Config Asa Firewalls Report
Config Asa Firewalls Report
CYBER SHUJAA
ASSIGNMENT
REPORT: CONFIGURING ASA FIREWALL
INTRODUCTION
This lab in Packet Tracer focuses on configuring and managing a network using a
Cisco ASA (Adaptive Security Appliance). The primary objectives include verifying
connectivity, exploring the ASA, and configuring its basic settings along with
interface security levels using the CLI. The lab involves setting up routing, address
translation, and inspection policies, as well as configuring DHCP, AAA
(Authentication, Authorization, and Accounting), and SSH for secure management.
Additionally, it covers the setup of a DMZ (Demilitarized Zone), Static NAT
(Network Address Translation), and ACLs (Access Control Lists). The scenario
simulates a company with a single location connected to an ISP through R1, an
ISP-managed CPE device, and R2, an intermediate Internet router. R3 connects an
external network management company to the ISP, enabling remote network
management. The ASA, positioned at the network's edge, links the internal
corporate network and DMZ to the ISP, providing essential NAT and DHCP services,
using the public IP address space 209.165.200.224/29 for address translation.
Part: Verifying connectivity and exploring the ASA.
Verifying that pc c can ping any router interface for R1
Checking connectivity to PC B
Step 3: Determining the file system and contents of the flash memory.
Showing the File system to determine which prefixes are supported.
Displaying the flash memory
Part 2: Configuring the ASA settings and interface security using the CLI
Step 1: Configuring the hostname and domain name.
c. Verifying configurations.
Step 2: Configuring static NAT to the DMZ server using a network object
Step 3: Configuring the ACL to allow access to the DMZ server from the internet.
Through this exercise, one is not only reinforced their understanding of ASA
configurations but also their ability to manage a complex network infrastructure
that supports both local and remote administration. This lab serves as a
foundational step towards mastering advanced network security concepts and
practical applications in real-world scenarios.