CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Foundation Topics



Overview of the Cisco PIX Firewall


Chapter 2, the design of the Cisco PIX Firewall provides some significant advantages over application-based firewalls. The Cisco PIX Firewall is designed to be a "performance built, best of breed, all-in-one security appliance." The PIX Firewall appliance provides state-of-the-art stateful firewalling, protocol and application inspection, virtual private networking, inline intrusion prevention, and outstanding multimedia and voice security. Having a single operating environment allows the device to operate more efficiently. Also, because it was designed with security in mind, it is not vulnerable to any known exploits.

Two key components that facilitate the outstanding performance of the PIX Firewall are the Adaptive Security Algorithm (ASA) and cut-through proxy. Both are discussed in detail in the following sections.

Adaptive Security Algorithm


A key part of the Cisco PIX operating environment is the ASA. The ASA is more secure and efficient than packet filtering and provides better performance than application-type proxy firewalls. The ASA segregates the network segments connected to the firewall, maintains secure perimeters, and can control traffic between those segments.

The firewall interfaces are assigned security levels. The PIX allows traffic to pass from an interface with a higher security level (inside) to an interface with a lower security level (outside) without an explicit rule for each resource on the higher-level segment. Traffic that is coming from an interface with a lower security level destined for an interface with a higher security level must meet the following two requirements:

  • A static translation must exist for the destination.

  • An access list or conduit must be in place to allow the traffic.


Access lists and conduits can be used to deny traffic from a higher security level to a lower security level just as they allow traffic from a lower level to a higher level.

Note

The use of conduits is not supported beyond PIX OS Version 6.3.

The ASA is designed to function as a stateful, connection-oriented process that maintains session information in a state table. Applying the security policy and address translation to the state table controls all traffic passing through the firewall. A random TCP sequence number is generated, and the ASA writes the connection information to the state table as an outbound connection is initiated. If the connection is allowed by the security policy, the source address is translated to an external address and the request goes out. Return traffic is compared to the existing state information. If the information does not match, the firewall drops the connection. The security emphasis on the connection rather than on the packets makes it nearly impossible to gain access by hijacking a TCP session.

Figure 3-1 depicts the mechanics of the Adaptive Security Algorithm and how it affects traffic flowing through the PIX Firewall. The following numbered list explains the steps indicated in the figure. Notice that Steps 1 and 5 are performed by the requestor and responder. Steps 2, 3, 4, and 6 are all performed by the PIX Firewall.


Figure 3-1. How ASA Works


1.

The internal host initiates an IP connection to an external resource.

2.

The PIX writes the following connection information into the state table:

- Source IP and port

- Destination IP and port

- TCP sequencing information

- Additional TCP/UDP flags

- A randomly generated TCP sequence number is applied (the state table entry is called a "session object")


3.

The connection object is compared to the security policy. If the connection is not allowed, the session object is deleted, and the connection is dropped.

4.

If the connection is approved by the security policy, the source address is translated and the request is forwarded to the external resource.

5.

The external resource replies to the request.

6.

The response arrives at the firewall and is compared to the session object. If the response matches the session object, the destination address is translated back to the original address and the traffic passes to the internal host. If it does not match, the connection is dropped.


Cut-Through Proxy


The cut-through proxy feature on the Cisco PIX Firewall provides significantly better performance than application proxy firewalls because it completes user authentication at the application layer, verifies authorization against the security policy, and then opens the connection as authorized by the security policy. Subsequent traffic for this connection is no longer handled at the application layer but is statefully inspected, providing significant performance benefits over proxy-based firewalls.

Figure 3-2 depicts the mechanics of cut-through proxy and the four steps that take place prior to the activation of the ASA. The following numbered list explains the steps indicated in the figure:


Figure 3-2. How Cut-Through Proxy Works


1.

The external user initiates an FTP, HTTP, or Telnet connection to the internal web server.

2.

The PIX Firewall replies with a user logon and the user completes the logon.

3.

The PIX Firewall uses TACACS+ or RADIUS to communicate the user account information to the AAA server, where it is authenticated.

4.

The connection to the web server is opened at the network layer, the session information is written to the connections table, and the ASA process begins.


Note

Users can authenticate to a user database on the PIX Firewall, but it is more efficient to use an external authentication server with RADIUS or TACACS+ because the processing required by the PIX Firewall to maintain and query an internal database increases the firewall''''s workload.


Cisco PIX Firewall Models and Features


Chapter 19, "Firewall Service Module."


