Cisco PIX. Upgrade-Workshop PixOS 7. Dipl.-Ing. Karsten Iwen CCIE #14602 (Security) http://security-planet.de



Similar documents
Cisco Firewall Video Mentor

Mastering ASA Firewall

Configuring Failover. Understanding Failover CHAPTER

Securing Networks with PIX and ASA

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

- Introduction to PIX/ASA Firewalls -

Cisco ASA, PIX, and FWSM Firewall Handbook

Implementing Core Cisco ASA Security (SASAC)

BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION WRITTEN BY: HARRIS ANDREA ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET

Implementation of High Availability

Configuring the Cisco Secure PIX Firewall with a Single Intern

Knowledgebase Solution

Cisco Data Center Services Node Architecture

WAN Failover Scenarios Using Digi Wireless WAN Routers

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

HOW TO CONFIGURE CISCO FIREWALL PART I

RAP Installation - Updated

Cisco NetFlow Security Event Logging Guide: Cisco ASA 5580 Adaptive Security Appliance and Cisco NetFlow Collector

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

TABLE OF CONTENTS NETWORK SECURITY 2...1

- The PIX OS Command-Line Interface -

Configuring Dynamic DNS

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Foreword Introduction Product Overview Introduction to Network Security Firewall Technologies Network Firewalls Packet-Filtering Techniques

Track 2: Operations: Data Center Architectures and Technologies

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall

Lecture 17 - Network Security

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

Understanding the Cisco VPN Client

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Configuring the Transparent or Routed Firewall

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

Troubleshooting the Firewall Services Module

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

same-security-traffic through show asdm sessions Commands

Installation of the On Site Server (OSS)

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Troubleshooting the Firewall Services Module

FWSM introduction Intro 5/1

Controlling Access Through the Firewall

Firewall Load Balancing

Tech-Note Bridges Vs Routers Version /06/2009. Bridges Vs Routers

VPN Only Connection Information and Sign up

FortiGate High Availability Overview Technical Note

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

Networking and High Availability

Configuring Role-Based Access Control

Application Notes SL1000/SL500 VPN with Cisco PIX 501

INTRODUCTION TO FIREWALL SECURITY

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

New Features in Cisco IOS Software Release 12.2(33)SXI2

ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example

Polycom. RealPresence Ready Firewall Traversal Tips

How To Configure The Fortigate Cluster Protocol In A Cluster Of Three (Fcfc) On A Microsoft Ipo (For A Powerpoint) On An Ipo 2.5 (For An Ipos 2.2.5)

Application Description

Network Security 2. Module 6 Configure Remote Access VPN

IPSec interoperability between Palo Alto firewalls and Cisco ASA. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.

How To Configure Virtual Host with Load Balancing and Health Checking

Configuring the Cisco PIX Firewall for SSH by Brian Ford

Networking and High Availability

Implementing Cisco IOS Network Security

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

How To Load Balance On A Cisco Cisco Cs3.X With A Csono Css 3.X And Csonos 3.5.X (Cisco Css) On A Powerline With A Powerpack (C

GregSowell.com. Mikrotik VPN

Configuring the ASA IPS Module

Multi-Homing Security Gateway

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

How To Configure Apple ipad for Cyberoam L2TP

Firewall Defaults and Some Basic Rules

Cisco Certified Security Professional (CCSP)

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

Cisco Networking Academy CCNP Multilayer Switching

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Broadband Phone Gateway BPG510 Technical Users Guide

SDM: Site to Site IPsec VPN Between ASA/PIX and an IOS Router Configuration Example

Recommended IP Telephony Architecture

How to configure WFS (Windows File Sharing ) Acceleration on SonicWALL WAN Acceleration Appliances

Barracuda Link Balancer

UIP1868P User Interface Guide

CSCE 465 Computer & Network Security

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Volume GAJSHIELD INFOTECH PVT LTD. Wan Failover & Load Balancing. Administrative Guide

Module 6 Configure Remote Access VPN

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

Transcription:

Cisco PIX Upgrade-Workshop PixOS 7 http://security-planet.de 22 March, 2007

Agenda Basics Access-Control Inspections Transparent Firewalls Virtual Firewalls Failover VPNs

Failover Sec. 7 P. 393 Active/Standby PixOS v6 PixOS v7 Active/Active

Failover - Active/Standby PixOS v6 interface ethernet5 100full nameif ethernet5 FAILOVER security1 ip address outside 192.168.1.1 255.255.255.0 ip address inside 10.0.1.1 255.255.255.0 ip address FAILOVER 172.17.1.1 255.255.255.0 failover ip address outside 192.168.1.2 failover ip address inside 10.0.1.2 failover ip address FAILOVER 172.17.1.2 failover failover poll 3 failover link FAILOVER failover lan unit primary failover lan interface FAILOVER failover lan key supersecret failover lan enable

Failover - Active/Standby PixOS v7 interface Ethernet0 nameif outside security-level 0 ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2 interface Ethernet1 nameif inside security-level 100 ip address 10.0.1.1 255.255.255.0 standby 10.0.1.2 interface Ethernet5 description LAN/STATE Failover Interface speed 100 duplex full

Failover - Active/Standby PixOS v7 failover failover lan unit primary failover lan interface FAILOVER Ethernet5 failover lan enable failover polltime unit 3 holdtime 9 failover polltime interface 3 failover key supersecret failover link FAILOVER Ethernet5 failover interface ip FAILOVER 172.17.1.1 255.255.255.0 standby 172.17.1.2 monitor-interface outside monitor-interface inside no monitor-interface dmz failover interface-policy 2

Failover - Active/Standby On PixOS 7 the following state-information are passed to the standby-unit: NAT translation table. TCP connection states. UDP connection states. The ARP table. The Layer 2 bridge table (when running in transparent firewall mode). The HTTP connection states (if HTTP replication is enabled). The ISAKMP and IPSec SA table. GTP PDP connection database.

Failover - Active/Standby As in v6, the following information are not passed to the standby unit: The user authentication (uauth) table. The routing tables. State information for Security Service Modules (only ASA). DHCP server address leases.

In PixOS 7 failover can be configured as Active/Active both firewalls transmit traffic Both firewalls need an unrestricted license, or 1*unrestricted and 1* FO-AA The failover-concept remains the same as Active/Standby, so only two firewalls are allowed in a failover-bundle The load is not automatically shared between the firewalls it s done as in a multi-group HSRP-Configuration firewall-contexts are used as Groups

Example: Two contexts share the load. One is the admin-context, the other one is a usercontext. E0 is the shared outside-interface. E1 is split in subinterfaces for two groups; each of them works with one subinterface. E2 is the stateful-link. We are using cable-based failover.

The Pix has to be configured for multiple-context-mode: mode multiple

The system-context is configured: the interfaces: interface Ethernet0 description Outside-Interface interface Ethernet1 description Trunk-Inside-Interface interface Ethernet1.10 description Inside-Interface Admin-Context vlan 10 interface Ethernet1.20 description Inside-Interface Context1 vlan 20 interface Ethernet2 description STATE Failover Interface

The system-context is configured: the failover-settings: failover failover link folink Ethernet2 failover interface ip folink 172.17.1.1 255.255.255.0 standby 172.17.1.2

The system-context is configured: two failover-groups: failover group 1 primary preempt failover group 2 secondary

The admin-context is created: this context works with failover-group 1 admin-context admin context admin description admin allocate-interface Ethernet0 allocate-interface Ethernet1.10 config-url flash:admin.cfg join-failover-group 1

The user-context is created: this context works with failover-group 2 context context1 description context1 allocate-interface Ethernet0 allocate-interface Ethernet1.20 config-url flash:/context1.cfg join-failover-group 2

The admin-context is configured: changeto context admin interface Ethernet0 nameif outside security-level 0 ip address 192.168.1.11 255.255.255.0 standby 192.168.1.12 interface Ethernet1.10 nameif inside security-level 100 ip address 10.0.10.1 255.255.255.0 standby 10.0.10.2 monitor-interface outside monitor-interface inside

The user-context is configured: changeto context context1 interface Ethernet0 nameif outside security-level 0 ip address 192.168.1.21 255.255.255.0 standby 192.168.1.22 interface Ethernet1.20 nameif inside security-level 100 ip address 10.0.20.1 255.255.255.0 standby 10.0.20.2 monitor-interface outside monitor-interface inside

Failover misc. prompt can now show on which FW you are: act/pix# sh run prompt prompt state hostname Subsecond Failover (v7.2): 800ms when active unit loses power or stops normal operation 500ms when interface link down on active unit