what is firwall and how to work right now my company having
a cisco firwall ASA 5505.So please how to block some site on
that which form user not able to access site and basic
firwall config and why are we using firwall please jittendra
explain it.can u send me doc of firwall in my gmail id -
dsoni89@gmail.com

Answers were Sorted based on User's Feedback



what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / mohit mishra

DEAR FOR BLOCKING THE SITES WHAT ALL U NEED TO DO IS URL
FILTERING IN YOUR FIREWALL THIS FILTERING HELPS IN BLOCKING
OF YOUR DESIRED SPECIFIC SITES U WANTS TO BLOCK .....IF U
NEED MORE INFO JUST SEND THE REPLAY OF THIS POST.........I
WILL TELL U HOW TO CONFIGURE........

Is This Answer Correct ?    2 Yes 0 No

what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / jitu

ok
i am posting the answer i know most of u are beginer only
so it will very difficult to understand
i will try to make it easy

A firewall is a device whic act as a gateway betweeen
insdie (lan) and outsie(internet).
so bacicaly firewall is security device.
priviously cisco introduce firewall with the name or pix in
series of 501 502 and all
now this is out of market and we are using cisco asa beause
this asa have much more fetaure then pix

now basics of asa
a asa have basicaly 4 interface
1 insie
2 outsdie
3 dmz
4 mangment
it colud have more then 4 inerface also
so what ever is name of the interface it is default.you can
change it by urs name also

some basics command for firwall-:

ASA(CONFIG)#INTERFACE FA0/1
#NAMEIF INSIDE
#SECURITY-LEVEL 100

NOTE- SECURITY-LEVEL WHAT IS THIS? THIS IS THE LEVEL
WHICH DEFINED HOW MUCH A INTERFACE IS RELIABLE.

SECURITY-LEVEL IS DIFINED 1 TO 100

100 IS A VERY SECUR LEVEL

0 IS LESS SECURE
ASA(CONFIG)#IP ADDRESS 192.168.100.1 255.255.255.0
ASA(CONFIG)#NO SHUT
ASA(CONFIG)DUPLEX FULL
ASA(CONFIG)#SPEED AUTO
SIMILARLY U CAN CONFIGUR THR INTERFASE

Is This Answer Correct ?    1 Yes 1 No

what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / dharmendra kumar soni

yes please send the complete doc.

Is This Answer Correct ?    0 Yes 0 No

what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / dave

Hi Team

First of all big thanks to all of you who take most previous
time and come a step forward to educate other new to this field.

I want to get more details and how to block site on ASA
firewall please send it to my ID - kumarsharmauk83@gmail.com.

Thanks once again n keep it up.. :)

Is This Answer Correct ?    0 Yes 0 No

what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / jitender(abb)

check your gmail id i have sended the answers which may help
as you requested the doc file i will send it but i have to make it
but i wiil try to send it out

Is This Answer Correct ?    0 Yes 2 No

what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how ..

Answer / jitender(abb)

check urs gmail id i have sended doc file i will send latter

Is This Answer Correct ?    0 Yes 3 No

Post New Answer

More CCNA Interview Questions

What port does rip use?

0 Answers  


Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length

1 Answers  


Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config

1 Answers  


To monitor IP igrp traffic, you can use "debug IP igrp transaction" or "debug IP igrp events". How do you display information about IPX routing update packets? A. debug routing B. debug ipx transaction C. debug ipx routing activity D. debug ipx events

2 Answers  


Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 way handshake

2 Answers  






You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID

1 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

2 Answers  


In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as? A.) Psychic B.) ESP C.) Inverse ARP D.) Hello E.) Reverse ARP F.) Autosense

2 Answers  


Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know

1 Answers  


What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information

1 Answers  


Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3

2 Answers  


Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102

1 Answers  


Categories