what is firwall and how to work right now my company having
a cisco firwall ASA 5505.So please how to block some site on
that which form user not able to access site and basic
firwall config and why are we using firwall please jittendra
explain it.can u send me doc of firwall in my gmail id -
dsoni89@gmail.com
Answers were Sorted based on User's Feedback
Answer / mohit mishra
DEAR FOR BLOCKING THE SITES WHAT ALL U NEED TO DO IS URL
FILTERING IN YOUR FIREWALL THIS FILTERING HELPS IN BLOCKING
OF YOUR DESIRED SPECIFIC SITES U WANTS TO BLOCK .....IF U
NEED MORE INFO JUST SEND THE REPLAY OF THIS POST.........I
WILL TELL U HOW TO CONFIGURE........
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / jitu
ok
i am posting the answer i know most of u are beginer only
so it will very difficult to understand
i will try to make it easy
A firewall is a device whic act as a gateway betweeen
insdie (lan) and outsie(internet).
so bacicaly firewall is security device.
priviously cisco introduce firewall with the name or pix in
series of 501 502 and all
now this is out of market and we are using cisco asa beause
this asa have much more fetaure then pix
now basics of asa
a asa have basicaly 4 interface
1 insie
2 outsdie
3 dmz
4 mangment
it colud have more then 4 inerface also
so what ever is name of the interface it is default.you can
change it by urs name also
some basics command for firwall-:
ASA(CONFIG)#INTERFACE FA0/1
#NAMEIF INSIDE
#SECURITY-LEVEL 100
NOTE- SECURITY-LEVEL WHAT IS THIS? THIS IS THE LEVEL
WHICH DEFINED HOW MUCH A INTERFACE IS RELIABLE.
SECURITY-LEVEL IS DIFINED 1 TO 100
100 IS A VERY SECUR LEVEL
0 IS LESS SECURE
ASA(CONFIG)#IP ADDRESS 192.168.100.1 255.255.255.0
ASA(CONFIG)#NO SHUT
ASA(CONFIG)DUPLEX FULL
ASA(CONFIG)#SPEED AUTO
SIMILARLY U CAN CONFIGUR THR INTERFASE
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / dharmendra kumar soni
yes please send the complete doc.
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / dave
Hi Team
First of all big thanks to all of you who take most previous
time and come a step forward to educate other new to this field.
I want to get more details and how to block site on ASA
firewall please send it to my ID - kumarsharmauk83@gmail.com.
Thanks once again n keep it up.. :)
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / jitender(abb)
check your gmail id i have sended the answers which may help
as you requested the doc file i will send it but i have to make it
but i wiil try to send it out
| Is This Answer Correct ? | 0 Yes | 2 No |
Answer / jitender(abb)
check urs gmail id i have sended doc file i will send latter
| Is This Answer Correct ? | 0 Yes | 3 No |
if i had a video conferencing device why should it is needed to configure a static IP for that,will it not work on the local lan.
what is the main features of link state routing protocols?
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
Explain the difference between collision domain and broadcast domain.
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Select the compression protocols for PPP? A. Stac B. Predictor C. Quality D. Magic Number
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.