All Chapter 10 Lab B Configuring ASA Bas
All Chapter 10 Lab B Configuring ASA Bas
Note: ISR G2 devices have Gigabit Ethernet interfaces instead of Fast Ethernet interfaces.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 42
CCNA Security
IP Addressing Table
Default
Device Interface IP Address Subnet Mask Gateway Switch Port
R1 FA0/0 209.165.200.225 255.255.255.248 N/A ASA E0/0
S0/0/0 10.1.1.1 255.255.255.252 N/A N/A
(DCE)
R2 S0/0/0 10.1.1.2 255.255.255.252 N/A N/A
S0/0/1 10.2.2.2 255.255.255.252 N/A N/A
(DCE)
R3 FA0/1 172.16.3.1 255.255.255.0 N/A S3 FA0/5
S0/0/1 10.2.2.1 255.255.255.252 N/A N/A
ASA VLAN 1 192.168.1.1 255.255.255.0 NA S2 FA0/24
(E0/1)
ASA VLAN 2 209.165.200.226 255.255.255.248 NA R1 FA0/0
(E0/0)
ASA VLAN 3 192.168.2.1 255.255.255.0 NA S1 FA0/24
(E0/2)
PC-A NIC 192.168.2.3 255.255.255.0 192.168.2.1 S1 FA0/6
PC-B NIC 192.168.1.3 255.255.255.0 192.168.1.1 S2 FA0/18
PC-C NIC 172.16.3.3 255.255.255.0 172.16.3.1 S3 FA0/18
Objectives
Part 1: Lab Setup
Cable the network as shown in the topology.
Configure hostnames and interface IP addresses for routers, switches, and PCs.
Configure static routing, including default routes, between R1, R2, and R3.
Configure HTTP and Telnet access for R1.
Verify connectivity between hosts, switches, and routers.
Part 2: Accessing the ASA Console and ASDM
Access the ASA console and view hardware, software, and configuration settings.
Clear previous configuration settings.
Use CLI to configure settings for ASDM access.
Test Ethernet connectivity to the ASA.
Access the ASDM GUI and explore major windows and options.
Part 3: Configuring ASA Settings and Firewall Using the ASDM Startup Wizard
Configure the hostname, domain name, and enable password.
Configure the inside and outside VLAN interfaces.
Configure DHCP for the inside network.
Configure port address translation (PAT) for the inside network.
Configure Telnet and SSH administrative access.
Part 4: Configuring ASA Settings from the ASDM Configuration Menu
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 42
CCNA Security
Background / Scenario
The Cisco Adaptive Security Appliance (ASA) is an advanced network security device that integrates a
statefull firewall as well as VPN and other capabilities. This lab employs an ASA 5505 to create a firewall and
protect an internal corporate network from external intruders while allowing internal hosts access to the
Internet. The ASA creates three security interfaces: Outside, Inside and DMZ. It provides outside users limited
access to the DMZ and no access to internal resources. Inside users can access the DMZ and outside
resources.
The focus of this lab is on the configuration of the ASA as a basic firewall. Other devices will receive minimal
configuration to support the ASA portion of the lab. This lab uses the ASA GUI interface ASDM, which is
similar to the SDM and CCP used with Cisco ISRs, to configure basic device and security settings.
In Part 1 of the lab you will configure the topology and non-ASA devices. In Part 2 you will prepare the ASA
for ADSM access. In Part 3 you will use the ASDM Startup wizard to configure basic ASA settings and the
firewall between the inside and outside networks. In Part 4 you will configure additional settings via the ASDM
configuration menu. In Part 5 you will configure a DMZ on the ASA and provide access to a server in the
DMZ.
Your company has one location connected to an ISP. Router R1 represents a CPE device managed by the
ISP. Router R2 represents an intermediate Internet router. Router R3 connects an administrator from a
network management company, who has been hired to manage your network remotely. The ASA is an edge
CPE security device that connects the internal corporate network and DMZ to the ISP while providing NAT
and DHCP services to inside hosts. The ASA will be configured for management by an administrator on the
internal network as well as the remote administrator. Layer 3 VLAN interfaces provide access to the three
areas created in the lab: Inside, Outside, and DMZ. The ISP has assigned the public IP address space of
209.165.200.224/29, which will be used for address translation on the ASA.
Note: The routers used with this lab are Cisco 1841 with Cisco IOS Release 12.4(20)T (Advanced IP image).
The switches are Cisco WS-C2960-24TT-L with Cisco IOS Release 12.2(46)SE (C2960-LANBASEK9-M
image). Other routers, switches, and Cisco IOS versions can be used. However, results and output may vary.
The ASA use with this lab is a Cisco model 5505 with an 8-port integrated switch, running OS version 8.4(2)
and ASDM version 6.4(5) and comes with a Base license that allows a maximum of three VLANs.
Note: Make sure that the routers and switches have been erased and have no startup configurations.
Required Resources
3 routers (Cisco 1841 with Cisco IOS Release 12.4(20)T1 or comparable)
3 switches (Cisco 2960 or comparable)
1 ASA 5505 (OS version 8.4(2) and ASDM version 6.4(5) and Base license or comparable)
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 42
CCNA Security
PC-A: Windows XP, Vista, or Windows 7 with CCP, PuTTy SSH client (Web and FTP server optional)
PC-B: Windows XP, Vista, or Windows 7 with PuTTy SSH client and Java version 6.x or higher
(ASDM loaded on the PC is optional)
PC-C: Windows XP, Vista, or Windows 7 with CCP, PuTTy SSH client
Serial and Ethernet cables as shown in the topology
Rollover cables to configure the routers and ASA via the console
d. Configure the host name for the switches. With the exception of the host name, the switches can be
left in their default configuration state. Configuring the VLAN management IP address for the switches
is optional.
b. Configure a static route from R2 to the R1 Fa0/0 subnet (connected to ASA interface E0/0) and a
static route from R2 to the R3 LAN.
R2(config)# ip route 209.165.200.224 255.255.255.248 Serial0/0/0
R2(config)# ip route 172.16.3.0 255.255.255.0 Serial0/0/1
Step 4: Enable the HTTP server on R1 and set the enable and vty passwords.
a. Enable HTTP access to R1 using the ip http server command in global config mode. Configure
an enable password of class. Also set the VTY and console passwords to cisco. This will provide
web and Telnet targets for testing later in the lab.
R1(config)# ip http server
R1(config)# enable password class
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 42
CCNA Security
Step 7: Save the basic running configuration for each router and switch.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 42
CCNA Security
<output omitted>
File Systems:
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 42
CCNA Security
b. Display the contents of flash memory using one of these commands: show flash, show disk0,
dir flash: or dir disk0:
ciscoasa# show flash:
--#-- --length-- -----date/time------ path
168 25159680 Aug 29 2011 13:00:52 asa842-k8.bin
122 0 Aug 29 2011 13:09:32 nat_ident_migrate
13 2048 Aug 29 2011 13:02:14 coredumpinfo
14 59 Aug 29 2011 13:02:14 coredumpinfo/coredump.cfg
169 16280544 Aug 29 2011 13:02:58 asdm-645.bin
3 2048 Aug 29 2011 13:04:42 log
6 2048 Aug 29 2011 13:05:00 crypto_archive
171 34816 Jan 01 1980 00:00:00 FSCK0000.REC
173 36864 Jan 01 1980 00:00:00 FSCK0001.REC
174 12998641 Aug 29 2011 13:09:22 csd_3.5.2008-k9.pkg
175 2048 Aug 29 2011 13:09:24 sdesktop
211 0 Aug 29 2011 13:09:24 sdesktop/data.xml
176 6487517 Aug 29 2011 13:09:26 anyconnect-macosx-i386-2.5.2014-k9.pkg
177 6689498 Aug 29 2011 13:09:30 anyconnect-linux-2.5.2014-k9.pkg
178 4678691 Aug 29 2011 13:09:32 anyconnect-win-2.5.2014-k9.pkg
<output omitted>
a. Display the current running configuration using the show running-config command.
ciscoasa# show running-config
: Saved
:
ASA Version 8.4(2)
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 42
CCNA Security
names
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
<output omitted>
Note: To stop the output from a command using the CLI, press the letter Q.
If you see VLANs 1 and 2 configured and other settings as described previously, the device is most
likely configured with the default factory configuration. You may also see other security features such
as a global policy that inspects selected application traffic, which the ASA inserts by default, if the
original startup configuration has been erased. The actual output will vary depending on the ASA
model, version and configuration status.
Note: The IOS command erase startup-config is not supported on the ASA.
b. Use the reload command to restart the ASA.
ciscoasa# reload
Proceed with reload? [confirm] <enter>
ciscoasa#
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down isakmp
Shutting down File system
***
*** --- SHUTDOWN NOW ---
Process shutdown finished
Rebooting.....
CISCO SYSTEMS
Embedded BIOS Version 1.0(12)13 08/28/08 15:50:37.45
<output omitted>
Step 6: Bypass setup mode and configure the ASDM VLAN interfaces.
When the ASA completes the reload process, it should detect that the startup-config file is missing and
present a series of interactive prompts to configure basic ASA settings. If it does not come up in this
mode, repeat Step 5.
a. When prompted to pre-configure the firewall through interactive prompts (Setup mode), respond with
“no”
Pre-configure Firewall now through interactive prompts [yes]? no
b. Enter privileged EXEC mode with the enable command. The password should be blank (no
password) at this point.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 42
CCNA Security
c. Enter global configuration mode using the command config t. The first time you enter configuration
mode after reloading you will be asked if you wish to enable anonymous reporting. Respond with
“no”.
d. Configure the inside interface VLAN 1 to prepare for ASDM access. The Security Level should be
automatically set to the highest level of 100. The VLAN 1 logical interface will be used by PC-B to
access ASDM on ASA physical interface E0/1.
ciscoasa(config)# interface vlan 1
ciscoasa(config-if)# nameif inside
INFO: Security level for "inside" set to 100 by default.
ciscoasa(config-if)# ip address 192.168.1.1 255.255.255.0
ciscoasa(config-if)# exit
PC-B is connected to switch S2 which is connected to ASA port E0/1. Why is it not necessary to add
physical interface E0/1 to this VLAN? __________________________________________________
e. By default, all ASA physical interfaces are administratively down, unless the Setup utility has been
run or the factory defaults have been reset. Because no physical interface in VLAN 1 has been
enabled, the VLAN 1 status is down/down. Use the show interface ip brief command to
verify this.
f. Enable the E0/1 interface using the no shutdown command and verify the E0/1 and VLAN 1
interface status. The status and protocol for interface E0/1 and VLAN 1 should be up/up.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 42
CCNA Security
g. Also pre-configure outside interface VLAN 2, add physical interface E0/0 to VLAN 2, and bring up the
E0/0 interface. You will assign the IP address using ASDM.
h. Test Connectivity to the ASA by pinging from PC-B to ASA interface VLAN 1 IP address 192.168.1.1.
The pings should be successful.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 42
CCNA Security
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 42
CCNA Security
d. Click OK to continue. ASDM will load the current configuration into the GUI.
e. The initial GUI screen is displayed with various areas and options. The main menu at the top left of
the screen contains three main sections; Home, Configuration, and Monitoring. The Home section is
the default and has two dashboards: Device and Firewall. The Device dashboard is the default screen
and shows device information such as Type (ASA 5505), ASA and ASDM version, amount of memory
and firewall mode (routed). There are five areas on the Device Dashboard.
Device Information
Interface Status
VPN Sessions
System Resources Status
Traffic Status
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 42
CCNA Security
f. Click the Configuration and Monitoring tabs to become familiar with their layout and to see what
options are available.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 42
CCNA Security
Part 3: Configuring Basic ASA Settings and Firewall Using the ASDM
Startup Wizard.
Step 1: Access the Configuration menu and launch the Startup wizard.
a. Click the Configuration button at the top left of the screen. There are five main configuration areas:
Device Setup
Firewall
Remote Access VPN
Site-to-Site VPN
Device Management
b. The Device Setup Startup wizard is the first option available and displays by default. Read through
the on-screen text describing the Startup wizard and then click the Launch Startup Wizard button.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 42
CCNA Security
a. On the Startup Wizard Step 3 screen – Interface Selection, for the Outside and Inside VLANs, do
not change the current settings because these were previously defined using the CLI. The inside
VLAN is named inside and the security level is set to 100 (highest). The Outside VLAN interface is
named outside and the security level set to 0 (lowest). For the DMZ VLAN click the Do not
configure button and uncheck the Enable VLAN checkbox. The DMZ VLAN will be configured later.
Click Next to continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 15 of 42
CCNA Security
b. On the Startup Wizard Step 4 screen – Switch Port Allocation, verify that port Ethernet1 is in Inside
VLAN 1 and that port Ethernet0 is in Outside VLAN 2.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 16 of 42
CCNA Security
c. On the Startup Wizard Step 5 screen – Interface IP Address Configuration, enter an Outside IP
Address of 209.165.200.226 and Mask 255.255.255.248. You can use the pull-down menu to select
the mask. Leave the inside interface IP address as 192.168.1.1 with a mask of 255.255.255.0. Click
Next to continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 17 of 42
CCNA Security
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 18 of 42
CCNA Security
b. On the Startup Wizard Step 7 screen – Address Translation (NAT/PAT), click the button Use Port
Address Translation (PAT). The default is to use the IP address of the outside interface. Note that
you can also specify a particular IP address for PAT or a range of addresses with NAT. Click Next to
continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 19 of 42
CCNA Security
c. On the Startup Wizard Step 8 screen – Administrative Access, HTTPS/ASDM access is currently
configured for hosts on inside network 192.168.1.0/24. Add Telnet access to the ASA for the inside
network 192.168.1.0 with a subnet mask of 255.255.255.0. Add SSH access to the ASA from host
172.16.3.3 on the outside network. Make sure the checkbox Enable HTTP server for HTTPS/ASDM
access is checked. Click Next to continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 20 of 42
CCNA Security
Step 5: Review the summary and deliver the commands to the ASA.
a. On the Startup Wizard Step 9 screen – Startup Wizard Summary, review the Configuration
Summary and click Finish. ASDM will deliver the commands to the ASA device and then reload the
modified configuration.
Note: If the GUI dialogue box stops responding during the reload process, close it, exit ASDM, and
restart the browser and ASDM. If prompted to save the configuration to flash memory, respond with
Yes. Even though ASDM may not appear to have reloaded the configuration, the commands were
delivered. If there are errors encountered as ASDM delivers the commands, you will be notified with a
list of commands that succeeded and those that failed.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 21 of 42
CCNA Security
b. Restart ASDM and provide the new enable password class with no username. Return to the Device
Dashboard and check the Interface Status window. You should see the inside and outside interfaces
with IP address and status. The inside interface should show some number of Kb/s. The Traffic
Status window may show the ASDM access as TCP traffic spike.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 22 of 42
CCNA Security
Step 8: Test access to an external website using the ASDM Packet Tracer utility.
a. From the ASDM Home page, choose Tools > Packet Tracer.
b. Choose the Inside interface from the Interface drop down menu and click TCP from the Packet Type
radio buttons. From the Source drop down menu, choose IP Address and enter the address
192.168.1.3 (PC-B) with a source port of 1500. From the Destination drop down menu, choose IP
Address and enter 209.165.200.225 (R1 Fa0/0) with a Destination Port of HTTP. Click Start to begin
the trace of the packet. The packet should be permitted.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 23 of 42
CCNA Security
c. Reset the entries by clicking Clear. Try another trace and choose outside from the Interface drop
down menu and leave TCP as the packet type. From the Sources drop down menu, choose IP
Address and enter 209.165.200.225 (R1 Fa0/0) and a Source Port of 1500. From the Destination
drop down menu, choose IP Address and enter the address 209.165.200.226 (ASA outside
interface) with a Destination Port of telnet. Click Start to begin the trace of the packet. The packet
should be dropped. Click on Close to continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 24 of 42
CCNA Security
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 25 of 42
CCNA Security
b. From the Configuration screen, Device Setup menu, choose Routing > Static Routes. Click the IPv4
Only button and click Add to add a new static route.
c. In the Add Static Route dialogue box, choose the outside interface from the drop down menu. Click
the ellipsis button to the right of Network and select Any from the list of network objects, then click
OK. The selection of Any translates to a “quad zero” route. For the Gateway IP, enter
209.165.200.225 (R1 Fa0/0).
