Network Security Automation Lab: Ansible + AWX for Firewall & Infrastructure Automation

 

LAB TOPOLOGY



This lab consists of four Cisco ASA firewalls deployed within the 192.168.145.0/24 subnet. Each firewall represents a different global region—North America, South America, EMEA, and APAC—allowing me to simulate a distributed enterprise network environment.

  • NA-FW1 – 192.168.145.190

  • SAM-FW1 – 192.168.145.191

  • EMEA-FW1 – 192.168.145.192

  • APAC-FW1 – 192.168.145.193









All Cisco ASA firewalls in this lab are configured with two object-groups—BlackList_Outbound and BlackList_Inbound—which are referenced in the ACLs to block traffic from known malicious IP addresses.

As part of this automation, I created a simple workflow that updates these object-groups by automatically adding newly identified malicious IPs. This ensures that all firewalls consistently enforce the latest security blocks without requiring manual configuration on each device.






I built an Ubuntu-based host to run and manage my AWX setup.



Before applying any configurations using Ansible and AWX, here are the existing contents of the object-groups:



Below is a sample playbook I created in Visual Studio Code. I will push this to my GitHub repository, then pull it into my AWX project, sync it, and create an inventory in AWX.


Verifying from my Github Repository:

Below is the setup of my Project in AWX side.








Below is the output from running the playbook. As shown in the debug messages, the automation successfully added the network-object host 1.1.1.2 entry to each firewall—eliminating the need to configure them one by one. The updated configuration for each firewall is shown below.




Building this lab showed how impactful automation can be when managing firewalls across different “regions” in a simulated enterprise environment. Instead of touching each device manually, Ansible and AWX handled everything for me clean, fast, and error-free. This is only the start of my network security automation journey, and I’m excited to dive deeper into more complex workflows in the next phases of this lab.

I plan to apply this simple automation to our daily tasks in the production environment. This lab allows me to test all the ideas I come up with, helping both me and my teammates save time through automation."































Comments

Popular posts from this blog

Deploying Sysmon on Windows and Integrating with Elasticsearch SIEM

Installing Suricata IDS/IPS and Triggering Rules with an Nmap Stealth Scan and XSS Attack on bWAPP Using Burp Suite

Boss of the SOC v1 (2015) Website Defacement