Ts Sgfw-Asa Lab Guide 2013-09-13
Ts Sgfw-Asa Lab Guide 2013-09-13
!
EAP-TLS IF EAP-TLS and use certAuthSCN Reject
Reject
Drop
!
Default and use demoAD Reject
Reject
Drop
!
Default Rule
(if no match)
allow
protocols
Default Network Access and use DenyAccess
Reject
Reject
Drop
Step 5 Update Authorization Policy to return security group tags.
Note: We start with a set of preconfigured authorization rules for DOT1X and MAB, and then apply security tags on top of them.
a. Navigate to Policy > Authorization
b. For the rule demoAD access
i. Rule Name
Append LOB_web_users
ii. Other Conditions
Insert a new Attribute/Value condition with the expression, such that
Select the attribute demoAD:ExternalGroups,
Select the operator Equals, and
Select the right-hand-side value (drop-down) demo.local/HCC/Groups/LOB_web_users
iii. Add the security group LOB_web_users under the permissions column.
Note: LOB_web_users is one of the security groups created in Lab Exercise 1 Step 6
Status Rule Name Identity Groups Other Conditions Permissions
!
Wireless Black List
Default
Blacklist Wireless_Access Blackhole_Wireless_Access
!
Profiled Cisco IP
Phones
Cisco-IP-Phone - Cisco_ IP_Phones
!
Profiled Non Cisco
IP Phones
Any Non_Cisco_Profiled_Phones Non_Cisco_IP_Phones
!
demoAD access
LOB_web_users
Any
Network Access:AuthenticationIdentityStore
EQUALS demoAD
PermitAll
AND
LOB_web_users
AND
demoAD:ExternalGroups EQUALS
deomo.local/HCC/Groups/LOB_web_users
!
guest access Guest
OR
ActivatedGuest
- PermitInternet
!
Wireless MAB Any Wireless_MAB wlcCWA-noNSP
!
Wired MAB Any Wired_MAB wiredCWA-noNSP
!
Default (no matches) DenyAccess
c. Click Save once all the changes are done.
Lab Exercise 4: Campus-to-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 23 of 42
ISE is now configured to provide a source security group tag when the rule AD Authenticated is matched.
Step 6 Configure static IP-SGT bindings for the servers on 3k-data
a. Use putty to ssh to 3k-data as admin / ISEisC00L
b. Provision the IP-SGT with the following CLI commands in configuration mode:
! map web server ip addresses to SG LOB_web_servers (tag=3)
! Only 10.1.129.12 (web) is used in the test. The others are optional.
cts role-based sgt-map 10.1.129.8 sgt 3
cts role-based sgt-map 10.1.129.9 sgt 3
cts role-based sgt-map 10.1.129.10 sgt 3
cts role-based sgt-map 10.1.129.11 sgt 3
cts role-based sgt-map 10.1.129.12 sgt 3
3k-data# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
3k-data(config)#cts role-based sgt-map 10.1.129.8 sgt 3
3k-data(config)#cts role-based sgt-map 10.1.129.9 sgt 3
3k-data(config)#cts role-based sgt-map 10.1.129.10 sgt 3
3k-data(config)#cts role-based sgt-map 10.1.129.11 sgt 3
3k-data(config)#cts role-based sgt-map 10.1.129.12 sgt 3
3k-data(config)#end
3k-data#
Note: To verify the configured SGT map, issue EXEC mode CLI
show cts role-based sgt-map all
Step 7 Configure ACL on ASA context cx-ent
a. Back to the SSH session to the context cx-ent of ASA, add an ACL and apply it to the
interface campus with the following CLI commands in configuration mode:
! The 1
st
ACE below is all-in-one-line. (optionally) log so it shows in the logging.
access-list campus_in extended permit tcp security-group name LOB_web_users any security-group
name LOB_web_servers any eq www log
! Allow management VLAN
access-list campus_in extended permit ip 10.1.100.0 255.255.255.0 any
! Block other campus VLANs to DC
access-list campus_in extended deny ip 10.1.0.0 255.255.128.0 10.1.128.0 255.255.128.0
! Allow all others (Internet/DMZ)
access-list campus_in extended permit ip any any
! Apply it to campus
access-group campus_in in interface campus
asa/cx-ent# configure terminal
asa/cx-ent(config)# access-list campus_in extended permit tcp security-group name LOB_web_users
any security-group name LOB_web_servers any eq www log
asa/cx-ent(config)# access-list campus_in extended permit ip 10.1.100.0 255.255.255.0 any
asa/cx-ent(config)# access-list campus_in extended deny ip 10.1.0.0 255.255.128.0 10.1.128.0
255.255.128.0
asa/cx-ent(config)# access-list campus_in extended permit ip any any
asa/cx-ent(config)# access-group campus_in in interface campus
asa/cx-ent(config)# end
asa/cx-ent#
b. Verify the SG name-to-tag mapping with the following CLI commands:
show access-list campus_in
asa/cx-ent# show access-list campus_in
access-list campus_in; 4 elements; name hash: 0x8fb64f40
access-list campus_in line 1 extended permit tcp security-group name LOB_web_users(tag=2) any
security-group name LOB_web_servers(tag=3) any eq www log informational interval 300 (hitcnt=0)
...
asa/cx-ent#
Note: LOB_web_users and LOB_web_servers are mapped into tag numbers.
Lab Exercise 4: Campus-to-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 24 of 42
c. Configure buffered logging to see ACE hits in later steps.
logging buffered informational
logging timestamp
logging enable
asa/cx-ent# configure terminal
asa/cx-ent(config)# logging buffered informational
asa/cx-ent(config)# logging timestamp
asa/cx-ent(config)# logging enable
asa/cx-ent(config)# end
asa/cx-ent#
Step 8 Test Wired access on w7pc-guest
a. Launch VMware client to connect the VMware host for the pod.
b. Power on p##-w7pc-guest, if off.
Note: The # in p##-w7pc-guest is the assigned 2-digit pod number; e.g. p22-w7pc-guest for pod 22.
c. Access the console via the VMware client.
d. Login Windows as admin / ISEisC00L
e. On w7pc-guest, double click on the desktop short-cut w7pc-guest Network Connections.
Then, enable the w7pc-guest-wired connection by double-clicking on the icon.
f. Establish the Wired Connection by ssh to 3k-access and no shut on the switch interface
g0/1. Wait for DOT1X auth timed out (~ 2 minutes) and fail over to MAB.
3k-access# show auth session
Interface MAC Address Method Domain Status Session ID
Gi0/1 0010.1888.27cc mab DATA Authz Success 0A01FA02000000060F952EE8
3k-access#
g. On w7pc-guest, launch Mozilla Firefox browser and browse to http://web.demo.local. This
shall redirect to the ISE Guest Portal.
Note: Accept/Confirm any browser certificate warnings or AUP (acceptable user policy) if present.
h. Once the guest portal login displayed, login as
employee1 / ISEisC00L
i. After a successful guest login, reattempt access to http://web.demo.local.
In the pop-up Authentication Required
dialog box, enter
admin / ISEisC00L
as the web credential and hit OK.
Note: Stop once the login page of CTS DB Test is visible. We will login onto the test DB in the second part of the Lab.
Lab Exercise 4: Campus-to-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 25 of 42
j. Review the ISE live log
i. Navigate to Operations > Authentications. LOB_web_users is applied after the guest
authenticated, as shown in the sample entries below:
Time S Identity Endpoint ID AuthZ Profiles Event Session ID
t-4 ! employee1 nn:nn:nn:nn:nn:nn PERMIT_ALL_TRAFFIC,LOB_web_users nnnn!
t-3 ! Dynamic Auth nnnn!
t-2 ! employee1 nn:nn:nn:nn:nn:nn Guest Auth
t-1 ! nn:nn:nn:nn:nn:nn nn:nn:nn:nn:nn:nn Wired_CWA Auth nnnn!
ii. Hover over to the status at Time t-4 to see
the authentication detail in the tool-tip. For
example,
User-Name=employee1
...
Termination-Action=RADIUS-Request
cisco-av-pair=cts:security-group-tag:0002-0
cisco-av-pair=profile-name=Windows7-Workstation
k. Check sgt-map on 3k-access by CLI
show cts role-based sgt-map all
3k-access# show cts role-based sgt-map all
Active IP-SGT Bindings Information
IP Address SGT Source
============================================
10.1.50.201 2 LOCAL
IP-SGT Active Bindings Summary
============================================
Total number of LOCAL bindings = 1
Total number of active bindings = 1
3k-access#
Note: 10.1.50.201 is the endpoint IP and may vary depending on the VLAN and DHCP assignments.
l. Check the hit counts of ASA access-list
ASA will show the hit count (hitcnt) increasing for the matched entry.
asa/cx-ent# show access-list campus_in
...
access-list campus_in line 1 extended permit tcp security-group name LOB_web_users(tag=2) any
security-group name LOB_web_servers(tag=3) any eq www log informational interval 300 (hitcnt=6)
0x12947da7
...
asa/cx-ent# show logging | inc campus_in
...
%ASA-6-106100: access-list campus_in permitted tcp campus/10.1.10.101(50184)(2:LOB_web_users) ->
web/10.1.129.12(80)(3:LOB_web_servers) hit-cnt 1 first hit [0x12947da7, 0x0]
...
Note: As the logging buffer is limited, show logging might not give any matches if done a few minutes after the web access on the
endpoint.
m. Verify IP-SGT bindings on ASA that are learnt from all its peers and the accelerated security
patch (ASP)
show cts sgt-map (Control Plane command)
show asp table cts sgt-map (Data Path command)
Lab Exercise 4: Campus-to-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 26 of 42
asa/cx-ent# show cts sgt-map
Active IP-SGT Bindings Information
IP Address SGT Source
================================================================
10.1.50.201 2 SXP
10.1.129.8 3 SXP
...
IP-SGT Active Bindings Summary
============================================
Total number of SXP bindings = 6
Total number of active bindings = 6
Total number of shown bindings = 6
asa/cx-ent# show asp table cts sgt-map
IP Address SGT
==============================================
10.1.129.8 3:LOB_web_servers
...
10.1.50.201 2:LOB_web_users
Total number of entries shown = 6
n. Verify IP-SGT bindings on ASA that are propagated via SXP
show cts sxp sgt-map detail
asa/cx-ent# show cts sxp sgt-map detail
Total number of IP-SGT mappings : 6
Total number of IP-SGT mappings shown: 6
SGT : 3:LOB_web_servers
IPv4 : 10.1.129.8
Peer IP : 10.1.129.3
Ins Num : 1
Status : Active
...
SGT : 2:LOB_web_users
IPv4 : 10.1.50.201
Peer IP : 10.1.29.2
Ins Num : 1
Status : Active
asa/cx-ent#
o. Leave w7pc-guest powered on. We will continue using it in later exercises.
Step 9 (Optional) Test Wireless access on iPad
a. Enable WLAN n-p##-TS-OPEN on wlc
i. Use putty and open ssh session to wlc
ii. Issue the following CLI command:
config wlan enable 10
b. Click on the short-cut vnc-to-ipad on the taskbar to start a VNC session to the iPad.
c. Press any key to continue, once prompt so.
Tips on controlling the iPad UI via VNC client:
Home: (On PC/Mac with 2/3-button mouse) Right click once with a mouse. (On Mac with track pad) Touch with two fingers on
the Track Pad If Secondary Click is configured.
Lab Exercise 4: Campus-to-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 27 of 42
Mouse: Mouse pointer mimics touching the iPad screen with one finger.
Scrolling or dragging: Press and hold Left mouse button and move the mouse pointer to scroll
Keyboard: Move the pointer over any text box on the iPad, click once, and then begin using your local keyboard for input.
Note: The tab key is not available on the iPads virtual keyboard so you will have to move the pointer to the text field you want
to input text, and click on it.
d. On the iPad, navigate to Settings > General > Profiles. Remove any existing profiles, if
present.
Note: If no profiles, you might not see the profiles menu option.
e. Next, go to Settings > Safari and hit Clear History as well as Clear Cookies and Data.
f. Go to Settings > Wi-Fi and slide the virtual switch to enable Wi-Fi.
Note: Forget any networks the iPad automatically connects to them.
g. Select and connect to the network n-p##-TS-OPEN
Note: The ## in n-p##-TS-OPEN is to be replaced with the assigned 2-digit pod number; e.g. n-p22-TS-OPEN
h. Launch Mobile Safari app and browse to http://web.demo.local. This shall redirect to the ISE
Guest Portal.
Note: Accept/Confirm any browser certificate warnings or AUP (acceptable user policy) if present.
i. Repeat previous step (8) h ~ n of this exercise to verify the Wireless access for the iPad.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
Lab Exercise 5: Campus-to-DC Use ASDM to Interact with ASA TrustSec Features EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 28 of 42
Lab Exercise 5: Campus-to-DC Use ASDM to
Interact with ASA TrustSec Features
Exercise Description
This lab covers the essential ASDM operations for TrustSec elements on an ASA.
Exercise Objective
In this exercise, your goal is to familiarize with basic ASDM operations for TrustSec. This includes
completion of the following tasks:
Configure for PAC and SXP
Monitor for PAC, SXP, and SGT maps
Create ACL with security elements
Step 1 Connect ASDM to ASA
a. On the admin-PC, double-click ASDM-IDM Launcher on the desktop
b. Provide inputs as below:
Device IP Address / Name: asa.demo.local
Username: admin
Password: ISEisC00L
" Run in Demo Mode (unchecked)
c. Click OK to connect.
Step 2 Switch to context cx-ent: In the device list on the left-hand-side panel, connect to cx-
ent by double-clicking on the named context.
Step 3 Configure TrustSec properties using ASDM
a. Navigate to Configuration > Firewall > Identity by TrustSec
b. Verify the SXP peers, default source, default password, timers, Server Group.
Lab Exercise 5: Campus-to-DC Use ASDM to Interact with ASA TrustSec Features EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 29 of 42
c. (Optional, as already done via CLI in Exercise 2 Step 6) Click on Import PAC to import the
PAC from the local machine
d. (Optional) Check/un-check the checkbox next to Enable SGT Exchange Protocol (SXP) to
enable/disable SXP
e. Click Apply to effect the changes
Step 4 Monitoring TrustSec: Navigate to Monitoring > Properties > Identity by TrustSec
Click each item in turn to check
a. PAC - verify PAC installation
b. Environment Data - verify the
download of security group table
c. SXP Connections - check SXP
connections with peers
d. IP Mappings - verify security group
IP mapping table
Step 5 Use ASDM to reconfigure Security
Group based policies
a. Go to Configuration > Firewall > Objects > Security Group Object Groups
b. Click on Add on the right-hand panel
c. In the pop-up window Add Security Group Object Group, fill in
Group Name: demo-SG-Obj-
Group
Click to highlight
LOB_web_servers in Existing
Security Groups
Click Add >> to add to
Members in Group
Click OK to close the pop-up.
d. Go to Configuration > Firewall > Access Rules
e. Click on the rule under interface campus and
hit Edit to work on the first ACE
f. In the pop-up Edit Access Rule, click on the
browse icon next to Security Group text box
in the Destination Criteria.
g. In the pop-up Browse Security Group
window
Lab Exercise 5: Campus-to-DC Use ASDM to Interact with ASA TrustSec Features EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 30 of 42
<< Remove security group name LOB_web_servers
Add >> Existing Security Group Object Groups demo-SG-Obj-Group
Click OK to close the pop-up Browse Security Group
h. Click OK to close the pop-up Edit Access Rule.
i. Click Apply to send the changes to ASA.
Step 6 Repeat Exercise 4 Step 7 to send traffic and verify the policies applied correctly.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
Part 2: Intra-DC SGFW Enforcement with ASA EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 31 of 42
Part 2: Intra-DC SGFW Enforcement with ASA
Logical Topology
arL 2 covers a use case of uslng ASA Lo segmenL server-Lo-server communlcaLlon wlLhln a daLa cenLer
neLwork. 1he goal ls Lo allow a speclflc group of servers (LC8_web_servers) Lo access Lhe daLa on
anoLher (LC8_db_servers). ASA enforcemenL may be ln elLher rouLed or LransparenL/brldge mode, or ln
elLher slngle or mulLlple conLexLs. An ASA conLexL ln LransparenL mode ls used ln Lhls parL of exerclses.
Lab Exercise 6: Intra-DC Configure Network Devices and Security Groups in ISE EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 32 of 42
Lab Exercise 6: Intra-DC Configure Network
Devices and Security Groups in ISE
Exercise Description
This lab covers the ISE configurations to prepare ASA context cx-lob for RADIUS authentication
and retrieving TrustSec environment data. It also provisions the security groups used for Intra-
DC accesses.
Exercise Objective
In this exercise, your goal is to configure ASA as a network device in ISE so that it may receive
TrustSec security groups. This includes completion of the following tasks:
Create a network device for ASA context cx-lob
Create TrustSec security groups
Step 1 Access the ISE administrative web interface.
a. Login https://ise-1.demo.local as admin / ISEisC00L
Note: Accept/Confirm any browser certificate warnings if present.
Step 2 Add an ASA context cx-lob as a Network Access Device
a. Navigate to Administration > Network Resources > Network Devices
b. Click Add with the values shown in the following table:
Attribute Value
Name cx-lob
(see Note 1)
Description -
IP Address 10.1.129.2 / 32
Model Name -
Software Version -
Device Type ASA
Location GOLD-Lab
! Advanced TrustSec Settings
Device Authentication Settings
Use Device ID for SGA !
