SASAC10LG
SASAC10LG
SASAC10LG
Implementing Core
Cisco ASA Security
Version 1.0
Lab Guide
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Europe Headquarters
Cisco Systems International BV
Amsterdam,
The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the
Cisco Website at http://www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks.
Third party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO
WARRANTIES IN CONNECTION WITH THE CONTENT PROVIDED HEREUNDER, EXPRESS, IMPLIED, STATUTORY OR IN
ANY OTHER PROVISION OF THIS CONTENT OR COMMUNICATION BETWEEN CISCO AND YOU. CISCO SPECIFICALLY
DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND
FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. This
learning product may contain early release content, and while Cisco believes it to be accurate, it falls subject to the disclaimer
above.
Table of Contents
Lab 1-1: Accessing the Remote Lab Environment
L-5
Visual Objective
Required Resources
L-6
L-6
Command List
Job Aids
Task 1: Access the Learning@Cisco-Hosted ASA Remote Lab
L-6
L-6
L-8
L-15
L-16
L-16
L-16
L-17
L-17
L-20
L-22
L-24
L-26
L-29
L-30
L-30
L-30
L-31
L-31
L-35
L-41
L-42
L-42
L-42
L-43
L-43
L-44
L-46
L-50
L-53
L-55
L-57
L-58
L-58
L-58
L-59
L-59
Task 2: Enable TTL Decrement and Disable TCP Initial Sequence Randomization
Task 3: Tune TCP Timeouts, Enable TCP DCD, and Configure TCP Normalization
Task 4: Configure a Priority Queue and Traffic Policing
L-62
L-66
L-69
L-73
Visual Objective
L-74
Required Resources
Command List
Job Aids
Task 1: Configure HTTP Inspection to Protect the DMZ Server
Task 2: Configure FTP Inspection to Protect the DMZ Server
Task 3: Return the Cisco ASA Security Appliance to the Default Inspection Policies
L-74
L-74
L-75
L-75
L-83
L-88
Lab 6-1: Implementing Basic Clientless SSL VPN on the Cisco ASA
L-89
Visual Objective
Required Resources
Command List
Job Aids
Task 1: Configure the Cisco ASA to Use DNS
Task 2: Enable Clientless SSL VPN Connections
Task 3: Provision an Identity Certificate for the Cisco ASA
Task 4: Configure Local User Authentication
Task 5: Configure Bookmarks and Access Control
L-90
L-90
L-90
L-90
L-91
L-91
L-95
L-104
L-110
Lab 6-2: Configuring Application Access for Clientless SSL VPN on the
Cisco ASA
Visual Objective
Required Resources
Job Aids
Task 1: Configure Application Access Using Plug-ins
Task 2: Configure Application Access Using Smart Tunnels
L-118
L-118
L-118
L-119
L-125
L-131
Visual Objective
Required Resources
L-132
L-132
Job Aids
Task 1: Configure External Authentication Using Microsoft Active Directory
Task 2: Configure External Authorization Using Microsoft Active Directory
L-132
L-133
L-137
Lab 7-1: Implementing Basic Cisco AnyConnect SSL VPN on the Cisco
ASA
Visual Objective
Required Resources
Command List
Job Aids
Task 1: Enable Cisco AnyConnect SSL VPN Connections
ii
L-117
L-143
L-144
L-144
L-144
L-144
L-145
L-147
L-150
L-152
L-155
L-161
Visual Objective
Required Resources
Job Aids
Task 1: Review LDAP and Active Directory Server Settings on the Cisco ASA
Task 2: Deploy Local Authorization for Local VPN Users
Task 3: Deploy External Authorization Using Microsoft Active Directory
Task 4: Deploy a Standalone Cisco AnyConnect Client on the Outside PC
L-162
L-162
L-162
L-163
L-168
L-172
L-176
L-183
Visual Objective
Required Resources
Job Aids
Task 1: Deploy Cisco AnyConnect IPsec/IKEv2 VPN with WebLaunch
L-184
L-184
L-184
L-185
L-197
Visual Objective
Required Resources
Command List
Job Aids
Task 1: Prepare the Secondary Appliance for Failover Configuration via the CLI and
Cisco ASDM
Task 2: Configure Active/Standby Failover
Task 3: Configure Standby IP Addresses on the Active Appliance and Test Failover
Task 4: Tune Active/Standby Failover
Task 5: Enable Stateful Active/Standby Failover
L-198
L-198
L-199
L-199
L-200
L-201
L-205
L-209
L-212
L-217
L-217
L-217
L-219
L-227
L-236
L-243
L-250
L-251
L-251
L-251
L-252
L-253
Lab Guide
iii
iv
L-253
Activity Objective
After completing this activity, you will be able to:
Describe how to access the Learning@Cisco-hosted ASA remote lab environment for your assigned pod
Visual Objective
The figure illustrates what you will accomplish in this activity.
Px-ASA
ASA 5500-X
.3
3
Inside
Gi0/1
.1
IPS or CX
.5
Outside
209.165.201.0/27 VLAN 1xx
Fa0/0.1x
.1
Px-Rtr
2610XM
.129
192.168.1.0/24
VLAN 2xx
Gi0/2
.1 DMZ
.2
Gi0/0
DMZ-SRV (Linux)
.2
172.16.1.0/24
VLAN 3xx
Outside-PC (Win 7)
209.165.202.128/27
VLAN 8xx
Fa0/0.8x
Fa0/0.9x
209.165.200.226/27
.2
.131
.130
VLAN 9xx
209.165.200.225/27
Outside-SRV (Linux)
Gi0/0.9x
Term
Server
Shared
ISR
Cisco Lab
VPN Gateway
.89 Gi0/1
172.16.150.0/24.254 gateway
Internet
Required Resources
The following resource is required to complete this activity:
Remote access to the Cisco ASA product training lab
Command List
No commands are used in this activity.
Job Aids
These job aids are provided to help you complete the lab activity.
The following information will help you complete this task:
Each pod contains a 5512-X ASA, all the VMs for the servers and PCs, and an outside router.
For the nonfailover lab, all pods work independently of each other.
For the failover lab, two pods will work together to form a two-unit failover pair.
The failover labs will provide you with the needed additional detail to perform those labs.
The following login information is for the lab devices:
Inside Windows 7 PC local user PC: login: inside-pc\student; password: Ci5coAdmin
Lab domain name: secure-x.local (x is not your pod number)
Inside Windows 7 PC secure-x.local domain users (it1, sales1, marketing1, engineer1,
contractor1, employee1, student) password: cisco
L-6
Inside (AD) Microsoft 2008 server login: login: Administrator; password: Cisco123
DMZ Linux server: login: root; password: Ci5coAdmin
Outside Linux server: login: root; password: Ci5coAdmin
Outside Windows PC: login: student; password: Ci5coAdmin
Cisco ASA enable password: C!sco!23.
Cisco ASDM: username: student; password: C!sco!23
Pod outside router enable password: cisco.
Your assigned pod number (to be provided): _____
Your VPN login (to be provided): _______________________________
Your Cisco Learning Labs web portal login (to be provided):
_______________________________
RDP login to the Student PC (to be provided): _______________________________
Other passwords if needed:
____________________________________________________________
Lab Guide
L-7
L-8
Step 2
Launch Cisco AnyConnect from your PC. Begin a VPN connection to cll.cisco.com. The VPN username
and password will be provided.
Once you have VPN access, log in to the Cisco Learning Labs web portal at http://172.16.50.3/users/
pblogin.
The web portal login username and password will be provided.
In the web portal, click Start Lab, and then click Begin Lab.
Lab Guide
L-9
Step 3
On the web page (shown in the figure), click the StudentPC icon to launch an RDP session into the
Windows VM for your pod.
The RDP login username and password will be provided.
Step 4
Once the RDP has launched, click the respective icon on the desktop to do the following:
Launch the VM remote console to access the Inside-PC, Inside-SRV, Outside-PC, Outside-SRV, and
DMZ-SRV VM consoles
Launch a Telnet connection through the term server to access the ASA and pod router consoles
The desktop icons should look similar to the icons that are shown in the figure:
To move between the different windows (Inside-PC, Inside-SRV, DMZ-SRV, Outside-SRV, and OutsidePC VM), click the left and right arrow keys from the bar at the top of the RDP session screen (see the
following figure). (These arrows are available only if the VM console window is maximized.) If your RDP
session window is in full-screen mode and you move your cursor to the top of the RDP session screen, the
RDP bar will overlap the bar for moving between the different guest VMs that you opened. In this case,
slide the RDP bar to the left or to the right so that it does not overlap.
Lab Guide
L-11
Step 5
Navigate back to the desktop, or minimize all open VM console windows.
Step 6
Double-click the ASA console icon to open a CLI session with the Cisco ASA. Use the show run command
to view the configuration on your ASA.
The ASA enable password should be C!sco!23.
The ASA configuration should be similar to the following:
!
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 209.165.201.2 255.255.255.224
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet0/2
nameif dmz
security-level 50
ip address 172.16.1.1 255.255.255.0
!
route outside 0.0.0.0 0.0.0.0 209.165.201.1
Step 7
In the back of the Lab Guide, you will find the Answer Key. During some of the lab steps in this course,
you may be asked certain questions, and you can find those answers in the Answer Key. You can also find
corresponding examples of some of the lab task steps should you require additional assistance with any lab
procedures.
Activity Verification
You have completed this task when you attain this result:
You accessed all the devices in your assigned ASA remote lab pod.
Lab Guide
L-13
Visual Objective
The figure illustrates the lab topology.
Required Resources
The following resources and equipment are required to complete this activity:
Inside PC
Cisco ASA 5512 Adaptive Security Appliance
DMZ server
Outside server
Cisco ISR router
Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
configure terminal
domain name
enable
Command
Description
exit
interface interface
nameif
reload
show flash
show running-config
show version
write erase
write memory
Job Aids
These job aids are available to help you complete the lab activity.
The instructor will provide you with your pod number and other pod access information. Please write it
down in the table.
Pod number
Cisco ASA hostname
192.168.1.1/24
209.165.201.2/27
172.16.1.1/24
Inside PC username/password
student/Ci5coAdmin
Lab Guide
L-17
Step 2
Erase the default configuration from the security appliance.
Step 3
Reload the security appliance.
Step 4
After the security appliance reboots, it will prompt you to configure it by using the interactive setup dialog.
Answer No to the prompt and interrupt the setup dialog. The user EXEC mode prompt appears.
Step 5
Enter the privileged EXEC mode. There is no password set at this time.
Step 6
Verify that the running image and Cisco ASDM image are correct. For this lab, you should have a Cisco
ASA device image of 9.1(x) and a Cisco ASDM image of 7.1(x).
ASA Image ______________
Activity Verification
You have completed this task when you attain this result:
Step 1
The Cisco ASA security appliance was reloaded with a blank configuration and you verified the security
appliance images.
Lab Guide
L-19
Step 3
Configure the device settings with the following parameters:
Hostname: Px-ASA (x = your pod number)
Domain Name: secure-x.local (x does not equal your pod number in the domain name)
Enable Password: C!sco!23
Hostname Px-ASA
Domain-name secure-x.local
Enable password C!sco!23
Step 4
Enable SSH and the HTTP server. Grant access for the administrators on the inside 192.168.1.0/24 network.
http server enable
http 192.168.1.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
Step 5
Create the student user in the LOCAL database with C!sco!23 as the password. Assign a privilege level of
15 to the user.
username student password C!sco!23 encrypted privilege 15
Step 6
Enable ASDM and SSH authentication by using the LOCAL user database.
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
Step 7
Save your configuration.
Activity Verification
You have completed this task when you attain this result:
Step 1
The configuration is ready for the device to be managed from Cisco ASDM by administrators on the inside
network. Your configuration should contain the relevant configurations that are shown here:
Lab Guide
L-21
Activity Procedure
Complete these steps:
Step 1
Access the Inside PC.
Step 2
Start Cisco ASDM by using the ASDM-IDM Launcher that is found on the Inside PC desktop. Enter the
username and password that you previously configured. Accept all security warnings. The Cisco ASDM
window appears.
Step 3
In the Device Information area of the device dashboard, examine the contents of the General tab and answer
the following questions:
1
Step 4
In the Device Information area, click the License tab. From the License tab information, answer the
following questions:
1
Lab Guide
L-23
Step 5
Using the Inside PC, launch PuTTY from the desktop. Use SSH to connect to the inside interface of the
security appliance at 192.168.1.1. Log in with the username and password that you configured previously.
This login should be successful.
Note
If you receive a security error, connect to the console port of the security appliance and enter the CLI
command crypto key generate rsa mod 1024 to generate new RSA keys. Once the generation
completes, attempt an SSH connection again.
Activity Verification
You have completed this task when you attain this result:
Step 1
You successfully launched Cisco ASDM, connected via SSH, and answered the questions correctly.
Step 2
Enable the Gigabit Ethernet0/0 interface. This interface connects to the router. Configure the interface with
the following network parameters:
Name: outside
Security Level: 0
IP Address: 209.165.201.2/27
Step 3
Preview the commands. Click Apply, and then click Save.
Activity Verification
You have completed this task when you attain this result:
Step 1
You verified your configuration by using the CLI and Cisco ASDM.
Lab Guide
L-25
Note
Notice the message and ASDM configuration path on the configuration screen to enable logging.
Step 2
Click Apply, and then click Save.
Activity Verification
You have completed this task when you attain this result:
Step 1
You configured and verified your configurations by using the CLI and Cisco ASDM.
Lab Guide
L-27
Visual Objective
The figure illustrates the lab topology.
Required Resources
The following resources and equipment are required to complete this activity:
Inside PC
Cisco ASA 5512 Adaptive Security Appliance
Outside server
DMZ server
Cisco ISR router
Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
show conn
show nat
Command
Description
show xlate
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
DMZ server username/password
student/Ci5coAdmin
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
student/C!sco!23
C!sco!23
Lab Guide
L-31
Step 3
If needed, expand the NAT section and set the following parameters:
Check the Add Automatic Address Translation Rules check box.
Type: Static
Translated Address: 209.165.201.22
Step 4
Click the Advanced button and enter the following information:
Source Interface: dmz
Destination Interface: outside
Step 5
Click Apply to save your configuration.
Step 6
Add a network object for the inside network with the following parameters:
Name: INSIDE-NETWORK
Type: Network
IP Address: 192.168.1.0
Netmask: 255.255.255.0
Lab Guide
L-33
Step 7
If needed, expand the NAT section and set the following parameters:
Check the Add Automatic Address Translation Rules check box.
Type: Dynamic PAT (Hide)
Translated Address: 209.165.201.20
Step 8
Click Advanced and enter the following information:
Source Interface: inside
Destination Interface: outside
Step 9
Click Apply to save your configuration.
Step 10
Access the Cisco ASA CLI from either the console or SSH. Verify the configured NAT rules by using the
show nat command.
Step 11
Open a web browser from the Inside PC and access a web page on the Outside server. Use the web page
http://209.165.202.130. This web page should load successfully.
Step 12
Access the Cisco ASA CLI from either the console or SSH. Verify the connections and configured
translation entries in the translation table by using the show conn and show xlate commands.
Note
HTTP connections happen quickly. You may have to attempt the browser connection again and
immediately issue the CLI show commands.
Activity Verification
You have completed this task when you attain these results:
Step 1
You verified the configured NAT rules from the Cisco ASA CLI as follows:
Lab Guide
L-35
Step 2
Click Apply to save your configurations.
Step 3
Access the Cisco ASA CLI from either the console or SSH. Verify the configured NAT rules.
Px-ASA# show nat
Manual NAT Policies (Section 1)
1 (dmz) to (outside) source static DMZ-SRV DMZ-MANUAL-NAT
NETWORK OUTSIDE-NETWORK
translate_hits = 5, untranslate_hits = 5
Step 4
From the CLI, clear all translations.
Step 5
From the DMZ server, use Telnet to connect to the router from a command prompt. Use the IP address
209.165.201.1. If you are prompted for a password, enter cisco. This Telnet connection should be
successful.
Note
If you get an error when using Telnet to connect to the router, access the router console port and set the
vty password to cisco.
line vty 0 4
password cisco
Step 6
Access the Cisco ASA CLI from either the console or SSH. Verify the connections and the configured
translation entries in the translation table.
Px-ASA# sh conn
1 in use, 26 most used
TCP outside 209.165.201.1:23 dmz
Lab Guide
L-37
Step 7
Add a NAT rule before the Network Object NAT rule for the traffic from the inside network to the DMZ
server.
Use the following original packet parameters:
Source Interface: inside
Destination Interface: dmz
Source Address: INSIDE-NETWORK (previously configured)
Destination Address: DMZ-SRV (previously configured)
Destination Service: Click the ellipsis button to add a new service object that is named
HTTP_PROXY_PORT with the service type TCP and the destination port 8080. Ensure that this newly
created object is chosen in the Original Service field and click OK.
Use the following translated packet parameters:
Source NAT Type: Dynamic PAT (Hide)
Source Address: Click the ellipsis button to add a network object that is named DMZ_PAT with the
host IP address 172.16.1.10. Ensure that this newly created object is chosen in the Translated Source
Address field and click OK.
Leave the destination address as Original.
Service: Click the ellipsis button to add a service object that is named HTTP_80 with the service type
TCP and the destination port 80. Ensure that this newly created object is chosen in the Translated
Service field and click OK.
Step 8
Click Apply to save your configuration.
Step 9
Access the Cisco ASA CLI from either the console or SSH. Verify the configured NAT rules.
Step 10
Open a web browser from the Inside PC and access a web page on the DMZ server by using the proxy port
8080. Enter http://172.16.1.2:8080. This web page should load successfully.
Lab Guide
L-39
Step 11
Access the Cisco ASA CLI from either the console or SSH. Verify the connections and the configured
translation entries in the translation table.
Note
HTTP connections happen quickly. You must issue the command immediately after connecting to the
server before the connections time out.
Activity Verification
You have completed this task when you attain this result:
Step 1
You verified the configured NAT rules from the CLI as follows:
Px-ASA# show nat
Manual NAT Policies (Section 1)
1 (dmz) to (outside) source static DMZ-SRV DMZ-MANUAL-NAT
destination static OUTSIDENETWORK OUTSIDE-NETWORK
translate_hits = 6, untranslate_hits = 6
2 (inside) to (dmz) source dynamic INSIDE-NETWORK DMZ-PAT
destination static DMZ-SRV
DMZ-SRV service HTTP-PROXY-PORT HTTP-80
translate_hits = 3, untranslate_hits = 3
Auto NAT Policies (Section 2)
1 (dmz) to (outside) source static DMZ-SRV 209.165.201.22
translate_hits = 36, untranslate_hits = 0
2 (inside) to (outside) source dynamic INSIDE-NETWORK 209.165.201.20
translate_hits = 18, untranslate_hits = 0
Step 2
You verified the static and dynamic translations in the translation table. (Note: Translation entries will vary
over time.)
Px-ASA# show xlate
48 in use, 55 most used
Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,
s - static, T - twice, N - net-to-net
TCP PAT from dmz:172.16.1.2 80-80 to inside:172.16.1.2 8080-8080
flags srIT idle 0:02:42 timeout 0:00:00
Visual Objective
The figure illustrates the lab topology.
Required Resources
The following resources and equipment are required to complete this activity:
Inside PC
Cisco ASA 5512 Adaptive Security Appliance
DMZ server
Outside server
Cisco ISR router
Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
This command enables the capturing of packets that are dropped by the
configured rule.
Command
Description
show conn
show local-host
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
DMZ server username/password
student/Ci5coAdmin
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
student/C!sco!23
Step 2
Access the Outside server and try to establish an HTTP connection by using the Iceweasel application from
the Outside server to the DMZ server (172.16.1.2). This attempt should fail because the default Cisco ASA
security appliance security policy allows only connections from interfaces with a higher security level to
interfaces with a lower security level.
Step 3
Return to the Cisco ASA security appliance CLI and display information about the packets that you
captured. You should see dropped HTTP packets from the server to the DMZ server.
Lab Guide
L-43
Activity Verification
You have completed this task when you attain this result:
Step 1
You displayed information about the packets that you captured:
Px-ASA# show capture CAPTURE
10 packets captured
1: 13:38:03.158072
209.165.202.130.39086 > 172.16.1.2.80: S
2357552809:2357552809(0) win 14600 <mss 1460,sackOK,timestamp 432574485 0,nop,wscale
7> Drop-reason: (acl-drop) Flow is denied by configured rule
Step 2
Click Apply, and then click Save.
Step 3
Create another service group that is named OUTSIDE_SERVICES that includes the following services:
HTTP
DNS (udp-domain)
FTP
ICMP
Step 4
Click Apply, and then click Save.
Step 5
Create a network object group that is named SERVERS that includes the following:
DMZ-SRV (172.16.1.2) (previously configured)
OUTSIDE-SRV (209.165.202.130) (choose Create New Network Object Member if needed)
Lab Guide
L-45
Step 6
Click Apply, and then click Save.
Activity Verification
You have completed this task when you attain this result:
Step 1
Object groups are verified in the next task.
Step 2
Configure an input access list on the outside interface to permit inbound HTTP, FTP, TFTP, and ICMP
services from the 172.16.1.0/24 network to the 172.16.1.2 DMZ server. Refer to the previously created
DMZ_SERVICES service object group.
Step 3
Access the Outside server. Try to establish an HTTP connection from the Outside server to the translated
address of the DMZ server (209.165.201.22). The attempt will fail.
Step 4
Return to the Cisco ASDM session. Troubleshoot the problem by using the Cisco Packet Tracer.
Note
You should find out that the implicit rule at the end of the access list dropped the packets.
Step 5
Reconfigure the access list on the outside interface by correcting the source IP address of the access list to
the IP address of the Outside server (209.165.202.130).
Step 6
Return to the Outside server. Try to establish an HTTP connection from the server to the translated address
of the DMZ server (209.165.201.22) again. The attempt should now be successful.
Step 7
Access the Cisco ASA security appliance CLI. Verify the content of the connection table.
Px-ASA# show conn
1 in use, 26 most used
TCP outside 209.165.202.130:50935 dmz
UIOB
Note
HTTP connections happen quickly. You must issue the command immediately after connecting to the
DMZ server before the connections time out.
Note
Alternatively, you can open a command prompt on the Outside server and ping the DMZ server
(209.165.201.22); then view the ICMP connections and local host table entries. Remember to return to
the Outside server and stop the pings by pressing Ctrl-C.
Lab Guide
L-47
Step 8
Verify the local host state table.
Px-ASA# show local-host
Interface outside: 1 active, 17 maximum active, 0 denied
local host: <209.165.202.130>,
TCP flow count/limit = 3/unlimited
TCP embryonic count to host = 0
TCP intercept watermark = unlimited
UDP flow count/limit = 0/unlimited
Conn:
TCP outside 209.165.202.130:50932 dmz 172.16.1.2:80,
flags UB
TCP outside 209.165.202.130:50931 dmz 172.16.1.2:80,
flags UIOB
TCP outside 209.165.202.130:50929 dmz 172.16.1.2:80,
flags UIOB
Interface dmz: 1 active, 1 maximum active, 0 denied
local host: <172.16.1.2>,
TCP flow count/limit = 3/unlimited
TCP embryonic count to host = 0
TCP intercept watermark = unlimited
UDP flow count/limit = 0/unlimited
Conn:
TCP outside 209.165.202.130:50932 dmz 172.16.1.2:80,
flags UB
TCP outside 209.165.202.130:50931 dmz 172.16.1.2:80,
flags UIOB
TCP outside 209.165.202.130:50929 dmz 172.16.1.2:80,
flags UIOB
Interface inside: 0 active, 3 maximum active, 0 denied
Note
HTTP connections happen quickly. You must issue the command immediately after connecting to the
DMZ server before the connections time out.
Note
Alternatively, you can open a command prompt on the Outside server and ping the DMZ server
(209.165.201.22); then view the ICMP connections and local host table entries. Remember to return to
the Outside server and stop the pings by pressing Ctrl-C.
Step 9
Open a command prompt on the Outside server. Try to use Telnet to connect from the Outside server to the
DMZ server. The attempt should fail because the access list drops all traffic except HTTP, FTP, TFTP, and
ICMP traffic.
Step 10
Configure an input access list on the inside interface to permit outbound ICMP echo, HTTP, and FTP
services from the inside network to the DMZ server and to the Outside server. Refer to the previously
created OUTSIDE_SERVICES service object group and SERVERS network object group.
Step 11
Open a web browser on the Inside PC. Try to establish an HTTP connection from the Inside PC to the
Outside server. The attempt should be successful.
Step 12
Return to the Cisco ASA security appliance CLI. Verify the content of the connection table and local host
state table.
Step 13
Return to the Inside PC and open a command prompt. Try to use Telnet to connect from the Inside PC to
the Outside server. The attempt will fail because the access list drops all traffic except ICMP, HTTP, and
FTP traffic.
Step 14
Try to establish an HTTP connection from the Inside PC to the DMZ server by using port 8080 (previously
configured). The attempt should be successful.
Step 15
Verify the current content of the connection table and the local host state table.
Step 16
Try to use Telnet to connect from the Inside PC to the DMZ server. The attempt will fail because the access
list drops all traffic except ICMP, HTTP, and FTP traffic.
Activity Verification
You have completed this task when you attain these results:
Step 1
You verified the lack of HTTP connectivity from the Outside server to the DMZ server when the access list
is misconfigured.
Step 2
You verified HTTP connectivity from the Outside server to the DMZ server when the access list is
configured properly.
Lab Guide
L-49
Step 3
You verified the current content of the connection table and the local host state table.
Step 4
You verified the lack of Telnet connectivity from the Inside PC to the Outside server.
Step 5
You verified HTTP connectivity from the Inside PC to the DMZ server.
Step 6
You verified the lack of Telnet connectivity from the Inside PC to the DMZ server.
Some items may depend on each other. If you get a warning while attempting to delete some items,
remove the related dependency and attempt again.
Step 3
Access the Outside server and refresh the existing browser window that is connected to the DMZ server. If
needed, open a new browser window to access the DMZ server. Verify that access is now denied to the
DMZ server.
Step 4
Add a new public server. Use the DMZ interface for the private interface. Create a new network object that
is named DMZ_SERVER_PUB with the IP address 172.16.1.2 and use this as the private IP address. For
the private service, use the previously created HTTP_80. Use the outside interface as the public interface.
Use 209.165.201.22 as the public IP address.
Note
If needed, the new network object DMZ_SERVER_PUB may need to be created prior to configuring the
public server parameters.
Step 5
Return to the Outside server. Try to establish an HTTP connection from the server to the translated address
of the DMZ server (209.165.201.22) again. This attempt should be successful.
Step 6
Access the Cisco ASA security appliance CLI. Verify the content of the connection and local host state
tables.
Lab Guide
L-51
Step 7
Verify that the ACL and NAT entries were added for the public server.
Step 8
Return the input access list on the outside interface to the previous configuration by using the service object
group DMZ_SERVICES as the destination service.
Activity Verification
You have completed this task when you attain these results:
Step 1
You verified the lack of HTTP connectivity from the Outside server to the DMZ server when the NAT and
access list configurations are not present.
Step 2
You verified HTTP connectivity from the Outside server to the DMZ server when the public server is
configured properly.
Step 3
You verified the current content of the connection table and the local host state table:
Px-ASA# show local-host
Interface outside: 1 active, 17 maximum active, 0 denied
local host: <209.165.202.130>,
TCP flow count/limit = 3/unlimited
TCP embryonic count to host = 0
TCP intercept watermark = unlimited
UDP flow count/limit = 0/unlimited
Conn:
TCP outside 209.165.202.130:51547 dmz 172.16.1.2:80, idle 0:00:02, bytes 651,
flags UIOB
Px-ASA# show
4 in use, 26
TCP outside
TCP outside
UIOB
conn
most used
209.165.202.130:51550 dmz
209.165.202.130:51549 dmz
Lab Guide
L-53
Step 4
Add the new object DMZ_SERVER_PUB to the network object group SERVERS.
Step 5
Use both the command prompt on the DMZ server and the Cisco Packet Tracer to verify that the DMZ
server can now ping the Inside PC. Also, verify that the DMZ server cannot use Telnet to connect to the
Inside PC.
Step 6
From the DMZ server, check that you can still open a web page to the Outside server.
Activity Verification
You have completed this task when you attain these results:
Step 1
You used the Cisco Packet Tracer to troubleshoot the failed ping.
Step 2
You verified that the ping from the DMZ server to the Inside PC works but that Telnet is still blocked after
the global access list creation.
Step 3
You verified that the DMZ server access to the Outside server web page is still available.
Activity Verification
You have completed this task when you attain these results:
Step 1
From the Px-Rtr router privileged EXEC mode, you pinged the outside interface (209.165.201.2) using a
source IP address of the loopback1xx interface. The pings failed due to the uRPF check.
Lab Guide
L-55
Px-Rtr# ping
Protocol [ip]:
Target IP address: 209.165.201.2
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: loopback1xx
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]:
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 209.165.201.2, timeout is 2 seconds:
Step 2
Because the Px-Rtr router loopback interface is in the same subnet as the security inside interface, the uRPF
check failed and the ping packets are dropped. You should see a syslog message similar to the one shown
here using the ASA CLI console:
%ASA-1-106021: Deny ICMP reverse path check from 192.168.1.101 to 209.165.201.2 on interface
outside
Visual Objective
The figure illustrates the lab topology.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Cisco ASA 5512 Adaptive Security Appliance
DMZ server
Outside server
Cisco ISR router
Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
priority-queue [interface]
queue-limit
Command
Description
show running-config
show service-policy
tx-ring-limit
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
DMZ server username/password
student/Ci5coAdmin
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
student/C!sco!23
Examine the protocols that are inspected by the Cisco ASA security appliance by default.
Lab Guide
L-59
Step 3
Access the Inside PC and open a command prompt window. From the command prompt, ping the Outside
server at 209.165.202.130. The ping should be unsuccessful because ICMP is not inspected by default.
Step 4
Open an FTP session to the Outside server at 209.165.202.130. Log in with the username anonymous and
the password cisco. List the files that are available on the FTP server by using the ls command. The listing
should be successful because FTP inspection is enabled by default.
Step 5
Access the Cisco ASDM. Enable ICMP inspection and disable FTP inspection by editing the default
inspection policy.
Step 6
Click Apply, and then click Save.
Step 7
Ping the Outside server at 209.165.202.130 again. This time, the ping should be successful because ICMP
inspection is enabled and ICMP is treated statefully.
Step 8
Open an FTP session to the Outside server at 209.165.202.130. List the files that are available on the FTP
server. This time, you should not be successful because the FTP inspection is now disabled and the Cisco
ASA security appliance does not allow the dynamically negotiated sessions to pass from a less-secure
interface to a more-secure interface. Recall that, when active FTP is used, a data session is initiated by the
FTP server.
Step 9
Return to the Cisco ASDM session and re-enable FTP inspection.
Step 10
Access the Cisco ASA security appliance CLI and examine the statistics for the default global policy.
Activity Verification
You have completed this task when you attain this result:
Step 1
You examined the statistics for the default global policy:
Lab Guide
L-61
Step 2
Return to the Cisco ASDM. Configure a new service policy and apply it to the inside interface. Inside the
new service policy, you will enable TTL decrement and disable TCP ISN randomization. Use the following
parameters for the service policy:
Name of the Service Policy: INSIDE-POLICY
Traffic Class Name: IN-TO-OUT-TRAFFIC
Traffic Classification: HTTP, FTP, and ICMP traffic from 192.168.1.0/24 to the 209.165.202.130
server
Apply these rule actions:
Decrement TTL for traffic flow.
Disable TCP ISN randomization.
Lab Guide
L-63
Step 3
Click Apply, and then click Save.
Step 4
Ping the server at 209.165.202.130 again. The ping should be successful. Examine the TTL number that is
reported by the ping. It should now be 62 because the Cisco ASA security appliance also decremented the
TTL of packets.
Step 5
Examine the created service policy.
Activity Verification
You have completed this task when you attain this result:
Step 1
You examined the created service policy:
Lab Guide
L-65
Step 2
Click Apply, and then click Save.
Step 3
Configure a new service policy and apply it to the outside interface. Inside the new service policy, you will
change the TCP timeouts and enable DCD and TCP normalization. Use the following parameters for the
service policy:
Name of the Service Policy: OUTSIDE-POLICY
Traffic Class Name: OUT-TO-DMZ-TRAFFIC
Traffic Classification: HTTP, FTP, TFTP, and ICMP traffic from the Outside server
(209.165.202.130) to the DMZ server (172.16.1.2)
Apply these rule actions:
Set the embryonic connection timeout to 10 seconds.
Set the half-closed connection timeout to 5 minutes.
Set the connection timeout to 10 minutes.
Enable DCD with default parameters.
Enable TCP normalization by appending the previously created TCP map (OUT-TO-DMZ-TCP-MAP)
to the traffic flow.
Lab Guide
L-67
Step 4
Click Apply, and then click Save.
Step 5
Examine the created service policy.
Activity Verification
You have completed this task when you attain this result:
Step 1
You examined the created service policy:
Lab Guide
L-69
Step 2
Return to the Cisco ASDM and configure a new service policy. Edit the policy that is configured on the
outside interface. Inside the new service policy, identify FTP traffic from the Inside PC to the Outside
server and send that traffic to the priority queue that is configured on the outside interface. Use the
following parameters for the service policy:
Name of the Service Policy: OUTSIDE-POLICY
Traffic Class Name: CLIENT-TO-SERVER-FTP
Traffic Classification: FTP traffic from the Inside PC (192.168.1.3) to the Outside server
(209.165.202.130)
Apply this rule action:
Enable priority for this flow.
Step 3
Click Apply, and then click Save.
Step 4
From the Inside PC, open an FTP session to the Outside server at 209.165.202.130. List the files that are
available on the FTP server. Log in with the username anonymous and the password cisco. Retrieve a list
of files with the ls command.
Step 5
From the Cisco ASA CLI command line, examine the modified service policy and the priority queue
statistics.
Step 6
Configure a new service policy and add it to the policy that is configured on the outside interface. Inside the
new service policy, you will identify HTTP traffic from all sources to the Outside server and police that
traffic in the outbound direction. Use the following parameters for the service policy:
Name of the Service Policy: OUTSIDE-POLICY
Traffic Class Name: OUTBOUND-HTTP
Traffic Classification: HTTP traffic from anywhere to the Outside server (209.165.202.130)
Apply these rule actions:
Committed Rate: 1 Mbps
Burst Rate: 1500 B
Step 7
Click Apply, and then click Save.
Lab Guide
L-71
Step 8
From the DMZ server, open a web page to the Outside server at 209.165.202.130.
Step 9
From the Cisco ASA CLI command line, examine the modified service policy.
Activity Verification
You have completed this task when you attain this result:
Step 1
You examined the created service policy:
Px-ASA# show service-policy interface outside
Interface outside:
Service-policy: OUTSIDE-POLICY
Class-map: OUT-TO-DMZ-TRAFFI
Set connection policy:
drop 0
Set connection timeout policy:
embryonic 0:00:10 half-closed 0:05:00 idle 0:10:00
DCD: enabled, retry-interval 0:15:00, max-retries 5
DCD: client-probe 0, server-probe 0, conn-expiration 0
Set connection advanced-options: OUT-TO-DMZ-TCP-MAP
Retransmission drops: 0
TCP checksum drops : 0
Exceeded MSS drops : 0
SYN with data drops: 0
Invalid ACK drops
: 0
SYN-ACK with data drops: 0
Out-of-order (OoO) packets : 0
OoO no buffer drops: 0
OoO buffer timeout drops : 0
SEQ past window drops: 0
Reserved bit cleared: 0
Reserved bit drops : 0
IP TTL modified
: 0
Urgent flag cleared: 0
Window varied resets: 0
TCP-options:
Selective ACK cleared: 0
Timestamp cleared : 0
Window scale cleared : 0
Other options cleared: 0
Other options drops: 0
Class-map: CLIENT-TO-SERVER-FTP
Priority:
Interface outside: aggregate drop 0, aggregate transmit 13
Class-map: OUTBOUND-HTTP
Output police Interface outside:
cir 1000000 bps, bc 1500 bytes
conformed 19 packets, 2565 bytes; actions: transmit
exceeded 0 packets, 0 bytes; actions: drop
conformed 96 bps, exceed 0 bps
Class-map: class-default
Visual Objective
The figure illustrates the lab topology.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Cisco ASA 5512 Adaptive Security Appliance
DMZ server
Outside server
Cisco ISR router
Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
clear service-policy
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
DMZ server username/password
student/Ci5coAdmin
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
student/C!sco!23
Lab Guide
L-75
Step 4
Enable HTTP protocol verification to drop and log all HTTP sessions that do not conform to the standard
protocol specification.
Step 5
Create a new service policy rule and apply it globally. Create a new traffic class inside the global policy
with the following parameters:
Traffic Class Name: WEB-SERVER-PROTECTION
Traffic Matching: HTTP traffic from the Outside PC (209.165.202.131) to the DMZ server
Action: Apply the configured MY-HTTP-POLICY HTTP inspection policy map
Lab Guide
L-77
Lab Guide
L-79
Step 6
Ensure that the configured service policy rule will be matched before the default service policy rule.
Step 7
Click Apply, and then click Save.
Step 8
Access the Outside PC. Start PuTTY by double-clicking the PuTTY icon. Simulate a protocol violation by
using Telnet to connect from the Outside PC to the DMZ server public IP address (209.165.201.22) by
using port 80. Enter random data and press ENTER several times.
Step 9
Access the Inside PC and observe the logging messages on the Kiwi Syslog server regarding dropped
packets. The relevant logging message is 507003. (Alternately, view the real-time log viewer in Cisco
ASDM.)
Step 10
Access the Cisco ASA security appliance CLI. Verify the service policy statistics. Verify the packet
counters to see whether packets are being inspected and dropped by the inspector.
Step 11
Clear global service policy statistics.
Step 12
Return to the Outside PC. Verify HTTP connectivity from the Outside PC to the DMZ server at http://
209.165.201.22. This attempt should be successful.
Step 13
Verify HTTP connectivity from the Outside PC to the DMZ server at http://209.165.201.22/whatever.htm.
Note
The requested page will not be displayed because it does not exist. Nevertheless, you should receive an
error page from the DMZ server.
Step 14
Return to the Cisco ASDM session on the Inside PC.
Step 15
Create a regular expression class that is named DMZ-REGEX that will include the following parameters:
Create and match a regular expression that matches all .txt files
Create and match a regular expression that matches all .mp4 files
Step 16
Edit the MY-HTTP-POLICY inspection map to match the configured regular expressions inside the HTTP
request URI. You should reset and log attempts to access these URIs.
Step 17
Return to the Outside PC. Verify HTTP connectivity from the Outside PC to the DMZ server at http://
209.165.201.22. This attempt should be successful.
Step 18
Verify HTTP connectivity from the Outside PC to the DMZ server by clicking the Files tab from the DMZ
server web page. Try to open the .txt file shown; this attempt should be unsuccessful. Also try to open
the .mp4 file, which should also be unsuccessful.
Lab Guide
L-81
Note
You may have to clear your browser cache to get the desired result.
Step 19
Observe the logging messages on the Kiwi Syslog server about the DMZ server regarding the TCP flow
being reset. The relevant logging message is 507003.
Step 20
Return to the Cisco ASA security appliance CLI. Verify the service policy statistics. Verify the packet
counters to see whether packets are being inspected and dropped by the inspector.
Step 21
Clear the global service policy statistics.
Step 22
Return to the Cisco ASDM session on the Inside PC. Remove the service policy rule that applied the MYHTTP-POLICY inspection policy map.
Activity Verification
You have completed this task when you attain these results:
Step 1
You observed the log on the Cisco ASDM real-time log viewer or the Kiwi Syslog server on the DMZ
server regarding dropped packets:
Step 2
You verified the service policy statistics.
Step 3
You verified HTTP connectivity from the Outside PC to the DMZ server before HTTP inspection is
configured.
Step 4
You verified HTTP connectivity from the Outside PC to the DMZ server after HTTP inspection is
configured.
Step 5
You verified HTTP connectivity from the Outside PC to the DMZ server after HTTP inspection is
configured so that .txt and .mp4 type files are not allowed. The resulting syslog messages are displayed in
the Kiwi Syslog server.
Step 6
You removed the service policy rule that applied the MY-HTTP-POLICY inspection policy map
Lab Guide
L-83
Step 2
Create a new service policy rule and apply it globally. Create a new traffic class inside the global policy
with the following parameters:
Traffic Class Name: FTP-SERVER-PROTECTION
Traffic Match Criteria: FTP traffic from the Outside PC (209.165.202.131) to the DMZ server public
address
Action: Apply the configured MY-FTP-POLICY FTP inspection policy map
Lab Guide
L-85
Step 3
Make sure that the configured service policy rule will be matched before the default service policy rule.
Step 4
Click Apply, and then click Save.
Step 5
Access the Outside PC. Open a command prompt and use FTP to contact the DMZ server at
209.165.201.22. Log in with the username anonymous and the password cisco. List the contents of the
directory with the ls command.
Step 6
In the same FTP session, change to the files directory with the cd files command. Again list the contents of
the directory. Get the text file that is named ARTOFWAR.TXT by using the get command. The file download
should be successful.
Step 7
In the same FTP session, make a directory on the FTP server. Use the FTP command, mkd, and name the
directory ASA. The connection should be reset.
Step 8
Access the Inside PC. Observe the logging messages on the Kiwi Syslog server regarding dropped packets.
The relevant logging message is 507003. (Alternatively, view the real-time log viewer in Cisco ASDM.)
Step 9
Access the Cisco ASA security appliance CLI. Verify the service policy statistics. Verify the packet
counters to see whether packets are being inspected and dropped by the inspector.
Step 10
Return to the Outside PC and end the FTP session by using the quit command.
Activity Verification
You have completed this task when you attain these results:
Step 1
You observed the log on the Cisco ASDM real-time log viewer or the Kiwi Syslog server on the Inside PC
regarding dropped packets.
Step 2
You verified the service policy statistics:
Px-ASA# show service-policy inspect ftp
Global policy:
Service-policy: global_policy
Class-map: FTP-SERVER-PROTECTION
Inspect: ftp strict MY-FTP-POLICY, packet 192, lock fail 0, drop 1, reset-drop
3, v6-fail-close 0
Reply code invalid drop
1
mask-banner enabled
mask-syst-reply enabled
match request-command appe cdup help rnfr rnto put stou site dele mkd rmd
reset log, packet 3
Class-map: inspection_default
Inspect: ftp, packet 0, lock fail 0, drop 0, reset-drop 0, v6-fail-close 0
Lab Guide
L-87
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Command List
No commands are needed for this lab exercise. All tasks are performed with the Cisco ASDM GUI
interface.
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
Lab Guide
L-91
Step 1
In Cisco ASDM, navigate to Configuration > Remote Access VPN > Clientless SSL VPN Access >
Connection Profiles and check the check box next to the outside interface.
Step 2
Click Apply.
Step 3
Preview the commands and click Send.
Activity Verification
You have completed this task when you attain this result:
Note
In the verification procedure, you will use Internet Explorer. The verification procedure will not work as
expected if you use a Firefox browser because Firefox uses a different certificate store than Internet
Explorer does.
Step 1
On the Outside PC, add an entry for the outside interface of the Cisco ASA to the host file. (In a production
environment, the hostname should be resolved by a public DNS.)
A) Go to Start and type notepad in the search field.
B) Right-click Notepad and choose Run as Administrator.
C) Click File > Open and browse to C:\Windows\System32\drivers\etc\hosts.
Note
The hosts file will be displayed only if All Files is chosen in the Open window.
Lab Guide
L-93
Step 3
Continue to this website and log in as the user student with the password C!sco!23. You will access the
SSL VPN portal.
Step 4
Click the Certificate Error field in the URL window and then click View Certificates. You will see the
certificate information. The ASA temporary self-signed certificate is not trusted. Do not install it. Instead of
installing the Cisco ASA self-signed certificate, you will enroll the Cisco ASA in the PKI.
Lab Guide
L-95
Step 1
Install the CA root certificate on the Cisco ASA:
A) In Cisco ASDM, navigate to Configuration > Remote Access VPN > Certificate Management > CA
Certificates. Add the CA root certificate by using the trustpoint name HQ-Srv.
B) Choose Install from a File and choose the CA root certificate file that is stored on the Inside PC (D:
\misc\HQ-SRV-CA.cer).
C) Click Install Certificate.
Step 2
Generate a certificate signing request on the Cisco ASA. The request will contain the identity information
of the Cisco ASA and the public RSA key. You will later submit this request to the CA and the CA will
issue an identity certificate for the ASA.
A) In the Cisco ASDM, navigate to Configuration > Remote Access VPN > Certificate Management >
Identity Certificates.
B) Click Add. The Add Identity Certificate window opens.
C) Set the trustpoint name to HQ-Srv.
D) Choose Add a New Identity Certificate.
E) Click New to generate a new RSA key pair.
Note
The figure shows CN=P7-ASA in the Certificate Subject DN field instead of CN=Px-ASA because
the screen shot was taken on a live pod, Pod 7. Your pod number should be displayed instead of
the number 7.
F) In the Add Key Pair window, set the length to 2048 bits. Set the name to SSL-Keys. Click the
Generate Now button.
Lab Guide
L-97
Note
The minimum size for the web server certificate template that is configured on the Inside server CA
is 2048 b.
G) In the Add Identity Certificate window, enter CN=Px-ASA.secure-x.public (where the first x = pod
number) in the Certificate Subject DN field.
H) Click Advanced.
Note
I)
The figure shows CN=P7-ASA.secure-x.public in the Certificate Subject DN field instead of CN=PxASA.secure-x.public because the screen shot was taken on a live pod, Pod 7. Be sure to use your
pod number in the Certificate Subject DN field instead of the number 7.
In the Certificate Parameters tab of the Advanced Options window, change the FQDN from PxASA.secure-x.local to Px-ASA.secure-x.public (where the first x = pod number).
J)
Click OK.
Note
Lab Guide
L-99
Step 3
Submit the request to the certificate authority:
A) On the Inside PC, open a web browser and connect to http://hq-srv:5080/certsrv. Log in with the
username Administrator and the password Cisco123.
B) Click Request a Certificate.
Step 4
Install the obtained identity certificate on the Cisco ASA:
A) In the Cisco ASDM, return to Configuration > Remote Access VPN > Certificate Management >
Identity Certificates. Click Install for the certificate that is now in the enrollment procedure.
Lab Guide
L-101
Step 5
Configure the Cisco ASA to use the obtained identity certificate for SSL VPN. The certificate used in SSL
VPNs has several effects. First, the ASA will send this identity certificate in the initial SSL handshake with
the clients. Second, the clients will attempt to validate this certificate, possibly using the CA root certificate.
Third, the ASA will sign the VPN data using the generated ASA private key. Lastly, the clients will verify
the signatures using the corresponding ASA public key, which is embedded in the identity certificate.
A) In the Cisco ASDM, go to Configuration > Remote Access VPN > Clientless SSL VPN Access >
Connection Profiles, and click Device Certificate. The Specify Device Certificate window opens.
B) Choose the installed identity certificate from the Device Certificate drop-down list.
C) Click OK.
Step 1
In Internet Explorer on the Outside PC, refresh the HTTPS session to Px-ASA.secure-x.public (where the
first x = pod number). There should be no warnings.
Step 2
Examine the certificate details by clicking the lock icon and the View Certificates link. In the Certification
Path tab, you will see that the the ASA identity certificate has been signed by HQ-SRV-CA.
Lab Guide
L-103
Step 3
Examine the certificate store in Internet Explorer on the Outside PC and identify the CA root certificate that
is used to validate the Cisco ASA certificate:
A) In Internet Explorer on the Outside PC, navigate to Tools > Internet Options > Content >
Certificates > Trusted Root Certification Authorities.
B) Search for the InsideServer CA certificate and optionally view it. This CA root certificate has been
preinstalled on the Outside PC and allows Internet Explorer to validate the ASA identity certificate
issued by the InsideServer CA.
Step 4
From the Outside PC, test other HTTPS connections to the VPN portal:
A) From Internet Explorer, connect via HTTPS to the ASA outside IP address (209.165.201.2). You will
get the security warning because the URL does not contain the FQDN embedded in the ASA identity
certificate.
B) From Mozilla Firefox, connect to https://Px-ASA.secure-x.public (where the first x = pod number).
You will get a security warning because Firefox uses a dedicated certificate store. The Firefox
certificate store does not contain the InsideServer-CA root certificate and therefore cannot validate the
ASA certificate.
C) From Google Chrome, connect to https://Px-ASA.secure-x.public (where the first x = pod number).
You will not get a security warning because Chrome uses the Microsoft certificate store.
Step 1
Create a user account in the local user database of the Cisco ASA.
A) Return to your Cisco ASDM session.
B) Go to Configuration > Remote Access VPN > AAA/Local Users > Local Users and click Add in the
Local Users panel. The Add User Account window opens.
C) Create a user account in the local database, using these parameters:
Username: clientlessuser
Password: cisco123
Access Restriction: No ASDM, SSH, Telnet or Console access
D) Click OK.
Lab Guide
L-105
Step 2
Create a custom group policy for clientless SSL VPN.
A) In Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Group Policies. The Group Policies panel is displayed.
B) Choose Add > Internal Group Policy. The Add Internal Group Policy window opens.
C) Name the policy BASIC-CLIENTLESS-GROUP-POLICY.
D) Enable only the clientless SSL VPN protocol for the group policy.
E) Click OK.
Step 3
Create a custom connection profile that uses local user authentication.
A) Choose Configuration > Remote Access VPN > Clientless SSL VPN Access > Connection Profiles.
B) In the Connection Profiles area of the Connection Profiles panel, click Add. The Add Clientless SSL
VPN Connection Profile window opens.
C) Verify that AAA is chosen as the authentication method and that LOCAL is displayed in the AAA
Server Group drop-down list.
D) Verify that the Enable Clientless SSL VPN Protocol check box is checked.
E) Configure the connection profile with the following parameters:
Name: BASIC-CLIENTLESS-PROFILE
Alias: BASIC-PORTAL
Servers: 192.168.1.2
Note
The IP address 192.168.1.2 may be displayed by default in the Servers field (in the DNS
section). If it is not displayed, enter 192.168.1.2 in the Servers field.
Lab Guide
L-107
G) In the Connection Profiles panel, check the box to allow users to choose a connection profile on the
logon page.
H) Click Apply.
I)
Activity Verification
Step 1
From Internet Explorer on the Outside PC, refresh your connection to https://Px-ASA.secure-x.public
(where the first x = pod number) or navigate to it.
Step 2
Log in to the SSL VPN portal by using the username clientlessuser and the password cisco123. You should
be able to access the SSL VPN portal.
Step 3
Verify that HTTP is chosen in the URL entry drop-down list. Enter hq-srv.secure-x.local in the address
field. Click Browse. You should see the Inside-SRV web page in your browser.
Step 4
Return to the clientless SSL VPN portal.
Step 5
Choose FTP from the URL entry drop-down list, and enter 172.16.1.2 (the IP address of the DMZ server) in
the Address field. Click Browse. FTP access to the DMZ server should be successful. You should see a list
of files and folders on the DMZ server.
Step 6
Return to your Cisco ASDM session.
Step 7
Choose Monitoring > VPN > VPN Statistics > Sessions to check for clientless SSL VPN remote access
sessions.
Lab Guide
L-109
Step 8
In the Sessions panel, choose Clientless SSL VPN from the Filter By drop-down list. You should see one
established VPN session.
Step 1
Configure a bookmark list.
A) In Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Portal > Bookmarks and click Add. The Add Bookmark List window opens.
B) Name the bookmark list MY-BOOKMARKS and click Add. The Select Bookmark Type window
opens.
C) Verify that the URL with GET or POST Method option is chosen, and click OK. The Add Bookmark
window opens.
D) Give the bookmark these parameters:
Bookmark Title: Inside server
URL: http://hq-srv.secure-x.local
E) Click OK.
F) Click Add again in the Add Bookmark List window to add another bookmark to the list.
G) Verify that the URL with GET or POST Method option is chosen, and click OK. The Add Bookmark
window opens.
H) Give the bookmark these parameters:
Bookmark Title: DMZ server
URL: ftp://172.16.1.2
I)
Click OK.
Lab Guide
L-111
J)
Click OK.
K) In the Bookmarks panel, choose the bookmark list that you just configured and click Assign.
L) Assign the bookmark list to the group policy named BASIC-CLIENTLESS-GROUP-POLICY.
M) Click OK.
Q) Test the bookmarks. You should be able to access the web page of the Inside server by clicking the
Inside Server bookmark. You should be able to access files and folders on the DMZ server by clicking
the DMZ Server bookmark.
R) Log out of the portal.
Lab Guide
L-113
Step 2
Configure a web ACL.
A) In Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Advanced > Web ACLs.
B) Click Add > Add ACL in the Web ACLs panel. The Add ACL dialog box is displayed.
C) In the ACL Name field, enter the name BASIC-CLIENTLESS-ACL.
D) Click OK. The new web ACL is displayed in the Web ACLs panel.
E) Choose the newly created ACL in the Web ACLs panel, and choose Add > Add ACE to add an ACE
to the new web ACL. The Add ACE window opens.
F) In the Add ACE window, configure the ACE to permit FTP access to the DMZ server.
G) Click OK.
J)
To apply the web ACL to the custom group policy, first choose Configuration > Remote Access VPN
> Clientless SSL VPN Access > Group Policies. The Group Policies panel is displayed.
Note
You could also apply the web ACL to the group policy in the same way you assigned your
bookmark to the group policy, by choosing the web ACL in the Web ACLs panel, clicking Assign,
and checking the appropriate box in the Assign Web ACL window.
K) Choose the group policy named BASIC-CLIENTLESS-GROUP-POLICY and click Edit. The Edit
Internal Group Policy window opens.
L) Expand the More Options area. Uncheck the Inherit check box next to Web ACL, and verify that the
web ACL that is named BASIC-CLIENTLESS-ACL is chosen from the Web ACL drop-down list.
Note
You could also apply the bookmark to the group policy in this manner, by choosing the Portal option
in the navigation pane, unchecking the Inherit check box next to Bookmark List, and choosing the
configured bookmark from the drop-down list.
M) Click OK.
Lab Guide
L-115
Step 1
If you are logged in to the clientless SSL VPN portal (https://Px-ASA.secure-x.public, where the first x =
pod number) from Internet Explorer on the Outside PC, log out and then log back in with the username
clientlessuser and the password cisco123. You should be able to access the SSL VPN portal. Notice that
the Inside server bookmark is greyed out and not operational. The web ACL permits access to only the
DMZ server.
Step 2
Click the DMZ Server link to verify that the bookmark is still operational. You should still be able to see
the files and folders on the DMZ server.
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
After you click Import Now, the plug-in should display in the Client-Server Plug-ins panel.
Lab Guide
L-119
Step 2
Add an SSH URL to the existing bookmark list MY-BOOKMARKS. Bookmarks provide the easiest
method to define accessible resources.
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Portal > Bookmarks. Choose MY-BOOKMARKS and click Edit. The Edit Bookmark List window
opens.
B) Click Add to define a new bookmark. The Select Bookmark Type window opens.
C) Verify that URL with GET or POST Method is chosen as the bookmark type, and click OK.
D) Add a bookmark that is named SSH to DMZ server with the URL ssh://172.16.1.2 and click OK.
E) Click the OK button in the Edit Bookmark List window and apply the configuration.
Step 3
Add an ACE to your web ACL to permit SSH access to the DMZ server:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Advanced > Web ACLs.
B) In the Web ACLs panel, choose BASIC-CLIENTLESS-ACL and choose Add > Add ACE. The Add
ACE window opens.
C) In the Add ACE window, configure the ACE to permit SSH access to the IP address of the DMZ server
(172.16.1.2).
D) Click OK.
E) Click Apply in the Web ACLs panel.
F) Review the commands and send them to the Cisco ASA.
Step 4
Configure a group policy to include the new bookmark on the portal page when members of the group
establish clientless SSL VPN connections to the Cisco ASA. Also apply the web ACL to the group policy.
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Group Policies.
B) Choose Add > Internal Group Policy and enter the name SSH-RDP-POLICY for the group policy.
Note
This group policy will be used in this exercise instead of the default group policy. Alternatively you
may tune the default group policy to achieve the same result.
C) Expand the More Options area, uncheck the Inherit check box next to Web ACL, and verify that
BASIC-CLIENTLESS-ACL is chosen in the Web ACL drop-down list.
D) Choose the Portal page. Uncheck the Inherit check box next to Bookmark List, and verify that MYBOOKMARKS is chosen in the drop-down list. Have all other attributes inherited from the default
group policy.
E) Click OK.
F) Click Apply in the Group Policies panel.
G) Review the commands and send them to the Cisco ASA.
Lab Guide
L-121
Step 5
Configure a connection profile that points to your new group policy. In this step, you will also configure an
alias for the custom connection profile. Another connection profile will be provided for users to choose at
logon.
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Connection Profiles. The Connection Profiles panel is displayed.
B) Click Add and create a connection profile that is named ADVANCED-CONNECTION-PROFILE with
these attributes:
Alias: ADVANCED-PROFILE
Authentication Method: AAA > LOCAL
DNS Server Group: DefaultDNS (192.168.1.2)
Group Policy: SSH-RDP-POLICY
C) Click OK.
Step 2
Log in to the ADVANCED-PROFILE connection profile as the local user clientlessuser with the password
cisco123. You should see the new bookmark you created along with those you created in the previous lab
exercise.
Lab Guide
L-123
Step 3
Test the SSH to DMZ Server bookmark:
A) Click the SSH to DMZ Server bookmark. Depending on your browser and your certificate store
configuration, you may get a warning or the plug-in may not start. Do not update Java if prompted.
B) If you get a warning, accept it and run the application. Do not update Java.
Note
If the application does not start, try another browser, such as Firefox. If the application still does not
work, lower your Java security level by going to Start > Control Panel > Java > Security and
setting the security level to Medium. After changing the security level, you may also need to restart
your browser.
D) Verify that you are connected to the DMZ server via SSH.
Step 4
Log out of the portal.
Lab Guide
L-125
Step 1
Configure a smart tunnel application list:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Portal > Smart Tunnels. The Smart Tunnels panel is displayed.
B) In the Smart Tunnel Application List area, click Add to create a list that is named MY-SMARTTUNNEL-LIST.
C) Click Add to create a smart tunnel entry with these attributes:
Application ID: Microsoft-RDP-Client
OS: Windows
Process Name: mstsc.exe
D) Click OK.
Step 2
Add an ACE to your web ACL to permit smart tunnel access to the Inside server:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Advanced > Web ACLs.
B) In the Web ACLs panel, choose BASIC-CLIENTLESS-ACL and choose Add > Add ACE. The Add
ACE window opens.
C) In the Add ACE window, configure the ACE to permit smart tunnel access to the IP address of the
Inside server (192.168.1.2).
D) Click OK.
E) Click Apply in the Web ACLs panel.
F) Review the commands and send them to the Cisco ASA.
Lab Guide
L-127
Step 3
Apply the smart tunnel list to a group policy:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Group Policies.
B) Choose the custom group policy that is named SSH-RDP-Policy and click Edit.
C) In the Portal page, apply the smart tunnel application list to the policy group.
D) Click OK.
Activity Verification
Step 1
On the Outside PC, start the MS Terminal Services client by invoking mstsc from the Start menu. Verify
that a connection to the Inside server IP address (192.168.1.2) fails.
Step 2
From Internet Explorer on the Outside PC, reconnect to the SSL VPN portal (https://Px-ASA.securex.public, where the first x = pod number) using the ADVANCED-PROFILE connection profile with the
username clientlessuser and the password cisco123.
Step 3
Click Application Access and then click the Start Smart Tunnel button. Accept the prompts to run the
application, allow the data to pass through the VPN, and do not block any potentially unsafe components.
Lab Guide
L-129
Step 4
After the smart tunnel is up, the portal displays the message "Smart Tunnel has been started."
Step 5
Using the MS Terminal Services client, connect to the Inside server by using its internal IP address
(192.168.1.2). Accept all warnings. Log in as Administrator with the password Cisco123. You should see
the desktop of the Inside server.
Step 6
Log out of the portal. Notice that the RDP session has been interrupted.
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
Lab Guide
L-133
Step 1
Configure the Cisco ASA to communicate with the LDAP server that is running on the Inside server:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > AAA
Server Groups. The AAA Server Groups panel is displayed.
B) In the AAA Server Groups area, click Add.
C) Enter the name LDAP-AD in the AAA Server Group field, and choose LDAP from the Protocol dropdown list.
D) Click OK.
E) Choose your new group in the AAA Server Groups area of the AAA Server Groups panel.
F) In the Servers in the Selected Group area, click Add. The Add AAA Server window opens.
G) Use the following information to configure an LDAP AAA server:
Interface Name: inside
Server Name or IP Address: 192.168.1.2
Server Type: Microsoft
Base DN: DC=secure-x,DC=local
Scope: All levels beneath the base DN
Naming Attribute: sAMAccountName
Login DN: CN=Administrator,CN=Users,DC=secure-x,DC=local
Login Password: Cisco123
H) Click OK.
I)
Step 2
Configure a connection profile to use the new AAA configuration:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Clientless SSL VPN Access >
Connection Profiles. The Connection Profiles panel is displayed.
B) Choose the connection profile that is named ADVANCED-CONNECTION-PROFILE and click Edit.
The Edit Clientless SSL VPN Connection Profile window opens.
C) In the Authentication area, choose LDAP-AD from the AAA Server Group drop-down list.
D) Click OK.
E) Click Apply in the Connection Profiles panel.
Activity Verification
Use the Test functionality in Cisco ASDM to verify your LDAP configuration.
Note
This activity only verifies that the Cisco ASA can use the Active Directory on the Inside server to
authenticate a user.
Lab Guide
L-135
Step 1
In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server
Groups. The AAA Server Groups panel is displayed.
Step 2
In the AAA Server Groups area, choose the LDAP-AD server group.
Step 3
In the Servers in the Selected Group area, choose the AAA server 192.168.1.2.
Step 4
Click Test.
Step 5
In the Test AAA Server window, click the Authentication radio button and log in with the username it1
and the password cisco. This user account exists in the Active Directory but not in the Cisco ASA local user
database.
Step 6
Click OK. A new window should open and display a message indicating that the authentication test was
successful.
Lab Guide
L-137
Step 1
On the Cisco ASA, configure an LDAP map that maps the AD attribute memberOf to the IETF-RadiusClass attribute that is understood by the Cisco ASA.
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > LDAP
Attribute Map. The LDAP Attribute Map panel is displayed.
B) Click Add.
C) Assign the name MY-ATTRIBUTE-MAP to the map.
D) In the LDAP Attribute Name field, enter memberOf.
E) From the Cisco Attribute Name drop-down list, choose IETF-Radius-Class.
F) Click Add.
J)
K) Click Add.
L) Click OK.
M) Click OK in the Add LDAP Attribute Map window.
N) Click Apply in the LDAP Attribute Map panel.
Step 2
Assign the LDAP map to the server that is configured for LDAP authentication:
A) Choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server Groups. The
AAA Server Groups panel is displayed.
B) Choose the AAA server that is configured for LDAP, and click Edit. The Edit AAA Server window
opens.
C) From the LDAP Attribute Map drop-down list, choose MY-ATTRIBUTE-MAP.
D) Click OK.
E) Click Apply in the AAA Server Groups panel.
Step 3
Turn off the option to allow the user to choose a connection profile on login, and set the
DefaultWEBVPNGroup Connection profile to use LDAP for AAA.
Choose Configuration > Remote Access VPN > Clientless SSL VPN Access > Connection Profiles.
The Connection Profiles panel is displayed.
Uncheck the Allow User to Select Connection Profile on the Login Page check box.
Choose the DefaultWEBVPNGroup Connection Profile and click Edit. The Edit Clientless SSL VPN
Connection Profile window opens.
From the AAA Server Group drop-down list, choose LDAP-AD.
Click OK.
Click Apply in the Connection Profiles window.
Lab Guide
L-139
Activity Verification
Step 1
On the Outside PC, connect to the VPN portal page at https://Px-ASA.secure-x.public (where the first x =
pod number).
Step 2
Notice that there is no longer an option to choose a connection profile. Simply log in as the user it1 with the
password cisco.
Step 3
Verify that it1 logs in successfully and has the group policy SSH-RDP-POLICY applied. When this group
policy is applied, the user should be able to do the following:
See the grayed-out Inside server bookmark. It is grayed out because the web ACL does not permit
access to the Inside server.
Use the SSH to DMZ Server bookmark to access the DMZ server via SSH (login credentials: root/
Ci5coAdmin).
Start a smart tunnel and then use the MS Terminal Services client to connect to 192.168.1.2, the IP
address of the Inside server. You can start the MS Terminal Services client by invoking mstsc from the
Start menu (login credentials: Administrator/Cisco123).
Step 4
Return to the Inside PC, and check the results in Cisco ASDM by navigating to Monitoring > VPN > VPN
Statistics > Sessions and verifying the connection profile and group policy.
Step 5
Log out of the clientless SSL VPN portal.
Lab Guide
L-141
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Command List
No commands are needed for this lab exercise. All tasks are performed with the Cisco ASDM GUI
interface.
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
The Cisco ASDM will ask you to designate a Cisco AnyConnect image. Click Yes and proceed to the next
step.
Lab Guide
L-145
Step 2
In the Add AnyConnect Client Image window, click Browser Flash and choose the Cisco AnyConnect
client image that is named anyconnect-win-3.1.04059-k9.pkg on disk0.
Lab Guide
L-147
Step 2
Configure identity NAT for VPN clients:
A) Choose Configuration > Firewall > NAT Rules.
B) Click Add to create a rule before the Network Object NAT rules.
C) Choose Outside as the destination interface, and click the destination address selection button. Click
Add and create a network object.
D) Configure a network object that is named VPN-clients that defines the VPN client address range
(192.168.1.10 to 192.168.1.15).
E) Click OK. Choose the network object (VPN-clients) as the destination address.
F) Click OK. In the NAT rule configuration, verify that the network object (VPN-clients) is defined as the
destination address. For the translated packet, keep the static translation with the original addresses.
G) Click OK. Accept the popup window about identity NAT and proxy ARP. Apply the configuration.
Preview and send the commands.
Lab Guide
L-149
Step 2
Create a custom group policy for the Cisco AnyConnect VPN.
A
In the Cisco ASDM, choose Configuration > Remote Access VPN > Network (Client) Access >
Group Policies.
Choose Add > Internal Group Policy. Name the policy asa-group-policy, uncheck the banner Inherit
box and enter the Welcome! message in the Banner field. Click More Options and enable the
Clientless SSL VPN and SSL VPN Client protocols for the group policy.
Lab Guide
L-151
Step 3
Configure a new connection profile (asa-connection-profile) for DNS and IP address assignment:
A) Add a new connection profile (asa-connection-profile) in the Configuration > Remote Access VPN >
Network (Client) Access > AnyConnect Connection Profiles menu. Using a custom connection
profile is one possible approach. You could also implement the Cisco AnyConnect VPN by using the
default profile.
B) In the Aliases field, enter asa. The alias name will appear in the drop-down box when users connect.
C) Configure the IP address assignment based on the address pool (vpnpool).
D) Under Default Group Policy, choose asa-group-policy.
E) Enable the SSL VPN client protocol. It is a setting of the group policy attached to the connection
profile. You can, however, enable it in the connection profile configuration. Uncheck the Enable
IPsec(IKEv2) Client Protocol check box.
F) Set the DNS server address to 192.168.1.2 and the domain name to secure-x.local.
Activity Procedure
Complete the following steps:
Step 1
Choose Configuration > Remote Access VPN > Network (Client) Access > Group Policies. Edit the the
default group policy (DfltGrpPolicy). Configuring global settings in the default group policy and having
them inherited by the custom group policies will simplify the manageability.
Step 2
On the General page, choose vpnpool as the address pool. Although you previously set the address pool in
the connection profile, this group policy setting will be inherited by all custom group policies by default.
Step 3
Choose the Servers page and set the DNS server address to 192.168.1.2. Although you previously set the
DNS server address in the connection profile, this group policy setting will be inherited by all custom group
policies by default.
Lab Guide
L-153
Step 4
Configure split tunneling. Split tunneling defines which traffic will be routed through the tunnel toward the
VPN head-end. In this scenario you will specify the internal subnets that are reachable through the VPN
tunnel. This setting will allow connectivity to external destinations.
A) Choose Advanced > Split Tunneling.
B) Set the policy to the Tunnel Network List Below option.
C) Click Manage near the Network List drop-down list. Create a standard ACL (internal-subnets) with
ACEs that permit the inside network (192.168.1.0/24) and the DMZ network (172.16.1.0/24).
D) Click OK. Make sure that the traffic to the internal-subnets list will be tunneled.
Lab Guide
L-155
Step 1
Connect to the VPN portal from Internet Explorer on the Outside PC to https://Px-ASA.secure-x.public
(where the first x = pod number). Choose the asa group. Log in as vpnuser with the password cisco. Accept
the Welcome! banner about the asa group policy. Choose AnyConnect from the SSL VPN Service menu
and click the Start AnyConnect link.
Step 2
Accept the Microsoft ActiveX popup to install the Cisco AnyConnect client. Perform the installation. The
Cisco AnyConnect client will auto-install and establish the VPN connection to the Cisco ASA. You will see
the Cisco AnyConnect icon in the system tray.
Step 3
Disconnect from the VPN by choosing the VPN Disconnect option at the Cisco AnyConnect icon.
Reconnect by choosing the asa group (vpnuser/cisco) to test the connection by using the Cisco AnyConnect
GUI. Accept the banner about the asa group policy.
Step 4
With the VPN connection established, click the Cisco AnyConnect icon in the system tray to open the GUI.
Click the wheel icon in the left bottom corner of the GUI to open the Cisco AnyConnect Secure Mobility
Client window. Choose the Route Details tab to examine the secured routes. The secured routes result from
the split tunneling configuration.
Lab Guide
L-157
Step 5
In the Cisco ASDM on the Inside PC, choose Monitoring > VPN > VPN Connection Graphs > Sessions.
Choose SSL VPN Client Active Sessions and add it to the Selected Graphs window.
Click Show Graphs. You should see the Sessions, SSL VPN Client Active Sessions graph showing one
active session.
Step 6
In a web browser on the Outside PC, verify that you can access internal resources, such as http://
192.168.1.2 (http://inside-srv, http://inside-srv.secure-x.local), ftp://192.168.1.2 (ftp://inside-srv.securex.local), and http://172.16.1.2 (http://dmz-srv.secure-x.local and ftp://dmz-srv.secure-x.local).
Step 7
On the Outside PC, disconnect from the VPN by choosing the VPN Disconnect option at the Cisco
AnyConnect icon. Verify that you cannot connect to the internal resources when the VPN tunnel is
disconnected.
Lab Guide
L-159
Step 8
In the Cisco ASDM examine the Sessions, SSL VPN Client Active Sessions graph once again.
The Sessions, SSL VPN Client Active Sessions graph should show zero active sessions.
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
Lab Guide
L-163
Step 1
Verify that the Cisco ASA is configured to communicate with the LDAP server running on the Inside
server:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > AAA
Server Groups. The AAA Server Groups panel is displayed.
B) Choose LDAP-AD in the AAA Server Groups area of the AAA Server Groups panel.
C) In the Servers in the Selected Group area, click Edit. The Edit AAA Server window opens.
D) Use the following information to verify an LDAP AAA server:
Interface Name: inside
Server Name or IP Address: 192.168.1.2
Server Type: Microsoft
Base DN: DC=secure-x,DC=local
Scope: All levels beneath the base DN
Naming Attribute: sAMAccountName
Login DN: CN=Administrator,CN=Users,DC=secure-x,DC=local
Login Password: Cisco123
Lab Guide
L-165
Step 2
Configure a connection profile to use the new AAA configuration:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Network (Client) Access >
AnyConnect Connection Profiles. The Connection Profiles panel is displayed.
B) Choose the connection profile that is named asa-connection-profile and click Edit. The Edit
AnyConnect Connection Profile window opens.
C) In the Authentication area, choose LDAP-AD from the AAA Server Group drop-down list.
D) Click OK.
E) Click Apply in the Connection Profiles panel.
Activity Verification
Use the test functionality in the Cisco ASDM to verify your LDAP configuration.
Note
This activity only verifies that the Cisco ASA can use Active Directory on the Inside server to
authenticate a user.
Step 1
In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server
Groups. The AAA Server Groups panel is displayed.
Step 2
In the AAA Server Groups area, choose the LDAP-AD server group.
Step 3
In the Servers in the Selected Group area, choose the AAA server 192.168.1.2.
Step 4
Click Test. The Test AAA Server window opens.
Step 5
Click the Authentication radio button and log in with the username it1 and the password cisco. This user
account exists in Active Directory but not in the Cisco ASA local user database.
Step 6
Click OK. A new window should open and display a message indicating that the authentication test was
successful between the Cisco ASA and Active Directory.
Step 7
To test Cisco AnyConnect VPN authentication using the Active Directory server, connect to the VPN portal
in Internet Explorer on the Outside PC to https://Px-ASA.secure-x.public (where the first x = pod number).
Choose the asa group. Log in as it1 with the password cisco. Accept the Welcome! banner about the asa
group policy and click Continue. The Cisco AnyConnect client will auto-install and establish the VPN
connection to the Cisco ASA. You will see the Cisco AnyConnect icon in the system tray.
Step 8
Disconnect the Cisco AnyConnect connection and log out of the SSL VPN portal.
Lab Guide
L-167
D) Click OK.
E) Click Apply in the Connection Profiles panel.
Step 2
To test ICMP traffic to inside hosts from the Outside PC, connect to the VPN portal at https://PxASA.secure-x.public (where the first x = pod number). Choose the asa group. Log in as vpnuser with the
password cisco.
A) Open the command prompt and ping the Inside server (192.168.1.2) and Inside PC (192.168.1.3). The
ping should be successful.
B) Disconnect the Cisco AnyConnect connection and log out of the SSL VPN portal.
Step 3
Configure an ACL that denies ICMP traffic to the inside network (192.168.1.0):
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Network (Client) Access >
Advanced > ACL Manager.
B) Configure an ACL (Block-ICMP-to-Inside-Network) and add ACEs to the ACL that denies ICMPv4 to
the inside network object group and permits all other traffic.
Lab Guide
L-169
Step 4
Apply the ACL (Block-ICMP-to-Inside-Network) to the asa-group-policy. This group policy will be applied
when you connect to the VPN as vpnuser.
A) Choose Configuration > Remote Access VPN > Network (Client) Access > Group Policies.
B) Edit the group policy that is named asa-group-policy. On the General page, click More Options.
C) In the Tunneling Protocols section, uncheck the Clientless SSL VPN option.
D) Uncheck Inherit and then choose the ACL (Block-ICMP-to-Inside-Network) from the Filter dropdown box.
Step 5
Test local authorization:
A) From the Outside PC, reconnect to the VPN portal at https://Px-ASA.secure-x.public (where the first x
= pod number). Choose the asa alias. Authenticate as vpnuser with the password cisco.
B) From the Inside PC, go to Cisco ASDM and choose Monitoring > VPN > VPN Statistics > Sessions.
In the Sessions window, choose AnyConnect Client in the Filter By drop-down list, and click Details.
On the ACL tab, examine the ACL that is applied to the session (click Details and then choose the
ACL tab). You will see that the local ACL has been applied to the session.
C) On the Outside PC, recheck the ICMP traffic by doing ping tests to the Inside server (192.168.1.2) and
the Inside PC (192.168.1.3). The ping test should fail because the ACL on the Cisco ASA denies ICMP
traffic to inside traffic.
Lab Guide
L-171
D) Disconnect the VPN session and log out of the SSL VPN portal.
Step 1
Configure the Cisco AnyConnect connection profile to use the LDAP-AD server group for AAA:
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > Network (Client) Access >
AnyConnect Connection Profiles. The Connection Profiles panel is displayed.
B) Choose the connection profile that is named asa-connection-profile and click Edit. The Edit
AnyConnect Connection Profile window opens.
C) In the Authentication area, choose LDAP-AD from the AAA Server Group drop-down list.
D) Click OK.
E) Click Apply in the Connection Profiles panel.
Lab Guide
L-173
Step 2
On the Cisco ASA, verify an LDAP map that maps the Active Directory attribute that is named memberOf
to the IETF-Radius-Class attribute that is understood by the Cisco ASA.
A) In the Cisco ASDM, choose Configuration > Remote Access VPN > AAA/Local Users > LDAP
Attribute Map >My-Attribute-Map. Click Edit. The Edit LDAP Attribute Map panel is displayed.
B) Verify that the Mapping of Attribute Name and Mapping of Attribute Value fields are assigned to MyAttribute-Map.
C) Click OK.
Step 3
Verify that the LDAP is mapped to the server and is configured for LDAP authentication:
A) Choose Configuration > Remote Access VPN > AAA/Local Users > AAA Server Groups. The
AAA Server Groups panel is displayed.
B) Choose LDAP-AD in the AAA Server Groups window and click Edit in the Servers in the Selected
Group. The Edit AAA Server window opens.
C) In the LDAP Attribute Map drop-down list, verify that My-Attribute-Map is chosen.
D) Click OK.
Activity Verification
Step 1
From the Outside PC, open Internet Explorer and connect to the VPN portal page at https://Px-ASA.securex.public (where the first x = pod number).
Step 2
In the login window, choose the asa connection profile and log in as it1 with the password cisco.
Lab Guide
L-175
Step 3
Verify that it1 logs in successfully and has the group policy SSH-RDP-POLICY applied. When this group
policy, with the SSL VPN client enabled, is applied, the user should be able to do the following:
A) Use PuTTY to establish an SSH connection to the DMZ server (172.16.1.2) (login credentials: root/
Ci5coAdmin).
B) Establish a Remote Desktop Connection to the Inside server (192.168.1.2). You can start the MS
Terminal Services client by invoking mstsc from the Start menu (login credentials: administrator/
Cisco123).
Step 4
Disconnect the VPN session and log out of the SSL VPN portal.
Step 1
Connect to the Outside PC and uninstall the Cisco AnyConnect Mobility client that was installed via the
web deployment:
A) Choose Start > All Programs > Control Panel > Programs and Features. Choose Cisco
AnyConnect Secure Mobility Client. Click Uninstall and then click Yes.
Lab Guide
L-177
Step 2
On the Outside PC, install the Cisco AnyConnect Secure Mobility Client as a standalone or predeployment
application:
A) Go to D:\AnyConnect\anyconnect-win-3.1.04059-pre-deploy-k9 folder. Launch Setup.exe. The
Cisco AnyConnect Secure Mobility Client Install Selector window opens.
Step 4
Configure the VPN to start when Cisco AnyConnect is started:
A) Click the Cisco AnyConnect icon in the system tray to open the GUI. Notice that the standalone or
predeployment version of Cisco AnyConnect Secure Mobility Client looks different from the webinstalled client. It shows attributes like Network and Web Security that we chose during installation as
well as the preconfigured VPN profile of px-asa.secure-x.public (where the first x = pod number).
B) Click the wheel icon in the left bottom corner of the GUI to open the Cisco AnyConnect Secure
Mobility Client window. Choose Start VPN When AnyConnect Is Started.
Lab Guide
L-179
Step 6
Disconnect the VPN session and log out of the SSL VPN portal.
Lab Guide
L-181
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Inside server
Outside PC
Cisco ASA 5512 Adaptive Security Appliance
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
Outside PC username/password
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
Administrator/Cisco123
student/C!sco!23
Lab Guide
L-185
Step 2
Create a custom group policy (ipsec-weblaunch-policy) that allows Cisco AnyConnect SSL and IPsec:
A) In the Cisco ASDM on the Inside PC, choose Configuration > Remote Access VPN > Network
(Client) Access > Group Policies.
B) Add an internal group policy (ipsec-weblaunch-policy). Choose General > More Options >
Tunneling Protocols. Enable the SSL VPN client and IPsec IKEv2.
Note
The SSL VPN client protocol needs to be enabled along with IPsec IKEv2 because the initial
connection to the VPN server uses SSL/DTLS.
Step 3
Create a new Cisco AnyConnect profile (Configuration > Remote Access VPN > Network (Client)
Access > AnyConnect Client Profile) for IPsec access with these settings:
A) Name: ipsec
B) Profile Usage: AnyConnect VPN Profile (default)
C) Profile Location: disk0:/ipsec.xml (default)
D) Group Policy: ipsec-weblaunch-policy
E) Click OK and then edit the ipsec profile with the Edit button. In the server list, create an entry with
these attributes:
Host Display Name: IPsec VPN
FQDN: px-asa.secure-x.public (where the first x = pod number)
Primary Protocol: IPsec
Lab Guide
L-187
F) Leave the other settings at their default values. Accept and apply the configuration.
Step 4
Create a new connection profile (Configuration > Remote Access VPN > Network (Client) Access >
AnyConnect Connection Profiles) for IPsec access with these attributes:
A) Name: ipsec-weblaunch
B) Alias: ipsec-weblaunch
C) Group Policy: ipsec-weblaunch-policy
D) Leave the other settings at their default values. The missing values, such as the address pool, will be
inherited from the default group policy.
Lab Guide
L-189
Step 5
On the Outside PC establish a connection to https://px-asa.secure-x.public (where the first x = pod number).
Choose the group alias that is named ipsec-weblaunch. Log in as vpnuser with the password cisco.
Step 6
Verify the Cisco AnyConnect status after the first connection with the connection profile and group policy
that are configured for IPsec/IKEv2:
A) Click the wheel symbol in the GUI. Go to the Statistics tab and examine the details in the Transport
Information section. You will see that the transport protocol for the first connection is DTLS. DTLS is
used for the initial Cisco AnyConnect session, during which the Cisco AnyConnect profile is
downloaded from the Cisco ASA.
B) In the Cisco ASDM, choose Monitoring and verify that the VPN server also reports the connection as
a DTLS session.
C) On the Outside PC, view the content of the folder that is located at C:\ProgramData\Cisco\Cisco
AnyConnect Secure Mobility Client\Profile. You should see that the ipsec.xml file has been
successfully downloaded from the VPN server.
Note
If the folder is hidden, choose Organize > Folder and Search Options > View. Click the Show
Hidden Files, Folders, and Drives radio button. Apply it to all folders and click OK.
Lab Guide
L-191
Step 7
Examine the transport of the subsequent Cisco AnyConnect connections:
A) On the Outside PC, disconnect and restart the Cisco AnyConnect connection. The Cisco AnyConnect
GUI should display IPsec VPN, the VPN server ID from the received Cisco AnyConnect profile.
Connect by using the ipsec-weblaunch profile. Log in as vpnuser with the password cisco.
B) Click the wheel symbol in the GUI. Go to the Statistics tab and examine the details in the Transport
Information section. You should see that the transport protocol for the subsequent connections is
IKEv2/IPsec.
C) In ASDM monitoring, verify that the transport protocol of the VPN connection is IKEv2/IPsec.
Disconnect the session.
Step 8
Configure the Cisco AnyConnect profile (ipsec) for the automatic choice of the group alias:
A) Choose Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Client
Profile.
B) Edit the profile that is named ipsec.
C) In the Server List Entry window, click IPsec VPN to edit the VPN server entry. Set the user group to
the connection profile name (ipsec-weblaunch).
Lab Guide
L-193
Step 9
From the Outside PC, reconnect to the IPsec VPN by using the same method and then disconnect. As a
result of this connection, the updated Cisco AnyConnect profile will be downloaded to the Outside PC.
Open the ipsec.xml file in the folder that is located at C:\ProgramData\Cisco\Cisco AnyConnect Secure
Mobility Client\Profile. You should see that the VPN server entry has been updated with the user group.
Step 10
From the Outside PC, reconnect to the IPsec VPN by using the IPsec VPN entry. You will not need to
choose the connection profile because this information has been retrieved from the downloaded Cisco
AnyConnect profile. Log in as vpnuser.
Step 11
From the Outside PC, verify that you can access internal resources. For example use ping, FTP, and HTTP
connections to 192.168.1.2 (inside-srv.secure-x.local) or 172.16.1.2 (dmz-srv.secure-x.local). The group
policy that is named ipsec-policy does not require any local or external authorization. You could enhance
the scenario by using the mechanisms demonstrated for the client access. Disconnect the session.
Lab Guide
L-195
Visual Objective
In this lab, two pods will work together to form an active/standby configuration. Please coordinate the
activities between the team members of the two pods.
In this lab, you will partner with another pod to configure a two-unit failover in which the following occurs:
Pod 1 and Pod 2 will form a two-unit configuration: Pod 1 = Pod x, and Pod 2 = Pod x+1.
Pod 3 and Pod 4 will form a two-unit configuration: Pod 3 = Pod x, and Pod 4 = Pod x+1.
Pod 5 and Pod 6 will form a two-unit configuration: Pod 5 = Pod x, and Pod 6 = Pod x+1.
Pod 7 and Pod 8 will form a two-unit configuration: Pod 7 = Pod x, and Pod 8 = Pod x+1.
Pod 9 and Pod 10 will form a two-unit configuration: Pod 9 = Pod x, and Pod 10 = Pod x+1.
Pod 11 and Pod 12 will form a two-unit configuration: Pod 11 = Pod x, and Pod 12 = Pod x+1.
Pod 13 and Pod 14 will form a two-unit configuration: Pod 13 = Pod x, and Pod 14 = Pod x+1.
Pod 15 and Pod 16 will form a two-unit configuration: Pod 15 = Pod x, and Pod 16 = Pod x+1.
The figure illustrates what you will accomplish in this activity.
Required Resources
These resources are the resources and equipment that are required to complete this activity:
Inside PC
Two Cisco ASA 5512 Adaptive Security Appliances (one is a security appliance from a peer pod)
DMZ server
Outside server
Shared (core) Cisco Catalyst switch (not shown)
Command List
The table describes the commands that are used in this activity. The commands are listed in alphabetical
order so that you can easily locate the information that you need. Refer to this list if you need configuration
command assistance during the lab activity.
Commands
Command
Description
configure terminal
failover active
This command forces the security appliance to assume the active role.
This command specifies the hosts that can access the HTTP server
internal to the security appliance.
nameif if_name
reload
show failover
This command displays information about the failover status of the unit.
Job Aids
These job aids are available to help you complete the lab activity.
Client and Server Access Information
Pod number
DMZ server username/password
student/Ci5coAdmin
student/Ci5coAdmin
Inside PC username/password
student/Ci5coAdmin
student/C!sco!23
C!sco!23
Lab Guide
L-199
<output omitted>
aaa authentication http console LOCAL
aaa authentication ssh console LOCAL
<output omitted>
http server enable
http 192.168.1.0 255.255.255.0 inside
<output omitted>
Step 4
Access the Px+1 Inside PC. Verify Cisco ASDM connectivity from the Inside PC to Px+1 ASA by
launching the Cisco ASDM-IDM launcher. Enter 192.168.1.12 as the device IP address. Use the ID of
student and the password of C!sco!23. This login should be successful.
Step 5
Return to the Px+1 ASA CLI. To verify connectivity from Px+1 ASA to the Px ASA, ping the Px ASA
inside interface (192.168.1.1). The ping should be successful.
Activity Verification
You have completed this task when you attain this result:
Step 1
You verified connectivity from the Px+1 ASA to the Px ASA inside interface:
Px+1-ASA# ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
Do not use the High Availability and Scalability wizard to configure active/standby failover.
Lab Guide
L-201
Step 4
Use the following parameters for the LAN failover interface:
Interface: GigabitEthernet0/3
Active IP Address: 1.1.1.1
Standby IP Address: 1.1.1.12
Subnet Mask: 255.255.255.0
Logical Name: FAILOVER
Step 5
Assign the primary role to the Px-ASA security appliance.
Step 6
Click Apply, and then click Save.
Step 7
When you are asked to configure the failover peer firewall, click No.
Step 8
From the peer Px+1 Inside PC, open a Cisco ASDM session to the secondary Cisco ASA security appliance
at 192.168.1.12.
Step 9
Repeat Steps 3 and 4 on the secondary security appliance.
Step 10
Assign the secondary role to the secondary security appliance.
Step 11
When you are asked to configure the failover peer firewall, click No.
Step 12
Click Apply, and then click Save. Close the Cisco ASDM window for the secondary security appliance.
Step 13
Observe the CLIs for the primary and secondary security appliances. You should see that both security
appliances detected each other and that the configuration has been replicated from the primary security
appliance (Px-ASA) to the secondary security appliance (Px+1-ASA).
Px-ASA#
No Active mate detected
Beginning configuration replication: Sending to mate.
End Configuration Replication to mate
Px+1-ASA#
Detected an Active mate
Beginning configuration replication from mate.
WARNING: Failover is enabled but standby IP address is not
interface.
WARNING: Failover is enabled but standby IP address is not
interface.
WARNING: Failover is enabled but standby IP address is not
interface.
WARNING: This command will not take effect until interface
an IPv4 address
WARNING: This command will not take effect until interface
an IP address
End configuration replication from mate.
Px-ASA#
Lab Guide
L-203
Note
Notice the device hostname change on the secondary appliance. This change is due to the replication of
the configuration from the primary security appliance. You will change the hostname prompt in the next
step.
Step 14
Access the CLI of the primary (active) appliance and configure the command-line prompt to show the
hostname, state, and priority of the appliance.
Px-ASA(config)# prompt hostname state priority
Px-ASA/act/pri(config)#
Step 15
Save the configuration.
Step 16
Display and examine the failover status on the primary appliance. Answer the following questions:
1
Activity Verification
You have completed this task when you attain these results:
Step 1
You observed the primary ASA CLI:
Px-ASA# Beginning configuration replication: Sending to mate.
End Configuration Replication to mate
Step 2
You observed the secondary ASA CLI:
Px+1-ASA# Detected an Active mate
End configuration replication from mate.
Step 3
You displayed and examined the failover status:
Lab Guide
L-205
Step 3
Click Apply, and then click Save.
Step 4
Access the CLI of the active Cisco ASA security appliance.
Step 5
Display and examine the failover status. You should see that the primary appliance is active and the
secondary appliance is standby. All interfaces should be in a normal state. Hardware failover should be
operational now.
Step 6
Return to the Px Inside PC and open a command prompt. Ping the Outside server at 209.165.202.130
continuously (use the t option). The ping should be successful. Leave the window open.
Step 7
Open a new command prompt. Open an FTP session to the Outside server at 209.165.202.130. Log in with
the username anonymous and the password cisco. Use the ls command to list the files that are available on
the server. You should be successful. Leave the window open.
Note
Ensure that you have saved the configuration to the active appliance before proceeding to the next step.
Step 8
Access the active CLI of the Cisco ASA security appliance and reload the Cisco ASA security appliance.
Access the CLI of the standby security appliance and observe the standby Cisco ASA security appliance.
The standby appliance should become active after the hold time expires.
How long did it take for the secondary Cisco ASA security appliance to take over?
Step 9
Return to the Px Inside PC and observe pings to the server at 209.165.202.130. After you reload the primary
Cisco ASA security appliance, the pings should stop flowing. When the secondary appliance became active,
pings should start to flow again.
Step 10
Return to the FTP session to the server. Try to list the files again by using the ls command.
Can you list the files over the FTP session? Why or why not?
Step 11
Access the CLI of the secondary (now active) Cisco ASA security appliance and examine the failover
status. You should see that the secondary appliance is now active and the primary appliance is standby. All
interfaces should be in a normal state.
Step 12
Close all command prompts on the Px Inside PC.
Step 13
Access the CLI of the primary Cisco ASA security appliance (Px-ASA). Return the original active Cisco
ASA security appliance to the active unit role with the failover active command.
Activity Verification
You have completed this task when you attain these results:
Step 1
You pinged the Outside server:
C:\>ping 209.165.202.130 -t
Pinging 209.165.202.130 with 32 bytes of data:
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
<output omitted>
Step 2
You successfully opened an FTP session to the Outside server and listed the files.
Lab Guide
L-207
Step 3
You observed the pings to the Outside server during failover:
C:\>ping 209.165.202.130 -t
<output omitted>
Reply from 209.165.202.130:
Reply from 209.165.202.130:
Reply from 209.165.202.130:
Request timed out.
Request timed out.
Request timed out.
Reply from 209.165.202.130:
Reply from 209.165.202.130:
<output omitted>
Step 4
You tried to list the files on the FTP server after failover, which should be unsuccessful.
Step 5
You displayed and examined the failover status after the switchover occurred:
Px-ASA/act/sec# show failover
Failover On
Failover unit Secondary
Failover LAN Interface: FAILOVER GigabitEthernet0/3 (up)
Unit Poll frequency 1 seconds, holdtime 15 seconds
Interface Poll frequency 5 seconds, holdtime 25 seconds
Interface Policy 1
Monitored Interfaces 3 of 114 maximum
Version: Ours 9.1(2), Mate 9.1(2)
Last Failover at: 08:07:07 pst Sep 19 2013
This host: Secondary - Active
Active time: 434 (sec)
slot 0: ASA5512 hw/sw rev (1.0/9.1(2)) status (Up Sys)
Interface outside (209.165.201.2): Normal (Monitored)
Interface inside (192.168.1.1): Normal (Monitored)
Interface dmz (172.16.1.1): Normal (Monitored)
slot 1: CXSC5512 hw/sw rev (N/A/9.1.2) status (Up/Up)
ASA CX, 9.1.2, Up
Other host: Primary - Standby Ready
Active time: 0 (sec)
slot 0: ASA5512 hw/sw rev (1.0/9.1(2)) status (Up Sys)
Interface outside (209.165.201.12): Normal (Monitored)
Interface inside (192.168.1.12): Normal (Monitored)
Interface dmz (172.16.1.12): Normal (Monitored)
slot 1: CXSC5512 hw/sw rev (N/A/9.1.2) status (Up/Up)
ASA CX, 9.1.2, Up
Stateful Failover Logical Update Statistics
Link : Unconfigured.
Step 6
You returned the original Cisco ASA security appliance to the active unit role.
Lab Guide
L-209
Step 3
Click Apply, and then click Save.
Step 4
Access the CLIs for both Cisco ASA security appliances. Examine the failover status. You should see the
unit poll frequency and hold timers.
Px-ASA/act/pri# show failover
Failover On
Failover unit Primary
Failover LAN Interface: FAILOVER GigabitEthernet0/3 (up)
Unit Poll frequency 300 milliseconds, holdtime 900 milliseconds
Px-ASA/stby/sec# show failover
Failover On
Failover unit Secondary
Failover LAN Interface: FAILOVER GigabitEthernet0/3 (up)
Unit Poll frequency 300 milliseconds, holdtime 900 milliseconds
Step 5
Return to the Px Inside PC and open a command prompt. Ping the Outside server at 209.165.202.130
continuously (use the t option). You should be successful. Leave the window open.
Note
Ensure that you have saved the configuration to the active appliance before proceeding to the next step.
Step 6
Reload the active Cisco ASA security appliance. Access the CLI of the standby appliance and observe the
standby security appliance. The standby Cisco ASA security appliance should become active after the hold
time expires.
How long did it take the secondary appliance to take over this time?
Step 7
Return to the client PC and observe the pings to the Outside server at 209.165.202.130. After you reloaded
the primary Cisco ASA security appliance, the traffic should stop flowing. When the secondary appliance
became active, traffic should start to flow again. However, this time you should lose no more than one ping
packet during the switchover.
Step 8
Close the command prompt on the Inside PC.
Step 9
Return the original active Cisco ASA security appliance (Px-ASA) to the active unit role with the failover
active command.
Activity Verification
You have completed this task when you attain these results:
Step 1
You pinged the Outside server:
C:\>ping 209.165.202.130 -t
Pinging 209.165.202.130 with 32 bytes of data:
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
Reply from 209.165.202.130: bytes=32 time=1ms TTL=126
<output omitted>
Step 2
You observed the standby security appliance CLI:
Px-ASA/stby/sec#
Switching to Active
Px-ASA/act/sec#
Step 3
You observed the pings to the Outside server during failover:
Lab Guide
L-211
C:\>ping 209.165.202.130 -t
<output omitted>
Reply from 209.165.202.130:
Reply from 209.165.202.130:
Reply from 209.165.202.130:
Request timed out.
Reply from 209.165.202.130:
Reply from 209.165.202.130:
<output omitted>
Step 4
You returned the original Cisco ASA security appliance to the active unit role.
Step 3
Click Apply, and then click Save.
Step 4
Access the CLI of the active Cisco ASA security appliance and examine the failover status. You should see
stateful failover update statistics, which indicate that state information is exchanged between both security
appliances
Step 5
Return to the Px Inside PC and open a command prompt. Open an FTP session to the Outside server at
209.165.202.130. Log in with the username anonymous and the password cisco. Use the ls command to list
the files that are available on the server. This attempt should be successful. Leave the window open.
Note
Make sure that you have saved the configuration to the active appliance before proceeding to the next
step.
Step 6
Access the CLI of the active Cisco ASA security appliance and reload the Cisco ASA security appliance.
Access the CLI of the standby appliance and observe the standby Cisco ASA security appliance. The
standby Cisco ASA security appliance should become active after the hold time expires.
Lab Guide
L-213
Step 7
Return to the FTP session on the Inside PC. Try to list the files again.
Can you list the files over the FTP session after the failover? Why?
Step 8
Close all command prompts on the Inside PC.
Step 9
Return the original active Cisco ASA security appliance (Px-ASA) to the active unit role with the failover
active command.
Step 10
Remove all failover configurations, including standby IP addresses, from both appliances.
Activity Verification
You have completed this task when you attain these results:
Step 1
You examined the failover status:
Step 2
You successfully opened an FTP session to the Outside server and listed the files.
Lab Guide
L-215
Step 3
You observed the standby ASA CLI:
Px-ASA/stby/sec#
Switching to Active:
Px-ASA/act/sec#
Step 4
You successfully listed the files on the FTP server after the failover.
Step 5
You removed all failover configurations, including standby IP addresses, from both security appliances.
Step 3
Reload the security appliance:
Px-ASA# reload
Step 6
Verify the running image and Cisco ASDM image:
Px-ASA# show version
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
no shutdown
Step 3
Configure the device settings:
Hostname Px-ASA
Domain-name secure-x.local
Enable password C!sco!23
Step 4
Enable SSH and the HTTP server. Grant access for the administrators on the inside 192.168.1.0/24 network:
http server enable
http 192.168.1.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
Step 5
Create the user in the LOCAL database:
username student password C!sco!23 encrypted privilege 15
Step 6
Enable ASDM and SSH authentication:
Lab Guide
L-219
Step 3
Expand the NAT section and check the Add Automatic Address Translation Rules check box:
Step 4
Enter the advanced NAT settings:
Lab Guide
L-221
Step 6
Add a network object for the inside network:
Step 7
Expand the NAT section and set the parameters:
Lab Guide
L-223
Step 8
Enter the advanced NAT settings:
Task 2: Configure Manual NAT for the DMZ Server and Client
Network
Step 1
Add a NAT rule before the Network Object NAT rule for traffic from the DMZ server to the outside
network:
Lab Guide
L-225
Step 7
Add a NAT rule before the Network Object NAT rule for the traffic from the inside network to the DMZ
server:
Lab Guide
L-227
Step 3
Create another service group that is named OUTSIDE_SERVICES:
Step 5
Create a network object group that is named SERVERS:
Lab Guide
L-229
Step 10
Configure an input access list on the inside interface:
Lab Guide
L-231
Step 8
Return the public server to its previous configuration:
Lab Guide
L-233
Step 4
Add the new object to the SERVERS object group:
Lab Guide
L-235
inspection_default
default-inspection-traffic
global_policy
inspection_default
ftp
h323 h225
h323 ras
rsh
rtsp
esmtp
sqlnet
skinny
sunrpc
xdmcp
sip
netbios
tftp
ip-options
Step 5
Enable ICMP and disable FTP:
Lab Guide
L-237
Step 3
Create a new service policy (OUTSIDE-POLICY) and change the rule actions:
Lab Guide
L-239
Step 2
Create a new service policy (OUTSIDE-POLICY):
Step 6
Create a new service policy (OUTSIDE-POLICY):
Lab Guide
L-241
Lab Guide
L-243
Step 4
Enable HTTP protocol verification:
Step 5
Create a new service policy rule (WEB-SERVER-PROTECTION):
Lab Guide
L-245
Step 15
Create a regular expression class:
Step 20
Verify the service policy statistics:
Px-ASA# show service-policy inspect http
Global policy:
Service-policy: global_policy
Class-map: WEB-SERVER-PROTECTION
Inspect: http MY-HTTP-POLICY, packet 4, lock fail 0, drop 1, reset-drop 1, v6fail-close 0
protocol violations
log, packet 0
match request uri regex class DMZ-REGEX
reset log, packet 1
Class-map: inspection_default
Lab Guide
L-247
Step 2
Create a new service policy rule:
Step 3
Make sure that the configured service policy rule will be matched before the default service policy rule:
Lab Guide
L-249
Lab Guide
L-251
Lab Guide
L-253
Step 9
Configure the secondary appliance (Px+1-ASA) for failover:
Step 14
Configure the command-line prompt to show the name, state, and priority of the appliance:
Px-ASA(config)# prompt hostname state priority
Px-ASA/act/pri(config)#
Step 16
Display and examine the failover status on the primary appliance. Answer the following questions:
1
No.
Lab Guide
L-255
Step 8
How long did it take for the secondary Cisco ASA security appliance to take over?
It took approximately 15 seconds.
Step 10
Can you list the files over the FTP session? Why or why not?
No. The connection was reset.
Step 6
How long did it take the secondary appliance to take over?
It took less than 1 second.
Step 7
Can you list the files over the FTP session after the failover? Why?
Yes. State information is exchanged between the appliances.
Lab Guide
L-257