Solved

ASA simulation

Posted on 2010-09-13
7
1,093 Views
Last Modified: 2012-08-13
Is there any software simulation for Cisco ASA to make some practice!!! I have tried Packet tracer and Boson but its only for routers and switches!
0
Comment
Question by:yahyooz
7 Comments
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 33669702
HI,

I advise GN3: http://www.gns3.net/
And there is a lot of good stuff: http://www.petenetlive.com/Top_Level/techmain.html

Best regards,
Istvan
0
 
LVL 9

Expert Comment

by:ffleisma
ID: 33669893
I've managed to run ASA on GNS on my windows laptop.

first download the two files linked below

hxxp://www.4shared.com/account/file/254502490/6ab3e84c/vmlinuz.html
hxxp://www.4shared.com/get/cm7sFS6d/asa802-k8initrd.html

then on the preference on GNS, follow the one in the picture.

kernel cmd line:
append auto nousb ide1=noprobe bigphysarea=16384 console=ttyS0,9600n8 hda=980,16,32


hope this helps :-)

just advise if you encountered any problems or if your not familiar with GNS


preference.JPG
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
ID: 33669902
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 

Author Comment

by:yahyooz
ID: 33669945
Thanks for your reply,
But when i Install GNS, it needs the ASA image!! where can I download ASA images for free!

Thanks
0
 

Author Comment

by:yahyooz
ID: 33670036
Thanks Pete,  its really good solution, but is there possibilty to connect it to other devices (PC, router or switch) so i can check my ASA tests if its right or not!!
0
 
LVL 10

Expert Comment

by:ddiazp
ID: 33672621
Simply put, you cannot download ASA images for free - legally.

Feel free to browse around though :)
0
 

Author Closing Comment

by:yahyooz
ID: 33707670
its helpful but still a bit complicated
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now