Cisco FirePOWER ASA 5500 series Configuration Manual page 517

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 27
Configuring IPSec and ISAKMP
Figure 27-1
Human Resources
The simple address notation shown in this figure and used in the following explanation is an abstraction.
An example with real IP addresses follows the explanation.
The objective in configuring Security Appliances A, B, and C in this example LAN-to-LAN network is
to permit tunneling of all traffic originating from one of the hosts shown in
one of the other hosts. However, because traffic from Host A.3 contains sensitive data from the Human
Resources department, it requires strong encryption and more frequent rekeying than the other traffic.
So we want to assign a special transform set for traffic from Host A.3.
To configure Security Appliance A for outbound traffic, we create two crypto maps, one for traffic from
Host A.3 and the other for traffic from the other hosts in Network A, as shown in the following example:
Crypto Map Seq_No_1
deny packets from A.3 to B
deny packets from A.3 to C
permit packets from A to B
permit packets from A to C
Crypto Map Seq_No_2
permit packets from A.3 to B
permit packets from A.3 to C
After creating the ACLs, you assign a transform set to each crypto map to apply the required IPSec to
each matching packet.
Cascading ACLs involves the insertion of deny ACEs to bypass evaluation against an ACL and resume
evaluation against a subsequent ACL in the crypto map set. Because you can associate each crypto map
with different IPSec settings, you can use deny ACEs to exclude special traffic from further evaluation
in the corresponding crypto map, and match the special traffic to permit statements in another crypto
map to provide or require different security. The sequence number assigned to the crypto ACL
determines its position in the evaluation sequence within the crypto map set.
OL-10088-01
Effect of Permit and Deny ACEs on Traffic (Conceptual Addresses)
A.1
A.2
A.3
A
B.1
B.2
B.3
B
Internet
Cisco Security Appliance Command Line Configuration Guide
Configuring IPSec
C.1
C.2
C.3
C
Figure 27-1
and destined for
27-15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents