What is ASA - Basics of ASA

 What is ASA?

  • Adaptive Security Appliance and it is Cisco device.
  • It is Firewall that has the capability to PIX functionalities (Filtering) and to do VPN capabilities (VPN Concentrator).
  • ASA is L3 router by default.
  • It is capable of doing all routing functions (RIP, EIGRP, BGP, OSPF).
  • The difference between Router and Firewall is that the Router will allow all the traffic by default, but the Firewall will allow the traffic with certain policies.

ASA interface Parameters

  • Router requires only the IP Address to be configured, but the ASA requires additional two parameters to be configured (Security Level and Name of the Interface).
  • Name of the Interface. It can be any name of your convenience. Inside name is referred as the keyword. (configuring the Interface name as Inside has special function which I say in Security level).
  • Security Level → 
    • This says the level of trust-ness to the interface. 
    • Value ranges from 0 to 100. (100 is referred as High Security and is the most trusted interface)
    • By default all the interface will configured with the Security value of 0. Once exception is configuring the Interface name with the keyword as Inside→ it will set the security level as 100.
    • It controls the traffic through the firewall

Default Traffic Flow

  • Traffic flow through the firewall has been mainly based on three Scenarios
    • Higher Security level to Lower Security Level
    • Lower Security level to Higher Security Level
    • Traffic between the same security level

Higher Security level to Lower Security Level

  • By default, all the traffic will be allowed as long as the route is available.
  • Although all the traffic is allowed, ASA will inspect only the TCP and UDP packets.
  • Inspection will create a entry in the connection table of Firewall. This allows the return traffic to pass the firewall. This is called as “Stateful Inspection”.

Lower Security level to Higher Security Level

  • By default all the traffic is blocked.
  • You need to create an Explicit ACL entry in the Firewall to allow the traffic from lower to high security level.
  • When the traffic hits from the Lower to higher security level hits the Firewall, it will do the process as below:
    • firewall will first check the entry in the connection table.
    • If not, then it will check if any ACL is available to forward the traffic.
    • If not, then it will proceed with the default behavior.

Traffic between the same security level

  • By default, traffic between the same security levels will be blocked.
  • Even if we create an ACL to allow the traffic, it will not work.
  • The only way is use the disabling the firewall between the interfaces with the same security level. This can be done with the help of command “Same-security-traffic permit inter interface”.
  • The above command allows the traffic between the interfaces in the same security level.

To Traffic and Through Traffic

  • To Traffic
    • Traffic with the destination as Firewall is said to be To Traffic.
  • Through traffic
    • Traffic that Passes through the Firewall is said to be as Through Traffic.

To Traffic

  • Only ICMP traffic is allowed by default.
  • You need to enable the service for allowing other traffic (Eg: Telnet, ssh).
  • Blocking/Allowing ACL will not impact To traffic.
  • It needs to be configured per interface basis.

Through Traffic

  • Only TCP/UDP will maintain the connection table, due to which only TCP/UDP packets return traffic will be allowed from Low to High.
  • You need to create a ACL to permit all other traffic.
  • Configuration needs to be done per interface basis.
For more info, please look at the video tutorial. Video is explained in Tamil Language:

ASA - To and Through Traffic Explained:

1 Comments

  1. Thanks for this post.. cristal clear explanation on basics..

    ReplyDelete

Post a Comment