Solved

Cisco ASA 5510 Thoughts/Comments

Posted on 2006-12-01
2
313 Views
Last Modified: 2013-11-16
http://www.cisco.com/en/US/products/ps6120/prod_models_comparison.html

I'm looking to pick up a Cisco ASA 5510 from my hardware vendor but I wanted to see if anyone had any experiences with this router.  Below is an explanation of what I need accomplished.

Client Computers will be on a 192.168.2.0/24
Servers will be on a 192.168.1.0/24
FTP Server in a DMZ with IP address 10.0.0.0/24

Will this security appliance be able to handle such a configuration out of the box or will I need to setup VLANs using my switches?  

Thanks

Michael
myfootsmells
0
Comment
Question by:myfootsmells
2 Comments
 
LVL 5

Author Comment

by:myfootsmells
ID: 18056473
Also is the command line language similar to Cisco PIX?
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 18056672
The 5510 supports 3 interfaces out of the box. 5 are there, but it depends on the license whether or not you can use all of them. No need for VLANs unless you want them.
The ASA is identical to PIX ver 7.x so you should be very comfortable with the command line. If you have not used PIX 7.x, the ASDM gui is getting much better. I actually like the GUI with ASDM 5.22 and ASA/PIX 7.2(2)
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question