GNS3 Lab Configuring ASA Using ASDM

The purpose of this lab is to provide a more advanced understanding of Cisco’s ASA 5520 Adaptive Security Appliance; The Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. In this lab we will Packet Tracer 6.1 to learn how to configure the ASA as a basic Firewall with the addition of a third zone referred to as a DMZ. This knowledge is essential to passing the CCNA Security exam and will be used in daily in your position as a Cisco network engineer.


In this lab we will use GNS3 to construct a small network using the ASA 5520, which will be separated into three zones Outside, Inside, and DMZ. We will learn to how to add an ASA to GNS3, install and use Cisco’s ASDM.


The outside interface is a public untrusted zone commonly used to connect to public address within the internet. Devices within this zone cannot access devices in the inside or DMZ without permission.


The inside interface is a private trusted interface generally used for local devices using a private address space. To access public address in the outside the private address will need to be translated using NAT or PAT. Device can access devices in the outside or DMZ unless restricted.


In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical sub network that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external attacker only has direct access to equipment in the DMZ, rather than any other part of the network.


Cisco’s ASDM is a simple, GUI-Based Firewall Appliance Management tool that is user friendly and allows the user to configure, monitor, and troubleshoot Cisco firewall appliances and firewall service modules. Ideal for small or simple deployments, the Cisco Adaptive Security Device Manager provides the following:

Setup wizards that help you configure and manage Cisco firewall devices, including the Cisco ASA Adaptive Security Appliances, Cisco PIX appliances, and Cisco Catalyst 6500 Series Firewall Services Modules without cumbersome command-line scripts
Powerful real-time log viewer and monitoring dashboards that provides an at-a-glance view of firewall appliance status and health
Handy troubleshooting features and powerful debugging tools such as packet trace and packet capture.

Learning Objectives:

  • Add the ASA to GNS3.
  • Configure MS Loopback Interface.
  • Install and configure ASDM.
  • Use ASDM to configure the ASA.

Download this lab now for full details:

  Using ASDM with GNS3 (19.0 MiB, 4,999 hits)

  ASA842 for GNS3 (23.6 MiB, 317 hits)
You do not have permission to download this file.

  ASDM 6.4.7 (18.1 MiB, 340 hits)
You do not have permission to download this file.

  Cisco TFTP Server (1.3 MiB, 3,810 hits)

If you have found this lab helpful please help us keep this site running.

; s.parentNode.insertBefore(po, s); })();
You can leave a response, or trackback from your own site.

2 Responses to “GNS3 Lab Configuring ASA Using ASDM”

  1. Obaidullah says:

    Thanks for you help I would learn more things in ASA from there site

  2. When this process is finished, the ASA will write the ASDM image and you will be presented with the prompt where you left off.

Leave a Reply

What is 7 + 12 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)


Powered by WordPress | Designed by: backlinks | Thanks to internet marketing, etiketten drucken and index backlink