How to configure Basic Security on Cisco ASA

NC

In this article I explain how to configure basic security on Cisco Asa. Your network is divided into 3 roles which are outside, inside and DMZ. 

How to configure Basic Security on Cisco ASA

We have an example with a network with a web server. In this recipe you will protect a web server by connecting it to your Cisco ASA DMZ Network.

In addition to protecting the web server the DMZ also protects the rest of the network. The basic ASA configuration setup is three interfaces connected to three Network segments.

The ISP Network segment is connected to the GigabitEthernet 0/2 interface and labeled outside with ehe security level of 0. The internal network has been connected to GigabitEthernet 0/1 and labelled as inside with a security level of 100.

The DMZ segment, where the web server resides, is connected to GigaEthernet0/0 and labelled as DMZ with a security level of 50.

vpdn group INTERNET request dialout pppoe
vpdn group INTERNET localname routerbest
vpdn group INTERNET ppp authentication pap
vpdn username routerbest password 123 store-local
interface GigabitEthernet0/2
nameif outside
security-level 0
pppoe client vpdn group INTERNET
ip address pppoe setroute
no shutdown
write

How to configure Basic Security on Cisco ASA

The ASA's outside interface is configured with an IP address obtained from the ISP. Here you can see that the ASA's inside interface is set with the IP address of 192.168.1.1, and it is the default gateway for the internal hosts.

The DMZ interface is configured with the IP address of 10.10.10.1, and it is the default gateway for hosts on the DMZ network segment.

Now, you need to the configuration so that users on the Internet can access our web server on TCP port 80 and port 443. Use Object NAT for this task, and the ASA will translate TCP port 80 on the web server to look like TCP port 80 on the outside.

show ip address outside pppoe
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
no shutdown
exit
interface GigabitEthernet0/0
nameif dmz
security-level 50
ip address 10.10.10.1 255.255.255.0
no shutdown
object network web_80
host 10.10.10.10
nat (dmz,outside) static interface service tcp 80 80
exit
write

How to configure Basic Security on Cisco ASA

Next, the ASA will translate TCP port 443 on the web server to look like TCP port 443 on the outside.

Remember, on an ASA, traffic that goes from a lower security interface is denied when it goes to a higher security interface. For that reason , hosts on the outside  with security level 0 cannot connect to hosts on the DMZ with security level 50.

object network web_443
host 10.10.10.10
nat (dmz,outside) static interface service tcp 443 443
write

How to configure Basic Security on Cisco ASA

Because traffic from the outside to the DMZ network is denied by the ASA with its current configuration, users on the Internet cannot reach the web server despite the NAT configuration.

You need to explicitly permit this traffic. This means the configuration needs to permit traffic destined to 10.10.10.10 on port 80 and port 443.

access-list OutsideToDMZ extended permit tcp any host 10.10.10.10 eq 80
access-list OutsideToDMZ extended permit tcp any host 10.10.10.10 eq 443
access-group OutsideToDMZ in interface outside

How to configure Basic Security on Cisco ASA

Next, Configure NAT to Allow Hosts from inside segment to Go Out to the Internet.

You created that rule that allows hosts on inside segment to connect to the internet. Because these hosts use private IP addresses, you need to translate them to ASA's outside interface IP address that is routable on the Internet.

show ip address outside pppoe
object network INSIDE
subnet 192.168.1.0 255.255.255.0
nat (inside,outside) dynamic interface
write

Next, you configure the DHCP server for the inside segment. In this session I will cover how to enable icmp inspection to allow ping traffic passing Asa.

dhcpd address 192.168.1.2-192.168.1.254 inside
dhcpd dns 8.8.8.8 8.8.4.4
dhcpd enable inside
write
policy-map global_policy
class inspection_default
inspect icmp error
write

You can now browse the internet using any computer that connects to the inside interface.

How to configure Basic Security on Cisco ASA

Facebook: https://www.facebook.com/routerbest

Twitter: https://twitter.com/routerbestcom

Tags: Cisco Asa