I'm looking to deploy an ASA-5510 as our internet firewall. We'll be using a DS3 coming into a Cisco 3845 router and we want to service 4 different, NATed networks. My question is, can the ASA-5510 with a Base license service the needs of all three networks, or do we need to upgrade and enable security contexts? If we don't need them, are there any advantages to having security contexts in this situation? Thanks.
You don't really need security contexts if you are simply natting 4 different networks, the 5510 will do this quite easily with a single context. You can still have separation between the networks with DMZ's etc.
However if you need absolute separation between these 4 networks, for example they are 4 separate customers then you may well want to consider using security contexts.
You might want to use multiple security contexts in the following situations:
â¢You are a service provider and want to sell security services to many customers. By enabling multiple security contexts on the security appliance, you can implement a cost-effective, space-saving solution that keeps all customer traffic separate and secure, and also eases configuration.
â¢You are a large enterprise or a college campus and want to keep departments completely separate.
â¢You are an enterprise that wants to provide distinct security policies to different departments.
â¢You have any network that requires more than one security appliance.
Multiple context mode does not support the following features:
â¢Dynamic routing protocols
Security contexts support only static routes. You cannot enable OSPF, RIP, or EIGRP in multiple context mode.
â¢Multicast routing. Multicast bridging is supported.
Thanks for the reply. Basically, I'll have one of the 4 networks with a more "liberal" security policy and the other 3 can have the same, more restrictive policy. As long as I can keep the 1 liberal network away from the other 3, I'm happy. The ASA-5510 base shouldn't have a problem with this?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :