FW - 7
FW - 7
FW - 7
+ Personal firewall …
Packet filtering rules or filters can be configured to allow or deny
traffic based on one or more of the following variables:
•Source IP address
•Destination IP address
•Protocol type (TCP/UDP)
•Source port
•Destination port
Note: All firewalls are capable of doing some form of packet
filtering.
All traffic must pass through all layers of the TCPIP model prior to
being inspected.
If one does not exist, then the corresponding protocol will not be
allowed through the firewall.
Perimeter Network
(DMZ)
Internet
Firewall
Internal Network
Understanding Packet Filtering
Perimeter Network
192.168.2.200
192.168.1.1 192.168.2.1
10.0.0.1
Packet filter
Server
Internal Network
Perimeter Network
Internet
External
Firewall
Internal
Firewall
DNS and Firewall
• Let’s suppose that the customer DNS
service is managed by TELCO and NAT
operated by the external firewall
Standalone products:
Cisco PIX (replaced by ASA)
2007: ASA replaces PIX
From
Cisco ASA 5505 10 Firewall Edition Bundle
Includes: 8-port Fast Ethernet switch with 2 Power over Ethernet
ports, 10 IPsec VPN peers, 2 SSL VPN peers, Triple Data
Encryption Standard/Advanced Encryption Standard
(3DES/AES) license
To:
Cisco ASA 5580-40 Firewall Edition 4 x 10GE Bundle
Includes: 4 10Gigabit Ethernet interfaces, 2 Management
interfaces, 5000 IPsec VPN peers,
Content Security
Control Security Services Module for advanced antivirus,
antispam,
Solutions Ranging from SMB to Large
Enterprise
Cisco Cisco Cisco
ASA 5510 ASA 5520 ASA 5540
Content Filtering
Database of
• Filters inbound and outbound email to ensure message URLs
compliance
• Enables IT managers to construct rules using Boolean and
regular expressions for complex content filtering
• Reduces legal liability by adding company-specific legal Content
Filtering
disclaimers to outgoing email based on message
characteristics
Anti-Phishing
• Detects and blocks known phishing sites using PhishTrap
technology
URL Filtering Content Filtering
• Company-prohibited • Keyword
Internal Users
• Not work related • True file types
• Attachment names
• File sizes
Integrated Message Security
Anti-Spam Filters Out Unwanted Emails
Key Benefits
• Increases Productivity
ASA 5500 Filters unwelcome email traffic
and CSC-SSM Desktop
minimizing employee
distraction
Internet
Desktop
• Frees IT Resources
network transmissions without
non-business-relevant traffic
Desktop
Supply Partner
Requires access
to ordering databases
Branch Office
Requires Site-to-Site
Public
Hourly Employee Internet
Requires access to online schedule
and timesheets (specific apps) ASA 5500
Provides fully secured, highly customizable access for any user from any
location
Customizable Remote Application Access
Full Network Access: IPSec and SSL VPN
ASA 5500
When failover occurs, each unit changes state. The unit that
activates assumes the IP and MAC addresses of the previously
active unit and begins accepting traffic.
Once you configure the primary unit and attach the necessary
cabling, the primary unit automatically copies the configuration
over to the standby unit.
Cabling the two PIX Firewall units together requires a high-speed
serial cable when using cable-based failover, or a dedicated
Ethernet connection to a dedicate switch/hub (or VLAN) when
using LAN-based failover.
Step 4 Use the show failover command to verify that the primary
unit is enabled
Configuring LAN-Based Failover