Device Id cx- l ob
Password Anything
(see Note 2)
SGA Notifications and Updates
Download environment data
every
1 Days
Download peer authorization
policy every
1 Days
Reauthentication every 1 Days
Download SGACL lists every 1 Days
Other SGA devices to trust the
device
!
Notify this device about SGA "
Lab Exercise 6: Intra-DC Configure Network Devices and Security Groups in ISE EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 33 of 42
Attribute Value
configuration changes
Device Configuration Deployment
(None configured)
Out Of Band (OOB) SGA PAC
Issue Date
Expiration Date
Issue By
Generate PAC
Note 1: The Name (Device ID) must be the same as that of the context name in ASA. It is included in the PAC for ASA to
authenticate and retrieve the SG table from ISE.
Note 2: The device password is not used because ASA supports only OOB PAC provisioning but needs to be a valid and non-
empty string in order to save the NAD object.
c. In the section Out Of Band (OOB) SGA PAC, click Generate PAC. In the pop-up dialog
box, input ISEisC00L as the Encryption Key.
Identity cx- l ob
Encryption Key ISEisC00L
PAC Time to Live 1 Years
Note: ASA uses this encryption key to import the PAC securely (Lab Exercise 2 Step 6).
d. Click on Generate PAC and save the resulting pac file to the default Downloads folder.
e. Click Submit when finished.
Note: If Submit does not work, log off and back into the ISE admin web interface and repeat Step 2 again.
Step 3 Create Security Groups
a. Go to Policy > Policy Elements > Results. In the left-hand-side panel, select Security
Group Access > Security Groups.
Note: ISE assigns SGT automatically by default. To manually assign SGTs, go to Administration > System > Settings, select
Security Group Access in the left-hand-side panel, and then select All tags are manually defined in the right panel.
b. Add security group LOB_db_servers
i. In the right panel, click Add.
ii. Input LOB_db_servers into the Name field.
iii. Submit to save this new security group with the assigned tag.
c. The resulting Name-SGT table shall be similar to below:
Name SGT (Dec /Hex)
Unknown 0 / 0000
LOB_web_users 2 / 0002
LOB_web_servers 3 / 0003
LOB_db_servers 4 / 0004
You are now done preparing the ISE for the ASA context cx-lob to download the TrustSec environment data.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
Lab Exercise 7: Intra-DC Configure ASA to download Security Group table EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 34 of 42
Lab Exercise 7: Intra-DC Configure ASA to
download Security Group table
Exercise Description
This exercise will show how to enable an ASA context to download the security group (name-to-
tag) table from ISE.
Exercise Objective
In this exercise, your goal is to work a transparent context in ASA and configure it to download
TrustSec Security Group table from ISE:
Create an AAA server group and designate it as the TrustSec server
Import PAC and verify SG table download
Step 1 If disconnected, restart the putty ssh session to asa with the credentials admin / ISEisC00L
Step 2 At the prompt, enter the CLI command enable then give ISEisC00L as the enable password.
asa/cx-admin> enable
Password: ISEisC00L
asa/cx-admin#
Step 3 Change to the context cx-lob by CLI command changeto context cx-lob
asa# changeto context cx-lob
asa/cx-lob#
Step 9 Review the running-config of the network interfaces and routing with the following CLI
commands in configuration mode:
show run interface
show run route
asa/cx-lob# show run interface
!
interface BVI1
ip address 10.1.129.2 255.255.255.0
!
interface GigabitEthernet0/2
nameif web
bridge-group 1
security-level 8
!
interface GigabitEthernet0/3
nameif db
bridge-group 1
security-level 9
asa/cx-lob# show run route
route web 0.0.0.0 0.0.0.0 10.1.129.1 1
Step 4 Add AAA server group and host and designate it as the cts server group with the following CLI
commands in configuration mode:
aaa-server ts-ise protocol radius
aaa-server ts-ise (web) host 10.1.100.21
authentication-port 1812
accounting-port 1813
cts server-group ts-ise
Lab Exercise 7: Intra-DC Configure ASA to download Security Group table EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 35 of 42
asa/cx-lob# configure terminal
asa/cx-lob(config)# aaa-server ts-ise protocol radius
asa/cx-lob(config-aaa-server-group)# aaa-server ts-ise (web) host 10.1.100.21
asa/cx-lob(config-aaa-server-host)# authentication-port 1812
asa/cx-lob(config-aaa-server-host)# accounting-port 1813
asa/cx-lob(config-aaa-server-host)# cts server-group ts-ise
asa/cx-lob(config)# end
asa/cx-lob#
Step 5 On admin-PC, move the cx-lob.pac file from admins Downloads folder to C:\inetpub\ftproot\.
