PDF - Complete Book (2.26 MB)

Cisco ASA 1000V Cloud Firewall
Getting Started Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: 78-20938-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any
examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only.
Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
© 2012 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER
1
Before You Begin 1-1
Overview of the Solution Components 1-1
Deployment Architecture for the ASA 1000V 1-2
Sharing Policies Using the Cisco VNMC 1-5
Policy Objects for the ASA 1000V 1-8
How Policies Are Applied to the ASA 1000V 1-9
Configuration Model for the ASA 1000V 1-10
Predeployment Task Flow 1-11
Guidelines and Limitations 1-12
Additional References 1-13
Obtaining Documentation and Submitting a Service Request 1-13
CHAPTER
2
Deploying the Cisco ASA 1000V 2-1
Information About the ASA 1000V Deployment 2-1
About the ASA 1000V Management Modes 2-2
Sequence for Configuring the ASA 1000V Using Cisco VNMC 2-5
Sequence for Configuring the ASA 1000V Through ASDM 2-6
Downloading the ASA 1000V OVA File 2-7
Deploying the ASA 1000V Using the VMware vSphere Client 2-8
Powering On the ASA 1000V 2-11
Setting Up ASDM to Be Used by the ASA 1000V 2-12
Configuring SSH Access for the ASA 1000V 2-13
Other Configurations that Might Be Required 2-14
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
iii
Contents
What to Do Next 2-14
CHAPTER
3
Setting Up the ASA 1000V Using VNMC Mode 3-1
Registering the ASA 1000V with the Cisco VNMC 3-1
Adding the ASA 1000V as an Edge Firewall in the Cisco VNMC 3-2
Configuring Security Profiles in VSM 3-4
Launching ASDM from Cisco VNMC to Monitor the ASA 1000V 3-6
CHAPTER
4
Configuring the ASA 1000V Using ASDM 4-1
Launching ASDM 4-1
Running the Startup Wizard in ASDM 4-3
Registering the ASA 1000V Using ASDM 4-4
Creating and Configuring Edge Security Profiles in ASDM 4-7
Creating Security Profiles in VSM in ASDM Mode 4-8
Making Internal Services Accessible from the Internet 4-8
Running the Site-to-Site Wizard to Configure VPN Tunnels 4-10
Other Wizards in ASDM 4-11
Advanced Configuration 4-11
CHAPTER
5
FAQs About the ASA 1000V 5-1
Questions 5-2
CHAPTER
6
Sample Configurations for the Cisco ASA 1000V 6-1
Sample Firewall Configuration 6-1
Sample LAN-to-LAN VPN Tunnel Configuration 6-7
Cisco ASA 1000V Cloud Firewall Getting Started Guide
iv
78-20938-01
CH A P T E R
1
Before You Begin
This chapter includes the following sections:
•
Overview of the Solution Components, page 1-1
•
Deployment Architecture for the ASA 1000V, page 1-2
•
Predeployment Task Flow, page 1-11
•
Guidelines and Limitations, page 1-12
•
Additional References, page 1-13
•
Obtaining Documentation and Submitting a Service Request, page 1-13
Overview of the Solution Components
The Cisco ASA 1000V Cloud Firewall is a virtual appliance that was developed
using the ASA infrastructure to secure the tenant edge in multitenant
environments with Nexus 1000V deployments. It provides edge features and
functionality (including site-to-site VPN, NAT, and DHCP), acts as a default
gateway, and secures the virtual machines (VMs) within the tenant against any
network-based attacks.
The Cisco ASA 1000V is deployed with the following components:
•
Compatible hardware that runs the VMware vSphere Hypervisor software.
•
vCenter VSphere Hypervisor software—The required software for installing
the Cisco Nexus 1000V and the Cisco VNMC appliance in a virtual data
center.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-1
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
•
vCenter Server software—The required VM management software that is
supported on the Cisco Nexus 1000V.
•
Cisco Nexus 1000V—The required virtual switch for running VMs such as
the ASA 1000V in a virtual data center.
•
Cisco Virtual Network Management Center (VNMC) appliance—The
required virtual appliance manages virtual security appliances within the
virtualized environment. The Cisco VNMC acts as a single point manager for
both the Cisco ASA 1000V and Cisco VSG.
•
Cisco ASA 1000V—The virtual service node runs as a VM to secure the
tenant edge in the virtualized environment.
•
(Optional) Cisco Virtual Security Gateway (VSG)—A service appliance
required to segment VMs from each other. The Cisco VSG is required to
segment inter-VM traffic within a tenant.
Deployment Architecture for the ASA 1000V
This section includes the following topics:
•
Sharing Policies Using the Cisco VNMC, page 1-5
•
Policy Objects for the ASA 1000V, page 1-8
•
How Policies Are Applied to the ASA 1000V, page 1-9
•
Configuration Model for the ASA 1000V, page 1-10
The ASA 1000V enables a broad set of multitenant workloads that have varied
security profiles to share a common infrastructure in a virtual data center. By
associating one or more VMs in a network to distinct security profiles, the ASA
1000V ensures that access from and to these VMs is controlled and monitored
through established security policies.
Integrated with the Cisco Nexus 1000V series switch and VNMC, the ASA 1000V
allows administrative segregation across security and server teams that provides
collaboration, eliminates administrative errors, and simplifies audits. The
networking team defines port profiles in the Nexus 1000V VSM that are templates
for switch port configuration. These port profiles automatically appear as port
groups to the server team that applies networking configuration for the VMs in
VMware vCenter. The security team defines policies called edge security profiles
in Cisco VNMC or ASDM that are downloaded to the ASA 1000V. The security
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-2
78-20938-01
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
VMWare vCenter
Cisco Nexus 1000V
Cisco VNMC
Server Admin
Network Admin
Security Admin
334035
team also collaborates with the networking team by providing the edge security
profile names that it has created. The networking team assigns a security profile
to a port profile in VSM. The server team selects these port profiles from the VM
configuration in VMware vCenter.
After the three-way setup is complete for securing a VM, the ASA 1000V applies
the security policies defined by the security profile for traffic originated by the
VM or destined to the VM. If the setup is not complete, traffic from and to the
VMs hits the ASA 1000V (because it is the default gateway), but the traffic is
dropped. Therefore, any VM behind the ASA 1000V must have a security profile
associated with it.
Note
Only VMs behind the ASA 1000V on the inside interface need to have security
profiles applied. The ASA 1000V does not support applying security profiles to
VMs on the outside network.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-3
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Figure 1-1 shows how a port profile is used by the ASA 1000V.
Figure 1-1
Port Profile Usage by ASA 1000V
As shown in Figure 1-1, VMs protected by the ASA 1000V are grouped into port
profiles. Port profiles can have different security policies in the ASA 1000V.
Security policies are created in Cisco VNMC using edge security profiles. These
security profiles are bound to the port profiles in VSM. When the VMs are
created, the port group corresponding to the port profiles applicable to the VMs
are selected in VMware vCenter.
The configuration shown in Figure 1-1 includes a VM on the outside interface of
the ASA 1000V. This VM does not require a security profile applied to it in order
to send and receive traffic through the ASA 1000V. The VM requires the port
profile and port group.
The ASA 1000V is also the default gateway for the VMs on the inside interface.
The ASA 1000V assigns IP addresses to these VMs through DHCP. If IP
addresses are assigned statically for the VMs, they must send packets using the
static IP address before the ASA 1000V can allow the traffic from the outside VM
to reach VMs on the inside interface.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-4
78-20938-01
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Sharing Policies Using the Cisco VNMC
This section includes the following topics:
•
Tenant Management and Multitenancy, page 1-5
•
Resource Objects for the ASA 1000V, page 1-7
Cisco VNMC is a model-driven, multitenant, multi-device manager that allows
sharing of policies between many ASA 1000Vs. Cisco VNMC organizes objects
into five distinct folder or organization levels for tenant management.
Named policy objects can be defined at a higher level folder and referenced by
policies and objects created in lower levels. Name resolution uses a tree model in
which names are resolved starting at the level in which the name is referenced,
moving up the hierarchy towards the root.
Tenant Management and Multitenancy
Cisco VNMC provides the ability to achieve multitenancy. Multitenancy enables
the division of large physical infrastructures into logical entities called
organizations. As a result, you can achieve logical isolation between
organizations without providing a dedicated physical infrastructure for each
organization.
The administrator can assign unique resources to each tenant through the related
organization in the multitenant environment. These resources can include
different policies, pools, device profiles, firewalls, and so on. The administrator
can use locales to assign or restrict user privileges and roles by organization if
access to certain organizations needs to be restricted.
Cisco VNMC provides a strict organizational hierarchy, as shown in Figure 1-2:
1.
Universe
2.
Tenant
3.
Virtual Data Center
4.
Virtual Application
5.
Tier
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-5
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Figure 1-2
Organizational Hierarchy
The root can have multiple tenants. Each tenant can have multiple data centers.
Each data center can have multiple applications, and each application can have
multiple tiers.
The policies and pools created at the root level are system wide and are available
to all organizations in the system. However, any policies and pools created in an
organization are only available to organizations that are below it in the same
hierarchy.
For example, if a system has tenants named Company A and Company B,
Company A cannot use any policies created in the Company B organization.
Company B cannot access any policies created in the Company A organization.
However, both Company A and Company B can use policies and pools in the root
organization.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-6
78-20938-01
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Resource Objects for the ASA 1000V
Cisco VNMC abstracts the devices it manages. It requires the devices to be
provisioned out-of-band. As part of provisioning, devices are configured to point
to Cisco VNMC for policy management. Cisco VNMC discovers all devices and
lists them under the Resources pane. In addition to the ASA 1000V, the Resources
pane includes other resources such as Cisco VSGs, VSMs, and VMs.
In Cisco VNMC, a logical edge firewall object must be created in the Managed
Resources pane. The Edge Firewall object type refers to the ASA 1000V and
represents a logical instance of the ASA 1000V. This object defines the inside and
outside interfaces and allows device profiles and edge device profiles to be
applied to the ASA 1000V. In addition, edge security profiles for the outside
interfaces are applied here.
The logical edge firewall object is created at a specific organization level of the
five-level hierarchy.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-7
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Policy Objects for the ASA 1000V
There are three types of top-level policy objects for the ASA 1000V. These
objects can contain other policies and objects.
•
Device Profiles—Includes policies that are global to the entire virtual
appliance, regardless of the type of appliance. Multiple ASA 1000V instances
can use the same device profile. The same device profile can be shared
between Cisco VSG and the ASA 1000V. This profile type contains policies
such as NTP and system log messages. Device profiles are created under the
Device Configurations pane.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-8
78-20938-01
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
•
Note
•
Edge Device Profiles—(Global to the ASA 1000V only). Multiple
ASA1000V instances can use the same edge device profile. This profile type
contains policies that are unique to the ASA 1000V only; for example, the
DHCP server, routing policies that are not applicable to Cisco VSG, or other
devices. This profile is created in the Service Profiles pane.
The Service Profiles pane contains other profile types that are not
applicable to the ASA 1000V. For example, Service Profiles only apply
to Cisco VSG.
Edge Security Profiles—Includes policies that can be applied to port profiles
or VMs. Most of the firewall policies are defined in this type including ACLs,
NAT, and so on. Edge security profiles can also be applied to outside
interfaces of the ASA 1000V. In this case, the policies are applied to traffic
from sources that do not have a security profile attached. Typically, edge
security profiles are used on the outside interface of the ASA 1000V to define
permit ACLs. An edge security profile is created in the Service Profiles pane.
How Policies Are Applied to the ASA 1000V
Edge firewall objects need to be associated to an ASA 1000V instance. After
association, all applicable profile types for the ASA 1000V device type are
pushed to the ASA 1000V instance. All edge profile objects that are created at the
same organization level as the edge firewall object are pushed to the device.
Note
Device profiles and edge device profiles were already identified through the edge
firewall object.
For example, if the edge firewall object is created at root/Cisco/Engineering-DC,
all edge security profiles and policies in root/Cisco/Engineering-DC are pushed
to the ASA 1000V instance. In addition, all edge security profiles and policies
created under any organization level under root/Cisco/Engineering-DC are also
pushed.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-9
Chapter 1
Before You Begin
Deployment Architecture for the ASA 1000V
Policies can be organized at various levels for efficient management and sharing.
Associating an edge firewall at a data center level allows a single edge firewall to
protect VMs that belong to different types of applications and tiers.
Configuration Model for the ASA 1000V
The ASA 1000V includes a service interface. The ASA 1000V can receive traffic,
such as DHCP queries and SSH traffic, from the VMs on the service interface
when those VMs are configured with edge security profiles.
Note
When configuring the service interface for the ASA 1000V, you use the ASA
1000V inside interface and assign it an IP address and security level. For
information on configuring an interface, see the Cisco ASA 1000V CLI
Configuration Guide.
Each edge security profile configured for the VMs on the service interface has a
security profile interface (named “interface security-profile”). Security profile
interfaces are dynamic (they do not have an IP address) and identify the service
interface.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-10
78-20938-01
Chapter 1
Before You Begin
Predeployment Task Flow
When configuring the ASA 1000V, attach policies such as access lists and
application inspection to the security profile interface and not to the service
interface. On the service interface, you configure only policies that terminate
traffic, such as policies for the DHCP server and SSH traffic.
When a VM sends traffic from the inside interface to the outside interface, the
ASA 1000V applies policies assigned to the security profile interface for that VM
and applies policies assigned to the outside interface. When the ASA 1000V
receives outside traffic for a VM, the ASA 1000V applies policies configured on
the VMs security profile interface.
The outside, management, and failover interfaces on the ASA 1000V function the
same way that they do for other ASA releases.
Predeployment Task Flow
Before deploying the ASA 1000V, you must perform the following tasks in this
order:
1.
Install an x86 Intel server with 64-bit processor, listed in the VMware
Hardware Compatibility List that runs VMware vSphere Hypervisor software
4.1 or 5.0 with a minimum of two processors of at least 1.5 GHz each, 8 GB
of physical RAM, 30 GB of disk space, with an Enterprise Plus license.
2.
Install VMware vCenter 4.1 or 5.0 to manage the VMware vSphere
Hypervisor server, with an Enterprise Plus license.
See the VMware documentation:
VMware Documentation
3.
Install the VMware vSphere Client and connect it to the appropriate VMware
vCenter for your Cisco Nexus 1000V deployment.
See the VMware documentation:
VMware Documentation/
4.
Install the Cisco Nexus 1000V switch, Release 4.2(1)SV1(5.2), Virtual
Supervisor Module (VSM) and Virtual Ethernet Module (VEM).
The following link provides an overview of Nexus 1000V architecture:
Nexus 1000V Architecture
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-11
Chapter 1
Before You Begin
Guidelines and Limitations
Use the Nexus 1000V Installation Management Center to install Nexus
1000V on your server(s). The following links describe the steps:
Nexus 1000V Installation and Upgrade Guide
Nexus 1000V Installation and Upgrade Video
5.
Create the necessary port profiles for your VMs, VNMC, ASA 1000V, and
VSG by following the steps listed in the Cisco Nexus 1000V Port Profile
Configuration Guide:
Cisco Nexus 1000V Port Profile Configuration Guide
The ASA 1000V requires the following four port profiles because it has four
interfaces:
– A port profile for the inside interface of ASA 1000V that belongs to the
inside VLAN
– A port profile for the outside interface of ASA 1000V that belongs to the
outside VLAN
– A port profile for management interface
– A port profile for the failover interface if failover is used
Each port profile must be on a different Layer 2 network.
6.
Install the Cisco Virtual Network Management Center (VNMC) 2.0:
Cisco VNMC Quick Start Guide
7.
Register the VSM with the Cisco VNMC by downloading the Nexus 1000V
Policy Agent image from the Cisco software download site and completing
the steps in the “Registering a Cisco Nexus 1000V VSM “section of the
following guide:
Cisco VNMC Quick Start Guide
Guidelines and Limitations
Deploying the components required to support the ASA 1000V
(VNMC,VSM,VSG) does not support localization (installing the components in
non-English mode). Consequently, the VMware vCenter and the LDAP servers in
your environment must be installed in an ASCII-compatible mode.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-12
78-20938-01
Chapter 1
Before You Begin
Additional References
You must set your keyboard to United States English before installing the ASA
1000V and using the VM console.
Additional References
For more information about the individual components that comprise the ASA
1000V, see the following documentation:
•
VMware
VMware Documentation
•
Cisco Nexus 1000V
Cisco Nexus 1000V Documentation
•
Cisco Virtual Network Management Center (VNMC)
Cisco VNMC Documentation
•
ASA 1000V
ASA 1000V Documentation
•
ASDM
ASDM Documentation
•
(Optional) Cisco Virtual Security Gateway (VSG), Version 1.4
VSG Documentation
For information about troubleshooting your ASA 1000V deployment, see the
Cisco ASA 1000V Troubleshooting Guide at ASA 1000V Documentation.
Obtaining Documentation and Submitting a Service
Request
For information on obtaining documentation, submitting a service request, and
gathering additional information, see the monthly What’s New in Cisco Product
Documentation, which also lists all new and revised Cisco technical
documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
1-13
Chapter 1
Before You Begin
Obtaining Documentation and Submitting a Service Request
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple
Syndication (RSS) feed and set content to be delivered directly to your desktop using
a reader application. The RSS feeds are a free service and Cisco currently supports
RSS Version 2.0.
For information about the ASA 1000V features, see the following ASA 1000V
documentation at:
ASA 1000V Documentation
Cisco ASA 1000V Cloud Firewall Getting Started Guide
1-14
78-20938-01
CH AP TE R
2
Deploying the Cisco ASA 1000V
This chapter includes the following sections:
•
Information About the ASA 1000V Deployment, page 2-1
•
Downloading the ASA 1000V OVA File, page 2-7
•
Deploying the ASA 1000V Using the VMware vSphere Client, page 2-8
•
Powering On the ASA 1000V, page 2-11
•
Setting Up ASDM to Be Used by the ASA 1000V, page 2-12
•
Configuring SSH Access for the ASA 1000V, page 2-13
•
Other Configurations that Might Be Required, page 2-14
•
What to Do Next, page 2-14
Information About the ASA 1000V Deployment
This section includes the following topics:
•
About the ASA 1000V Management Modes, page 2-2
•
Sequence for Configuring the ASA 1000V Using Cisco VNMC, page 2-5
•
Sequence for Configuring the ASA 1000V Through ASDM, page 2-6
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-1
Chapter 2
Deploying the Cisco ASA 1000V
Information About the ASA 1000V Deployment
About the ASA 1000V Management Modes
When you deploy the ASA 1000V, you must choose the management mode: either
the Cisco VNMC or ASDM management mode.
Note
Each management mode is mutually exclusive; you cannot use the Cisco VNMC
and ASDM management mode on the same deployment.
After deploying the ASA 1000V, you cannot change the management mode
without redeploying the ASA 1000V with the VMware vSphere Client.
When the ASA 1000V deployment consists of a failover pair, both the primary
and secondary ASA 1000V must use the same management mode.
Determining Which Management Mode to Configure for the ASA 1000V
Configure the ASA 1000V to use VNMC management mode when you plan to do
the following tasks with the ASA 1000V:
•
Use a single graphical user interface to manage Cisco VSG, ASA 1000V, and
other cloud products from Cisco.
•
Manage many ASA 1000Vs from a single management station.
•
Provide tenant access to policies through RBAC in a multitenant data center.
•
Share policies between devices (rapid provisioning of policies).
•
Use model-based policies and the XML API to configure the ASA 1000V.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-2
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Information About the ASA 1000V Deployment
Table 2-1 provides a detailed list of the benefits of using Cisco VNMC as your
management mode for the ASA 1000V.
Table 2-1
Benefits of Using VNMC Management Mode
Feature
Description
Benefit
Multiple Device
Management
Cisco VNMC provides central
management of Cisco ASA 1000V
and Cisco VSG for Cisco Nexus
1000V Series Switches.
Simplifies provisioning and
troubleshooting in a scaled-out
data center.
Edge Security Profiles
An edge security profile represents the Simplifies provisioning, reduces
Cisco ASA 1000V security policy
administrative errors during
configuration in a profile.
security policy changes, reduces
audit complexities, and enables a
highly scaled-out data center
environment.
Dynamic Security Policy
and Zone Provisioning
Cisco VNMC interacts with the Cisco
Nexus 1000V Series VSM to bind the
edge security profile to the
corresponding Cisco Nexus 1000V
series port profile. When virtual
machines are dynamically instantiated
by server administrators and
appropriate port profiles are applied,
their association with trust zones is
also established.
Helps enable edge security
profiles to stay aligned with
rapid changes in the virtual data
center.
Multitenant (Scale-out)
Management
Cisco VNMC is designed to manage
security policies for Cisco ASA
1000V and Cisco VSG in a dense,
multitenant environment so that
administrators can quickly add and
delete tenants and update
tenant-specific configurations and
security policies.
Simplifies management of a
highly dynamic virtual
environment, reduces
administrative errors, helps
ensure the segregation of duties
in administrative teams, and
simplifies audit procedures.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-3
Chapter 2
Deploying the Cisco ASA 1000V
Information About the ASA 1000V Deployment
Table 2-1
Benefits of Using VNMC Management Mode (continued)
Feature
Description
Role-based Access Control RBAC simplifies operation tasks
(RBAC)
across different types of
administrators, while allowing
subject-matter experts to continue
with their normal procedures.
XML-based API
The Cisco VNMC XML API allows
external system management and
orchestration tools to
programmatically provision the ASA
1000V and Cisco VSG.
Context-aware Security
Policies
Benefit
•
Reduces administrative
errors.
•
Enables detailed control of
user privileges.
•
Simplifies auditing
requirements.
•
Allows use of best-in-class
management software.
•
Offers transparent and
scalable operation
management.
Cisco VNMC obtains virtual machine Allows security administrators to
contexts from VMware vCenter.
institute highly specific policy
controls across the entire virtual
infrastructure based on VM
attributes for Cisco VSG.
If you selected the Cisco VNMC as the management mode (this is the default
setting during deployment), see the Cisco Virtual Network Management Center
2.0 User Guide for additional information after completing the procedures in this
guide.
Configure the ASA 1000V to use the ASDM management mode when you plan to
do the following tasks with the ASA 1000V:
•
Manage one device at a time using the familiar ASA configuration.