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 26 of 42
CCNA Security
e. From the ASDM Tools menu, select Ping and enter the IP address of router R1 S0/0/0 (10.1.1.1).
The ping should succeed this time. Click Close to continue.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 27 of 42
CCNA Security
f. From the ASDM Tools menu, select Traceroute and enter the IP address of external host PC-C
(172.16.3.3). Click on Trace Route. The traceroute should succeed and show the hops from the ASA
through R1, R2, and R3 to host PC-C. Click Close to continue.
Step 3: Configure AAA user authentication using the local ASA database.
It is necessary to enable AAA user authentication in order to access the ASA using SSH. You allowed
SSH access to the ASA from the outside host PC-C when the Startup wizard was run. To allow the
remote network administrator at PC-C to have SSH access to the ASA, you will create a user in the local
database.
a. From the Configuration screen, Device Management area, click Users/AAA. Click User Accounts
and then Add. Create a new user named admin with a password of cisco123 and enter the
password again to confirm it. Allow this user Full access (ASDM, SSH, Telnet, and console) and set
the privilege level to 15. Click OK to add the user and click Apply to send the command to the ASA.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 28 of 42
CCNA Security
b. From the Configuration screen, Device Management area, click Users/AAA. Click AAA Access. On
the Authentication tab, click the checkbox to require authentication for HTTP/ASDM, SSH and Telnet
connections and specify the “LOCAL” server group for each connection type. Click Apply to send the
commands to the ASA.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 29 of 42
CCNA Security
Note: The next action you attempt within ASDM will require you to login as admin with password
cisco123.
c. From PC-C, open an SSH client such as PuTTY and attempt to access the ASA outside interface at
209.165.200.226. You should be able to establish the connection. When prompted to login, enter user
name admin and password cisco123.
d. After logging in to the ASA using SSH, enter the enable command and provide the password class.
Issue the show run command to display the current configuration you have created using ASDM.
Note: The default timeout for Telnet and SSH is 5 minutes. You can increase this setting using the
CLI as described in Lab 10A or go to ASDM Device Management > Management Access >
ASDM/HTTP/Telnet/SSH.
Step 4: Modify the MPF application inspection policy.
For application layer inspection, as well as other advanced options, the Cisco Modular Policy
Framework (MPF) is available on ASAs.
a. The default global inspection policy does not inspect ICMP. To enable hosts on the internal network
to ping external hosts and receive replies, ICMP traffic must be inspected. From the Configuration
screen, Firewall area menu, click Service Policy Rules.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 30 of 42
CCNA Security
b. Select the inspection_default policy and click Edit to modify the default inspection rules. On the Edit
Service Policy Rule window, click the Rule Actions tab and select the checkbox for ICMP. Do not
change the other default protocols that are checked. Click OK and then click Apply to send the
commands to the ASA. If prompted, login as again admin with a password of cisco123.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 31 of 42
CCNA Security
c. From PC-B, ping the external interface of R1 S0/0/0 (10.1.1.1). The pings should be successful.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 32 of 42
CCNA Security
d. ASDM will configure this interface as VLAN ID 12 by default. Before clicking OK to add the interface,
click the Advanced tab and specify this interface as VLAN ID 3.
