Solved

asa5510 security

Posted on 2013-02-04
4
289 Views
Last Modified: 2013-02-05
Hi Experts,

we have running a ASA 5510 in our office.
On one leg we use the LAN and on the other leg we have setup a WIFI network.
Inside the ASA we use a CSC module.
But the WIFI leg is also secured by the CSC module.
Is there a way to have the WIFI leg completely unsecured and not scanned for WIFI visitors ?
0
Comment
Question by:Eprs_Admin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:ArneLovius
ID: 38854460
If this ASA just to firewall between the LAN and WiFi ?

If it is, then you could just remove the CSC...
0
 

Author Comment

by:Eprs_Admin
ID: 38854487
no, behind the ASA we have a data network and a wifi network.
But the wifi network shouldn't be scanned by csc
0
 
LVL 37

Accepted Solution

by:
ArneLovius earned 500 total points
ID: 38854538
aha, so the ASA is also connected to an external network...

If you follow the documentation, you will see that there will be an ACL to define traffic that gets set to the CSC, simply add deny rules for the traffic that you want to bypass the CSC.

It would be useful if you posted a suitably sanitized copy of the ASA config
0
 

Author Closing Comment

by:Eprs_Admin
ID: 38854593
with the simple ACL and deny I could exclude the whole sub net from scanning.
0

Featured Post

Get MongoDB database support online, now!

At Percona’s web store you can order your MongoDB database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card. Handle your MongoDB database support now!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of the companies I’ve worked with have embraced cloud solutions due to their desire to “get out of the datacenter business.” The ability to achieve better security and availability, and the speed with which they are able to deploy, is far grea…
During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Suggested Courses
Course of the Month9 days, 15 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question