•
Configure policies through the ASA 1000V CLI.
If you selected the ASDM as the management mode for the ASA 1000V, use the
Cisco ASA 1000V ASDM Configuration Guide or the Cisco ASA 1000V CLI
Configuration Guide for the procedures to configure security policies. Selecting
the ASDM mode also allows access to the ASA 1000V CLI.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-4
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Information About the ASA 1000V Deployment
Sequence for Configuring the ASA 1000V Using Cisco VNMC
Figure 2-1 describes the configuration steps for the ASA 1000V when using the
VNMC management mode.
Figure 2-1
Configuring the ASA 1000V by Using Cisco VNMC
For information about completing task 1, see the “Deploying the ASA 1000V
Using the VMware vSphere Client” section on page 2-8 and “Registering the
ASA 1000V with the Cisco VNMC” section on page 3-1.
For information about completing tasks 2 through 3 in the Cisco VNMC, see the
Cisco Virtual Network Management Center 2.0 Quick Start Guide or the Cisco
Virtual Network Management Center 2.0 GUI Configuration Guide.
For information about completing tasks 4 through 5 in the Cisco VNMC, see the
Cisco Virtual Network Management Center 2.0 GUI Configuration Guide.
For information about tasks 6 through 9, see the “Adding the ASA 1000V as an
Edge Firewall in the Cisco VNMC” section on page 3-2.
For information about task 10, see the “Configuring Security Profiles in VSM”
section on page 3-4.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-5
Chapter 2
Deploying the Cisco ASA 1000V
Information About the ASA 1000V Deployment
Sequence for Configuring the ASA 1000V Through ASDM
Figure 2-2 describes the configuration steps for the ASA 1000V when using the
ASDM management mode.
Figure 2-2
Configuring the ASA 1000V by Using ASDM
For information about task 1, see the“Deploying the ASA 1000V Using the
VMware vSphere Client” section on page 2-8. and “Registering the ASA 1000V
Using ASDM” section on page 4-4.
For information about adding a user account in VNMC in task 2, see the following
guide:
Cisco VNMC GUI Configuration Guide
Note
You can use the administrator account that you created while installing VNMC.
For information about task 3, see the “Registering the ASA 1000V Using ASDM”
section on page 4-4.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-6
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Downloading the ASA 1000V OVA File
For information about task 4, see the “Creating and Configuring Edge Security
Profiles in ASDM” section on page 4-7.
For information about task 5, see the “Configuring Security Profiles in VSM”
section on page 3-4.
Downloading the ASA 1000V OVA File
You deploy the ASA 1000V by downloading and installing the open virtualization
format archive (OVA) file provided by Cisco. The OVA file provides for the
optimal VM resources (vCPU, memory and MHz) for the ASA 1000V. The OVA
file contains the ASA 1000V image for installation.
Detailed Steps
Step 1
Go to the following URL:
Download Software
The Download > Select a Product page appears.
Step 2
Click Cisco ASA 1000V Cloud Firewall. The Download Software page appears
for the ASA 1000V.
Step 3
Click Download.
Step 4
If prompted, log into your Cisco.com account with your CCO username and
password.
Step 5
Follow the prompts to download the OVA file for the ASA 1000V to your local
drive.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-7
Chapter 2
Deploying the Cisco ASA 1000V
Deploying the ASA 1000V Using the VMware vSphere Client
Deploying the ASA 1000V Using the VMware
vSphere Client
To deploy the ASA 1000V, use the VMware vSphere Client and a template file in
the open virtualization format (OVF). You use the Deploy OVF Template wizard
in the vSphere Client to deploy the Cisco package for the ASA 1000V. Running
wizard parses the ASA 1000V OVF file, creates the virtual machine on which you
will run the ASA 1000V, and installs the package.
Most of the wizard steps are standard for VMware, with the exception of the
configuration settings that are applied to the ASA 1000V before it boots up.
Note
During OVF template file deployment, 2 GB of storage is allotted to maintain
system, configuration, and image files on the ASA 1000V. These files appear in
disk0: on the ASA 1000V.
For additional information about the Deploy OVF Template, see the VMware
vSphere Client help.
Note
When you deploy the ASA 1000V using ASDM Management mode, all clients
from the locally connected subnet of the management interface are allowed by
default.
Prerequisites
Collect the following information for the deployment. The ASA 1000V
deployment requires that you enter this information at specific deployment steps.
•
The username and password login for the Cisco VNMC (required when
configuring ASA 1000V in ASDM mode)
•
The shared secret configured on Cisco VNMC for the ASA 1000V
deployment
•
The ASA 1000V management IP, management subnet mask, and management
gateway IP address
•
The Management Gateway IP address when Cisco VNMC is not directly
connected to the management network of the ASA 1000V
When Cisco VNMC is directly connected to the network, skip this entry.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-8
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Deploying the ASA 1000V Using the VMware vSphere Client
Detailed Steps
Step 1
Launch the VMware vSphere Client and choose File > Deploy OVF Template.
The Deploy OVF Template wizard appears.
Step 2
In the Deploy from a file or URL field, browse to the ASA 1000V OVF package
that you downloaded, then click Next.
Step 3
In the OVF Template Details page, review the information for the ASA 1000V
package, then click Next.
Step 4
Review and accept the End User License Agreement, then click Next.
Step 5
In the Name field, enter a name for the ASA 1000V virtual machine (VM)
instance, choose the inventory location for the VM, then click Next.
Step 6
Choose one of the following deployment configurations for the ASA 1000V, then
click Next:
•
Deploy ASA as Standalone—Failover is not configured for the ASA 1000V.
•
Deploy ASA as Primary—The ASA 1000V is configured as the primary unit
for failover.
•
Deploy ASA as Secondary—The ASA 1000V is configured as the secondary
unit for failover.
Choosing the type of deployment configures the ASA 1000V as a standalone
deployment or for failover as part of a failover pair.
Step 7
Choose the host or cluster on which you want to run the ASA 1000V, then click
Next.
Step 8
Choose the datastore on the host or cluster on which you want to maintain the
ASA 1000V files, then click Next. Each hard disk on the physical device shows
up as a datastore.
Step 9
Choose the disk storage format, then click Next.
Step 10
Choose the port profiles that you want to use for the ASA 1000V interfaces by
mapping the networks used in the OVF template to networks in your inventory.
You created these port profiles when installing the Nexus 1000V.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-9
Chapter 2
Deploying the Cisco ASA 1000V
Deploying the ASA 1000V Using the VMware vSphere Client
Note
If you did not create the port profiles, pause the ASA 1000V deployment,
return to the VSM console, create the required port profiles for the four
ASA 1000V interfaces: inside, outside, management, and high
availability (failover). For detailed information, see the “Predeployment
Task Flow” section on page 1-11 in Step 5. After the port profiles have
been created, return to the ASA 1000V deployment. Then click Next.
Note
After deploying the ASA 1000V, network adapters are created in the
following order:
Network
Network
Network
Network
Adapter1—Management 0/0
Adapter2—GigabitEthernet 0/0 (used as the inside interface)
Adapter3—GigabitEthernet 0/1 (used as the outside interface)
Adapter4—GigabitEthernet 0/2 (used as the failover interface)
The port profiles are obtained through the VMware vCenter Server connection to
the Cisco Nexus 1000V Virtual Supervisor Module (VSM).
Step 11
Set the following configuration properties that are applied to the ASA 1000V
before it boots up, then click Next:
•
Management Interface DHCP mode
•
Management IP Address
•
Management IP Subnet Mask
•
Management IP Standby Address
Note
•
When configuring these management address properties, choose whether
to configure Interface DHCP mode, or IP Address, IP Subnet Mask, or IP
Standby Address.
Choose the device manager.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-10
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Powering On the ASA 1000V
Note
•
Note
Step 12
The management mode cannot be changed later without deleting the
entire configuration and rerunning the Deploy OVA Template wizard.
When deploying the ASA 1000V in failover configuration, both the
primary and secondary units must be configured using the same
management mode.
Cisco VNMC IP Address
If you are configuring the ASA 1000V for a failover deployment, you
must also configure failover specific information, such as the failover IP
address, standby IP address, and the subnet mask information. For a
standalone deployment, leave these parameters blank.
Review the summary of the ASA 1000V configuration, then click Finish.
The ASA 1000V VM instance appears under the specified data center.
After deploying the ASA 1000V using an OVF file, you can still run the ASA
1000V setup command at the CLI to complete configuration options you might
have skipped in this procedure. See the Command Reference for more
information.
Completing this procedure does not result in a functionally deployed ASA 1000V
until you configure the device enable password, the Cisco VNMC shared secret,
and the Cisco VNMC user account (for ASDM mode only).
Powering On the ASA 1000V
Detailed Steps
Step 1
From the VMware vSphere Client, right-click the ASA 1000V instance that you
have deployed in the Hosts and Clusters view.
Step 2
Choose Power > Power On.
Step 3
Navigate to the ASA 1000V Console tab in the right pane.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-11
Chapter 2
Deploying the Cisco ASA 1000V
Setting Up ASDM to Be Used by the ASA 1000V
The ASA 1000V bootstraps platform information from the OVF file when first
powered on. The ASA 1000V reboots automatically after this bootstrap and
initializes for use. The initial boot reads parameters provided through the OVF file
and adds them to the ASA 1000V system configuration. The OVF parameters are
not read afterwards. Subsequent reboots will behave normally.
Setting Up ASDM to Be Used by the ASA 1000V
You can set up ASDM to be used by the ASA 1000V when it is configured for
either VNMC management mode or ASDM management mode. When the ASA
1000V is configured to use VNMC management mode, you can still use ASDM
to monitor the status of the ASA 1000V, but you cannot use it to manage
configurations.
Detailed Steps
Step 1
Launch the ASA 1000V console from the VMware vSphere Client.
Step 2
Add a route on the management interface to the ASDM client subnet by issuing
the following command:
ASA1000V(config)# route interface ip subnet next hop ip
Where interface is the management interface to the ASDM client subnet, ip is the
IP address and subnet of the host that accesses ASDM, subnet is the ASDM client
subnet, and next hop ip is the IP address of the gateway.
Note
Step 3
Perform this step only if the next hop gateway IP address was not
specified when deploying the ASA 1000V.
Allow HTTP access via the management interface for the ASDM client subnet by
entering the following command:
ASA1000V(config)# http ip subnet interface
Where ip is the IP address of the host that accesses ASDM, subnet provides the
subnet mask of a host that can access the HTTP server. and interface is the ASDM
client interface.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-12
78-20938-01
Chapter 2
Deploying the Cisco ASA 1000V
Configuring SSH Access for the ASA 1000V
Note
Perform this step only if the ASDM client IP address was not specified
when deploying the ASA 1000V.
Configuring SSH Access for the ASA 1000V
Configure SSH access with LOCAL authentication so that you can access the
ASA 1000V.
Detailed Steps
Step 1
Launch the ASA 1000V console from the VMware vSphere Client.
Step 2
Create a user name by entering the following command:
username name password password privilege priv_level
For example, enter the following command:
username admin password 12345678 privilege 15
Step 3
Enable LOCAL SSH authentication by entering the aaa authentication console
command:
aaa authentication ssh console LOCAL
Step 4
Enable SSH by entering the following command:
ssh ip_address mask management
For example, enter the following command:
ssh 1.1.1.1 255.255.255.255 management
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
2-13
Chapter 2
Deploying the Cisco ASA 1000V
Other Configurations that Might Be Required
Note
When you deploy the ASA 1000V, the deployment process automatically
generates RSA key pairs for identity certificates; however, you can remove the
default key pairs by using the crypto key zeroize rsa command and generate new
key pairs by using crypto key generate rsa command.
Other Configurations that Might Be Required
Depending on your environment, you might be required to perform these
additional configuration tasks:
•
Configure routes through the management interface by using the route
command. Routes through the inside and outside interfaces are configured by
using Cisco VNMC. You must name the management0/0 interface
management (case sensitive).
•
Enable failover for the ASA 1000V. See the Cisco ASA 1000V CLI
Configuration Guide for information.
What to Do Next
If you deployed the ASA 1000V to use the VNMC management mode, see the
Chapter 3, “Setting Up the ASA 1000V Using VNMC Mode.”
If you deployed the ASA 1000V to use the ASDM management mode, see
Chapter 4, “Configuring the ASA 1000V Using ASDM.”
For information about troubleshooting your ASA 1000V deployment, see the
Cisco ASA 1000V Troubleshooting Guide at ASA 1000V Documentation.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
2-14
78-20938-01
CH A P T E R
3
Setting Up the ASA 1000V Using VNMC
Mode
You must configure the ASA 1000V with Cisco VNMC information so that the
ASA 1000V can connect to the Cisco VNMC. You must perform this task for both
Cisco VNMC and ASDM management modes.
This section includes the following topics:
•
Registering the ASA 1000V with the Cisco VNMC, page 3-1
•
Adding the ASA 1000V as an Edge Firewall in the Cisco VNMC, page 3-2
•
Configuring Security Profiles in VSM, page 3-4
•
Launching ASDM from Cisco VNMC to Monitor the ASA 1000V, page 3-6
Registering the ASA 1000V with the Cisco VNMC
Prerequisites
The registration address provided for the Cisco VNMC must be reachable via the
management0/0 interface. Additionally, the ASA 1000V must be able to connect
to the Cisco VNMC via HTTPS.
You must synchronize the clocks on the ASA 1000V and the Cisco VNMC. You
can manually synchronize the clock on the ASA 1000V by using the clock set
command. When ASA 1000V is powered on for the first time, it gets its clock
settings from the ESX/ESXi host. You can set the clock on the ESX/ESXi hosts
to the correct value before starting ASA 1000V and Cisco VNMC.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
3-1
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Adding the ASA 1000V as an Edge Firewall in the Cisco VNMC
Detailed Steps
Step 1
From the Hosts and Clusters view, choose the ASA 1000V instance that you
deployed, and click the Console tab.
Step 2
Enter the following Cisco VNMC configuration on the console:
ASA1000V(config)# vnmc policy-agent
ASA1000V(config-vnmc-policy-agent)# registration host ip_address
Where ip_address is the IP address or hostname of the host on which the Cisco
VNMC is running. The IP address may have already been provided through OVF
deployment.
ASA1000V(config-vnmc-policy-agent)# shared-secret key
Where key is the shared secret for authentication of the ASA 1000V connection
to the Cisco VNMC.
Note
Step 3
The IP address and shared secret you specify must match what was
configured in Cisco VNMC.
Save the configuration to startup by entering the write mem command.
Adding the ASA 1000V as an Edge Firewall in the
Cisco VNMC
Perform this task only when configuring ASA 1000V for the VNMC management
mode.
From the VMware vSphere Client, obtain the IP address that you entered for the
host running the ASA 1000V VM. You set this IP address when you configured
the ASA 1000V management IP address in the Deploy OVF Template wizard. See
the “Deploying the ASA 1000V Using the VMware vSphere Client” section on
page 2-8.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
3-2
78-20938-01
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Adding the ASA 1000V as an Edge Firewall in the Cisco VNMC
Note
In the Cisco VNMC, you must have already created the tenant on which you want
to associate the ASA1000V. See the Cisco VNMC documentation for instructions.
Detailed Steps
Step 1
Log into the Cisco VNMC.
Step 2
Choose Resource Management > Managed Resources > Firewalls > root >
tenant > Edge Firewalls; where tenant is the logical entity under which you want
to associate the ASA 1000V as an edge firewall.
In the Cisco VNMC, multitenancy enables the division of large physical
infrastructures into logical entities. You can assign unique resources to each
tenant through the related organization in the multitenant environment. See the
Cisco VNMC documentation for tenant management information.
Note
Step 3
To perform this step, you must have at least one tenant defined in the
Cisco VNMC.
In the Edge Firewalls pane, click Add Edge Firewall.
The Add Edge Firewall dialog box appears.
Step 4
Name the logical edge firewall.
Step 5
Under Interfaces, click Add Data Interface to add the inside and outside data
interfaces for the logical edge firewall. For the outside interface, enable and select
an edge profile that applies to all traffic coming in and going out of the outside
interface. For the inside interface, there is no need for an edge profile. See the
Cisco VNMC documentation for data interface information.
Step 6
Click OK to close the Add Data Interfaces dialog box and save the interface.
The ASA 1000V edge firewall instance appears in the right pane under the ASA
1000V tenant.
Step 7
Enable and select a device profile if required in the Firewall Settings pane.
Step 8
Enable and select an edge device profile, if required, in the Firewall Settings pane.
Step 9
In the left pane, select the logical edge firewall you have added, and click Assign
ASA 1000V in the right pane.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
3-3
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Configuring Security Profiles in VSM
The Assign ASA 1000V dialog box appears.
Step 10
Choose the Virtual-ASA Management IP address from the drop-down list, then
click OK.
The IP address appears in the drop-down list because you entered the ASA 1000V
vnmc policy-agent command in the “Registering the ASA 1000V with the Cisco
VNMC” section on page 3-1. You must set the virtual ASA management IP
address to specify under which tenant to deploy the ASA 1000V.
Step 11
(Recommended) Verify that the ASA 1000V is configured to communicate with
the Cisco VNMC by selecting the logical edge firewall instance in the left pane,
then from the General tab, check these fields for the following values:
•
Config State: applied
•
Association Status: associated
•
Reachable: yes
Verify that the Operational State is OK by clicking the Task link in the right-hand
side under ASA 1000V Details, then click the General tab.
Configuring Security Profiles in VSM
For each port profile in the VSM, you configure a vservice that determines which
ASA 1000V the Cisco Nexus 1000V switch uses for that port profile and which
edge security profile to apply to all the VMs that belong to the port profile. The
Cisco VNMC generates a unique security profile ID (SPID) for each edge security
profile. The VEM determines which edge security profile to apply for a given
packet based on the port profile configuration.
The vservice configured for a port profile controls which SPID to use and to
which ASA 1000V to forward packets. The ASA 1000V uses the SPID in the
packet to know which policies to apply to the packet.
Detailed Steps
Step 1
Log into the VMware vSphere Client.
Step 2
Choose the VSM from the Hosts and Clusters view, then click the Console tab.
The VSM is the control software for the Cisco Nexus 1000V.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
3-4
78-20938-01
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Configuring Security Profiles in VSM
The VSM is also deployed as a VM.
Step 3
Match the IP address of the inside interface for the ASA 1000V with the IP
address configured on the VSM for the vservice of the port profiles. Match these
IP addresses by entering the following commands in configuration mode:
switch(config)# vservice node vservice_name type asa
Where vservice_name is the name of the ASA 1000V.
switch(config)# ip address inside_interface_ip_address
Where inside_interface_ip_address is the inside IP address of the ASA 1000V.
These IP addresses must match so that packets are correctly forwarded to the ASA
1000V by the Cisco Nexus 1000V.
Step 4
Set up the VLAN on which the ASA 1000V’s inside interface is connected by
entering the following command:
switch(config)# adjacency l2 vlan vlan_number
Where vlan_number is the VLAN of the ASA 1000V inside interface.
Because the ASA 1000V is the default gateway for the inside VMs, it is connected
to the same VLAN as the VMs.
Note
Step 5
For VXLAN, provide VXLAN information instead of VLAN
information. See the following guide:
Cisco Nexus 1000V VXLAN Configuration Guide
Create a port profile for the VMs and attach the vservice to the port profile by
entering the following commands:
switch(config)# port-profile type vethernet port_profile_name
switch(config-port-prof)# vservice node vservice_name profile edge_profile_name
switch(config-port-prof)# org org_path
Where edge_profile_name is the name of the edge security profile created in the
Cisco VNMC and org_path is the organization hierarchy in the Cisco VNMC in
which ASA 1000V is created; for example, root/tenant1/datacenter1.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
3-5
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Launching ASDM from Cisco VNMC to Monitor the ASA 1000V
Note
When installing the Nexus 1000V, you created port profiles for the four
ASA 1000V interfaces: inside, outside, management, and high
availability (failover). For detailed information, see the “Predeployment
Task Flow” section on page 1-11 in Step 5.
For more information about configuring port profiles, see the Cisco Nexus 1000V
documentation:
Cisco Nexus 1000V Port Profiles Configuration Guide
For more information about the organization in the Cisco VNMC, see the Cisco
VNMC documentation:
•
Cisco VNMC CLI Configuration Guide
•
Cisco VNMC GUI Configuration Guide
Launching ASDM from Cisco VNMC to Monitor the
ASA 1000V
VNMC 2.0 enables you to launch ASDM as a Web Start application on your
desktop.
Note
Complete this task only when you have configured the ASA 1000V to use the
VNMC management mode. When you launch ASDM from Cisco VNMC, you can
only use ASDM to monitor the ASA 1000V. You cannot use ASDM launched
from Cisco VNMC to configure policies. Only monitoring is supported in VNMC
management mode.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
3-6
78-20938-01
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Launching ASDM from Cisco VNMC to Monitor the ASA 1000V
Prerequisites
Before completing this task, you must have configured VNMC management mode
for ASA 1000V and enabled ASDM to be launched from VNMC.
Note
If you configured the ASA 1000V to run in VNMC management mode, you can
launch ASDM from VNMC for monitoring only.
See the “Information About the ASA 1000V Deployment” section on page 2-1.
For more information, see the “Setting Up ASDM to Be Used by the ASA 1000V”
section on page 2-12.
Detailed Steps
Step 1
Log into the VNMC.
Step 2
Choose Resource Management > Resources > Firewalls > All ASA 1000Vs >
virtual-asa where virtual-asa is the edge firewall for which you want to launch
ASDM.
Step 3
Click Launch ASDM in the upper-right corner of the screen.
Step 4
In the ASDM Launch screen, click Run ASDM.
ASDM opens in a new browser window on your desktop.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
3-7
Chapter 3
Setting Up the ASA 1000V Using VNMC Mode
Launching ASDM from Cisco VNMC to Monitor the ASA 1000V
Cisco ASA 1000V Cloud Firewall Getting Started Guide
3-8
78-20938-01
CH A P T E R
4
Configuring the ASA 1000V Using
ASDM
ASDM is a graphical user interface that allows you to manage the ASA 1000V
from any location through a web browser. With ASDM, you can use wizards to
configure basic and advanced features.
