SlideShare a Scribd company logo
FIREWALL BASICS
• AGENDA
§ INTRODUCTION
§ FIREWALL DEPLOYMENT MODES
§ ACCESS CONTROL
§ HIGH AVAILABILITY FEATURES
§ UNDERSTANDING NAT
CISCO FIREWALL BASICS
What is Firewall?
 A firewall is a security device which is configured to permit, deny or
proxy data connections set by the organization's security policy. Firewalls can either be hardware or software
based
 A firewall's basic task is to control traffic between computer networks with different zones of trust
 Today’s firewalls combine multilayer stateful packet inspection and multiprotocol application inspection
 Modern firewalls have evolved by providing additional services such as VPN, IDS/IPS, and URL filtering
 Despite these enhancements, the primary role of the firewall is to enforce security policy
FIREWALL DESIGN
Simple Internet Firewall Design
Two interfaces: trusted and untrusted
Usually blocks all inbound access from untrusted networks and allows all access outbound from trusted
network
INTERNET FIREWALL WITH DMZ
A perimeter network or DMZ (De-Militarized Zone) is a common design
element used to add an additional interface to a Firewall
FIREWALL DESIGN – MODES
OF OPERATION
 Routed Mode is the traditional mode of the firewall. Two or more interfaces
that separate L3 domains
 Transparent Mode is where the firewall acts as a bridge functioning mostly at
L2
 Multi-context mode involves the use of virtual firewalls, which can be either
routed or transparent mode
 Mixed mode is the concept of using virtualization to combine routed and
transparent mode virtual firewalls
FIREWALL SECURITY LEVELS
 A security level is a number between 0 and 100 that determines how firewall rules are
processed for the data plane
 Security levels are tied to an interface: the inside or private side interface is always 100
(most trusted) and the outside or public interface is always 0 (least trusted)
 DMZ interfaces, if used, may be assigned numbers between 1 and 99
 Traffic on the ASA is allowed by default from a higher security level interface to a lower
security level interface
 An ACL must explicitly permit traffic from a lower security level interface to a higher (e.g.
outside to in)
ACCESS CONTROL LISTS
Type Description
Standard Used for routing protocol, not firewall rules
Extended Source/Dest. port and protocol
Ethertype Used with transparent mode
Webtype Used for clientless SSL VPN
 Like Cisco IOS, ACLs are processed from top down, sequentially with an implicit deny all at the bottom
 A criteria match will cause the ACL to be exited
 ACLs are made up of Access Control Entries (ACE)
 ACLs can be enabled/disabled based on time ranges
NAT AND FIREWALL
 NAT is simply a means of address translation; commonly this is a privately addressed source
into a globally routed address pool (typically 1x1 mapping)
 Port Address Translation (PAT) is the idea of mapping multiple source addresses into one
“outside” address, commonly the interface address of the firewall (1 to many mapping)
 NAT is available in both routed mode and transparent mode
NAT CONTROL
 NAT control is the concept that a packet from a high security interface (e.g.
“inside”) must match a NAT policy when traversing a lower level security interface
(e.g. “outside”)
 If the packet does not match a NAT policy, then it is dropped
DYNAMIC NAT
 Dynamic NAT is the most common application of NAT on the Cisco firewall
 It allocates addresses from a specified pool for hosts as they establish connections to meet
the NAT policy
 There is no relationship between a host and the it’s translated address, hence it’s
“dynamic” (vs. static)
PORT ADDRESS TRANSLATION (PAT)
 PAT is best used in small networks where a global address pool isn’t available
 Commonly the firewall interface address is used
 Best way to conserve addresses as translates all addresses into one address and uses
port numbers for tracking
OPTIONS FOR BYPASSING NAT
 Identity NAT (Nat 0) – limits NAT on all interfaces, very little granularity, will not allow outside
to inside connections even if permitted by ACL
 Static Identity NAT – based on interface, a host can be translated on one interface and not
translated on another. Works with Policy NAT
 NAT exemption (Nat 0 with Access Control List) – more granular than Identity NAT as it allows
bidirectional communication between inside and outside hosts. The ACL allows for very
specific NAT policies to be created
 NAT exemption is the most common method for bypassing NAT today
POLICY NAT
 In some cases it may be necessary to have a NAT policy that translates based on source
AND destination
 While dynamic NAT only considers the source address, policy NAT looks at both source
and destination including port numbers
 Very useful when an application (e.g. FTP, VoIP) has secondary channels that need a
specific policy
 The source, destination and all relevant ports are assigned via an ACL
 Policy NAT does not support time-based ACLs
CONFIGURING NAT
NAT configuration requires at least two parts: a Nat statement and a matching
global statement
Asa(config)#Nat(inside) 1 10.1.2.0 255.255.255.0
Asa(config)#global (outside) 1 172.16.1.3-172.16.1.10
HIGH AVAILABILITY – INTERFACE
REDUNDANCY
 Up to 8 redundant interface pairs are allowed.
 Compatible with all firewall modes (routed/transparent and single/multiple) and all HA
deployments (A/A and A/S)
 When the active physical interface fails, traffic fails to the standby physical interface and
routing adjacencies, connection, and auth state won’t need to be relearned.

More Related Content

PPTX
Firewall DMZ Zone
PPTX
Firewall ( Cyber Security)
PDF
Linux systems - Linux Commands and Shell Scripting
PPTX
Firewall & Proxy Server
PPT
firewall.ppt
PPTX
Cyber threats
PPTX
Streaming Stored Video- Computer Networking
Firewall DMZ Zone
Firewall ( Cyber Security)
Linux systems - Linux Commands and Shell Scripting
Firewall & Proxy Server
firewall.ppt
Cyber threats
Streaming Stored Video- Computer Networking

What's hot (20)

PDF
6.5.1.2 packet tracer layer 2 security instructor
PDF
Introduction to AMQP Messaging with RabbitMQ
PPT
udp , tcp ,sctp
PPTX
Servers.pptx
PPT
Red Hat Certified engineer course
PPTX
Network Security
PPTX
unified threat management by Nisha Menon K
PPTX
Computer Networks : WWW , TELNET and SSH
KEY
Network infrastructure - TCP/IP
PPTX
Networking infrastructure
PPTX
Software project management Software economics
PPTX
Firewall basics
PPT
Proxy Servers
PPTX
PPT
Ccna report
PDF
Nmap commands
PPTX
Firewall & packet filter new
PPT
Networking Basics
6.5.1.2 packet tracer layer 2 security instructor
Introduction to AMQP Messaging with RabbitMQ
udp , tcp ,sctp
Servers.pptx
Red Hat Certified engineer course
Network Security
unified threat management by Nisha Menon K
Computer Networks : WWW , TELNET and SSH
Network infrastructure - TCP/IP
Networking infrastructure
Software project management Software economics
Firewall basics
Proxy Servers
Ccna report
Nmap commands
Firewall & packet filter new
Networking Basics
Ad

Viewers also liked (20)

PPTX
PACE-IT: Firewall Basics
PDF
BACIK CISCO SKILLS
PPT
Accessing internet resources best practices
PDF
Big Ip Global Traffic Manager Ds
PPTX
PPTX
CCCNA R&S-04-Fundamentals of WANs
PPT
NAT Traversal
PPT
Network security
PPTX
CCNA R&S-10-Implementing Ethernet Virtual LANs
PDF
Smart powetr grids
PPTX
F5 BIG-IP Web-based Customer Training
PDF
Configuration F5 BIG IP ASM v12
PPT
Internet Leased lines
PPTX
F5 - BigIP ASM introduction
PPTX
All 50 Ways to Use BIG-IP
PPTX
CCNA R&S-09-Configuring Ethernet Switching
PPTX
CCCNA R&S-03-Fundamentals of Ethernet LANs
PPTX
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
PPTX
Methods of connecting internet
PDF
Palo alto networks NAT flow logic
PACE-IT: Firewall Basics
BACIK CISCO SKILLS
Accessing internet resources best practices
Big Ip Global Traffic Manager Ds
CCCNA R&S-04-Fundamentals of WANs
NAT Traversal
Network security
CCNA R&S-10-Implementing Ethernet Virtual LANs
Smart powetr grids
F5 BIG-IP Web-based Customer Training
Configuration F5 BIG IP ASM v12
Internet Leased lines
F5 - BigIP ASM introduction
All 50 Ways to Use BIG-IP
CCNA R&S-09-Configuring Ethernet Switching
CCCNA R&S-03-Fundamentals of Ethernet LANs
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Methods of connecting internet
Palo alto networks NAT flow logic
Ad

Similar to Firewall basics (20)

PPTX
PPSX
Firewall & its Services
PPT
Firewalls
PPTX
Cyber security tutorial2
PPTX
Chapter_1_Introduction to Network Security-1.pptx
PDF
The Complete Questionnaires About Firewall
PPS
Internetworking With Pix Firewall
PDF
Introduction to firewalls
PDF
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
PPTX
Firewall (Network Firewall used by Network)
PPTX
Firewall and Types of firewall
PPT
Ch05 Network Defenses
PDF
Ccna 4 Chapter 1 V4.0 Answers
DOCX
AZ500 Secure Networking. and how things are implemented
PDF
PPTX
IPS NAT and VPN.pptx
PPTX
Module 7 Firewalls Part - 2 Presentation
PDF
Easy steps-cisco-extended-access-list-231
PDF
Tivoli firewall magic redp0227
Firewall & its Services
Firewalls
Cyber security tutorial2
Chapter_1_Introduction to Network Security-1.pptx
The Complete Questionnaires About Firewall
Internetworking With Pix Firewall
Introduction to firewalls
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewall (Network Firewall used by Network)
Firewall and Types of firewall
Ch05 Network Defenses
Ccna 4 Chapter 1 V4.0 Answers
AZ500 Secure Networking. and how things are implemented
IPS NAT and VPN.pptx
Module 7 Firewalls Part - 2 Presentation
Easy steps-cisco-extended-access-list-231
Tivoli firewall magic redp0227

More from Sandeep Yadav (6)

PPTX
The magic to get rid of our limitations
PPTX
Network Security Risks and Challenges for Enterprises
PPTX
Robo brain
PPTX
Truenorth - Ibm’s brain like chip
PPTX
Cognitive computing
PPTX
Enterprise Network Design and Deployment
The magic to get rid of our limitations
Network Security Risks and Challenges for Enterprises
Robo brain
Truenorth - Ibm’s brain like chip
Cognitive computing
Enterprise Network Design and Deployment

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
1. Introduction to Computer Programming.pptx
Machine Learning_overview_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Getting Started with Data Integration: FME Form 101
Spectroscopy.pptx food analysis technology
Group 1 Presentation -Planning and Decision Making .pptx

