Skip to main content

Configuring ASA Interfaces


Cisco ASA 5505














Usually by default internal LAN interface is named "inside", and wan internet interface is named "outside". For every interface You can configure security level. Default security level for inside interface is 100, and for outside interface security level is 0. By default, CISCO do not allow traffic flow from interface with lower to higher security level - which means that by default traffic from inside to outside is allowed, but traffic from "outside" to "inside" is denied. (To enable traffic flow from "outside" to "inside", You have to explicitly allow it with access-list.)

Let's Configure internal interface which we'll name "inside". We can setup ip address and security-level.
Interface is activated with no shutdown command: 



ciscoasa>enable ciscoasa#conf t ciscoasa(config)# ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# ip address 192.168.15.1 255.255.255.0 ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# no shutdown


We can name external interface as "outside": 



ciscoasa#conf t ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# ip address 211.168.153.12 255.255.255.240 ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# no shutdown
(Notice the port of external interface is "GigabitEthernet0/0 ") 


Put interface in a specific VLAN, example VLAN 2: 



ciscoasa#conf t ciscoasa(config)# interface ethernet0/2 ciscoasa(config-if)# switchport access vlan 2 ciscoasa(config-if)#speed 100 ciscoasa(config-if)#duplex full

(note there's no communication between interfaces in different vlan's unless traffic is routed over L3 device, 
or trunking is configured on some interface so it can accept traffic tagged with different VLAN ID) 

To enable access to You firewall, You have to enable authentication, set up some username and password and enable some access method. Also some basic parameters needs to be set up. 

Comments

Popular posts from this blog

Cisco three-layer hierarchical model

Because networks can be extremely complicated, with multiple protocols and diverse technologies, Cisco has developed a layered hierarchical model for designing a reliable network infrastructure. This three-layer model helps you design, implement, and maintain a scalable

Debugging on Cisco ASA

Most of debuging on Cisco ASA can be done with simply entering  "debug"  in front of command for which we want to do debugging. For example if wanted to see/capture icmp traffic from user enter: 

Run Windows 98 And Linux In Your Web Browser, Thanks To JavaScript And NodeJS

A coder, known as Fabian on GitHub, has created x86 architecture based emulations that allow you to run Windows 98, Linux, KolibriOS etc. inside your browser. Read more about the same and find the links below to try it out.