Cisco 5505 - ASA Firewall Edition Bundle Quick Start Manual
Also see for 5505 - ASA Firewall Edition Bundle: Configuration guideHardware installation guideCli configuration guideEasy setup guideInstallation guide
Contents |
Note Read the safety warnings in the Regulatory Compliance and Safety Information (RCSI), and follow proper safety procedureswhen performing the steps in this guide. See http://www.cisco.com/go/asadocs for links to the RCSI and other documents.1. Verifying the Package ContentsCisco ASA 5505Power cable(US shown)Power supply adapterBlue console cableYellow Ethernet cableSecurityServicesCard Slot12CONSOLERESETPOWER48 VDC7 POWER over ETHERNET 65 4 3 2 1 0DocumentationCisco ASA 5505FirewallProduct CDCisco ASA 5505Quick StartGuide2. Installing the ChassisThe ASA ships with a default configuration that includes two preconfigured networks (the Inside network and the Outside network)and an Inside interface configured for a DHCP server. Clients on the Inside network obtain a dynamic IP address from the ASA so thatthey can communicate with each other as well as with devices on the Internet.Step 1 Connect one end of a yellow Ethernet cable to Ethernet 0 on the ASA. (By default, Ethernet 0 is the Outside interface.) Connectthe other end to a cable/DSL/ISDN modem (the Outside network).Step 2 Connect your devices (such as PCs, printers, and servers) with Ethernet cables to Ethernet 1 through 7.Note Connect a PC to the ASA so that you can run the Adaptive Security Device Manager (ASDM). See “4. InitialConfiguration Considerations.”Step 3 Connect Power over Ethernet (PoE) devices (such as Cisco IP Phones or network cameras) with Ethernet cables to switch ports6 or 7 (the only ports providing power to PoE devices).If you connect a server (such as a web server) to the ASA, you can use ASDM to make services on that server accessible by internal andexternal users. See “7. (Optional) Allowing Access to Public Servers Behind the ASA.”SecurityServicesCard Slot12POWER48VDC7 POWER over ETHERNET 6 5 4 3 2 1 0ConsoleRESETPorts 1 − 7Inside Network InterfacesPort 0Outside Network InterfaceInternetISP ConnectionOutside NetworkInside NetworkWeb ServerCisco IP Phone PC1233. Powering on and Verifying Interface ConnectivityStep 1 Connect the power supply adaptor to the power cable.Step 2 Connect the rectangular connector of the power supply adaptor to the power connector on the rear panel of the ASA.Step 3 Connect the AC power connector of the power cable to an electrical outlet. (The ASA does not have a power switch. Completingthis step powers on the device.)Step 4 Check the Power LED on the front of the ASA; if it is solid green, the device is powered on.Step 5 Check your management PC to make sure it received an IP address on the 192.168.1.0/24 network using DHCP.Step 6 Check the LINK/ACT indicators to verify interface connectivity.Interface ConnectivityEach Ethernet interface has an LED to indicate a physical link is established. When the LED is solid green, a link is established. Whenthe LED is flashing green, there is network activity.If a LINK/ACT LED is not lit, the link could be down due to a duplex mismatch. If auto-negotiation is disabled, verify you are usinga straight-through Ethernet cable.For a description of all chassis components, see the hardware installation guide on Cisco.com.Cisco ASA 5505 seriesAdaptive Security Appliance00 0 0 0 0 0 0 0LINK/ACT Power Status Active VPN SSC100 MBPSLINK/ACT Indicator Power Indicator4. Initial Configuration ConsiderationsThe ASA ships with a default configuration that, in most cases, is sufficient for your basic deployment. You configure the ASA by usingASDM. ASDM is a graphical interface that allows you to manage the ASA from any location by using a web browser.However, changing certain settings is recommended or required. For example, you should change the following settings from theirdefaults:• The privileged mode (enable) password that is required to administer the ASA through ASDM and the CLI• When using the ASA as a VPN endpoint (using the SSL VPN features):– The hostname, domain name, and DNS server names– Outside interface IP address to a static address– Identity certificate– WINS names when access to Windows file shares is requiredUse the Start up Wizard in ASDM to make these changes. See “6. Running the Startup Wizard.”5. Launching ASDMSee the ASDM release notes on Cisco.com for the requirements to run ASDM.Step 1 On the PC connected to the ASA, launch a web browser.Step 2 In the Address field, enter the following URL:https://192.168.1.1/adminThe Cisco ASDM web page appears.Step 3 Click Run Startup Wizard.Step 4 Accept any certificates according to the dialog boxes that appear. The Cisco ASDM-IDM Launcher appears.Step 5 Leave the username and password fields empty and click OK.The main ASDM window appears and the Startup Wizard opens. See “6. Running the Startup Wizard.”6. Running the Startup WizardRun the Startup Wizard to modify the default configuration so that you can customize the security policy to suit your deployment.Using the startup wizard, you can set the following:Step 1 If the wizard is not already running, in the main ASDM window, choose Wizards > Startup Wizard.Step 2 Follow the instructions in the Startup Wizard to configure your ASA.Step 3 While running the wizard, you can accept the default settings or change them as required. (For information about any wizardfield, click Help.)• Hostname• Domain name• Administrative passwords• Interfaces• IP addresses• Static routes• DHCP server• Network address translation rules• and more... |
Related manuals for Cisco 5505 - ASA Firewall Edition Bundle
Cisco 5505 - ASA Firewall Edition Bundle Installation Manual
Cisco ASA 5505 Quick Start Manual
Cisco PIX 506 - Firewall Quick Start Manual
Cisco 5510 - ASA SSL / IPsec VPN Edition Quick Start Manual
Cisco ASA 5506-X Quick Start Manual
Cisco ASA 5508-X Quick Start Manual
Cisco ASA 5510 Quick Start Manual
Cisco ASA 5580 Quick Start Manual
Cisco ASA 5512-X Quick Start Manual
Cisco ASA 5585-X Quick Start Manual
This manual is suitable for:
Product
Menu
Learn More
Menu
Legal
Menu
Copyright © 2024 OneStart. All Rights Reserved