Cisco ASA Series Firewall ASDM
Configuration Guide
Software Version 7.1
For the ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5512-X,
ASA 5515-X, ASA 5525-X, ASA 5545-X, ASA 5555-X, ASA 5580, ASA 5585-X,
and the ASA Services Module
Released: December 3, 2012
Updated: March 31, 2014
Cisco Systems, Inc.
www.cisco.com
Cisco has more than 200 offices worldwide.
Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
Text Part Number: N/A, Online only
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco ASA Series Firewall ASDM Configuration Guide
Obtaining Documentation and Submitting a Service Request22
PART
1Configuring Service Policies
CONTENTS
CHAPTER
1Configuring a Service Policy1-1
Information About Service Policies1-1
Supported Features1-1
Feature Directionality1-2
Feature Matching Within a Service Policy1-3
Order in Which Multiple Feature Actions are Applied1-4
Incompatibility of Certain Feature Actions1-5
Feature Matching for Multiple Service Policies1-5
NAT in Routed Mode3-13
NAT in Transparent Mode3-13
NAT and IPv63-15
How NAT is Implemented3-15
Main Differences Between Network Object NAT and Twice NAT3-15
Information About Network Object NAT3-16
Information About Twice NAT3-16
NAT Rule Order3-20
NAT Interfaces3-21
Routing NAT Packets3-21
Mapped Addresses and Routing3-22
Transparent Mode Routing Requirements for Remote Networks3-24
Determining the Egress Interface3-24
NAT for VPN3-24
NAT and Remote Access VPN3-25
NAT and Site-to-Site VPN3-26
NAT and VPN Management Access3-28
Troubleshooting NAT and VPN3-30
DNS and NAT3-30
Where to Go Next3-35
Cisco ASA Series Firewall ASDM Configuration Guide
2
Contents
CHAPTER
4Configuring Network Object NAT (ASA 8.3 and Later)4-1
Information About Network Object NAT4-1
Licensing Requirements for Network Object NAT4-2
Prerequisites for Network Object NAT4-2
Guidelines and Limitations4-2
Default Settings4-3
Configuring Network Object NAT4-4
Configuring Dynamic NAT or Dynamic PAT Using a PAT Pool4-4
Configuring Dynamic PAT (Hide)4-8
Configuring Static NAT or Static NAT-with-Port-Translation4-11
Configuring Identity NAT4-15
Configuring Per-Session PAT Rules4-18
Monitoring Network Object NAT4-19
Configuration Examples for Network Object NAT4-20
Providing Access to an Inside Web Server (Static NAT)4-21
NAT for Inside Hosts (Dynamic NAT) and NAT for an Outside Web Server (Static NAT)4-23
Inside Load Balancer with Multiple Mapped Addresses (Static NAT, One-to-Many)4-28
Single Address for FTP, HTTP, and SMTP (Static NAT-with-Port-Translation)4-32
DNS Server on Mapped Interface, Web Server on Real Interface (Static NAT with DNS
Modification)
4-35
DNS Server and FTP Server on Mapped Interface, FTP Server is Translated (Static NAT with DNS
Modification)
4-38
IPv4 DNS Server and FTP Server on Mapped Interface, IPv6 Host on Real Interface (Static NAT64 with
DNS64 Modification)
4-40
CHAPTER
Feature History for Network Object NAT4-45
5Configuring Twice NAT (ASA 8.3 and Later)5-1
Information About Twice NAT5-1
Licensing Requirements for Twice NAT5-2
Prerequisites for Twice NAT5-2
Guidelines and Limitations5-2
Default Settings5-4
Configuring Twice NAT5-4
Configuring Dynamic NAT or Dynamic PAT Using a PAT Pool5-4
Configuring Dynamic PAT (Hide)5-12
Configuring Static NAT or Static NAT-with-Port-Translation5-18
Configuring Identity NAT5-24
Configuring Per-Session PAT Rules5-29
Cisco ASA Series Firewall ASDM Configuration Guide
3
Contents
Monitoring Twice NAT5-29
Configuration Examples for Twice NAT5-30
Different Translation Depending on the Destination (Dynamic PAT)5-30
Different Translation Depending on the Destination Address and Port (Dynamic PAT)5-39
Feature History for Twice NAT5-48
CHAPTER
6Configuring NAT (ASA 8.2 and Earlier)6-1
NAT Overview6-1
Introduction to NAT6-1
