-in copper and four built-in SFP Gigabit Ethernet ports, though only four of the eight ports can be used at any time.

The ASA 5550 offers high performance for demanding environments. To maximize the firewall throughput, the bulk of the traffic should go from the switch ports on bus 0 to the switch ports on bus 1. The ASA can forward traffic much more efficiently from bus to bus than it can if traffic stays within a single bus.

ASA 5580

The ASA 5580 is a high-performing model in the family and is designed for large enterprises, data centers, and large service providers. It can support up to 24 Gigabit Ethernet interfaces or up to 12 10Gigabit Ethernet interfaces. It is one of two models that has a chassis larger than one standard rack unit (RU).


Note

As of February 10, 2011, the ASA 5580 reached end-of-life status. In all likelihood, although it still exists as a product at press time, the FIREWALL course and exam will no longer cover the model.


The ASA 5580, shown in Figure 1-10, comes in two performance models: the ASA 5580-20 (5-Gbps throughput) and the ASA 5580-40 (10-Gbps throughput). The chassis includes two built-in 10/100/1000 Gigabit Ethernet ports, which are normally used for out-of-band management traffic. The system also uses dual redundant power supplies.

image

Figure 1-10. ASA 5580 Front and Rear Views

The ASA 5580 chassis has a total of nine PCI Express expansion slots. Slot 1 is reserved for a cryptographic accelerator module, to support high-performance VPN operations. Slots 2 and 9 are reserved for future use, leaving six slots available for the following network interface cards:

• 4-port 10/100/1000BASE-T copper Gigabit Ethernet interfaces

• 4-port 1000BASE-SX fiber-optic Gigabit Ethernet interfaces

• 2-port 10GBASE-SR 10Gigabit Ethernet fiber-optic interfaces

The ASA 5580 architecture has two I/O bridges that provide connectivity to the expansion slots, as shown in Figure 1-10. Unlike the ASA 5550, maximum throughput on the ASA 5580 is achieved when traffic flows stay within a single I/O bridge. The interfaces in slots 7 and 8 are all connected to I/O bridge 1, while the interfaces in slots 3, 4, 5, and 6 are connected to I/O bridge 2.

Any 10Gigabit Ethernet interfaces should be installed in slots 5, 7, or 8, which are high-capacity PCIe-x8 slots.

Security Services Modules

Many of the ASA models can accept one Security Services Module (SSM). The SSM contains dedicated hardware that can offload specialized or processor-intensive functions. Cisco offers the Advanced Inspection and Prevention (AIP) SSM, the Content Security and Control (CSC) SSM, and the 4-port Gigabit Ethernet (4GE) SSM, which are shown in Figure 1-11 and described in the following sections.

image

Figure 1-11. Cisco ASA AIP-SSM, CSC-SSM, and 4GE-SSM


Note

The AIP-SSM and the CSC-SSM use identical hardware form factors, but run entirely different software.


Advanced Inspection and Prevention (AIP) SSM

The AIP-SSM runs the Cisco IPS Software image and performs network intrusion prevention functions in conjunction with the ASA. The ASA can put the AIP-SSM inline, where traffic is internally redirected to the module for inspection and handling before it is forwarded. Otherwise, the AIP-SSM can operate in promiscuous mode, where the ASA copies traffic to the module as it is being forwarded.

To be effective as a network IPS, the AIP-SSM must update its IPS signature database in a timely fashion. Signature updates are available only by subscribing to the Cisco Services for IPS service. The signature database is maintained and updated by Cisco Security Intelligence Operations (SIO) and contains well over 25,000 threat signatures. As new threats are discovered and identified, new signatures are added to the database, which must be downloaded into the AIP-SSM.

The AIP-SSM is available in several models, as listed in Table 1-8. The models are numbered sequentially, in order of increasing performance. Notice that not all models can work in every ASA platform. Higher-performing ASA models require higher-performing AIPSSMs. Also notice that the ASA 5550 and 5580 models cannot accept an AIP-SSM at all.

Table 1-8. AIP-SSM Models

image

Content Security and Control (CSC) SSM

The CSC-SSM performs comprehensive antivirus, antispyware, antispam, antiphishing, file blocking, URL blocking and filtering, and content filtering in conjunction with the ASA. The ASA internally redirects traffic through the CSC-SSM, which runs the Trend Micro InterScan for Cisco CSC-SSM software image. Because so many of the CSC-SSM’s functions mitigate such a wide range of malware approaches, it is commonly referred to as the “Anti-X” module. HTTP, FTP, SMTP, and POP3 traffic are protected by the CSC-SSM.

For the CSC-SSM to be effective, it must stay updated with the latest content security information from Trend Micro. This is done automatically but requires a subscription service license from Cisco.

The CSC-SSM is available in two models, as listed in Table 1-9. The CSC-SSM-10 can support up to 50 users by default but can be expanded to 500 users through the purchase of additional licenses. The CSC-SSM-20 begins with 500 users and can be expanded to 1000 users with additional licenses.

Table 1-9. CSC-SSM Models

image

Both models come with a standard license that includes the antivirus, antispyware, and file-blocking features. If a Security Plus license is purchased, the CSC-SSM can also perform antispam, antiphishing, URL blocking/filtering, and content control.

4-port Gigabit Ethernet (4GE) SSM

The 4GE-SSM provides four additional Gigabit Ethernet ports to an ASA 5510, 5520, or 5540 model. Although the module has four copper 10/100/1000 RJ-45 ports and four SFP fiber-optic ports, only four ports of any type can be used at any time.

ASA 5585-X

The ASA 5585-X is the highest-performing model in the family and is designed for large enterprises and mission critical data centers. It has a 2-RU two-slot chassis and dual redundant power supplies, as shown in Figure 1-12. Each slot can accept a Security Services Processor (SSP).

image

Figure 1-12. ASA 5585-X Front and Rear Views

The ASA 5585-X comes in four performance models, depending on which one of the following SSPs is installed with the firewall/VPN SSP: the SSP-10 (3-Gbps throughput), the SSP-20 (7-Gbps throughput), the SSP-40 (12-Gbps throughput), and the SSP-60 (20-Gbps throughput). Depending on the model, the firewall/VPN SSP can offer up to four 10-Gbps Ethernet, six 10/100/1000, and two 10/100/1000 management interfaces, as shown in Figure 1-12.

The ASA 5585-X can also provide high-performance IPS operation in four performance models, through the addition of one of the following IPS SSPs in the upper slot (slot 1):

• IPS SSP-10 (2-Gbps throughput)

• IPS SSP-20 (3-Gbps throughput)

• IPS SSP-40 (5-Gbps throughput)

• IPS SSP-60 (10-Gbps throughput)

Figure 1-13 shows an ASA 5585-X with a firewall/VPN SSP installed in slot 0 and an IPS SSP in slot 1. The firewall/VPN SSP is always in control of and passes traffic to and from the IPS SSP. Notice that the two SSPs look identical, although they perform totally different functions. When an IPS SSP is added to a chassis, it also brings up to four 10-Gbps Ethernet and six 10/100/1000 additional interfaces that are controlled by the firewall/VPN SSP.

image

Figure 1-13. ASA5585-X Populated with a Firewall/VPN and IPS SSPs


Note

The ASA 5585-X requires Cisco ASA software 8.2(3) or later. However, if an IPS SSP is installed, the ASA must run release 8.4(2) or later and Cisco IPS 7.1(1)E4 or later.


ASA Performance Breakdown

Sometimes, you will need to select an ASA model based on sheer performance ratings. For example, the exam might ask you to choose an appropriate ASA model based on the relative size of an organization or on the expected traffic or connection loads. You can use Table 1-10 and Table 1-11 to study how each ASA model relates to the type of environment or application it can typically support. The table also lists the throughput for bandwidth, connections, and packet handling.

image

Table 1-10. Traffic Performance of ASA Models

image

image

Table 1-11. Traffic Performance of ASA 5585-X Models

image

You should also be familiar with the number of interfaces that each ASA model can support. Table 1-12 and Table 1-13 list each ASA model along with the default number of physical interfaces that are installed, the maximum number of physical interfaces supported, and the number of VLANs or logical interfaces supported.

image

Table 1-12. Interfaces Supported by ASA Models

image

image

Table 1-13. Interfaces Supported by ASA 5585-X Models

image

Except for the ASA 5505, all other models can support virtual firewalls, also called security contexts. Each virtual firewall can operate independently, sharing processor, memory, and interface resources from the hardware platform. The number of supported virtual firewalls is listed in Table 1-14 and Table 1-15.

image

Table 1-14. Virtual Firewalls and High Availability Supported by ASA Models

image

image

Table 1-15. Virtual Firewalls and High Availability Supported by ASA 5585-X Models

image

ASA devices can also be configured to offer high availability by operating as clusters or failover pairs. The high availability mode varies depending upon the model and the installed license. In Table 1-14 and Table 1-15, the mode is shown to be Active/Standby (A/S), where one ASA actively protects a network while the other ASA sits idle in standby mode, or Active/Active (A/A), where both ASAs in a pair can actively participate in network protection.

Although the FIREWALL course and exam do not cover VPN topics in detail, you should still be familiar with the VPN capabilities of the ASA product family. Table 1-16 and Table 1-17 list the VPN throughput and maximum session ratings for each ASA model. VPN performance becomes important when an ASA must also support secure access for remote users and remote sites. By selecting the appropriate ASA model, you can make sure that the number of VPN users and the bandwidth they require are supported.

Table 1-16. VPN Performance by ASA Model

image

Table 1-17. VPN Performance by ASA 5585-X Model

image

Selecting ASA Licenses

The Cisco ASA has a long list of security features (some common and some not so common) such that no one size fits all. To tailor an ASA to a specific environment or application, features and capabilities are unlocked through an aggregated licensing scheme based on the ASA’s serial number. Each ASA model comes with a Base license that opens up a basic set of features. If additional capabilities are required, additional licenses must be purchased and their license activation keys must be entered into the ASA’s permanent memory. These licenses are considered to be permanent licenses because they are applied to the ASA on a permanent basis.

Suppose you want to try out an ASA feature or capability without a commitment to purchase the license just yet. Cisco also offers temporary time-based licenses so that you can evaluate a feature or upgrade a capability until a permanent license can be purchased. Most of the time-based licensees are valid for a time limit from 1 to 52 weeks. Once they are requested from Cisco, time-based license activation keys can be entered into the ASA.

For ASAs running Cisco ASA Software Release 8.0(4) or later, time-based licenses can be aggregated or used in conjunction with permanent licenses. Until a time-based license expires, the permanent and time-based licenses are combined. With features like Unified Communications Proxy and Multiple Security Contexts, the permanent and time-based licenses are added together. With most other features, the higher value of the two licenses is used. In contrast, Releases 8.0(3) or earlier consider time-based licenses to override any permanent licenses for a given feature. Beginning with Release 8.3, you can install multiple time-based license keys so that you can evaluate several features.

When two ASAs are configured as a failover pair for high availability, the licenses between the two units must be compatible. Prior to Cisco ASA Software Release 8.3(1), both ASAs must have identical licenses installed. Beginning with Release 8.3(1), the two units can have disparate licensing. For feature licenses that involve a numerical limit, the sum of license on the two failover units is used. For feature licenses that are either enabled or disabled, the feature is enabled if the license is found on either ASA. If a time-based license is installed on either unit, the duration found on each unit is combined for a total license duration.

image

ASA licenses are broken up into the following categories:

Base license: The default set of features.

