<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059090#M1068754</link>
    <description>&lt;P&gt;Yes, I do currently have a lic for the 5516-X. Are all features by default active do is this something you manually have to accomplish? We are going very simple here, On one port of the firewall, we have a guest-WiFi then on another port you are looking at the main WiFi along with the LAN network, and another port going to a different switch is the Voice. They're al segmented, with that being said. What is recommended for that type of setup? Generally speaking that is.&lt;/P&gt;</description>
    <pubDate>Sat, 04 Apr 2020 19:28:30 GMT</pubDate>
    <dc:creator>Senbonzakura</dc:creator>
    <dc:date>2020-04-04T19:28:30Z</dc:date>
    <item>
      <title>ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059072#M1068748</link>
      <description>&lt;P&gt;I currently am using a ASA 5510 Firewall and ASA 5516-X, by defaut what security settings aren't enabled that I should have enabled in any network configuration? Also, by Default is IPS/IDS enabled or is this something that needs to be configured? Any advice would be appreciated and any recommendations as well.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 18:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059072#M1068748</guid>
      <dc:creator>Senbonzakura</dc:creator>
      <dc:date>2020-04-04T18:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059077#M1068749</link>
      <description>&lt;DIV class="lia-message-subject lia-component-message-view-widget-subject"&gt;
&lt;DIV class="MessageSubject"&gt;
&lt;DIV class="MessageSubjectIcons "&gt;
&lt;DIV class="lia-message-subject"&gt;cisco 5510 firewall gone EOL very long ago. whereas 5516-x also gone EOL having said that 5516 does support firepower feature. firepower is a next gen firewall (doing an application layer inspection) compare to cisco old gen firewalls.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;few i have a choice between 5510 and 5516 I would stick with 5516 as it has firepower features. you need to get a lic in place in order to use the firepower services it come with 1 year, 3 year and 5 years.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;now coming to your question what security setting you need enable it depends on your setup. you want legacy layer 4 security in that case 5510 and 5516 both can do the same for you. but firepower runs only 0n 55xx-X series models.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sat, 04 Apr 2020 18:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059077#M1068749</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-04T18:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059090#M1068754</link>
      <description>&lt;P&gt;Yes, I do currently have a lic for the 5516-X. Are all features by default active do is this something you manually have to accomplish? We are going very simple here, On one port of the firewall, we have a guest-WiFi then on another port you are looking at the main WiFi along with the LAN network, and another port going to a different switch is the Voice. They're al segmented, with that being said. What is recommended for that type of setup? Generally speaking that is.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 19:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059090#M1068754</guid>
      <dc:creator>Senbonzakura</dc:creator>
      <dc:date>2020-04-04T19:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059095#M1068756</link>
      <description>&lt;P&gt;first think first if you are concern about security element of your network and want to use layer 7 inspection.&amp;nbsp; login into 5516-x and give a command&lt;/P&gt;
&lt;P&gt;"show module sfr" if you have a sfr install on the unit.&lt;/P&gt;
&lt;P&gt;are you asking for a best practice configuration for this setup?&lt;/P&gt;
&lt;P&gt;do you want me to write a basic script?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 19:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059095#M1068756</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-04T19:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059116#M1068762</link>
      <description>&lt;P&gt;I won't forget.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes a basic configuration would be nice for the best security practices, right now I don't have any bad habits when it comes to configuring things so if someone could show me the right way from the beginning it would be appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 20:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059116#M1068762</guid>
      <dc:creator>Senbonzakura</dc:creator>
      <dc:date>2020-04-04T20:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059139#M1068766</link>
      <description>&lt;P&gt;do you have a topology diagram and ip addresses?&lt;/P&gt;
&lt;P&gt;if you can forward it this would be helpful to understand and write a basic config.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 22:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059139#M1068766</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-04-04T22:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059156#M1068769</link>
      <description>&lt;P&gt;ASA# show run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;: Serial Number: JMX0949K0DM&lt;/P&gt;&lt;P&gt;: Hardware:&amp;nbsp; &amp;nbsp;ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(7)32&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;domain-name &lt;A href="http://www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;description WAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;description Inside-Ruckus&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Inside-Ruckus&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.50.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;description ISR&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Inside-ISR&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.200.1 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif management&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.100.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;domain-name &lt;A href="http://www.domain.com" target="_blank"&gt;www.domain.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;object network inside-subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_isr&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.200.0 255.255.255.252&lt;/P&gt;&lt;P&gt;object network obj_vlan80&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.80.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_vlan250&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.250.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu Inside-Ruckus 1500&lt;/P&gt;&lt;P&gt;mtu Inside-ISR 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (Inside-Ruckus,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_isr&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (Inside-ISR,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_vlan80&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (Inside-ISR,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_vlan250&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (Inside-ISR,outside) dynamic interface&lt;/P&gt;&lt;P&gt;route Inside-ISR 192.168.80.0 255.255.255.0 192.168.200.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.100.2 255.255.255.255 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;no service password-recovery&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh stricthostkeycheck&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.50.10-192.168.50.254 Inside-Ruckus&lt;/P&gt;&lt;P&gt;dhcpd dns 75.75.75.75 75.75.76.76 interface Inside-Ruckus&lt;/P&gt;&lt;P&gt;dhcpd enable Inside-Ruckus&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;&amp;nbsp;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:c0d1bad779dbd0baebaa348eabcde24b&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;heres just a basic configuration that ill be doing on the ASA5516-X shortly. Execpt, I won't be using an ISR connected to a switch for VLAN traffic. I'm not sure how to setup encap dotq1 on the firewall so I just did it from an ISR instead, maybe you could help me with that.&lt;/DIV&gt;</description>
      <pubDate>Sun, 05 Apr 2020 00:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall/m-p/4059156#M1068769</guid>
      <dc:creator>Senbonzakura</dc:creator>
      <dc:date>2020-04-05T00:25:57Z</dc:date>
    </item>
  </channel>
</rss>

