Cisco ASA Firewall Configuration
Cisco ASA Firewall Configuration
Cisco ASA Firewall Configuration
Contents
1 Introduction
2 Design
3 Topologies
4 Configuration Details
5 Configuration Data
5.1 Inspection Policy
5.2 Access List Examples
5.2.1 Object Groups
5.2.2 Cisco Unified Communication Manager and Phones
5.2.3 Cisco Unified Communication Manager and Soft Clients
5.2.4 Multicast Music on Hold
5.2.5 Media sources in data center
5.2.6 H.323 Gateways and gatekeepers
5.2.7 SCCP Gateways
5.2.8 MGCP Gateways
5.2.9 SIP Gateways
5.2.10 IPSec Gateways
5.2.11 Media Resources
5.2.12 SIP ICT
5.2.13 Extension Mobility Cross Cluster (EMCC)
5.2.14 H.323 ICT
5.2.15 SAF
5.2.16 SIP Trunk to/from CUCME
5.2.17 H.323 Trunk to/from CUCME
5.2.18 Centralized TFTP
5.2.19 SMTP server
5.2.20 User Access to Cisco Unified Communication Manager
5.2.21 Cisco Unified Communication Manager Intracluster (Clustering over
WAN) Communication
5.2.22 Intercompany Media Engine (IME)
5.2.23 Unity
5.2.24 Unity Connection
5.2.25 Cisco Unity Express
5.2.26 Unified Messaging Gateway
5.2.27 Meeting Place
5.2.28 Contact Center Express Agents
5.2.29 Contact Center Express Intracluster (Clustering over WAN)
Communication
5.2.30 CUCME to CUCCX
5.2.31 Attendant Console
5.2.32 Presence
5.2.33 Sametime
5.2.34 OCS and MOC
5.2.35 1040 Sensors
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 2 of 18
5.2.36 Wireless
5.2.37 Cisco Emergency Response
5.2.38 PC's to CVTA port on phone
5.2.39 Generic network management access
6 Related Documentation
Introduction
This page provides information on how the Cisco ASA 5500 Series Adaptive Security Appliance is
configured during Unified Communications system testing when it is deployed in the data center for
protecting Unified Communications servers.
The configuration information is based on system testing performed in various test beds during Cisco
Unified Communications system releases.
The page does not contain detailed step-by-step procedures; for detailed information about installing,
configuring, and administering the Cisco ASA 5500 Series Adaptive Security Appliance, refer to the
pointers in the Related Documentation section.
Design
For information on design considerations and guidelines for deploying the Cisco ASA 5500 Series
Adaptive Security Appliance in a UC environment, see the Voice Security chapter of the Cisco
Unified Communications Manager 8.x Solution Reference Network Design (SRND). For more
generic data center security design considerations refer to the Data Center Security Design Guides.
For information on specific deployments and sites where Cisco ASA 5500 Series Adaptive Security
Appliance solution testing was performed, see the Tested Deployments and Site Models for IPT
Enterprise.
Topologies
This section provides information on where the Cisco ASA 5500 Series Adaptive Security Appliance
is located relative to other components when it is used for data center deployments during Cisco
Unified Communications solution testing.
The purpose of the data center firewall is to protect the servers in the data center from the rest of the
enterprise network. Consequently, the firewall is positioned such that its more trusted ("inside")
interface faces the UC servers in the data center and its less trusted ("outside") interface faces the
clients. A data center firewall may have more than two interfaces, each with a different security level
to distinguish between different trust levels of certain servers and/or clients. Cisco Unified
Communications solution testing currently only covers the scenario where the firewall has two
interfaces.
An enterprise network may have multiple data centers, in which case the servers in different data
centers may need to talk to each other. This can be achieved through a backend connection that does
not traverse the firewalls, or through the firewalls themselves. Unified Communications solution
testing covers scenarios where the data center to data center traffic flows through the data center
firewalls.
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 3 of 18
The above picture shows dual firewalls in front of each data center, for redundancy. For Unified
Communications solution testing these firewall pairs are always configured for active/standby
operation.
From the Unified Communications perspective the above topology represents two significantly
different cases depending on whether the UC servers in the two data centers belong to the same
cluster or to two different clusters. Unified Communications solution testing covers both scenarios.