This chapter includes the following sections:
•
Launching ASDM, page 4-1
•
Running the Startup Wizard in ASDM, page 4-3
•
Registering the ASA 1000V Using ASDM, page 4-4
•
Creating and Configuring Edge Security Profiles in ASDM, page 4-7
•
Creating Security Profiles in VSM in ASDM Mode, page 4-8
•
Making Internal Services Accessible from the Internet, page 4-8
•
Running the Site-to-Site Wizard to Configure VPN Tunnels, page 4-10
•
Other Wizards in ASDM, page 4-11
•
Advanced Configuration, page 4-11
Launching ASDM
You can launch ASDM for the ASA 1000V after completing the tasks in “Setting
Up ASDM to Be Used by the ASA 1000V” section on page 2-12.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-1
Chapter 4
Configuring the ASA 1000V Using ASDM
Launching ASDM
See the Cisco ASA 1000V ASDM Release Notes for the requirements to run
ASDM.
Detailed Steps
Step 1
In the Address field, enter the following URL:
https://ip_address_of_management_interface/admin
The Cisco ASDM web page appears.
Step 2
Click Run Startup Wizard.
Step 3
Accept any certificates according to the dialog boxes that appear.
The Cisco ASDM-IDM Launcher appears.
Step 4
Leave the username and password fields empty, and click OK.
The main ASDM window appears and the Startup Wizard opens.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-2
78-20938-01
Chapter 4
Configuring the ASA 1000V Using ASDM
Running the Startup Wizard in ASDM
Running the Startup Wizard in ASDM
Run the Startup Wizard to modify the existing configuration so that you can
customize the security policy to suit your deployment.
Detailed Steps
Step 1
In the main ASDM window, choose Wizards > Startup Wizard.
Step 2
Follow the instructions in the Startup Wizard to configure your ASA 1000V.
Step 3
While running the wizard, you can accept the default settings or change them as
required. (For information about any wizard field, click Help.)
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-3
Chapter 4
Configuring the ASA 1000V Using ASDM
Registering the ASA 1000V Using ASDM
Registering the ASA 1000V Using ASDM
When ASDM is used to manage policies for the ASA 1000V, the Cisco VNMC
appliance must be installed because it coordinates the creation and use of security
profiles between Cisco Nexus 1000V and the ASA 1000V. For this reason, the
ASA 1000V should be configured with a user account that has privileges to create
and delete security profiles in Cisco VNMC.
See the Cisco VNMC documentation for information about creating user
accounts.
Detailed Steps
Step 1
Choose Configuration > Device Setup > Interfaces. The Interfaces panel
appears.
Step 2
If necessary, expand the VNMC parameters section by clicking the Show VNMC
Parameters section bar. The VNMC Access Parameters section appears.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-4
78-20938-01
Chapter 4
Configuring the ASA 1000V Using ASDM
Registering the ASA 1000V Using ASDM
Step 3
In the Host Address field, enter the IP address or hostname of the host on which
the Cisco VNMC is running. The IP address might have been provided already
through OVF deployment.
Step 4
In the Username and Password fields, enter the username and password that are
the login credentials for the Cisco VNMC. The credentials must allow creation
and deletion of all objects in Cisco VNMC.
Step 5
Under Shared Secret, enter and verify the shared secret for encryption of the ASA
1000V connection to the Cisco VNMC. The shared secret that you specify must
match what was configured during Cisco VNMC OVF deployment.
Step 6
Under Organizational Path, enter an Organization Path for this instance of the
ASA 1000V.
As shown above, the ASA 1000V is configured with root/Fanta-ASDM. The ASA
1000V is attached as an edge firewall for the tenant called Fanta-ASDM under
root in Cisco VNMC. (You can also create nested paths, such as
root/tenant1/datacenter1/application1/tier1/ASA1.)
Each ASA 1000V instance must belong to a different organization hierarchy in
Cisco VNMC so that profiles created by one ASA 1000V do not collide with those
created by another ASA 1000V. The organization hierarchy can be thought of as
an absolute path name of a file in a file system starting at root.
Each ASA 1000V (including those ASA 1000Vs managed through Cisco VNMC)
must be configured using a unique path name that does not collide with any other
ASA 1000V, including those that are managed through VNMC.
Note
Step 7
Policies created in Cisco VNMC at the same level do not work on an ASA
1000V managed through ASDM.
Under Security Profiles, Click Add.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-5
Chapter 4
Configuring the ASA 1000V Using ASDM
Registering the ASA 1000V Using ASDM
The Add Security Profile dialog box appears.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-6
78-20938-01
Chapter 4
Configuring the ASA 1000V Using ASDM
Creating and Configuring Edge Security Profiles in ASDM
Step 8
Complete the fields in the Add Security Profile dialog box to specify the physical
interface to use for sending or receiving vPath traffic from the Cisco Nexus
1000V. The interface name you specify allows vPath traffic to enter the ASA
1000V.
Creating and Configuring Edge Security Profiles in
ASDM
Edge security profiles are created in ASDM, then sent to the ASA 1000V. ASDM
does not include options to configure Cisco VNMC device profiles or edge device
profiles. Policies that belong to these profiles are natively configured through
ASDM.
For the steps to create edge security profiles in ASDM, see step 7 in Registering
the ASA 1000V Using ASDM, page 4-4.
An edge security profile is created by creating an interface security profile and
assigning a security profile name to it. A security profile defined in ASDM creates
an edge security profile with the same name in Cisco VNMC automatically, and
it can be used in port profiles.
Each ASA 1000V instance must also belong to a different organization hierarchy
in Cisco VNMC so that profiles created by one ASA 1000V do not collide with
those created by another ASA 1000V. The organization hierarchy can be thought
of as an absolute path name of a file in a file system starting at root.
Each ASA 1000V (including those ASA 1000Vs managed through Cisco VNMC)
must be configured using a unique path name that does not collide with any other
ASA 1000V, including those that are managed through VNMC.
For example, the ASA 1000V is configured with
root/tenant1/DC1/App1/ASA-51. The ASA 1000V is attached as an edge firewall
for the tenant tenant1 under root/tenant1/DC1/App1/ASA-51 in Cisco VNMC.
Policies created in Cisco VNMC at the same level do not work on an ASA 1000V
managed through ASDM.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-7
Chapter 4
Configuring the ASA 1000V Using ASDM
Creating Security Profiles in VSM in ASDM Mode
Creating Security Profiles in VSM in ASDM Mode
Follow the steps in the “Configuring Security Profiles in VSM” section on
page 3-4 to complete this task.
Making Internal Services Accessible from the
Internet
The Public Server pane automatically configures the security policy to make an
inside server accessible from the Internet. As a business owner, you might have
internal network services, such as a web or FTP server, that need to be available
to an outside user. You can place these services behind the ASA 1000V on a public
server in the inside network. The ASA 1000V can allow outside access to its
public servers. Any attacks launched against the public servers do not affect your
inside networks.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-8
78-20938-01
Chapter 4
Configuring the ASA 1000V Using ASDM
Making Internal Services Accessible from the Internet
Detailed Steps
Step 1
In the main ASDM window, choose Configuration > Firewall > Public Servers.
The Public Server pane appears.
Step 2
Click Add, then enter the public server settings in the Public Server dialog box.
(For information about any field, click Help.)
Step 3
Click OK.
The server appears in the list.
Step 4
Click Apply to submit the configuration to the ASA 1000V.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-9
Chapter 4
Configuring the ASA 1000V Using ASDM
Running the Site-to-Site Wizard to Configure VPN Tunnels
Running the Site-to-Site Wizard to Configure VPN
Tunnels
The VPN Wizard helps you configure basic IPsec site-to-site VPN connections.
Detailed Steps
Step 1
In the main ASDM window, choose Wizards > VPN Wizards > Site-to-Site
VPN Wizard.
Step 2
Follow the wizard instructions. (For information about any wizard field, click
Help.)
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-10
78-20938-01
Chapter 4
Configuring the ASA 1000V Using ASDM
Other Wizards in ASDM
Other Wizards in ASDM
You can optionally run the following additional wizards in ASDM:
•
High Availability and Scalability Wizard—Configures active/standby
failover.
•
Packet Capture Wizard—Configures and runs captures. The wizard runs
one capture on each of the ingress and egress interfaces. After capturing
packets, you can save the captures to your PC for examination and replay
in the packet analyzer.
Advanced Configuration
To continue configuring your ASA 1000V, see the Cisco ASA 1000V CLI
Configuration Guide or the Cisco ASA 1000V ASDM Configuration Guide at:
ASA 1000V Documentation
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
4-11
Chapter 4
Configuring the ASA 1000V Using ASDM
Advanced Configuration
Cisco ASA 1000V Cloud Firewall Getting Started Guide
4-12
78-20938-01
CH A P T E R
5
FAQs About the ASA 1000V
This document provides answers to the most frequently asked questions (FAQs)
related to the ASA 1000V solution and deployment.
•
Can two ASA 1000Vs have the same IP addresses if they belong to the same
tenant hierarchy?
•
What is the expected behavior if multiple VMs in the same
tenant/datacenter/vApp/tier have the same IP address?
•
In the Cisco Nexus 1000V, do you configure vservice node, security profile,
or org configuration for the inside interface of the ASA 1000V?
•
When I configure Cisco VNMC policy agent parameters on the ASA 1000V,
what CLI output can I expect to see?
•
Can I connect the ASA 1000V to the Cisco VNMC with the management
interface only, or can I use the inside interface or outside interface as well?
•
Should Cisco VNMC be directly connected to the ASA 1000V management
interface?
•
Can you use the ASA 1000V CLI to change the ASA 1000V management
mode from ASDM to VNMC or from VNMC to ASDM after deploying the
ASA 1000V?
•
Do I need to install a license file on ASA 1000V for it to work?
•
I have an ASA 1000V deployed in VNMC mode and have policies created in
the VNMC Security Profiles section, but I do not see the policies getting
applied on the ASA 1000V.
•
Can I have some VM hosts on the inside network that are assigned dynamic
IP addresses via DHCP and some that are assigned static IP addresses?
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
5-1
Chapter 5
FAQs About the ASA 1000V
Questions
•
Why does packet tracer/capture show security profile information for packets
coming from VM hosts on the inside network?
•
When I ping from an inside VM host to the ASA 1000V inside IP address and
capture packets, I see only ICMP echo request packets.
•
The VM hosts on my inside network have two interfaces (virtual NICs). Can
each of these interfaces belong to a different tenant?
•
Because the ASA 1000V has inside and outside interfaces (except
management and failover), can the inside interface serve as trunk interfaces
to serve multiple VLANs in the tenant?
•
In Cisco VNMC, when I delete the edge security profile associated with my
VM hosts, can I recreate it using the same name?
•
After entering the no vnmc org org_name command in ASDM mode, can I
recreate the same organization structure using the same security profile
names for all security profile interfaces?
•
My ASA 1000V is deployed in VNMC Mode. I mistakenly deleted the ASA
1000V edge firewall in Cisco VNMC. What do I do?
•
My ASA 1000V is deployed in ASDM Mode. I mistakenly deleted the ASA
1000V edge firewall in Cisco VNMC. What do I do?
•
In Cisco VNMC, do I have to configure both an edge security profile and an
edge device profile to configure VPN on ASA 1000V?
For information about troubleshooting your ASA 1000V deployment, see the
Cisco ASA 1000V Troubleshooting Guide at ASA 1000 Documentation.
Questions
Q. Can two ASA 1000Vs have the same IP addresses if they belong to the same
tenant hierarchy?
A. No. Any ASA 1000Vs deployed in the same hierarchy cannot have the same
IP address. The following diagram shows a hierarchy that consists of the
levels root – T1 – DC1 – A1 – T1. An ASA 1000V in tenant T1 and an ASA
1000V in vApp A1 cannot have the same IP addresses. However, an ASA
1000V deployed in Tenant T1 and an ASA 1000V deployed in Tenant T2 can
have the same IP addresses.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
5-2
78-20938-01
Chapter 5
FAQs About the ASA 1000V
Questions
Q. What is the expected behavior if multiple VMs in the same
tenant/datacenter/vApp/tier have the same IP address?
A. Currently, if multiple VMs in the same tenant/datacenter/vApp/tier have the
same IP address, traffic will not pass through the ASA 1000V. Avoid
configuring the ASA 1000V in this way, because changing the IP address will
not fix the issue.
Q. In the Cisco Nexus 1000V, do you configure vservice node, security profile,
or org configuration for the inside interface of the ASA 1000V?
A. No. For the ASA 1000V port profile, you do not need to configure a vservice
node, security profile, or an org configuration for the ASA 1000V inside
interface.
Q. When I configure Cisco VNMC policy agent parameters on the ASA 1000V,
what CLI output can I expect to see?
A. With the current ASA 1000V image, you will see the following type of output
on the console when you configure VNMC policy-agent parameters:
ciscoasa# config terminal
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
5-3
Chapter 5
FAQs About the ASA 1000V
Questions
Enter configuration commands, one per line. End with CNTL/Z.
ciscoasa(config)# vnmc policy-agent
ciscoasa(config-vnmc-policy-agent)# registration host 172.23.195.171
ciscoasa(config-vnmc-policy-agent)# shared-secret Vnmcpass1
Trustpoint CA certificate accepted.
ciscoasa(config-vnmc-policy-agent)#
Q. Can I connect the ASA 1000V to the Cisco VNMC with the management
interface only, or can I use the inside interface or outside interface as well?
A. No. You can only connect the ASA 1000V to the Cisco VNMC using the
management interface.
Q. Should Cisco VNMC be directly connected to the ASA 1000V management
interface?
A. No. You are not required to directly connect the Cisco VNMC to the ASA
1000V management interface. Typically, a host-specific route should be
added on the ASA 1000V to reach the Cisco VNMC through the management
interface because the ASA 1000V default gateway is reached through the
ASA 1000V outside interface.
Q. Can you use the ASA 1000V CLI to change the ASA 1000V management
mode from ASDM to VNMC or from VNMC to ASDM after deploying the
ASA 1000V?
A. No. You cannot change the management mode after deploying the ASA
1000V. To change the management mode, you must redeploy the ASA
1000V. When you redeploy the ASA 1000V, you must reconfigure all
policies that you previously configured for the ASA 1000V.
Q. Do I need to install a license file on ASA 1000V for it to work?
A. No. Unlike traditional ASAs, you do not need to install a license file on the
ASA 1000V. However, you need to install a license file on the Cisco Nexus
1000V for the ASA 1000V. Cisco will provide you with the appropriate
license file to install on the Cisco Nexus 1000V.
Q. I have an ASA 1000V deployed in VNMC mode and have policies created in
the VNMC Security Profiles section, but I do not see the policies getting
applied on the ASA 1000V.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
5-4
78-20938-01
Chapter 5
FAQs About the ASA 1000V
Questions
A. When the ASA 1000V is configured to use VNMC mode, each policy that is
applied on the ASA 1000V needs to be a part of a policy set and the policy
set must be assigned to an edge security profile for the policies to be applied
on the Cisco Nexus 1000V.
The following screen shows how to define policies and policy sets in Cisco
VNMC.
Q. Can I have some VM hosts on the inside network that are assigned dynamic
IP addresses via DHCP and some that are assigned static IP addresses?
A. The VM hosts that have static IP addresses are not reachable by outside hosts.
Any VM host that is assigned a dynamic IP address via DHCP will always be
reachable from outside hosts.
However, an outside host will be able to reach an inside host that has a static
IP address when the inside host has communicated with the outside host (for
example, using ping or ARP).
Q. Why does packet tracer/capture show security profile information for packets
coming from VM hosts on the inside network?
A. As shown in the following screen, all the VM hosts that are on the inside
network belong to an edge security profile and each edge security profile has
specific policies defined.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
5-5
Chapter 5
FAQs About the ASA 1000V
Questions
The Cisco organization has three edge security profiles for Department1,
Department2, and Department3. The VM hosts belonging to each department
have separate policies defined for them.
To ensure that the correct policies are applied to the traffic from VM hosts in
Department1, Department2 and Department3, the ASA 1000V needs to
identify the edge security profile to which the VM host belongs.
Tagging packets with security profile information allows the ASA 1000V to
identify the edge security profile that a VM host belongs to and apply the
policies associated with that edge security profile.
Q. When I ping from an inside VM host to the ASA 1000V inside IP address and
capture packets, I see only ICMP echo request packets.
A. With the current ASA 1000V version, only ICMP echo request packets are
displayed in capture outputs for traffic from inside VM hosts to the ASA
1000V inside interface IP address. This is a display issue, and the inside VM
host should receive the ICMP echo reply packets from the ASA 1000V inside
interface.
When an inside host is pinged from the ASA 1000V interface and packets
captured, both ICMP echo request and reply packets are displayed correctly.
This issue does not affect the traffic sent from inside VM hosts to outside
hosts.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
5-6
78-20938-01
Chapter 5
FAQs About the ASA 1000V
Questions
Q. The VM hosts on my inside network have two interfaces (virtual NICs). Can
each of these interfaces belong to a different tenant?
A. No. All the interfaces of a VM host should belong to the same tenant.
Q. Because the ASA 1000V has inside and outside interfaces (except
management and failover), can the inside interface serve as trunk interfaces
to serve multiple VLANs in the tenant?
A. No. The ASA 1000V only supports one inside subnet. It does not support
VLAN trunk ports.
Q. In Cisco VNMC, when I delete the edge security profile associated with my
VM hosts, can I recreate it using the same name?
A. No. Deleting and recreating the edge security profile using the same name
causes your inside VM hosts to be unreachable. When you delete the edge
security profile and recreate it with same name in the same
tenant/datacenter/app/tier, the ASA 1000V will drop all packets from that
edge security profile after it is recreated.
To resolve this issue, perform one of the following workarounds:
Workaround 1
1.
From VMWare vCenter, determine the port profile to which the VM hosts
belong. (In the following example, the VM hosts belong to the port profile
inside-hosts-1.)
2.
On the Cisco Nexus 1000V console, enter the following commands:
Nexus1000v# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Nexus1000v(config)# port-profile type vethernet inside-hosts-1
Nexus1000v(config-port-prof)# no vservice node name profile profile_name
Nexus1000v(config-port-prof)# vservice node name profile profile_name
Workaround 2
1.
Save the running-config to the startup-config using the copy running-config
startup-config command.
2.
Reload the Nexus 1000V switch using the reload command.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
5-7
Chapter 5
FAQs About the ASA 1000V
Questions
Q. After entering the no vnmc org org_name command in ASDM mode, can I
recreate the same organization structure using the same security profile
names for all security profile interfaces?
A. No. If you configured the security profiles and VNMC organization structure,
then entered the no vnmc org org_name command, you cannot recreate the
same organization structure using the same security profile names for all
security profile interfaces.
The ASA 1000V will drop packets from inside hosts belonging to all edge
security profiles in the organization structure, even if you recreate the
organization correctly.
To resolve this issue, perform one of the following workarounds:
Workaround 1
1.
Save the running-config to the startup-config using the copy running-config
startup-config command.
2.
Reload the Nexus 1000V switch using the reload command.
Workaround 2
1.
From VMWare vCenter, determine the port profile for all affected VM hosts.
2.
For each port profile, enter the following commands on the Cisco Nexus
1000V VSM console:
Nexus1000v# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Nexus1000v(config)# port-profile type vethernet port-profile_name
Nexus1000v(config-port-prof)# no vservice node name profile profile_name
Nexus1000v(config-port-prof)# vservice node name profile profile_name
Enter these commands for the port profile for all the inside VM hosts.
Q. My ASA 1000V is deployed in VNMC Mode. I mistakenly deleted the ASA
1000V edge firewall in Cisco VNMC. What do I do?
A. When you mistakenly delete the edge firewall for the ASA 1000V, perform
the following steps in Cisco VNMC:
1.
From the Edge Firewalls section, create a new edge firewall with the same
parameters as the one you deleted. See the Cisco VNMC Help for more
information.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
5-8
78-20938-01
Chapter 5
FAQs About the ASA 1000V
Questions
Note
You do not need to recreate the edge security profiles in Cisco
VNMC.
2.
Select the edge firewall that you recreated and choose Assign Virtual-ASA.
3.
Verify that the configuration state shows applied:
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
5-9
Chapter 5
FAQs About the ASA 1000V
Questions
Q. My ASA 1000V is deployed in ASDM Mode. I mistakenly deleted the ASA
1000V edge firewall in Cisco VNMC. What do I do?
A. If you mistakenly deleted the edge firewall for the ASA 1000V, perform the
following steps:
1.
If you have enabled SSH/Telnet on the ASA 1000V, connect to the CLI using
SSH or Telnet.
or
Log into VMware vCenter Client and navigate to the console for the ASA
1000V VM.
2.
Enter the vnmc org command; for example:
vnmc org root/Tenant2
Entering this command recreates the edge firewall in Cisco VNMC.
Q. In Cisco VNMC, do I have to configure both an edge security profile and an
edge device profile to configure VPN on ASA 1000V?
A. Yes. In Cisco VNMC, the VPN configuration is divided into two sections:
– Global or device configuration (IKE configuration and tunnel group peer
configuration are considered global). Global or device configuration
must be configured under Edge Device Profile.
– Interface configuration (crypto map configuration is considered an
interface configuration). Interface configuration must be configured
under Edge Security Profile.
Cisco ASA 1000V Cloud Firewall Getting Started Guide
5-10
78-20938-01
CH A P T E R
6
Sample Configurations for the Cisco
ASA 1000V
This chapter includes the following sections:
•
Sample Firewall Configuration, page 6-1
•
Sample LAN-to-LAN VPN Tunnel Configuration, page 6-7
Sample Firewall Configuration
The following sample shows the configuration for the ASA 1000V when it is
configured for standalone mode and failover is not configured.
To view the configuration, enter the show running-config command, which
shows a running configuration for the ASA 1000V.
ASA100V-VNMC-Primary# show running-config
: Saved
:
ASA Version 8.7(0)11
!
hostname ASA100V-VNMC-Primary
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.0
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-1
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample Firewall Configuration
!
