- About This Guide
- Index
- Glossary
-
- Configuring IPSec and ISAKMP
- Configuring L2TP over IPSec
- Setting General VPN Parameters
- Configuring Tunnel Groups, Group Policies, and Users
- Configuring IP Addresses for VPN
- Configuring Remote Access VPNs
- Configuring Network Admission Control
- Configuring Easy VPN on the ASA 5505
- Configuring the PPPoE Client
- Configuring LAN-to-LAN VPNs
- Configuring Clientless SSL VPN
- Configuring AnyConnect VPN Client Connections
- Configuring AnyConnect Host Scan
- Configuring Objects and Groups
- Configuring Regular Expressions
- Scheduling Extended Access List Activation
- Information About Scheduling Access List Activation
- Licensing Requirements for Scheduling Access List Activation
- Guidelines and Limitations for Scheduling Access List Activation
- Configuring and Applying Time Ranges
- Configuration Examples for Scheduling Access List Activation
- Feature History for Scheduling Access List Activation
Configuring Objects
Objects are reusable components for use in your configuration. They can be defined and used in ASA configurations in the place of inline IP addresses. Objects make it easy to maintain your configurations because you can modify an object in one place and have it be reflected in all other places that are referencing it. Without objects you would have to modify the parameters for every feature when required, instead of just once. For example, if a network object defines an IP address and subnet mask, and you want to change the address, you only need to change it in the object definition, not in every feature that refers to that IP address.
This chapter describes how to configure objects, and it includes the following sections:
Configuring Objects and Groups
This section includes the following topics:
- Information About Objects and Groups
- Licensing Requirements for Objects and Groups
- Guidelines and Limitations for Objects and Groups
- Configuring Objects
- Configuring Object Groups
- Monitoring Objects and Groups
- Feature History for Objects and Groups
Information About Objects and Groups
The ASA supports objects and object groups. You can attach or detach objects from one or more object groups when needed, ensuring that the objects are not duplicated but can be re-used wherever needed.
Information About Objects
Objects are created in and used by the ASA in the place of an inline IP address in any given configuration. You can define an object with a particular IP address and netmask pair or a protocol (and, optionally, a port) and use this object in several configurations. The advantage is that whenever you want to modify the configurations created to this IP address or protocol, you do not need to modify all rules in the running configuration. You can modify the object, and then the change automatically applies to all rules that use the specified object. You can configure two types of objects: network objects and service objects. These objects can be used in Network Address Translation (NAT), access lists, and object groups.
Information About Object Groups
By grouping like objects together, you can use the object group in an ACE instead of having to enter an ACE for each object separately. You can create the following types of object groups:
For example, consider the following three object groups:
- MyServices—Includes the TCP and UDP port numbers of the service requests that are allowed access to the internal network.
- TrustedHosts—Includes the host and network addresses allowed access to the greatest range of services and servers.
- PublicServers—Includes the host addresses of servers to which the greatest access is provided.
After creating these groups, you could use a single ACE to allow trusted hosts to make specific service requests to a group of public servers.
Licensing Requirements for Objects and Groups
The following table shows the licensing requirements for this feature:
|
|
---|---|
Guidelines and Limitations for Objects and Groups
This section includes the guidelines and limitations for this feature.
Supported in single and multiple context mode.
Supported in routed and transparent firewall modes.
Supports IPv6, with limitations. (See the “Additional Guidelines and Limitations” section.)
Additional Guidelines and Limitations
The following guidelines and limitations apply to object groups:
- Objects and object groups share the same name space.
- Object groups must have unique names. While you might want to create a network object group named “Engineering” and a service object group named “Engineering,” you need to add an identifier (or “tag”) to the end of at least one object group name to make it unique. For example, you can use the names “Engineering_admins” and “Engineering_hosts” to make the object group names unique and to aid in identification.
- You cannot remove an object group or make an object group empty if it is used in a command.
- The ASA does not support IPv6 nested object groups, so you cannot group an object with IPv6 entities under another IPv6 object group.
Configuring Objects
Configuring a Network Object
A network object contains a single IP address/mask pair. Network objects can be of three types: host, subnet, or range.
You can also configure auto NAT as part of the object definition; see “Configuring Network Object NAT,” for more information.
Detailed Steps
Examples
To create a network object, enter the following commands:
Configuring a Service Object
A service object contains a protocol and optional source and/or destination port.
Detailed Steps
Example
To create a service object, enter the following commands:
Configuring Object Groups
Adding a Protocol Object Group
To add or change a protocol object group, perform the steps in this section. After you add the group, you can add more objects as required by following this procedure again for the same group name and specifying additional objects. You do not need to reenter existing objects; the commands you already set remain in place unless you remove them with the no form of the command.
Detailed Steps
|
|
|
---|---|---|
|
Adds a protocol group. The obj_grp_id is a text string up to 64 characters in length and can be any combination of letters, digits, and the following characters: |
|
|
(Optional) Adds a description. The description can be up to 200 characters. |
|
|
Defines the protocols in the group. Enter the command for each protocol. The protocol is the numeric identifier of the specified IP protocol (1 to 254) or a keyword identifier (for example, icmp, tcp, or udp). To include all IP protocols, use the keyword ip. For a list of protocols that you can specify, see the “Protocols and Applications” section. |
Example
To create a protocol group for TCP, UDP, and ICMP, enter the following commands:
Adding a Network Object Group
A network object group supports IPv4 and IPv6 addresses.
To add or change a network object group, perform the steps in this section. After you add the group, you can add more objects as required by following this procedure again for the same group name and specifying additional objects. You do not need to reenter existing objects; the commands you already set remain in place unless you remove them with the no form of the command.
Detailed Steps
Example
To create a network group that includes the IP addresses of three administrators, enter the following commands:
Adding a Service Object Group
To add or change a service object group, perform the steps in this section. After you add the group, you can add more objects as required by following this procedure again for the same group name and specifying additional objects. You do not need to reenter existing objects; the commands you already set remain in place unless you remove them with the no form of the command.
Detailed Steps
|
|
|
---|---|---|
|
The object keyword adds an additional object to the service object group. The grp_id is a text string up to 64 characters in length and can be any combination of letters, digits, and the following characters: Specify the protocol for the services (ports) you want to add with either the tcp, udp, or tcp-udp keywords. Enter the tcp-udp keyword if your service uses both TCP and UDP with the same port number, for example, DNS (port53). |
|
|
(Optional) Adds a description. The description can be up to 200 characters. |
|
|
Defines the ports in the group. Enter the command for each port or range of ports. For a list of permitted keywords and well-known port assignments, see the “Protocols and Applications” section. |
Example
To create service groups that include DNS (TCP/UDP), LDAP (TCP), and RADIUS (UDP), enter the following commands:
Adding an ICMP Type Object Group
To add or change an ICMP type object group, perform the steps in this section. After you add the group, you can add more objects as required by following this procedure again for the same group name and specifying additional objects. You do not need to reenter existing objects; the commands you already set remain in place unless you remove them with the no form of the command.
Detailed Steps
|
|
|
---|---|---|
|
Adds an ICMP type object group. The grp_id is a text string up to 64 characters in length and can be any combination of letters, digits, and the following characters: |
|
|
(Optional) Adds a description. The description can be up to 200 characters. |
|
|
Defines the ICMP types in the group. Enter the command for each type. For a list of ICMP types, see the“ICMP Types” section. |
Example
Create an ICMP type group that includes echo-reply and echo (for controlling ping) by entering the following commands:
Nesting Object Groups
You can nest object groups hierarchically so that one object group can contain other object groups of the same type and you can mix and match nested group objects and regular objects within an object group. The ASA does not support IPv6 nested object groups, however, so you cannot group an object with IPv6 entities under another IPv6 object-group.
To nest an object group within another object group of the same type, first create the group that you want to nest (see the “Configuring Object Groups” section), and then perform the steps in this section.
Detailed Steps
Examples
Create network object groups for privileged users from various departments by entering the following commands:
You then nest all three groups together as follows:
You only need to specify the admin object group in your ACE as follows:
Removing Object Groups
You can remove a specific object group or remove all object groups of a specified type; however, you cannot remove an object group or make an object group empty if it is used in an access list.
Detailed Step
Monitoring Objects and Groups
To monitor objects and groups, enter the following commands:
Feature History for Objects and Groups
Table 1 lists each feature change and the platform release in which it was implemented.
Configuring Regular Expressions
A regular expression matches text strings either literally as an exact string, or by using metacharacters so that you can match multiple variants of a text string. You can use a regular expression to match the content of certain application traffic; for example, you can match a URL string inside an HTTP packet. This section describes how to create a regular expression and includes the following topics:
Creating a Regular Expression
A regular expression matches text strings either literally as an exact string, or by using metacharacters so you can match multiple variants of a text string. You can use a regular expression to match the content of certain application traffic; for example, you can match a URL string inside an HTTP packet.
Guidelines
Use Ctrl+V to escape all of the special characters in the CLI, such as question mark (?) or a tab. For example, type d[Ctrl+V]?g to enter d?g in the configuration.
See the regex command in the command reference for performance impact information when matching a regular expression to packets.
Note As an optimization, the ASA searches on the deobfuscated URL. Deobfuscation compresses multiple forward slashes (/) into a single slash. For strings that commonly use double slashes, like “http://”, be sure to search for “http:/” instead.
Table 13-2 lists the metacharacters that have special meanings.
Detailed Steps
Step 1 To test a regular expression to make sure it matches what you think it will match, enter the following command:
Where the input_text argument is a string you want to match using the regular expression, up to 201 characters in length.
The regular_expression argument can be up to 100 characters in length.
Use Ctrl+V to escape all of the special characters in the CLI. For example, to enter a tab in the input text in the test regex command, you must enter test regex “test[Ctrl+V Tab]” “test\t”.
If the regular expression matches the input text, you see the following message:
If the regular expression does not match the input text, you see the following message:
Step 2 To add a regular expression after you tested it, enter the following command:
Where the name argument can be up to 40 characters in length.
The regular_expression argument can be up to 100 characters in length.
Examples
The following example creates two regular expressions for use in an inspection policy map:
Creating a Regular Expression Class Map
A regular expression class map identifies one or more regular expressions. You can use a regular expression class map to match the content of certain traffic; for example, you can match URL strings inside HTTP packets.
Detailed Steps
Step 1 Create one or more regular expressions according to the “Configuring Regular Expressions” section.
Step 2 Create a class map by entering the following command:
Where class_map_name is a string up to 40 characters in length. The name “class-default” is reserved. All types of class maps use the same name space, so you cannot reuse a name already used by another type of class map.
The match-any keyword specifies that the traffic matches the class map if it matches at least one of the regular expressions.
The CLI enters class-map configuration mode.
Step 3 (Optional) Add a description to the class map by entering the following command:
Step 4 Identify the regular expressions you want to include by entering the following command for each regular expression:
Examples
The following example creates two regular expressions, and adds them to a regular expression class map. Traffic matches the class map if it includes the string “example.com” or “example2.com.”
Scheduling Extended Access List Activation
This section includes the following topics:
- Information About Scheduling Access List Activation
- Licensing Requirements for Scheduling Access List Activation
- Guidelines and Limitations for Scheduling Access List Activation
- Configuring and Applying Time Ranges
- Configuration Examples for Scheduling Access List Activation
- Feature History for Scheduling Access List Activation
Information About Scheduling Access List Activation
You can schedule each ACE in an access list to be activated at specific times of the day and week by applying a time range to the ACE.
Licensing Requirements for Scheduling Access List Activation
The following table shows the licensing requirements for this feature:
|
|
---|---|
Guidelines and Limitations for Scheduling Access List Activation
This section includes the guidelines and limitations for this feature.
Supported in single and multiple context mode.
Supported in routed and transparent firewall modes.
Additional Guidelines and Limitations
The following guidelines and limitations apply to using object groups with access lists:
- Users could experience a delay of approximately 80 to 100 seconds after the specified end time for the ACL to become inactive. For example, if the specified end time is 3:50, because the end time is inclusive, the command is picked up anywhere between 3:51:00 and 3:51:59. After the command is picked up, the ASA finishes any currently running task and then services the command to deactivate the ACL.
- Multiple periodic entries are allowed per time-range command. If a time-range command has both absolute and periodic values specified, then the periodic commands are evaluated only after the absolute start time is reached, and they are not further evaluated after the absolute end time is reached.
Configuring and Applying Time Ranges
You can add a time range to implement a time-based access list. To identify the time range, perform the steps in this section.
Detailed Steps
|
|
|
---|---|---|
|
||
|
Specifies a recurring time range. You can specify the following values for days-of-the-week : The time is in the format hh : mm. For example, 8:00 is 8:00 a.m. and 20:00 is 8:00 p.m. |
|
|
Specifies an absolute time range. The time is in the format hh : mm. For example, 8:00 is 8:00 a.m. and 20:00 is 8:00 p.m. The date is in the format day month year ; for example, 1 january 2006. |
|
|
Applies the time range to an ACE. Note If you also enable logging for the ACE, use the log keyword before the time-range keyword. If you disable the ACE using the inactive keyword, use the inactive keyword as the last keyword. See “Adding an Extended Access List,” for complete access-list command syntax. |
Example
The following example binds an access list named “Sales” to a time range named “New_York_Minute”:
Configuration Examples for Scheduling Access List Activation
The following is an example of an absolute time range beginning at 8:00 a.m. on January 1, 2006. Because no end time and date are specified, the time range is in effect indefinitely.
The following is an example of a weekly periodic time range from 8:00 a.m. to 6:00 p.m on weekdays:
Feature History for Scheduling Access List Activation
Table 13-3 lists each feature change and the platform release in which it was implemented.