Joël NGUINA
Executive MBA Management Stratégique
CCNP, CEH, LPIC2, PMP & MTCNA Certified
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Les bases du Cisco ASA Firewall
Fonctionnalités réseau
Les VPN
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Adaptive Security Appliance - Développé par Cisco en 2005 est
une solution firewall dédiée (All-in-One solution)
Firewall
VPN concentrator
IPS
• Fonctionnalités avancées
Virtual Firewalling
Transparent/Routed mode
High Availability
Advanced Threat Control (AIP-SSM, AIP-SSC modules)
Identity Firewall
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Entre 2 réseaux
Joue le rôle de la police des frontières, se place avant l’IPS
• Filtre le trafic.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
• surveille l’état des connexions
Initiation, transfert des données, fin de communication
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
- ASA randomisez the initial sequence
- Le paquet est reçu sur l’interface number of the connection
inside - the ASA creates a state object in memory
- L’ACL entrant est appliqué et si le retaining layer 3 and layer 4 information
NAT est configuré, l’opération inside from the packet
NAT est effectuée 1 - The connection is marked as embryonic
2
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Routed-mode
• ASA est un équipement de niveau 3
• Toutes les fonctionnalités et capacités de ASA sont activées
• Transparent-mode
• ASA est un équipement de couche 2 (on a des vlans plutôt que des sous-
réseaux)
• possède une adresse ip de management pour les connexions distantes
• est invisible par tout attaquant à partir de internet
• certaines fonctionnalités sont désactivées : le routage, les VPN, QoS, DHCP
Relay.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
• Plusieurs LEDs
Speed and link activity LEDs
Power LED
Status LED
Active LED
VPN LED
Security Services Card (SSC) LED
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
• 8-port switch 10/100 Fast Ethernet.
• Un slot Security Service Card (SSC) pour une éventuelle extension. On peut y
mettre carte Cisco Advanced Inspection and Prevention Security Services Card
(AIP-SSC).
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
• Structure modulaire identique à ios
mode non privilégié
Droit limité
mode privilégié
Pour les commandes show principalement
configuration global
Pour les config générales (e.g mot de passe, routage… etc)
Configuration specifique
Pour les configurations avancées (firewall, VPN, routage etc)
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
ciscoasa>enable 15
Password:
ciscoasa#configure terminal
ciscoasa(config)#interface fa0/1
ciscoasa(config-if)#exit
ciscoasa(config)#exit
ciscoasa#exit
ciscoasa>
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
ciscoasa > ?
address
USAGE:
enable [<priv_level>]
DESCRIPTION:
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
• Effacer la config existante…
startup-config running- config
Flash RAM
Deleting configurations
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• Les sauvegardes!
startup-config running- config
ciscoasa# show running
ciscoasa# show startup Flash RAM
Salvarea configurației
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
• Elle n’existe pas sur IOS( routeurs et switchs)
• Permet de supprimer une config specifiques de la RAM
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
• Configurer le hostname
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• La définition de niveau de sécurité sur des
interfaces est un préalable aux échanges.
• Les Packets sont inspectés quand ils partent d’une interface à niveau de
sécurité élevé vers une interface moins élévée
• Les paquets qui partent d’une interface à niveau de sécurité bas vers une
interface élevée sont supprimés à moins qu’une exception formelle les y
autorise.
• Chaque interface a également besoin d’être nommée,
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• Une interface ASA sans nom et sans niveau de sécurité n'a pas
de connectivité de couche 3
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
• La commande security-level
“DMZ “
Security Level 50
“outside” “inside”
Security Level 0 Security Level 100
E0/2
E0/1
Internet
E0/3
ciscoasa(config)#interface e0/1
ciscoasa(config-if)#nameif DMZ
INFO: Security level for "DMZ" set to 0 by default.
ciscoasa(config-if)#security-level 50
ciscoasa(config-if)#ip address 192.168.2.1 255.255.255.0
ciscoasa(config-if)#no shutdown
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
• doit être formellement autorisé
• L'accès telnet par l'interface outside (security-level 0) n'est pas permis sauf
s'il provient d'un tunnel IPSEC
• Surveillance des connexions
ciscoasa# who
0: 10.10.0.132
ciscoasa# kill 0
ciscoasa# who
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• Permis sur tous les interfaces
• étape 1: génération des clés
ciscoasa(config)# crypto key generate rsa modulus 1024
WARNING: You have a RSA keypair already defined named
<Default-RSA-Key>.
Do you really want to replace them? [yes/no]: yes
Keypair generation process begin. Please wait...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
• Configuring a specific interface
asa1# show run interface E0/3
interface Ethernet0/3
speed 10
duplex full
nameif outside
security-level 0
ip address 192.168.3.1 255.255.255.0
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
• Paramètres d'interface
asa1# show interface
Interface GigabitEthernet0/0 "outside", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps
Full-Duplex(Full-duplex), 100 Mbps(100 Mbps)
MAC address 0013.c482.2e4c, MTU 1500
IP address 192.168.1.2, subnet mask 255.255.255.0
8 packets input, 1078 bytes, 0 no buffer
Received 8 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 L2 decode drops
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions
0 late collisions, 0 deferred
input queue (curr/max blocks): hardware (8/0) software (0/0)
output queue (curr/max blocks): hardware (0/0) software (0/0)
Traffic Statistics for "outside":
8 packets input, 934 bytes
0 packets output, 0 bytes
8 packets dropped
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
• Avec IOS on utilise
show ip interface brief
ciscoasa(config)# sh int ip br
Interface IP-Address OK? Method Status Protocol
Ethernet0/0 192.168.1.1 YES manual up up
Ethernet0/1 10.10.1.1 YES manual up up
28
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
• Avec l'IOS on utilisait "do" pour passer une commande show
en mode specifique
R1(config)#do show clock
*15:08:07.867 UTC Thu Feb 17 2011
ciscoasa(config-if)# sh clock
15:54:01.139 UTC Thu Feb 17 2011
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ASA
R1 e0/0 e0/0
R2
G0 G1
outside
inside
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Thank you.