Phase-By-Phase Configuration Manual For The Cisco Asa 5505 Firewall

The Cisco ASA 5505 Firewall is the smallest model in the new 5500 Cisco sequence of components appliances. Whilst this model is suitable for smaller companies, department offices or even dwelling use, its firewall stability capabilities are the same as the major designs (5510, 5520, 5540 and so on). The Adaptive Protection technology of the ASA firewalls gives reliable and reputable firewall safety, state-of-the-art application aware stability, denial of company attack safety and substantially much more. Furthermore, the performance of the ASA 5505 appliance supports 150Mbps firewall throughput and 4000 firewall connections per 2nd, which is much more than plenty of for smaller networks.

In this post I will explain the fundamental configuration measures essential to set up a Cisco 5505 ASA firewall for connecting a smaller network to the Internet. We presume that our ISP has assigned us a static general public IP handle (e.g 200.200.200.one as an example) and that our internal network range is 192.168.one./24. We will use Port Address Translation (PAT) to translate our internal IP addresses to the general public handle of the exterior interface. The difference of the 5505 model from the bigger ASA designs is that it has an eight-port ten/a hundred change which acts as Layer 2 only. That is, you can not configure the bodily ports as Layer three ports, alternatively you have to build interface Vlans and assign the Layer 2 interfaces in each and every VLAN. By default, interface Ethernet0/ is assigned to VLAN 2 and it truly is the exterior interface (the one particular which connects to the Internet), and the other 7 interfaces (Ethernet0/one to /7) are assigned by default to VLAN one and are used for connecting to the internal network. Let us see the fundamental configuration set up of the most vital measures that you have to have to configure.

Step1: Configure the internal interface vlan
——————————————————
ASA5505(config)# interface Vlan one
ASA5505(config-if)# nameif inside of
ASA5505(config-if)# stability-amount a hundred
ASA5505(config-if)# ip handle 192.168.one.one 255.255.255.
ASA5505(config-if)# no shut

Phase 2: Configure the external interface vlan (connected to Internet)
————————————————————————————-
ASA5505(config)# interface Vlan 2
ASA5505(config-if)# nameif exterior
ASA5505(config-if)# stability-amount
ASA5505(config-if)# ip handle 200.200.200.one 255.255.255.
ASA5505(config-if)# no shut

Phase three: Assign Ethernet / to Vlan 2
————————————————-
ASA5505(config)# interface Ethernet0/
ASA5505(config-if)# switchport access vlan 2
ASA5505(config-if)# no shut

Phase 4: Empower the rest interfaces with no shut
————————————————–
ASA5505(config)# interface Ethernet0/one
ASA5505(config-if)# no shut
Do the same for Ethernet0/one to /7.

Phase 5: Configure PAT on the exterior interface
—————————————————–
ASA5505(config)# international (exterior) one interface
ASA5505(config)# nat (inside of) one … …

Phase 6: Configure default route toward the ISP (presume default gateway is 200.200.200.2)
—————————————————————————————
ASA5505(config)# route exterior … … 200.200.200.2 one

The over measures are the certainly essential measures you have to have to configure for earning the appliance operational. Of class there are substantially much more configuration aspects that you have to have to implement in purchase to boost the stability and performance of your appliance, such as Obtain Handle Lists, Static NAT, DHCP, DMZ zones, authentication and so on.
Down load the most effective configuration tutorial for any Cisco ASA 5500 Firewall model Here.