Date: Oct 21, 2012
Cisco ASA 5505 Firewall Configuration Example
: Saved : ASA Version 8.0(3) ! hostname ASA5505 domain-name domain.local enable password /z4VVuCaYOFObhYQ encrypted no names name 100.100.100.69 mail.domain.com name 192.168.10.10 Server1 ! interface Vlan1 nameif inside security-level 100 ip address 192.168.10.1 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address 100.100.100.67 255.255.255.248 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! passwd /z4VVr#aYOFObhYQ encrypted boot system disk0:/asa803-k8.bin ftp mode passive dns server-group DefaultDNS domain-name domain.local object-group network Support_Network network-object 210.210.210.0 255.255.255.128 object-group network Support_Mail_Network network-object 240.240.240.0 255.255.248.0 object-group service Support_Ports tcp port-object eq smtp port-object eq 3389 access-list outside_access_in extended permit icmp object-group Support_Network any access-list outside_access_in extended permit tcp any host 100.100.100.68 eq 3389 access-list outside_access_in extended permit tcp any host 100.100.100.69 eq 3389 access-list outside_access_in extended permit tcp any host 100.100.100.69 eq www access-list outside_access_in extended permit tcp any host 100.100.100.69 eq https access-list outside_access_in extended permit icmp any any access-list outside_access_in extended permit tcp object-group Support_Mail_Network host 100.100.100.69 eq smtp access-list outside_access_in extended permit tcp object-group Support_Network any object-group Support_Ports access-list outside_access_in extended permit tcp any host 100.100.100.69 eq smtp pager lines 24 logging buffered informational logging asdm informational mtu inside 1500 mtu outside 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-603.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 192.168.10.0 255.255.255.0 static (inside,outside) 100.100.100.68 192.168.10.20 netmask 255.255.255.255 static (inside,outside) 100.100.100.69 192.168.10.9 netmask 255.255.255.255 access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 100.100.100.65 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute dynamic-access-policy-record DfltAccessPolicy aaa-server Server1 protocol nt aaa-server Server1 host 192.168.10.10 nt-auth-domain-controller Server1 aaa authentication ssh console LOCAL aaa authentication enable console LOCAL http server enable http 192.168.10.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart telnet 192.168.10.0 255.255.255.255 inside telnet timeout 5 ssh 192.168.10.0 255.255.255.0 inside ssh 0.0.0.0 0.0.0.0 outside ssh timeout 5 console timeout 0 management-access inside threat-detection basic-threat threat-detection scanning-threat shun threat-detection statistics access-list webvpn enable outside group-policy DfltGrpPolicy attributes vpn-tunnel-protocol IPSec svc webvpn group-policy VPNGroupPolicy internal group-policy VPNGroupPolicy attributes wins-server value 192.168.10.10 dns-server value 192.168.10.10 default-domain value domain.local username admin1 password 7f2915/98KkXAA7e encrypted privilege 15 tunnel-group SSLVPN type remote-access tunnel-group SSLVPN general-attributes authentication-server-group server01 default-group-policy VPNGroupPolicy dhcp-server 192.168.10.10 ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global prompt hostname context Cryptochecksum:4d212957779980659d004fae5e22bd25 : end asdm image disk0:/asdm-603.bin no asdm history enable
If you find this article helpful, please click to like our facebook page below so we can keep on adding quality hands-on articles.
