Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

asa5510 security

Posted on 2013-02-04
4
Medium Priority
?
296 Views
Last Modified: 2013-02-05
Hi Experts,

we have running a ASA 5510 in our office.
On one leg we use the LAN and on the other leg we have setup a WIFI network.
Inside the ASA we use a CSC module.
But the WIFI leg is also secured by the CSC module.
Is there a way to have the WIFI leg completely unsecured and not scanned for WIFI visitors ?
0
Comment
Question by:Eprs_Admin
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:ArneLovius
ID: 38854460
If this ASA just to firewall between the LAN and WiFi ?

If it is, then you could just remove the CSC...
0
 

Author Comment

by:Eprs_Admin
ID: 38854487
no, behind the ASA we have a data network and a wifi network.
But the wifi network shouldn't be scanned by csc
0
 
LVL 37

Accepted Solution

by:
ArneLovius earned 2000 total points
ID: 38854538
aha, so the ASA is also connected to an external network...

If you follow the documentation, you will see that there will be an ACL to define traffic that gets set to the CSC, simply add deny rules for the traffic that you want to bypass the CSC.

It would be useful if you posted a suitably sanitized copy of the ASA config
0
 

Author Closing Comment

by:Eprs_Admin
ID: 38854593
with the simple ACL and deny I could exclude the whole sub net from scanning.
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses
Course of the Month7 days, 7 hours left to enroll

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question