Note: If you are working with the ASA 5505 base license, you are allowed to create up to three named
interfaces. However, you must disable communication between the third interface and one of the other
interfaces. Because the DMZ server does not need to initiate communication with the inside users, you
can disable forwarding to interfaces VLAN 1.
e. On the Advanced tab, you also need to block traffic from this interface VLAN 3 (dmz) to the VLAN 1
(inside) interface. From the Block Traffic area, select vlan1 (inside) from the drop down menu. Click
OK to return to the Interfaces window. You should see the new interface named dmz, in addition to
the inside and outside interfaces. Click Apply to send the commands to the ASA.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 33 of 42
CCNA Security
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 34 of 42
CCNA Security
b. Click the ellipsis button to the right of Private IP Address. In the Browse Private IP Address window,
click Add to define the server as a Network Object. Enter the name DMZ-Server, with a Type of
Host and the Private IP Address of 192.168.2.3.
c. While in the Add Network Object dialog box, click the double down arrow button for NAT. Click the
checkbox for Add Automatic Address Translation Rules and enter the type as Static. Enter
209.165.200.227 as the Translated Addr. When the screen looks like the following, click OK to add
the server network object. From the Browse Private IP Address window, click OK. You will return to
the Add Public Server dialog box.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 35 of 42
CCNA Security
In the Add Public Server dialog, click the ellipsis button to the right of Private Service. In the Browse
Private Service window, double click to select the following services: tcp/http, tcp/ftp, icmp/echo
and icmp/echo-reply (scroll down to see all services). Click OK to continue and return to the Add
Public Server dialog.
Note: You can specify Public services if different from the Private services, using the option on this
screen.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 36 of 42
CCNA Security
d. When you have completed all information in the Add Public Server dialog box, it should look like the
one shown below. Click OK to add the server. Click Apply at the Public Servers screen to send the
commands to the ASA.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 37 of 42
CCNA Security
c. Note: You can also see the actual commands generated using the Tools > Command Line
Interface and entering the command show run.
Step 4: Test access to the DMZ server from the outside network.
a. From PC-C, ping the IP address of the static NAT public server address (209.165.200.227). The
pings should be successful.
b. Because the ASA inside interface (VLAN 1) is set to security level 100 (the highest) and the DMZ
interface (VLAN 3) is set to 70, you can also access the DMZ server from a host on the inside
network. The ASA acts like a router between the two networks. Ping the DMZ server (PC-A) internal
address (192.168.2.3) from inside network host PC-B (192.168.1.X). The pings should be successful
due to interface security level and the fact that ICMP is being inspected on the inside interface by the
global inspection policy.
c. The DMZ server cannot ping PC-B on the inside network. This is because the DMZ interface VLAN 3
has a lower security level and the fact that, when the VLAN 3 interface was created, it was necessary
to specify the no forward command. Try to ping from the DMZ server PC-A to PC-B at IP address
192.168.1.X. The pings should not be successful.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 38 of 42
CCNA Security
a. From the Monitoring screen, Interfaces menu, click Interface Graphs > outside. Select Packet
Counts and click Add to add the graph. The exhibit below shows Packet Counts added.
b. Click the Show Graphs button to display the graph. Initially there is no traffic displayed.
c. From a privileged mode command prompt on R2, simulate Internet traffic to the ASA by pinging the
DMZ server public address with a repeat count of 1000. You can increase the number of pings if
desired.
d. You should see the results of the pings from R2 on the graph as an Input Packet Count. The scale of
the graph is automatically adjusted depending on the volume of traffic. You can also view the data in
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 39 of 42
CCNA Security
tabular form by clicking the Table tab. Notice that the View selected at the bottom left of the Graph
screen is Real-time, data every 10 seconds. Click the pull-down menu to see the other options
available.
e. Ping from PC-B to R1 Fa0/0 at 209.165.200.225 using the –n option (number of packets) to specify
1000 packets.
Note: The response from the PC is relatively slow and it may take a while to show up on the graph as
Output Packet Count. The graph below shows an additional 5000 input packets as well as both input
and output packet counts.
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 40 of 42
CCNA Security
Reflection:
1. What are some benefits to using ASDM over the CLI?
________________________________________________________________________________
________________________________________________________________________________
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 41 of 42
CCNA Security
All contents are Copyright © 1992–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 42 of 42