All the PIX firewalls have the functionality described in the following sections incorporated into their design.

Intrusion Protection


PIX firewalls were designed to detect a variety of attacks. They can also be integrated with the Cisco Secure Intrusion Detection Sensor to dynamically react to different threats.

AAA Support


PIX firewalls work with RADIUS or TACACS+ and the Cisco Access Control Server (CSACS) or other AAA products to provide authentication, authorization, and accounting (AAA) functionality. It is also possible to configure a local user database on the PIX rather than integrate with an external authentication server.

X.509 Certificate Support


Digital certificates are your digital identification that verifies you are who you claim to be and validates the integrity of your data. Digital certificates are most commonly combined with encryption to secure data in the following four ways:


PIX firewalls support the Simple Certificate Enrollment Protocol (SCEP) and can be integrated with the following X.509 digital identification solutions:

  • Entrust Technologies, Inc. Entrust/PKI 4.0

  • Microsoft Corp. Windows 2000 Certificate Server 5.0

  • VeriSign Onsite 4.5

  • Baltimore Technologies UniCERT 3.05


Network Address Translation/Port Address Translation


PIX firewalls can statically or dynamically translate internal private (RFC 1918) addresses or any other address used internally to the assigned public addresses. They can also hide multiple hosts on the internal network behind a single public address. A one-for-one translation of addresses from internal to external, or from external to internal, is referred to as Network Address Translation (NAT). If multiple internal addresses are translated behind a single external address, each outgoing connection uses a different source port. This is called Port Address Translation (PAT).

Firewall Management


PIX firewalls can be managed using one of three methods:

  • Cisco command-line interface (CLI) The CLI uses commands consistent with other Cisco products. The PIX can be configured to allow access to the CLI via console, Telnet, and SSH. All system configurations can be saved as a text file for archive and recovery purposes.

  • PIX Device Manager (PDM) The PDM is a graphical user interface (GUI) that can be used to manage the PIX firewall. The GUI connects to the device via a secure connection and provides a simplified method of firewall management. The PDM also provides real-time log data that can be used to track events and do limited troubleshooting.

  • CiscoWorks Management Center for Firewalls (PIX MC) The PIX MC is a component of the CiscoWorks Enterprise Management Center. The PIX MC allows you to manage as many as 1000 PIX Firewalls and can be used to manage the entire perimeter of your enterprise network.


Simple Network Management Protocol


PIX firewalls allow limited SNMP support. Because SNMP was designed as a network management protocol and not a security protocol, it can be used to exploit a device. For this reason, the PIX Firewall allows only read-only access to remote connections. This enables the manager to remotely connect to the device and monitor SNMP traps but does not allow the manager to change any SNMP settings.

Syslog Support


PIX firewalls log four different types of events onto syslog:

  • Security

  • Resource

  • System

  • Accounting


The PIX can be configured to react differently to any of eight severity levels for each event type. Logs are stored in system memory and can be forwarded to a syslog server. It is a recommended practice to select the appropriate log level that generates the syslog details required to track session-specific data.

Virtual Private Networks


All PIX firewalls are designed to function as a termination point, or VPN gateway, for VPNs. This functionality allows administrators to create encrypted connections with other networks over the Internet. The VPN performance of each PIX model is listed in its corresponding specifications section later in this chapter.

Optional Firewall Components


Cisco offers five optional components for use with the PIX 515E, 525, or 535 models. These components can increase the performance and functionality of the PIX Firewall. The five optional components include:

  • VPN Accelerator Card (VAC) The VAC is a card that fits into a PCI slot of the PIX 515E through 535 firewall appliances and increases VPN performance and security by segregating the processing required for the VPN from all other traffic traversing the firewall. The VAC supports both DES and 3DES encryption.

  • VPN Accelerator Card Plus (VAC+) The VAC+ is an improved version of the VAC. It also fits into a PCI slot of the PIX 515E through 535 appliances. The VAC+ supports DES, 3DES, and the Advanced Encryption Standard (AES). The VAC+ requires PIX OS Version 6.3(1) or higher with a DES, 3DES/AES license.

    Note

    Only one VAC or VAC+ card can be installed in the PIX appliance.

  • Cisco PIX Firewall FastEthernet Interface Card (PIX-1FE) The PIX-1FE is a 10/100 Ethernet interface on a 33-MHz PCI card. This enables you to increase the number of interfaces on the 515E to 535 appliances.

  • Cisco PIX 64-bit/66-MHz Four-Port FastEthernet Interface Card (4FE-66) The 4FE-66 interface card is a single PCI card that combines four 10/100 Ethernet interfaces. This interface card works with the 515E, 525, and 535 firewall appliances and allows you to install four 10/100 interfaces per PCI slot up to the maximum number of interfaces per device model.

  • Cisco PIX Firewall 66-MHz Gigabit Ethernet Card (1GE-66) The 1GE-66 Gigabit interface fits into the PCI slot of the 525 and 535 firewall appliances. The 1GE-66 allows for full-duplex gigabit (1000BASE-SX) performance, compliant with the IEEE 802.2 and 802.3z Ethernet standards.


Note

The type and number of interfaces that will function in the PIX Firewall appliance is normally determined by the license installed not the number of available PCI slots.


PIX Firewall Model Capabilities


The following sections describe the characteristics and capabilities of each of the PIX Firewall models. The throughput speeds mentioned for each model refer to the speeds at which the firewall can process the data. The actual throughput for the firewall is largely determined by the speed of the firewall interface, the speed of the connected link, or the packet (MTU) size.

Cisco PIX 501


The Cisco PIX 501 Firewall was designed for the SOHO environment. It has a 133-MHz processor, 16 MB of RAM, and 8 MB of Flash memory. It has an outside Ethernet interface and an integrated four-port Ethernet 10/100 switch on the internal side. It has a 9600-baud console port that is used for local device management. The PIX 501 does not support failover.

Connection capabilities for the PIX 501 are as follows:

  • Maximum clear-text throughput60 Mbps

  • Maximum throughput (DES)6 Mbps

  • Maximum throughput (AES-128)4.5 Mbps

  • Maximum throughput (3DES)3 Mbps

  • Maximum concurrent connections7500

  • Maximum concurrent VPN peers10


As shown in Figure 3-3, the front panel of the PIX 501 has a power indicator, a VPN tunnel indicator, and two rows of LEDs for link and network activity. These indicators are divided into two groups:


Figure 3-3. PIX 501 Front Panel

  • The outside Ethernet interface

  • The four inside Ethernet interfaces (switch)


There are several licenses available for the PIX 501 Firewall. Upgrades are available to increase the number of users or to implement VPN support. Chapter 11.

Cisco PIX 506E


The Cisco PIX 506E Firewall was designed for the ROBO environment. It has a 300-MHz Celeron processor, 32 MB of RAM, and 8 MB of Flash memory. It has a fixed outside Ethernet interface and a fixed inside Ethernet interface. It has a 9600-baud console port that is used for local device management. The PIX 506 does not support failover.

Connection capabilities for the PIX 506 are as follows:

  • Maximum clear-text throughput100 Mbps

  • Maximum throughput (DES)20 Mbps

  • Maximum throughput (3DES)17 Mbps

  • Maximum throughput (AES-128)30 Mbps

  • Maximum concurrent connections25,000

  • Maximum concurrent VPN peers25


As shown in Figure 3-4, the PIX 506 has three status LEDs on the front panel that indicate power to the system, that the system is active (the OS is fully loaded), and that there is network activity on any interface.


Figure 3-4. PIX 506 Front Panel

As shown in Figure 3-5, the rear of the PIX 506 contains the Ethernet ports and the console port.


Figure 3-5. PIX 506E Rear Panel

The console can be connected using an RJ-45 to a DB-9 or DB-25 serial adapter, as shown in Figure 3-6.


Figure 3-6. PIX 506E Console Connection

There are three licenses available for the PIX 506E Firewall. The basic license provides unlimited user access and the two upgrades allow for VPN support. Table 3-3 describes the available licenses and their function.

Table 3-3. Cisco PIX 506E Licenses

License

Function

Unlimited User License

Support for an unlimited number of concurrent connections from source IP addresses on the internal network to traverse the firewall. Also provides DHCP server support for up to 256 leases. This is the standard license that comes with the PIX 506E.

DES Encryption License

Support for 56-bit DES encryption.

3DES/AES Encryption License

Support for 168-bit 3DES up to 256-bit AES encryption.

Cisco PIX 515E


The Cisco PIX 515E Firewall was designed for small- to medium-size businesses. The PIX 515E is the smallest firewall of the PIX family that is designed to be rack-mountable and is a standard 1U (1.75-inch) configuration. It has a 433-MHz processor, 32 MB or 64 MB of RAM, and 16 MB of Flash memory. It has two fixed 10/100 Ethernet interfaces that have a default configuration of outside (Ethernet 0) and inside (Ethernet 1) and contains two PCI slots for the installation of up to four additional Ethernet interfaces.

Chapter 9, "Routing and the PIX Firewall."

Connection capabilities for the PIX 515E are as follows:

  • Maximum clear-text throughput188 Mbps

  • Maximum throughput (3DES)63 Mbps with VAC

  • Maximum throughput (3DES)140 Mbps with VAC+

  • Maximum throughput (AES-128)135 Mbps with VAC+

  • Maximum throughput (AES-256)140 Mbps with VAC+

  • Maximum concurrent connections130,000

  • Maximum concurrent VPN peers2000


As shown in Figure 3-7, the PIX 515E has three status LEDs on the front panel that indicate power to the system, that the system is active (the OS is fully loaded and the system is operational), and that there is network activity on any interface. If you have two firewalls running in the failover mode, the active light indicates which firewall is active and which is standby.


Figure 3-7. PIX 515E Front Panel

The rear of the PIX 515E contains the Ethernet ports and the console port. The PIX 515E can handle up to four additional Ethernet interfaces. This could be a single four-port Ethernet card (see Figure 3-8) or two single-port cards (see Figure 3-9). The PIX 515E automatically recognizes and numbers any additional interfaces that are installed.


Figure 3-8. PIX 515E with Additional Four-Port Interface


Figure 3-9. PIX 515E with Two Additional Interfaces

The PIX 515E also can be configured with a VAC or VAC+. The VAC and VAC+ handle much of the VPN traffic processing (encryption and decryption), thus improving the firewall''''s performance. The VAC and VAC+ are recommended for firewalls that connect multiple high-traffic VPNs.

The installation of additional interfaces and failover requires that the software license be upgraded from the basic license (515-R) to the unrestricted license (515-UR). A maximum of three interfaces can be installed using the restricted license.

The console connection for the PIX 515E is the same as for the 506E.

There are three licenses available for the PIX 515E Firewall. Upgrades are available to implement VPN support. Table 3-4 describes the available licenses and their function.

Table 3-4. Cisco PIX 515E Licenses

License

Function

Restricted Software License

Support for 32 MB of RAM and up to three 10/100 interfaces. The restricted license supports only limited VPN connectivity and does not support failover.

Unrestricted Software License

Support for 64 MB of RAM, up to six 10/100 interfaces, stateful failover, and integrated VAC or VAC+.

Failover Software License

Support for a "hot standby" system designed to operate in conjunction with an active system running the unrestricted license.

Cisco PIX 525


The Cisco PIX 525 Firewall is an enterprise firewall. It provides perimeter security for large enterprise networks. The PIX 525 is rack-mountable in a 2U (3.5-inch) configuration. It has a 600-MHz processor, up to 256 MB of RAM, and 16 MB of Flash memory. It has two fixed 10/100 Ethernet interfaces. The two fixed interfaces are Ethernet 0, which is the outside interface by default, and Ethernet 1, which is the inside interface by default.

The PIX 525 also includes three PCI slots for the installation of up to six additional Ethernet interfaces. It has a 9600-baud console port that is used for local device management. The PIX 525 can be configured for failover using a failover cable connected to the 115-kbps serial connection or can be configured for LAN-based failover. The PIX 525 also can be configured with a VAC. The VAC handles much of the processing of VPN traffic (encryption and decryption), thus improving the firewall''''s performance. The VAC is recommended for firewalls that will connect multiple high-traffic VPNs.

Connection capabilities for the PIX 525 are as follows:

  • Maximum clear-text throughput330 Mbps

  • Maximum throughput (3DES)72 Mbps with VAC

  • Maximum throughput (3DES)155 Mbps with VAC+

  • Maximum throughput (AES-128)165 Mbps with VAC+

  • Maximum throughput (AES-256)170 Mbps with VAC+

  • Maximum concurrent connections280,000

  • Maximum concurrent VPN peers2000


As shown in Figure 3-10, the PIX 525 has two LEDs on the front. These LEDs indicate that the firewall has power and that the system is active (the OS is loaded and the system is operational). The active light indicates which firewall is active in a failover pair.


Figure 3-10. PIX 525 Front Panel

The rear of the PIX 525, shown in Figure 3-11, is similar in design to the PIX 515E, with fixed interfaces and additional PCI slots. The PIX 525 can support 10/100 Mbps and Gbps Ethernet interface cards.


Figure 3-11. PIX 525 Rear Panel

The console connection for the PIX 525 is the same as for the PIX 506E, 515E, and 535.

