B-6
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Appendix B Sample Configurations
Example 2: Single Mode Firewall Using Same Security Level
Example 2: Single Mode Firewall Using Same Security Level
This configuration creates three internal interfaces. Two of the interfaces connect to departments that are
on the same security level, which allows all hosts to communicate without using access lists. The DMZ
interface hosts a syslog server. The management host on the outside needs access to the Syslog server
and the security appliance. To connect to the security appliance, the host uses a VPN connection. The
security appliance uses RIP on the inside interfaces to learn routes. The security appliance does not
advertise routes with RIP; the upstream router needs to use static routes for security appliance traffic
(see
Figure B-2
).
The Department networks are allowed to access the Internet, and use PAT.
Figure B-2
Example 2
passwd g00fba11
enable password gen1u$
hostname Buster
asdm image disk0:/asdm.bin
boot system disk0:/image.bin
interface gigabitethernet 0/0
nameif outside
security-level 0
DMZ
192.168.2.1
Syslog Server
192.168.2.2
Management Host
209.165.200.225
outside
209.165.201.3
209.165.201.1
Internet
Department 2
Department 2
Network 2
Department 1
dept2
10.1.2.1
dept1
10.1.1.1
10.1.2.2
192.168.1.1
126979
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......