Basic Configuration Tutorial For The Cisco ASA 5505 Firewall
Basic Configuration Tutorial For The Cisco ASA 5505 Firewall
In this article I will explain the basic configuration steps needed to setup a Cisco 5505 ASA
firewall for connecting a small network to the Internet. We assume that our ISP has assigned us a
static public IP address (e.g 200.200.200.1 as an example) and that our internal network range is
192.168.1.0/24. We will use Port Address Translation (PAT) to translate our internal IP
addresses to the public address of the outside interface. The difference of the 5505 model from
the bigger ASA models is that it has an 8-port 10/100 switch which acts as Layer 2 only. That is,
you cannot configure the physical ports as Layer 3 ports, rather you have to create interface
Vlans and assign the Layer 2 interfaces in each VLAN. By default, interface Ethernet0/0 is
assigned to VLAN 2 and it's the outside interface (the one which connects to the Internet), and
the other 7 interfaces (Ethernet0/1 to 0/7) are assigned by default to VLAN 1 and are used for
connecting to the internal network. Let's see the basic configuration setup of the most important
steps that you need to configure.
Step 6: Configure default route towards the ISP (assume default gateway is 200.200.200.2
---------------------------------------------------------------------------------------------------------
ASA5505(config)# route outside 0.0.0.0 0.0.0.0 200.200.200.2 1
The above steps are the absolutely necessary steps you need to configure for making the
appliance operational. Of course there are much more configuration details that you need to
implement in order to enhance the security and functionality of your appliance, such as Access
Control Lists, Static NAT, DHCP, DMZ zones, authentication etc.
Next we will see a simple Internet Access scenario which will help us understand the basic steps
needed to setup an ASA 5510. Assume that we are assigned a static public IP address
100.100.100.1 from our ISP. Also, the internal LAN network belongs to subnet 192.168.10.0/24.
Interface Ethernet0/0 will be connected on the outside (towards the ISP), and Ethernet0/1 will be
connected to the Inside LAN switch.
The firewall will be configured to supply IP addresses dynamically (using DHCP) to the internal
hosts. All outbound communication (from inside to outside) will be translated using Port Address
Translation (PAT) on the outside public interface. Let's see a snippet of the required configuration
steps for this basic scenario:
Step 5: Configure Default Route towards the ISP (assume default gateway is 100.100.100.2)
ASA5510(config)# route outside 0.0.0.0 0.0.0.0 100.100.100.2 1
Step 6: Configure the firewall to assign internal IP and DNS address to hosts using DHCP
ASA5510(config)# dhcpd dns 200.200.200.10
ASA5510(config)# dhcpd address 192.168.10.10-192.168.10.200 inside
ASA5510(config)# dhcpd enable inside
The above basic configuration is just the beginning for making the appliance operational. There
are many more configuration features that you need to implement to increase the security of your
network, such as Static and Dynamic NAT, Access Control Lists to control traffic flow, DMZ
zones, VPN etc.