The above basic configuration is just the beginning for making the appliance operational. The PAT configuration below is for ASA 8.3 and later: NAT (static and dynamic) and PAT are configured under network objects. The “global” command is no longer supported. This version introduced several important configuration changes, especially on the NAT/PAT mechanism. UPDATE for ASA Version 8.3 and later (including ASA 9.x)įrom March 2010, Cisco announced the new Cisco ASA software version 8.3. Step 4: Configure PAT on the outside interfaceĪSA5510(config)# global (outside) 1 interfaceĪSA5510(config)# nat (inside) 1 0.0.0.0 0.0.0.0 Configure this under Configuration Mode:ĪSA5510(config)# enable password mysecretpassword Step1: Configure a privileged level password (enable password)īy default there is no password for accessing the ASA firewall, so the first step before doing anything else is to configure a privileged level password, which will be needed to allow subsequent access to the appliance. Let’s see a snippet of the required configuration steps for this basic scenario: All outbound communication (from inside to outside) will be translated using Port Address Translation (PAT) on the outside public interface. The firewall will be configured to supply IP addresses dynamically (using DHCP) to the internal hosts.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |