Cisco Cisco IPS 4360 Sensor Libro blanco
28
Firewall
August 2012 Series
28
Procedure 3
ASA with trunked Internet access
If you are configuring the ASA outside connectivity for a trunked single ISP
design complete option 1. If using a trunked dual ISP design, then complete
both option 1 and then option 2 for the second ISP.
design complete option 1. If using a trunked dual ISP design, then complete
both option 1 and then option 2 for the second ISP.
Option 1. Using a Single ISP, trunked design
Step 1:
From a client on the internal network, navigate to the firewall’s
inside IP address, and then launch the Cisco ASA Security Device Manager.
(Example: https://ie-asa5545.cisco.local/)
(Example: https://ie-asa5545.cisco.local/)
Step 2:
In
Configuration > Device Setup > Interfaces
, click the interface
that is connected to the outside switch. (Example: GigabitEthernet0/3)
Step 3:
Click
Edit
.
Step 4:
In the Edit Interface dialog box, select
Enable Interface
, and then
click
OK
.
Step 5:
On the Interface pane, click
Add > Interface
.
Step 6:
In the Add Interface dialog box, in the
Hardware Port
list, select the
interface enabled in Step 4. (Example: GigabitEthernet0/3)
Step 7:
In the
VLAN ID
box, enter the VLAN number for the primary Internet
VLAN. (Example: 16)
Step 8:
In the
Subinterface ID
box, enter the VLAN number for the primary
Internet VLAN. (Example: 16)
Step 9:
Enter an
Interface Name
. (Example: outside-16)
Step 10:
In the
Security Level
box, enter a value of
0
.
Step 11:
Enter the interface
IP Address
. (Example: 172.16.130.124)
Step 12:
Enter the interface
Subnet Mask
, and then click
OK
. (Example:
255.255.255.0)
Step 13:
On the Interface pane, click
Apply
.
Step 14:
Navigate to
Configuration > Device Management > High
Availability > Failover.
Step 15:
On the
Interfaces
tab, in the
Standby IP Address
column,
enter the IP address of the standby unit for the interface you just created.
(Example: 172.16.130.123)
(Example: 172.16.130.123)