01-27-2016 12:04 PM - edited 03-12-2019 12:11 AM
I am about to add 10 sub-nets and 6 virtual servers to my domain. I have an ASA 5505 firewall version 7.2 with a basic license. Do I need to add the VLANS to the firewall or add them in interfaces? I am new to the whole firewall rules thing and would appreciate any help I can get.
Thanks
Solved! Go to Solution.
01-27-2016 01:44 PM
All networks "live" on the inside interface of your ASA. If you want to control how they are allowed to connect to the internet, you need to configure that on the inside ACL and make sure that these networks are also address-translated.
If these networks should be reached from the internet, you need to allow this on the outside ACL and also configure static translation for them.
And you need to add static routes to your ASA for these networks pointing to the L3-switch.
01-27-2016 12:32 PM
ASA 5505 with the Base-license only supports two full-featured Vlans. With that you can't configure these new subnets as firewall-interfaces and do filtering between these VLANs.
You still can configure these subnets on a layer3-switch that gets connected to the ASA. But still no firewalling between these subnets.
If really want to separate these networks, then you need a bigger firewall. For the ASA, that starts with the 5506-X with the SecurityPlus license.
01-27-2016 12:48 PM
01-27-2016 01:16 PM
These subnets can communicate to the Internet, this traffic can be firewalled. But all traffic between the subnets on the switch stays local to the switch without going through the ASA.
01-27-2016 01:40 PM
Just so I know I understand correctly, if the switch is plugged into the network, these sub-nets are firewalled the same as the network? Or do I need to add rules to protect them as well?
01-27-2016 01:44 PM
All networks "live" on the inside interface of your ASA. If you want to control how they are allowed to connect to the internet, you need to configure that on the inside ACL and make sure that these networks are also address-translated.
If these networks should be reached from the internet, you need to allow this on the outside ACL and also configure static translation for them.
And you need to add static routes to your ASA for these networks pointing to the L3-switch.
02-01-2016 01:44 PM
I looked at the switch setup and I do not see where to configure that on the inside ACL. Also can this be done through the ASDM or do I need to use CLI?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide