CISCO ASA - Objects
CISCO ASA - Objects
Objects are reusable components for use in our configuration. We can define and use them in
Cisco ASA configurations in the place of IP addresses, services and so on.
We create objects only once and refers them anywhere in the configuration.
Objects make it easy to maintain our configurations because we can modify an object in one
place and have it be reflected in all other places that are referencing it.
For example, if we are using IP address and subnet mask in multiple features in our configuration
and we want to modify it then we have to change it every place manually but if we use object of
same IP address then we would just modify the object definition and change would be reflected
in very pace where it is referred.
Types of Objects
Network Object
Service Object
Network Object
OBJECT GROUPS
Object groups allow us to create groups of related information that we apply to our filtering
policies, thereby reducing the number of filtering commands that we have to enter.
Once we have created groups of objects, we can include them in our ACL commands to permit or
deny packets based on matches in the object groups.
If we need to define a filtering policy that denies telnet traffic from 192.168.10.11 to
192.168.20.22, we could easily accomplish this with a single ACL command.
However, if we have a list of ten clients trying to access three servers for both telnet and
e-mail, the filtering configuration becomes very complex when using ACLs alone.
So to make this task easy we could use object groups to create a network group for the ten
clients, a network group for the three servers, and a service group for telnet and e-mail, and then
use these groupings in a single ACL command.
We can embed an object group within another object group; this is called nesting.
For example, we might have two network object groups, and want to create a filter that includes
both groups. Originally, this would require two ACL statements.
To solve this problem, we can create a third object group and can include the first two network
object groups within this new group. Then create a single ACL statement that references the
object group that includes the nesting of the two specific object groups.
We can create a group of TCP and UDP applications or ports and use this group in our ACL
statements.
When integrated with Cisco TrustSec, the ASA downloads security group information from the ISE
(Identity Services Engine).
The Identity Firewall in the ASA provides access control based on user’s identities. We can configure
access rules and security policies based on user names and user group names rather than through
source IP addresses. The Identity Firewall integrates with Microsoft Active Directory in conjunction
with an external Active Directory (AD) Agent.
Note: We cannot remove an object group or make an object group empty if it is used in an access
list.
inspectingfirewalls@gmail.com
https://www.facebook.com/groups/inspectingfirewalls