The Cisco ASA 5505 Firewall may be the smallest design within the new Cisco Exam Prep of electronics devices. Although this product would work for smaller businesses, branch offices and sometimes even household use, its firewall protection features would be the just like the largest versions (5510, 5520, 5540 etc). The ASA firewalls’ Adaptive Security engineering provides dependable and strong firewall protection, sophisticated application knowledgeable refusal of service attack protection plus much more, safety. Furthermore, the efficiency of the ASA 5505 equipment helps 4000 firewall connections and 150Mbps firewall throughput per minute, that will be ample for small systems.

In this essay I’ll clarify the fundamental setup steps required to setup a Cisco 5505 ASA firewall for linking a little community for the Internet. We believe our ISP has designated us a fixed public ip (e.g 200.200.200.1 for example) which our internal network selection is 192.168.1.0/24. We shall use Port Address Translation (TERRY) to convert our inner IP addresses towards the public-address of the exterior interface. The distinction of the 5505 design in the larger ASA versions is the fact that it’s an 8-port 10/100 switch which works as Layer 2.

That’s, you cannot manage the physical ports as Level 3 locations, instead determine the Layer-2 interfaces in each VLAN and you’ve to produce software Vlans. Automagically, interface Ethernet0/0 is given to VLAN 2 and it is the exterior interface (one which links for the Web), as well as the additional 7 interfaces (Ethernet0/1 to 0/7) are designated by default to VLAN 1 and therefore are employed for linking for the internal network. Let us view the fundamental setup setup of the very significant actions that you might want to manage.

Step1: Configure the interior interface vlan

ASA5505(config-if)# security-degree 100
ASA5505(config-if)# IP 192.168.1.1 255.255.255.0
ASA5505(config-if)# no close

2: Change the outside interface vlan (attached to Internet)

ASA5505(config-if)# security-degree 0
ASA5505(config-if)# IP 200.200.200.1 255.255.255.0
ASA5505(config-if)# no close

ASA5505(config-if)# no close

Step 4: Allow the remainder interfaces without closed

ASA5505(config)# interface Ethernet0/1
ASA5505(config-if)# no close

Do the exact same for Ethernet0.

The aforementioned actions would be the essential steps you have to manage to make the applying functional. Obviously you can find a lot more setup details that you might want to apply to be able to boost the protection and performance of the equipment, authentication etc, for example Access Control Lists, Static NAT, DHCP, DMZ areas.

Comments are closed.

Post Navigation