Cisco Firewall License

Cisco Firewall License

Cisco Firewall License

Cisco Firewall License is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defense in network security for over 25 years. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. Firewall is one of the main pillars of the network and its existence is essential for the network.

ASA offers a very comprehensive feature set that helps secure networks of all shapes and sizes. To deliver the desired functionality within the available budget while allowing for future scalability, you can unlock advanced security capabilities and increase certain system capacities on demand through a flexible system of feature licenses.

Some characteristics of the hardware platform or expansion modules can enable certain feature licenses implicitly. You can also activate additional licenses permanently or for a certain duration of time. When multiple Cisco ASA devices participate in failover or clustering, some licensed capacities automatically aggregate up to the platform hardware limit to maximize your investment. Although this flexible system may seem complicated at first, it actually makes the task of customizing a Cisco ASA for your specific business needs quite easy.

Licensed Features on ASA

Every Cisco ASA platform comes with a certain number of implicitly activated features and capacities as a part of the Base License. In other words, these capabilities are fixed in the given software image for the particular hardware; you cannot selectively disable them. One example of such a feature is Active/Active failover, which is always available on all Cisco ASA 5585-X appliances. Some platforms offer the optional Security Plus license, which may unlock additional features or capacities on top of the Base License. For example, you can increase the maximum concurrent firewall connection count on the Cisco ASA 5505 from 10,000 to 25,000 by installing a Security Plus license.

In addition to the Base and Security Plus licenses, you can activate other advanced security features individually:

  • Some capabilities operate in a simple binary switch fashion whereby the license for the feature type is either enabled or disabled; once enabled, there are typically no direct restrictions on how much the feature can be used. For instance, the Botnet Traffic Filter license will allow you to protect all connections through a Cisco ASA up to the maximum limit for the platform.
  • Other features may carry their own capacity limits that come in quantified tiers. An example of such a feature is the ability to configure security contexts on some Cisco ASA appliances. On the Cisco ASA 5580 platform, the Base License allows creating up to two application contexts, while several premium licenses of different tiered counts allow extending this limit up to 250 contexts in total.

Not all of the licensed features and capabilities are available on all hardware platforms. For instance, at the time of writing, the clustering feature is currently available only on Cisco ASA 5500-X, ASA 5580, and ASA 5585-X appliances. Depending on specific markets and international export regulations, some Cisco ASA models may also ship with the permanent No Payload Encryption license; this license ties to the particular hardware without the option of change or removal. The following licensed features and capacities are not available on any No Payload Encryption hardware models:

  • AnyConnect Premium Peers
  • AnyConnect Essentials
  • Other VPN Peers
  • Total VPN Peers
  • Shared License
  • AnyConnect for Mobile
  • AnyConnect for Cisco VPN Phone
  • Advanced Endpoint Assessment
  • UC Phone Proxy Sessions
  • Total UC Proxy Sessions
  • Intercompany Media Engine

As you identify the correct feature set to take the most advantage of Cisco ASA capabilities while fully protecting your network, it helps to organize the licensed features into the following logical categories:

  • Basic platform capabilities: Typically are relevant to all Cisco ASA deployments
  • Advanced security features: Can satisfy specific network design goals for a particular Cisco ASA installation
  • Tiered capacity features: Depend on the size of a projected user base and allow for future growth

Main Role of the Firewall

 

Firewalls can either be software or hardware, though it’s best to have both. A software firewall is a program installed on each computer and regulates traffic through port numbers and applications, while a physical firewall is a piece of equipment installed between your network and gateway.

Packet-filtering firewalls, the most common type of firewall, examine packets and prohibit them from passing through if they don’t match an established security rule set. This type of firewall checks the packet’s source and destination IP addresses. If packets match those of an “allowed” rule on the firewall, then it is trusted to enter the network.

Packet-filtering firewalls are divided into two categories: stateful and stateless. Stateless firewalls examine packets independently of one another and lack context, making them easy targets for hackers. In contrast, stateful firewalls remember information about previously passed packets and are considered much more secure.

While packet-filtering firewalls can be effective, they ultimately provide very basic protection and can be very limited—for example, they can’t determine if the contents of the request that’s being sent will adversely affect the application it’s reaching. If a malicious request that was allowed from a trusted source address would result in, say, the deletion of a database, the firewall would have no way of knowing that. Next-generation firewalls and proxy firewalls are more equipped to detect such threats.

 

Types of Firewalls

  • Next-generation firewalls (NGFW) combine traditional firewall technology with additional functionality, such as encrypted traffic inspection, intrusion prevention systems, anti-virus, and more. Most notably, it includes deep packet inspection (DPI). While basic firewalls only look at packet headers, deep packet inspection examines the data within the packet itself, enabling users to more effectively identify, categorize, or stop packets with malicious data. Learn about Forcepoint NGFW here.

  • Proxy firewalls filter network traffic at the application level. Unlike basic firewalls, the proxy acts an intermediary between two end systems. The client must send a request to the firewall, where it is then evaluated against a set of security rules and then permitted or blocked. Most notably, proxy firewalls monitor traffic for layer 7 protocols such as HTTP and FTP, and use both stateful and deep packet inspection to detect malicious traffic.
Cisco License
  • Network address translation (NAT) firewalls allow multiple devices with independent network addresses to connect to the internet using a single IP address, keeping individual IP addresses hidden. As a result, attackers scanning a network for IP addresses can’t capture specific details, providing greater security against attacks. NAT firewalls are similar to proxy firewalls in that they act as an intermediary between a group of computers and outside traffic.

Stateful multilayer inspection (SMLI) firewalls filter packets at the network, transport, and application layers, comparing them against known trusted packets. Like NGFW firewalls, SMLI also examine the entire packet and only allow them to pass if they pass each layer individually. These firewalls examine packets to determine the state of the communication (thus the name) to ensure all initiated communication is only taking place with trusted sources.

Series Firewall

Firepower 1000 Series

For SMB and branch offices. Simplified Cisco Defense Orchestrator management saves you administration time so you can spend more driving your business forward.

Firepower 2100 Series

For large branch, commercial and enterprise needs. Select the management option that suits your environment and how you work.

Firepower 4100 Series

For large campus and data center, create logical firewalls for deployment flexibility, inspect encrypted web traffic, protect against DDoS attacks, cluster devices for performance and high availability, scalable VPNs, block network intrusions, and more.

Firepower 9300

For service providers and high-performance data centers, this carrier-grade modular platform enables the creation of separate logical firewalls and scalable VPNs, inspects encrypted  cisco web traffic, protects against DDoS attacks, clusters devices for performance and high availability, blocks network intrusions, and more.

Virtual firewalls for private cloud

Virtual firewalls protect your data and applications, enhancing microsegmentation by adding advanced threat detection and protection across VMware ESXi, Microsoft Hyper-V, and KVM environments with consistent security policies, deep visibility, and centralized control.

Virtual firewalls for public cloud

Easily extend your data center to public cloud while protecting your data and applications across Amazon Web Services (AWS) and Microsoft Azure environments with automated and consistent security policies, deep visibility, and centralized control.

Cisco Meraki MX Series

Meraki MX appliances bring cloud-managed networking and unified threat management security to help small and medium-sized businesses and branch offices secure their assets, data and users.

Cisco Firewall License

ASA 5500-X with FirePOWER Services

ASA 5500-X appliances combine robust hardware platforms with advanced threat inspection technologies to enable small to mid-sized organizations as well as branch offices stay protected against the latest threats.

Cisco Firewall License

How useful was this post?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 2

No votes so far! Be the first to rate this post.

  • Cisco Hardware License
  • Home Page
  • Ready to take the next step?

    Leave a Reply

    Your email address will not be published. Required fields are marked *