Task
Topology |
- Configure IP Address as per given in topology.
- Configure Security Levels of DMZ and DMZ1 as per given in topology.
- Make sure DMZ and DMZ1 ping each other.
- Make sure ASA Telnet Session is enable for R2 only.
- Enable SSH on ASA for ISP (directly connected only).
- Make sure PAT is enable for Inside, DMZ and DMZ1.
- ISP able to telnet R2 using 2487 port. (Do possible configuration for this task).
Solution
Use ASA Code 8.2 for this Task.
(Note: Make sure R2, R3 and R4 have default route to ASA.)
Task 2: Configure Security Levels of DMZ and DMZ1 as per given in topology.
On ASA
======
int e0/3
nameif dmz
security-level 50
exit
int e0/4
nameif dmz1
security-level 50
exit
Task 3: Make sure DMZ and DMZ1 ping each other.
On ASA
======
same-security-traffic permit inter-interface
Task 4: Make sure ASA Telnet Session is enable for R2 only.
On ASA======
username cisco password netwaxlab
telnet 192.168.2.2 255.255.255.255 inside
(Verify from R2 using "telnet 192.168.2.1")
Task 5: Enable SSH on ASA for ISP (directly connected only).
On ASA======
username cisco password netwaxlab
domain-name netwaxlab.com
crypto key generate rsa modulus 1024
ssh 152.52.68.1 255.255.255.255 outside
aaa authentication ssh console LOCAL
(Now in ISP: use "ssh -l cisco 152.52.68.100" hit enter)
Task 6: Make sure PAT is enable for Inside, DMZ and DMZ1.
On ASA======
nat (inside) 1 192.168.2.0 255.255.255.0
nat (dmz) 1 192.168.3.0 255.255.255.0
nat (dmz1) 1 192.168.4.0 255.255.255.0
global (outside) 1 interface
access-list OUT permit icmp any any
access-group OUT in interface outside
Task 7: ISP able to telnet R2 using 2487 port. (Do possible configuration for this task).
On ASA======
static (inside,outside) tcp interface 2487 192.168.2.2 23
access-list OUT permit tcp host 152.52.68.1 host 152.52.68.100 eq 2487
Great Post !Free Online Skill Test, e Tutorial, Video Tutorial & Training on CCNA,CCNP & CCIE-
ReplyDeleteHub4tech.com