This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network_stuff:cisco:asa [2020/07/30 17:04] – jotasandoku | network_stuff:cisco:asa [2023/11/02 14:38] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| **__CISCO ASA__**\\ | **__CISCO ASA__**\\ | ||
| - | // | + | // |
| - Set ip addresses | - Set ip addresses | ||
| - Set security levels | - Set security levels | ||
| Line 31: | Line 31: | ||
| \\ | \\ | ||
| Concept of **service policy** : | Concept of **service policy** : | ||
| - | show service policy set connection detail | + | show service policy set connection detail |
| This is to see all the class-map with the number of packets and rate they are hit | This is to see all the class-map with the number of packets and rate they are hit | ||
| \\ | \\ | ||
| Line 86: | Line 86: | ||
| show conn all | show conn all | ||
| show access-list | show access-list | ||
| + | |||
| + | |||
| + | ---- | ||
| + | |||
| \\ | \\ | ||
| - | \\ | + | __**NAT**__\\ |
| - | __**NAT**__ | + | |
| - | Essential resource: NAT cheat sheet: See: [[http://packetpushers.net/cisco-nat-cheat-sheet]]/ | + | [[http://blog.packetsar.com/wp-content/ |
| + | |||
| + | {{ : | ||
| \\ | \\ | ||
| {{ : | {{ : | ||
| Line 168: | Line 174: | ||
| **Unified NAT** is used instead of NAT order meaning to down and more specific first order. | **Unified NAT** is used instead of NAT order meaning to down and more specific first order. | ||
| \\ | \\ | ||
| + | |||
| ---- | ---- | ||
| + | |||
| + | __INSERT ACCESS LIST IN POSITIONS__: | ||
| + | |||
| + | access-list outside-in line 1 extended permit tcp object-group mycompany1-networks object tanium-internal eq 17472 # Ao line x is what you’re looking for on where to put the new rule | ||
| + | show access list # blah it’ll show you the rule number order | ||
| + | | ||
| + | |||
| + | ---- | ||
| + | |||
| + | |||
| **Troubleshooting** | **Troubleshooting** | ||
| Line 181: | Line 198: | ||
| show conn count | show conn count | ||
| show processes cpu-usage sorted non-zero | show processes cpu-usage sorted non-zero | ||
| - | fw01/dc.grapeshot.co.uk/ | + | fw01/dc.mycompany1.co.uk/ |
| | | ||
| PERFMON STATS: | PERFMON STATS: | ||
| Line 279: | Line 296: | ||
| \\ | \\ | ||
| - | | + | |
| - | | + | |
| - | | + | |
| + | show vpn-sessiondb anyconnect # (SSL VPN / Anyconnect Clients) | ||
| + | | ||
| \\ | \\ | ||
| To clear down a tunnel: | To clear down a tunnel: | ||
| Line 337: | Line 356: | ||
| \\ | \\ | ||
| **NAT** | **NAT** | ||
| - | | + | |
| Several exempts: | Several exempts: | ||
| from inside to inside | from inside to inside | ||
| Line 491: | Line 510: | ||
| \\ | \\ | ||
| - | ldngs28vpnfw01# | + | ldngs28vpnfw01# |
| Active SA: 11 | Active SA: 11 | ||
| Line 502: | Line 521: | ||
| \\ | \\ | ||
| | | ||
| - | ldngs28vpnfw01# | + | ldngs28vpnfw01# |
| peer address: 213.61.9.96 | peer address: 213.61.9.96 | ||
| Crypto map tag: outside_map, | Crypto map tag: outside_map, | ||
| Line 824: | Line 843: | ||
| Network Operations profile: | Network Operations profile: | ||
| - | ukvpn.marketaxess.com/ | + | ukvpn.mycompany4.com/ |
| Line 949: | Line 968: | ||
| - | vpn.marketaxess.com | + | vpn.mycompany4.com |
| - | usvpn.marketaxess.com (legacy?) | + | usvpn.mycompany4.com (legacy?) |
| - | ukvpn.marketaxess.com | + | ukvpn.mycompany4.com |
| Anyconnect. To check who is currently connected: | Anyconnect. To check who is currently connected: | ||
| Line 976: | Line 995: | ||
| - | Essential resource: NAT cheat sheet: See: http:packetpushers.net/cisco-nat-cheat-sheet | + | Essential resource: NAT cheat sheet: See: [[http://blog.packetsar.com/wp-content/ |
| + | \\ | ||
| + | {{: | ||
| - | + | {{: | |
| Packet flow: | Packet flow: | ||
| Line 1114: | Line 1135: | ||
| Unified NAT is used instead of NAT order meaning to down and more specific first order. | Unified NAT is used instead of NAT order meaning to down and more specific first order. | ||
| + | |||
| Review " | Review " | ||
| Line 1298: | Line 1320: | ||
| + | ---- | ||
| + | |||
| + | conf t | ||
| + | pager 0 # to stop scroll pauses | ||
| + | | ||
| ---- | ---- | ||
| + | |||
| **FIREPOWER** ( new evolved asa ) \\ | **FIREPOWER** ( new evolved asa ) \\ | ||
| * Sourcefire was acquired by Cisco several years ago and now going to change name to NGIPS Firepower center | * Sourcefire was acquired by Cisco several years ago and now going to change name to NGIPS Firepower center | ||
| * This is what is added to the asa access ctrl and vpn [[https:// | * This is what is added to the asa access ctrl and vpn [[https:// | ||
| - | * NGIPS : Intrution | + | |
| + | |||
| + | | ||
| * Threat intelligence, | * Threat intelligence, | ||
| * Cisco NGFW shares policy information with the **Cisco Identity Services Engine (ISE)** so that ISE can automatically enforce policy on devices. | * Cisco NGFW shares policy information with the **Cisco Identity Services Engine (ISE)** so that ISE can automatically enforce policy on devices. | ||
| - | Management:\\ | + | MANAGEMENT:\\ |
| * Firepower Device Manager (FDM) | * Firepower Device Manager (FDM) | ||
| - | * Firepower Management Center (FMC) | + | * Cisco Firepower Management Center (FMC) |
| - | * Defense Orchestrator (CDO) | + | * Cisco Defense Orchestrator (CDO) |
| - | + | ||
| ---- | ---- | ||