![cisco asa 5505 license cisco asa 5505 license](https://www.tunnelsup.com/images/anyconnect-licensing.png)
So we need to use a managed switch and plug the AP into a trunk port (So it can see more than 1 VLAN) and then tag two access ports on the switch which connect to two corresponding access ports on the ASA one in each VLAN. A Layer 2 switch that can do trunking (I used a 2940) The non-Sec+ 5505’s don’t have the ability to trunk. A Cisco AP that can host dual SSID’s and is configured to do so (I used a 1230AG) Text in blue are variable names I made up, feel free to change them Insert your relevant information between Just keep in mind that you’ll probably have to deal with some unhappy users who can’t get to their power point stored on the server from time to time. Now that you have that VLAN you can tag it on some other access ports in your conference room for guests to use. Also, this doesn’t have to be just for wireless. This makes it pretty useful as an interface for the guest network. That is it can’t be a real DMZ and connect back to you internal network as well.
![cisco asa 5505 license cisco asa 5505 license](https://www.picclickimg.com/d/l400/pict/153428209294_/Cisco-ASA5505-50-BUN-K9-Firewall-Security-Plus-license-50-Users.jpg)
#Cisco asa 5505 license license#
The thing about the base license ASA’s is that the DMZ can only go one way. The Prod network can get everywhere and the Guest network can only get out to the internet. That is to have an AP (Cisco!) that can host dual SSIDs. Probably one of the larger items I have been getting config requests for is wireless configuration, specifically Guest and Production wireless SSID’s.