- About This Guide
-
- Introduction to the Security Appliance
- Getting Started
- Enabling Multiple Context Mode
- Configuring Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
- Configuring Ethernet Settings and Subinterfaces
- Adding and Managing Security Contexts
- Configuring Interface Parameters
- Configuring Basic Settings
- Configuring IP Routing
- Configuring Multicast Routing
- Configuring DHCP, DDNS, and WCCP Services
- Configuring IPv6
- Configuring AAA Servers and the Local Database
- Configuring Failover
-
- Firewall Mode Overview
- Identifying Traffic With Access Lists
- Applying NAT
- Permitting or Denying Network Access
- Applying AAA for Network Access
- Applying Filtering Services
- Using Modular Policy Framework
- Managing AIP SSM and CSC SSM
- Preventing Network Attacks
- Applying QoS Policies
- Applying Application Layer Protocol Inspection
- Configuring ARP Inspection and Bridging Parameters
-
- Configuring IPSec and ISAKMP
- Configuring L2TP over IPSec
- Setting General VPN Parameters
- Configuring Tunnel Groups, Group Policies, and Users
- Configuring IP Addresses for VPN
- Configuring Remote Access VPNs
- Configuring Network Admission Control
- Configuring Easy VPN on the ASA 5505
- Configuring the PPPoE Client
- Configuring LAN-to-LAN VPNs
- Configuring WebVPN
- Configuring SSL VPN Client
- Configuring Certificates
- Glossary
- Index
Feature Licenses and Specifications
This appendix describes the feature licenses and specifications. This appendix includes the following sections:
•Supported Platforms and Feature Licenses
•Security Services Module Support
Supported Platforms and Feature Licenses
This software version supports the following platforms; see the associated tables for the feature support for each model:
•ASA 5505, Table A-1
•ASA 5510, Table A-2
•ASA 5520, Table A-3
•ASA 5540, Table A-4
•ASA 5550, Table A-5
•PIX 515/515E, Table A-6
•PIX 525, Table A-7
•PIX 535, Table A-8
Note Items that are in italics are separate, optional licenses that you can replace the base license. You can mix and match licenses, for example, the 10 security context license plus the Strong Encryption license; or the 500 WebVPN license plus the GTP/GPRS license; or all four licenses together.
|
|
|
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent1 |
10 |
Optional Licenses: |
10 |
Optional Licenses: |
||||||||
50 |
Unlimited |
50 |
Unlimited |
|||||||||
Security Contexts |
No support |
No support |
||||||||||
VPN Sessions2 |
10 combined IPSec and WebVPN |
25 combined IPSec and WebVPN |
||||||||||
Max. IPSec Sessions |
10 |
25 |
||||||||||
Max. WebVPN Sessions |
2 |
Optional License: 10 |
2 |
Optional License: 10 |
||||||||
VPN Load Balancing |
No support |
No support |
||||||||||
Failover |
None |
Active/Standby (no Stateful Failover) |
||||||||||
GTP/GPRS |
No support |
No support |
||||||||||
Maximum VLANs/Zones |
3 (2 regular zones and 1 restricted zone that can only communicate with 1 other zone) |
20 |
||||||||||
Maximum VLAN Trunks |
No support |
Unlimited |
||||||||||
Concurrent Firewall Conns3 |
10 K |
25 K |
||||||||||
Max. Physical Interfaces |
Unlimited, assigned to VLANs/zones |
Unlimited, assigned to VLANs/zones |
||||||||||
Encryption |
Base (DES) |
Optional license: |
Base (DES) |
Optional license: |
||||||||
Minimum RAM |
128 MB |
128 MB |
1 In routed mode, hosts on the inside (Business and Home VLANs) count towards the limit when they communicate with the outside (Internet VLAN), including when the inside initiates a connection to the outside as well as when the outside initiates a connection to the inside. Note that even when the outside initiates a connection to the inside, outside hosts are not counted towards the limit; only the inside hosts count. Hosts that initiate traffic between Business and Home are also not counted towards the limit. The interface associated with the default route is considered to be the outside Internet interface. If there is no default route, hosts on all interfaces are counted toward the limit. In transparent mode, the interface with the lowest number of hosts is counted towards the host limit. See the show local-host command to view host limits. 2 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the security appliance, so be sure to size your network appropriately. 3 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with one host and one dynamic translation for every four connections. |
|
|
|
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
||||||||||
Security Contexts |
No support |
2 |
Optional Licenses: |
|||||||||
5 |
||||||||||||
VPN Sessions1 |
250 combined IPSec and WebVPN |
250 combined IPSec and WebVPN |
||||||||||
Max. IPSec Sessions |
250 |
250 |
||||||||||
Max. WebVPN Sessions |
2 |
Optional Licenses: |
2 |
Optional Licenses: |
||||||||
10 |
25 |
50 |
100 |
250 |
10 |
25 |
50 |
100 |
250 |
|||
VPN Load Balancing |
No support |
No support |
||||||||||
Failover |
None |
Active/Standby or Active/Active |
||||||||||
GTP/GPRS |
No support |
No support |
||||||||||
Max. VLANs |
50 |
100 |
||||||||||
Concurrent Firewall Conns2 |
50 K |
130 K |
||||||||||
Max. Physical Interfaces |
(For 7.2(1)) 3 at 10/100 plus the Management interface for management traffic only (For 7.2(2) and above) Unlimited |
Unlimited (For 7.2(3) and above) Ethernet 0/0 and Ethernet 0/1 are used as Gigabit Ethernet interfaces. |
||||||||||
Encryption |
Base (DES) |
Optional license: |
Base (DES) |
Optional license: |
||||||||
Min. RAM |
256 MB |
256 MB |
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the security appliance, so be sure to size your network appropriately. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
||||||||||
Security Contexts |
2 |
Optional Licenses: |
||||||||||
5 |
10 |
20 |
||||||||||
VPN Sessions1 |
750 combined IPSec and WebVPN |
|||||||||||
Max. IPSec Sessions |
750 |
|||||||||||
Max. WebVPN Sessions |
2 |
Optional Licenses: |
||||||||||
10 |
25 |
50 |
100 |
250 |
500 |
750 |
||||||
VPN Load Balancing |
Supported |
|||||||||||
Failover |
Active/Standby or Active/Active |
|||||||||||
GTP/GPRS |
None |
Optional license: Enabled |
||||||||||
Max. VLANs |
150 |
|||||||||||
Concurrent Firewall Conns2 |
280 K |
|||||||||||
Max. Physical Interfaces |
Unlimited |
|||||||||||
Encryption |
Base (DES) |
Optional license: Strong (3DES/AES) |
||||||||||
Min. RAM |
512 MB |
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the security appliance, so be sure to size your network appropriately. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
||||||||||
Security Contexts |
2 |
Optional licenses: |
||||||||||
5 |
10 |
20 |
50 |
|||||||||
VPN Sessions1 |
5000 combined IPSec and WebVPN |
|||||||||||
Max. IPSec Sessions |
5000 |
|||||||||||
Max. WebVPN Sessions |
2 |
Optional Licenses: |
||||||||||
10 |
25 |
50 |
100 |
250 |
500 |
750 |
1000 |
2500 |
||||
VPN Load Balancing |
Supported |
|||||||||||
Failover |
Active/Standby or Active/Active |
|||||||||||
GTP/GPRS |
None |
Optional license: Enabled |
||||||||||
Max. VLANs |
200 |
|||||||||||
Concurrent Firewall Conns2 |
400 K |
|||||||||||
Max. Physical Interfaces |
Unlimited |
|||||||||||
Encryption |
Base (DES) |
Optional license: Strong (3DES/AES) |
||||||||||
Min. RAM |
1 GB |
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the security appliance, so be sure to size your network appropriately. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
|||||||||||
Security Contexts |
2 |
Optional licenses: |
||||||||||
5 |
10 |
20 |
50 |
|||||||||
VPN Sessions1 |
5000 combined IPSec and WebVPN |
|||||||||||
Max. IPSec Sessions |
5000 |
|||||||||||
Max. WebVPN Sessions |
2 |
Optional Licenses: |
||||||||||
10 |
25 |
50 |
100 |
250 |
500 |
750 |
1000 |
2500 |
5000 |
|||
VPN Load Balancing |
Supported |
|||||||||||
Failover |
Active/Standby or Active/Active |
|||||||||||
GTP/GPRS |
None |
Optional license: Enabled |
||||||||||
Max. VLANs |
250 |
|||||||||||
Concurrent Firewall Conns2 |
650 K |
|||||||||||
Max. Physical Interfaces |
Unlimited |
|||||||||||
Encryption |
Base (DES) |
Optional license: Strong (3DES/AES) |
||||||||||
Min. RAM |
4 GB |
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the security appliance, so be sure to size your network appropriately. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|
|
|
|||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
Unlimited |
Unlimited |
|||||||||||||||||
Security Contexts |
No support |
2 |
Optional license: 5 |
2 |
Optional license: 5 |
2 |
Optional license: 5 |
||||||||||||||
IPSec Sessions |
2000 |
2000 |
2000 |
2000 |
|||||||||||||||||
WebVPN Sessions |
No support |
No support |
No support |
No support |
|||||||||||||||||
VPN Load Balancing |
No support |
No support |
No support |
No support |
|||||||||||||||||
Failover |
No support |
Active/Standby |
Active/Standby |
Active/Standby |
|||||||||||||||||
GTP/GPRS |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
|||||||||||||
Max. VLANs |
10 |
25 |
25 |
25 |
|||||||||||||||||
Concurrent Firewall Conns2 |
48 K |
130 K |
130 K |
130 K |
|||||||||||||||||
Max. Physical Interfaces |
3 |
6 |
6 |
6 |
|||||||||||||||||
Encryption |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
|||||||||||||
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
