ASA 5512 Configuration - Inside and Outside same subnet
I am trying to configure an ASA 5512 and am encountering a problem on how to set up. My organisation is assigned a subnet xxx.xxx.32.0/21 by it's parent, with the SDP (service delivery point) being xxx.xxx.xxx.32.1. I want to place the firewall before the SDP, but obviously the internal network is all part of the same subnet and I can't configure the inside and outside interfaces on the same subnet.
This is my first experience with CISCO kit so go gentle with me but I appreciate any assistance anyone can give. I'm not looking to configure any rules just yet, but rather just get the traffic routing via the firewall to start with.
If you were to go ahead using the ASA in Transparent Mode I would suggest you search online for basic instructions on how to set it up. You will probably find a more simple guide on some online blog rather than referring to a Cisco document (Configuration Guide). Though I would still suggest referring to the Cisco document for the specific information.
Other than that I guess you could consider splitting the network in question so that you only use a small subnet on the external side and route rest of the remaining subnets towards the firewalls external interface. Or perhaps this is not an option in this case?
Well that wasn't too bad. ASA is configured as transparent. Do I just need to physically install as a 'bump in the wire' by placing it in between the external router and the internal router so traffic can only flow via the ASA?
Hi, Well that wasn't too bad. ASA is configured as transparent. Do I just need to physically install as a 'bump in the wire' by placing it in between the external router and the internal router so traffic can only flow via the ASA? Thanks, Rob
To my understanding the Transparent firewall pretty much acts like a switch between the hosts and their gateway. So basically the hosts, ASAs BVI/Bridge interface and the networks/subnets gateway are all in the same network.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...