Overblog Follow this blog
Edit post Administration Create my blog
Cisco & Cisco Network Hardware News and Technology

How to Configure Cisco ASA 5505?

April 8 2011 , Written by ciscorouterswitch Published on #Cisco Routers

The Cisco ASA 5505 Firewall is the smallest model in the new 5500 Cisco series of hardware appliances. Although this model is suitable for small businesses, branch offices or even home use, its firewall security capabilities are the same as the biggest models like 5510, 5520, 5540, etc.

 

The Adaptive Security technology of the ASA firewalls offers solid and reliable firewall protection, advanced application aware security, denial of service attack protection and much more. Moreover, the performance of the ASA 5505 appliance supports 150Mbps firewall throughput and 4000 firewall connections per second, which is more than enough for small networks.

 

The difference of the 5505 model from the bigger ASA models is that it has an 8-port 10/100 switch which acts as Layer 2 only. That is, you cannot configure the physical ports as Layer 3 ports, rather you have to create interface VlANs and assign the Layer 2 interfaces in each VLAN.

 

By default, interface Ethernet0/0 is assigned to VLAN 2 and its the outside interface (the one which connects to the Internet), and the other 7 interfaces (Ethernet0/1 to 0/7) are assigned by default to VLAN 1 and are used for connecting to the internal network.

 

Basic Steps to Configure Cisco ASA 5505:

Step1: Configure the internal interface vlan

ASA5505 (config)# interface Vlan 1

ASA5505 (config-if)# nameif inside

ASA5505 (config-if)# security-level 100

ASA5505 (config-if)# ip address 192.168.1.1 255.255.255.0

ASA5505 (config-if)# no shut

 

Step 2: Configure the external interface vlan (connected to Internet)

ASA5505 (config)# interface Vlan 2

ASA5505 (config-if)# nameif outside

ASA5505 (config-if)# security-level 0

ASA5505 (config-if)# ip address 200.200.200.1 255.255.255.0

ASA5505 (config-if)# no shut

 

Step 3: Assign Ethernet 0/0 to Vlan 2

ASA5505 (config)# interface Ethernet0/0

ASA5505 (config-if)# switchport access vlan 2

ASA5505 (config-if)# no shut

 

Step 4: Enable the rest interfaces with no shut

ASA5505 (config)# interface Ethernet0/1

ASA5505 (config-if)# no shut

Do the same for Ethernet0/1 to 0/7.

 

Step 5: Configure PAT on the outside interface

ASA5505 (config)# global (outside) 1 interface

ASA5505 (config)# nat (inside) 1 0.0.0.0 0.0.0.0

 

PS: PDATE for ASA Version 8.3

From March 2010, Cisco announced the new Cisco ASA software version 8.3. This version introduced several important configuration changes, especially on the NAT/PAT mechanism. The “global” command is no longer supported. NAT (static and dynamic) and PAT are configured under network objects. The PAT configuration below is for ASA 8.3 and later:

object network obj_any

subnet 0.0.0.0 0.0.0.0

nat (inside, outside) dynamic interface

 

Step 6: Configure default route towards the ISP (assume default gateway is 200.200.200.2)

ASA5505 (config)# route outside 0.0.0.0 0.0.0.0 200.200.200.2 1

The above steps are the absolutely necessary steps you need to configure for making the appliance operational. Of course there are much more configuration details that you need to implement in order to enhance the security and functionality of your appliance, such as Access Control Lists, Static NAT, DHCP, DMZ zones, authentication etc.

                                                                                             ---From Tech 21 Century

 

Cisco Notes:

Cisco ASA 5500 Series: Stop security attacks before they affect business continuity. Cisco ASA 5500 Series Adaptive Security Appliances provide intelligent threat defense and highly secure communications services. These solutions help organizations lower their deployment and operational costs while delivering comprehensive network security for networks of all sizes

Router-switch.com, your reliable source for new & used Cisco ASA 5500 Series… More info.. click RouterSwitch.com to see…

Share this post

Repost 0

Comment on this post