Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to configure a 3750 and asa5515 for internet access

Posted on 2013-01-19
2
Medium Priority
?
613 Views
Last Modified: 2013-01-22
I have a cisco 3750 acting as a distribution switch a cisco 2960 as a access switch and a ASA 5515 as my way out to the internet how do I bring this together
0
Comment
Question by:granthd
2 Comments
 
LVL 17

Accepted Solution

by:
lruiz52 earned 2000 total points
ID: 38797399
can you post sanitized configs of your switches and the ASA?
0
 
LVL 20

Expert Comment

by:rauenpc
ID: 38801478
3750 will be configured with at least 2 vlans. One vlan for routing to the ASA, and all other vlans for your LAN. The 3750 needs a default route pointed at the ASA -this can be done statically or via dynamic routing protocol such as OSPF or EIGRP. The ASA will need to have a route pointed at the 3750 for all internal subnets - this, like the default route, can be done via static or dynamic routing protocols.

From here it's just straight configuration on the devices. Configure your firewall with whatever ACL, NAT, and VPN you might need, and configure your switches with any vlans, trunks, or policies you need to use.

If you plan to configure  DMZ on the firewall, use a separate interface on the firewall to connect to the 3750, and the DMZ vlan should be layer 2 only - let the firewall be the default gateway for all DMZ traffic unless you plan to configure advanced features on the switch like VRF or MPLS.
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Suggested Courses

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question