Configuring an ASA Firewall on Cisco Packet Tracer - Part TWO

  Рет қаралды 34,967

Greg South

Greg South

Күн бұрын

Пікірлер: 81
@kroy5555
@kroy5555 2 жыл бұрын
best explanation of NAT and routing I've seen. Thank you.
@GregSouth
@GregSouth 2 жыл бұрын
Thanks for the feedback @kroy5555
@nhatminham9083
@nhatminham9083 3 жыл бұрын
I just want you to know that I’m a Cyber Security student and working on my network architecture project. I’m stuck when configuring ASA and your video helps a lot. Thank you so much and keep up the good work.
@GregSouth
@GregSouth 3 жыл бұрын
Thanks for the feedback and really pleased to hear the video helped 👍
@samdanquah6704
@samdanquah6704 2 жыл бұрын
@@GregSouth I am a cyber security student as well and I do appreciate your videos and the support you're giving to us. God bless you.
@jean-lucpicard5510
@jean-lucpicard5510 2 жыл бұрын
Were you in your final year?
@nhatminham9083
@nhatminham9083 2 жыл бұрын
@@jean-lucpicard5510 yes I graduated now and working for MSP company. I don't use this software a lot, but it's good to know the basic.
@Al556
@Al556 2 жыл бұрын
Thank you for this series of videos. I'm learning ASA after just completing the CCNA. Seems like a good next step. You're an excellent educator. Sláinte!
@GregSouth
@GregSouth 2 жыл бұрын
Hey Alex! Thanks for the feedback and glad the videos are helping. Good luck with your studies
@rochuolmos
@rochuolmos 3 жыл бұрын
Not all heroes wear capes. Some upload videos on KZbin for students in distress ... THANK YOU
@GregSouth
@GregSouth 2 жыл бұрын
Hi Rocio, thanks for the feedback and really pleased videos helped
@SLonxxxx
@SLonxxxx 4 ай бұрын
Excellent videos mate. Thanks a million.
@GregSouth
@GregSouth 3 ай бұрын
Hey @SCMcDonLon- glad the videos helped and thanks for the feedback! Greg
@hamzanaimi809
@hamzanaimi809 Жыл бұрын
thanks a lot, inspection policies you made at last they made packets able to come back, but still don t understand how it works
@GregSouth
@GregSouth 11 ай бұрын
I have some urls in comments section where can look up more information on these
@bughawpula
@bughawpula 4 жыл бұрын
nice explanation, i like your vids 😊👍 I learned a lot
@nickas222
@nickas222 3 жыл бұрын
BEST EXPLANATION ON THE NET
@ankur9829
@ankur9829 Жыл бұрын
Amazing explanation
@GregSouth
@GregSouth Жыл бұрын
Glad you liked it
@georgez.7278
@georgez.7278 2 жыл бұрын
can you please demonstrate how did you set up the inicial network equipment? and, why did you choos this approach for structuring the network (especialy the edge router's config) also, can you please show how to incorporate more subnets within the Firewall's VLAN 1 apart from that, you are briliant, thank you for the nice tutorials
@GregSouth
@GregSouth 2 жыл бұрын
Hi @George Z In this exercise, I used a the following Cisco Packet Tracer file. You can find it at the following link: - bit.ly/38o8Dxf In this link, I've also uploaded the exercise file that outlines the scenario in more detail. To incorporate more vlans: use the command ‘interface vlan x (x being the number you wish to create) - just a heads up on this, what you may find with creating more vlans you will likely encounter an error if you try and name the vlan - this issue is because of license restrictions on the ASA. With regards to the edge router(router R1), this is configured with a public IP address on it’s G0/0 interface (think of this like the ISP’s router) so that we could configure a default static route on the ASA outside interface to essentially enable the ASA to reach external networks. I hope it helps. Greg
@georgez.7278
@georgez.7278 2 жыл бұрын
@@GregSouth Thank you Greg you are the best
@lemon2524
@lemon2524 Жыл бұрын
This is a beneficial video for me thank you.
@GregSouth
@GregSouth Жыл бұрын
Glad it was helpful!
@315HUGHES
@315HUGHES 4 жыл бұрын
hi does the MPF have (insect icmp) have to be done for every type of traffic for the ASA to allow it through, so for example if i wanted to allow web traffic would i add one to "inspect http"? Thanks, good videos too
@GregSouth
@GregSouth 4 жыл бұрын
Hi Rob, you are correct. If you were to add a web server for example off Router 1 interface (configure up with ip add, subnet mask, default gateway), you should be able to ping (from PC-B) once you have added the inspect icmp rule. However, you would NOT be able to access the web server from PC-B until you added an inspect http rule. Best way of understanding this is to give it a go! Good luck and thanks for the feedback, Greg
@RajeevPrashar
@RajeevPrashar 3 жыл бұрын
Hi Greg South, Thanks for these awesome Videos I am your 1000th Subscriber on KZbin Love from India., your way of explaining is very Good and easy to understand. Please upload CCNA security Videos Complete Playlist from Scratch.
@GregSouth
@GregSouth 3 жыл бұрын
Hi Rajeev, thanks for your comment and also for being my 1000 subscriber. :) Glad you like the content. I have on my to-do list to create more videos soon... I'll keep in mind your idea of CCNA security videos. All the very best. Thanks - Greg
@nguyenquangduy910
@nguyenquangduy910 2 жыл бұрын
Thank you so much!
@niteshtelang4743
@niteshtelang4743 Жыл бұрын
Thank you, Great Video 👍
@GregSouth
@GregSouth Жыл бұрын
Glad you liked it @niteshtelang4743
@lastmoment7906
@lastmoment7906 6 ай бұрын
I have rectified the sound of the video. If anyone interested let me know in comments.
@GregSouth
@GregSouth 3 ай бұрын
Hi @lastmoment7906 - sorry the sound isn't great on this - when i create more videos in the future I'll experiment more with this to try and improve. Thanks for your comments. All the very best. Greg
@simbadurio444
@simbadurio444 3 жыл бұрын
Great labs, both 1 and 2. Quick question, what interface does this lab start with?
@GregSouth
@GregSouth 3 жыл бұрын
Hi - can start with inside interface but really admin choice - keep in mind bigger picture on what your goals are - eg protecting inside pcs & allowing restricted access to dmz
@ravipillay3381
@ravipillay3381 8 ай бұрын
Bless you man.
@pangdv6773
@pangdv6773 2 жыл бұрын
Nice video. If you encounter "policy-map/policy-map of different type exists", you need to enter no policy-map global_policy to delete the policy first
@GregSouth
@GregSouth 2 жыл бұрын
Hi @pang dv - thanks for watching and also the additional info
@mejarmiaw34
@mejarmiaw34 Жыл бұрын
hello i have a problem with the asa. i have an outside vlan with the security level of 0 and inside vlan with security level of 100. I have done the inspection but it still doesn’t work. Please note that the outside interface of the ASA is connected to a router that have a nat dynamic. Could you give me any recommendation to solve my problem. Thank you
@GregSouth
@GregSouth Жыл бұрын
Hi there, my advice here would be to run through the exercise again (particularly focusing on page 8 of PDF) to run through creation of class-map, policy-map and service-policy - missing any of these steps will likely mean the ICMP traffic will not be able to pass through the ASA and return traffic allowed. Best of luck with it.
@captaincommando9839
@captaincommando9839 5 ай бұрын
I spent forever trying to figure out why I couldn't ping through the ASA after the first video while the answer was at the start of this one all along.
@GregSouth
@GregSouth 5 ай бұрын
Hi @captaincommando9839 I really appreciate your feedback! Thanks for watching and commenting - glad you got the answer! Thanks,Greg
@giuseppebigio8308
@giuseppebigio8308 3 жыл бұрын
Great staff! I realized at one point that you must have configured a static route between the R2 and the ASA to allow the icmp reply back to the ASA. I have a question even though it might seem silly: You said that Packet tracer does not have and MPF policy in place by default. I assume that giving the PT represents a simulation, of Cisco devices, this is also true in the real configuration environment? If not, do you know what ASA series already have MPF implemented by deafult? Many thanks again, very informative videolessons Joe
@GregSouth
@GregSouth 3 жыл бұрын
I’ll try test with real hardware and let you know Joe - currently it’s very difficult with lockdown but really appreciate your feedback, Greg
@jean-lucpicard5510
@jean-lucpicard5510 2 жыл бұрын
Can you provide the ips for the other ISP routers as i'm trying re-create this.
@GregSouth
@GregSouth 2 жыл бұрын
Hi Jean, I included Packet Tracer file with part one. All other routers IP addresses can be found by accessing router and running the command ‘show ip interface brief’
@jean-lucpicard5510
@jean-lucpicard5510 2 жыл бұрын
Thank you, I am currently doing my Final Year project in networks and systems support. I am using your set up as a template for my build. which requires a DMZ outward facing server, with an ASA firewall in a sandbox environment. I have done it in a physical form, but due to equipment constraints, and safety requirements, instead of 3 routers, i have just one, and PC b has to be on a trunk since it can not be physically on the ASA side of the lab we are working in, and vlan 2 between the ASA and isp router has to travel via Trunked switches. Not sure if you can attend the open day at Bradford College on the 25th. tutors have asked us to which industry experts we would like to attend.
@namastenewzealand733
@namastenewzealand733 Жыл бұрын
Hi even after doing the NAT on firewall it still shows me the translate_hits=0. how can I fix this problem ?
@GregSouth
@GregSouth Жыл бұрын
Hi @namastenewzealand733 - my advice here would be to first double check you've applied the correct IP addresses to both inside and outside interfaces of the ASA. Then check the NAT config e.g. ASA(config)# object network inside-net ASA(config-network-object)# subnet 192.168.1.0 255.255.255.0 ASA(config-network-object)# nat (inside,outside) dynamic interface ASA(config-network-object)# end Finally, use the simulation tool in Packet Tracer to ping from an inside PC to R2 to check to see the source IP address before it leaves the ASA and after it leaves (you should be able to see the address change from a private one 192.168.x.x to the public address 209.165.200.226). Hope this helps and best of luck with it. Greg
@namastenewzealand733
@namastenewzealand733 Жыл бұрын
@@GregSouth Thanks for your reply. I will do the configuration again and hopefully it will work this time.
@manavrupani2460
@manavrupani2460 4 жыл бұрын
Do you show ip configuration of every device as you gradually ahead in the video
@GregSouth
@GregSouth 4 жыл бұрын
HI Manav, Click the following link - bit.ly/38o8Dxf - there is the sample file available for download so you can try this yourself. It contains the Configuring ASA Basic Settings exercise file and Cisco Packet Tracer file. Best of luck, Greg
@manavrupani2460
@manavrupani2460 4 жыл бұрын
@@GregSouth thanks a lot sir, I appreciate that you helped me and doing such a gr8 job 👍🔥
@mr.compnet2263
@mr.compnet2263 Жыл бұрын
why i cant ping router 2?
@GregSouth
@GregSouth Жыл бұрын
By the end of the exercise you should be able to. Have you tried to troubleshoot e.g. can you ping from PC-C (this should work at the beginning of the exercise). Pinging from PC-B, you will need to have already configured a number of settings on ASA e.g. NAT and default policy map. In addition, default route and inside and outside interfaces will need to be setup correctly too. All the best with it. Greg
@mr.compnet2263
@mr.compnet2263 Жыл бұрын
@@GregSouth I saw my error there's an ospf configured. I miss this one. Now it's okay.
@GregSouth
@GregSouth Жыл бұрын
@@mr.compnet2263 Great stuff - well done
@mark7970
@mark7970 3 жыл бұрын
hi Mr. Greg South! i love watching your videos it is very educational! but i encountered an error along the way in configuring the firewall, when i tried to ping the firewall from outside pc (just like yours), its get stuck on its connected router. What should i do to reach the firewall ? cause i can't reach the dmz, again because the icmp gets stuck on its connected router. I hope you answer my question thank you sir !
@GregSouth
@GregSouth 2 жыл бұрын
Hi Markpotsie, glad you found my videos helpful. Without seeing your network my advice would be to troubleshoot one step at a time- use verification commands such as ‘show ip route’ on each router - does it show the destination route? Also use the simulation tool to help see how far the packet is travelling- best of luck
@OngJY-rv1jh
@OngJY-rv1jh 3 жыл бұрын
Will it be the same to configure the firewall if I'm using IPv6 addressing?
@GregSouth
@GregSouth 3 жыл бұрын
Hi there, I haven't tried this out with IPv6 but hope to create some videos in the near future using IPv6 addressing.
@vim-term
@vim-term Жыл бұрын
👍🔥Fire
@bigjohn697791
@bigjohn697791 3 жыл бұрын
Hi Greg, I am build a Site to Site VPN on Packet Tracer with an ASA5506 Behind the edge routers on both sites Having built this in the real world I am having all sorts of issues with it on packet tracer
@GregSouth
@GregSouth 3 жыл бұрын
Hi there, remember Packet Tracer at end of day is a simulator and has its limitations eg no gui for ASA but I see your point
@juancamilomedinagarzon1375
@juancamilomedinagarzon1375 3 жыл бұрын
hey friend could you help me with my topology it is not working I am doing the same as yours.
@AdithyaVenkatramanRA
@AdithyaVenkatramanRA 3 жыл бұрын
When I am testing the packet is not returning from R2 back to the ASA, it says the destinaton ip is unknown. This happens even after configuring outside route. R1 works well but not the R2 plz help !!!
@GregSouth
@GregSouth 3 жыл бұрын
Keep testing and don’t give up Adithya! This is where you learn the most :)
@ArslanAslam-px4qo
@ArslanAslam-px4qo Жыл бұрын
policy-map global_policy", it returns "ERROR: policy-map/policy-map of different type exists ? solution
@GregSouth
@GregSouth Жыл бұрын
Hi there, my advice here would be to run through the exercise again (particularly focusing on page 8 of PDF) to run through creation of class-map, policy-map and service-policy - missing any of these steps will likely mean the ICMP traffic will not be able to pass through the ASA. Best of luck.
@SamsonMamuye
@SamsonMamuye Ай бұрын
best of best
@Alhabsi911
@Alhabsi911 2 жыл бұрын
how to connect head office to branch.?
@GregSouth
@GregSouth 2 жыл бұрын
Hi @Mohammed - I connect the ASA to R1 using a static route. Commands and original network topology can be found in the following link: bit.ly/38o8Dxf All the best, Greg
@Alhabsi911
@Alhabsi911 2 жыл бұрын
@@GregSouth Thanks bro
@DANITO285
@DANITO285 3 жыл бұрын
thanks
@GregSouth
@GregSouth 3 жыл бұрын
You're welcome Danny!
@nishilS7
@nishilS7 5 ай бұрын
you might be him
@UjjwalGarg-z4c
@UjjwalGarg-z4c 10 ай бұрын
Noob Video maker, always attach source code and link to file, Really disappointed, going to give a huge dislike
@GregSouth
@GregSouth 10 ай бұрын
Hi there - all config is available in first video of series - also pdf available with related commands. Hope this helps
@GregSouth
@GregSouth 10 ай бұрын
@user-xj4jw4zc2r - this may be useful - Configuring an ASA Firewall on Cisco Packet Tracer Click the following link - bit.ly/38o8Dxf for Configuring ASA Basic Settings exercise file and Cisco Packet Tracer file.
@bbs8769
@bbs8769 3 жыл бұрын
Great video loved it, thanks a lot mate
@rayrob5832
@rayrob5832 8 ай бұрын
im doing the same thing on ur design and the mpf is not working 🥲🥲
Configuring an ASA Firewall on Cisco Packet Tracer - Part THREE
11:56
Configuring an ASA Firewall on Cisco Packet Tracer - Part One
19:40
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 147 МЛН
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 2,4 МЛН
Lab 4 Digital communications | Packet Tracer
51:28
LukeChriswalker
Рет қаралды 380
ASA 5506-X Basic Configurations
16:12
Saleh Al-Moghrabi (Sal)
Рет қаралды 51 М.
How to configure OSPF in Cisco Packet - Part ONE
18:52
Greg South
Рет қаралды 56 М.
CCNA DAY 70: OSPF + Default Static Routing Configuration on a Cisco ASA Firewall
17:47
Gurutech Networking Training
Рет қаралды 14 М.
Configuration of Cisco ASA Firewall
33:22
Saurabh IT Corporate Trainer
Рет қаралды 158 М.
Configuration of DHCP on an ASA Firewall - Part FOUR
16:06
Greg South
Рет қаралды 13 М.
Configuring Access Control Lists (ACL) | Cisco ASA Firewalls
28:23
Network Direction
Рет қаралды 57 М.