Firewall basics

  • 2. • AGENDA § INTRODUCTION § FIREWALL DEPLOYMENT MODES § ACCESS CONTROL § HIGH AVAILABILITY FEATURES § UNDERSTANDING NAT
  • 3. CISCO FIREWALL BASICS What is Firewall?  A firewall is a security device which is configured to permit, deny or proxy data connections set by the organization's security policy. Firewalls can either be hardware or software based  A firewall's basic task is to control traffic between computer networks with different zones of trust  Today’s firewalls combine multilayer stateful packet inspection and multiprotocol application inspection  Modern firewalls have evolved by providing additional services such as VPN, IDS/IPS, and URL filtering  Despite these enhancements, the primary role of the firewall is to enforce security policy
  • 4. FIREWALL DESIGN Simple Internet Firewall Design Two interfaces: trusted and untrusted Usually blocks all inbound access from untrusted networks and allows all access outbound from trusted network
  • 5. INTERNET FIREWALL WITH DMZ A perimeter network or DMZ (De-Militarized Zone) is a common design element used to add an additional interface to a Firewall
  • 6. FIREWALL DESIGN – MODES OF OPERATION  Routed Mode is the traditional mode of the firewall. Two or more interfaces that separate L3 domains  Transparent Mode is where the firewall acts as a bridge functioning mostly at L2  Multi-context mode involves the use of virtual firewalls, which can be either routed or transparent mode  Mixed mode is the concept of using virtualization to combine routed and transparent mode virtual firewalls
  • 7. FIREWALL SECURITY LEVELS  A security level is a number between 0 and 100 that determines how firewall rules are processed for the data plane  Security levels are tied to an interface: the inside or private side interface is always 100 (most trusted) and the outside or public interface is always 0 (least trusted)  DMZ interfaces, if used, may be assigned numbers between 1 and 99  Traffic on the ASA is allowed by default from a higher security level interface to a lower security level interface  An ACL must explicitly permit traffic from a lower security level interface to a higher (e.g. outside to in)
  • 8. ACCESS CONTROL LISTS Type Description Standard Used for routing protocol, not firewall rules Extended Source/Dest. port and protocol Ethertype Used with transparent mode Webtype Used for clientless SSL VPN  Like Cisco IOS, ACLs are processed from top down, sequentially with an implicit deny all at the bottom  A criteria match will cause the ACL to be exited  ACLs are made up of Access Control Entries (ACE)  ACLs can be enabled/disabled based on time ranges
  • 9. NAT AND FIREWALL  NAT is simply a means of address translation; commonly this is a privately addressed source into a globally routed address pool (typically 1x1 mapping)  Port Address Translation (PAT) is the idea of mapping multiple source addresses into one “outside” address, commonly the interface address of the firewall (1 to many mapping)  NAT is available in both routed mode and transparent mode
  • 10. NAT CONTROL  NAT control is the concept that a packet from a high security interface (e.g. “inside”) must match a NAT policy when traversing a lower level security interface (e.g. “outside”)  If the packet does not match a NAT policy, then it is dropped
  • 11. DYNAMIC NAT  Dynamic NAT is the most common application of NAT on the Cisco firewall  It allocates addresses from a specified pool for hosts as they establish connections to meet the NAT policy  There is no relationship between a host and the it’s translated address, hence it’s “dynamic” (vs. static)
  • 12. PORT ADDRESS TRANSLATION (PAT)  PAT is best used in small networks where a global address pool isn’t available  Commonly the firewall interface address is used  Best way to conserve addresses as translates all addresses into one address and uses port numbers for tracking
  • 13. OPTIONS FOR BYPASSING NAT  Identity NAT (Nat 0) – limits NAT on all interfaces, very little granularity, will not allow outside to inside connections even if permitted by ACL  Static Identity NAT – based on interface, a host can be translated on one interface and not translated on another. Works with Policy NAT  NAT exemption (Nat 0 with Access Control List) – more granular than Identity NAT as it allows bidirectional communication between inside and outside hosts. The ACL allows for very specific NAT policies to be created  NAT exemption is the most common method for bypassing NAT today
  • 14. POLICY NAT  In some cases it may be necessary to have a NAT policy that translates based on source AND destination  While dynamic NAT only considers the source address, policy NAT looks at both source and destination including port numbers  Very useful when an application (e.g. FTP, VoIP) has secondary channels that need a specific policy  The source, destination and all relevant ports are assigned via an ACL  Policy NAT does not support time-based ACLs
  • 15. CONFIGURING NAT NAT configuration requires at least two parts: a Nat statement and a matching global statement Asa(config)#Nat(inside) 1 10.1.2.0 255.255.255.0 Asa(config)#global (outside) 1 172.16.1.3-172.16.1.10
  • 16. HIGH AVAILABILITY – INTERFACE REDUNDANCY  Up to 8 redundant interface pairs are allowed.  Compatible with all firewall modes (routed/transparent and single/multiple) and all HA deployments (A/A and A/S)  When the active physical interface fails, traffic fails to the standby physical interface and routing adjacencies, connection, and auth state won’t need to be relearned.