Example 2: Single Mode Firewall Using Same Security Level - Cisco FirePOWER ASA 5500 series Configuration Manual

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Example 2: Single Mode Firewall Using Same Security Level

Example 2: Single Mode Firewall Using Same Security Level
This configuration creates three internal interfaces. Two of the interfaces connect to departments that are
on the same security level, which allows all hosts to communicate without using access lists. The DMZ
interface hosts a Syslog server. The management host on the outside needs access to the Syslog server
and the security appliance. To connect to the security appliance, the host uses a VPN connection. The
security appliance uses RIP on the inside interfaces to learn routes. The security appliance does not
advertise routes with RIP; the upstream router needs to use static routes for security appliance traffic
(see
The Department networks are allowed to access the Internet, and use PAT.
Figure B-2
Department 1
passwd g00fba11
enable password gen1u$
hostname Buster
asdm image disk0:/asdm.bin
boot system disk0:/image.bin
interface gigabitethernet 0/0
nameif outside
security-level 0
Cisco Security Appliance Command Line Configuration Guide
B-6
Figure
B-2).
Example 2
Internet
outside
209.165.201.3
dept1
10.1.1.1
dept2
10.1.2.1
Department 2
Department 2
Network 2
Management Host
209.165.200.225
209.165.201.1
DMZ
192.168.2.1
Syslog Server
192.168.2.2
10.1.2.2
192.168.1.1
Appendix B
Sample Configurations
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents