[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 6473
  • Last Modified:

Is the Cisco ASA 5510 the right device for my network?

We are looking to replace the firewall we have on our network now (consumer type Linksys device) with a device with more capabilities. Specifically the capabilities we want are:

- Ability to assign more than one IP to one interface (we get 5 static IP's from Comcast now, but can't use them all behind the firewall)
- Ability to pass traffic from one of those IP's to a NAT'd ip on the private site, and be able to control what ports are accessed (ie, public IP 12.45.22.222 passes port 9100 and 80 traffic to private IP 192.168.1.50)
- Control/limit outbound traffic
- Create a persitent VPN to a Cisco ASA5540 at a partner site

Would like to also have:
- GUI interface if possible (I realize that the Cisco units have an extensive CLI, but at least to view status)
- Option to add anti-virus/anti-security/spam filtering at the gateway
- Have some reporting capabilities (graphs, charts, usage, threats blocked, bandwidth usage, etc)
- Aggregate bandwidth on 2 WAN interfaces if possible.

Currently our network has a Comcast modem with 4 interfaces on it, one is directly connected with a public IP to a printer server that an outside agency prints directly to. Another port is connected to a Linksys firewall, where traffic on selected ports is passed to our Small Business Server.

So the configuration I'd like to have right away is to attach the 5 public IP's to the incoming WAN interface. Connect my main switch to an internal interface. Configure 2 public ips to pass traffic on certain ports to a certain IP's. Allow all internal traffic outbound from some internal IP's and some traffic from others. Thats it.

Would the Cisco ASA 5510 be able to do most or all of these things? Is configuring the device for what I want to do above as easy as it seems it would be?

Thanks

SS
0
ssittig
Asked:
ssittig
  • 2
  • 2
2 Solutions
 
Cyclops3590Commented:
Sounds like you want the 5510 with the CSC module for content filtering.
cisco firewalls come with an ASDM (the new >7.x OS's anyway) for gui.  You want to have atleast version 8 OS and ASDM 6 installed for some pretty cool realtime graphs.  SNMP with MRTG is your best bet on some of this monitoring though.

What did you mean by aggregate bandwidth though?  as of OS 8, it can do fail over links, however I don't believe so for load balancing (at least not that I'm aware of).
0
 
batry_boyCommented:
The ASA will support load balancing with active/active failover, but only in multiple context mode which most people won't use.

Here is a document outlining the active/active failover configuration:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080834058.shtml

Here are some screen shots I found of the GUI...


device-dashboard.jpg
firewall-db.jpg
rt-syslog-viewer.jpg
packet-tracer.jpg
0
 
ssittigAuthor Commented:
Thank for the info both of you. I don't have any experience with Cisco equipment, but the GUI looks well featured. I do have a Sonicwall Pro 1260 that I've configured, but it looks far less complex than this.  I welcome the learning experience, but at this point I want to make sure that this device will:

- Ability to assign more than one IP to one interface (we get 5 static IP's from Comcast now, but can't use them all behind the firewall)
- Ability to pass traffic from one of those IP's to a NAT'd ip on the private site, and be able to control what ports are accessed (ie, public IP 12.45.22.222 passes port 9100 and 80 traffic to private IP 192.168.1.50)
- Create a persitent VPN to a Cisco ASA5540 at a partner site
0
 
batry_boyCommented:
- Ability to assign more than one IP to one interface (we get 5 static IP's from Comcast now, but can't use them all behind the firewall)
- Ability to pass traffic from one of those IP's to a NAT'd ip on the private site, and be able to control what ports are accessed (ie, public IP 12.45.22.222 passes port 9100 and 80 traffic to private IP 192.168.1.50)
- Create a persitent VPN to a Cisco ASA5540 at a partner site

Yes, it can do all of these things quite well.  These are all typical functions for this firewall.
0
 
ssittigAuthor Commented:
Thanks both of you. I'm excited to get this new equipment setup.
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now