


I don't feel this way about all products in the infrastructure, but the firewall I do. For smartnet, I personally think that the ASA is a device to have it on, but really only for the 5510 and above. Again, I never use it (except for packet captures) so I don't really have a dog in that fight.ģ. I don't personally know this and have not verified this. The only limitations that I can think of is that I have been told in the past that the GUI is about 90% of the CLI. He comes from strictly a Check Point background, so he is used to that. I do have a customer that prefers the GUI. But, other people may be different than I am, that is just my thoughts on it. When you do things in a GUI, it does the commands for you in the background, and you can learn HOW to do things without knowing WHY you did them. If you learn the ASA in CLI, you will learn exactly WHAT you are doing and WHY you are doing it. When talking about the ASA, I always use CLI. Hi Javier, good questions! Here is what I would say, although this is personal opinion:ġ. If you already have two VLAN interfaces configured with a nameif command, be sure to enter the no forward interface command before the nameif command on the third interface the adaptive security appliance does not allow three fully functioning VLAN interfaces with the Base license on the ASA 5505 adaptive security appliance. The home network does not need to access the business network, so you can use the no forward interface command on the home VLAN the business network can access the home network, but the home network cannot access the business network. With the Base license, you can only configure a third VLAN if you use this command to limit it.įor example, you have one VLAN assigned to the outside for Internet access, one VLAN assigned to an inside business network, and a third VLAN assigned to your home network. Where number specifies the VLAN ID to which this VLAN interface cannot initiate traffic. Hostname(config-if)# no forward interface vlan number Step 2 (Optional) For the Base license, allow this interface to be the third VLAN by limiting it from initiating contact to one other VLAN using the following command: So, if you have a Base license, what do you have to do to get 3 VLANs working? See below from the Cisco documentation.
