Solved

how to integrate cisco security appliances in network

Posted on 2011-03-08
3
296 Views
Last Modified: 2012-05-11
Hi,
I am trying to put input into the design of our department network.  We have the following hardware and I'd like to know how to integrate them together for the best fit/practice.
3945 rtr
2 x 5520 ASA, 4250 IDS and Cacs appliance ADE1010.  I  am basically looking for a system that validates users before allowing them on the system and utilizes the firewall  to protect the system.

Some external or remote Users will access a webserver application remotely through Frame relay in through the 3945 rtr. Other remote users will access that same application through internet  DSL via a 2921 rtr.
Management Users will VPN into the system
I want everyone to be validated and I want the security to be installed where it is more effective.
Local users will access through another 2921.
Note we already have all this equipment. Eventually I hope to get a network person to configure but I want to be able to have meaningful input
0
Comment
Question by:Pete-Castillo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 22

Accepted Solution

by:
Matt V earned 500 total points
ID: 35443814
Normally, you would place the ASA devices in between the edge router and your core router or core switch.

INTERNET -> ROUTER -> ASA -> LAN

The IDS device could either be placed on the LAN or in between the LAN and the ASA.

You can either have authentication (VPN etc) done at the edge router or the ASA, although the ASA is designed for VPN concentration more than the router.
0
 
LVL 70

Expert Comment

by:Qlemo
ID: 35810164
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This past year has been one of great growth and performance for OnPage. We have added many features and integrations to the product, making 2016 an awesome year. We see these steps forward as the basis for future growth.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question