//1. To allow private network to access internet.(I do not need to inspect the traffic going to the internet.)//
Either you have to do NAT on the firewall or your internet router.
//2 To protect my private network from outside network.//
IF you are going to use cisco firewall, by default all the traffic is blocked from outside network to your internal network.To achieve this, you have to configure your lan inteface security level is higher that your wan interface.
3. Allow only my IP addresss(192.168.1.50) to access Telnet, SDM & SSH to my local router (192.168.1.1)
4. Allow only my IP address(192.168.1.50) to access Telnet, SDM & SSH via Tunnel to my remote Router(192.168.2.1)///
This you can achieve by configure VTY access list on the router itslef
access-list 10 permit 192.168.1.50
line vty 0 4
access-class 10 in
//5. Lastly the firewall ACL for VPN ( i know i need to permit port 500, Ip 50 &51 but I don;t know how to apply)//
Are you going to place your firewal behind the router.Actually it is not a best practice.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...