10-20-2019 11:36 PM - edited 02-21-2020 09:36 AM
Hello experts,
I have recently moved from Juniper(JunOS/Netscreen) based firewall environment and joined a department with Cisco setup. My task is to configure ASA 5525X firewalls to control traffic flow between servers and also towards Internet.
In Juniper, i have done this with Firewall Policies controlling traffic between Zones. Also Intra-Zone and Inter-Zone traffic restriction. Address-books used to define single IP/ or multiple IP's.
In Juniper, we have done this as follows
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match source-address Src-Adres
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match destination-address Src-Adres
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name match application any
set security policies from-zone Zone-Name to-zone Zone-Name policy Policy-Name then permit
My question is, How to get this done in Cisco ?
Defining zones?
Assigning interfaces to zone?
creating Address books?
creating policies with source/destination zone and source/destination address-books?
identifying particular ports within policies ?
Action deny/permit?
10-21-2019 12:31 AM - edited 10-21-2019 12:33 AM
here is the guide to undertstand how ASA you can do this :
in the document high level give you information, how you can do same way you can also have different zones inside and you can make policies(ACL) who required what access.
12-05-2019 12:03 PM
@balaji.bandi , thankx for reply, but in my case, i am unable to see any commands relevant to zone. ASA5525-X with Firepower services. No commands in CLI to configure zones. Is there any issue with ASA image?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide