Appendix B
Sample Configurations
interface vlan 4
passwd secret1969
enable password h1andl0
monitor-interface inside
crypto key generate rsa modulus 1024
ssh 10.0.3.0 255.255.255.0 inside
ssh version 2
Context B Configuration (Primary FWSM—Example 8)
To change to a context configuration, enter the changeto context name command. To change back to the
system, enter changeto system.
interface vlan 201
interface vlan 5
passwd secret1978
enable password 7samura1
monitor-interface inside
monitor-interface outside
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
global (outside) 1 10.0.5.1 netmask 255.255.255.0
! This context uses dynamic PAT for inside users that access the outside
route outside 0 0 10.0.5.5 1
telnet 10.0.2.14 255.255.255.255 inside
access-list INTERNET extended permit ip any any
access-group INTERNET in interface inside
! Allows all inside hosts to access the outside for any IP traffic
Context C Configuration (Primary FWSM—Example 8)
To change to a context configuration, enter the changeto context name command. To change back to the
system, enter changeto system.
interface vlan 202
interface vlan 6
passwd secret0997
enable password strayd0g
monitor-interface inside
monitor-interface outside
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
global (outside) 1 10.0.9.1 netmask 255.255.255.0
! This context uses dynamic PAT for inside users that access the outside
route outside 0 0 10.0.9.5 1
telnet 10.0.1.65 255.255.255.255 inside
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
nameif mgmt
security-level 5
ip address 10.0.3.1 255.255.255.0 standby 10.0.3.2
nameif outside
security-level 0
ip address 10.0.5.1 255.255.255.0 standby 10.0.5.2
asr-group 1
nameif inside
security-level 100
ip address 10.0.2.1 255.255.255.0 standby 10.0.2.2
nameif outside
security-level 0
ip address 10.0.9.1 255.255.255.224 standby 10.0.9.2
asr-group 1
nameif inside
security-level 100
ip address 10.0.1.1 255.255.255.0 standby 10.0.1.2
Failover Example Configurations
B-29