NAT in Routed Mode6-2
NAT in Transparent Mode6-3
NAT Control6-4
NAT Types6-6
Policy NAT6-11
NAT and Same Security Level Interfaces6-13
Order of NAT Rules Used to Match Real Addresses6-14
Mapped Address Guidelines6-14
DNS and NAT6-14
Configuring NAT Control6-16
Using Dynamic NAT 6-17
Dynamic NAT Implementation6-17
Managing Global Pools6-22
Configuring Dynamic NAT, PAT, or Identity NAT6-23
Configuring Dynamic Policy NAT or PAT6-25
Using Static NAT 6-27
Configuring Static NAT, PAT, or Identity NAT6-28
Configuring Static Policy NAT, PAT, or Identity NAT6-31
Using NAT Exemption 6-33
PART
3Configuring Access Control
CHAPTER
7Configuring Access Rules7-1
Information About Access Rules7-1
General Information About Rules7-2
Information About Access Rules7-5
Information About EtherType Rules7-6
Licensing Requirements for Access Rules7-7
Guidelines and Limitations7-7
Cisco ASA Series Firewall ASDM Configuration Guide
Information About Authentication8-2
Configuring Network Access Authentication8-6
Enabling the Redirection Method of Authentication for HTTP and HTTPS8-7
Enabling Secure Authentication of Web Clients8-8
Authenticating Directly with the ASA 8-9
Configuring the Authentication Proxy Limit8-11
11Configuring Inspection of Basic Internet Protocols11-1
DNS Inspection11-1
Information About DNS Inspection11-2
Default Settings for DNS Inspection11-2
(Optional) Configuring a DNS Inspection Policy Map and Class Map11-3
Configuring DNS Inspection11-16
FTP Inspection11-17
FTP Inspection Overview11-17
Using Strict FTP11-17
Select FTP Map11-18
FTP Class Map11-19
Add/Edit FTP Traffic Class Map11-19
Add/Edit FTP Match Criterion11-20
FTP Inspect Map11-21
File Type Filtering11-22
Add/Edit FTP Policy Map (Security Level)11-22
Add/Edit FTP Policy Map (Details)11-23
Add/Edit FTP Map11-24
Verifying and Monitoring FTP Inspection11-25
HTTP Inspection11-26
HTTP Inspection Overview11-26
Select HTTP Map11-26
HTTP Class Map11-27
Add/Edit HTTP Traffic Class Map11-27
Add/Edit HTTP Match Criterion11-28
HTTP Inspect Map11-32
URI Filtering11-33
Add/Edit HTTP Policy Map (Security Level)11-33
Add/Edit HTTP Policy Map (Details)11-34
Add/Edit HTTP Map11-35
Cisco ASA Series Firewall ASDM Configuration Guide
6
ICMP Inspection11-39
ICMP Error Inspection11-39
Instant Messaging Inspection11-39
IM Inspection Overview11-40
Adding a Class Map for IM Inspection11-40
Select IM Map11-41
IP Options Inspection11-41
IP Options Inspection Overview11-41
Configuring IP Options Inspection11-42
Select IP Options Inspect Map11-43
IP Options Inspect Map11-44
Add/Edit IP Options Inspect Map11-44
Information about IPv6 Inspection11-48
Default Settings for IPv6 Inspection11-48
(Optional) Configuring an IPv6 Inspection Policy Map 11-48
Configuring IPv6 Inspection11-49
15Information About Cisco Unified Communications Proxy Features15-1
Information About the Adaptive Security Appliance in Cisco Unified Communications 15-1
TLS Proxy Applications in Cisco Unified Communications15-3
Licensing for Cisco Unified Communications Proxy Features 15-4
CHAPTER
16Using the Cisco Unified Communication Wizard16-1
Information about the Cisco Unified Communication Wizard16-1
Licensing Requirements for the Unified Communication Wizard16-3
Guidelines and Limitations16-4
Configuring the Phone Proxy by using the Unified Communication Wizard16-4
Configuring the Private Network for the Phone Proxy16-5
Configuring Servers for the Phone Proxy16-6
Enabling Certificate Authority Proxy Function (CAPF) for IP Phones16-8
Configuring the Public IP Phone Network16-9
Configuring the Media Termination Address for Unified Communication Proxies16-10
10
Configuring the Mobility Advantage by using the Unified Communication Wizard16-11
Configuring the Topology for the Cisco Mobility Advantage Proxy16-12
Configuring the Server-Side Certificates for the Cisco Mobility Advantage Proxy16-12
Configuring the Client-Side Certificates for the Cisco Mobility Advantage Proxy16-13
Configuring the Presence Federation Proxy by using the Unified Communication Wizard16-14
Configuring the Topology for the Cisco Presence Federation Proxy16-14
Cisco ASA Series Firewall ASDM Configuration Guide
Configuring the Local-Side Certificates for the Cisco Presence Federation Proxy16-15
Configuring the Remote-Side Certificates for the Cisco Presence Federation Proxy16-15
Configuring the UC-IME by using the Unified Communication Wizard16-16
Configuring the Topology for the Cisco Intercompany Media Engine Proxy16-17
Configuring the Private Network Settings for the Cisco Intercompany Media Engine Proxy16-18
Adding a Cisco Unified Communications Manager Server for the UC-IME Proxy16-20
Configuring the Public Network Settings for the Cisco Intercompany Media Engine Proxy16-20
Configuring the Local-Side Certificates for the Cisco Intercompany Media Engine Proxy16-21
Configuring the Remote-Side Certificates for the Cisco Intercompany Media Engine Proxy16-22
Working with Certificates in the Unified Communication Wizard16-23
Exporting an Identity Certificate16-23
Installing a Certificate16-23
Generating a Certificate Signing Request (CSR) for a Unified Communications Proxy16-24
Saving the Identity Certificate Request16-25
Installing the ASA Identity Certificate on the Mobility Advantage Server16-26
Installing the ASA Identity Certificate on the Presence Federation and Cisco Intercompany Media
Engine Servers
16-26
Contents
CHAPTER
17Configuring the Cisco Phone Proxy17-1
Information About the Cisco Phone Proxy17-1
Phone Proxy Functionality17-1
Supported Cisco UCM and IP Phones for the Phone Proxy17-3
Licensing Requirements for the Phone Proxy17-4
Prerequisites for the Phone Proxy17-6
Media Termination Instance Prerequisites17-6
Certificates from the Cisco UCM17-7
DNS Lookup Prerequisites17-7
Cisco Unified Communications Manager Prerequisites17-7
ACL Rules17-7
NAT and PAT Prerequisites17-8
Prerequisites for IP Phones on Multiple Interfaces17-9
7960 and 7940 IP Phones Support17-9
Cisco IP Communicator Prerequisites17-10
Prerequisites for Rate Limiting TFTP Requests17-10
End-User Phone Provisioning17-11
Phone Proxy Guidelines and Limitations17-12
Configuring the Phone Proxy17-14
Task Flow for Configuring the Phone Proxy17-14
Creating the CTL File17-15
Cisco ASA Series Firewall ASDM Configuration Guide
11
Contents
Adding or Editing a Record Entry in a CTL File17-16
Creating the Media Termination Instance17-17
Creating the Phone Proxy Instance17-18
Adding or Editing the TFTP Server for a Phone Proxy17-20
Configuring Linksys Routers with UDP Port Forwarding for the Phone Proxy17-21
Feature History for the Phone Proxy17-22
CHAPTER
18Configuring the TLS Proxy for Encrypted Voice Inspection18-1
Information about the TLS Proxy for Encrypted Voice Inspection18-1
Decryption and Inspection of Unified Communications Encrypted Signaling18-2
Supported Cisco UCM and IP Phones for the TLS Proxy18-3
Licensing for the TLS Proxy 18-4
Prerequisites for the TLS Proxy for Encrypted Voice Inspection18-6
Configuring the TLS Proxy for Encrypted Voice Inspection18-6
Feature History for the TLS Proxy for Encrypted Voice Inspection18-17
CHAPTER
CHAPTER
12
19Configuring Cisco Mobility Advantage19-1
Information about the Cisco Mobility Advantage Proxy Feature19-1
Cisco Mobility Advantage Proxy Functionality19-1
Mobility Advantage Proxy Deployment Scenarios19-2
Trust Relationships for Cisco UMA Deployments 19-4
Licensing for the Cisco Mobility Advantage Proxy Feature 19-6
Configuring Cisco Mobility Advantage19-6
Task Flow for Configuring Cisco Mobility Advantage19-7
Feature History for Cisco Mobility Advantage19-7
20Configuring Cisco Unified Presence20-1
Information About Cisco Unified Presence20-1
Cisco ASA Series Firewall ASDM Configuration Guide
Architecture for Cisco Unified Presence for SIP Federation Deployments20-1
Trust Relationship in the Presence Federation 20-4
Security Certificate Exchange Between Cisco UP and the Security Appliance20-5
XMPP Federation Deployments20-5
Configuration Requirements for XMPP Federation20-6
Licensing for Cisco Unified Presence20-7
Configuring Cisco Unified Presence Proxy for SIP Federation20-8
Task Flow for Configuring Cisco Unified Presence Federation Proxy for SIP Federation20-9
Feature History for Cisco Unified Presence20-9
Contents
CHAPTER
21Configuring Cisco Intercompany Media Engine Proxy21-1
Information About Cisco Intercompany Media Engine Proxy21-1
Features of Cisco Intercompany Media Engine Proxy21-1
How the UC-IME Works with the PSTN and the Internet21-2
Tickets and Passwords21-3
Call Fallback to the PSTN21-5
Architecture and Deployment Scenarios for Cisco Intercompany Media Engine21-5
Licensing for Cisco Intercompany Media Engine21-8
Guidelines and Limitations21-9
Configuring Cisco Intercompany Media Engine Proxy21-11
Task Flow for Configuring Cisco Intercompany Media Engine21-11
Configuring NAT for Cisco Intercompany Media Engine Proxy21-12
Configuring PAT for the Cisco UCM Server21-14
Creating ACLs for Cisco Intercompany Media Engine Proxy21-16
Creating the Media Termination Instance21-17
Creating the Cisco Intercompany Media Engine Proxy21-18
Creating Trustpoints and Generating Certificates21-21
Creating the TLS Proxy21-24
Enabling SIP Inspection for the Cisco Intercompany Media Engine Proxy21-25
(Optional) Configuring TLS within the Local Enterprise21-27
(Optional) Configuring Off Path Signaling21-30
Configuring the Cisco UC-IMC Proxy by using the UC-IME Proxy Pane21-31
Configuring the Cisco UC-IMC Proxy by using the Unified Communications Wizard21-33
Feature History for Cisco Intercompany Media Engine Proxy21-37
PART
6Configuring Connection Settings and QoS
Cisco ASA Series Firewall ASDM Configuration Guide
13
Contents
CHAPTER
22Configuring Connection Settings22-1
Information About Connection Settings22-1
TCP Intercept and Limiting Embryonic Connections22-2
Disabling TCP Intercept for Management Packets for Clientless SSL Compatibility22-2
Dead Connection Detection (DCD)22-2
TCP Sequence Randomization22-3
TCP Normalization22-3
TCP State Bypass22-3
Licensing Requirements for Connection Settings22-4
Guidelines and Limitations22-5
Default Settings22-5
Configuring Connection Settings22-6
Task Flow For Configuring Connection Settings22-6
Customizing the TCP Normalizer with a TCP Map22-6
Configuring Connection Settings22-8
Configuring Global Timeouts22-9
Feature History for Connection Settings22-11
CHAPTER
23Configuring QoS23-1
Information About QoS23-1
Supported QoS Features23-2
What is a Token Bucket?23-2
Information About Policing23-3
Information About Priority Queuing23-3
Information About Traffic Shaping23-4
How QoS Features Interact23-4
DSCP and DiffServ Preservation23-5
Licensing Requirements for QoS23-5
Guidelines and Limitations23-5
Configuring QoS23-6
Determining the Queue and TX Ring Limits for a Standard Priority Queue23-7
Configuring the Standard Priority Queue for an Interface23-8
Configuring a Service Rule for Standard Priority Queuing and Policing23-9
Configuring a Service Rule for Traffic Shaping and Hierarchical Priority Queuing23-10
Cisco ASA Series Firewall ASDM Configuration Guide
Viewing QoS Standard Priority Queue Statistics23-13
Feature History for QoS23-14
Contents
CHAPTER
24Troubleshooting Connections and Resources24-1
Testing Your Configuration24-1
Pinging ASA Interfaces24-1
Verifying ASA Configuration and Operation, and Testing Interfaces Using Ping24-3
Determining Packet Routing with Traceroute24-6
Tracing Packets with Packet Tracer24-7
Monitoring Performance24-8
Monitoring System Resources24-9
Blocks24-9
CPU24-10
Memory24-10
Monitoring Connections24-11
Monitoring Per-Process CPU Usage24-12
PART
7Configuring Advanced Network Protection
CHAPTER
25Configuring the ASA for Cisco Cloud Web Security25-1
Information About Cisco Cloud Web Security25-2
Redirection of Web Traffic to Cloud Web Security25-2
User Authentication and Cloud Web Security25-2
Authentication Keys25-3
ScanCenter Policy25-4
Cloud Web Security Actions25-5
Bypassing Scanning with Whitelists25-6
IPv4 and IPv6 Support25-6
Failover from Primary to Backup Proxy Server25-6
Licensing Requirements for Cisco Cloud Web Security25-6
Prerequisites for Cloud Web Security25-7
Guidelines and Limitations25-7
Default Settings25-8
Configuring Cisco Cloud Web Security25-8
Configuring Communication with the Cloud Web Security Proxy Server25-8
(Multiple Context Mode) Allowing Cloud Web Security Per Security Context25-10
Configuring a Service Policy to Send Traffic to Cloud Web Security25-10
(Optional) Configuring Whitelisted Traffic25-23
Cisco ASA Series Firewall ASDM Configuration Guide
15
Contents
(Optional) Configuring the User Identity Monitor25-25
Configuring the Cloud Web Security Policy25-26
Monitoring Cloud Web Security25-26
Related Documents25-27
Feature History for Cisco Cloud Web Security25-27
CHAPTER
26Configuring the Botnet Traffic Filter26-1
Information About the Botnet Traffic Filter26-1
Botnet Traffic Filter Address Types26-2
Botnet Traffic Filter Actions for Known Addresses26-2
Botnet Traffic Filter Databases26-2
How the Botnet Traffic Filter Works26-5
Licensing Requirements for the Botnet Traffic Filter26-6
Prerequisites for the Botnet Traffic Filter26-6
Guidelines and Limitations26-6
Default Settings26-6
Configuring the Botnet Traffic Filter26-7
Task Flow for Configuring the Botnet Traffic Filter26-7
Configuring the Dynamic Database26-8
Adding Entries to the Static Database26-9
Enabling DNS Snooping26-9
Enabling Traffic Classification and Actions for the Botnet Traffic Filter26-10
Blocking Botnet Traffic Manually26-12
Searching the Dynamic Database26-13
Information About Advanced Threat Detection Statistics27-5
Guidelines and Limitations27-5
Default Settings27-6
Configuring Advanced Threat Detection Statistics27-6
Monitoring Advanced Threat Detection Statistics27-7
Feature History for Advanced Threat Detection Statistics27-8
Configuring Scanning Threat Detection27-8
Information About Scanning Threat Detection27-9
Guidelines and Limitations27-9
Default Settings27-10
Configuring Scanning Threat Detection27-10
Feature History for Scanning Threat Detection27-11
Contents
CHAPTER
CHAPTER
28Using Protection Tools28-1
Preventing IP Spoofing28-1
Configuring the Fragment Size28-2
Show Fragment28-2
Configuring TCP Options28-3
TCP Reset Settings28-4
Configuring IP Audit for Basic IPS Support28-5
IP Audit Policy28-5
Add/Edit IP Audit Policy Configuration28-5
IP Audit Signatures28-6
IP Audit Signature List28-6
29Configuring Filtering Services29-1
Information About Web Traffic Filtering29-1
Filtering URLs and FTP Requests with an External Server29-2
Information About URL Filtering29-2
Licensing Requirements for URL Filtering29-3
Guidelines and Limitations for URL Filtering29-3
Identifying the Filtering Server29-3
Configuring Additional URL Filtering Settings29-4
Configuring Filtering Rules29-6
Filtering the Rule Table29-11
Defining Queries29-12
Cisco ASA Series Firewall ASDM Configuration Guide
17
Contents
PART
8Configuring Modules
Feature History for URL Filtering29-12
CHAPTER
30Configuring the ASA CX Module30-1
Information About the ASA CX Module30-1