Configuration Details
This section provides the high-level tasks and related information for configuring the Cisco ASA
5500 Series Adaptive Security Appliance as a data center firewall that protects Unified
Communications servers.
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 4 of 18
Configuration
Solution Test Specifics More Information
Tasks
ACL Configuration
Overview
There are no explicit Port Usage for Cisco
3. Access list
recommendations on how to Unified
entries to allow
configure ACEs for UC traffic. Communications
Unified
The Access List Examples section
Communications Manager 8.0
contains the ACL template used
traffic flows. Port Usage for Cisco
for solution testing.
Unified Presence 8.0
Port Usage for Cisco
Unified CCX 8.0
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 5 of 18
Configuration Data
This section contains configuration examples that illustrate how the ASA firewalls are configured in
solution testing. The provided examples cover only parts of the firewall configuration; the sum of the
examples does not make up a complete configuration. The intention is to provide reference points to
a person who is familiar with the ASA firewall. The examples are not a substitute for the
configuration and design guides referenced in the Related Documentation section.
Inspection Policy
The following is a typical inspection policy used for solution testing where TLS Proxy is not
required:
class-map inspection_default
match default-inspection-traffic
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
!
policy-map type inspect h323 RRQ-RCF-INSPECTION
parameters
ras-rcf-pinholes enable
!
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect esmtp
inspect ftp
inspect h323 h225
inspect h323 ras
inspect icmp
inspect icmp error
inspect mgcp
inspect rsh
inspect sip
inspect skinny
inspect tftp
inspect h323 ras RRQ-RCF-INSPECTION
!
service-policy global_policy global
The RRQ-RCF-INSPECTION policy-map is used to turn on a relatively new feature on the ASA
that inspects the registration messages H.323 endpoints exchange with gatekeepers. This is useful if
the CUCM protected by the ASA has gatekeeper controlled H.225 trunks. For such trunks the
CUCM accepts connections on a randomly chosen port and this port is registered with the
gatekeeper. Without inspecting the registration messages the ASA would not know where to expect
the H.225 connections.
In cases where TLS Proxy is required, the following additions are made to the inspection policy:
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 6 of 18
tls-proxy TLS-PROXY
server trust-point TLS-PROXY-TP
client ldc issuer LDC-SIGNER-TP
client ldc key-pair PHONE-COMMON-KEY
client cipher-suite 3des-sha1 aes128-sha1 aes256-sha1 des-sha1 null-sha1 rc4-sha1
!
class-map SECURE-SIP
match port tcp range 5061 5062
class-map SECURE-SKINNY
match port tcp eq 2443
!
policy-map global_policy
class SECURE-SIP
inspect sip tls-proxy TLS-PROXY
class SECURE-SKINNY
inspect skinny tls-proxy TLS-PROXY
The ASA firewall is capable of applying different access lists on each interface, and separate access
lists for traffic entering and leaving an interface. Solution testing is conducted with the same access
list (GLOBAL-ACL) applied on both the inside and the outside interface and only to the traffic
entering the interfaces:
We apply an access list to both the inside and the outside interface to increase our chances to
discover problems. It is not a technical requirement to have an access list on both interfaces;
depending on your security policy, it may be appropriate to not apply any access list to traffic that
enters through the "inside" interface.
We chose to apply the same access list to both interfaces to simplify management and to match the
global policy described in the previous section. This again is not a technical requirement: you may
apply a different access list to each interface.
The ASA 8.3 release introduced the feature of Interface-Independent Access Policies, which will
allow us to simplify the above configuration to:
This has not yet been tested in Unified Communications solution testing.
Object Groups
Another technique to simplify management is the use of object groups. The ASA allows the
grouping of both IP addresses and port numbers. Based on prior experience we only group IP
addresses into object groups, not port numbers; on the other hand, we do group all IP addresses into
object groups. This means that all access list entries refer to the hosts by a descriptive object group
name. This makes it easier to remember the purpose of any particular access list entry.
Here are some of the object groups used during solution testing:
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 7 of 18
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 8 of 18
Note: The following access-list examples are intended as a starting point, not as a guaranteed and
complete solution. Unified Communications solution testing does not include explicit test cases to
verify the accuracy of these ACL entries. Our aim is to execute test cases that verify Unified
Communications functionality (as opposed to security) with these ACL entries and thus provide
implicit verification. Accordingly, the ports allowed by these ACL entries allow ports that we
believe were needed to execute our test cases. A different Unified Communications environment
may require more or fewer open ports.
The following entries allow both SCCP and SIP, and both secure and non-secure phones to register
to the CUCM. In a real deployment typically only one or two of these would be needed. Also, these
port numbers are configurable. In the above example, port 2443 is used for secure SCCP and port
5061 is used for Secure SIP.
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq 2443
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM eq 3804
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq 5061
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq 5062
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group PC-VLANS eq sip
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group PC-VLANS eq 5061
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group PC-VLANS eq 5062
access-list GLOBAL-ACL extended permit udp object-group PC-VLANS object-group LOCAL-CUCM-TFTP eq tftp
access-list GLOBAL-ACL extended permit udp object-group PC-VLANS object-group LOCAL-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group PC-VLANS eq sip
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group PC-VLANS eq www
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM eq 8080
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM eq ctiqbe
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group PC-VLANS eq 8080
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group PC-VLANS eq ctiqbe
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM eq 8443
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUCM eq www
The above line is used where Music on Hold is sent via multicast. The MOH-MULTICAST object
group holds the multicast address(es) to which MoH is sent. See also the Media sources in data
center section.
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 9 of 18
access-list GLOBAL-ACL extended permit udp object-group DC-MEDIA-SOURCES object-group EVERYONE rang
This is the solution for the generic problem that sometimes the firewall is not able to inspect the
signaling that carries the media port numbers. This usually happens in a Clustering over the WAN
setup where the relevant signaling would be the proprietary intracluster communication that the
firewall cannot inspect even if it goes through the firewall.
access-list GLOBAL-ACL extended permit tcp object-group H323-GWS object-group LOCAL-CUCM-SUB eq h32
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group H323-GWS eq h32
access-list GLOBAL-ACL extended permit tcp object-group H323-GWS object-group COW-CUCM-SUB eq h323
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM-SUB object-group H323-GWS eq h323
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group GATEKEEPER eq 1
access-list GLOBAL-ACL extended permit udp object-group COW-CUCM-SUB object-group GATEKEEPER eq 171
access-list GLOBAL-ACL extended permit tcp object-group GATEKEEPER object-group GATEKEEPER eq 1718
access-list GLOBAL-ACL extended permit tcp object-group GATEKEEPER object-group GATEKEEPER eq 1719
access-list GLOBAL-ACL extended permit tcp object-group GATEKEEPER object-group GATEKEEPER eq h323
access-list GLOBAL-ACL extended permit udp object-group GATEKEEPER object-group GATEKEEPER eq 1718
access-list GLOBAL-ACL extended permit udp object-group GATEKEEPER object-group GATEKEEPER eq 1719
access-list GLOBAL-ACL extended permit udp object-group GATEKEEPER object-group GATEKEEPER eq 1720
SCCP Gateways
The typical signaling port for SCCP gateways is 2000 for non-secure and 2443 for secure
communication. The Catalyst 6608 and 6624 blades have special port requirements, as shown below.
access-list GLOBAL-ACL extended permit tcp object-group SCCP-GWS object-group LOCAL-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group SCCP-GWS object-group LOCAL-CUCM-SUB eq 2443
access-list GLOBAL-ACL extended permit tcp object-group 6608-GWS object-group LOCAL-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group 6608-GWS object-group LOCAL-CUCM-SUB eq 2001
access-list GLOBAL-ACL extended permit udp object-group 6608-GWS object-group LOCAL-CUCM-TFTP eq tftp
access-list GLOBAL-ACL extended permit tcp object-group 6624-GWS object-group LOCAL-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group 6624-GWS object-group LOCAL-CUCM-SUB eq 2002
access-list GLOBAL-ACL extended permit tcp object-group SCCP-GWS object-group COW-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group 6608-GWS object-group COW-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group 6608-GWS object-group COW-CUCM-SUB eq 2001
access-list GLOBAL-ACL extended permit tcp object-group 6624-GWS object-group COW-CUCM-SUB eq 2000
access-list GLOBAL-ACL extended permit tcp object-group 6624-GWS object-group COW-CUCM-SUB eq 2002
MGCP Gateways
access-list GLOBAL-ACL extended permit udp object-group MGCP-GWS object-group LOCAL-CUCM-SUB eq 2427
access-list GLOBAL-ACL extended permit tcp object-group MGCP-GWS object-group LOCAL-CUCM-SUB eq 2428
access-list GLOBAL-ACL extended permit udp object-group MGCP-GWS object-group LOCAL-CUCM-TFTP eq tftp
access-list GLOBAL-ACL extended permit udp object-group MGCP-GWS object-group COW-CUCM-SUB eq 2427
access-list GLOBAL-ACL extended permit tcp object-group MGCP-GWS object-group COW-CUCM-SUB eq 2428
access-list GLOBAL-ACL extended permit udp object-group MGCP-GWS object-group COW-CUCM-TFTP eq tftp
SIP Gateways
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 10 of 18
access-list GLOBAL-ACL extended permit tcp object-group SIP-GWS object-group LOCAL-CUCM-SUB range s
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group SIP-GWS range s
access-list GLOBAL-ACL extended permit udp object-group SIP-GWS object-group LOCAL-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group SIP-GWS eq sip
access-list GLOBAL-ACL extended permit tcp object-group SIP-GWS object-group REMOTE-CUCM-SUB range
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group SIP-GWS range
access-list GLOBAL-ACL extended permit udp object-group SIP-GWS object-group REMOTE-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit udp object-group REMOTE-CUCM-SUB object-group SIP-GWS eq sip
IPSec Gateways
Media Resources
SIP ICT
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group REMOTE-CUCM eq 8080
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM object-group LOCAL-CUCM eq 8080
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group REMOTE-CUCM eq 8443
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM object-group LOCAL-CUCM eq 8443
H.323 ICT
SAF
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 11 of 18
access-list GLOBAL-ACL extended permit tcp object-group CUCME-SIP object-group LOCAL-CUCM-SUB range
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group CUCME-SIP range
access-list GLOBAL-ACL extended permit udp object-group CUCME-SIP object-group LOCAL-CUCM-SUB eq si
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group CUCME-SIP eq si
Centralized TFTP
SMTP server
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group SMTP-SRVR eq smtp
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group LOCAL-CUCM-PUB eq www
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group LOCAL-CUCM-PUB eq 8080
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group LOCAL-CUCM-PUB eq https
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group LOCAL-CUCM-PUB eq 8443
The following entries are only needed if some nodes in of the CUCM cluster are separated from the
rest of the cluster by the firewall. This typically happens in Clustering over WAN setups.
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 12 of 18
access-list GLOBAL-ACL extended permit udp object-group COW-CUCM object-group LOCAL-CUCM-PUB eq ntp
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq ssh
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 1090
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 1099
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 1500
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 1501
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 1515
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 2552
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 2551
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 2555
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 2556
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 4040
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 5007
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 5555
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 7000
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 7070
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8001
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8002
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8003
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8004
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8005
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8443
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8500
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8888
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM object-group LOCAL-CUCM eq 8889
access-list GLOBAL-ACL extended permit udp object-group COW-CUCM object-group LOCAL-CUCM eq syslog
access-list GLOBAL-ACL extended permit udp object-group COW-CUCM object-group LOCAL-CUCM eq 8500
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq ssh
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 1090
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 1099
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 1500
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 1501
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 1515