||||||||||||||
Min. RAM |
64 MB |
128 MB |
128 MB |
128 MB |
1 This license can only be used in a failover pair with another unit with a UR license. Both units must be the same model. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|
|
|
|||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
Unlimited |
Unlimited |
|||||||||||||||||
Security Contexts |
No support |
2 |
Optional licenses: |
2 |
Optional licenses: |
2 |
Optional licenses: |
||||||||||||||
5 |
10 |
20 |
50 |
5 |
10 |
20 |
50 |
5 |
10 |
20 |
50 |
||||||||||
IPSec Sessions |
2000 |
2000 |
2000 |
2000 |
|||||||||||||||||
WebVPN Sessions |
No support |
No support |
No support |
No support |
|||||||||||||||||
VPN Load Balancing |
No support |
No support |
No support |
No support |
|||||||||||||||||
Failover |
No support |
Active/Standby |
Active/Standby |
Active/Standby |
|||||||||||||||||
GTP/GPRS |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
|||||||||||||
Max. VLANs |
25 |
100 |
100 |
100 |
|||||||||||||||||
Concurrent Firewall Conns2 |
140 K |
280 K |
280 K |
280 K |
|||||||||||||||||
Max. Physical Interfaces |
6 |
10 |
10 |
10 |
|||||||||||||||||
Encryption |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
|||||||||||||
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
||||||||||||||
Min. RAM |
128 MB |
256 MB |
256 MB |
256 MB |
1 This license can only be used in a failover pair with another unit with a UR license. Both units must be the same model. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
|
|
|
|
|
|||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Users, concurrent |
Unlimited |
Unlimited |
Unlimited |
Unlimited |
|||||||||||||||||
Security Contexts |
No support |
2 |
Optional licenses: |
2 |
Optional licenses: |
2 |
Optional licenses: |
||||||||||||||
5 |
10 |
20 |
50 |
5 |
10 |
20 |
50 |
5 |
10 |
20 |
50 |
||||||||||
IPSec Sessions |
2000 |
2000 |
2000 |
2000 |
|||||||||||||||||
WebVPN Sessions |
No support |
No support |
No support |
No support |
|||||||||||||||||
VPN Load Balancing |
No support |
No support |
No support |
No support |
|||||||||||||||||
Failover |
No support |
Active/Standby |
Active/Standby |
Active/Standby |
|||||||||||||||||
GTP/GPRS |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
None |
Optional license: |
|||||||||||||
Max. VLANs |
50 |
150 |
150 |
150 |
|||||||||||||||||
Concurrent Firewall Conns2 |
250 K |
500 K |
500 K |
500 K |
|||||||||||||||||
Max. Physical Interfaces |
8 |
14 |
14 |
14 |
|||||||||||||||||
Encryption |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
None |
Optional licenses: |
|||||||||||||
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
Base (DES) |
Strong (3DES/ |
||||||||||||||
Min. RAM |
512 MB |
1024 MB |
1024 MB |
1024 MB |
1 This license can only be used in a failover pair with another unit with a UR license. Both units must be the same model. 2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections. |
Security Services Module Support
Table A-9 shows the SSMs supported by each platform:
|
|
---|---|
ASA 5505 |
No support |
ASA 5510 |
AIP SSM 10 AIP SSM 20 CSC SSM 10 CSC SSM 20 4GE SSM |
ASA 5520 |
AIP SSM 10 AIP SSM 20 CSC SSM 10 CSC SSM 20 4GE SSM |
ASA 5540 |
AIP SSM 10 AIP SSM 20 CSC SSM 101 CSC SSM 201 4GE SSM |
ASA 5550 |
No support (4GE SSM is built-in and not user-removable) |
PIX 515/515E |
No support |
PIX 525 |
No support |
PIX 535 |
No support |
1 The CSC SSM licenses support up to 1000 users while the Cisco ASA 5540 Series appliance can support significantly more users. If you deploy CSC SSM with an ASA 5540 adaptive security appliance, be sure to configure the security appliance to send the CSC SSM only the traffic that should be scanned. For more information, see the "Determining What Traffic to Scan" section on page 22-9 for more information. |
VPN Specifications
This section describes the VPN specifications for the security appliance. This section includes the following topics:
•Site-to-Site VPN Compatibility
Cisco VPN Client Support
The security appliance supports a wide variety of software and hardware-based Cisco VPN clients, as shown in Table A-10.
Cisco Secure Desktop Support
The security appliance supports CSD software Version 3.1.1.16.
Site-to-Site VPN Compatibility
In addition to providing interoperability for many third-party VPN products, the security appliance interoperates with the Cisco VPN products for site-to-site VPN connectivity shown in Table A-11.
Cryptographic Standards
The security appliance supports numerous cryptographic standards and related third-party products and services, including those shown in Table A-12.