How the ASA CX Module Works with the ASA30-2
Monitor-Only Mode30-3
Information About ASA CX Management30-4
Information About Authentication Proxy30-5
Information About VPN and the ASA CX Module30-5
Compatibility with ASA Features30-5
Licensing Requirements for the ASA CX Module30-6
Prerequisites30-6
Guidelines and Limitations30-6
Default Settings30-8
Configuring the ASA CX Module30-8
Task Flow for the ASA CX Module30-8
Connecting the ASA CX Management Interface30-9
(ASA 5512-X through ASA 5555-X; May Be Required) Installing the Software Module30-12
(ASA 5585-X) Changing the ASA CX Management IP Address30-14
Configuring Basic ASA CX Settings at the ASA CX CLI30-16
Configuring the Security Policy on the ASA CX Module Using PRSM30-17
(Optional) Configuring the Authentication Proxy Port30-18
Redirecting Traffic to the ASA CX Module30-19
18
Managing the ASA CX Module30-23
Resetting the Password30-23
Reloading or Resetting the Module30-24
Shutting Down the Module30-25
(ASA 5512-X through ASA 5555-X) Uninstalling a Software Module Image30-26
(ASA 5512-X through ASA 5555-X) Sessioning to the Module From the ASA30-26
Cisco ASA Series Firewall ASDM Configuration Guide
Feature History for the ASA CX Module30-33
Contents
CHAPTER
31Configuring the ASA IPS Module31-1
Information About the ASA IPS Module31-1
How the ASA IPS Module Works with the ASA31-2
Operating Modes31-3
Using Virtual Sensors (ASA 5510 and Higher)31-3
Information About Management Access31-4
Licensing Requirements for the ASA IPS module31-5
Guidelines and Limitations31-5
Default Settings31-6
Configuring the ASA IPS module31-7
Task Flow for the ASA IPS Module31-7
Connecting the ASA IPS Management Interface31-8
Sessioning to the Module from the ASA (May Be Required)31-11
(ASA 5512-X through ASA 5555-X) Booting the Software Module31-12
Configuring Basic IPS Module Network Settings31-12
Configuring the Security Policy on the ASA IPS Module31-15
Assigning Virtual Sensors to a Security Context (ASA 5510 and Higher)31-17
Diverting Traffic to the ASA IPS module31-18
CHAPTER
Managing the ASA IPS module31-19
Installing and Booting an Image on the Module31-20
Shutting Down the Module31-22
Uninstalling a Software Module Image31-22
Resetting the Password31-23
Reloading or Resetting the Module31-24
Monitoring the ASA IPS module31-24
Feature History for the ASA IPS module31-25
32Configuring the ASA CSC Module32-1
Information About the CSC SSM32-1
Determining What Traffic to Scan32-3
Licensing Requirements for the CSC SSM32-5
Prerequisites for the CSC SSM32-5
Guidelines and Limitations32-6
Default Settings32-6
Configuring the CSC SSM32-7
Before Configuring the CSC SSM32-7
Cisco ASA Series Firewall ASDM Configuration Guide
19
Contents
Connecting to the CSC SSM32-8
Determining Service Policy Rule Actions for CSC Scanning32-9
CSC SSM Setup Wizard32-10
Activation/License32-11
IP Configuration32-11
Host/Notification Settings32-12
Management Access Host/Networks32-13
Password32-13
Restoring the Default Password32-14
Wizard Setup32-15
Threats32-24
Live Security Events32-25
Live Security Events Log32-25
Software Updates32-26
Resource Graphs32-27
Troubleshooting the CSC Module32-27
Additional References32-31
Feature History for the CSC SSM32-31
20
Cisco ASA Series Firewall ASDM Configuration Guide
About This Guide
This preface introduces Cisco ASA Series Firewall ASDM Configuration Guide and includes the
following sections:
• Document Objectives, page 3
• Related Documentation, page 3
• Conventions, page 4
• Obtaining Documentation and Submitting a Service Request, page 4
Document Objectives
The purpose of this guide is to help you configure the firewall features for ASA using ASDM. This guide
does not cover every feature, but describes only the most common configuration scenarios.