Note

The installation of additional physical interfaces and failover requires that the software license be upgraded from the Restricted Bundle.

The three licenses available for the PIX 525 Firewall are similar to those available for the PIX 515E but support a greater amount of RAM and more available physical interfaces. Upgrades are available to increase the number of supported physical interfaces or to implement VPN hardware (VAC/VAC+) support. Table 3-5 describes the available licenses and their function.

Table 3-5. Cisco PIX 525 Licenses

License

Function

Restricted Software License

Support for 128 MB of RAM and up to six total 10/100 interfaces or three Gigabit interfaces (plus the two 10/100 onboard interfaces.

Unrestricted Software License

Support for 256 MB of RAM, a total of eight 10/100 interfaces or three Gigabit interfaces (plus the two onboard 10/100 interfaces), stateful failover, and integrated VAC or VAC+.

Failover Software License

Support for a "hot standby" system designed to operate in conjunction with an active system running the unrestricted license.

Cisco PIX 535


The Cisco PIX 535 Firewall is the ultimate enterprise firewall designed for enterprise networks and service providers. The PIX 535 is rack-mountable and fits a 3U configuration. It has a 1-GHz processor, up to 1 GB of RAM, and 16 MB of Flash memory. It has nine PCI slots for the installation of up to ten Ethernet interfaces. It has a 9600-baud console port that is used for local device management, as shown in Figure 3-12.


Figure 3-12. PIX 535 Rear Panel

The PIX 535 can be configured for failover using a failover cable connected to the 115-kbps serial connection or configured for LAN-based failover. The PIX 535 is also available with redundant hot-swappable power supplies.

The PIX 535 can also be configured with a VAC or VAC+. The VAC and VAC+ handle much of the VPN traffic processing (encryption and decryption), thus improving the firewall''''s performance. The VAC and VAC+ are recommended for firewalls that connect multiple high-traffic VPNs.

Connection capabilities for the PIX 535 are as follows:

  • Maximum clear-text throughput1.7 GBps

  • Maximum throughput (3DES)100 Mbps with VAC

  • Maximum throughput (3DES)440 Mbps with VAC+

  • Maximum throughput (128 AES)535 Mbps with VAC+

  • Maximum throughput (256 AES)440 Mbps with VAC+

  • Maximum concurrent connections500,000

  • Maximum concurrent VPN peers2000


As shown in Figure 3-13, the PIX 535 has two LEDs on the front. These LEDs indicate that the firewall has power and that the system is active (the OS is loaded and passing traffic). The active light indicates which device of a failover pair is active and which is standby.


Figure 3-13. PIX 535 Front Panel

The PCI slots are divided into different bus speeds. The slots are numbered from right to left, and slots 0 through 3 run at 64-bit/66 MHz and can support Gigabit Ethernet interface cards (1GE-66). Slots 4 through 8 run at 32-bit/33 MHz and can support Fast Ethernet interface cards (PIX-1FE and PIX-4FE). Figure 3-14 depicts the rear panel of the PIX 535 Firewall.


Figure 3-14. PIX 535 Rear Panel

Note

Do not mix 33-MHz and 66-MHz cards on the same bus. This causes the overall speed of the 66-MHz bus to be reduced to 33 MHz.

The PIX 535 also supports a VPN accelerator card (VAC and VAC+). It should be installed only on the 32-bit/33-MHz bus.

The console connection for the PIX 535 is the same as for the other PIX models.

The three licenses available for the PIX 535 Firewall are similar to those available for the PIX 515E and 525 but support a greater amount of RAM and more available physical interfaces. Upgrades are available to implement VPN hardware (VAC or VAC+) support. PIX OS Version 6.3 supports logical interfaces and VLANs. Table 3-6 describes the available licenses and their function.

Table 3-6. Cisco PIX 535 Licenses

License

Function

Restricted Software License

Support for 512 MB of RAM and up to eight 10/100 interfaces or eight Gigabit interfaces.

Unrestricted Software License

Support for 1 GB of RAM, up to ten 10/100 interfaces or nine Gigabit interfaces, stateful failover, and integrated VAC or VAC+.

Failover Software License

Support for a "hot standby" system designed to operate in conjunction with an active system running the unrestricted license.

Note

The installation of additional interfaces and failover requires that the software license be upgraded from the Restricted Bundle.

Note

The PIX 506E through 535 Firewall appliances all have an onboard USB port. At this time the USB port is not used.


    / 191