i have ASA5510 my E0 interface is having public ip and E1 is having 192.168.1.0/24 network and my DMZ E2 is 172.16.2.0/24 network.
my management interface ip address is 10.10.10.1 and ive put 10.10.10.5 for SSM module. but im not receiving the updates from net bcoz there is no connection to the internet from 10.10.10.0/24 network.
how can i do that, and ASA 5510 has got 4 ports E0,E1,E2,E3 but i can see that port E3 is activated if i chk the sh run there is no port E3.
now my issue is i would like to allow 10.10.10.0/24 to access internet to update the module.
Do you have a router which connects to internet from your ASA box ? If so, you can do a PAT or NAT on the internet router to make sure you transform the private IPs (10.10.10.0/24) to some public IP, for internet access.. Once the NAT is done, the SSM module can receive updates from the internet..
If you need any assitance configuring NAT, u can post us back. you also need to give a route back to 10.10.10.0/24 from your router (if u do a NAT in the router).
ive a router its 1841 a 256 kbps line. so the patch code from ssm module where should i connect.rt now im connecting it to a 8 port switch i mean the management and ssm port how should i connect this can i post the config file. pls help
You can connect the management port of the SSM to some switch which connects on the MGT VLAN 10.10.10.0/24.. It should just be configured an IP and should be able to ping the default gateway. U can give the default gateway to a layer 3 switch. u have L3 in ur network ? You can then do a NAT on the ethernet interface of your router....
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :