Asa Router

Submitted by: Submitted by

Views: 30

Words: 26837

Pages: 108

Category: Other Topics

Date Submitted: 03/17/2015 09:23 PM

Report This Essay

CISS25 Network Security – Firewall

By: Jim Gau

Page 1 / 160

Rev. 20

Revised: September 10, 2014

PIX simulation: http://www.chinaitlab.com/www/experiment/lab10.asp

Topic 1-3: Introduction to Cisco ASA Firewall

 Network attacks generally fit into the three categories: 1. Reconnaissance attacks: search Internet, find and describe two reconnaissance tools. 2. Access attacks: list and describe three types of access attacks. 3. DoS attacks: list and describe three kinds of DoS attacks. Firewall and security domains: 1. Firewall system can be a single device or devices providing specific traffic filtering to achieve the desired security control. 2. Security domains are such as DB domain, Web domain, Mail domain, Parner DMZ domain, etc. 3. The concept of protecting network resources by partitioning of network into security domains and implementing boundary firewall filtering. 4. Security domains are separated by physical or logical VLAN, Multi Protocol Label Switching (MPLS) VPNs. 5. Traffic flows through physical or logical domains through firewall. 6. Discuss the design of firewall and security domains and compare the physical and logical separation. Firewall technologies (Research the following firewall technologies): 1. Layer 3 or 4 stateless packet filtering. Cisco router IOS ACLs in router or VLAN ACLs are some examples. 2. Stateful packet filtering with application inspection and control. 3. Application Proxy firewall. PIX and ASA include embedded Operating System (Finesse). The OS is self-contained in the device and resident in ROM and Flash. You cannot accidentally leave an unnecessary service running, since the firewall has all its services turned to only the features appropriate for a security device. PIX/ASA has been tested for ICSA Labs’ firewall certification and ISO’s Common Criteria EAL4 certification. ASA (Adaptive Security Algorithm) is a mechanism to determine if packets should be passed through the firewall. PIX/ASA evaluates packet...