Configuring firewall policies – Cisco ASA 5505 User Manual

Page 1489

Advertising
background image

67-63

Cisco ASA 5500 Series Configuration Guide using the CLI

Chapter 67 Configuring Connection Profiles, Group Policies, and Users

Group Policies

hostname(config-group-policy)# address-pools none

hostname(config-group-policy)#

The command no address pools none removes the address-pools none command from the
configuration, restoring the default value, which is to allow inheritance.

hostname(config-group-policy)# no address-pools none

hostname(config-group-policy)#

The syntax elements of this command are as follows:

address_pool—Specifies the name of the address pool configured with the ip local pool command.
You can specify up to 6 local address pools.

none—Specifies that no address pools are configured and disables inheritance from other sources
of group policy.

value—Specifies a list of up to 6 address pools from which to assign addresses.

The following example entered in config-general configuration mode, configures pool 1 and pool20 as
lists of address pools to use for allocating addresses to remote clients for GroupPolicy1:

hostname(config)# ip local pool pool 192.168.10.1-192.168.10.100 mask 255.255.0.0

hostname(config)# ip local pool pool20 192.168.20.1-192.168.20.200 mask 255.255.0.0

hostname(config)# group-policy GroupPolicy1 attributes

hostname(config-group-policy)# address-pools value pool1 pool20

hostname(config-group-policy)#

Configuring Firewall Policies

A firewall isolates and protects a computer from the Internet by inspecting each inbound and outbound
individual packet of data to determine whether to allow or drop it. Firewalls provide extra security if
remote users in a group have split tunneling configured. In this case, the firewall protects the user’s PC,
and thereby the corporate network, from intrusions by way of the Internet or the user’s local LAN.
Remote users connecting to the ASA with the VPN client can choose the appropriate firewall option.

Set personal firewall policies that the ASA pushes to the VPN client during IKE tunnel negotiation by
using the client-firewall command in group-policy configuration mode. To delete a firewall policy, enter
the no form of this command.

To delete all firewall policies, enter the no client-firewall command without arguments. This command
deletes all configured firewall policies, including a null policy if you created one by entering the
client-firewall command with the none keyword.

When there are no firewall policies, users inherit any that exist in the default or other group policy. To
prevent users from inheriting such firewall policies, enter the client-firewall command with the none
keyword.

The Add or Edit Group Policy window, Client Firewall tab, lets you configure firewall settings for VPN
clients for the group policy being added or modified.

Note

Only VPN clients running Microsoft Windows can use these firewall features. They are currently not
available to hardware clients or other (non-Windows) software clients.

In the first scenario, a remote user has a personal firewall installed on the PC. The VPN client enforces
firewall policy defined on the local firewall, and it monitors that firewall to make sure it is running. If
the firewall stops running, the VPN client drops the connection to the ASA. (This firewall enforcement

Advertising