8-10
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 8 ASA and Cisco Cloud Web Security
Configure Cisco Cloud Web Security
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map
configuration mode.
b.
Enter parameters configuration mode.
hostname(config-pmap)#
parameters
hostname(config-pmap-p)#
c.
Set one or more parameters. You can set the following options; use the
no
form of the command to
disable the option:
•
{
http
|
https
}—The service type for this map. You can only specify one service type per map,
so you need separate maps for HTTP and HTTPS.
•
default
{[
user
username
] [
group
groupname
]}—(Optional.) The default user or group name,
or both. If the ASA cannot determine the identity of the user coming into the ASA, then the
default user and group is included in the HTTP request sent to Cloud Web Security. You can
define policies in ScanCenter for this user or group name.
d.
(Optional.) If you defined a whitelist, identify the class and use the
whitelist
command to mark it
as a whitelist.
hostname(config-pmap-p)#
class
whitelist1
hostname(config-pmap-c)#
whitelist
e.
Repeat the process to create an inspection policy map for the other protocol, HTTP or HTTPS.
Step 2
Define the classes for the traffic you want to redirect to Cloud Web Security.
ACL matching is the most flexible way to define the class. However, if you want to send all
HTTP/HTTPS traffic, you could instead use a port match in the class (
match port tcp 80
and
match
port tcp 443
). The following procedure describes an ACL match.
a.
Create ACLs (
access-list extended
command) to identify the traffic you want to send to Cloud Web
Security. You must create separate ACLs for HTTP and HTTPS traffic. Because Cloud Web Security
works on HTTP/HTTPS traffic only, any other traffic defined in the ACL is ignored.
A
permit
ACE sends matching traffic to Cloud Web Security. A
deny
ACE exempts traffic from the
service policy rule, so it is not sent to Cloud Web Security. Use
tcp
for the protocol, and identify the
port (80 for HTTP, 443 for HTTPS).
When creating your ACLs, consider how you can match appropriate traffic that is destined for the
Internet, but not match traffic that is destined for other internal networks. For example, to prevent
inside traffic from being sent to Cloud Web Security when the destination is an internal server on
the DMZ, be sure to add a deny ACE to the ACL that exempts traffic to the DMZ.
FQDN network objects might be useful in exempting traffic to specific servers. You can also use
identity firewall user arguments and Cisco Trustsec security groups to help identify traffic. Note that
Trustsec security group information is not sent to Cloud Web Security; you cannot define policy
based on security group.
Create as many ACLs as needed for your policy. You can apply redirection to any number of traffic
classes.
The following example shows how to exempt HTTP traffic to two servers, but include the remaining
traffic. You would create a duplicate ACL for HTTPS traffic, where you simply change the port to
443.
hostname(config)# object network cisco1
hostname(config-object-network)# fqdn www.cisco.com
hostname(config)# object network cisco2
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......