In the following example I configured a basic L2L VPN between 2 PIX firewall with pre-shared key. The Firewalls has different software versions, the sp2 is an old 6.3.4 version firewall (no more support..). sp1 (Cisco PIX Security Appliance Software Version 7.1(2), PIX-515E) E0 – ssw fa0/20 E1 – ssw fa0/12 sp2 (Cisco PIX Firewall […]
November 19, 2010
Follow the following order of the documents: 1. Enabling Multiple Context Mode 2. Adding and Managing Security Contexts 3. Configuring Failover 4. Configuring Active/Active Failover My Example contexts (Code 7.0.5) Topology Initial context configuration: 1, pixfirewall(config)# mode multiple 2, Create admin context (This is done while issuing “mode multiple” command by default): admin-context admin context […]
November 18, 2010
Cisco ASA wccp support for WAAS configuration guide. proxy server should accept requests on port 8080 and 80 Topology: IP addresses: ASA inside IP: 10.10.10.1/24 PC IP: 10.10.10.10 PROXY SRV IP: 10.10.10.251 Action Plan: WCCP Interaction with Other Features for PIX/ASA: http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/dhcp.html#wp1094445 Here I have read the following: “The standard service is web-cache, which intercepts […]
November 18, 2010
1. Assign interface to a sensor in AIP-SSM On the AIP-SSM you can configure interfaces for virtual sensors: SA1-AIP-SSM(config-ana-vir)# physical-interface ? GigabitEthernet0/0 GigabitEthernet0/0 physical interface. GigabitEthernet0/1 GigabitEthernet0/1 physical interface. This is only 2 no matter how many interface the ASA has. – GigabitEthernet0/0 can only be Command and Control Interface / Management /. – Alternate […]
November 18, 2010
Both the ASA and the AIP-SSM is able to failover or at a minimum to bypass the traffic. ASA fail-open and fail-close commands is for determening to allow or deny the traffic that has to be analysed with IPS. 1. with the following configuration ==ASA== policy-map outside-policy class outside-class ips inline fail-open ==IPS== ByPass mode […]
November 17, 2010
On the Cisco ASA Firewall you can redirect the traffic on the incoming interface back to the incoming interface if you want. This feature is from Version 7.2.2 reachable. To demonstrate this feature I made a small test topology with a Cisco ASA Firewall and an internal router. Topology: Requirements: On the Topology the Test […]
November 17, 2010
With this feature you can specify the resource usage between the contexts. This feat is available from OS version 7.2.1. Cisco ASA 5500 Series Release Notes, Version 7.2(1): http://www.cisco.com/en/US/docs/security/asa/asa72/release/notes/asarn72.html Configuration guide: http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mngcntxt.html The following table show the resource types and the limits for resource management: http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/mngcntxt.html#wp1113989 You can reach this list from cli as well: […]
November 17, 2010
I made to example to demonstrate the configuration of blocking chat and peer-to-peer applications. I would not say this is the most secure way, but better as nothing. Task 1. From 10.0.0.x network to 192.168.0.x network we need to BLOCK MSN and YAHOO. (The configuration of blocking chat applications is only from code 7.2.2 possible.) […]
November 17, 2010
I made a presentation about FWSM after reading all official Cisco book about FWSM. That was not today, but maybe in at the end of 2010 is usable as well. cat65c76_fwsm_training.pdf
November 17, 2010
To get SDM work, my action plan will be the following: Check requirements. Download latest SDM. Delete old / unnecessary SDM files from flash. Upload new ones via TFTP. Configure router for SDM. 1) Requirements Cisco Routers and Cisco IOS Versions Supported & Memory Requirements & PC System Requirements & Web Browser Versions and Java […]
November 19, 2010
0