Solved

asa5510 security

Posted on 2013-02-04
4
279 Views
Last Modified: 2013-02-05
Hi Experts,

we have running a ASA 5510 in our office.
On one leg we use the LAN and on the other leg we have setup a WIFI network.
Inside the ASA we use a CSC module.
But the WIFI leg is also secured by the CSC module.
Is there a way to have the WIFI leg completely unsecured and not scanned for WIFI visitors ?
0
Comment
Question by:Eprs_Admin
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:ArneLovius
ID: 38854460
If this ASA just to firewall between the LAN and WiFi ?

If it is, then you could just remove the CSC...
0
 

Author Comment

by:Eprs_Admin
ID: 38854487
no, behind the ASA we have a data network and a wifi network.
But the wifi network shouldn't be scanned by csc
0
 
LVL 37

Accepted Solution

by:
ArneLovius earned 500 total points
ID: 38854538
aha, so the ASA is also connected to an external network...

If you follow the documentation, you will see that there will be an ACL to define traffic that gets set to the CSC, simply add deny rules for the traffic that you want to bypass the CSC.

It would be useful if you posted a suitably sanitized copy of the ASA config
0
 

Author Closing Comment

by:Eprs_Admin
ID: 38854593
with the simple ACL and deny I could exclude the whole sub net from scanning.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today sees the launch of a new case study, focusing on BYOD technologies we have been working with for some time now.  But with the advent of 802.11ac wireless technologies and the story behind our landmark developments, we would like to share this …
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question