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 10.1.2.1 255.255.255.0
!
interface GigabitEthernet0/2
description LAN/STATE Failover Interface
!
interface Management0/0
nameif management
security-level 100
ip address 172.23.39.47 255.255.255.0 standby 172.23.39.48
management-only
!
interface security-profile1
nameif sp1
security-level 100
security-profile default@root
!
ftp mode passive
access-list acl:root:default@inside-in extended deny ip any any
access-list acl:root:default@inside-out extended deny ip any any
access-list tcpint:default:default-rule@inside extended permit tcp any any
access-list UDP:timeout:default:default-rule@inside extended permit udp any any
access-list TCP:timeout:default:default-rule@inside extended permit tcp any any
access-list ICMP:timeout:default:default-rule@inside extended permit icmp any any
access-list acl:root:default@outside-in extended deny ip any any
access-list acl:root:default@outside-out extended deny ip any any
access-list tcpint:default:default-rule@outside extended permit tcp any any
access-list UDP:timeout:default:default-rule@outside extended permit udp any any
access-list TCP:timeout:default:default-rule@outside extended permit tcp any any
access-list ICMP:timeout:default:default-rule@outside extended permit icmp any any
access-list acl:root:default@sp1-in extended deny ip any any
access-list acl:root:default@sp1-out extended deny ip any any
access-list tcpint:default:default-rule@sp1 extended permit tcp any any
access-list UDP:timeout:default:default-rule@sp1 extended permit udp any any
access-list TCP:timeout:default:default-rule@sp1 extended permit tcp any any
access-list ICMP:timeout:default:default-rule@sp1 extended permit icmp any any
pager lines 23
mtu GigabitEthernet0/0 1500
mtu GigabitEthernet0/1 1500
mtu Management0/0 1500
failover
failover lan unit primary
failover lan interface fover GigabitEthernet0/2
failover link fover GigabitEthernet0/2
failover interface ip fover 10.1.3.10 255.255.255.0 standby 10.1.3.11
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-2
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample Firewall Configuration
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
access-group acl:root:default@sp1-in in interface sp1
access-group acl:root:default@sp1-out out interface sp1
route management 171.69.0.0 255.255.0.0 172.23.39.1 1
route management 171.69.42.102 255.255.255.255 172.23.39.1 1
route management 172.23.39.37 255.255.255.255 172.23.39.1 1
!
!
service-interface security-profile all inside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 171.69.42.102 255.255.255.255 management
http 172.23.39.37 255.255.255.255 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ca trustpoint _internal_PA_VNMC_CA_CERT
enrollment terminal
crl configure
crypto ca certificate chain _internal_PA_VNMC_CA_CERT
certificate ca 00aef9fd58cae70d8e
30820345 3082022d a0030201 02020900 aef9fd58 cae70d8e 300d0609 2a864886
f70d0101 05050030 20311e30 1c060355 04031315 6c6f6361 6c686f73 742e6c6f
63616c64 6f6d6169 6e301e17 0d313230 35303231 34343530 365a170d 32323034
33303134 34353036 5a302031 1e301c06 03550403 13156c6f 63616c68 6f73742e
6c6f6361 6c646f6d 61696e30 82012230 0d06092a 864886f7 0d010101 05000382
010f0030 82010a02 82010100 d48e9cf0 8ce05f09 e6187e70 ad70d013 969faa37
0d08d5f7 ba57114e 21f82454 8f3282ea 911bbbcd a8a55e51 27e56b31 e506d9eb
0116819f 43e6b342 7bb8c50e 3ba3850b c7162d0e e8c5ecbd 2bf6884b b8cf44f0
806a40ad e6e49307 1db2efd0 446bf4ef e48e7f83 767e99e0 7136e9e1 100dfef4
bbb71379 bc7ef2a5 e5708218 09842d2a 2ccf23a4 e2311e12 a48e03af 2c90b40a
89bae78e 0739de49 9ccd2444 2dd965bc 2648db28 fc1a71c3 a9e67cbe bc7cd889
f6d03450 eb8f4090 b80ed863 793a3ff6 0369a635 81dceceb e8082e51 3b860679
b1cb859e c05e5ef9 7e95284d 0e7dbd13 aa5ee474 bb7ec909 64ec9175 5a09d402
0e116273 a1f553ac b516dc1f 02030100 01a38181 307f301d 0603551d 0e041604
1458f881 0b616f95 efda763f 1b1e435a 90dbec4e 96305006 03551d23 04493047
801458f8 810b616f 95efda76 3f1b1e43 5a90dbec 4e96a124 a4223020 311e301c
06035504 0313156c 6f63616c 686f7374 2e6c6f63 616c646f 6d61696e 820900ae
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-3
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample Firewall Configuration
f9fd58ca e70d8e30 0c060355 1d130405 30030101 ff300d06 092a8648
01050500 03820101 002dfa77 37eb3388 d20ce18a 0fea44ab 7b71397a
19cf68c6 acacdcc7 6b110c51 d89b5392 3d14d25d 2e356f64 ef3eb5d8
c3ce3fd5 ad057a56 12d9219e 0350821d 32cb41c8 2bafee6b d91ed862
2bdb81e8 50b72f98 e42bfcfa 6c01f3db fe9ba77a 3b315cf1 94ed9350
de61bbd2 ec57e897 c6862eb4 624fd14d 3cfd1327 e9bb3976 b5d2c6bd
b2e1a561 4e3bdb42 5078a267 104ec527 fba33d71 2c1cdac9 c178b377
17d6df12 7bd89458 f0b3015d 872c6fdc cefbf35f c152ce0b e2e32956
add7f032 1cd9d865 383d9bef 316aab22 cdafd878 cbd3e945 3f739758
69467e07 04bfad46 68
quit
telnet 0.0.0.0 0.0.0.0 management
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 management
ssh timeout 5
console timeout 0
!
vnmc policy-agent
registration host 172.23.39.37
shared-secret *****
username admin password e1z89R3cZe9Kt6Ib encrypted
!
class-map ICMP:timeout:default:default-rule@outside
match access-list ICMP:timeout:default:default-rule@outside
class-map tcpint:default:default-rule@outside
match access-list tcpint:default:default-rule@outside
class-map tcpint:default:default-rule@sp1
match access-list tcpint:default:default-rule@sp1
class-map ICMP:timeout:default:default-rule@sp1
match access-list ICMP:timeout:default:default-rule@sp1
class-map TCP:timeout:default:default-rule@outside
match access-list TCP:timeout:default:default-rule@outside
class-map UDP:timeout:default:default-rule@sp1
match access-list UDP:timeout:default:default-rule@sp1
class-map insp:default:default-rule@outside
match default-inspection-traffic
class-map insp:default:default-rule@sp1
match default-inspection-traffic
class-map UDP:timeout:default:default-rule@outside
match access-list UDP:timeout:default:default-rule@outside
class-map TCP:timeout:default:default-rule@sp1
match access-list TCP:timeout:default:default-rule@sp1
class-map ICMP:timeout:default:default-rule@inside
match access-list ICMP:timeout:default:default-rule@inside
class-map tcpint:default:default-rule@inside
match access-list tcpint:default:default-rule@inside
class-map TCP:timeout:default:default-rule@inside
match access-list TCP:timeout:default:default-rule@inside
86f70d01
785509c3
58bbd410
2cb5d4e4
977966ab
0a0a4930
6367a61e
8378e64d
19cba558
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-4
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample Firewall Configuration
class-map insp:default:default-rule@inside
match default-inspection-traffic
class-map UDP:timeout:default:default-rule@inside
match access-list UDP:timeout:default:default-rule@inside
!
!
policy-map mpf-inside
class tcpint:default:default-rule@inside
class insp:default:default-rule@inside
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@inside
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@inside
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@inside
set connection timeout idle 0:02:00
policy-map mpf-outside
class tcpint:default:default-rule@outside
class insp:default:default-rule@outside
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@outside
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@outside
set connection timeout idle 1:00:00
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-5
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample Firewall Configuration
class ICMP:timeout:default:default-rule@outside
set connection timeout idle 0:02:00
policy-map mpf-sp1
class tcpint:default:default-rule@sp1
class insp:default:default-rule@sp1
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@sp1
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@sp1
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@sp1
set connection timeout idle 0:02:00
!
service-policy mpf-inside interface inside
service-policy mpf-outside interface outside
service-policy mpf-sp1 interface sp1
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly 3
subscribe-to-alert-group configuration periodic monthly 3
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:83c5fd09f1c24152f7cba73425b76190
: end
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-6
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
Sample LAN-to-LAN VPN Tunnel Configuration
The following is sample output from the show running-config command, which
shows a running configuration for the ASA 1000V:
ciscoasa# show running-config
: Saved
:
ASA Version 8.7(0)12
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface GigabitEthernet0/0
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.0 standby 10.1.1.2
!
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 10.1.2.1 255.255.255.0 standby 10.1.2.1
!
interface GigabitEthernet0/2
description LAN/STATE Failover Interface
!
interface Management0/0
nameif management
security-level 100
ip address 172.23.39.42 255.255.255.0 standby 172.23.39.43
management-only
!
interface security-profile1
nameif sp1
security-level 100
security-profile VPN@root/Tenant
!
interface security-profile2
nameif sp2
security-level 100
security-profile C200-1@root/Tenant
!
interface security-profile3
nameif sp3
security-level 100
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-7
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
security-profile default@root
!
interface security-profile4
nameif sp4
security-level 100
security-profile test@root/Tenant
!
ftp mode passive
object-group network VDONOg:mymap:toRemote@sp2
network-object host 10.1.3.30
object-group network VSONOg:mymap:toRemote@sp2
network-object host 10.1.4.50
object-group network VDONOg:testmap:101@sp2
network-object host 10.1.3.30
object-group network VSONOg:testmap:101@sp2
network-object host 10.1.4.50
access-list tcpint:default:default-rule@inside extended permit tcp any any
access-list UDP:timeout:default:default-rule@inside extended permit udp any any
access-list TCP:timeout:default:default-rule@inside extended permit tcp any any
access-list ICMP:timeout:default:default-rule@inside extended permit icmp any any
access-list tcpint:default:default-rule@outside extended permit tcp any any
access-list UDP:timeout:default:default-rule@outside extended permit udp any any
access-list TCP:timeout:default:default-rule@outside extended permit tcp any any
access-list ICMP:timeout:default:default-rule@outside extended permit icmp any any
access-list tcpint:default:default-rule@sp3 extended permit tcp any any
access-list UDP:timeout:default:default-rule@sp3 extended permit udp any any
access-list TCP:timeout:default:default-rule@sp3 extended permit tcp any any
access-list ICMP:timeout:default:default-rule@sp3 extended permit icmp any any
access-list tcpint:default:default-rule@sp1 extended permit tcp any any
access-list UDP:timeout:default:default-rule@sp1 extended permit udp any any
access-list TCP:timeout:default:default-rule@sp1 extended permit tcp any any
access-list ICMP:timeout:default:default-rule@sp1 extended permit icmp any any
access-list tcpint:default:default-rule@sp2 extended permit tcp any any
access-list UDP:timeout:default:default-rule@sp2 extended permit udp any any
access-list TCP:timeout:default:default-rule@sp2 extended permit tcp any any
access-list ICMP:timeout:default:default-rule@sp2 extended permit icmp any any
access-list mymap@root:Tenant extended permit ip object-group VSONOg:mymap:toRemote@sp2
object-group VDONOg:mymap:t
oRemote@sp2
access-list tcpint:default:default-rule@sp4 extended permit tcp any any
access-list UDP:timeout:default:default-rule@sp4 extended permit udp any any
access-list TCP:timeout:default:default-rule@sp4 extended permit tcp any any
access-list ICMP:timeout:default:default-rule@sp4 extended permit icmp any any
access-list testmap@root:Tenant extended permit ip object-group VSONOg:testmap:101@sp2
object-group VDONOg:testmap:
101@sp2
pager lines 23
logging enable
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-8
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
logging buffered debugging
mtu GigabitEthernet0/0 1500
mtu GigabitEthernet0/1 1500
mtu Management0/0 1500
failover
failover lan unit secondary
failover lan interface fover GigabitEthernet0/2
failover link fover GigabitEthernet0/2
failover interface ip fover 172.27.48.1 255.255.255.0 standby 172.27.48.22
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
route management 0.0.0.0 0.0.0.0 172.23.39.1 1
route outside 10.1.3.0 255.255.255.0 10.1.5.3 1
route management 172.23.195.138 255.255.255.255 172.23.39.1 1
!
