Post

Cisco Adaptive Secure Appliance (ASA)

Cisco ASA (Adaptive Security Appliance) is a security device developed by Cisco Systems that provides firewall, VPN (Virtual Private Network), and other network security features.



Network Topology

Here’s this deployment’s network topology

x



Preparing the Installer

Download the installer from Cisco Download Central

x


Deploy the OVA as usual, and boot the VM

x



Initial Configuration

Connect through console, and start configuring the management interface

1
2
3
4
interface Management0/0
 nameif management
 security-level 100
 ip address 198.18.0.251 255.255.255.0 


Create a local user

1
username helena password cisco privilege 15


Enable local user access to SSH and HTTP

1
2
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL


Next enable all segments to access SSH and HTTP through management interface

1
2
ssh 0.0.0.0 0.0.0.0 management
http 0.0.0.0 0.0.0.0 management


Lastly enable HTTP service

1
http server enable



Configuring Cisco ASDM

Cisco ASDM (Adaptive Security Device Manager) is a GUI tool used for configuring and managing Cisco ASA firewalls

Now open the management IP using web browser, select Install ASDM Launcher

x


Next just run the installer

x


After that just login to the management interface using the local user

x


And we’re in ASDM

x


Plus its also available on MacOS

x



Configuring Interfaces

First, lets configure the outside interface

1
2
3
4
interface GigabitEthernet0/1
 nameif outside
 security-level 0
 ip address 198.100.0.2 255.255.255.0 


Next the inside

1
2
3
4
interface GigabitEthernet0/2
 nameif inside
 security-level 100
 ip address 63.0.0.1 255.255.255.0 


Add a static route on the outside to the internet

1
route outside 0.0.0.0 0.0.0.0 198.100.0.1 1


That should do, this configuration can also be viewed on ASDM

x

x


And pinging the interfaces from inside and outside network shows these are up and running

x


Configuring Access List Policy

Create access list to enable traffic from inside to outside and vice versa

1
2
access-list inside_access_out extended permit ip any any
access-list outside_access_in extended permit ip any any


Apply the access list to the respective interface

1
2
access-group inside_access_out in interface inside
access-group outside_access_in in interface outside


Here’s how the config shown in ASDM

x



Configuring Static NAT

Next configure the static NAT

1
2
3
object network INSIDE_HOST
 host 63.0.0.141
 nat (inside,outside) static 198.100.0.3


Here’s the static route configuration on ASDM

x



Testing Static Route

Inside to Outside

Connecting from inside host to the internet shows a success

x


Outside to Inside

The web server on inisde host can be accessed using the NAT IP Address

x


ASDM also has a neat packet tracer feature to test traffic

Inside to Outside

x


Outside to Inside

x



Configuring Dynamic NAT Overload

Because we already have the policy configured, we can proceed with configuring the PAT configuration

1
2
3
object network INSIDE_NETWORK
 subnet 63.0.0.0 255.255.255.0
 nat (inside,outside) dynamic interface


This is the configuration shown on ASDM

x


Now trying to connect to internet from any IP on the inside segment should be successful

x


This post is licensed under CC BY 4.0 by the author.