Download presentation
Presentation is loading. Please wait.
Published byAlex Young Modified over 11 years ago
1
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
2
2 © 2005 Cisco Systems, Inc. All rights reserved. Network Security 1 Module 3 – Security Devices
3
3 © 2005 Cisco Systems, Inc. All rights reserved. Learning Objectives 3.1 Device Options 3.2 Using Security Device Manager 3.3 Introduction to the Cisco Security Appliance Family 3.4 Getting Started with the PIX Security Appliance 3.5 PIX Security Appliance Translations and Connections 3.6 Manage a PIX Security Appliance with Adaptive Security Device Manager 3.7 PIX Security Appliance Routing Capabilities 3.8 Firewall Services Module Operation
4
4 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.1 Device Options
5
5 © 2005 Cisco Systems, Inc. All rights reserved. Sample Firewall Topology
6
6 © 2005 Cisco Systems, Inc. All rights reserved. Security Offerings Secure Operating System Foundation IP Services IOS Firewall Network Integrated Solutions VPNFirewall Intrusion Protection VPN IPsec CBAC Stateful Inspection IDSSSHSSL ACLAAANATL2TP/EAPMSCHAPv2 PKI 802.1X BGPGRE Multicast Application Aware QoS DHCP/DNS MPLSVoIP EIGRPOSPFMultiprotocol HTTPS Secure ARP uRPF Authentication per user via AAA Command Authorization via AAA Device Access by Privilege Level Activity Logging Netflow IP Comp SNMPv3 (Unicast Reverse Path Forward)
7
7 © 2005 Cisco Systems, Inc. All rights reserved. IOS Firewall
8
8 © 2005 Cisco Systems, Inc. All rights reserved. SMB Connectivity Performance Gigabit Ethernet PIX Security Appliance Lineup Enterprise ROBO PIX 515E PIX 525 PIX 535 SOHO PIX 501 PIX 506E Service Provider Stateful Inspection Firewall Appliance is Hardened OS IPSec VPN Integrated Intrusion Detection Hot Standby, Stateful Failover Easy VPN Client/Server VoIP Support
9
9 © 2005 Cisco Systems, Inc. All rights reserved. Adaptive Security Appliance Lineup
10
10 © 2005 Cisco Systems, Inc. All rights reserved. Finesse Operating System Cisco proprietary real-time operating system Runs directly on the hardware of the PIX Security Appliance and the Adaptive Security Appliance Eliminates the risks associated with general-purpose operating systems PIX - 1,000,000 simultaneous connections
11
11 © 2005 Cisco Systems, Inc. All rights reserved. The Adaptive Security Algorithm The stateful, connection-oriented ASA algorithm design creates session flows based on source and destinations addresses. Randomizes TCP sequence numbers, port numbers, and additional TCP flags before completion of the connection. Minimize the risk of a TCP sequence number attack Stateful packet filtering Method of analyzing data packets that places extensive information about a data packet into a table. Information about the connection is logged in a stateful session flow table
12
12 © 2005 Cisco Systems, Inc. All rights reserved. Catalyst Switch Integration Firewall IDS Virtual Private Network Appliance Capabilities Cisco Infrastructure © 2002, Cisco Systems, Inc. All rights reserved. VPNSSLNAMIDSFirewall Security Services Modules
13
13 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.2 Using Security Device Manager
14
14 © 2005 Cisco Systems, Inc. All rights reserved. Security Device Manager (SDM)
15
15 © 2005 Cisco Systems, Inc. All rights reserved. What is Security Device Manager (SDM)
16
16 © 2005 Cisco Systems, Inc. All rights reserved. Security Device Manager (SDM) Features
17
17 © 2005 Cisco Systems, Inc. All rights reserved. Obtaining SDM SDM is factory loaded on supported routers manufactured as of June 2003. Always check www.cisco.com/go/sdm for the latest information regarding SDM support. SDM cannot be ordered independent of the router.
18
18 © 2005 Cisco Systems, Inc. All rights reserved. Cisco SDM Files
19
19 © 2005 Cisco Systems, Inc. All rights reserved. Installing Cisco SDM
20
20 © 2005 Cisco Systems, Inc. All rights reserved. Startup Wizard: Welcome Window
21
21 © 2005 Cisco Systems, Inc. All rights reserved. SDM Main Window Layout and Navigation Menu bar Toolbar Router Information Configuration Overview
22
22 © 2005 Cisco Systems, Inc. All rights reserved. SDM Wizard Options
23
23 © 2005 Cisco Systems, Inc. All rights reserved. WAN Wizard: Create a New WAN Connection
24
24 © 2005 Cisco Systems, Inc. All rights reserved. Reset to Factory Default Wizard
25
25 © 2005 Cisco Systems, Inc. All rights reserved. Monitor Mode Overview Interface Stats Firewall Stats VPN Stats
26
26 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.3 Introduction to the Cisco Security Appliance Family
27
27 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance Family
28
28 © 2005 Cisco Systems, Inc. All rights reserved. ASA Security Appliance Family
29
29 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 501
30
30 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 506E
31
31 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 515E
32
32 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 515E Expansion Slots Options Cards
33
33 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 515E FE Cards
34
34 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 525 Front Panel LEDs
35
35 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 525 Back Panel
36
36 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 525 Back Panel
37
37 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 535
38
38 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 535Board Install
39
39 © 2005 Cisco Systems, Inc. All rights reserved. PIX Security Appliance 535 Option Cards
40
40 © 2005 Cisco Systems, Inc. All rights reserved. PIX License Options
41
41 © 2005 Cisco Systems, Inc. All rights reserved. ASA5510 Adaptive Security Appliance
42
42 © 2005 Cisco Systems, Inc. All rights reserved. ASA5520 Adaptive Security Appliance
43
43 © 2005 Cisco Systems, Inc. All rights reserved. ASA5540 Adaptive Security Appliance
44
44 © 2005 Cisco Systems, Inc. All rights reserved. ASA55XX Adaptive Security Appliance Back Panel
45
45 © 2005 Cisco Systems, Inc. All rights reserved. AIP-SSM
46
46 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.4 Getting Started with the PIX Security Appliance
47
47 © 2005 Cisco Systems, Inc. All rights reserved. User Interface
48
48 © 2005 Cisco Systems, Inc. All rights reserved. Accessing Configuration Mode
49
49 © 2005 Cisco Systems, Inc. All rights reserved. Security Levels Higher security level interface to a lower security level interface – For traffic originating from the inside interface of the PIX with a security level of 100 to the outside interface of the PIX with a security level of 0, all IP-based traffic is allowed unless it is restricted by ACLs, authentication, or authorization. Lower security level interface to a higher security level interface – For traffic originating from the outside interface of the PIX with a security level of 0 to the inside interface of the PIX with a security level of 100,all packets are dropped unless specifically allowed by an access-list command. The traffic can be restricted further if authentication and authorization is used. Same secure interface to a same secure interface – No traffic flows between two Interfaces with the same security level.
50
50 © 2005 Cisco Systems, Inc. All rights reserved. Security Levels
51
51 © 2005 Cisco Systems, Inc. All rights reserved. Basic Commands hostname – assigns a hostname to the PIX. interface – Configures the type and capability of each perimeter interface. nameif – Assigns a name to each perimeter interface. ip address – Assigns an IP address to each interface. security level – Assigns the security level for the perimeter interface. speed – Assigns the connection speed. duplex – Assigns the duplex communications.
52
52 © 2005 Cisco Systems, Inc. All rights reserved. Additional Commands nat-control – Enable or disable NAT configuration requirement. nat – Shields IP addresses on the inside network from the outside network. global – Creates a pool of one or more IP addresses for use in NAT and PAT. route – Defines a static or default route for an interface.
53
53 © 2005 Cisco Systems, Inc. All rights reserved. Interface Name
54
54 © 2005 Cisco Systems, Inc. All rights reserved. Interface Security Level
55
55 © 2005 Cisco Systems, Inc. All rights reserved. ASA Management Interface
56
56 © 2005 Cisco Systems, Inc. All rights reserved. NAT
57
57 © 2005 Cisco Systems, Inc. All rights reserved. Nat-control
58
58 © 2005 Cisco Systems, Inc. All rights reserved. Nat command
59
59 © 2005 Cisco Systems, Inc. All rights reserved. Global command
60
60 © 2005 Cisco Systems, Inc. All rights reserved. Route command
61
61 © 2005 Cisco Systems, Inc. All rights reserved. Hostname to IP address mapping
62
62 © 2005 Cisco Systems, Inc. All rights reserved. Configuration Example
63
63 © 2005 Cisco Systems, Inc. All rights reserved. Configuration Example (cont.)
64
64 © 2005 Cisco Systems, Inc. All rights reserved. Configuration Example (cont.)
65
65 © 2005 Cisco Systems, Inc. All rights reserved. Examining the PIX Security Appliance status
66
66 © 2005 Cisco Systems, Inc. All rights reserved. Examining the PIX Security Appliance status
67
67 © 2005 Cisco Systems, Inc. All rights reserved. Examining the PIX Security Appliance status
68
68 © 2005 Cisco Systems, Inc. All rights reserved. Examining the PIX Security Appliance status
69
69 © 2005 Cisco Systems, Inc. All rights reserved. Examining the PIX Security Appliance status – sh xlate
70
70 © 2005 Cisco Systems, Inc. All rights reserved. Time setting and NTP support clock command
71
71 © 2005 Cisco Systems, Inc. All rights reserved. NTP command
72
72 © 2005 Cisco Systems, Inc. All rights reserved. Configure Syslog output
73
73 © 2005 Cisco Systems, Inc. All rights reserved. Logging options
74
74 © 2005 Cisco Systems, Inc. All rights reserved. Logging levels
75
75 © 2005 Cisco Systems, Inc. All rights reserved. Configure message output to syslog server
76
76 © 2005 Cisco Systems, Inc. All rights reserved. Customize syslog output
77
77 © 2005 Cisco Systems, Inc. All rights reserved. Show logging command
78
78 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.5 PIX Security Appliance Translations and Connections
79
79 © 2005 Cisco Systems, Inc. All rights reserved. Sessions in a TCP/IP world
80
80 © 2005 Cisco Systems, Inc. All rights reserved. TCP Initialization Inside to Outside
81
81 © 2005 Cisco Systems, Inc. All rights reserved. TCP Initialization Inside to Outside (cont.)
82
82 © 2005 Cisco Systems, Inc. All rights reserved. UDP
83
83 © 2005 Cisco Systems, Inc. All rights reserved. NAT
84
84 © 2005 Cisco Systems, Inc. All rights reserved. Access through the PIX Security Appliance
85
85 © 2005 Cisco Systems, Inc. All rights reserved. Inside Address Translation
86
86 © 2005 Cisco Systems, Inc. All rights reserved. Dynamic Inside NAT
87
87 © 2005 Cisco Systems, Inc. All rights reserved. Two Interfaces with NAT
88
88 © 2005 Cisco Systems, Inc. All rights reserved. Three Interfaces with NAT
89
89 © 2005 Cisco Systems, Inc. All rights reserved. PAT
90
90 © 2005 Cisco Systems, Inc. All rights reserved. PAT Example
91
91 © 2005 Cisco Systems, Inc. All rights reserved. PAT Using outside interface address
92
92 © 2005 Cisco Systems, Inc. All rights reserved. Mapping subnets to PAT addresses
93
93 © 2005 Cisco Systems, Inc. All rights reserved. Backing Up PAT Addresses by Using Multiple PATs
94
94 © 2005 Cisco Systems, Inc. All rights reserved. Augmenting a Global Pool with PAT
95
95 © 2005 Cisco Systems, Inc. All rights reserved. NAT/Global vs Static
96
96 © 2005 Cisco Systems, Inc. All rights reserved. Static Translation
97
97 © 2005 Cisco Systems, Inc. All rights reserved. Static NAT – www server
98
98 © 2005 Cisco Systems, Inc. All rights reserved. Static NAT – ftp server
99
99 © 2005 Cisco Systems, Inc. All rights reserved. Net static
100
100 © 2005 Cisco Systems, Inc. All rights reserved. Static PAT – Port Redirection
101
101 © 2005 Cisco Systems, Inc. All rights reserved. The static PAT Command
102
102 © 2005 Cisco Systems, Inc. All rights reserved. No translation - The identity nat command
103
103 © 2005 Cisco Systems, Inc. All rights reserved. The identity nat – nat 0 command
104
104 © 2005 Cisco Systems, Inc. All rights reserved. Translations and Connections
105
105 © 2005 Cisco Systems, Inc. All rights reserved. Show conn
106
106 © 2005 Cisco Systems, Inc. All rights reserved. The show conn detail Command
107
107 © 2005 Cisco Systems, Inc. All rights reserved. The show local-host Command
108
108 © 2005 Cisco Systems, Inc. All rights reserved. The show xlate Command
109
109 © 2005 Cisco Systems, Inc. All rights reserved. The show xlate detail Command
110
110 © 2005 Cisco Systems, Inc. All rights reserved. Configuring Multiple Interfaces
111
111 © 2005 Cisco Systems, Inc. All rights reserved. Configuring 3 interfaces
112
112 © 2005 Cisco Systems, Inc. All rights reserved. Configuring 4 Interfaces
113
113 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.6 Manage a PIX Security Appliance with Adaptive Security Device Manager
114
114 © 2005 Cisco Systems, Inc. All rights reserved. Adaptive Security Device Manager (ASDM)
115
115 © 2005 Cisco Systems, Inc. All rights reserved. ASDM Features
116
116 © 2005 Cisco Systems, Inc. All rights reserved. Security Appliance Requirements
117
117 © 2005 Cisco Systems, Inc. All rights reserved. ASDM Compatibility
118
118 © 2005 Cisco Systems, Inc. All rights reserved. Workstation Requirements
119
119 © 2005 Cisco Systems, Inc. All rights reserved. Running ASDM
120
120 © 2005 Cisco Systems, Inc. All rights reserved. Configure the security appliance to use ASDM
121
121 © 2005 Cisco Systems, Inc. All rights reserved. Setup Dialog
122
122 © 2005 Cisco Systems, Inc. All rights reserved. ASDM Home Window
123
123 © 2005 Cisco Systems, Inc. All rights reserved. Startup Wizard
124
124 © 2005 Cisco Systems, Inc. All rights reserved. ASDM Configuration Window
125
125 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.7 PIX Security Appliance Routing Capabilities
126
126 © 2005 Cisco Systems, Inc. All rights reserved. VLANs
127
127 © 2005 Cisco Systems, Inc. All rights reserved. Create Logical and Physical interfaces
128
128 © 2005 Cisco Systems, Inc. All rights reserved. VLAN Names and Security Levels
129
129 © 2005 Cisco Systems, Inc. All rights reserved. Assign VLAN ip address
130
130 © 2005 Cisco Systems, Inc. All rights reserved. VLAN Example
131
131 © 2005 Cisco Systems, Inc. All rights reserved. Maximun interfaces supported – Rel 7
132
132 © 2005 Cisco Systems, Inc. All rights reserved. Static Routes
133
133 © 2005 Cisco Systems, Inc. All rights reserved. Routing with RIP – Learning routes
134
134 © 2005 Cisco Systems, Inc. All rights reserved. Routing with OSPF
135
135 © 2005 Cisco Systems, Inc. All rights reserved. OSFP Configuration
136
136 © 2005 Cisco Systems, Inc. All rights reserved. Enable OSPF Routing
137
137 © 2005 Cisco Systems, Inc. All rights reserved. Define OSPF Networks
138
138 © 2005 Cisco Systems, Inc. All rights reserved. OSPF two processes
139
139 © 2005 Cisco Systems, Inc. All rights reserved. Defining OSPF two processes
140
140 © 2005 Cisco Systems, Inc. All rights reserved. Multicast Routing
141
141 © 2005 Cisco Systems, Inc. All rights reserved. Outside Multicast Server – Configuring the Outside Interface
142
142 © 2005 Cisco Systems, Inc. All rights reserved. Outside Multicast Server – Configuring the Inside Interface
143
143 © 2005 Cisco Systems, Inc. All rights reserved. Outside Multicast Server – Inside Receiving Hosts
144
144 © 2005 Cisco Systems, Inc. All rights reserved. Configuring Other IGMP Options
145
145 © 2005 Cisco Systems, Inc. All rights reserved. Module 3 – Security Devices 3.8 Firewall Services Module Operation
146
146 © 2005 Cisco Systems, Inc. All rights reserved. Firewall Services Module (FWSM) Designed for high end enterprise and service providers Runs in Catalyst 6500 switches and 7600 Series routers Based on PIX Security Appliance technology PIX Security Appliance 6.0 feature set (some 6.2) 1 million simultaneous connections Over 100,000 connections per second 5 Gbps throughput Up to 4 can be stacked in a chassis, providing 20 Gbps throughput 1 GB DRAM Supports 100 VLANs Supports failover
147
147 © 2005 Cisco Systems, Inc. All rights reserved. FWSM in the Catalyst 6500 Switch Supervisor engine Redundant supervisor engine Slots 1-9 (top to bottom) Power supply 1 Power supply 2 ESD ground strap connector Switch fabric module 48 Port 10/100 Ethernet 16 Port GBIC Fan assembly FWSM
148
148 © 2005 Cisco Systems, Inc. All rights reserved. FWSM in the Cisco 7609 Internet Router Fan assembly Power supply 1 Power supply 2 Switch fabric module Supervisor engine ESD ground strap connection Slots 1-9 (right to left) FWSM
149
149 © 2005, Cisco Systems, Inc. All rights reserved.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.