Adapative Security Algorithm (ASA)ASA refers to dynamic and static translation slots (xlate), created with the static and global commands respectively. ASA is a stateful approach to security. Every inbound packet is checked against connection state information in memory. Dynamic translation slots are for desktop machines that do not need a constant address on the Internet. The firewall supports NAT, which provides a globally unique address for each inside host, and PAT, which shares a single globally uniq address for up to 64K simultaneously accessing inside hosts. Status translation moves an internal, unregistered host into the virutal network in the firewall. This is useful for internal machines that need to be addressed from the outside Internet gateways, for example, an SMPT server.
firewall handles UDP data transfers in a manner similar to TCP. The firewall creates UDP connection state information when a UDP packet is sent from the inside network. Response packets resulting from this traffic are accepted if they match the connection state information. How Data Moves Through the FirewallWhen an outbound packet arrives, the firewall checks to see if the packet is valid based on the ASA, and then whether or not previous packets have come from that host. If not, then the packet is for a new connection, and firewall creates a translation slot in its state table for the connection. The following information is stored:
When an inbound packet arrives it must first pass the ASA criteria. If the packets passes the security tests, the firewall removes the destination IP address, and the internal IP address is inserted in its place. The packet is forwarded to the protected interface. |