Active Directory Integration Example For Identity Firewall - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 8
ASA and Cisco Cloud Web Security
Configure service policy.
Step 8
If you created a separate policy map for Cloud Web Security, the following example shows how to apply
it to an interface. If you instead added the classes to the global_policy map, you are finished; you do not
need to enter the service-policy command.
hostname(config)# service-policy pmap-webtraffic interface inside

Active Directory Integration Example for Identity Firewall

The following is an end-to-end example configuration for Active Directory integration. This
configuration enables the identity firewall.
Procedure
Configure the Active Directory Server Using LDAP.
Step 1
The following example shows how to configure the Active Directory server on your ASA using LDAP:
hostname(config)# aaa-server AD protocol ldap
hostname(config-aaa-server-group)# aaa-server AD (inside) host 192.168.116.220
hostname(config-aaa-server-host)# ldap-base-dn DC=ASASCANLAB,DC=local
hostname(config-aaa-server-host)# ldap-scope subtree
hostname(config-aaa-server-host)# server-type microsoft
hostname(config-aaa-server-host)# server-port 389
hostname(config-aaa-server-host)# ldap-login-dn
cn=administrator,cn=Users,dc=asascanlab,dc=local
hostname(config-aaa-server-host)# ldap-login-password Password1
Configure the Active Directory Agent Using RADIUS.
Step 2
The following example shows how to configure the Active Directory Agent on your ASA using
RADIUS:
hostname(config)# aaa-server adagent protocol radius
hostname(config-aaa-server-group)# ad-agent-mode
hostname(config-aaa-server-group)# aaa-server adagent (inside) host 192.168.116.220
hostname(config-aaa-server-host)# key cisco123
hostname(config-aaa-server-host)# user-identity ad-agent aaa-server adagent
(On the AD Agent server.) Create the ASA as a Client on the AD Agent Server.
Step 3
The following example shows how to create the ASA as a client on the Active Directory agent server:
c:\IBF\CLI\adacfg client create -name ASA5520DEVICE -ip 192.168.116.90 -secret cisco123
(On the AD Agent server.) Create a Link Between the AD Agent and DCs.
Step 4
The following example shows how to create a link between the Active Directory Agent and all DCs for
which you want to monitor logon/logoff events:
c:\IBF\CLI\adacfg.exe dc create -name DCSERVER1 -host W2K3DC -domain
W2K3DC.asascanlab.local -user administrator -password Password1
c:\IBF\CLI\adacfg.exe dc list
Running the last command should show the status as "UP."
For the AD_Agent to monitor logon/logoff events, you need to ensure that these are logged on all DCs
that are actively being monitored. To do this, choose:
Examples for Cisco Cloud Web Security
Cisco ASA Series Firewall CLI Configuration Guide
8-17

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents