Configuring an ASA Firewall on Cisco Packet Tracer - Part One

Поделиться
HTML-код
  • Опубликовано: 14 окт 2024

Комментарии • 86

  • @SecretPotato4123
    @SecretPotato4123 3 года назад +12

    This is really good, you're teaching people your knowledge for free and in a really well explained way, thank you for this!

    • @GregSouth
      @GregSouth  3 года назад +1

      You’re welcome Jordan-thanks for the feedback!

  • @adrianspataru1408
    @adrianspataru1408 Год назад +1

    thanks for the video and for sharing your knowledge with us. Verry well structured, the only minus is the fact that you are not using a dedicated microphone. Thank you.

    • @GregSouth
      @GregSouth  Год назад

      Hi @@adrianspataru1408 - thank you! I'll try to improve the sound quality in future - thanks for your feedback.

  • @thepuldarshana9056
    @thepuldarshana9056 Год назад +2

    I like this tutorial. explains clearly and very in detail . feel like in a class. thanks

    • @GregSouth
      @GregSouth  11 месяцев назад

      Glad it was helpful!

  • @galaxyspace4077
    @galaxyspace4077 11 месяцев назад +1

    your teaching method is so clear and understandable . can you do a tutorial with ASA active / stand by Fail over with GNS3 (since fail over not supportive with packet tracer)

    • @GregSouth
      @GregSouth  11 месяцев назад

      Great suggestion! Unfortunately I just don’t get the time at present to do any recordings but when I do in the future- il keep this suggestion in mind- thank you

  • @sergeattia2866
    @sergeattia2866 11 месяцев назад

    Bonjour, Depuis la La France
    Thank you very much for the labs and TP. It helps us a lot.
    I really appreciate
    With you all these concepts become understandable
    excellent teaching, many thanks
    Please also provide the basic files
    This allows us to get to the point
    Thank you
    Regards

    • @GregSouth
      @GregSouth  10 месяцев назад

      Thank you - files are below videos usually in first video - all the best , Greg

  • @jean-lucpicard5510
    @jean-lucpicard5510 2 года назад +2

    Trying to re-create this on PT. are the Serial cables DCE or DTE?
    Nevermind I see the clock symbol.

  • @scott2495
    @scott2495 3 года назад +1

    I was asking myself why have you assigned .226 to the outside interface on the asa then next thing you answered my question! Good video!

  • @Better403
    @Better403 2 года назад

    Thank you so much, you helped me to finish my graduation project.

    • @GregSouth
      @GregSouth  2 года назад

      Glad I could help!

    • @jean-lucpicard5510
      @jean-lucpicard5510 2 года назад

      @@GregSouth Using this as my Final Year Project at college.

  • @patrickjones2843
    @patrickjones2843 Год назад +1

    Great videos! I'm currently shopping for a midrange firewall and I'm most comfortable with Palo Altos but they are going to be way to expensive at current mid size company. I would like to find a good upgrade from the Sonic Firewall TZ400 Series that has central management in a GUI suitable for about 100-150 people. ANyone have any suggestions? There's so many options but its like I'd have to call each company becuase some you just buy the box and maybe RMA support and some your forced into licensing. Even if I could determine the best Gen 7 Sonic Firewall to go with for that 100-150 user base would be great. (Currently on Gen6 Sonic Wall TZ400W) I'm inheriting all of this and my boss is great and know a decent amount but we are kinda walking tight ropes with price and scalibility and we heard the Dream Wall might not be good option for Mid Range.

    • @GregSouth
      @GregSouth  Год назад

      Thanks for the feedback on my videos Patrick and hope you made some progress with your shopping for a firewall. All the best, Greg

  • @jonathanbeya465
    @jonathanbeya465 Год назад +1

    Very useful tuto. Is there a way of connecting more than 2 PCs without a switch ?

    • @GregSouth
      @GregSouth  Год назад

      Hi Jonathan, Yes, in packet tracer this can be implemented. Add two PC's, connect with a cross over cable (dashed line) - add IP address to each PC e.g. PC1-192.168.1.1 subnet mask 255.255.255.0 and PC2-192.168.1.2 subnet mask 255.255.255.0 and go into command prompt on PC1 and ping from PC1 to PC2 (e.g. ping 192.168.1.2) - you should see replies so you know you have layer 3 connectivity. Hope this helps and all the best, Greg

  • @lemon2524
    @lemon2524 Год назад +1

    This is a beneficial video for me thank you.

  • @saltech2024
    @saltech2024 3 года назад +1

    Hi
    Thank you.... Your videos have helped me a lot but I'm facing problem with my final year project more specifically asa policy inspections.... icmp, http, dns, ftp, VoIP etc.

    • @GregSouth
      @GregSouth  3 года назад

      Hi Ibrahim, glad they helped - if you can understand this example using ICMP - I believe you will be fine to do more policy inspections such as the one's you mention...good luck with your project and thanks for watching. Greg

  • @AT-sj1wl
    @AT-sj1wl Год назад

    Good evening, I know this video is from a few years back but I was wondering if it was possible to create Vlan's on the firewall? Or can I only do that for switches?

  • @galaxyspace4077
    @galaxyspace4077 11 месяцев назад

    Hi, why do you assign IP addresses to 'inside if' and 'outside' via vlans ? . why cant you assign those directly to physical interfaces ? is it possible ? thanks

  • @GrimReaper2121
    @GrimReaper2121 2 года назад +1

    Hello Richard Madden, I was wondering if you have the router configurations for this packet tracer? You can copy and paste them here as a reply. I would greatly appreciate it. I have been in the network field for over 8 years and if one doesn't use their knowledge constantly, you lose it! Beautiful set of videos my friend. Keep up the good work.

    • @GregSouth
      @GregSouth  2 года назад +2

      Hi there, thanks for the feedback. The link for the original file, configuring an ASA Firewall on Cisco Packet Tracer is here - bit.ly/38o8Dxf - hope this helps. All the best, Greg

    • @GrimReaper2121
      @GrimReaper2121 2 года назад +1

      @@GregSouth thank you Greg. I appreciate it my friend.

  • @watora_mari
    @watora_mari 3 месяца назад

    Level 1 teaching, thanks. I couldn’t finish it though. Too much of talking. It’s good for someone on level 1. Keep it up

    • @GregSouth
      @GregSouth  3 месяца назад +1

      Hi @watora_mari - Glad it helped! There are other parts to this (that follow on from part one) if it helps. All the very best. Greg

  • @Zero_VIII
    @Zero_VIII 2 года назад +1

    There are any chance to get the base of the project (all the devices connected)? So i can follow you step by step in your lessons?

    • @GregSouth
      @GregSouth  2 года назад +1

      Hi @blackshadow93 _ - I link in the top of the video to the Packet Tracer file with original setup - here is the link for convenience. All the best, Greg. bit.ly/38o8Dxf

    • @Zero_VIII
      @Zero_VIII 2 года назад +1

      @@GregSouth thanks a lot Greg, and compliments for those video!

  • @rayane2290
    @rayane2290 2 года назад +1

    packet tracer , nowadays, still good ? for all network devices including cloud engineering versus GNS3 ?

    • @GregSouth
      @GregSouth  2 года назад +1

      Hi Ray, depends on the context. Packet Tracer is a great learning tool. It is a simulator and it’s a great tool in my opinion for understanding protocols(particularly for new students getting started in networking ).Excellent learning tool for ccna . Gns3 is also very useful tool - requires a little more effort to setup (need ios images etc) but also a great tool for learning and emulating networks - useful in my opinion for more detailed learning(progressing to ccnp etc)

    • @rayane2290
      @rayane2290 2 года назад +1

      @@GregSouth ok i understand Well. Thank yor for your effort in answer.

  • @ahmed00777
    @ahmed00777 3 года назад +1

    Great free training man

    • @GregSouth
      @GregSouth  3 года назад

      Glad you like it and thanks for the feedback Ahmed!

  • @mellluxe7826
    @mellluxe7826 2 года назад +1

    Hi, What is I have many vlans inside of the internal network? how would I configure it? I need help with my project. Is there any way to contact you?

    • @GregSouth
      @GregSouth  2 года назад

      Hi @Mell Luxe, unfortunately Packet Tracer and ASA specifically is limited in the amount of VLANs you can create (due to licenses) and the fact it's a simulator. My best advice here would be to create an ASA setup similar to the videos I demo and then for other sites to use a normal router and add extra functionality for security such as Access Control lists, VLANs and VPN etc etc to provide extra security in depth. Hope this helps and all the best with your project. Thanks, Greg

  • @mouvratha
    @mouvratha 2 года назад +1

    great video lesson bro, subscribed

    • @GregSouth
      @GregSouth  2 года назад

      Thanks Mouv! Glad video helped.

  • @arjunadityarastogi2118
    @arjunadityarastogi2118 2 года назад +1

    hi greg, thanks for what you are doing
    My outside vlan's status shows down, how should I "up" it?

    • @GregSouth
      @GregSouth  2 года назад +1

      Hi @Arjun - It's difficult to tell why the outside VLAN is down without seeing your actual network design. Here is a couple of reasons why is could be down - is there a cable connected to Et0/0 on the ASA and is the device it's connected to powered on (interface not shutdown on router) ? Another way to solve this is to view my original network setup - Have you taken a look at the exercise file I've uploaded?This provides the original network topology. When you open this the VLAN status is already set to up, up. Hope this helps, Greg - please find link here - bit.ly/38o8Dxf

    • @arjunadityarastogi2118
      @arjunadityarastogi2118 2 года назад +1

      @@GregSouth hi again greg,
      As it turned out, I did not issue the no shutdown command on the router's side of the line. Thts why the line protocol was down.
      But thank you anyways, you helped me with my assignment that day ✨

    • @GregSouth
      @GregSouth  2 года назад

      @@arjunadityarastogi2118 - pleased that you spotted the issue and got it fixed. Well done

  • @a.j.5475
    @a.j.5475 2 года назад

    You are using 2 vlans, one is number 1, the default. Which ports did you trunk or how did you get the vlans communicate to eachtother if you didnt use trunk?

    • @GregSouth
      @GregSouth  Год назад

      Hi A.J. - vlans are not set to trunk. You will notice I setup a default static route on the ASA outside interface to enable the ASA to reach external networks and additionally setup NAT. OSPF is already setup on Router 1,2,3 so traffic will be able to be routed back to the ASA. Hope this helps, Greg

  • @jamesbond-cx2uh
    @jamesbond-cx2uh 3 года назад +1

    How do i ping or access devices behind the firewall ( from outside to inside)?

    • @GregSouth
      @GregSouth  3 года назад +1

      Hi James, why would you want to do this? Initial traffic from outside to inside is untrusted and should not be passed by the firewall. The firewall is there to block / filter traffic coming from outside to inside. I show in the following video how to allow from outside to DMZ - which is better security practice. ruclips.net/video/pBW1X6r5kNM/видео.html - if you wish to allow outside to inside for testing purposes i have created a document here bit.ly/38o8Dxf and i also show the completed solution (but again this is only for Packet Tracer testing purposes and would not be recommended as I mention for the above reasons).

  • @SharvApte-ml5gc
    @SharvApte-ml5gc Год назад +1

    Thank you sir for this tutorial. Can you pls provide PKT file ?

    • @GregSouth
      @GregSouth  Год назад

      Glad you liked it. Yes, Packet Tracer file it is provided here. bit.ly/38o8Dxf

  • @a.j.5475
    @a.j.5475 2 года назад

    Noticed the nameif doesnt work, but when checking the vlan 1 with the name inside and the security-level 100 already exists in your downloadable packettracer. Is that correct?

    • @GregSouth
      @GregSouth  Год назад

      Hi A.J, the nameif command should work under an interface. E.g. # interface vlan 1, nameif inside. Yes, by default this name of inside is already configured on a ASA 5505- I demonstrate this in the video to compare this to other interfaces such as outside and DMZ. It helps to show, the highest possible level is used by the inside interface by default. Using the trusted-untrusted terminology, this level is considered the most trusted (value of 100).

  • @AbbasAbidi-c8l
    @AbbasAbidi-c8l 7 месяцев назад

    Bro where is part 5, i can not access DMZ from internet, when a 7200 router is in between asa firewall and that 7200 cisco router is connected to IPS

  • @mkbhoir5923
    @mkbhoir5923 3 года назад +1

    which routing topology is being used?

    • @GregSouth
      @GregSouth  3 года назад +1

      Hi MK, OSPF is used on Routers R1, R2 and R3. You can check this by running 'show ip protocols' on those routers. In addition, I configure a static default route from the ASA in the videos. Hope this helps, Greg

    • @mkbhoir5923
      @mkbhoir5923 3 года назад +1

      @@GregSouth Thanks a lot that was helpful

  • @taniakanth2657
    @taniakanth2657 3 года назад

    is it possible to make vlans for my internal network, while having the vlans for my firewall?

    • @GregSouth
      @GregSouth  3 года назад

      Hi, should not be any issue - have you tried setting up a layer 3 switch and then connecting this to firewall?

    • @taniakanth2657
      @taniakanth2657 3 года назад

      @@GregSouth Is it possible to email you about a problem i have with the nwtwork, mine keeps failing, i dont know why

  • @hamzadirieh3982
    @hamzadirieh3982 3 года назад +1

    thank you keep going

  • @matthewkeen6281
    @matthewkeen6281 8 месяцев назад +1

    Nice.

  • @issafeika2867
    @issafeika2867 4 года назад +1

    Thank you so... Much ❤.

  • @xtrax9
    @xtrax9 Год назад +1

    I dont have vlan 1 and 2 on my firewall default configuration

    • @GregSouth
      @GregSouth  Год назад

      Hi @xtrax9 - did you use the 5506 ASA instead? This doesn't have vlan 1 and 2 (in Packet Tracer 8.2). Note: the one that I configure in these videos is a 5505 ASA. This by default (in Packet Tracer 8.2) will have both vlan 1 (inside) and vlan 2 (outside) configured by default - they will also have ports assigned to them initially. You can see this by issuing the 'ciscoasa#show switch vlan' command - hope this helps, Greg

  • @ajayv6964
    @ajayv6964 3 года назад

    Hai....Is it possible to ping from outside to inside?

    • @GregSouth
      @GregSouth  3 года назад

      Hi there - yes this is possible but remember typical role of a firewall is to block traffic from an untrusted network coming into a more trusted network

  • @juancamilomedinagarzon1375
    @juancamilomedinagarzon1375 3 года назад

    hey friend could you help me with my topology it is not working I am doing the same as yours.

    • @GregSouth
      @GregSouth  2 года назад +1

      Hi @Juan - sorry just seeing your comment now. Not sure if you saw this but I have the original exercise file uploaded if this helps in any way. All the best, Greg - please find link here - bit.ly/38o8Dxf

  • @shaymaatareef7230
    @shaymaatareef7230 3 года назад

    thank you

  • @anthonysijera7871
    @anthonysijera7871 3 года назад

    THANK YOU !!!

  • @doggy007ooo
    @doggy007ooo 4 года назад

    quality Content 👌

  • @stevezzorr
    @stevezzorr 4 года назад

    What if the LAN network has multiple VLAN's?

    • @GregSouth
      @GregSouth  4 года назад +3

      Hi @Steven A, you may notice if you try to create more SVI (Switched Virtual Interfaces) on the ASA e.g. int vlan 10 and then try naming the interface using 'nameif' command you will get an error regarding the license. ASA doesn't allow configuring more than 2 interfaces with naeif and without a 'no forward' command...Another strategy you may use is to connect a layer 3 switch directly to e.g. VLAN 1 on the ASA. You can then use the layer 3 switch to create as many vlans as you wish and use the L3 Switch to do inter-vlan routing etc. If you need to route out to the Internet you can add the necessary routes from the Layer 3 Switch and subsequent routes out of the ASA (to the internet). Hope this helps, Greg

    • @kitaspidate5835
      @kitaspidate5835 3 года назад +1

      @@GregSouth hi i have the same issue, i tried multilayer swh method, like FW inside to L3 swh port24 n prts1,2,3 to 3 diff L@ swhs n i configured L3 swh as dhcp to assign 10.10.10.0,10.10.10.20.0,10.10.30.0/24 ip assign for L@ swh end devices. then i did FW inside ip 10.10.50.1/24-sec lvl 100, now if i ping from L2 PC to L2 PC diff vlans,still it pings, but i cant ping FW inside 10.10.50.1 from 10.10.10.3-PC. it failed to move from L# swh. so I trblsht as L# to FW link f0/24 as no swhport and gave ip 10.10.50.2 same subnet as FW IN, n then it passes pkt to FW, but no return frm firewall, again I added a static route to the 10.10.50.2 L#3 swhs link to FW [any ip,any subnet to 10.10.50.2], bt still cant ping the FW inside link from PC. can u help pls? i dont know what I am missing. do i need to add [swhprt trunk encap dot1q on L3 link to FW]?

    • @kitaspidate5835
      @kitaspidate5835 3 года назад

      hi i found it, it worked, i just have to add static route to my internal networks in ASA [route inside 10.10.10.0 255.255.255.0 10.10.50.2] here 50.2 is my L# swhs f0/24 port-no swhport ip addrs which connects ASA on 50.1] , now gonna try the remainning outside nw. thanx anyway

  • @KhalidKhan-xr8jc
    @KhalidKhan-xr8jc 4 года назад +1

    nice

  • @fixnet2918
    @fixnet2918 9 месяцев назад

    "Some of my configuration is already being done here" (min 7.05) ????

    • @GregSouth
      @GregSouth  9 месяцев назад +1

      Apologies-should have said - some config already completed here - as you can see these videos are far from rehearsed! Hope this helps

  • @stuffandthangs3953
    @stuffandthangs3953 Год назад

    On the rooter.

  • @yandasaketh2177
    @yandasaketh2177 3 года назад +1

    209th like

  • @bfacewcollar1328
    @bfacewcollar1328 3 года назад

    When I saw the topology I knew I was out of my league. Bye

  • @MrDass20
    @MrDass20 Год назад

    I want to change the Ip on the inside interface. How do I go aout doing that?

    • @MrDass20
      @MrDass20 Год назад

      If you need to change the inside interface IP you will have to remove the nameif inside from the interface and re add it. Thanks for this video tho. Very informative and detail.