SlideShare a Scribd company logo
Device Security Master
By:
Mehtab Rohela
Muhammad Taha
Table Of Contents
 Introduction………………………3
 Features …………………….........6
 Application ..………………….…14
 Capability………………………..16
 Working…………………….........19
Introduction
• (Cisco Adaptive Security Appliance) A family of network
security devices from Cisco that provide firewall,
intrusion prevention (IPS) and virtual private network
(VPN) capabilities. Is was Introduced in 2005.
• Cisco ASA is used for secure any organization’s devices
because ASA Firewall has a capability to monitor
incoming and outgoing traffic and it has also option to
deny or permit any external network devices to access
internal network.
Continue……
In brief, Cisco ASA is a security device that combines
firewall, antivirus, intrusion prevention, and virtual
private network (VPN) capabilities. It provides proactive
threat defense that stops attacks before they spread
through the network.
Features
Cisco ASA is a multipurpose firewall appliance, which means
that it supports many additional features besides packet
filtering. Here is a list of some features supported by ASA:
• packet filtering – packet filtering using standard and
extended ACLs.
• Stateful inspection, also known as dynamic packet filtering,
is a firewall technology that monitors the state of active
connections and uses this information to determine which
network packets to allow through the firewall.
• Network Address Translation (NAT) – ASA supports inside
and outside NAT, and both static and dynamic NAT and PAT.
• Application inspection – ASA can be configured to listen in
on conversations between devices on one side and devices
on the other side of the firewall and dynamically allow the
communication between them.
• DHCP – ASA can serve as a DHCP server and distribute
network parameters to other devices in the network.
• VPN – ASA can act as a VPN server.
• AAA – ASA supports a variety of AAA server types.
• Routing – ASA can be used as a router and supports routing
protocols such as RIP, EIGRP or OSPF.
• High availability – it is possible to use two ASAs in a high-
availability failover combination to protect against a
single point of failure.
Firewall Modes
The ASA runs in two different firewall modes: Routed and
Transparent.
In routed mode, the ASA is considered to be a router hop in
the network.
In transparent mode, The term bump-in-the-wire (BITW)
refers to a communications device which can be inserted into
existing (legacy) systems to enhance the integrity,
confidentiality, or reliability of communications
User Base Authentication
Using AAA server, Cisco ASA provides authentication support for
protocols like HTTP, HTTPS, FTP, SSH etc..
Modular Policy Framework
ASA provides deep packet inspection for protocols like HTTP,
DNS, ICMP, FTP, H.323 etc..using MPF ( Modular Policy
Framework ).
ASA also supports some of the QoS functionality such as Traffic
policing, shaping, connection limit etc. using MPF.
• VPN
• VPN Load Balancing
Using VPN load balancing, Cisco VPN Clients can be shared across
multiple ASA units without user intervention.
It is Cisco Proprietary Feature of Cisco ASA firewalls.
• Multi-Context Firewall
Using this feature, a physical firewall can be configured with
multiple virtual firewalls all in one box.
All context maintains their own sets of configuration and acts as
separate firewalls.
A virtual private network (VPN) extends a private network across
a public network, and enables users to send and receive data across
shared or public networks as if their computing devices were directly
connected to the private network.
• Web Base Management
The Cisco ASA can be configured using CLI and using ASDM, it
can also be managed via GUI.
• ASA Clustering
ASA clustering lets you group multiple ASAs together as a
single logical device. A cluster provides all the convenience
of a single device (management, integration into a network)
while achieving the increased throughput and redundancy of
multiple devices
• Dynamic Routing protocol support
As of version 9.x, Cisco ASA now supports dynamic routing
protocols such as RIP, EIGRP, OSPFv2.
• Firepower services
Cisco’s new next generation firewall includes the ability to do
intrusion prevention, advanced malware protection, URL
filtering, and application visibility and control all together in
one single consolidated appliance.
• Advance Malware Protection (AMP) –
Cisco ASA provides support for Next-Generation firewall
features which can provide protection advanced malware
protection in a single device as the classic firewall features
are combined with NGFWs features.
• Modular Policy Framework (MPF) –
MPF is used to define policies for different traffic flows. Its
used in ASA to utilize advanced firewall features like QOS,
Policing, prioritizing etc.
For using MPF, we define Class-map for identifying the type
of traffic, policy-map for identifying what action should be
taken like prioritize and service-policy for where it should be
applied.
Application
Your small offices or branch locations require the best network
security available. An integrated solution that is easy to deploy and
manage improves IT efficiency. Affordable pricing and the ability to
scale as necessary are other important product benefits. You get all
that and more with the Cisco®ASA 5505 Adaptive Security Appliance
Firewalls. These firewalls are used and trusted by small and midsize
businesses with one or a few locations.
An ASA is valuable and flexible in that it can be used as a security
solution for both small and large networks.
Capability
Enterprise class security. Cisco MultiScale®performance, The
ability to deliver multiple security services at scale.
Unprecedented services flexibility. Modular scalability.
Feature extensibility. Lower deployment and operational
costs. All of these features and benefits add up to
tremendous value in the Cisco ASA 5505 Adaptive Security
Appliance. Available models deliver the same proven level of
security that protects the networks of some of the largest
and most security-conscious companies in the world.
Nowadays IOS router has a lot of the firewall functionality,
however, configuring the FW feature on IOS router can be
quite complex comparatively to a dedicated firewall.
IOS router would have more advanced feature on routing
protocols, while compared to FW which has limited feature
on routing protocols. When comparing firewall feature sets,
ASA would be more superior.
All in all, the complexity of configuring IOS FW has normally
made people choose ASA firewall over IOS router as a
firewall device.
FW and VPN throughput would normally be better on ASA
compared to when you are running it on IOS router.
Working
Firewalls use stateful filtering to keep track of all incoming and
outgoing connections. They are also able (depending on the
firewall) to inspect up to layer 7 of the OSI model, looking into
the payload of applications.
They also use security zones where traffic from a high security
level is permitted to go to a lower security level. Traffic from a
low security level to a higher security level will be denied,
exceptions can be made with access-lists.
Firewalls protect inside networks from unauthorized access by users on
an outside network. A firewall can also protect inside networks from
each other, for example, by keeping a human resources network
separate from a user network. If you have network resources that need
to be available to an outside user, such as a web or FTP server, you can
place these resources on a separate network behind the firewall,
called a demilitarized zone(DMZ).The firewall allows limited access to
the DMZ, but because the DMZ only includes the public servers, an
attack there only affects the servers and does not affect the other
inside networks. You can also control when inside users access outside
networks(for example, access to the Internet),by allowing only certain
addresses out, by requiring authentication or authorization, or by
coordinating with an external URL filtering server.
When discussing networks connected to a firewall, the
outside network is in front of the firewall, the inside
network is protected and behind the firewall, and a DMZ,
while behind the firewall, allows limited access to
outside users. Because the ASA lets you configure many
interfaces with varied security policies, including many
inside interfaces, many DMZs, and even many outside
interfaces if desired, these terms are used in a general
sense only.
Cisco ASA Firewall Presentation - ZABTech center Hyderabad

More Related Content

What's hot

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
Mostafa El Lathy
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
Mostafa El Lathy
 
VLAN
VLANVLAN
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
Bangladesh Network Operators Group
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
Aruba, a Hewlett Packard Enterprise company
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA
CCNACCNA
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
Rohit Singh
 
Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
islam Salah
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
CCNAResources
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
Novosco
 

What's hot (20)

ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts7 palo alto security zones & interfaces concepts
7 palo alto security zones & interfaces concepts
 
CCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 VlansCCNAv5 - S2: Chapter3 Vlans
CCNAv5 - S2: Chapter3 Vlans
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
VLAN
VLANVLAN
VLAN
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA
CCNACCNA
CCNA
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
Cisco Application Centric Infrastructure
Cisco Application Centric InfrastructureCisco Application Centric Infrastructure
Cisco Application Centric Infrastructure
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 

Similar to Cisco ASA Firewall Presentation - ZABTech center Hyderabad

Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
MehtabRohela
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliances
IT Tech
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
rezkellahhichem
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
ShreyaBanerjee52
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
Firewall
FirewallFirewall
ASA day 1.pptx
ASA day 1.pptxASA day 1.pptx
ASA day 1.pptx
ssuser6ed64a
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
fatimagull32
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
TaherAzzam2
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Note8
Note8Note8
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco Canada
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
Pranav Gontalwar
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
David kankam
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
annettsparrow
 

Similar to Cisco ASA Firewall Presentation - ZABTech center Hyderabad (20)

Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
Device security master (ASA Firewall) - project thesis - SZABIST-ZABTech Hyde...
 
Cisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliancesCisco asa 5500 series adaptive security appliances
Cisco asa 5500 series adaptive security appliances
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
Firewall
FirewallFirewall
Firewall
 
ASA day 1.pptx
ASA day 1.pptxASA day 1.pptx
ASA day 1.pptx
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Note8
Note8Note8
Note8
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...A Decentralized Cloud FirewallFramework with Resources ProvisioningCost Opt...
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Opt...
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Cisco ASA Firewall Presentation - ZABTech center Hyderabad

  • 1. Device Security Master By: Mehtab Rohela Muhammad Taha
  • 2. Table Of Contents  Introduction………………………3  Features …………………….........6  Application ..………………….…14  Capability………………………..16  Working…………………….........19
  • 4. • (Cisco Adaptive Security Appliance) A family of network security devices from Cisco that provide firewall, intrusion prevention (IPS) and virtual private network (VPN) capabilities. Is was Introduced in 2005. • Cisco ASA is used for secure any organization’s devices because ASA Firewall has a capability to monitor incoming and outgoing traffic and it has also option to deny or permit any external network devices to access internal network.
  • 5. Continue…… In brief, Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides proactive threat defense that stops attacks before they spread through the network.
  • 7. Cisco ASA is a multipurpose firewall appliance, which means that it supports many additional features besides packet filtering. Here is a list of some features supported by ASA: • packet filtering – packet filtering using standard and extended ACLs. • Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. • Network Address Translation (NAT) – ASA supports inside and outside NAT, and both static and dynamic NAT and PAT.
  • 8. • Application inspection – ASA can be configured to listen in on conversations between devices on one side and devices on the other side of the firewall and dynamically allow the communication between them. • DHCP – ASA can serve as a DHCP server and distribute network parameters to other devices in the network. • VPN – ASA can act as a VPN server. • AAA – ASA supports a variety of AAA server types. • Routing – ASA can be used as a router and supports routing protocols such as RIP, EIGRP or OSPF. • High availability – it is possible to use two ASAs in a high- availability failover combination to protect against a single point of failure.
  • 9. Firewall Modes The ASA runs in two different firewall modes: Routed and Transparent. In routed mode, the ASA is considered to be a router hop in the network. In transparent mode, The term bump-in-the-wire (BITW) refers to a communications device which can be inserted into existing (legacy) systems to enhance the integrity, confidentiality, or reliability of communications User Base Authentication Using AAA server, Cisco ASA provides authentication support for protocols like HTTP, HTTPS, FTP, SSH etc.. Modular Policy Framework ASA provides deep packet inspection for protocols like HTTP, DNS, ICMP, FTP, H.323 etc..using MPF ( Modular Policy Framework ). ASA also supports some of the QoS functionality such as Traffic policing, shaping, connection limit etc. using MPF.
  • 10. • VPN • VPN Load Balancing Using VPN load balancing, Cisco VPN Clients can be shared across multiple ASA units without user intervention. It is Cisco Proprietary Feature of Cisco ASA firewalls. • Multi-Context Firewall Using this feature, a physical firewall can be configured with multiple virtual firewalls all in one box. All context maintains their own sets of configuration and acts as separate firewalls. A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  • 11. • Web Base Management The Cisco ASA can be configured using CLI and using ASDM, it can also be managed via GUI. • ASA Clustering ASA clustering lets you group multiple ASAs together as a single logical device. A cluster provides all the convenience of a single device (management, integration into a network) while achieving the increased throughput and redundancy of multiple devices
  • 12. • Dynamic Routing protocol support As of version 9.x, Cisco ASA now supports dynamic routing protocols such as RIP, EIGRP, OSPFv2. • Firepower services Cisco’s new next generation firewall includes the ability to do intrusion prevention, advanced malware protection, URL filtering, and application visibility and control all together in one single consolidated appliance.
  • 13. • Advance Malware Protection (AMP) – Cisco ASA provides support for Next-Generation firewall features which can provide protection advanced malware protection in a single device as the classic firewall features are combined with NGFWs features. • Modular Policy Framework (MPF) – MPF is used to define policies for different traffic flows. Its used in ASA to utilize advanced firewall features like QOS, Policing, prioritizing etc. For using MPF, we define Class-map for identifying the type of traffic, policy-map for identifying what action should be taken like prioritize and service-policy for where it should be applied.
  • 15. Your small offices or branch locations require the best network security available. An integrated solution that is easy to deploy and manage improves IT efficiency. Affordable pricing and the ability to scale as necessary are other important product benefits. You get all that and more with the Cisco®ASA 5505 Adaptive Security Appliance Firewalls. These firewalls are used and trusted by small and midsize businesses with one or a few locations. An ASA is valuable and flexible in that it can be used as a security solution for both small and large networks.
  • 17. Enterprise class security. Cisco MultiScale®performance, The ability to deliver multiple security services at scale. Unprecedented services flexibility. Modular scalability. Feature extensibility. Lower deployment and operational costs. All of these features and benefits add up to tremendous value in the Cisco ASA 5505 Adaptive Security Appliance. Available models deliver the same proven level of security that protects the networks of some of the largest and most security-conscious companies in the world.
  • 18. Nowadays IOS router has a lot of the firewall functionality, however, configuring the FW feature on IOS router can be quite complex comparatively to a dedicated firewall. IOS router would have more advanced feature on routing protocols, while compared to FW which has limited feature on routing protocols. When comparing firewall feature sets, ASA would be more superior. All in all, the complexity of configuring IOS FW has normally made people choose ASA firewall over IOS router as a firewall device. FW and VPN throughput would normally be better on ASA compared to when you are running it on IOS router.
  • 20. Firewalls use stateful filtering to keep track of all incoming and outgoing connections. They are also able (depending on the firewall) to inspect up to layer 7 of the OSI model, looking into the payload of applications. They also use security zones where traffic from a high security level is permitted to go to a lower security level. Traffic from a low security level to a higher security level will be denied, exceptions can be made with access-lists.
  • 21. Firewalls protect inside networks from unauthorized access by users on an outside network. A firewall can also protect inside networks from each other, for example, by keeping a human resources network separate from a user network. If you have network resources that need to be available to an outside user, such as a web or FTP server, you can place these resources on a separate network behind the firewall, called a demilitarized zone(DMZ).The firewall allows limited access to the DMZ, but because the DMZ only includes the public servers, an attack there only affects the servers and does not affect the other inside networks. You can also control when inside users access outside networks(for example, access to the Internet),by allowing only certain addresses out, by requiring authentication or authorization, or by coordinating with an external URL filtering server.
  • 22. When discussing networks connected to a firewall, the outside network is in front of the firewall, the inside network is protected and behind the firewall, and a DMZ, while behind the firewall, allows limited access to outside users. Because the ASA lets you configure many interfaces with varied security policies, including many inside interfaces, many DMZs, and even many outside interfaces if desired, these terms are used in a general sense only.