Then, proceed to import it at ASA:
cts import-pac ftp://10.1.100.6/cx-lob.pac password ISEisC00L
asa/cx-lob# cts import-pac ftp://10.1.100.6/cx-lob.pac password ISEisC00L
!PAC Imported Successfully
Step 6 Check PAC data and verify environment-data and SG table by:
show cts pac
show cts environment-data
show cts environment-data sg-table
asa/cx-lob# show cts pac
PAC-Info:
Valid until: Aug 25 2013 23:42:16
AID: 0215c9b539f4f2f56a716ea5d4a04132
I-ID: cx-lob
A-ID-Info: ise demo
PAC-type: Cisco Trustsec
PAC-Opaque:
...
Note: The initiator identifier (I-ID) is cx-lob and A-ID-Info is ise demo. The authority identifier (A-ID) is configured in Lab Exercise 1
Step 2. And, I-ID in Lab Exercise 6 Step 2.
asa/cx-lob# show cts environment-data
CTS Environment Data
====================
Status: Active
Last download attempt: Successful
Environment Data Lifetime: 86400 secs
Last update time: 04:00:14 UTC Aug 27 2012
Env-data expires in: 0:23:58:34 (dd:hr:mm:sec)
Env-data refreshes in: 0:23:48:34 (dd:hr:mm:sec)
Note: If the download fails, check ISE live log and the NAD configuration for ASA.
asa/cx-lob# show cts environment-data sg-table
Security Group Table:
Valid until: 04:00:14 UTC Aug 28 2012
Showing 6 of 6 entries
SG Name SG Tag Type
------- ------ -------------
ANY 65535 unicast
LOB_db_servers 4 unicast
LOB_web_servers 3 unicast
LOB_web_users 2 unicast
Unknown 0 unicast
This ASA context has now the TrustSec security group name-to-tag mapping. We will use it in ACL in later exercises.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
Lab Exercise 8: Intra-DC Configure SXP in Network Devices EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 36 of 42
Lab Exercise 8: Intra-DC Configure SXP in
Network Devices
Exercise Description
In this exercise you will establish the SXP communication between the ASA context cx-lob and
3k-data.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Configure ASA context cx-lob as the SXP listener to peer with the switch 3k-data
Configure the switch 3k-data as the SXP peer for the ASA context cx-ent
Step 1 Configure cx-lob as the SXP listener
a. Back in the SSH session to the context cx-lob of ASA, provision the SXP connectivity with
the following CLI commands in configuration mode:
! set SXP default password
cts sxp default password ISEisC00L
! peer 10.1.129.3 3k-data SVI for VLAN 129
cts sxp connection peer 10.1.129.3 password default mode local listener
cts sxp enable
asa/cx-lob# configure terminal
asa/cx-lob(config)# cts sxp default password ISEisC00L
asa/cx-lob(config)# cts sxp conn peer 10.1.129.3 password default mode local listener
asa/cx-lob(config)# cts sxp enable
asa/cx-lob(config)# end
asa/cx-lob#
Step 2 Configure SXP on 3k-data
a. Use putty to ssh to 3k-data as admin / ISEisC00L
b. Provision the SXP connectivity with the following CLI commands in configuration mode:
! peer 10.1.129.2 asa/cx-lob web IP
cts sxp connection peer 10.1.129.2 password default mode local
Note: SXP default password is set and the SXP service enabled previously in Part 1 Exercise 3 Step 3.
3k-data# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
3k-data(config)#cts sxp conn peer 10.1.129.2 password default mode local
3k-data(config)#end
3k-data#
c. Verify the SXP connectivity with the following CLI command in exec mode:
show cts sxp connections brief
3k-data# show cts sxp connections brief
SXP : Enabled
Default Password : Set
Default Source IP: Not Set
Connection retry open period: 120 secs
EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 37 of 42
Reconcile period: 120 secs
Retry open timer is running
-----------------------------------------------------------------------------
Peer_IP Source_IP Conn Status Duration
-----------------------------------------------------------------------------
10.1.129.1 10.1.129.3 On 3:10:35:23 (dd:hr:mm:sec)
10.1.129.2 10.1.129.3 On 0:00:38:33 (dd:hr:mm:sec)
Total num of SXP Connections = 2
3k-data#
This ASA context cx-lob has now peered with 3k-data and shall get the IP-SGT mapping from it.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
Lab Exercise 8: Intra-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 38 of 42
Lab Exercise 8: Intra-DC Source and
Destination IP-SGT
Exercise Description
This exercise will show the switch 3k-data forwards its IP-SGT mappings to the ASA context cx-
lob and the ASA uses the security groups to enforce server-to-server communications.
Exercise Objective
In this exercise, your goal is to complete the following tasks:
Provision static IP-SGT binding on 3k-data.
Configure ASA ACL with security-group.
Step 1 Configure static IP-SGT binding on 3k-data
a. Use putty to ssh to 3k-data as admin / ISEisC00L
b. Provision the static IP-SGT binding with the following CLI command in configuration mode:
! map a db server ip address to SGT LOB_db_servers (tag=4)
cts role-based sgt-map 10.1.129.20 sgt 4
3k-data# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
3k-data(config)#cts role-based sgt-map 10.1.129.20 sgt 4
3k-data(config)#end
3k-data#
c. Verify the static IP-SGT binding with the following CLI command in exec mode
show cts role-based sgt-map all
3k-data# show cts role-based sgt-map all
Active IP-SGT Bindings Information
IP Address SGT Source
============================================
10.1.129.8 3 CLI
...
10.1.129.20 4 CLI
IP-SGT Active Bindings Summary
============================================
Total number of CLI bindings = 6
Total number of active bindings = 6
Step 2 Configure an ACL on ASA context cx-lob
a. Back in the SSH session to the context cx-lob of ASA, add an ACL and apply it to the
interface web with the following CLI commands in configuration mode:
! add an ACL
! This ACL has only one ACE and all in one-line.
access-list web_in extended permit tcp security-group name LOB_web_servers any security-group
name LOB_db_servers any eq 3306 log
! Apply it to web
access-group web_in in interface web
Lab Exercise 8: Intra-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 39 of 42
asa/cx-lob# configure terminal
asa/cx-lob(config)# access-list web_in extended permit tcp security-group name LOB_web_servers
any security-group name LOB_db_servers any eq 3306 log
asa/cx-lob(config)# access-group web_in in interface web
asa/cx-lob(config)# end
asa/cx-lob#
b. Verify the SG name-to-tag mapping with the following CLI command:
show access-list web_in
asa/cx-lob# show access-list web_in
access-list web_in; 2 elements; name hash: 0x732a90f6
access-list web_in line 1 extended permit tcp security-group name LOB_web_servers(tag=3) any
security-group name LOB_db_servers(tag=4) any eq 3306 log informational interval 300 (hitcnt=0)
0x8193d619
asa/cx-lob#
Note: LOB_web_servers and LOB_db_servers are both associated with tag numbers in parentheses.
c. Configure buffered logging to see ACE hits in later steps.
logging buffered informational
logging timestamp
logging enable
asa/cx-lob# configure terminal
asa/cx-lob(config)# logging buffered informational
asa/cx-lob(config)# logging timestamp
asa/cx-lob(config)# logging enable
asa/cx-lob(config)# end
asa/cx-lob#
Step 3 Test on w7pc-guest
a. Switch back to the console of w7pc-guest via the VMware client.
b. If needed, login again at Windows as admin / ISEisC00L
c. If the network connection disconnected, re-authenticate using either Wired or Wireless as in
Exercise 4 Step 8 or 9.
d. Launch Mozilla Firefox browser, go to http://web.demo.local, and, if needed, re-authenticate
to the web site as admin / ISEisC00L
e. At the CTS DB Test login page, enter the following info before hitting Go
Log in
Username: admin
Password: ISEisC00L
Server Choice TS TEST DB
f. Check the hit counts of ASA access-list
ASA will show the hit count (hitcnt) increasing for the matched entry.
asa/cx-lob# show access-list web_in
...
access-list web_in line 1 extended permit tcp security-group name LOB_web_servers(tag=3) any
security-group name LOB_db_servers(tag=4) any eq 3306 log informational interval 300 (hitcnt=3)
0x8193d619
asa/cx-lob# show logging | inc web_in
...
%ASA-6-106100: access-list web_in permitted tcp app/10.1.129.12(43838)(4:LOB_web_servers) ->
db/10.1.129.20(3306)(5:LOB_db_servers) hit-cnt 1 first hit [0x8193d619, 0x0]
...
