In Part 3, you will use the ASDM Startup wizard to configure basic ASA settings and the firewall between the inside and outside networks. In Part 2, you will prepare the ASA for Adaptive Security Device Manager (ASDM) access. In Part 1 of this lab, you will configure the topology and non-ASA devices. This lab uses the ASA GUI interface ASDM to configure basic device and security settings. Other devices will receive minimal configuration to support the ASA portion of the lab. The focus of this lab is the configuration of the ASA as a basic firewall. Inside users can access the DMZ and outside resources. It provides outside users with limited access to the DMZ and no access to internal resources. The ASA creates three security interfaces: Outside, Inside, and DMZ. This lab employs an ASA 5505 to create a firewall and protect an internal corporate network from external intruders while allowing internal hosts access to the Internet. The Cisco Adaptive Security Appliance (ASA) is an advanced network security device that integrates a stateful firewall, a VPN, and other capabilities. Test access to the DMZ server from the outside network.View the DMZ Access Rule generated by ASDM.Configure the DMZ server and static NAT.Configure the ASA DMZ VLAN 3 interface.Part 5: Configure DMZ, Static NAT, and ACLs Modify the MPF application inspection policy.Test connectivity using ASDM Ping and Traceroute.Configure AAA user authentication using the local ASA database.Configure a static default route for the ASA.Part 4: Configure ASA Settings from the ASDM Configuration Menu Test access to an external website using the ASDM Packet Tracer utility.Test access to an external website from PC-B.Review the summary and deliver the commands to the ASA.Configure DHCP, address translation, and administrative access.
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Step 5: Use ASDM Monitoring to graph packet activity.Ĭhapter 10 – Configure ASA Basic Settings and Firewall using ASDM (Instructor Version).Step 4: Test access to the DMZ server from the outside network.Step 3: View the DMZ Access Rule generated by ASDM.Step 2: Configure the DMZ server and static NAT.Step 1: Configure the ASA DMZ VLAN 3 interface.Part 5: Configure DMZ, Static NAT, and ACLs.Step 5: Modify the MPF application inspection policy.Step 3: Configure AAA user authentication using the ASA local database.Step 2: Configure a static default route for the ASA.Part 4: Configure ASA Settings from the ASDM Configuration Menu.Step 7: Test access to an external website using the ASDM Packet Tracer utility.Step 6: Test access to an external website from PC-B.Step 5: Review the summary and deliver the commands to the ASA.Step 4: Configure DHCP, address translation, and administrative access.Step 3: Configure the inside and outside VLAN interfaces.Step 2: Configure hostname, domain name, and the enable password.Step 1: Access the Configuration menu and launch the Startup wizard.Part 3: Configure Basic ASA Settings and Firewall Using the ASDM Startup Wizard.Step 5: Access ASDM and explore the GUI.Step 4: Configure ASDM and verify access to the ASA.Step 3: Bypass Setup mode and configure the ASDM VLAN interfaces.Step 2: Clear previous ASA configuration settings.Part 2: Access the ASA Console and ASDM.Step 7: Save the basic running configuration for each router and switch.Step 4: Configure and encrypt passwords on R1.Step 3: Configure static routing on the routers.Step 2: Configure basic settings for routers and switches.Step 1: Cable the network and clear previous device settings.Part 1: Configure Basic Device Settings.Chapter 10 – Configure ASA Basic Settings and Firewall using ASDM (Instructor Version).