Wednesday, May 8, 2019

ASA Firewall configuration with Firepower module


Cisco ASA firewalls:

1. Enable password configuration:

Enable password cisco

Username cisco password cisco

2. SSH configuration:


aaa authentication ssh console LOCAL

crypto key generate rsa modulus 1024

ssh 10.10.10.0 255.255.255.0 management


3. Copying asdm file into ASA firewall:

copy tftp flash

remote host: laptop ip
file name: asdm-647.bin
destination: enter button

!!!!!...!!!!

Once you uploaded the firmware please check below options:

ASA1# dir
ASA1(config)# boot system disk0:/asa952-lfbff-k8.SPA
ASA1(config)# asdm image disk0:/asdm-752.bin

Once done the above steps, check below commands before boot the appliance

ASA1# show bootvar


(config)# asdm image flash:/asdm-647.bin

4. post uploaded ASDM enable http server

(config)# http serve
http server enable
http 10.10.10.0 255.255.255.0 management

Step 1: Configure ASA interfaces and assign appropriate security levels
interface GigabitEthernet1/1
  description to WAN
  nameif outside
  security-level 0
  ip address 10.1.1.1 255.255.255.0
!
interface GigabitEthernet1/2
  description to LAN
  nameif inside
  security-level 100
  ip address 192.168.0.1 255.255.255.0
 

Step 2: Configure ASA as an Internet gateway, enable Internet access (PAT)

nat (inside,outside) after-auto source dynamic any interface
nat (dmz1,outside) after-auto source dynamic any interface

Add default route in appliance:

Route outside 0.0.0.0 0.0.0.0 10.1.1.2

For ICMP Return traffic below are the commands:

It allows icmp return traffic to pass the ASA while the Ping is initiated from inside hosts.

“policy-map global_policy
class inspection_default
inspect icmp”

Step 3: Configure static NAT to web servers, grant Internet inbound access to web servers

object network WWW-EXT ( External IP )
  host 10.1.1.10
!
object network WWW-INT ( Internal IP)
  host 192.168.1.10
!
nat (dmz1,outside) source static WWW-INT WWW-EXT

 

 

ACL for the static NAT (WAN>LAN):

access-list OUTSIDE extended permit tcp any object WWW-INT eq www

access-list OUTSIDE extended permit icmp any4 any4 echo -----à ( Optional)
access-group OUTSIDE in interface outside

Step 4: Configure DHCP service on the ASA

dhcpd address 192.168.0.5-192.168.0.250 inside
dhcpd dns 9.9.9.9 4.2.2.2
dhcpd lease 3600  ---------à ( In seconds )
dhcpd ping_timeout 50
dhcpd enable inside  -----------à ( Enabling DHCP on inside interface )
dhcprelay timeout 60
 

Enable SSH access for admin:

ASA1(config)# hostname ASA1
ASA1(config)# crypto key generate rsa modulus 1024
ssh 12.2.1.0 255.255.255.0 outside
ssh 192.168.0.0 255.255.0.0 inside
ssh timeout 30
ssh version 2
aaa authentication ssh console LOCAL
 
DNS –Server:
asa(config)#dns domain-lookup outside
asa(config)#dns name-server 4.2.2.2
 

Step 7: Configure time and enable logging

ASA1# clock set 12:05:00 Jan 22 2016
ASA1# clock timezone EST -5
ASA1# clock summer-time EST recurring
ASA1# logging enable
ASA1# logging timestamp
ASA1# logging buffer-size 512000
ASA1# logging buffered debugging

Cisco ASA 5506-X FirePOWER Configuration Example Part 2

Step 2: Verifying FirePOWER module status

ASA1# sho module
 
Mod Card Type                                  Model             Serial No.
---- -------------------------------------------- ------------------ -----------
ASA 5506-X with FirePOWER services, 8GE, AC, ASA5506           JAD19280XXX
sfr FirePOWER Services Software Module          ASA5506           JAD19280XXX
Mod MAC Address Range                 Hw Version   Fw Version   Sw Version
---- --------------------------------- ------------ ------------ ---------------
1 5897.bd27.58d6 to 5897.bd27.58df 1.0         1.1.1       9.5(2)
sfr 5897.bd27.58d5 to 5897.bd27.58d5 N/A         N/A         5.4.1-211
Mod SSM Application Name           Status           SSM Application Version
---- ------------------------------ ---------------- --------------------------
sfr ASA FirePOWER                 Up               5.4.1-211
Mod Status             Data Plane Status     Compatibility
---- ------------------ --------------------- -------------
1 Up Sys             Not Applicable
sfr Up                 Up

 

 

Step 3: Physical cabling

Step 4: Initial configuration of FirePOWER module:

On console CLI interface, enter the FirePOWER module using session command:

ASA1# session sfr
Default username / password: admin / Sourcefire
The first time you access the FirePOWER module, you are prompted for basic configuration parameters.
System initialization in progress. Please stand by.
You must change the password for 'admin' to continue.
Enter new password:
Confirm new password:
You must configure the network to continue.
You must configure at least one of IPv4 or IPv6.
Do you want to configure IPv4? (y/n) [y]:
Do you want to configure IPv6? (y/n) [n]:
Configure IPv4 via DHCP or manually? (dhcp/manual) [manual]:
Enter an IPv4 address for the management interface [192.168.45.45]: 192.168.1.2
Enter an IPv4 netmask for the management interface [255.255.255.0]:
Enter the IPv4 default gateway for the management interface []: 192.168.1.1
Enter a fully qualified hostname for this system [Sourcefire3D]:
Enter a comma-separated list of DNS servers or 'none' []:
Enter a comma-separated list of DNS servers or 'none' []:
Enter a comma-separated list of DNS servers or 'none' []: 4.2.2.2
Enter a comma-separated list of search domains or 'none' [example.net]:
If your networking information has changed, you will need to reconnect.
For HTTP Proxy configuration, run 'configure network http-proxy'
Applying 'Default Allow All Traffic' access control policy.

 

 

Configure and Manage AS A FirePOWER Module using ASDM Part 3

Configure and Manage ASA FirePOWER Module using ASDM:

Step 1: Enable HTTP service on the ASA:
By default, HTTP service is not enabled on the ASA. You need first enable HTTP service and specify the network and interface where access is allowed.
http server enable
http 192.168.0.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 management

Step 2: Open a web browser and go to the management IP of the ASA



No comments:

Post a Comment

Ruckus R510 Resetting steps and configuration

Ruckus R510 Setup: Our Requirement is to Enable Gateway mode in the Ruckus Access point. 1. After reset the box, you will get green...