Configure Cisco ASA5506 For Proof Of Value With FirePOWER 6.0
Configure Cisco ASA5506 For Proof Of Value With FirePOWER 6.0
I posted about setting up a standard FirePOWER POV HERE. Using the standard approach IE having a separate manager offers more functions such as the built in vulnerability scanner and auto IPS tuning. Also the list price for a VM manager for up to two ASAs is dirt cheap. Regardless, some may want to stick with the ASDM manager. For those people, this post is for you. To summarize what is required, the following should be used.
- Cisco ASA5506 with the latest ASA software. I use (9.52) at the time of writing
- FirePOWER 6.0 however 5.4 would work as well. Any version prior to this does not have the ASDM built in FirePOWER management capabilities. Also note 5.4 ASDM functionality is only available in a few models while the remaining ASA models have FirePOWER functionality in ASDM starting with 6.0.
- The latest ASDM software. I use 7.52 at the time of writing.
From there, use the upgrade tool that leverages your existing Cisco CCO account to upgrade both the ASA and ASDM software to the latest version.
Now you need to install the FirePOWER software if it already isn’t setup. Follow this blog post regarding a new install HERE. Follow this blog post if you are running 5.4 and need to upgrade to 6.0 HERE.
At this point, you should see FirePOWER running on your ASA. I will point out one lesson learned from installing a new FirePOWER 6.0 setup on a 5506 is there is a LONG delay after you install the core .pkg software. For my lab, I first installed the .img software and when consoling to the FirePOWER software, I found there was a 5-10 minute delay before I could configure things. Next I setup the network and installed the actual FirePOWER system software IE the .pkg software. When I consoled into that after it installed, it hung for around an hour before it finally prompted me with the configuration page. Be aware of that delay and don’t reboot it or you will have to do the entire process again. I only experienced this on my 5506 and have only done this on a single 5506. Other model sizes I installed /upgraded didn’t do this and I don’t have another 5506 so not sure is this is just something weird with my ASA5506.
Click the Configuration Tab and you should see the ASA FirePOWER Configuration tab is now available. Click that.
Now you will see FirePOWER options on the action window. Click Updates under Local to see options.
There will be three tabs for updates. The first is minor updates. Anything major such as upgrading from 5.4 to 6.0 will not show here however minor updates such as 6.0 to 6.01 would appear as well as other types of updates. See available updates by clicking the Download Update button. In my example, I brought up the Vulnerability and Fingerprint Database. Click the package button to install any updates. They will appear in the task window. Next click the Rule Updates tab and set a time for ongoing updates as well as click the Download new rule updates from support site to get a update now. Lastly, click the Geolocation Updates tab and do the same IE set a on going update time as well as update it now.
Once things are updated, next click the License option found under the Updates option on the left window. If you are not licensed, click the Add New License button. You will need to use the manager license key to have keys generated by Cisco if you are doing temporary testing (see this blog post for more info HERE). Once licensed, you should see something like showing which licenses your ASA5506 is setup for. Next click the Policies tab on the left and select Intrusion Policy then Intrusion Policy. This is where you create a IDS/IPS policy. Click the Create Policy button and give it a name. The default balance of security and connectivity is a good starting point. You can tune the IPS by clicking the rules tab. For example, you can searching for malware to bring up those rules, click the green arrow to bring up options and select Drop and Generate Events. Do the same for blacklist, PUA, Indicator of Compromise, and Exploit Kit. Click back to the Policy Information and apply your changes.
Now that your IPS policy is ready, lets setup a AMP policy IE detecting day zeros. Start with selecting Files found under the Intrusion Policy option on the left. This should be blank so click New File policy to create a new policy. Give it a name and click OK. Now click Add File Rule. For the first rule, we will select the action of Detecting Files. Next you will select each File Type Category and select the top option for all File Types so we get all file types added. The next example should be how it looks once configured. Apply that and now lets crate a second file rule by again clicking Add File Rule. This time we will do the same thing however use the action of Malware Cloud Lookup. Go through getting all file types added and save that. Now you should have two file rules under your file policy as shown. Now lets create an Access Control Policy by selecting that on the left tab under Policies. Click the Add Rule button to bring up access control options. The first rule will be created just to trigger application and URL data. Set the action as Monitor and click the URL tab. Select any category and click save. Again, the idea is just to trigger the ASA to capture data at this point. Now lets create a new rule that leverages our IDS/IPS and AMP policies. Leave the Action as allow and select the Inspection tab. Choose the IPS policy you created for the Intrusion Policy and AMP policy you crated for the File Policy. Click the Logging tab and select to log at the End of Connection. Click save.
Now click Store ASA FirePOWER Changes found at the bottom of the access control page. You screen should look like this. Next lets define your network you will be evaluating. Select the Object management option on the left, select Network and select Individual Objects. The default setting will have a few generic networks. Click the pencil to edit this. Give it a name and delete the existing networks. Add only your inside networks. This way FirePOWER will consider these inside addresses while everything will be considered the outside. Here is an example of adding the 192.168.1.0 network. This should give you a basic configuration to test your ASA with FirePOWER. There are different deployment methods to get data through the solution. One option is using a passive approach by placing the ASA into a Transparent firewall configuration. With this approach, you would provide a single IP address to the management interface needed to hit ASDM and setup a interface to be a enabled for reading from a switch port setup as a tap. FirePOWER would have its own IP address so make sure those are there or you won’t be able to manage everything in ASDM. The advantages of this approach is you can stick the ASA onto a network and see data without interrupting anything. The disadvantage is you can’t block anything since you are just viewing a copy of network traffic. Here is a diagram of this design. The other approach is going with a inline deployment. This requires setting up your inside and outside address and making sure you properly move traffic through the ASA. The advantage is you can block things however make sure to start with testing in a lab verses doing this POV on system with active users.
Happy testing.
Post a Comment