ASA 5505 Security Plus and ADSL
am 06.08.2007 13:21:43 von JamesHas anyone had any luck configuring and getting their 5505 to work
with ADSL? If so I am interested to see what config's were used. I
haven't had any luck with getting it to work. Below are my current
configs. Thanks for any help.
JASZLINK-5505# show run
: Saved
:
ASA Version 7.2(2)
!
hostname JASZLINK-5505
domain-name xxxxxx
enable password xxxxxx encrypted
names
name 10.1.1.200 DC01 description Doman Controller
name 10.1.1.206 Dev01 description Development Server
name 10.1.1.202 Exchange01 description Exchange Server
name 10.1.1.204 Project01 description Project Server
!
interface Vlan1
description Inside Network Interface
nameif inside/LAN
security-level 100
ip address 10.1.1.1 255.255.255.0
!
interface Vlan2
description Outside Network Interface
nameif outside/WAN
security-level 0
ip address 72.151.92.xxx 255.255.255.248
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd xxxxxx encrypted
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
domain-name jaszlink.net
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list inbound extended permit tcp any host Exchange01 eq smtp
access-list inbound extended permit tcp any host DC01 eq 3389
access-list inbound extended permit tcp any host DC01 eq pptp
access-list inbound extended permit tcp any host Dev01 eq 5904
access-list inbound extended permit tcp any eq 5904 host Dev01 eq
5904
pager lines 24
logging enable
logging asdm informational
mtu inside/LAN 1500
mtu outside/WAN 1500
ip verify reverse-path interface outside/WAN
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-522.bin
no asdm history enable
arp timeout 14400
nat (inside/LAN) 1 10.1.1.0 255.255.255.0
static (inside/LAN,outside/WAN) 72.151.92.xxx DC01 netmask
255.255.255.255
static (inside/LAN,outside/WAN) 72.151.92.xxx Exchange01 netmask
255.255.255.255
static (inside/LAN,outside/WAN) 72.151.92.xxx Dev01 netmask
255.255.255.255
static (inside/LAN,outside/WAN) 72.151.92.xxx Project01 netmask
255.255.255.255
access-group inbound in interface outside/WAN
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat
0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-
disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.1.1.0 255.255.255.0 inside/LAN
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd update dns
!
dhcpd address 10.1.1.20-10.1.1.50 inside/LAN
dhcpd dns 10.1.1.1 interface inside/LAN
dhcpd enable inside/LAN
!
dhcpd dns 205.152.37.23 205.152.132.23 interface outside/WAN
!
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
: end