This guide applies to the Cisco ASA series. Throughout this guide, the term “ASA” applies generically
to supported models, unless specified otherwise.
NoteASDM supports many ASA versions. The ASDM documentation and online help includes all of the
latest features supported by the ASA. If you are running an older version of ASA software, the
documentation might include features that are not supported in your version. Similarly, if a feature was
added into a maintenance release for an older major or minor version, then the ASDM documentation
includes the new feature even though that feature might not be available in all later ASA releases. Please
refer to the feature history table for each chapter to determine when features were added. For the
minimum supported version of ASDM for each ASA version, see Cisco ASA Series Compatibility.
Related Documentation
For more information, see Navigating the Cisco ASA Series Documentation at
http://www.cisco.com/go/asadocs.
Cisco ASA Series Firewall ASDM Configuration Guide
3
Conventions
This document uses the following conventions:
ConventionIndication
bold fontCommands and keywords and user-entered text appear in bold font.
italic fontDocument titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[ ]Elements in square brackets are optional.
{x | y | z }Required alternative keywords are grouped in braces and separated by
vertical bars.
[ x | y | z ]Optional alternative keywords are grouped in brackets and separated by
vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier fontTerminal sessions and information the system displays appear in courier font.
courier bold fontCommands and keywords and user-entered text appear in bold courier font.
courier italic font Arguments for which you supply values are in courier italic font.
< >Nonprinting characters such as passwords are in angle brackets.
[ ]Default responses to system prompts are in square brackets.
!, #An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
NoteMeans reader take note.
TipMeans the following information will help you solve a problem.
CautionMeans reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a
service request, and gathering additional information, see What’s New in Cisco Product Documentation
at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised
Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a
reader application. The RSS feeds are a free service.
Cisco ASA Series Firewall ASDM Configuration Guide
4
P
ART
1
Configuring Service Policies
CHA PTER
1
Configuring a Service Policy
Service policies provide a consistent and flexible way to configure ASA features. For example, you can
use a service policy to create a timeout configuration that is specific to a particular TCP application, as
opposed to one that applies to all TCP applications. A service policy consists of multiple service policy
rules applied to an interface or applied globally.
This chapter includes the following sections:
• Information About Service Policies, page 1-1
• Licensing Requirements for Service Policies, page 1-5
• Guidelines and Limitations, page 1-6
• Default Settings, page 1-7
• Task Flows for Configuring Service Policies, page 1-8
• Adding a Service Policy Rule for Through Traffic, page 1-8
• Adding a Service Policy Rule for Management Traffic, page 1-13
• Managing the Order of Service Policy Rules, page 1-15
• Feature History for Service Policies, page 1-17
Information About Service Policies
This section describes how service policies work and includes the following topics:
• Supported Features, page 1-1
• Feature Directionality, page 1-2
• Feature Matching Within a Service Policy, page 1-3
• Order in Which Multiple Feature Actions are Applied, page 1-4
• Incompatibility of Certain Feature Actions, page 1-5
• Feature Matching for Multiple Service Policies, page 1-5
Supported Features
Table 1 -1 lists the features supported by service policy rules.
Cisco ASA Series Firewall ASDM Configuration Guide
1-1
Information About Service Policies
Table 1-1 Service Policy Rule Features
Chapter 1 Configuring a Service Policy
Feature
Application inspection (multiple
types)
ASA CSC
ASA IPS
ASA CX
NetFlow Secure Event Logging
filtering
QoS input and output policing
QoS standard priority queue
QoS traffic shaping, hierarchical
priority queue
TCP and UDP connection limits
and timeouts, and TCP sequence
number randomization
TCP normalization
TCP state bypass
User statistics for Identity
Firewall
For Through
Traffic?
All except
RADIUS
accounting
For Management
Traffic?See:
RADIUS
• Chapter 10, “Getting Started with Application
accounting only
• Chapter 11, “Configuring Inspection of Basic
Layer Protocol Inspection.”
Internet Protocols.”
• Chapter 12, “Configuring Inspection for Voice
and Video Protocols.”
• Chapter 13, “Configuring Inspection of Database
and Directory Protocols.”
• Chapter 14, “Configuring Inspection for
Management Application Protocols.”
• Chapter 25, “Configuring the ASA for Cisco
Cloud Web Security.”
Ye sNoChapter 32, “Configuring the ASA CSC Module.”
Ye sNoChapter 31, “Configuring the ASA IPS Module.”
Ye sNoChapter 30, “Configuring the ASA CX Module.”
Ye sYe sChapter 43, “Configuring NetFlow Secure Event
Logging (NSEL),” in the general operations
configuration guide.
Ye sNoChapter 23, “Configuring QoS.”
Ye sNoChapter 23, “Configuring QoS.”
Ye sYe sChapter 23, “Configuring QoS.”
Ye sYe sChapter 22, “Configuring Connection Settings.”
Ye sNoChapter 22, “Configuring Connection Settings.”
Ye sNoChapter 22, “Configuring Connection Settings.”
Ye sYe sSee the user-statistics command in the command
reference.
Feature Directionality
Actions are applied to traffic bidirectionally or unidirectionally depending on the feature. For features
that are applied bidirectionally, all traffic that enters or exits the interface to which you apply the policy
map is affected if the traffic matches the class map for both directions.
Cisco ASA Series Firewall ASDM Configuration Guide
1-2
Chapter 1 Configuring a Service Policy
NoteWhen you use a global policy, all features are unidirectional; features that are normally bidirectional
when applied to a single interface only apply to the ingress of each interface when applied globally.
Because the policy is applied to all interfaces, the policy will be applied in both directions so
bidirectionality in this case is redundant.
For features that are applied unidirectionally, for example QoS priority queue, only traffic that enters (or
exits, depending on the feature) the interface to which you apply the policy map is affected. See
Table 1 -2 for the directionality of each feature.
Table 1-2Feature Directionality
FeatureSingle Interface Direction Global Direction
TCP and UDP connection limits and timeouts,
and TCP sequence number randomization
TCP normalizationBidirectionalIngress
TCP state bypassBidirectionalIngress
User statistics for Identity FirewallBidirectionalIngress
Information About Service Policies
EgressEgress
BidirectionalIngress
Feature Matching Within a Service Policy
See the following information for how a packet matches rules in a policy for a given interface:
1. A packet can match only one rule for an interface for each feature type.
2. When the packet matches a rule for a feature type, the ASA does not attempt to match it to any
subsequent rules for that feature type.
3. If the packet matches a subsequent rule for a different feature type, however, then the ASA also
applies the actions for the subsequent rule, if supported. See the “Incompatibility of Certain Feature
Actions” section on page 1-5 for more information about unsupported combinations.
NoteApplication inspection includes multiple inspection types, and most are mutually exclusive.
For inspections that can be combined, each inspection is considered to be a separate feature.
Cisco ASA Series Firewall ASDM Configuration Guide
1-3
Information About Service Policies
For example, if a packet matches a rule for connection limits, and also matches a rule for an application
inspection, then both actions are applied.
If a packet matches a rulefor HTTP inspection, but also matches another rule that includes HTTP
inspection, then the second rule actions are not applied.
If a packet matches a rulefor HTTP inspection, but also matches another rule that includes FTP
inspection, then the second rule actions are not applied because HTTP and FTP inspections cannpt be
combined.
If a packet matches a rule for HTTP inspection, but also matches another rule that includes IPv6
inspection, then both actions are applied because the IPv6 inspection can be combined with any other
type of inspection.
Order in Which Multiple Feature Actions are Applied
The order in which different types of actions in a service policy are performed is independent of the order
in which the actions appear in the table.
Chapter 1 Configuring a Service Policy
NoteNetFlow Secure Event Logging filtering and User statistics for Identity Firewall are order-independent.
Actions are performed in the following order:
1. QoS input policing
2. TCP normalization, TCP and UDP connection limits and timeouts, TCP sequence number
randomization, and TCP state bypass.
NoteWhen a the ASA performs a proxy service (such as AAA or CSC) or it modifies the TCP payload
(such as FTP inspection), the TCP normalizer acts in dual mode, where it is applied before and
after the proxy or payload modifying service.
3. ASA CSC
4. Application inspections that can be combined with other inspections:
a. IPv6
b. IP options
c. WAAS
5. Application inspections that cannot be combined with other inspections. See the “Incompatibility of
Certain Feature Actions” section on page 1-5 for more information.