Cisco Asdm 7 User Guide
Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
11-47 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols IPsec Pass Through Inspection –Default Level—Sets the security level back to the default level of Low. Add/Edit IPsec Pass Thru Policy Map (Security Level) The Add/Edit IPsec Pass Thru Policy Map (Security Level) dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > IPsec Pass Through> IPsec Pass Through Inspect Map > Basic View The Add/Edit IPsec Pass Thru Policy Map pane lets you configure the security level and additional settings for IPsec Pass Thru application inspection maps. Fields Name—When adding an IPsec Pass Thru map, enter the name of the IPsec Pass Thru map. When editing an IPsec Pass Thru map, the name of the previously configured IPsec Pass Thru map is shown. Security Level—Select the security level (high or low). –Low—Default. Maximum ESP flows per client: Unlimited. ESP idle timeout: 00:10:00. Maximum AH flows per client: Unlimited. AH idle timeout: 00:10:00. –High Maximum ESP flows per client:10. ESP idle timeout: 00:00:30. Maximum AH flows per client: 10. AH idle timeout: 00:00:30. –Default Level—Sets the security level back to the default level of Low. Details—Shows additional parameter settings to configure. Add/Edit IPsec Pass Thru Policy Map (Details) The Add/Edit IPsec Pass Thru Policy Map (Details) dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps >IPsec Pass Through > IPsec Pass Through Inspect Map > Advanced View The Add/Edit IPsec Pass Thru Policy Map pane lets you configure the security level and additional settings for IPsec Pass Thru application inspection maps. Fields Name—When adding an IPsec Pass Thru map, enter the name of the IPsec Pass Thru map. When editing an IPsec Pass Thru map, the name of the previously configured IPsec Pass Thru map is shown. Description—Enter the description of the IPsec Pass Through map, up to 200 characters in length. Security Level—Shows the security level settings to configure.
11-48 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols IPv6 Inspection Parameters—Configures ESP and AH parameter settings. –Limit ESP flows per client—Limits ESP flows per client. Maximum—Specify maximum limit. –Apply ESP idle timeout—Applies ESP idle timeout. Timeout—Specify timeout. –Limit AH flows per client—Limits AH flows per client. Maximum—Specify maximum limit. –Apply AH idle timeout—Applies AH idle timeout. Timeout—Specify timeout. IPv6 Inspection Information about IPv6 Inspection, page 11-48 Default Settings for IPv6 Inspection, page 11-48 (Optional) Configuring an IPv6 Inspection Policy Map, page 11-48 Configuring IPv6 Inspection, page 11-49 Information about IPv6 Inspection IPv6 inspection lets you selectively log or drop IPv6 traffic based on the extension header. In addition, IPv6 inspection can check conformance to RFC 2460 for type and order of extension headers in IPv6 packets. Default Settings for IPv6 Inspection If you enable IPv6 inspection and do not specify an inspection policy map, then the default IPv6 inspection policy map is used, and the following actions are taken: Allows only known IPv6 extension headers Enforces the order of IPv6 extension headers as defined in the RFC 2460 specification If you create an inspection policy map, the above actions are taken by default unless you explicitly disable them. (Optional) Configuring an IPv6 Inspection Policy Map To identify extension headers to drop or log, and/or to disable packet verification, create an IPv6 inspection policy map to be used by the service policy. Detailed Steps Step 1Choose Configuration > Firewall > Objects > Inspect Maps > IPv6. The Configure IPv6 Maps pane appears.
11-49 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols IPv6 Inspection Step 2Click Add. The Add IPv6 Inspection Map dialog box appears. Step 3Enter a name and description for the inspection map. By default, the Enforcement tab is selected and the following options are selected: Permit only known extension headers Enforce extension header order When Permit only known extension headers is selected, the ASA verifies the IPv6 extension header. When Enforce extension header order is selected, the order of IPv6 extension headers as defined in the RFC 2460 Specification is enforced. When these options are specified and an error is detected, the ASA drops the packet and logs the action. Step 4To configure matching in the extension header, click the Header Matches tab. Step 5Click Add to add a match. The Add IPv6 Inspect dialog box appears. a.Select a criterion for the match. When you select any of the following criteria, you can configure to the ASA to drop or log when an IPv6 packet arrives matching the criterion: –Authentication (AH) header –Destination Options header –Encapsulating Security Payload (ESP) header –Fragment header –Hop-by-Hop Options header –Routing header—When Routing header is selected and an IPv6 routing extension header is detected, the ASA takes the specified action when the routing type is matched or a number when the specified routing type range is matched. –Header count—When Header count is selected and an IPv6 routing extension header is detected, the ASA takes the specified action when number of IPv6 extension headers in the packet is more than the specified value. –Routing header address count—When Routing header address count is selected, and an IPv6 routing extension header is detected, the ASA takes the specified action when the number of addresses in the type 0 routing header is more than the value you configure. b.Click OK to save the match criterion. Step 6Repeat Step 5 for each header you want to match. Step 7Click OK to save the IPv6 inspect map. Configuring IPv6 Inspection To enable IPv6 inspection, perform the following steps. Detailed Steps Step 1Configure a service policy on the Configuration > Firewall > Service Policy Rules pane according to Chapter 1, “Configuring a Service Policy.”
