You don’t have this restriction with a Security Plus license. The third VLAN is restricted because you can only configure it to initiate traffic to only one other VLAN.
#8.3.1.2 packet tracer ccna completed lab license#
With the Base License on the ASA 5505, you can only create two active VLANs and a third restricted VLAN.
This one is a bit tricky because of the license that comes with the ASA 5505 on Packet Tracer, i.e. However, IP address is enabled via DHCP so we need to change that to a static configuration. VLAN 2 also exists in the default configuration of the Cisco ASA 5505 and it has been named “outside” with a security level of 0. After removing the configuration, you can then change the IP address. One way to go about it will be to remove only the DHCP pool or to remove the entire DHCP configuration since the task doesn’t say anything about DHCP. The problem is that there is a default DHCP configuration on the ‘inside’ interface as shown below: dhcpd address 192.168.1.5-192.168.1.35 inside
However, if you try to change the IP address of that VLAN interface, you will get an error message: “ Interface address is not on same subnet as DHCP pool. Therefore, the only change we need to make here is the IP address. hostname PKT-ASAīy default, VLAN 1 has already been created on the Cisco ASA 5505 and it has been named “inside” with a security level of 100. Examples include show route as opposed to show ip route and route as opposed to ip route. Actually, many of the commands that have “ip” on the Cisco IOS do not have “ip” on the Cisco ASA. Note: On the Cisco IOS, the equivalent command is ip domain-name. However unlike on the Cisco IOS, we use the domain-name command to configure a domain name on the Cisco ASA. We use the hostname command to configure the hostname on a Cisco ASA just like we do on the Cisco IOS.
Verify your configuration and make sure you can ping all the connected devices from the Cisco ASA.