10-20-2019 11:36 PM - edited 02-21-2020 09:36 AM
Hello experts,
I have recently moved from Juniper(JunOS/Netscreen) based firewall environment and joined a department with Cisco setup. My task is to configure ASA 5525X firewalls to control traffic flow between servers and also towards Internet.
In Juniper, i have done this with Firewall Policies controlling traffic between Zones. Also Intra-Zone and Inter-Zone traffic restriction. Address-books used to define single IP/ or multiple IP's.
In Juniper, we have done this as follows
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match source-address Src-Adres
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match destination-address Src-Adres
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match application any
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name then permit
My question is, How to get this done in Cisco ?
Defining zones?
Assigning interfaces to zone?
creating Address books?
creating policies with source/destination zone and source/destination address-books?
identifying particular ports within policies ?
Action deny/permit?
10-21-2019 12:31 AM - edited 10-21-2019 12:33 AM
here is the guide to undertstand how ASA you can do this :
in the document high level give you information, how you can do same way you can also have different zones inside and you can make policies(ACL) who required what access.
12-05-2019 12:03 PM
@balaji.bandi , thankx for reply, but in my case, i am unable to see any commands relevant to zone. ASA5525-X with Firepower services. No commands in CLI to configure zones. Is there any issue with ASA image?
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: