We are looking to replace the firewall we have on our network now (consumer type Linksys device) with a device with more capabilities. Specifically the capabilities we want are:
- Ability to assign more than one IP to one interface (we get 5 static IP's from Comcast now, but can't use them all behind the firewall)
- Ability to pass traffic from one of those IP's to a NAT'd ip on the private site, and be able to control what ports are accessed (ie, public IP 18.104.22.168 passes port 9100 and 80 traffic to private IP 192.168.1.50)
- Control/limit outbound traffic
- Create a persitent VPN to a Cisco ASA5540 at a partner site
Would like to also have:
- GUI interface if possible (I realize that the Cisco units have an extensive CLI, but at least to view status)
- Option to add anti-virus/anti-security/spam filtering at the gateway
- Have some reporting capabilities (graphs, charts, usage, threats blocked, bandwidth usage, etc)
- Aggregate bandwidth on 2 WAN interfaces if possible.
Currently our network has a Comcast modem with 4 interfaces on it, one is directly connected with a public IP to a printer server that an outside agency prints directly to. Another port is connected to a Linksys firewall, where traffic on selected ports is passed to our Small Business Server.
So the configuration I'd like to have right away is to attach the 5 public IP's to the incoming WAN interface. Connect my main switch to an internal interface. Configure 2 public ips to pass traffic on certain ports to a certain IP's. Allow all internal traffic outbound from some internal IP's and some traffic from others. Thats it.
Would the Cisco ASA 5510 be able to do most or all of these things? Is configuring the device for what I want to do above as easy as it seems it would be?