<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA 5506-X Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3760262#M904510</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 09 Dec 2018 16:46:47 GMT</pubDate>
    <dc:creator>er.vansh17091</dc:creator>
    <dc:date>2018-12-09T16:46:47Z</dc:date>
    <item>
      <title>Cisco ASA 5506-X Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3750635#M904505</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL id="list_0" class="lia-list-standard-inline"&gt;
&lt;LI&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I have some queries,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are going to implement/insstall a new Cisco ASA 5506-X Configuration device in our environment:&lt;/P&gt;
&lt;P&gt;Requirement:&lt;/P&gt;
&lt;P&gt;We have 1 vodafone ISP link with public IP (50.50.50.1/30- Lets assume) that would drop on outer interface of the ASA.ASA configuration&lt;BR /&gt;We will use /24 IP pool (assumed~ 10.1.1.0/24).&lt;/P&gt;
&lt;P&gt;Requiremnet is simple:&lt;/P&gt;
&lt;P&gt;**We have to connect 10 system towards lan: What would be the configuration.&lt;/P&gt;
&lt;P&gt;**No DMZ setup in this environment.&lt;/P&gt;
&lt;P&gt;** Any DHCP/DNS configuration is required?&lt;/P&gt;
&lt;P&gt;I have prepared just correct me If I am wrong &amp;amp; also let me know all process:...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;------------------------&lt;/P&gt;
&lt;P&gt;• Internal user LAN: 10.1.1.0/24&lt;BR /&gt;• ASA inside IP: 10.1.1.1&lt;BR /&gt;• ASA outside IP (static): 50.1.1.1&lt;BR /&gt;• NAT: Dynamic overload (PAT) using the outside interface.&lt;BR /&gt;Step 1: Configure the Internal LAN interface&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; description LAN&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100 &amp;lt;- Security level 100 means it’s the most trusted interface&lt;BR /&gt; ip address 10.1.1.1 255.255.255.0&lt;BR /&gt; no shut&lt;BR /&gt;Step 2: Configure the Outside WAN interface&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; description WAN&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0 &amp;lt;- Security level 0 means it’s the least trusted interface&lt;BR /&gt; ip address 50.1.1.1 255.255.255.0 &amp;lt;- Assume we have a static public IP from the ISP&lt;BR /&gt; no shut&lt;BR /&gt;NOTE:&lt;BR /&gt;In case the outside interface will receive IP address dynamically via DHCP use this command:&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;Step 3: Configure PAT using the outside interface&lt;BR /&gt;nat (inside,outside) source dynamic any interface &amp;lt;- For traffic going from inside to outside use dynamic NAT on the interface (source IPs will be replaced by the outside interface IP)&lt;BR /&gt;Step 4: Configure default route towards the ISP (assume default gateway is 50.1.1.2)&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 50.1.1.2&lt;BR /&gt;OPTIONAL STEPS (But Useful)&lt;BR /&gt;Step 5: Assign IP addresses via DHCP to internal hosts&lt;BR /&gt;We can configure the ASA to work as DHCP server and assign IP addresses dynamically to internal hosts.&lt;BR /&gt;dhcpd address 10.1.1.10-10.1.1.100 inside &amp;lt;- ASA will assign IPs between 10.1.1.10-100&lt;BR /&gt;dhcpd dns 208.67.220.220 208.67.222.222 &amp;lt;- ASA will assign DNS servers (these are the opendns by the way)&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;Step 6: Enable SSH access for management&lt;BR /&gt;hostname ASA5506&lt;BR /&gt;crypto key generate rsa modulus 1024&lt;BR /&gt;ssh 10.1.1.5 255.255.255.255 inside &amp;lt;- Allow SSH access only from inside host 10.1.1.5&lt;BR /&gt;aaa authentication ssh console LOCAL &amp;lt;- Enable local authentication for SSH&lt;BR /&gt;username admin password [STRONGPASS] privilege 15&lt;BR /&gt;enable password Gh4w7$-s39fg#(!&lt;BR /&gt;Step 7: Apply useful ACL on outside&lt;BR /&gt;I usually apply the following ACL on the outside interface. It has two purposes: First is to allow ICMP reply packets to come back in (when pinging from inside to outside) and second purpose is to log any denied packets hitting the firewall from outside (for alert and security purposes).&lt;BR /&gt;access-list OUTSIDE-IN extended permit icmp any any echo-reply&lt;BR /&gt;access-list OUTSIDE-IN extended deny ip any any log&lt;BR /&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;---------------------------------------&lt;/P&gt;
&lt;P&gt;Device details:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco ASA 5506 Firewall&lt;BR /&gt;1 ASA5506-FPWR-BUN ASA 5506-X with FirePOWER Svcs. Chassis and Subs. Bundle&lt;BR /&gt;2 ASA5506-K9 ASA 5506-X with FirePOWER services, 8GE, AC, 3DES/AES&lt;BR /&gt;3 CAB-IND-10A 10A Power cable for India&lt;BR /&gt;4 SF-ASA-K-9.8-K8 Cisco ASA 9.8 Software image for ASA 5506/5508/5516 series&lt;BR /&gt;5 SF-ASA-FP6.2-K9 Cisco FirePOWER Software v6.2 for ASA 5500-X&lt;BR /&gt;6 ASA5506-CTRL-LIC Cisco ASA5506 Control License&lt;BR /&gt;7 ASA5506-SSD ASA 5506-X SSD&lt;BR /&gt;8 ASA5500-ENCR-K9 ASA 5500 Strong Encryption License (3DES/AES)&lt;BR /&gt;9 ASA5506-PWR-AC ASA 5506-X Power Adaptor&lt;BR /&gt;10 L-ASA5506-TAMC= Cisco ASA5506 FirePOWER IPS, AMP and URL Licenses&lt;BR /&gt;11 FS-VMW-2-SW-K9 Cisco Firepower Management Center,(VMWare) for 2 devices&lt;BR /&gt;12 L-ASA5506-TAMC-1Y Cisco ASA5506 FirePOWER IPS, AMP and URL 1YR Subs&lt;BR /&gt;13 CON-ECMU-VMWSW2 SWSS UPGRADES Cisco Firepower Management Center,(VMWare) for&lt;BR /&gt;14 CON-SNT-ASA5506K SNTC-8X5XNBD ASA 5506-X with FirePOWER services, 8GE,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3750635#M904505</guid>
      <dc:creator>er.vansh17091</dc:creator>
      <dc:date>2020-02-21T16:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3751044#M904507</link>
      <description>&lt;P&gt;high level steps look ok, since its new no services there you can easy deploy and test any errors start tweaking the config,&lt;/P&gt;
&lt;P&gt;by noting what is working and what is not working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below guide for reference :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/global/en_au/solutions/small-business/pdfs/Cisco-ASA-Easy-Setup-Guide-updated.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/global/en_au/solutions/small-business/pdfs/Cisco-ASA-Easy-Setup-Guide-updated.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.networkstraining.com/cisco-asa-5506-x-configuration-tutorial-guide/" target="_blank"&gt;https://www.networkstraining.com/cisco-asa-5506-x-configuration-tutorial-guide/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2018 21:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3751044#M904507</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-11-21T21:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5506-X Configuration</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3760262#M904510</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Dec 2018 16:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5506-x-configuration/m-p/3760262#M904510</guid>
      <dc:creator>er.vansh17091</dc:creator>
      <dc:date>2018-12-09T16:46:47Z</dc:date>
    </item>
  </channel>
</rss>

