Cisco 5505 - ASA Firewall Edition Bundle manuals
5505 - ASA Firewall Edition Bundle
Table of contents
- about this guide
- related documentation
- getting started
- using the command line interface
- status bar
- interface configuration
- configuring interfaces
- arp table
- configuring basic settings
- setting the date and time
- configuring dhcp
- configuring a dhcp server
- configuring dynamic dns
- displaying the routing table
- configuring a static route
- deleting static routes
- dynamic nat
- default configuration
- aaa overview
- authentication methods
- installing a certificate
- software updates
- wizard setup
- stateful failover
- interface monitoring
- user authentication
- configuring split tunneling
- configuring port forwarding
- ssl certificates
- ipsec tunnels
- syslog message format
- enabling logging
- configuring snmp traps
- snmp monitoring
- troubleshooting
- ipv6 addresses
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- about this guide
- document conventions
- documentation feedback
- preparing for installation
- RJ-45 to DB-
- general site requirements
- ASA 5505
- Product Overview
- Memory Requirements
- Powering on the ASA 5505
- Installing a Cable Lock
- ASA 5510, ASA 5520, ASA 5540, and ASA 5550
- Rack-Mounting the Chassis
- Setting the Chassis on a Desktop
- Connecting the Interface Cables
- Installing and Replacing the SSM
- Overview
- Installing the 4GE SSM
- Replacing the 4GE SSM
- SFP Module
- Installing the SFP Module
- Removing the SFP Module
- Installing an SSM
- Replacing an SSM
- Maintenance and Upgrade Procedures
- Replacing the Chassis Cover
- Working in an ESD Environment
- Replacing the AC Power Supply
- Installing the DC Model
- cable pinouts
5505 - ASA Firewall Edition Bundle
Table of contents
- about this guide
- applying nat
- getting started
- logging out
- starting asdm
- saving configuration changes
- mac address table
- system configuration
- interface types
- management network
- dynamic routing
- multicast routing
- hardware requirements
- security considerations
- link aggregation control protocol
- power over ethernet
- transparent mode
- configuring basic settings
- setting the date and time
- configuring dhcp
- configuring dynamic dns
- configuring ddns
- displaying the routing table
- configuring ospf
- multicast addresses
- deployment scenarios
- configuration example
- obtaining certificates manually
- configuring telnet access
- configuring a login banner
- configuring a management interface
- default configuration
- ssl handshake failure
- installing certificates
- monitoring qos
- ipv4 and ipv6 support
- operating modes
- initial configuration
- configuring load balancing
- adding a user
- configuring remote management
- configuring the pppoe client
- managing passwords
- ssl vpn
- configuring port forwarding
- remote pc system requirements
- system requirements
- enabling snmp
- troubleshooting tips
- snmp monitoring
- optional configuration procedures
- managing files
- troubleshooting
- capturing packets
- command completion
- ipv6 addresses
- multicast address
5505 - ASA Firewall Edition Bundle
Table of contents
5505 - ASA Firewall Edition Bundle
Table of contents
5505 - ASA Firewall Edition Bundle
Table of contents
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Document Objectives
- related documentation
- CSA Interoperability with the AnyConnect Client and Cisco Secure Desktop
- Ensuring Automatic Installation of AnyConnect Clients
- Replacing a Digital Certificate with a Trusted Certificate
- Where to Find the AnyConnect Client Files to Install
- Disabling Permanent Client Installation
- Enabling DTLS Globally for a Specific Port
- Using the AnyConnect CLI Commands to Connect (Standalone Mode)
- Connecting Using WebLaunch
- Enabling AnyConnect Client Profile Downloads
- Enabling Start Before Logon (SBL) for the AnyConnect Client
- Configuring the ServerList Attribute
- Language Translation (Localization) for User Messages
- Import/Export Language Localization
- Adjusting MTU Size Using CLI
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- Table Of Contents
- about this guide
- document conventions
- product overview
- Chapter 1 Overview
- Installation Overview
- Chapter 2 Preparing for Installation
- Preventing Electrostatic Discharge Damage
- Power Supply Considerations
- Installing the Chassis
- Powering on the Cisco ASA 5505
- Installing a Cable Lock
- Mounting the Chassis
- Rack-Mounting the Chassis
- Installing and Wall-Mounting the Cisco ASA 5505 FIPS Enclosure
- Removing and Replacing the Chassis Cover
- C H A P T E R 4 Maintenance and Upgrade Procedures
- Replacing the Chassis Cover
- Installing and Replacing the SSC
- Installing an SSC
- Replacing an SSC
- Removing the DIMM
- Installing the DIMM
- Verifying the Memory Upgrade
- BaseT Connectors
- Appendix 1 Cable Pinout
- RJ-45 to DB-9
- Gigabit and Fibre Channel Ports
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- before you begin
- deployment planning
- scenario 2: basic installation with dmz
- scenario 3: ipsec remote-access vpn
- scenario 4: site-to-site vpn
- configuration procedures for scenarios
- what to do next
- planning for a vlan configuration
- about physical ports on the asa
- maximum number and types of vlans
- deployment scenarios using vlans
- basic deployment using two vlans
- dmz deployment
- teleworker deployment using three vlans
- Verifying the Package Contents
- PoE Ports and Devices
- Installing the Chassis
- Powering on the Cisco ASA 5505
- Optional Procedures
- Connecting to the Console
- Installing a Cable Lock
- Rear Panel Components
- Table Of Contents
- About the Factory Default Configuration
- About the Adaptive Security Device Manager
- Using the Startup Wizard
- Running the Startup Wizard
- Example DMZ Network Topology
- Configuration Requirements
- Starting ASDM
- Enabling Inside Clients to Communicate with Devices on the Internet
- Enabling Inside Clients to Communicate with the DMZ Web Server
- Address
- Configuring an External Identity for the DMZ Web Server
- Providing Public HTTP Access to the DMZ Web Server
- Example IPSec Remote-Access VPN Network Topology
- Implementing the IPSec Remote-Access VPN Scenario
- Information to Have Available
- Configuring the ASA 5505 for an IPSec Remote-Access VPN
- Selecting VPN Client Types
- Specifying the VPN Tunnel Group Name and Authentication Method
- Specifying a User Authentication Method
- Optional) Configuring User Accounts
- Configuring Address Pools
- Configuring Client Attributes
- Configuring the IKE Policy
- Configuring IPSec Encryption and Authentication Parameters
- Specifying Address Translation Exception and Split Tunneling
- Verifying the Remote-Access VPN Configuration
- example site-to-site vpn network topology
- implementing the site-to-site scenario
- C H A P T E R 8 Scenario: Site-to-Site VPN Configuration
- Configuring the Security Appliance at the Local Site
- Providing Information About the Remote VPN Peer
- Specifying Hosts and Networks
- Viewing VPN Attributes and Completing the Wizard
- Configuring the Other Side of the VPN Connection
- using an asa 5505 as an easy vpn hardware client
- C H A P T E R 9 Scenario: Easy VPN Hardware Client Configuration
- client mode and network extension mode
- configuring the easy vpn hardware client
- configuring advanced easy vpn attributes
- obtaining a 3des/aes license
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- before you begin
- Chapter 1 Before You Begin
- What to Do Next,
- Chapter 2 Deployment Planning
- Scenario 1: Private Network with External Connectivity
- Scenario 2: Basic Installation with DMZ
- Scenario 3: IPsec Remote-Access VPN
- Scenario 4: SSL VPN
- Scenario 6: Easy VPN Hardware Client
- Where to Find Configuration Procedures
- Chapter 3 Planning a VLAN Configuration
- Deployment Scenarios Using VLANs
- DMZ Deployment
- About VLANs
- Verifying the Package Contents
- PoE Ports and Devices
- Connecting to Network Interfaces
- Powering on the ASA 5505
- Setting Up a PC for System Administration
- Optional Procedures
- Installing a Cable Lock
- Ports and LEDs
- Rear Panel Components
- About the Factory Default Configuration
- C H A P T E R 5 Configuring the Adaptive Security Appliance
- Using the Adaptive Security Device Manager for Configuration
- Preparing to Use ASDM
- Gathering Configuration Information for Initial Setup
- Starting ASDM with a Web Browser
- Running the ASDM Startup Wizard
- Basic Network Layout for a DMZ Configuration
- Chapter 6 Scenario: DMZ Configuration
- An Inside User Visits a Web Server on the Internet
- An Internet User Visits the DMZ Web Server
- An Inside User Visits the DMZ Web Server
- Configuring the Security Appliance for a DMZ Deployment
- Configuration Requirements
- Starting ASDM
- Enabling Inside Clients to Communicate with Devices on the Internet
- Enabling Inside Clients to Communicate with the DMZ Web Server
- Translating Internal Client IP Addresses Between the Inside and DMZ Interfaces
- Address
- port forwarding
- Providing Public HTTP Access to the DMZ Web Server
- Example IPsec Remote-Access VPN Network Topology
- C H A P T E R 7 Scenario: IPsec Remote-Access VPN Configuration
- Information to Have Available
- Configuring the ASA 5505 for an IPsec Remote-Access VPN
- Selecting VPN Client Types
- Specifying the VPN Tunnel Group Name and Authentication Method
- Specifying a User Authentication Method
- Optional) Configuring User Accounts
- Configuring Address Pools
- Configuring Client Attributes
- Configuring the IKE Policy
- Configuring IPsec Encryption and Authentication Parameters
- Specifying Address Translation Exception and Split Tunneling
- Verifying the Remote-Access VPN Configuration
- About SSL VPN Client Connections
- Obtaining the Cisco AnyConnect VPN Client Software
- C H A P T E R 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client
- Configuring the ASA 5505 for the Cisco AnyConnect VPN Client
- Specifying the SSL VPN Interface
- Specifying a Group Policy
- Configuring the Cisco AnyConnect VPN Client
- About Clientless SSL VPN
- C H A P T E R 9 Scenario: SSL VPN Clientless Connections
- Example Network with Browser-Based SSL VPN Access
- Implementing the Clientless SSL VPN Scenario
- Configuring the ASA 5505 for Browser-Based SSL VPN Connections
- Creating a Bookmark List for Remote Users
- Verifying the Configuration
- Example Site-to-Site VPN Network Topology
- Implementing the Site-to-Site Scenario
- C H A P T E R 10 Scenario: Site-to-Site VPN Configuration
- Configuring the Security Appliance at the Local Site
- Providing Information About the Remote VPN Peer
- Specifying Hosts and Networks
- Viewing VPN Attributes and Completing the Wizard
- Configuring the Other Side of the VPN Connection
- C H A P T E R 11 Scenario: Easy VPN Hardware Client Configuration
- Client Mode and Network Extension Mode
- Configuring the Easy VPN Hardware Client
- Configuring the Hardware Client
5505 - ASA Firewall Edition Bundle
Table of contents
5505 - ASA Firewall Edition Bundle
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- before you begin
- Understanding VLANS
- Chapter 2 Planning for a VLAN Configuration
- Scenario 1: Inside VLAN with External Connectivity
- Scenario 2: Multiple VLANs
- Scenario 3: Network with an Inside VLAN and Dual ISP Connectivity
- Scenario 4: Private VLAN Services
- Maximum Number and Types of VLANs
- Verifying the Package Contents
- PoE Ports and Devices
- Installing the Chassis
- Powering on the ASA 5505
- Setting Up a PC for System Administration
- Optional Procedures
- Installing a Cable Lock
- Ports and LEDs
- Rear Panel Components
- About the Factory Default Configuration
- C H A P T E R 4 Configuring the Adaptive Security Appliance
- Using the Startup Wizard
- Running the Startup Wizard
- C H A P T E R 5 Scenario: Easy VPN Hardware Client Configuration
- Client Mode and Network Extension Mode
- Configuring the Easy VPN Hardware Client
- Configuring Advanced Easy VPN Attributes
- Example DMZ Network Topology
- Chapter 6 Scenario: DMZ Configuration
- Configuring the Security Appliance for a DMZ Deployment
- Configuration Requirements
- Starting ASDM
- Creating IP Pools for Network Address Translation
- Configuring NAT for Inside Clients to Communicate with the DMZ Web Server
- Configuring NAT for Inside Clients to Communicate with Devices on the Internet
- Configuring an External Identity for the DMZ Web Server
- Providing Public HTTP Access to the DMZ Web Server
- Example IPsec Remote-Access VPN Network Topology
- C H A P T E R 7 Scenario: IPsec Remote-Access VPN Configuration
- Information to Have Available
- Configuring the ASA 5505 for an IPsec Remote-Access VPN
- Selecting VPN Client Types
- Specifying the VPN Tunnel Group Name and Authentication Method
- Specifying a User Authentication Method
- Optional) Configuring User Accounts
- Configuring Address Pools
- Configuring Client Attributes
- Configuring the IKE Policy
- Configuring IPsec Encryption and Authentication Parameters
- Specifying Address Translation Exception and Split Tunneling
- Verifying the Remote-Access VPN Configuration
- Example Site-to-Site VPN Network Topology
- Implementing the Site-to-Site Scenario
- C H A P T E R 8 Scenario: Site-to-Site VPN Configuration
- Configuring the Security Appliance at the Local Site
- Providing Information About the Remote VPN Peer