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 2552
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 2551
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 2555
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 2556
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 4040
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 5007
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 5555
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 7000
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 7070
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8001
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8002
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8003
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8004
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8005
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8443
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8500
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8888
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM object-group COW-CUCM eq 8889
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM object-group COW-CUCM eq syslog
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM object-group COW-CUCM eq 8500
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group IME-SRVR eq 562
access-list GLOBAL-ACL extended permit tcp object-group IME-ASA-OFFPATH-SIGNALING object-group LOCA
access-list GLOBAL-ACL extended permit tcp object-group IME-ASA-OFFPATH-SIGNALING object-group LOCA
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group IME-ASA-OFFPATH
access-list GLOBAL-ACL extended permit udp object-group IME-ASA-OFFPATH-MEDIA object-group EVERYONE
access-list GLOBAL-ACL extended permit udp object-group EVERYONE object-group IME-ASA-OFFPATH-MEDIA
Unity
access-list GLOBAL-ACL extended permit tcp object-group UNITY object-group IP-PHONES eq www
access-list GLOBAL-ACL extended permit tcp object-group IP-PHONES object-group UNITY eq 120
access-list GLOBAL-ACL extended permit tcp object-group IP-PHONES object-group UNITY eq 121
Unity Connection
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 13 of 18
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group LOCAL-CUCM-SUB eq www
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group LOCAL-CUCM-SUB eq ctiqbe
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group LOCAL-CUCM-SUB eq 2789
access-list GLOBAL-ACL extended permit udp object-group CUE object-group LOCAL-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUCM-SUB object-group CUE eq sip
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group LOCAL-CUCM-SUB eq sip
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group CUE eq sip
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group UNITY-CONNECTION eq www
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group UNITY-CONNECTION eq smtp
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group UNITY eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UNITY-CONNECTION object-group CUE eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UNITY object-group CUE eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UMG object-group UNITY-CONNECTION eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UMG object-group UNITY eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UMG object-group CUE eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UMG object-group UMG eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UMG object-group UMG eq www
access-list GLOBAL-ACL extended permit tcp object-group UNITY-CONNECTION object-group UMG eq smtp
access-list GLOBAL-ACL extended permit tcp object-group UNITY object-group UMG eq smtp
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group UMG eq smtp
access-list GLOBAL-ACL extended permit tcp object-group CUE object-group UMG eq www
Meeting Place
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 14 of 18
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group MP-WEB eq www
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group MP-WEB eq https
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group MP-WEB eq 1503
access-list GLOBAL-ACL extended permit tcp object-group EVERYONE object-group MP-WEB eq 1627
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq www
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq https
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq h323
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq 1503
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq 1627
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq 5003
access-list GLOBAL-ACL extended permit tcp object-group MP-WEB object-group MP-APP-SRVR eq 5005
access-list GLOBAL-ACL extended permit udp object-group MP-WEB object-group MP-APP-SRVR eq ntp
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq www
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq https
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq h323
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq 1503
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq 1627
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq 5003
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group MP-WEB eq 5005
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group LOCAL-CUCM-SUB eq
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group MP-APP-SRVR object-group COW-CUCM-SUB eq si
access-list GLOBAL-ACL extended permit tcp object-group COW-CUCM-SUB object-group MP-APP-SRVR eq si
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
access-list GLOBAL-ACL extended permit udp object-group REMOTE-CUCM-SUB object-group MP-APP-SRVR eq
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 15 of 18
CUCME to CUCCX
access-list GLOBAL-ACL extended permit tcp object-group CUCME-SIP object-group LOCAL-CUCCX eq 5062
access-list GLOBAL-ACL extended permit tcp object-group CUCME-H323 object-group LOCAL-CUCCX eq 5062
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 16 of 18
Attendant Console
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1859
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 11859
access-list GLOBAL-ACL extended permit tcp object-group IP-PHONES object-group ARC-SERVER eq 80
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 80
access-list GLOBAL-ACL extended permit tcp object-group ARC-SERVER object-group IP-PHONES eq 80
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1862
access-list GLOBAL-ACL extended permit tcp object-group ARC-SERVER object-group LOCAL-CUCM-SUB eq 2
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1433
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1434
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1863
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group ARC-SERVER eq 1864
access-list GLOBAL-ACL extended permit tcp object-group ARC-SERVER object-group CUPS eq 5060
access-list GLOBAL-ACL extended permit tcp object-group CUPS object-group ARC-SERVER eq 5060
Presence
access-list GLOBAL-ACL extended permit tcp object-group SIP-GWS object-group LOCAL-CUP eq 5060
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUP object-group SIP-GWS eq 5060
access-list GLOBAL-ACL extended permit udp object-group SIP-GWS object-group LOCAL-CUP eq 5060
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CUP object-group SIP-GWS eq 5060
access-list GLOBAL-ACL extended permit tcp object-group SIP-GWS object-group LOCAL-CUP eq 5061
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUP object-group SIP-GWS eq 5062
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 5222
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 8082
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 8083
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 8080
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 8332
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group LOCAL-CUP eq 7335
access-list GLOBAL-ACL extended permit tcp object-group EXCHANGE object-group LOCAL-CUP eq 50020
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUP object-group NETMGMT-SRVR eq 1090
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CUP object-group NETMGMT-SRVR eq 1099
Sametime
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group SAMETIME-SRVR eq 1533
access-list GLOBAL-ACL extended permit tcp object-group OCS object-group PC-VLANS range sip 5062
access-list GLOBAL-ACL extended permit tcp object-group OCS object-group PC-VLANS eq 8080
access-list GLOBAL-ACL extended permit tcp object-group OCS object-group PC-VLANS eq ctiqbe
access-list GLOBAL-ACL extended permit tcp object-group OCS object-group PC-VLANS eq 5900
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group OCS range sip 5062
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group OCS eq 8080
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group OCS eq ctiqbe
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group OCS eq 5900
1040 Sensors
access-list GLOBAL-ACL extended permit tcp object-group 1040-SENSOR object-group NETMGMT-SRVR eq 2000
access-list GLOBAL-ACL extended permit udp object-group 1040-SENSOR object-group NETMGMT-SRVR eq tftp
access-list GLOBAL-ACL extended permit udp object-group 1040-SENSOR object-group NETMGMT-SRVR eq 5666
access-list GLOBAL-ACL extended permit object-group NETMGMT-SRVR tcp object-group 1040-SENSOR eq 80
Wireless
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 17 of 18
access-list GLOBAL-ACL extended permit udp object-group WCS object-group WLAN-CONTROLLER eq snmp
access-list GLOBAL-ACL extended permit udp object-group WLAN-CONTROLLER object-group WCS eq snmptrap
access-list GLOBAL-ACL extended permit udp object-group LOCAL-CER object-group ACCESS-SWITCH eq snm
access-list GLOBAL-ACL extended permit udp object-group ACCESS-SWITCH object-group LOCAL-CER eq snm
access-list GLOBAL-ACL extended permit tcp object-group LOCAL-CER object-group REMOTE-CER eq 8443
access-list GLOBAL-ACL extended permit tcp object-group REMOTE-CER object-group LOCAL-CER eq 8443
access-list GLOBAL-ACL extended permit tcp object-group PC-VLANS object-group IP-PHONES eq 4224
access-list GLOBAL-ACL extended permit udp object-group PC-VLANS object-group IP-PHONES eq 5445
access-list GLOBAL-ACL extended permit udp object-group IP-PHONES object-group PC-VLANS eq 5445
access-list GLOBAL-ACL extended permit udp object-group NETMGMT-SRVR object-group EVERYONE eq snmp
access-list GLOBAL-ACL extended permit udp object-group EVERYONE object-group NETMGMT-SRVR eq snmpt
access-list GLOBAL-ACL extended permit tcp object-group NETMGMT-SRVR object-group EVERYONE eq ssh
access-list GLOBAL-ACL extended permit udp object-group EVERYONE object-group NETMGMT-SRVR eq tftp
access-list GLOBAL-ACL extended permit tcp object-group NETMGMT-SRVR object-group EVERYONE eq www
access-list GLOBAL-ACL extended permit tcp object-group NETMGMT-SRVR object-group EVERYONE eq 8080
access-list GLOBAL-ACL extended permit tcp object-group NETMGMT-SRVR object-group EVERYONE eq 8443
access-list GLOBAL-ACL extended permit udp object-group EVERYONE object-group NETMGMT-SRVR eq syslo
access-list GLOBAL-ACL extended permit tcp object-group NETMGMT-SRVR object-group EVERYONE eq https
Related Documentation
For related information on Cisco ASA 5500 Series Adaptive Security Appliance installation and
configuration, see:
1. Voice Security chapter of the Cisco Unified Communications System Release 8.x SRND.
2. Data Center Security Design Guides.
1. Cisco Unified Communications Manager 8.0(2) TCP and UDP Port Usage
2. Cisco Intercompany Media Engine 8.0(2) TCP and UDP Port Usage
3. Port Usage for Cisco Unified Presence Release 8.0
4. Port Utilization Guide for Cisco Unified CCX and Cisco Unified IP IVR, Release 8.0(1)
5. Cisco Unified Business/Department/Enterprise Attendant Console - Design Guide (Page 8-7)
6. Port Usage in Cisco ER
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011
Cisco ASA Firewall Configuration for Data Center - DocWiki Page 18 of 18
Retrieved from
"http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center"
Category: Security Release 8.0
http://docwiki.cisco.com/wiki/Cisco_ASA_Firewall_Configuration_for_Data_Center 2/8/2011