Week 5 Assignment 2
Week 5 Assignment 2
Week 5 Assignment 2: Configure ASA Basic Settings and Firewall Using the CLI
Introduction
This report outlines the configuration process of a Cisco ASA (Adaptive Security Appliance)
using Packet Tracer. The main objective is to verify connectivity, configure basic settings, and
set up firewall rules through the Command Line Interface (CLI). The ASA serves as a security
device connecting the internal network and DMZ (Demilitarized Zone) to the Internet. The
assignment involves configuring various features, including routing, address translation, DHCP
services, and security settings. This hands-on exercise will enhance understanding of network
security concepts and ASA functionality.
Addressing table
Device Interface IP Address Subnet Mask Default Gateway
R1 N/A
R2 N/A
R3 N/A
ASA NA
ASA NA
BODY
Answers to Questions
Part 1: Verify Connectivity and Explore the ASA
Outcome: PC-C was able to ping all router interfaces but failed to reach the ASA, PC-B,
or the DMZ server.
PC-B
Step 2: Determine ASA version, interfaces, and license.
Commands:
o Enter privileged EXEC mode.
o show file system
o show flash:
Part 2: Configure ASA Settings and Interface Security Using the CLI
Tip: Many ASA CLI commands are similar to, if not the same, as those used with the Cisco IOS CLI.
In addition, the process of moving between configuration modes and submodes is essentially the
same.
Commands:
hostname NETSEC-ASA
domain-name netsec.com
Step 2: Configure the Enable Mode Password
Command: NETSEC-ASA(config)# enable password ciscoenpa55
Step 3: Set the date and time.
Use the clock set command to manually set the date and time
NETSEC-ASA(config-if)# security-level 0
NETSEC-ASA(config-if)# no shutdown
b. Configure the G1/2 interface for the inside network (192.168.1.0/24) and set the security level to the
highest setting of 100 and enable the interface.
NETSEC-ASA(config-if)# no shutdown
Verify that the ASA can ping the R1 S0/0/0 IP address 10.1.1.1
Step 2: Configure static NAT to the DMZ server using a network object.
Configure a network object named DMZ-SERVER and assign it the static IP address of the DMZ
server (192.168.2.3). While in object definition mode, use the nat command to specify that this object
is used to translate a DMZ address to an OUTSIDE address using static NAT, and specify a public
translated address of 209.165.200.227.
Step 3: Configure an ACL to allow access to the DMZ server from the Internet.
Configure a named access list OUTSIDE-DMZ that permits the TCP protocol on port 80 from any
external host to the internal IP address of the DMZ server. Apply the access list to the ASA OUTSIDE
interface in the “IN” direction.
NETSEC-ASA(config)# access-list OUTSIDE-DMZ permit icmp any host
192.168.2.3
NETSEC-ASA(config)# access-list OUTSIDE-DMZ permit tcp any host
192.168.2.3 eq 80
NETSEC-ASA(config)# access-group OUTSIDE-DMZ in interface OUTSIDE
Step 4: Test access to the DMZ server.
From a web browser on PC-C, navigate to the DMZ server (209.165.200.227).
Result: Successfully accessed the DMZ server via web browser from PC-C.
Conclusion
Through this assignment, I gained hands-on experience with configuring Cisco ASA for network
security. The step-by-step process enhanced my understanding of network interface
configurations, routing, address translation, and security policies. Troubleshooting connectivity
issues helped solidify my skills in network management.