Скачать презентацию Course Flow Introduction What Is a Скачать презентацию Course Flow Introduction What Is a

613db57e16fa2ca8e85b77c0a19b3f8e.ppt

  • Количество слайдов: 156

Course Flow Course Flow

Introduction Introduction

What Is a Firewall? What Is a Firewall?

Firewall Technologies Firewall Technologies

Packet Filtering Packet Filtering

Proxy Server Proxy Server

Stateful Packet Filtering State Table Stateful Packet Filtering State Table

Proprietary Operating System Proprietary Operating System

Stateful Packet Inspection Stateful Packet Inspection

Application-Aware Inspection Application-Aware Inspection

Modular Policy Internet Modular Policy Internet

Virtual Private Network Virtual Private Network

Security Context (Virtual Firewall) Security Context (Virtual Firewall)

Failover Capabilities: Active/Standby, Active/Active, and Stateful Failover Contexts 1 Primary: Failed Firewall Secondary: Active Failover Capabilities: Active/Standby, Active/Active, and Stateful Failover Contexts 1 Primary: Failed Firewall Secondary: Active Firewall Internet 2 1 Primary: Failed/Standby 2 Secondary: Active/Active Internet

Transparent Firewall 192. 168. 1. 5 192. 168. 1. 2 Transparent Firewall 192. 168. 1. 5 192. 168. 1. 2

Web-Based Management Solutions Web-Based Management Solutions

ASA 5500 Series ASA 5550 ASA 5540 ASA 5520 ASA 5510 ASA 5505 ASA 5500 Series ASA 5550 ASA 5540 ASA 5520 ASA 5510 ASA 5505

PIX 500 Series PIX 535 PIX 525 PIX 515 E PIX 506 E PIX PIX 500 Series PIX 535 PIX 525 PIX 515 E PIX 506 E PIX 501

Cisco ASA 5510 Adaptive Security Appliance Cisco ASA 5510 Adaptive Security Appliance

Cisco ASA 5520 Adaptive Security Appliance Cisco ASA 5520 Adaptive Security Appliance

Cisco ASA 5540 Adaptive Security Appliance Cisco ASA 5540 Adaptive Security Appliance

ASA 5510, 5520, and 5540 Adaptive Security Appliances Front Panel ASA 5510, 5520, and 5540 Adaptive Security Appliances Front Panel

ASA 5510, 5520, and 5540 Adaptive Security Appliances Back Panel ASA 5510, 5520, and 5540 Adaptive Security Appliances Back Panel

ASA 5510, 5520, and 5540 Adaptive Security Appliances Connectors ASA 5510, 5520, and 5540 Adaptive Security Appliances Connectors

Cisco ASA Security Services Module Cisco ASA Security Services Module

Four-Port Gigabit Ethernet SSM Four-Port Gigabit Ethernet SSM

Summary Summary

Security Appliance Access Modes Security Appliance Access Modes

Access Privileged Mode Access Privileged Mode

Access Configuration Mode: configure terminal Command Access Configuration Mode: configure terminal Command

help Command help Command

Viewing and Saving Your Configuration Viewing and Saving Your Configuration

Clearing Running Configuration Clearing Running Configuration

Clearing Startup Configuration Clearing Startup Configuration

Reload the Configuration: reload Command Reload the Configuration: reload Command

File System File System

Displaying Stored Files: System and Configuration ciscoasa# Display the directory contents Displaying Stored Files: System and Configuration ciscoasa# Display the directory contents

Security Level Example g 0/2 g 0/0 g 0/1 Security Level Example g 0/2 g 0/0 g 0/1

show Commands show Commands

show memory Command show memory Command

show cpu usage Command show cpu usage Command

show version Command show version Command

show ip address Command show ip address Command

show interface Command show interface Command

show nameif Command show nameif Command

show run nat Command show run nat Command

show run global Command show run global Command

show xlate Command Outside mapped pool Inside local show xlate Command Outside mapped pool Inside local

show route Command 172. 16. 1. 0 192. 168. 1. 0. 1 10. 0. show route Command 172. 16. 1. 0 192. 168. 1. 0. 1 10. 0. 1. 0

ping Command Determines whether other devices are visible from the security appliance ping Command Determines whether other devices are visible from the security appliance

traceroute Command Determines the route packets will take to their destination traceroute Command Determines the route packets will take to their destination

Basic CLI Commands for Security Appliances Basic CLI Commands for Security Appliances

Assigning a Hostname to Security Appliance: Changing the CLI Prompt New York ( asa Assigning a Hostname to Security Appliance: Changing the CLI Prompt New York ( asa 1) Boston (asa 2) Dallas (asa 3) Server

interface Command Subcommands g 0/2 g 0/0 g 0/1 interface Command Subcommands g 0/2 g 0/0 g 0/1

Assign an Interface Name: nameif Subcommand Assign an Interface Name: nameif Subcommand

Assign Interface IP Address: ip address Subcommand Assign Interface IP Address: ip address Subcommand

DHCP-Assigned Address DHCP-Assigned Address

Assign a Security Level: securitylevel Subcommands Assign a Security Level: securitylevel Subcommands

Interfaces with Same Security Level: same-security-traffic Command g 0/2 g 0/0 ciscoasa(config)# g 0/1 Interfaces with Same Security Level: same-security-traffic Command g 0/2 g 0/0 ciscoasa(config)# g 0/1

Assign an Interface Speed and Duplex: speed and duplex Sub. Commands Gigabit. Ethernet 0/0 Assign an Interface Speed and Duplex: speed and duplex Sub. Commands Gigabit. Ethernet 0/0 Speed =1000 Duplex = full ciscoasa(config-if)# Enable the interface speed and duplex

