Results 1 to 6 of 6

Thread: Cisco ASA 5505.

  1. #1
    <<== UT3 Player spoon_'s Avatar
    Join Date
    Nov 2008
    Location
    London
    Posts
    2,071
    Thanks
    113
    Thanked
    139 times in 131 posts

    Cisco ASA 5505.

    Is anyone using ASA 5505/5510 at home for their cable connection at all?

    If you do please speak up!


    Adrian

  2. #2
    Jay
    Jay is offline
    Gentlemen.. we're history Jay's Avatar
    Join Date
    Aug 2006
    Location
    Jita
    Posts
    8,365
    Thanks
    304
    Thanked
    568 times in 409 posts

    Re: Cisco ASA 5505.

    not for cable no but I do have my ADSL on a 5505
    □ΞVΞ□

  3. #3
    Senior Member Shad's Avatar
    Join Date
    Jul 2003
    Location
    In front
    Posts
    2,782
    Thanks
    23
    Thanked
    42 times in 25 posts

    Re: Cisco ASA 5505.

    It only has 10/100mb ports doesn't it? Starting to be a limit for cable connections assuming you're looking for top speeds.

    How does it compare to the RV220W?
    Simon


  4. #4
    <<== UT3 Player spoon_'s Avatar
    Join Date
    Nov 2008
    Location
    London
    Posts
    2,071
    Thanks
    113
    Thanked
    139 times in 131 posts

    Re: Cisco ASA 5505.

    Thanks guys, I managed to figure out how to NAT in IOS > 8.3 - they've completely change things around.

    The only issue I now have is with DNS, all of my resources point at the DC for local name resolution and DC has a conditional forwarder pointing back at ASA. Not when DNS query passes from the DC to ASA and out to my ISP servers on the way back it gets blocked and resolution doesn't happen...

    One way around this is to deploy local DNS to just forward DNS queries. Its a shame ASA cannot do forwarding, kinda understandable as its a firewall not a router.

    Been reading some way around it using static NAT but haven't actually tried any workarounds.

    Are you guys experiencing similar issues?

    It would, obviously, not be a problem if I didn't have a DC and pointed at public DNS server but that's not the case.

    @Shad

    Yeah its 100Mbps but there is nothing stopping you from using two ports for untrusted VLAN and a switch in between? Just a thought though..

  5. #5
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,935
    Thanks
    171
    Thanked
    384 times in 311 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: Cisco ASA 5505.

    Quote Originally Posted by spoon_ View Post
    Thanks guys, I managed to figure out how to NAT in IOS > 8.3 - they've completely change things around.

    The only issue I now have is with DNS, all of my resources point at the DC for local name resolution and DC has a conditional forwarder pointing back at ASA. Not when DNS query passes from the DC to ASA and out to my ISP servers on the way back it gets blocked and resolution doesn't happen...

    One way around this is to deploy local DNS to just forward DNS queries. Its a shame ASA cannot do forwarding, kinda understandable as its a firewall not a router.

    Been reading some way around it using static NAT but haven't actually tried any workarounds.

    Are you guys experiencing similar issues?

    It would, obviously, not be a problem if I didn't have a DC and pointed at public DNS server but that's not the case.
    That sounds completely wrong to me.

    If it's a windows DC, conditional forwarding isn't necessary. Just use a plain forwarder. Use your ISP's DNS servers as the forwarders or Googles etc (8.8.8.8 and 8.8.4.4)

    On the ASA, Simply allow DNS from the DC to the outside world - you don't even need to specify protocols, ports etc - use "DNS" in the ACL on the inside interface instead of UDP 53 and it should work. IIRC, the 5505 will allow the responses through the outside interface without the ACL but I may be wrong.

    If you're having trouble using the ASA as a pseudo DNS server, doing the above avoids using it for DNS at all and is nice and simple.
    Static NAT in this case isn't necessary - only if you are publishing services to the internet
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  6. #6
    <<== UT3 Player spoon_'s Avatar
    Join Date
    Nov 2008
    Location
    London
    Posts
    2,071
    Thanks
    113
    Thanked
    139 times in 131 posts

    Re: Cisco ASA 5505.

    Few things here.

    On 2008/R2 DCs you need to be able to resolve the name of whatever you're forwarding to so public DNS won't work (static A records doesn't help either)

    Terminology failed me here, its a plain forwarder I meant not conditional.

    On ASA, as far as I know, once you set a rule to get out through WAN you don't need one to get back in - it automatically allows this in.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •