Skip to content

Utilities for parsing, analyzing and modifing Cisco ASA ACLs, logs, ASA to HTML converter, ASA to Fortigate converter, policy generator

Notifications You must be signed in to change notification settings

sulisu/Cisco-ASA-ACL-toolkit

 
 

Repository files navigation

Cisco-ASA-ACL-toolkit

Utilities for parsing, analyzing, modifying and generating Cisco ASA ACLs. Useful for troubleshooting, migrating a subset of rules to another firewall, removing overlapping rules, rules aggregation, converting the rule base to HTML, migrating to FortiGate, etc.

Important! This program set is under active development. Hence expect bugs. Please check the repository frequently, and do test before using in the production environment!

Files

  • asa.sh - Shell script to remotely collect Cisco ASA configs
  • asa.exp - Expect script to remotely get and save ASA configuration, access-groups and access lists
  • asa.list - list of Cisco ASA firewall IP's and hostnames (to download te config from or upload to)
  • asaconf.py - converts ACLs from ASA config file to HTML or show access-list result
  • asasort.sh - sort and separate ACLs by name.
  • asasearch.sh - searches rules with matching IPaddresses (first in src, then dst) in all ACLs
  • combine.sh - same as asasearch.sh, but it combines all similarly named ACLs across directories together
  • test.acl - test ACL
  • ipaclmatch.py - utility to search for rules matching IP-addresses, the networks they belong to, subnetworks, and generate a proto-policy.
  • optimacl-simple.py - optimizes a proto-policy (by aggregating, removing overlapping rules, etc). Works with either the source or destination IP-addresses.
  • optimacl.py - optimizes a proto-policy (by aggregating, removing overlapping rules, etc). Supports full policy (src dst srv)
  • genacl.py - utility to generate ASA ACL's, FortiGate or CheckPoint policy from a proto-policy
  • trafstat.sh - analyses Cisco ASA logs and generates allowed traffic statstics (per ACL)
  • genhtml.sh - generates an HTML file from the results of trafstat.sh

Requirements

  • Expect (for the data collector)
  • Python 2.7
  • Netaddr

Install netaddr:

pip install netaddr

Limitations

The following is not supported:

  • IPv6
  • NAT
  • source ports
  • multiple contexts
  • Mixed Permit and Deny rules in optimacl.py

TODO

  • Rewrite ipaclmatch.py. It was written to quickly solve particular tasks. Adding new features created a mess.
  • I have one more optimization method in mind, but to implement it optimacl.py should be rewritten.
  • Add recursive group generation for all devices in genacl.py

Data collecting

  • Edit asa.list and place a list of the firewall IP-addresses and firewall hostnames (as in the ASA config). No empty lines.
  • Enter username/passwords in asa.sh, or uncomment lines that take the info from the keyboard
  • Run asa.sh. It will:
    • create directories with the firewall names
    • log onto the firewalls
    • run the following commands:
      • terminal pager 0
      • sh run | inc access-group
      • sh run
      • sh access-list
    • save the result in the fwname.group, fwname.conf and fwname.out file in the fwname directories
  • Run asasort.sh. It will create ACLname.acl files with corresponding policies in the fwname directories

Examples

Show the amount of matching ACLs for the IPs found in the source and destination. See asasearch.sh for used parameters. The script processes 4.5mln entries in ~7min (two passes: one for source, one for destination).

./asasearch.sh 10.1.0.0/16             
fw1/FW_ACL_1.acl 0 0
fw1/FW_ACL_2.acl 0 0
fw2/FW_ACL_1.acl 0 0
fw2/FW_ACL_management.acl 0 0
fw2/FW_ACL_2.acl 4 74
fw2/FW_ACL_3.acl 0 114
fw2/FW_ACL_4.acl 0 1
fw2/FW_ACL_5.acl 4737 16
fw2/FW_ACL_6.acl 0 73
fw2/FW_ACL_7.acl 15 84
fw3/FW_ACL_1.acl 6 16
fw3/FW_ACL_2.acl 0 0

Optimize all permitted rules:

$wc -l test.acl
     126 test.acl

$ ipaclmatch.py -p  --permit test.acl | optimacl.py
10.0.0.0/8 10.8.9.4/31 tcp:22-23
0.0.0.0/0 10.3.10.0/24 udp:30000-65535
13.20.0.0/16 10.7.0.0/16 icmp
10.192.0.0/13 10.7.8.0/24 tcp:1200-1351
0.0.0.0/0 0.0.0.0/0 tcp:66
13.20.0.0/16 10.3.8.4/31 udp:53
10.192.0.0/13,10.205.0.0/16,10.206.0.0/16,10.228.0.0/14,10.232.0.0/13,10.240.0.0/12,13.20.0.0/16 10.3.0.2/32,10.3.0.1/32 udp:53
10.0.0.0/8 10.3.9.0/30 tcp:23
101.10.10.0/24 10.9.9.1/32,10.9.9.2/31,10.9.9.4/32 esp
13.20.0.0/16,172.16.0.0/12 10.3.8.4/31 tcp:53,tcp:123
10.160.0.0/13,10.192.0.0/13,10.205.0.0/16,10.206.0.0/16,10.208.0.0/12,10.225.0.0/16,10.226.0.0/16,10.228.0.0/14,10.232.0.0/13,10.240.0.0/12,13.20.0.0/16,172.16.0.0/12 10.3.0.2/32,10.3.0.1/32 tcp:53,tcp:123
101.10.10.0/24 10.3.8.0/24 icmp:3,icmp:8,icmp:11
10.0.0.0/8 10.3.8.4/31,10.3.9.4/31,10.4.0.0/15 *

ipaclmatch.py -p  --permit test.acl | optimacl.py | wc -l               
      13

For all permitted source addresses in test.acl create an optimized Cisco ASA policy

$ wc -l test.acl
     118 test.acl

$ ipaclmatch.py -t -s --permit test.acl |  optimacl-simple.py | genacl.py -s myObject --acl new_acl

access-list new_acl extended permit udp object-group myObject 10.3.10.0 255.255.255.0 gt 30000
access-list new_acl extended permit tcp object-group myObject 10.7.8.0 255.255.255.0 range 1200 1351
access-list new_acl extended permit udp object-group myObject host 10.3.0.1 eq 53
access-list new_acl extended permit udp object-group myObject host 10.3.0.2 eq 53
access-list new_acl extended permit tcp object-group myObject host 10.3.0.1 eq 53
access-list new_acl extended permit tcp object-group myObject host 10.3.0.2 eq 53
access-list new_acl extended permit tcp object-group myObject host 10.3.0.1 eq 123
access-list new_acl extended permit tcp object-group myObject host 10.3.0.2 eq 123
access-list new_acl extended permit tcp object-group myObject 10.8.9.4 255.255.255.254 range 22 23
access-list new_acl extended permit tcp object-group myObject 10.3.9.0 255.255.255.252 eq 23
access-list new_acl extended permit ip object-group myObject 10.3.8.4 255.255.255.254 
access-list new_acl extended permit ip object-group myObject 10.3.9.4 255.255.255.254 
access-list new_acl extended permit ip object-group myObject 10.4.0.0 255.254.0.0 

$ ipaclmatch.py -t -s --permit test.acl |  optimacl.py | genacl.py -s myObject --acl new_acl | wc -l
      13

$ ipaclmatch.py -t -s --permit test.acl |  optimacl-simple.py --group      

10.3.10.0/255.255.255.0 udp:30000-65535
10.7.8.0/255.255.255.0 tcp:1200-1351
10.8.9.4/255.255.255.254 tcp:22-23
10.3.0.1/255.255.255.255,10.3.0.2/255.255.255.255 udp:53,tcp:53,tcp:123
10.3.9.0/255.255.255.252 tcp:23
10.3.8.4/255.255.255.254,10.3.9.4/255.255.255.254,10.4.0.0/255.254.0.0 *

$ ipaclmatch.py -t -s --permit test.acl |  optimacl.py --group | wc -l
       6

118 -> 13 = 85% rule reduction (in this particular example)

Search test.acl for the destination networks that contain 10.3.8.4, and generate new_acl with 10.3.8.4 as the destination:

$ ipaclmatch.py -t -d -a 10.3.8.4 --permit test.acl |  optimacl-simple.py | genacl.py -d 10.3.8.4  --acl new_acl
access-list new_acl extended permit tcp 13.20.0.0 255.255.0.0 host 10.3.8.4 eq 53
access-list new_acl extended permit tcp 172.16.0.0 255.240.0.0 host 10.3.8.4 eq 53
access-list new_acl extended permit tcp 13.20.0.0 255.255.0.0 host 10.3.8.4 eq 123
access-list new_acl extended permit tcp 172.16.0.0 255.240.0.0 host 10.3.8.4 eq 123
access-list new_acl extended permit udp 13.20.0.0 255.255.0.0 host 10.3.8.4 eq 53
access-list new_acl extended permit ip 10.0.0.0 255.0.0.0 host 10.3.8.4 

Generate a FortiGate policy from all Cisco ASA ACL's that permit traffic from 10.0.0.1:

$ ipaclmatch.py -p -s -a 10.0.0.1 --permit test.acl | optimacl.py | genacl.py --dev fgt

Convert Cisco access-control lists from the saved ASA configuration file into HTML:

$ asaconf.py --html myfw.conf > myfw.html

About

Utilities for parsing, analyzing and modifing Cisco ASA ACLs, logs, ASA to HTML converter, ASA to Fortigate converter, policy generator

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 93.5%
  • Shell 6.5%