ASA Management Interface ASA Management Interface

Enabling and Disabling Interfaces: shutdown Subcommand Enabling and Disabling Interfaces: shutdown Subcommand

Network Address Translation Outside Mapped Pool Inside Local 192. 168. 0. 20 10. 0. Network Address Translation Outside Mapped Pool Inside Local 192. 168. 0. 20 10. 0. 0. 11

Enable NAT Control Outside Mapped Pool Inside Local 192. 168. 0. 20 10. 0. Enable NAT Control Outside Mapped Pool Inside Local 192. 168. 0. 20 10. 0. 0. 11

nat Command nat Command

global Command global Command

Configure a Static Route: route Command Configure a Static Route: route Command

Host Name-to-IP-Address Mapping: name Command Host Name-to-IP-Address Mapping: name Command

Configuration Example Configuration Example

Configuration Example (Cont. ) Configuration Example (Cont. )

Configuration Example (Cont. ) Default Route Static Route Configuration Example (Cont. ) Default Route Static Route

Summary Summary

Configuring Telnet Access to the Security Appliance Console Configuring Telnet Access to the Security Appliance Console

Viewing and Disabling Telnet ciscoasa# Displays IP addresses permitted to access the security appliance Viewing and Disabling Telnet ciscoasa# Displays IP addresses permitted to access the security appliance via Telnet ciscoasa(config)# ciscoasa# Enables you to view which IP addresses are currently accessing the security appliance console via Telnet ciscoasa#

SSH Connections to the Security Appliance SSH Connections to the Security Appliance

Configuring SSH Access to the Security Appliance Console ciscoasa(config)# Removes any previously generated RSA Configuring SSH Access to the Security Appliance Console ciscoasa(config)# Removes any previously generated RSA keys ciscoasa(config)# Saves the CA state ciscoasa(config)# Configures the domain name Generates an RSA key pair ciscoasa(config)# Specifies the host or network authorized to initiate an SSH connection ciscoasa(config)# Specifies how long a session can be idle before being disconnected

Connecting to the Security Appliance with an SSH Client Connecting to the Security Appliance with an SSH Client

Viewing Directory Contents Viewing Directory Contents

Copying Files Copying Files

Downloading and Backing Up Configuration Files Example Downloading and Backing Up Configuration Files Example

Viewing Version Information ciscoasa# Displays the software version, hardware configuration, license key, and related Viewing Version Information ciscoasa# Displays the software version, hardware configuration, license key, and related uptime data

Image Upgrade Image Upgrade

Summary Summary

Security Appliance ACL Configuration Security Appliance ACL Configuration

Inbound Traffic to DMZ Web Server Inbound Traffic to DMZ Web Server

Create a Static Translation for Web Server Create a Static Translation for Web Server

access-list Command access-list Command

access-group Command access-group Command

show access-list Command show access-list Command

clear access-list counters Command clear access-list counters Command

ACL Logging ciscoasa(config)# Enables the logging option for inbound ICMP to 192. 168. 1. ACL Logging ciscoasa(config)# Enables the logging option for inbound ICMP to 192. 168. 1. 11

ACL Comments ACL Comments

Inbound HTTP Access Solution Inbound HTTP Access Solution

icmp Command icmp Command

Summary Summary

What Is ASDM? What Is ASDM?

ASDM Features ASDM Features

ASDM Security Appliance Requirements ASDM Security Appliance Requirements

ASDM Browser Requirements ASDM Browser Requirements

Supported Platforms Supported Platforms

Running ASDM Running ASDM

Configure the Security Appliance to Use ASDM Configure the Security Appliance to Use ASDM

Setup Dialog Setup Dialog

ASDM Home Window Device Information General License System Resources Interface Status Traffic Status ASDM Home Window Device Information General License System Resources Interface Status Traffic Status

ASDM Home Window (Cont. ) ASDM Home Window (Cont. )

Startup Wizard Startup Wizard

VPN Wizard VPN Wizard

High Availability and Scalability Wizard High Availability and Scalability Wizard

Configuration Window Configuration Window

Interfaces Interfaces

Security Policy Security Policy

NAT NAT

VPN VPN

Routing Routing

Global Objects Global Objects

Monitoring Button Monitoring Button

Interface Graphs Panel Interface Graphs Panel

Packet Tracer Interface Source IP Source port Destination IP Destination port Flow lookup Route Packet Tracer Interface Source IP Source port Destination IP Destination port Flow lookup Route lookup Access list

Options > Preferences Options Options > Preferences Options

Tools Tools

Help Help

Online Help Online Help

Summary Summary

Overview <#> Overview <#>

FWSM Key Features <#> FWSM Key Features <#>

FWSM and PIX Firewall Feature Comparison <#> FWSM and PIX Firewall Feature Comparison <#>

Network Model <#> Network Model <#>

MSFC placement <#> MSFC placement <#>

Getting Started with the FWSM <#> Getting Started with the FWSM <#>

Verify FWSM Installation <#> Verify FWSM Installation <#>

Configure the Switch VLANs <#> Configure the Switch VLANs <#>

Firewall VLAN-Group Firewall VLAN-Group

Configure the FWSM Interfaces <#> Configure the FWSM Interfaces <#>

Configure a Default Route Configure a Default Route

Configure the FWSM Access-List Configure the FWSM Access-List

Resetting and Rebooting the FWSM Resetting and Rebooting the FWSM

Summary Summary