<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic seeking Asa 5506 firewall configuration tips in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032635#M841094</link>
    <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive just setup an ASA 5506 for my home (office) use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its been awhile since ive last configured a cisco appliance, so i was wondered if you guys would take a quick peek at my config and give me pointers on silly or stupid configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My setup is that ive replaced my standard ISP router with the ASA, its tagged via VLAN on the outside interface and configured via DHCP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive configured a basic firewall rule to basicly just deny anything from the outside interface to the inside, thats really all i had the fantasy to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any tips for strengthening the security of my network? i dont care about bogging down my internet connection or losing performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Note: i dont have a license for the firePOWER module as that is too expensive for home office usage.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Apologies if this is posted in the wrong place&lt;/P&gt;&lt;PRE&gt;ASA Version 9.8(4)15 
!
hostname ASA
enable password 8Ry2YjIyt7RRXU24 encrypted
names
no mac-address auto

!
interface GigabitEthernet1/1
 no nameif
 security-level 0
 no ip address
!
interface GigabitEthernet1/1.101
 vlan 101
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
interface GigabitEthernet1/2
 description Internal network
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface GigabitEthernet1/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/6
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/7
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/8
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management1/1
 management-only
 shutdown
 no nameif
 no security-level
 no ip address
!
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object udp
 protocol-object tcp
access-list outside_access_in extended deny object-group DM_INLINE_PROTOCOL_1 interface outside interface inside 
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
ip verify reverse-path interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-7131.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (inside,outside) after-auto source dynamic any interface
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication login-history
http server enable
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcp-client client-id interface outside
threat-detection basic-threat
threat-detection scanning-threat shun duration 3600
threat-detection statistics host
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl cipher default custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher tlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher dtlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
dynamic-access-policy-record DfltAccessPolicy
username admin password $sha512$5000$FqM9HtGlgl0T5UAebeZtVw==$viUddbBKQlbadGunFq9KWw== pbkdf2 privilege 15
!
!
prompt hostname context 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 12
  subscribe-to-alert-group configuration periodic monthly 12
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:0413fcf1335c163fd8b0d9f2364e9b74
: end&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:56:12 GMT</pubDate>
    <dc:creator>Ministry</dc:creator>
    <dc:date>2020-02-21T17:56:12Z</dc:date>
    <item>
      <title>seeking Asa 5506 firewall configuration tips</title>
      <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032635#M841094</link>
      <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive just setup an ASA 5506 for my home (office) use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its been awhile since ive last configured a cisco appliance, so i was wondered if you guys would take a quick peek at my config and give me pointers on silly or stupid configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My setup is that ive replaced my standard ISP router with the ASA, its tagged via VLAN on the outside interface and configured via DHCP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive configured a basic firewall rule to basicly just deny anything from the outside interface to the inside, thats really all i had the fantasy to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any tips for strengthening the security of my network? i dont care about bogging down my internet connection or losing performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Note: i dont have a license for the firePOWER module as that is too expensive for home office usage.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Apologies if this is posted in the wrong place&lt;/P&gt;&lt;PRE&gt;ASA Version 9.8(4)15 
!
hostname ASA
enable password 8Ry2YjIyt7RRXU24 encrypted
names
no mac-address auto

!
interface GigabitEthernet1/1
 no nameif
 security-level 0
 no ip address
!
interface GigabitEthernet1/1.101
 vlan 101
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
interface GigabitEthernet1/2
 description Internal network
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface GigabitEthernet1/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/6
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/7
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet1/8
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management1/1
 management-only
 shutdown
 no nameif
 no security-level
 no ip address
!
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object udp
 protocol-object tcp
access-list outside_access_in extended deny object-group DM_INLINE_PROTOCOL_1 interface outside interface inside 
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
ip verify reverse-path interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-7131.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (inside,outside) after-auto source dynamic any interface
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication login-history
http server enable
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcp-client client-id interface outside
threat-detection basic-threat
threat-detection scanning-threat shun duration 3600
threat-detection statistics host
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl cipher default custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher tlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
ssl cipher dtlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"
dynamic-access-policy-record DfltAccessPolicy
username admin password $sha512$5000$FqM9HtGlgl0T5UAebeZtVw==$viUddbBKQlbadGunFq9KWw== pbkdf2 privilege 15
!
!
prompt hostname context 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 12
  subscribe-to-alert-group configuration periodic monthly 12
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:0413fcf1335c163fd8b0d9f2364e9b74
: end&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032635#M841094</guid>
      <dc:creator>Ministry</dc:creator>
      <dc:date>2020-02-21T17:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: seeking Asa 5506 firewall configuration tips</title>
      <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032669#M841097</link>
      <description>&lt;P&gt;High level looks ok, Did your PC able to get the internet ? then all good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;by default outside to inside is denied by the behaviour of ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can look hardening ASA in many ways if you looking to do so.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.dionach.com/blog/cisco-asa-firewall-hardening/" target="_blank"&gt;https://www.dionach.com/blog/cisco-asa-firewall-hardening/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 00:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032669#M841097</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-02-20T00:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: seeking Asa 5506 firewall configuration tips</title>
      <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032698#M848112</link>
      <description>&lt;P&gt;&lt;U&gt;Hello - Common config t -&amp;nbsp;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcp dns 208.67.222.222 208.67.220.220&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;dhcpd option 3 ip 192.168.1.1&lt;/STRONG&gt;&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 192.168.200.5&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;object network INSIDE-NET&lt;BR /&gt;&lt;STRONG&gt;subnet 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect http&lt;BR /&gt;&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;&lt;BR /&gt;domain-name&amp;nbsp;&lt;STRONG&gt;ministry.com&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;username admin password ********** priv 15&lt;/STRONG&gt;&lt;BR /&gt;crypto key generate rsa modulus 2048&lt;/P&gt;&lt;P&gt;Yes&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;ssh 192.168.1.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;ssh 192.168.1.0 255.255.0.0 inside&lt;/STRONG&gt;&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;&lt;BR /&gt;dhcprelay timeout 60&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;&lt;BR /&gt;class-map global-class&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class global-class&lt;BR /&gt;sfr fail-open&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 02:35:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4032698#M848112</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2020-02-20T02:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: seeking Asa 5506 firewall configuration tips</title>
      <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4033031#M950096</link>
      <description>Thank you!</description>
      <pubDate>Thu, 20 Feb 2020 12:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4033031#M950096</guid>
      <dc:creator>Ministry</dc:creator>
      <dc:date>2020-02-20T12:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: seeking Asa 5506 firewall configuration tips</title>
      <link>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4033057#M958411</link>
      <description>Thanks alot, nice input!</description>
      <pubDate>Thu, 20 Feb 2020 13:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/seeking-asa-5506-firewall-configuration-tips/m-p/4033057#M958411</guid>
      <dc:creator>Ministry</dc:creator>
      <dc:date>2020-02-20T13:22:39Z</dc:date>
    </item>
  </channel>
</rss>