Platform-specific licenses: The ASA 5505 and 5510 are unique because they offer a Base license that can be upgraded to a Security Plus license. On the ASA 5505, the Security Plus license increases the maximum number of connections, VPN sessions, and VLANs, and it unlocks stateless firewall high availability. On the ASA 5510, Security Plus increases the maximum number of connections, physical interfaces, VLANs, and virtual firewalls, and it unlocks VPN load balancing and full high availability support. The specific differences between the Base and Security Plus licenses are shown in Tables 1-10, 1-12, 1-14, and 1-16.

The ASA 5505 also keeps track of the number of concurrent active hosts or IP addresses on its inside network interface. The ASA can be purchased with an initial license of 10, 50, or an unlimited number of internal users. The number of internal users can also be upgraded to a total of 10, 50, or an unlimited number at a later time.

Feature licenses: The features listed in Table 1-18 can be licensed individually.

Table 1-18. ASA Aggregated Feature Licenses

image

Virtualization licenses: By default, every ASA (except the 5505 and 5510 Base licenses) comes with two virtual firewalls or security contexts. The number of contexts can be increased by purchasing either an initial feature license of 5, 10, 20, 50, or 100 contexts or a feature upgrade license to go from 5 to 10, 10 to 20, 20 to 50, or 100 to 250 contexts. The maximum number of contexts is limited by the ASA model.

Per-user cryptographic UC proxy licenses: An ASA can extend Unified Communications (UC) services to remote users on the outside of a network through the cryptographic UC proxy features. Each remote user can be supported by any or all of the following proxy functions: ASA Phone Proxy, ASA Mobility Proxy, ASA Presence Federation Proxy, and ASA TLS Proxy.

By default, each ASA model comes with two user UC proxy licenses. UC proxy functions can be increased by purchasing an initial license of 24, 50, 100, 250, 500, 750, 1000, 2000, 5000, or 10,000 users, depending on the ASA model being used. As well, the number of users can be increased by purchasing an upgrade license to go from the initial number of users to the next increment of users.

Per-user Premium SSL VPN licenses: An ASA can support remote access to users over SSL VPN connections. By default, every ASA comes with a license that allows two Cisco AnyConnect SSL VPN users to connect. Premium SSL VPN includes support for users who have the Cisco AnyConnect client software installed, clientless SSL VPN users, and the Cisco Secure Desktop protected environment.

The number of AnyConnect users can be increased by purchasing an initial license of 10, 25, 50, 100, 250, 500, 750, 1000, 2500, 5000, or 10,000 users, depending on the ASA model being used. The number of VPN users can also be increased by purchasing an upgrade license to go from the initial number of users to the next increment of users.

ASA Memory Requirements

All ASA models ship with a default amount of DRAM installed, which is based on the feature set and the newest code image that are available at that time. As more features and functions are added into the code image, the ASA needs more memory resources at its disposal.

Cisco ASA Software Release 8.3 added many new features over previous releases. As a result, Cisco increased the minimum amount of DRAM required to run the image, as shown in Table 1-19. ASAs shipped with Release 8.3 or newer have the appropriate amount of memory installed; however, many ASA models that were put into service before Release 8.3 do not have the minimum memory to run 8.3 or newer. Cisco offers memory upgrades to bring such models into alignment with the newer code images.

Table 1-19. ASA Memory Requirements

image

Exam Preparation Tasks

As mentioned in the section, “How to Use This Book,” in the “Introduction,” you have a couple of choices for exam preparation: the exercises here, Chapter 17, “Final Preparation,” and the exam simulation questions on the CD-ROM.

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topic icon in the outer margin of the page. Table 1-20 lists a reference of these key topics and the page number on which each is found.

image

Table 1-20. Key Topics for Chapter 1

image

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

firewall

security domain

demilitarized zone (DMZ)

network layer access control

application layer access control

permissive access control

restrictive access control

stateless packet filtering

stateful packet filtering (SPF)

application inspection and control (AIC) filtering

deep packet inspection (DPI)

network intrusion prevention system (NIPS)

network behavior analysis (NBA) system

application layer gateway (ALG)

security context