5-20
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 5 Identity Firewall
Examples for the Identity Firewall
hostname(config)#
access-list AUTH extended permit tcp any 172.1.1.118 255.255.255.255 eq http
hostname(config)#
access-list AUTH extended permit tcp any 172.1.1.118 255.255.255.255 eq https
hostname(config)#
aaa-server LDAP protocol ldap
hostname(config-aaa-server-group)#
aaa-server LDAP (inside) host 171.1.2.93
hostname(config-aaa-server-host)#
ldap-base-dn DC=cisco,DC=com
hostname(config-aaa-server-host)#
ldap-group-base-dn DC=cisco,DC=com
hostname(config-aaa-server-host)#
ldap-scope subtree
hostname(config-aaa-server-host)#
ldap-login-dn cn=kao,OU=Employees,OU=Cisco Users,DC=cisco,DC=com
hostname(config-aaa-server-host)#
ldap-login-password *****
hostname(config-aaa-server-host)#
ldap-over-ssl enable
hostname(config-aaa-server-host)#
server-type microsoft
hostname(config-aaa-server-host)#
aaa authentication match AUTH inside LDAP
hostname(config)#
hostname(config)#
http server enable
hostname(config)#
http 0.0.0.0 0.0.0.0 inside
hostname(config)#
hostname(config)#
auth-prompt prompt Enter Your Authentication
hostname(config)#
auth-prompt accept You are Good
hostname(config)#
auth-prompt reject Goodbye
AAA Rule and Access Rule Example 2
In this example, the following guidelines apply:
•
In
access list
commands, permit user NONE rules should be written before entering the
access-list
100 ex deny any any
command to allow unauthenticated incoming users to trigger AAA cut-through
proxy.
•
In the
auth access-list
command, permit user NONE rules guarantee only unauthenticated trigger
cut-through proxy. Ideally, they should be the last lines.
hostname(config)#
access-list listenerAuth extended permit tcp any any
hostname(config)#
aaa authentication match listenerAuth inside ldap
hostname(config)#
aaa authentication listener http inside port 8888
hostname(config)#
access-list 100 ex permit ip user SAMPLE\user1 any any
hostname(config)#
access-list 100 ex deny ip user SAMPLE\user2 any any
hostname(config)#
access-list 100 ex permit ip user NONE any any
hostname(config)#
access-list 100 ex deny any any
hostname(config)#
access-group 100 in interface inside
hostname(config)#
aaa authenticate match 200 inside user-identity
VPN Filter Example
Some traffic might need to bypass the Identity Firewall.
The ASA reports users logging in through VPN authentication or a web portal (cut-through proxy) to the
AD Agent, which distributes the user information to all registered ASA devices. Specifically, the IP-user
mapping of authenticated users is forwarded to all ASA contexts that include the input interface where
HTTP/HTTPS packets are received and authenticated. The ASA designates users logging in through a
VPN as belonging the LOCAL domain.
There are two different ways to apply identity firewall (IDFW) rules to VPN users:
•
Apply VPN-Filter with bypassing access-list check disabled
•
Apply VPN-Filter with bypassing access-list check enabled
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......