Introduction to Firewalls

Dear sir,

I would like to know how to verify the following are configured in our firewall ASA

Cisco Adaptive Security Appliance Software Version 8.4(2)
Device Manager Version 6.4(5)
Hardware: ASA5585-SSP-20

MD5

0e6552c7590de315878f73346f482b14
443f39b28a5b2434f1985f2fc43dc034
79abd17391adc6251ecdc58d13d76baf
3175ffeef775a428502f51818d854f02

SHA1

31c3f7b523e1e406d330958e28882227765c3c5e
C5938ec75e5b655be84eb94d73adec0f63fbce16

SHA256

195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9
30b72e83d66cbe9e724c8e2b21179aecd4bcf68b2ec7895616807df380afab54
33afa2f1d53d5279b6fc87ce6834193fdd7e16e4b44e895aae4b9da00be0c502
4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d
5603a16cbf81d183d3ff4ffea5477af1a4be01321865f0978c0e128051ec0a82

Regards,
Mani

Hello Manikandan

I’m not quite sure what you are asking. MD5, SHA1, and SHA256 are encryption algorithms used in a variety of ASA features including VPNs, digital certificates, and the NTP protocol, to name a few. What in particular were you looking for?

Let us know so that we can help you further.

Laz

Dear Laz,

I have missed out your email. These are list of Indicators of Compromise (IOC) as attached. Have to scan in our network particular in firewall and DNS servers .
If any hit found, need to block it.

Thank you
Regards,
Mani

IOCs List.zip (22 Bytes)

Hello Mani

After doing some research, I have found that the Cisco ASA supports such IoC indicators when coupled with FirePOWER. You can take a look at this Cisco documentation that specifies more about how to configure it for an ASA.

This Cisco blog also talks about how it can be implemented on both network and endpoint devices:


However, it seems that without FirePOWER, implementing these IoC indicators on an ASA is not possible.

I hope this gives you some more information about what you need. (Also, it seems that your zip file attachment is empty). If you need more information, please clarify your question so that we can respond to them specifically.

I hope this has been helpful!

Laz

Dear Laz,
Our Asdm version dont have this Firepower module. Attached asdm and asa version for your reference.
Kindly advice is there upgrade is required to ASDM to get this firepower module.

image

Hello Mani

There are several ways in which FirePOWER can be incorporated into the use of an ASA device. This can be done either using the Firepower Management Center (FMC), which is a standalone software that manages multiple FirePOWER-enabled ASAs. In this scenario, ASDM is not used at all, but is replaced by the FMC. More info about this type of implementation can be found here:

Alternatively, you can enable an ASA with FirePOWER and manage it using the ASDM software. More about how this can be done can be found in the following Cisco documentation:

FMC is considered an “off-box” solution, which means that the intelligence of FirePOWER is found within the independent server while ASDM is considered the “on-box” solution because both FirePOWER and ASDM are installed and run from the ASA device itself.

I hope this has been helpful!

Laz

CaptASA

Dear sir ,

Thank you for your help provided.
Good day. Currently 10 physical interface have added in the FW. One of the customer have needs one more network have to add in the firewall. When i want to add interface it look like there is no hardware port is available. Does the model can support to create one more hardware port ? If Yes means how to make enable the hardware port.

Thank you

Regards,
Mani
verASA

Hello Mani

Each firewall interface can have only one subnet connected to it. If a customer requires more subnets within their network, they will have to have a router or layer 3 switch that performs the routing between their internal networks. Then, any traffic going outbound via the firewall can be forwarded to the physical interface of the firewall connected to their network.

Alternatively, if you want to provide them with multiple subnets that actually terminate on the firewall, you can create subinterfaces. However, this will cause the firewall to act as a router for traffic travelling between subnets of that particular customer, something that will take up more CPU and memory resources of your firewall.

For more information about subinterfaces on an ASA firewall, take a look at this lesson:

I hope this has been helpful!

Laz

Dear sir,

Have two core switch configured with HSRB . , User switch hv connected to the Nexos 5k switches and then it is connected with core switch where fw and router r connected. Customer network connected to the end switch. One segment server is connected in the firewall . Instead adding the sub interface , I have to add another subnet for server to the core switch ? Any idea how to make the configuration and connection as well?

And firewall cant see the physical interface in CLI or GUI. And physically noticed TenGig0/8 . 10G port is used for few customers as trunk which is connected in Core switch which is also Trunk port 10G.

Another 10g connection have 3 more networks TenGi0/9 -
One of the interface named as SEC . and VLAN is 282
6 networks configured as below with one 10g port.

 nameif SEC
 security-level 90
 ip address 172.25.185.129 255.255.255.192 standby 172.25.185.130

DCR8R1-N7K01# sh mac address-table |i  00a0.c917.0101
* 40       00a0.c917.0101    dynamic   0          F    F  Eth1/31
* 88       00a0.c917.0101    dynamic   0          F    F  Eth1/31
* 276      00a0.c917.0101    dynamic   0          F    F  Eth1/31
* 278      00a0.c917.0101    dynamic   0          F    F  Eth1/31
* 282      00a0.c917.0101    dynamic   0          F    F  Eth1/31
* 291      00a0.c917.0101    dynamic   0          F    F  Eth1/31

interface Ethernet1/31
  description <to ASA01 Te0/8>
  switchport
  switchport mode private-vlan trunk promiscuous
  logging event port link-status
  switchport private-vlan mapping 40 476,487,491
  switchport private-vlan trunk allowed vlan 1-3967
  switchport private-vlan mapping trunk 40 476,487,491
  no shutdown

DCR8R1-N7K01#

If they previously configured as Sub interface how to verify it ?
Model is ASA5585-SSP-20

How to add additional one sub interface ?

Any idea please help two methods to connect new network.

Thank you

Regards,
Mani

Hello Mani

It would be very helpful if you could include a diagram with your explanation as it is difficult to follow and understand your topology. However, concerning this question:

If you want to find out more about how to configure, or how to understand a configuration of subinterfaces on the ASA, take a look at the following lesson:

I await your clarifications to be able to answer the rest of your questions.

I hope this has been helpful!

Laz

Dear sir,

I have to know how to add additional sub inter face for another segments on context based asa 5585 -SSP-20 ?
if cant how to connect new segments in core switch NEXUS 7K ?

Thank you

Regards,
Mani

Hello Mani

We don’t have anything that specific to context based ASAs, but I believe that this Cisco community thread should be quite useful to you:

I hope this has been helpful!

Laz

1 Like

What is the minimum equipment I can have to practice the concepts in ASA firewall courses on this website? I have access to ASA 5505s and ASA 5506s.

How many host devices will I need? Will i need other equipment besides the firewalls? If so, what?

Thanks,
Austin

Hello Austin

As long as the ASA version is up to date, you should have no problem using either one of those devices. The 5506 is newer and has no end of life date as of yet, but the 5505 device is supported by Cisco until August of 2022. Even so, Cisco devices have been known to be used for many years after their end of life or end of support dates. And the concepts in the lessons are valid for both ASAs.

For most labs, a single ASA is enough, except for active/standby labs where you will need two firewalls. As for the number of hosts, if you have one host in each of the INSIDE, OUTSIDE, and DMZ networks you should be OK. You may need a switch or a router also, just so you can complete the topologies in the labs. But remember, you can always connect your ASA to an emulated GNS3 topology as well. This GNS3 post describes how this can be achieved:

I hope this has been helpful!

Laz

1 Like

Thank you Laz,

Which router and switch models will I need? I have access to 3560X switches and I think one or 2 C892 Routers and some 2800 series… Will these be sufficient?

Hello Austin

It depends on the certification you’re looking to achieve. If you’re talking only about the ASA labs on the site, then the equipment you have access to is more than sufficient to perform all the ASA labs on the site. This equipment is also enough for most (about 85%) of the CCNP ENCOR and ENARSI stuff, except for wireless, and maybe some automation. At least 2 routers are needed, but if you can get a third that would be ideal.

With what you describe, I think you’re all set. Take a look at these lessons for additional suggestions:


I hope this has been helpful!

Laz

Hello

I wanted to know if there was a difference between the CLI of the 8350 vs 9300.

Thanks,

Hello Alexander.

I haven’t worked directly with these two devices, but having done some research, I find that both of them run the fundamental FirePower Threat Defence (FTD) OS. The 9300 runs it on top of the FXOS modular OS, while the 8350 runs it as part of the FirePower Management Center (FMC). Fundamentally, the CLI for both devices is similar, but differs only in the additional features that the 9300 offers.

You can find more information at the following links:




I hope this has been helpful!

Laz

Hallo,
could you explain me ASA (after 8.4) path selection? Which tables ASA has?
Thanks!
Marina

Hello Marina

When you refer to path selection, I assume you mean routing in general. As far as routing goes, an ASA will function much the same as a router using either a static or dynamic routing. Things get a little more complicated when NAT is involved. Take a look at this post which describes this further. This post also includes information about order of operations, something that is intricately connected to routing decisions on ASAs.

If you have any additional questions, feel free to ask!

I hope this has been helpful!

Laz

1 Like