![]() Note : Do not configure ASA settings at this time. In this part, you will set up the network topology and configure basic settings on the routers, such as interface IP addresses and static routing. Ethernet cables as shown in the topology Instructions Part 1: Configure Basic Device Settings Console cables to configure the Cisco IOS devices #TURN OFF RPF ON ASA ASDM PC# 3 PC s (Windows OS with a terminal emulation application and Java version compatible with installed ASDM version ) 3 Switches (Cisco 2960+ with Cisco IOS Release 15.2(7) lanbasek9 image or comparable) #TURN OFF RPF ON ASA ASDM LICENSE# 1 Router ( Cisco 4221 with Cisco XE Release 16.9.6 universal image or comparable with a Security Technology Package license ) If you are unsure, contact your instructor. Note : Make sure that the devices have been erased and have no startup configurations. 1 5 ( 1 ), Adaptive Security Device Manager ( ASDM) version 7. The ASA used with this lab is a Cisco model 5506-X with an 8-port integrated switch, running OS version 9. Refer to the Router Interface Summary T able at the end of the lab for the correct interface identifiers. Depending on the model and Cisco IOS version, the commands available and the output produced might vary from what is shown in th e labs. Other routers, switches, and Cisco IOS versions can be used. The switches used in the labs are Cisco Catalyst 2960s with Cisco IOS Release 1 5.2(7) (lanbasek9 image). Note : The router s used with hands-on lab s are Cisco 4221 with Cisco IOS XE Release 1 6.9.6 (universalk9 image). The ISP has assigned the public IP address space of 209.165.200.224/29, which will be used for address translation on the ASA. Layer 3 VLAN interfaces provide access to the three areas created in the lab: Inside, Outside, and DMZ. The ASA will be configured for management by an administrator on the internal network and the remote administrator. The ASA is an edge security device that connects the internal corporate network and DMZ to the ISP while providing NAT and DHCP services to inside hosts. R3 connects an administrator from a network management company, who has been hired to remotely manage your network. R2 represents an intermediate Internet router. R1 is a customer-premise equipment (CPE) device managed by the ISP. The scenario for this lab assumes your company has a location connected to an ISP. In Part 5, you will configure a DMZ on the ASA and provide access to a server in the DMZ. ![]() In Part 4, you will configure additional settings via the ASDM configuration menu. In Part 3, you will use the ASDM Startup wizard to configure basic ASA settings and the firewall between the inside and outside networks. In Part 2, you will prepare the ASA for Adaptive Security Device Manager (ASDM) access. In Part 1 of this lab, you will configure the topology and non-ASA devices. ![]() This lab uses the ASA GUI interface ASDM to configure basic device and security settings. Other devices will receive minimal configuration to support the ASA portion of the lab. The focus of this lab is to configure the ASA as a basic firewall. Inside users can access the DMZ and outside resources. It provides outside users with limited access to the DMZ and no access to internal resources. The ASA creates three security interfaces: Outside, Inside, and DMZ. This lab employs an ASA 550 6-X to create a firewall and protect an internal corporate network from external intruders while allowing internal hosts access to the Internet. The Cisco Adaptive Security Appliance (ASA) is an advanced network security device that integrates a stateful firewall, a VPN, and FirePOWER services. ![]() Part 5: Configur e DMZ, Static NAT, and ACLs Background /Scenario Part 4 : Configur e ASA Settings from the ASDM Configuration Menu Part 3: Configur e ASA Settings and Firewall U sing the ASDM Startup Wizard Blank Line, No additional information Objective s ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |