Setting The Firewall Mode - Cisco ASA 5505 Configuration Manual

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 5
Configuring the Transparent or Routed Firewall
Table 5-1
Feature
Dynamic DNS
DHCP relay
Dynamic routing protocols
Multicast IP routing
QoS
VPN termination for through
traffic

Setting the Firewall Mode

This section describes how to change the firewall mode using the CLI. You cannot change the mode in
ASDM.
We recommend that you set the firewall mode before you perform any other configuration because
Note
changing the firewall mode clears the running configuration.
Prerequisites
When you change modes, the adaptive security appliance clears the running configuration (see the
"Guidelines and Limitations" section on page 5-5
OL-20339-01
Unsupported Features in Transparent Mode
If you already have a populated configuration, be sure to back up your configuration before changing
the mode; you can use this backup for reference when creating your new configuration.
Use the CLI at the console port to change the mode. If you use any other type of session, including
the ASDM Command Line Interface tool or SSH, you will be disconnected when the configuration
is cleared, and you will have to reconnect to the adaptive security appliance using the console port
in any case.
Description
The transparent firewall can act as a DHCP server, but it does not
support the DHCP relay commands. DHCP relay is not required
because you can allow DHCP traffic to pass through using two
extended access lists: one that allows DCHP requests from the inside
interface to the outside, and one that allows the replies from the server
in the other direction.
You can, however, add static routes for traffic originating on the
adaptive security appliance. You can also allow dynamic routing
protocols through the adaptive security appliance using an extended
access list.
You can allow multicast traffic through the adaptive security appliance
by allowing it in an extended access list.
The transparent firewall supports site-to-site VPN tunnels for
management connections only. It does not terminate VPN connections
for traffic through the adaptive security appliance. You can pass VPN
traffic through the security appliance using an extended access list, but
it does not terminate non-management connections. SSL VPN is also
not supported.
for more information).
Cisco ASA 5500 Series Configuration Guide using ASDM
Configuring the Firewall Mode
5-7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents