ASA on a Stick Help Please with Cisco ASA 5505

Posted on 2013-10-12
Medium Priority
Last Modified: 2016-06-02
Hi All, I am on here asking help from the internets today.  I have been assigned a task I am not prepared for, or don't have the expertise at all with ASA whatsoever.
I currently have a 2845 router connected to my asa 5505 on port 0/0.  Port 0/1 is connected to a switch the feeds to a bunch of other unmanaged switches.
Router-----Port 0/0 ASA5505 Port 0/1------Switch------ Many computers  (NO VLANS)
I want to do the following
Router----Port 0/0 ASA5505 Port 0/1-----Managed Cisco Swich----Unmanaged Switches

***I already have the managed switch configured for 802.1q trunking and all that other good stuff.
Here is my current config
domain-name BLah.com
enable password BlahEPW encrypted
passwd BPLAH encrypted
name A- description INSIDE_NETWORK
name A- description VPN_PLATINUM2
name A- description VGSUPPORT
name A- description OUTSIDE_NETWORK
interface Ethernet0/0
 description VLAN 2
 switchport access vlan 2
interface Ethernet0/1
 description VLAN 1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
 description Inside
 nameif Inside
 security-level 100
 ip address
interface Vlan2
 description Public
 nameif Public
 security-level 0
 ip address 68.x.x.x
boot system disk0:/asa824-1-k8.bin
ftp mode passive
clock timezone EST -5
clock summer-time edt recurring
dns domain-lookup Inside
dns domain-lookup Public
dns server-group DefaultDNS
 name-server A-
  domain-name Blah.com
same-security-traffic permit intra-interface
object-group service DM_INLINE_TCP_1 tcp
 port-object eq www
 port-object eq https
access-list NoNAT extended permit ip A- log critical
access-list in-out extended permit ip any any
access-list in-out extended permit tcp host any eq smtp
access-list in-out extended permit tcp host any eq smtp
access-list in-out extended permit tcp host any eq smtp
access-list in-out extended permit tcp any eq www any eq www log
access-list in-out extended permit tcp any eq smtp any eq smtp
access-list in-out extended permit tcp any eq https any eq https log
access-list Public_1_cryptomap extended permit ip A- zzz255.255.248.0
access-list nonat extended permit ip A- xxx
pager lines 24
logging enable
logging timestamp
logging emblem
logging list SyslogEvents level alerts
logging console warnings
logging monitor errors
logging buffered emergencies
logging trap errors
logging history errors
logging asdm errors
logging from-address mauricio@terarecon.com
logging host Inside format emblem
logging host Inside x.x.x.x format emblem
logging permit-hostdown
mtu Inside 1500
mtu Public 1500
ip local pool Pool mask
ip verify reverse-path interface Inside
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-625-53.bin
asdm history enable
arp timeout 14400
global (Public) 1 interface
nat (Inside) 0 access-list nonat
nat (Inside) 1
access-group out-in in interface Public
route Public 1
route Public 1
timeout xlate 1:00:00
timeout conn 0:30:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
mac-list 500 permit 001c.2395.9ab5 ffff.ffff.ffff
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http Inside
snmp-server host Inside community ***** version 2c
no snmp-server location
no snmp-server contact
snmp-server community *****
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set chevelle esp-des esp-md5-hmac
crypto ipsec transform-set 3desmd5 esp-3des esp-md5-hmac
crypto ipsec transform-set terarecon esp-des esp-md5-hmac
crypto ipsec transform-set strong esp-3des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map dynmap 100 set transform-set 3desmd5
crypto map vpn 1 match address Public_1_cryptomap
crypto map vpn 1 set peer x.x.x.x
crypto map vpn 1 set transform-set 3desmd5 terarecon strong chevelle
crypto map vpn 100 ipsec-isakmp dynamic dynmap
crypto map vpn interface Public
crypto isakmp identity address
crypto isakmp enable Inside
crypto isakmp enable Public
crypto isakmp policy 1
 authentication pre-share
 encryption 3des
 hash md5
 group 2
 lifetime 86400
crypto isakmp policy 2
 authentication pre-share
 encryption des
 hash md5
 group 1
 lifetime 1000
crypto isakmp policy 10
 authentication pre-share
 encryption des
 hash md5
 group 2
 lifetime 86400
crypto isakmp policy 65535
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp ipsec-over-tcp port 10000
client-update enable
telnet Inside
telnet timeout 5
ssh Inside
ssh timeout 60
ssh version 2
console timeout 0
management-access Inside
no threat-detection basic-threat
threat-detection scanning-threat shun
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
 enable Public
 svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
 svc image disk0:/anyconnect-wince-ARMv4I-2.4.1012-k9.pkg 2
 svc enable
group-policy DfltGrpPolicy attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
username terarecon password vKhU6EpRuuCQRcyQ encrypted
username missiongeek password vrGUIr23/Frg5rdJ encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
 address-pool Pool
 dhcp-server A-
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
 pre-shared-key *****
class-map type inspect http match-all asdm_medium_security_methods
 match not request method head
 match not request method post
 match not request method get
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
  id-mismatch action log
policy-map global_policy
 class inspection_default
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
  inspect dns preset_dns_map
  inspect http
  inspect pptp
  inspect icmp
  inspect ip-options
policy-map type inspect http HTTP_inspection
  protocol-violation action drop-connection
 class asdm_medium_security_methods
service-policy global_policy global
smtp-server x.x.x.x
prompt hostname context
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily

proposed solution
interface Ethernet0/0
description VLAN 2
switchport access vlan 2
 interface Ethernet0/0  
description LAN
no nameif
no security-level
no ip address
interface Ethernet0/0.2  
vlan 2
nameif Inside
security-level 100
ip address
interface Ethernet0/0.3
vlan 3
nameif dev
security-level 100
ip address
interface Ethernet0/0.4  
vlan 4
nameif wireless
security-level 100
ip address
interface Ethernet0/1
description Primary Internet
nameif Public
security-level 0
ip address x.x.x.x
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
global (Public) 1 interface
nat (Inside) 1 10.10.0.
nat (dev) 1
nat (wireless) 1
static (Inside,wireless) netmask
static (Inside,servers) netmask
static (wireless,Inside) netmask
static (wireless,servers) netmask
static (servers,Inside) netmask
static (servers,wireless) netmask

Question by:missiongeek
  • 2
LVL 18

Expert Comment

ID: 39568843
You need to create sub interfaces on the ASA
int e0/1.10
vlan 10
ip address
no shut


Author Comment

ID: 39568866
What if I decide not to do the subinterface route and make 0/3 vlan 3 and 0/4 vlan 4.
Have those two ports connected to the switch 1/0/47 and 1/0/48.  

1. is the above possible?
2. would then that be a trunk? or would that link between the two be an access port?
LVL 47

Accepted Solution

Craig Beck earned 1000 total points
ID: 39569155
Didn't the OP include subinterfaces??

If you go the physical interface route that would work, and would increase the potential bandwidth available between the two VLANs, for example.

If you use physical interfaces they will be access ports, unless you configure subinterfaces on them.
LVL 18

Assisted Solution

Akinsd earned 1000 total points
ID: 39569798
1. is the above possible?

2. would then that be a trunk? or would that link between the two be an access port?
Yes, It would link to the switch as an access port.

Featured Post

Simple Misconfiguration =Network Vulnerability

In this technical webinar, AlgoSec will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. Learn best practices to protect your business from attack.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

619 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question