Ciscoasaconfig if no shutdown ciscoasaconfig if speed

This preview shows page 33 - 40 out of 61 pages.

ciscoasa(config-if)# no shutdown ciscoasa(config-if)# speed auto ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 100 R2IP Address 15.0.0.2 Fa0/0IP Address 15.0.0.1 E0 IP Address 10.0.0.10 Ethernet 1Host A IP Address 10.0.0.1FTP Server Host B IP Address 10.0.0.2WEB Server IP Address 20.0.0.1IP Address 20.0.0.10 Fa0/1IP Address 20.0.0.2
ASA Lab Manual 33Static Routing Dynamic Routing RIP OSPF EIGRP Static Routes Commands on Asaciscoasa(config)#route outside 20.0.0.0 255.0.0.0 15.0.0.2 Rip Commands on Asaciscoasa(config)#router rip ciscoasa(config-router)#network 15.0.0.0 ciscoasa(config-router)#network 10.0.0.0 Ospf Commands on Asaciscoasa(config)#router ospf 64 ciscoasa(config-router)#network 15.0.0.0 255.0.0.0 area 0 ciscoasa(config-router)#network 10.0.0.0 255.0.0.0 area 0 Eigrp Commands on Asaciscoasa(config)#router eigrp 10 ciscoasa(config-router)#network 15.0.0.0 ciscoasa(config-router)#network 10.0.0.0 ciscoasa(config-router)#exit Verifying Commandsciscoasa(config)#sh route ciscoasa(config)#sh rip database ciscoasa(config)#sh ospf interface ciscoasa(config)#sh ospf neighbor ciscoasa(config)# sh eigrp interfaces ciscoasa(config)# sh eigrp neighbors
ASA Lab Manual 34Lab # 11DYNAMIC HOST CONFIGURATION PROTOCOL ASA Firewall has features that let it be Configured as a DHCP SERVER DHCP CLIENT DHCP SERVERConfigurationCreate POOL for Inside Hosts.ciscoasa(config)# dhcpd address 10.0.0.51-10.0.0.61 inside Enable DHCP on the ASA Firewall.ciscoasa(config)#dhcpd enable inside
ASA Lab Manual 35Verify Configuration by using following commands.ciscoasa(config)# show dhcpd binding ciscoasa(config)# show dhcpd state ciscoasa(config)# clear dhcpd bindings ciscoasa(config)# debug dhcpd events ciscoasa(config)# debug dhcpd packet DHCP CLIENTConfigurationStep 1: Enable DHCP Client. ciscoasa(config)#int e0/0ciscoasa(config)# ip address dhcp
ASA Lab Manual 36Step 2: Define new scope for IP addresses range. Step 3: Verify Configuration by using following commands. ciscoasa(config)#debug dhcpd events ciscoasa(config)#debug dhcpd packet
ASA Lab Manual 37Lab # 12Demilitarized Zone ConfigurationStep 1:Assign IPs and Define Security Levels. ciscoasa(config)# interface ethernet 0/0 ciscoasa(config-if)# ip address 20.0.0.10 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# speed auto ciscoasa(config-if)# nameif outside ciscoasa(config)# interface ethernet 0/1 ciscoasa(config-if)# ip address 10.0.0.10 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# speed auto ciscoasa(config-if)# nameif inside
ASA Lab Manual 38ciscoasa(config)# interface ethernet 0/2 ciscoasa(config-if)# ip address 30.0.0.10 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# speed auto ciscoasa(config-if)# nameif dmz Apply PAT for inside Users & Static Nat for server on DMZ Interface. ciscoasa(config)# nat (inside) 1 0 0 ciscoasa(config)# global (outside) 1 interface ciscoasa(config)# static (dmz,outside) 40.0.0.51 30.0.0.1 ciscoasa(config)# static (dmz,outside) 40.0.0.52 30.0.0.2 Establish ACL to allow traffic from lower security level to servers.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture