<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 base config for guest wireless network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468093#M268584</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the ASA will be doing the routing.&amp;nbsp; Then you will need to create subinterfaces on the ASA to accomodate the VLANs...there are other options but that could end up becoming very complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Mar 2014 22:04:10 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-03-05T22:04:10Z</dc:date>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468080#M268549</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am partitioning off my guest wireless traffic out a new connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a WISM and a 5508 controller. The WISM will anchor the subnets to the specific controller. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AP - WISM - 5508 - FW - Cable link - Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone assist in implementing a base config so only traffic originating inside can get out, nothing from outside getting in. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The external link will be via cable and I want to configure their static on my outside int, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where would be the best place to ratelimit the subnet(s)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468080#M268549</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2019-03-12T03:54:05Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468081#M268553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Followup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to PAT all internal addresses to the static given by ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468081#M268553</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T20:06:51Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468082#M268558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ANother detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DHCP pool will be configured on the 5508&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 20:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468082#M268558</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T20:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468083#M268563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a very basic setup that you can do, just change interface number, name and IP, and NAT as needed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;int gig0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; description INSIDE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nameif inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; ip add 172.16.1.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; no shut&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;int gig0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; description OUTSIDE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; ip add 191.1.1.1 255.255.255.252&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no shut&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; subnet 172.16.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 191.1.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic is permitted from a higher security level to a lower security level by default.&amp;nbsp; A lower security level to higher security level is not permitted.&amp;nbsp; Once you apply an ACL to the interface the security levels have no meaning any more...until the ACL is removed that is.&amp;nbsp; So for a basic setup allowing only traffic from inside to outside you do not need any ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that the nat statement should be configured while you are under the LAN network object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468083#M268563</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T21:02:09Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468084#M268564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having trouble getting the NAT statement to work &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Keep in mind that the nat statement should be configured while you are under the LAN network object"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no NAT option&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468084#M268564</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T21:13:12Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468085#M268569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ah you are running 8.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then it would be like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468085#M268569</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T21:15:43Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468086#M268573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"very cool", thank you! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any other considerations that would "tighten this config up"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468086#M268573</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T21:19:05Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468087#M268576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Really depends what you are trying to do, but this setup is basic but it is secure when considering connections from the internet.&amp;nbsp; No one can initiate a connection from the internet to your internal network.&amp;nbsp; Only your internal network can initiate traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course if you want to make your internal network a little more secure you can add an ACL to the inside interface only permitting your specific subnet to initiate traffic to the internet or anywhere else for that matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, there is the case of managing the ASA, this should only be allowed from a specific subnet or IP on your inside interface.&amp;nbsp; If you want to manage the ASA from the internet you would need to connect to a VPN and then manage the ASA from that connection.&amp;nbsp; HTTPS and SSH connections to a interface with a security level of 0 is not permitted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To do this you would need to add config similar to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN extended permit ip 172.16.1.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group LAN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto key generate rsa modulus 2048&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 172.16.1.10 255.255.255.255 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;asdm image &lt;IMAGE-NAME.BIN&gt;&lt;/IMAGE-NAME.BIN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http server enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http 172.16.1.10 255.255.255.255 inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication ssh console LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication http console LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468087#M268576</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T21:27:45Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468088#M268578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maruis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So &lt;/P&gt;&lt;P&gt;ip access-list 10 permit ip 172.16.16.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;ip access-list 10 permit ip 172.16.16.0 255.255.255.0 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then apply this to the inside interface in/out, would only allow that subnet to originate traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, to make sure this subnet has no access to inside services, what would be needed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468088#M268578</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T21:34:16Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468089#M268580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ip access-list 10 permit ip 172.16.16.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;ip access-list 10 permit ip 172.16.16.0 255.255.255.0 eq 443&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt; These are router configurations and would not work on the ASA.