Lab Exercise 8: Intra-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 40 of 42
g. Verify IP-SGT bindings on ASA that are learnt from all its peers and the accelerated security
patch (ASP)
show cts sgt-map (Control Plane command)
show asp table cts sgt-map (Data Path command)
asa/cx-lob# show cts sgt-map
Active IP-SGT Bindings Information
IP Address SGT Source
================================================================
10.1.129.8 3 SXP
...
10.1.129.20 4 SXP
IP-SGT Active Bindings Summary
============================================
Total number of SXP bindings = 6
Total number of active bindings = 6
Total number of shown bindings = 6
asa/cx-lob# show asp table cts sgt-map
IP Address SGT
==============================================
10.1.129.8 3:LOB_web_servers
...
10.1.129.20 4:LOB_db_servers
Total number of entries shown = 6
asa/cx-lob#
h. Verify IP-SGT bindings on ASA that are propagated via SXP
show cts sxp sgt-map detail
asa/cx-lob# show cts sxp sgt-map detail
Total number of IP-SGT mappings : 6
Total number of IP-SGT mappings shown: 6
SGT : 3
IPv4 : 10.1.129.8
Peer IP : 10.1.129.1
Ins Num : 1
Status : Active
...
SGT : 4
IPv4 : 10.1.129.20
Peer IP : 10.1.129.1
Ins Num : 1
Status : Active
asa/cx-lob#
i. Power off w7pc-guest when done.
! End of Exercise: You have successfully completed this exercise.
Proceed to next section.
! End of Lab: Congratulations! You have successfully completed the lab. Please let your
proctor know you finished and provide any feedback to help improve the lab experience.
Lab Exercise 8: Intra-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 41 of 42
Appendix A: Creating a transparent firewall context
In this lab, all the ASA contexts are created in advance. For your reference, here are the steps to create
the transparent context cx-lob:
Step 1 Change to the system space by CLI command changeto system
asa/cx-admin# changeto system
asa#
Step 2 Create a new context cx-lob with the following CLI commands in configuration mode:
context cx-lob
allocate-interface GigabitEthernet0/2
allocate-interface GigabitEthernet0/3
config-url disk0:/cx-lob.cfg
exit
interface GigabitEthernet0/2
no shut
interface GigabitEthernet0/3
no shut
asa# configure terminal
asa(config)# context cx-lob
Creating context 'cx-lob... Done. (5)
asa(config-ctx)# allocate-interface GigabitEthernet0/2
asa(config-ctx)# allocate-interface GigabitEthernet0/3
asa(config-ctx)# config-url disk0:/cx-lob.cfg
WARNING: Could not fetch the URL disk0:/cx-lob.cfg
INFO: Creating context with default config
asa(config)# interface gigabitEthernet 0/2
asa(config-if)# no shut
asa(config-if)# interface gigabitEthernet 0/3
asa(config-if)# no shut
asa(config)# end
asa#
Step 3 Change to the new context cx-lob by CLI command changeto context cx-lob
asa# changeto context cx-lob
asa/cx-lob#
Step 4 Update the firewall mode and the interfaces with the following CLI commands in configuration
mode:
! Change to transparent mode
firewall transparent
!
interface BVI1
ip address 10.1.129.2 255.255.255.0
!
interface GigabitEthernet0/2
nameif web
bridge-group 1
security-level 9
!
interface GigabitEthernet0/3
nameif db
bridge-group 1
security-level 10
!
! default gateway to ASA cx-ents web interface
route web 0.0.0.0 0.0.0.0 10.1.129.1 1
asa/cx-lob# configure terminal
asa/cx-lob(config)# firewall transparent
asa/cx-lob(config)# interface BVI1
asa/cx-lob(config-if)# ip address 10.1.129.2 255.255.255.0
asa/cx-lob(config-if)# exit
asa/cx-lob(config)# interface GigabitEthernet0/2
asa/cx-lob(config-if)# nameif web
Lab Exercise 8: Intra-DC Source and Destination IP-SGT EDCS-1224105
TS_SGFW-ASA_Lab_Guide.docx 9/13/13 10:10 PM US/Pacific Page 42 of 42
asa/cx-lob(config-if)# brige-group 1
asa/cx-lob(config-if)# security-level 9
asa/cx-lob(config-if)# !
asa/cx-lob(config)# interface GigabitEthernet0/3
asa/cx-lob(config-if)# nameif db
asa/cx-lob(config-if)# brige-group 1
asa/cx-lob(config-if)# security-level 10
asa/cx-lob(config-if)# !
asa/cx-lob(config-if)# route web 0.0.0.0 0.0.0.0 10.1.129.1 1
asa/cx-lob(config)# end
asa/cx-lob#