11-50 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols NetBIOS Inspection You can configure IPv6 inspection as part of a new service policy rule, or you can edit an existing service policy. Step 2On the Rule Actions dialog box, click the Protocol Inspections tab. Step 3Check the IPv6 check box. Step 4(Optional) To add an IPv6 inspection policy map that you configured in the “(Optional) Configuring an IPv6 Inspection Policy Map” section on page 11-48: a.Click Configure. The Select IPv6 Inspect Map dialog box appears. b.Select the map name, and click OK. Alternatively, you can click the Add button to add a new inspection policy map. Step 5Click OK or Finish. NetBIOS Inspection This section describes the IM inspection engine. This section includes the following topics: NetBIOS Inspection Overview, page 11-50 Select NETBIOS Map, page 11-50 “NetBIOS Inspect Map” section on page 11-51 “Add/Edit NetBIOS Policy Map” section on page 11-51 NetBIOS Inspection Overview NetBIOS inspection is enabled by default. The NetBios inspection engine translates IP addresses in the NetBios name service (NBNS) packets according to the ASA NAT configuration. Select NETBIOS Map The Select NETBIOS Map dialog box is accessible as follows: Add/Edit Service Policy Rule Wizard > Rule Actions > Protocol Inspection Tab > Select NetBIOS Map The Select NETBIOS Map dialog box lets you select or create a new NetBIOS map. A NetBIOS map lets you change the configuration values used for NetBIOS application inspection. The Select NetBIOS Map table provides a list of previously configured maps that you can select for application inspection. Fields Use the default IM inspection map—Specifies to use the default NetBIOS map. Select a NetBIOS map for fine control over inspection—Lets you select a defined application inspection map or add a new one.
11-51 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols PPTP Inspection Add—Opens the Add Policy Map dialog box for the inspection. NetBIOS Inspect Map The NetBIOS Inspect Map dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > NetBIOS The NetBIOS pane lets you view previously configured NetBIOS application inspection maps. A NetBIOS map lets you change the default configuration values used for NetBIOS application inspection. NetBIOS application inspection performs NAT for the embedded IP address in the NetBIOS name service packets and NetBIOS datagram services packets. It also enforces protocol conformance, checking the various count and length fields for consistency. Fields NetBIOS Inspect Maps—Table that lists the defined NetBIOS inspect maps. Add—Configures a new NetBIOS inspect map. Edit—Edits the selected NetBIOS entry in the NetBIOS Inspect Maps table. Delete—Deletes the inspect map selected in the NetBIOS Inspect Maps table. Add/Edit NetBIOS Policy Map The Add/Edit NetBIOS Policy Map dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > NetBIOS > NetBIOS Inspect Map > View The Add/Edit NetBIOS Policy Map pane lets you configure the protocol violation settings for NetBIOS application inspection maps. Fields Name—When adding a NetBIOS map, enter the name of the NetBIOS map. When editing an NetBIOS map, the name of the previously configured NetBIOS map is shown. Description—Enter the description of the NetBIOS map, up to 200 characters in length. Check for protocol violations—Checks for protocol violations and executes specified action. –Action—Drop packet or log. –Log—Enable or disable. PPTP Inspection PPTP is a protocol for tunneling PPP traffic. A PPTP session is composed of one TCP channel and usually two PPTP GRE tunnels. The TCP channel is the control channel used for negotiating and managing the PPTP GRE tunnels. The GRE tunnels carries PPP sessions between the two hosts. When enabled, PPTP application inspection inspects PPTP protocol packets and dynamically creates the GRE connections and xlates necessary to permit PPTP traffic. Only Version 1, as defined in RFC 2637, is supported.
11-52 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols SMTP and Extended SMTP Inspection PAT is only performed for the modified version of GRE [RFC 2637] when negotiated over the PPTP TCP control channel. Port Address Translation is not performed for the unmodified version of GRE [RFC 1701, RFC 1702]. Specifically, the ASA inspects the PPTP version announcements and the outgoing call request/response sequence. Only PPTP Version 1, as defined in RFC 2637, is inspected. Further inspection on the TCP control channel is disabled if the version announced by either side is not Version 1. In addition, the outgoing-call request and reply sequence are tracked. Connections and xlates are dynamic allocated as necessary to permit subsequent secondary GRE data traffic. The PPTP inspection engine must be enabled for PPTP traffic to be translated by PAT. Additionally, PAT is only performed for a modified version of GRE (RFC2637) and only if it is negotiated over the PPTP TCP control channel. PAT is not performed for the unmodified version of GRE (RFC 1701 and RFC 1702). As described in RFC 2637, the PPTP protocol is mainly used for the tunneling of PPP sessions initiated from a modem bank PAC (PPTP Access Concentrator) to the headend PNS (PPTP Network Server). When used this way, the PAC is the remote client and the PNS is the server. However, when used for VPN by Windows, the interaction is inverted. The PNS is a remote single-user PC that initiates connection to the head-end PAC to gain access to a central network. SMTP and Extended SMTP Inspection This section describes the IM inspection engine. This section includes the following topics: SMTP and ESMTP Inspection Overview, page 11-52 Select ESMTP Map, page 11-53 ESMTP Inspect Map, page 11-54 MIME File Type Filtering, page 11-55 Add/Edit ESMTP Policy Map (Security Level), page 11-55 Add/Edit ESMTP Policy Map (Details), page 11-56 Add/Edit ESMTP Inspect, page 11-57 SMTP and ESMTP Inspection Overview ESMTP application inspection provides improved protection against SMTP-based attacks by restricting the types of SMTP commands that can pass through the ASA and by adding monitoring capabilities. ESMTP is an enhancement to the SMTP protocol and is similar is most respects to SMTP. For convenience, the term SMTP is used in this document to refer to both SMTP and ESMTP. The application inspection process for extended SMTP is similar to SMTP application inspection and includes support for SMTP sessions. Most commands used in an extended SMTP session are the same as those used in an SMTP session but an ESMTP session is considerably faster and offers more options related to reliability and security, such as delivery status notification. Extended SMTP application inspection adds support for these extended SMTP commands, including AUTH, EHLO, ETRN, HELP, SAML, SEND, SOML, STARTTLS, and VRFY. Along with the support for seven RFC 821 commands (DATA, HELO, MAIL, NOOP, QUIT, RCPT, RSET), the ASA supports a total of fifteen SMTP commands.
11-53 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols SMTP and Extended SMTP Inspection Other extended SMTP commands, such as AT R N, ONEX, VERB, CHUNKING, and private extensions and are not supported. Unsupported commands are translated into Xs, which are rejected by the internal server. This results in a message such as “500 Command unknown: XXX.” Incomplete commands are discarded. The ESMTP inspection engine changes the characters in the server SMTP banner to asterisks except for the “2”, “0”, “0” characters. Carriage return (CR) and linefeed (LF) characters are ignored. With SMTP inspection enabled, a Telnet session used for interactive SMTP may hang if the following rules are not observed: SMTP commands must be at least four characters in length; must be terminated with carriage return and line feed; and must wait for a response before issuing the next reply. An SMTP server responds to client requests with numeric reply codes and optional human-readable strings. SMTP application inspection controls and reduces the commands that the user can use as well as the messages that the server returns. SMTP inspection performs three primary tasks: Restricts SMTP requests to seven basic SMTP commands and eight extended commands. Monitors the SMTP command-response sequence. Generates an audit trail—Audit record 108002 is generated when invalid character embedded in the mail address is replaced. For more information, see RFC 821. SMTP inspection monitors the command and response sequence for the following anomalous signatures: Truncated commands. Incorrect command termination (not terminated with ). The MAIL and RCPT commands specify who are the sender and the receiver of the mail. Mail addresses are scanned for strange characters. The pipeline character (|) is deleted (changed to a blank space) and “” are only allowed if they are used to define a mail address (“>” must be preceded by “ Rule Actions > Protocol Inspection Tab >Select ESMTP Map The Select ESMTP Map dialog box lets you select or create a new ESMTP map. An ESMTP map lets you change the configuration values used for ESMTP application inspection. The Select ESMTP Map table provides a list of previously configured maps that you can select for application inspection. Fields Use the default ESMTP inspection map—Specifies to use the default ESMTP map. Select an ESMTP map for fine control over inspection—Lets you select a defined application inspection map or add a new one. Add—Opens the Add Policy Map dialog box for the inspection.