&amp;nbsp; To do this the ACL config would need to look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN extended permit ip 172.16.16.0 255.255.255.0 any eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN extended permit ip 172.16.16.0 255.255.255.0 any eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group LAN in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that you can change the ACL name (LAN) to anything you want it to be.&amp;nbsp; You could apply the ACL in the outbound direction but this is very unusual to do on the ASA and I do not suggest doing it unless you have a specific reason for doing so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Also, to make sure this subnet has no access to inside services, what would be needed?&lt;/PRE&gt;&lt;P&gt;Not exactly sure where you are going with this.&amp;nbsp; Is this subnet also located on the inside interface? or on a different interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is located on a different interface, then all you have to do is either give it a lower security level than that of the inside interface (lets say 90 for example), or add an ACL that denies traffic to the inside network subnet and then under that rule have an entery permitting traffic to any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that the ACLs are checked top to bottom and there is an implicit deny any rule at the bottom of all ACLs.&amp;nbsp; If this ASA is version 8.3 or higher the implicit deny can be seen in the global ACL in the ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468089#M268580</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T21:43:19Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468090#M268581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for you guidance. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Is this subnet also located on the inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yes the inside int is in the same subnet as the nat pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"or add an ACL that denies traffic to the inside network subnet"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; There are many subnets inside, that acl could be extensive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468090#M268581</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T21:48:54Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468091#M268582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, how do you plan or connecting these subnets to the ASA? will there be a router behind the ASA that routes these subnets to the ASA or will there be VLANs that connect to the ASA? Will the ASA be routing between these subnets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on how your subnets are allocated you might be able to summarize some of the subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468091#M268582</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T21:53:15Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468092#M268583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology will lok like: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AP &amp;gt; WISM &amp;gt; 5508 (Subnet/DHCP server created here) &amp;gt; ASA &amp;gt; ISP link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 21:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468092#M268583</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T21:59:09Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468093#M268584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the ASA will be doing the routing.&amp;nbsp; Then you will need to create subinterfaces on the ASA to accomodate the VLANs...there are other options but that could end up becoming very complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 22:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468093#M268584</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T22:04:10Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468094#M268585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Subnet has the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.10.20 - 172.16.14.254 _ the first 20 aqre for statics&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.10.0 255.255.248.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would I still need to create a sub-int?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 22:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468094#M268585</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T22:18:53Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468095#M268586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you subneted the network or are they all located on the /21 network?&amp;nbsp; If they are all in the same network (all have the same subnet mask) then no you do not have to create sub-interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But then you will also run into the issue that traffic will not go through the ASA when going between the hosts as they will all be seen as being part of the same network and the switches will just forward traffic accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 22:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468095#M268586</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-05T22:24:01Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468096#M268587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They will al be part of the /21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as none of them have access to any inside services, I am ok with them going between hosts. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 22:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468096#M268587</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T22:27:11Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468097#M268588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What aaa commands should I include?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sMc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Mar 2014 22:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468097#M268588</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-05T22:29:39Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468098#M268589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If they will all be part of the /21 network then the ASA will never see traffic that goes between the hosts. That means that any resrtictions for access would need to be configured on the hosts themselves.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for AAA, you would only configure this for managemt of the ASA. So if you will be using the local user database on the ASA for management then the AAA commands I provided in an earlier post would be enough for access to the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2014 07:40:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468098#M268589</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-03-06T07:40:01Z</dc:date>
    </item>
    <item>
      <title>ASA5510 base config for guest wireless network</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468099#M268590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to implement the acl as specified however, there is no option to add "eq" etc.. for specific port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list GUEST line 1 extended permit ip object-group GUEST_Wireless any ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; inactive&amp;nbsp;&amp;nbsp;&amp;nbsp; Keyword for disabling an ACL element&lt;/P&gt;&lt;P&gt;&amp;nbsp; log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Keyword for enabling log option on this ACL element&lt;/P&gt;&lt;P&gt;&amp;nbsp; time-range&amp;nbsp; Keyword for attaching time-range option to this ACL element&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At your earliest convenience, please advise on what I am doing wrong. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2014 16:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-base-config-for-guest-wireless-network/m-p/2468099#M268590</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2014-03-06T16:10:33Z</dc:date>
    </item>
  </channel>
</rss>

