Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING
  • HOME
  • Cisco Networking
    • Cisco General
    • Cisco IOS
    • Cisco VPN
    • Cisco Wireless
  • Cisco ASA
    • Cisco ASA General
    • Cisco ASA Firewall Configuration
  • Certifications Training
    • CCNA Training
    • Cisco Certifications
    • I.T Training
  • General
    • General Networking
    • IP Telephony
    • Network Security
    • Product Reviews
    • Software
  • Cisco Routers
  • Cisco Switches
You are here: Home / Cisco General / User Authentication for Web Server Access on Cisco ASA Firewall

User Authentication for Web Server Access on Cisco ASA Firewall

Written By Harris Andrea

Imagine the following scenario: We have a web server on a DMZ protected by a Cisco ASA 5500 firewall. We would like to allow external Internet users to access this web server only after they successfully authenticate with a username/password credential.

Maybe this scenario could be applicable in situations where we need to allow employees to access a corporate intranet web server when they are away from the office.

The username/password accounts for the users could be stored either locally on the ASA firewall (not very scalable) or on an internal AAA (Authentication) Server, such as the Cisco Access Control Server (ACS). Let’s see an example diagram below to make things clear:

user authentication for web server access with cisco asa firewall

From the diagram above, assume that the Web Server (WEB_SRV) has a public IP address of 20.20.20.1.

Any access from outside to this IP address must be intercepted by the ASA firewall which should prompt the user for authentication (username/password).

After the user enters his/her credentials, the Firewall will communicate with the AAA Authentication server (AAA_SRV), using either TACACS+ or RADIUS protocols, to validate the credentials of the user.

MORE READING:  Configuring Cisco IP SLA (IP Service Level Agreement Tutorial)

The AAA server will respond to the firewall with ACCESS_PERMITED or ACCESS_DENIED accordingly.

If permitted, the user will be able to communicate with the Web Server. This functionality of the Cisco ASA Firewall is also called “cut-through Proxy” and works for only specific services (HTTP, HTTPs, FTP, and TELNET).

This means that in addition to authenticating users for Web Server access, we can do the same for FTP or TELNET Servers as well.

Configuration Example:

! Specify a AAA server name (AAA_SRV) and which protocol to use (Radius or TACACS+)
CISCO-ASA(config)#  aaa-server AAA_SRV protocol tacacs+

! Designate the Authentication server IP address and the authentication secret key
CISCO-ASA(config)#  aaa-server AAA_SRV (inside) host 10.0.0.1
CISCO-ASA(config-aaa-server-host)#  key authentication-secret-key

! The following ACL specifies for which traffic flow the firewall will enforce authentication
CISCO-ASA(config)#  access-list 120 permit tcp any host 20.20.20.1 eq www

! Enable web server user authentication by matching the ACL configured above
CISCO-ASA(config)#  aaa authentication match 120 outside AAA_SRV

MORE READING:  What is Cisco Identity Services Engine (ISE)? Use Cases, How it is Used etc

! The last statement above will authenticate traffic on the “outside” interface using
! server AAA_SRV only if this traffic matches Access List 120

Related Posts

  • How to Find IP Address From MAC Address on Cisco Devices
  • Cisco Command to Test a Copper UTP Ethernet Cable on a Switch
  • What is Cisco Meraki ? Some FAQ About Cisco Meraki You Need to Know
  • What is Cisco Identity Services Engine (ISE)? Use Cases, How it is Used etc
  • Readers Favorite Posts – Articles Liked by our Visitors

Filed Under: Cisco General

Download Free Cisco Commands Cheat Sheets

Enter your Email below to Download our Free Cisco Commands Cheat Sheets for Routers, Switches and ASA Firewalls.

We use Elastic Email as our marketing automation service. By submitting this form, you agree that the information you provide will be transferred to Elastic Email for processing in accordance with their Terms of Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.

About Harris Andrea

Harris Andrea is an Engineer with more than two decades of professional experience in the fields of TCP/IP Networks, Information Security and I.T. Over the years he has acquired several professional certifications such as CCNA, CCNP, CEH, ECSA etc.

He is a self-published author of two books ("Cisco ASA Firewall Fundamentals" and "Cisco VPN Configuration Guide") which are available at Amazon and on this website as well.

Comments

  1. Aste al ribasso says

    December 25, 2008 at 1:54 pm

    Aribasso le aste al ribasso: Merry Christmas, Auguri di Buon Natale ,Vesel

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this site

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2023 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy

0 shares