service-interface security-profile all inside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 172.23.39.0 255.255.255.0 management
http 172.23.195.138 255.255.255.255 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set V1:basic:2@root:Tenant:c-policy-se esp-3des esp-sha-hmac
crypto ipsec ikev2 ipsec-proposal V2:basic:2@root:Tenant:c-policy-se
protocol esp encryption 3des
protocol esp integrity sha-1
crypto ipsec security-association lifetime seconds 86400
crypto map outsidemap 100 match address mymap@root:Tenant
crypto map outsidemap 100 set peer 10.1.5.3
crypto map outsidemap 100 set ikev1 transform-set V1:basic:2@root:Tenant:c-policy-se
crypto map outsidemap 100 set ikev2 ipsec-proposal V2:basic:2@root:Tenant:c-policy-se
crypto map outsidemap 100 set security-association lifetime seconds 86400
crypto map outsidemap 100 set security-association lifetime kilobytes 4608000
crypto map outsidemap 100 set nat-t-disable
crypto map outsidemap interface outside
crypto ca trustpoint _internal_PA_VNMC_CA_CERT
enrollment terminal
crl configure
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-9
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
crypto ca certificate chain _internal_PA_VNMC_CA_CERT
certificate ca 00fde69d6350ce9abe
30820345 3082022d a0030201 02020900 fde69d63 50ce9abe
f70d0101 05050030 20311e30 1c060355 04031315 6c6f6361
63616c64 6f6d6169 6e301e17 0d313230 35303431 34323435
30323134 32343538 5a302031 1e301c06 03550403 13156c6f
6c6f6361 6c646f6d 61696e30 82012230 0d06092a 864886f7
010f0030 82010a02 82010100 b7a7fc43 7a8b7db3 62368b62
cff8da2d 74041861 6e7444c6 29649a5b 36bc151a 3b7b0a1d
53f0b3d7 991a51a6 798caec5 4eb2b188 f3cb5f63 9c9680db
c567b144 699812ed 5b819641 9534aeca 75c18e41 3ad04a2c
a4121bf3 480880e8 872ff089 358c5f62 f0cb1c2c 103a6d1d
16c6778e 97c3de4d 92e75df1 98fe189f 09286b11 064839bf
b52f8e20 3bfb6e95 17a1baef 151c448b 3f143b54 b8ab93ec
1ddbe6a5 aa5f5db9 6d0085e8 7f893dc1 0d0371ef 4aa017fa
a07119a1 802ca270 4e316161 02030100 01a38181 307f301d
14e33789 a4e2107f 2ba6051c 6299b91b bc6a10c9 dd305006
8014e337 89a4e210 7f2ba605 1c6299b9 1bbc6a10 c9dda124
06035504 0313156c 6f63616c 686f7374 2e6c6f63 616c646f
e69d6350 ce9abe30 0c060355 1d130405 30030101 ff300d06
01050500 03820101 002f1be1 71f8e57d 177c9f11 d4db6267
ee36ff4f 9a7984e5 0278ca12 795650a1 178be560 3c5c154b
c8dbab0a 71835206 692dfeb0 033e9621 8dcb9c4c 35ba3065
6aeaf8f4 8ed7e8d5 cd1beaac 52f14d02 8f0751bf cb166123
17a117e6 d3171f48 442e0d97 7cfa0145 5f8041b7 869ba9e8
19178d2f 0bc31bdc 25d819f4 e6e0b54a 2a5c78a6 cf2ac414
82a553d2 258365b3 8344e7de c12ad2ae 19588bda 7b7da8ca
b9574ae5 406e0e15 ea3d731d 2e0dff74 b4de35b5 f449524a
90ca3125 df6418ac cd
quit
crypto ikev2 policy 100
encryption 3des
integrity sha
group 2
prf sha
lifetime seconds 86400
crypto ikev2 enable outside
crypto ikev1 enable outside
crypto ikev1 policy 100
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 65535
authentication pre-share
encryption 3des
hash sha
300d0609
6c686f73
385a170d
63616c68
0d010101
078bbe29
4a002c77
48166513
5b3f4100
6536fd6f
a7859e23
12f465ec
ffab3114
0603551d
03551d23
a4223020
6d61696e
092a8648
323dbb88
9bed52c6
fe72aacd
e58e40ca
3d05dcfe
3d8748ec
4620222a
1732642b
2a864886
742e6c6f
32323035
6f73742e
05000382
ec70624f
f4a6288d
c0a33ef0
91ed36d2
fcb35ceb
b4029b83
c7446144
61d96eb7
0e041604
04493047
311e301c
820900fd
86f70d01
03b8a311
e62bfa71
230c10ae
e0d1430e
6142e5c9
c19576d7
f64ea010
10c7505d
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-10
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
group 2
lifetime 86400
telnet 0.0.0.0 0.0.0.0 management
telnet timeout 1440
ssh timeout 5
console timeout 0
!
vnmc policy-agent
registration host 172.23.195.138
shared-secret *****
tunnel-group 10.1.5.3 type ipsec-l2l
tunnel-group 10.1.5.3 ipsec-attributes
ikev1 pre-shared-key *****
ikev2 remote-authentication pre-shared-key *****
ikev2 local-authentication pre-shared-key *****
!
class-map tcpint:default:default-rule@sp4
match access-list tcpint:default:default-rule@sp4
class-map ICMP:timeout:default:default-rule@outside
match access-list ICMP:timeout:default:default-rule@outside
class-map ICMP:timeout:default:default-rule@sp4
match access-list ICMP:timeout:default:default-rule@sp4
class-map tcpint:default:default-rule@outside
match access-list tcpint:default:default-rule@outside
class-map ICMP:timeout:default:default-rule@sp2
match access-list ICMP:timeout:default:default-rule@sp2
class-map ICMP:timeout:default:default-rule@sp3
match access-list ICMP:timeout:default:default-rule@sp3
class-map tcpint:default:default-rule@sp1
match access-list tcpint:default:default-rule@sp1
class-map tcpint:default:default-rule@sp2
match access-list tcpint:default:default-rule@sp2
class-map tcpint:default:default-rule@sp3
match access-list tcpint:default:default-rule@sp3
class-map ICMP:timeout:default:default-rule@sp1
match access-list ICMP:timeout:default:default-rule@sp1
class-map insp:default:default-rule@sp4
match default-inspection-traffic
class-map TCP:timeout:default:default-rule@outside
match access-list TCP:timeout:default:default-rule@outside
class-map UDP:timeout:default:default-rule@sp1
match access-list UDP:timeout:default:default-rule@sp1
class-map UDP:timeout:default:default-rule@sp2
match access-list UDP:timeout:default:default-rule@sp2
class-map TCP:timeout:default:default-rule@sp4
match access-list TCP:timeout:default:default-rule@sp4
class-map insp:default:default-rule@outside
match default-inspection-traffic
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-11
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
class-map UDP:timeout:default:default-rule@sp3
match access-list UDP:timeout:default:default-rule@sp3
class-map TCP:timeout:default:default-rule@sp2
match access-list TCP:timeout:default:default-rule@sp2
class-map UDP:timeout:default:default-rule@sp4
match access-list UDP:timeout:default:default-rule@sp4
class-map TCP:timeout:default:default-rule@sp3
match access-list TCP:timeout:default:default-rule@sp3
class-map insp:default:default-rule@sp1
match default-inspection-traffic
class-map insp:default:default-rule@sp2
match default-inspection-traffic
class-map UDP:timeout:default:default-rule@outside
match access-list UDP:timeout:default:default-rule@outside
class-map insp:default:default-rule@sp3
match default-inspection-traffic
class-map TCP:timeout:default:default-rule@sp1
match access-list TCP:timeout:default:default-rule@sp1
class-map ICMP:timeout:default:default-rule@inside
match access-list ICMP:timeout:default:default-rule@inside
class-map tcpint:default:default-rule@inside
match access-list tcpint:default:default-rule@inside
class-map TCP:timeout:default:default-rule@inside
match access-list TCP:timeout:default:default-rule@inside
class-map insp:default:default-rule@inside
match default-inspection-traffic
class-map UDP:timeout:default:default-rule@inside
match access-list UDP:timeout:default:default-rule@inside
!
!
policy-map mpf-inside
class tcpint:default:default-rule@inside
class insp:default:default-rule@inside
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@inside
set connection timeout idle 0:02:00
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-12
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
class TCP:timeout:default:default-rule@inside
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@inside
set connection timeout idle 0:02:00
policy-map mpf-sp4
class tcpint:default:default-rule@sp4
class insp:default:default-rule@sp4
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@sp4
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@sp4
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@sp4
set connection timeout idle 0:02:00
policy-map mpf-outside
class tcpint:default:default-rule@outside
class insp:default:default-rule@outside
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@outside
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@outside
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@outside
set connection timeout idle 0:02:00
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-13
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
policy-map mpf-sp1
class tcpint:default:default-rule@sp1
class insp:default:default-rule@sp1
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@sp1
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@sp1
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@sp1
set connection timeout idle 0:02:00
policy-map mpf-sp3
class tcpint:default:default-rule@sp3
class insp:default:default-rule@sp3
inspect dns
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@sp3
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@sp3
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@sp3
set connection timeout idle 0:02:00
policy-map mpf-sp2
class tcpint:default:default-rule@sp2
class insp:default:default-rule@sp2
inspect dns
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-14
78-20938-01
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect sip
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
class UDP:timeout:default:default-rule@sp2
set connection timeout idle 0:02:00
class TCP:timeout:default:default-rule@sp2
set connection timeout idle 1:00:00
class ICMP:timeout:default:default-rule@sp2
set connection timeout idle 0:02:00
!
service-policy mpf-inside interface inside
service-policy mpf-outside interface outside
service-policy mpf-sp1 interface sp1
service-policy mpf-sp2 interface sp2
service-policy mpf-sp3 interface sp3
service-policy mpf-sp4 interface sp4
prompt hostname context
call-home reporting anonymous prompt 2
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly 25
subscribe-to-alert-group configuration periodic monthly 25
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:6796450aa16ba3fd7148edf6b776ef8b
: end
ciscoasa#
Cisco ASA 1000V Cloud Firewall Getting Started Guide
78-20938-01
6-15
Chapter 6
Sample Configurations for the Cisco ASA 1000V
Sample LAN-to-LAN VPN Tunnel Configuration
Cisco ASA 1000V Cloud Firewall Getting Started Guide
6-16
78-20938-01