PrepAway - Latest Free Exam Questions & Answers

use ASDM to accomplish the required ASA configurations to meet the requirements.

CORRECT TEXT
Scenario
Given the new additional connectivity requirements and the topology diagram, use ASDM to accomplish the required ASA configurations to meet the requirements.
New additional connectivity requirements:
Once the correct ASA configurations have been configured:
To access ASDM, click the ASA icon in the topology diagram.
To access the Firefox Browser on the Outside PC, click the Outside PC icon in the topology diagram.
To access the Command prompt on the Inside PC, click the Inside PC icon in the topology diagram.
Note:
After you make the configuration changes in ASDM, remember to click Apply to apply the configuration changes.
Not all ASDM screens are enabled in this simulation, if some screen is not enabled, try to use different methods to configure the ASA to meet the requirements.
In this simulation, some of the ASDM screens may not look and function exactly like the real ASDM.

A.

B.

C.

D.

Explanation:
Answer) Follow the explanation part to get answer on this sim question.

First, for the HTTP access we need to create a NAT object. Here I called it HTTP but it can be given any name.

Then, create the firewall rules to allow the HTTP access:

You can verify using the outside PC to HTTP into 209.165.201.30.
For step two, to be able to ping hosts on the outside, we edit the last service policy shown below:

And then check the ICMP box only as shown below, then hit Apply.

After that is done, we can ping www.cisco.comagain to verify:

4 Comments on “use ASDM to accomplish the required ASA configurations to meet the requirements.

  1. Anon says:

    The NAT configurations are wrong, this should be the other way round.

    172.16.1.2

    Static Translation: 209.165.201.30

    The way you have configured it, doesn’t work.




    0



    0
  2. oleg says:

    Fail the exam yesterday:( (807/860)
    Had this question.
    Made
    static nat (object)
    172.16.1.2 -> 209.165.201.30
    if going dmz -> outside.
    +ACL on outside int 200.165.202.131->172.16.1.2 tcp/80
    But it didn’t work. Don’t no why…

    If You have any ideas, I’d be glad to see…




    0



    0

Leave a Reply