Solved

asa5510 security

Posted on 2013-02-04
4
273 Views
Last Modified: 2013-02-05
Hi Experts,

we have running a ASA 5510 in our office.
On one leg we use the LAN and on the other leg we have setup a WIFI network.
Inside the ASA we use a CSC module.
But the WIFI leg is also secured by the CSC module.
Is there a way to have the WIFI leg completely unsecured and not scanned for WIFI visitors ?
0
Comment
Question by:Eprs_Admin
  • 2
  • 2
4 Comments
 
LVL 36

Expert Comment

by:ArneLovius
ID: 38854460
If this ASA just to firewall between the LAN and WiFi ?

If it is, then you could just remove the CSC...
0
 

Author Comment

by:Eprs_Admin
ID: 38854487
no, behind the ASA we have a data network and a wifi network.
But the wifi network shouldn't be scanned by csc
0
 
LVL 36

Accepted Solution

by:
ArneLovius earned 500 total points
ID: 38854538
aha, so the ASA is also connected to an external network...

If you follow the documentation, you will see that there will be an ACL to define traffic that gets set to the CSC, simply add deny rules for the traffic that you want to bypass the CSC.

It would be useful if you posted a suitably sanitized copy of the ASA config
0
 

Author Closing Comment

by:Eprs_Admin
ID: 38854593
with the simple ACL and deny I could exclude the whole sub net from scanning.
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Suggested Solutions

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now