Follow on Google News News By Tag * Frank Kern * Frank Kern List Control * List Control * List Control Reviews * List Control Bonus * List Control Promo * More Tags... Industry News News By Place Country(s) Industry News
Follow on Google News | How to Configure Access Control Lists on a Cisco ASA 5500 FirewallHe has designed and implemented several projects involving Cisco ASA firewalls and other Cisco products and technologies.
By: Adrian Collen However, the core ASA functionality is to work as a high performance firewall. All the other security features are just complimentary services on top of the firewall functionality. Having said that, the purpose of a network firewall is to protect computer and IT resources from malicious sources by blocking and controlling traffic flow. The Cisco ASA firewall achieves this traffic control using Access Control Lists (ACL). An ACL is a list of rules with permit or deny statements. Basically an Access Control List enforces the security policy on the network. The ACL (list of policy rules) is then applied to a firewall interface, either on the inbound or on the outbound traffic direction. If the ACL is applied on the inbound traffic direction (in), then the ACL is applied to traffic entering a firewall interface. The opposite happens for ACL applied to the outbound (out) direction. The ACL permit or deny statements basically consist of source and destination IP addresses and ports. A permit ACL statement allows the specified source IP address/network to access the specified destination IP address/network. The opposite happens for deny ACL statements. At the end of the ACL, the firewall inserts by default an implicit DENY ALL statement rule which is not visible in the configuration. Enough theory so far. Let us see some examples below to clarify what we have said above. The basic command format of the Access Control List is the following: ciscoasa(config)# To apply the ACL on a specific interface use the access-group command as below: ciscoasa(config)# Example1: Allow only http traffic from inside network 10.0.0.0/24 to outside internet ciscoasa(config)# ciscoasa(config)# The name "HTTP-ONLY" is the Access Control List itself, which in our example contains only one permit rule statement. Remember that there is an implicit DENY ALL rule at the end of the ACL which is not shown by default. Example2: Deny telnet traffic from host 10.1.1.1 to host 10.2.2.2 and allow everything else. ciscoasa(config)# ciscoasa(config)# ciscoasa(config)# The above example ACL (DENY-TELNET) Example3: The example below will deny ALL TCP traffic from our internal network 192.168.1.0/ ciscoasa(config)# ciscoasa(config)# ciscoasa(config)# ciscoasa(config)# Visit us online at : http://listcontrol.reviewdomination.com/ End
|
|