Documente Academic
Documente Profesional
Documente Cultură
outside:
received (in 124.650 secs):
295468 packets 167218253 bytes
2370 pkts/sec 1341502 bytes/sec
transmitted (in 124.650 secs):
260901 packets 120467981 bytes
2093 pkts/sec 966449 bytes/sec
inside:
received (in 124.650 secs):
261478 packets 120145678 bytes
2097 pkts/sec 963864 bytes/sec
transmitted (in 124.650 secs):
294649 packets 167380042 bytes
2363 pkts/sec 1342800 bytes/s
Ciscoasa#
show memory
------------- ----------------
Ciscoasa#
show xlate count
Ciscoasa(config)#show xlate
Hands on Layer 2 Switches 2900, 3500 POE Switches, Dell Switches 3048,
3024
Knowledge of VTP, STP, VSS, RSTP, PVST, ether channels /LACP/Port Channel/PAGP
Hands on
Wireless Access Points
Hands On Protocol BGP, HSRP, Site to Site IPSEC VPN, client to Site VPN,
RSA Tokens
1) When you allow accesslist on inbound connection on ASA for NATed ip,you have to apply access
list using real ip address not nated one
2) After inspection happens, it look up for egress interface from NAT statement or routing.
3) By default, egress interface can be identified using NAT statement not using rout lookup. But
you can change it