11-54 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols SMTP and Extended SMTP Inspection ESMTP Inspect Map The ESMTP Inspect Map dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > ESMTP The ESMTP pane lets you view previously configured ESMTP application inspection maps. An ESMTP map lets you change the default configuration values used for ESMTP application inspection. Since ESMTP traffic can be a main source of attack from spam, phising, malformed messages, buffer overflows, and buffer underflows, detailed packet inspection and control of ESMTP traffic are supported. Application security and protocol conformance enforce the sanity of the ESMTP message as well as detect several attacks, block senders and receivers, and block mail relay. Fields ESMTP Inspect Maps—Table that lists the defined ESMTP inspect maps. Add—Configures a new ESMTP inspect map. To edit an ESMTP inspect map, choose the ESMTP entry in the ESMTP Inspect Maps table and click Customize. Delete—Deletes the inspect map selected in the ESMTP Inspect Maps table. Security Level—Select the security level (high, medium, or low). –Low—Default. Log if command line length is greater than 512 Log if command recipient count is greater than 100 Log if body line length is greater than 1000 Log if sender address length is greater than 320 Log if MIME file name length is greater than 255 –Medium Obfuscate Server Banner Drop Connections if command line length is greater than 512 Drop Connections if command recipient count is greater than 100 Drop Connections if body line length is greater than 1000 Drop Connections if sender address length is greater than 320 Drop Connections if MIME file name length is greater than 255 –High Obfuscate Server Banner Drop Connections if command line length is greater than 512 Drop Connections if command recipient count is greater than 100 Drop Connections if body line length is greater than 1000 Drop Connections and log if sender address length is greater than 320 Drop Connections and log if MIME file name length is greater than 255 –MIME File Type Filtering—Opens the MIME Type Filtering dialog box to configure MIME file type filters. –Customize—Opens the Add/Edit ESMTP Policy Map dialog box for additional settings.
11-55 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols SMTP and Extended SMTP Inspection –Default Level—Sets the security level back to the default level of Low. MIME File Type Filtering The MIME File Type Filtering dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > ESMTP > MIME File Type Filtering The MIME File Type Filtering dialog box lets you configure the settings for a MIME file type filter. Fields Match Type—Shows the match type, which can be a positive or negative match. Criterion—Shows the criterion of the inspection. Value—Shows the value to match in the inspection. Action—Shows the action if the match condition is met. Log—Shows the log state. Add—Opens the Add MIME File Type Filter dialog box to add a MIME file type filter. Edit—Opens the Edit MIME File Type Filter dialog box to edit a MIME file type filter. Delete—Deletes a MIME file type filter. Move Up—Moves an entry up in the list. Move Down—Moves an entry down in the list. Add/Edit ESMTP Policy Map (Security Level) The Add/Edit ESMTP Policy Map (Security Level) dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > ESMTP > ESMTP Inspect Map > Basic View The Add/Edit ESMTP Policy Map pane lets you configure the security level and additional settings for ESMTP application inspection maps. Fields Name—When adding an ESMTP map, enter the name of the ESMTP map. When editing an ESMTP map, the name of the previously configured ESMTPS map is shown. Description—Enter the description of the ESMTP map, up to 200 characters in length. Security Level—Select the security level (high, medium, or low). –Low—Default. Log if command line length is greater than 512 Log if command recipient count is greater than 100 Log if body line length is greater than 1000 Log if sender address length is greater than 320 Log if MIME file name length is greater than 255 –Medium Obfuscate Server Banner
11-56 Cisco ASA Series Firewall ASDM Configuration Guide Chapter 11 Configuring Inspection of Basic Internet Protocols SMTP and Extended SMTP Inspection Drop Connections if command line length is greater than 512 Drop Connections if command recipient count is greater than 100 Drop Connections if body line length is greater than 1000 Drop Connections if sender address length is greater than 320 Drop Connections if MIME file name length is greater than 255 –High Obfuscate Server Banner Drop Connections if command line length is greater than 512 Drop Connections if command recipient count is greater than 100 Drop Connections if body line length is greater than 1000 Drop Connections and log if sender address length is greater than 320 Drop Connections and log if MIME file name length is greater than 255 –MIME File Type Filtering—Opens the MIME Type Filtering dialog box to configure MIME file type filters. –Default Level—Sets the security level back to the default level of Low. Details—Shows the Parameters and Inspections tabs to configure additional settings. Add/Edit ESMTP Policy Map (Details) The Add/Edit ESMTP Policy Map (Details) dialog box is accessible as follows: Configuration > Global Objects > Inspect Maps > ESMTP > ESMTP Inspect Map > Advanced View The Add/Edit ESMTP Policy Map pane lets you configure the security level and additional settings for ESMTP application inspection maps. Fields Name—When adding an ESMTP map, enter the name of the ESMTP map. When editing an ESMTP map, the name of the previously configured ESMTP map is shown. Description—Enter the description of the ESMTP map, up to 200 characters in length. Security Level—Shows the security level and mime file type filtering settings to configure. Parameters—Tab that lets you configure the parameters for the ESMTP inspect map. –Mask server banner—Enforces banner obfuscation. –Configure Mail Relay—Enables ESMTP mail relay. Domain Name—Specifies a local domain. Action—Drop connection or log. Log—Enable or disable. Inspections—Tab that shows you the ESMTP inspection configuration and lets you add or edit. –Match Type—Shows the match type, which can be a positive or negative match. –Criterion—Shows the criterion of the ESMTP inspection. –Value—Shows the value to match in the ESMTP inspection.