index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
23
Requirements and Prerequisites for ASA Virtual Clustering 584 Guidelines for ASA Virtual Clustering 585 Deploy the Cluster in AWS 586 AWS Gateway Load Balancer and Geneve Single-Arm Proxy 586 Sample Topology 587 End-to-End Process for Deploying ASA Virtual Cluster on AWS 587 Templates 589 Deploy the Stack in AWS Using ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
24
Features Applied to Individual Nodes 616 AAA for Network Access and Clustering 616 Connection Settings and Clustering 616 Dynamic Routing and Clustering 616 FTP and Clustering 617 ICMP Inspection and Clustering 618 Multicast Routing and Clustering 618 NAT and Clustering 618 SCTP and Clustering 620 SIP Inspection and Cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
25
Auto-MDI/MDIX Feature 631 Management Interface 632 Management Interface Overview 632 Management Slot/Port Interface 632 Use Any Interface for Management-Only Traffic 633 Management Interface for Transparent Mode 633 Guidelines for Basic Interface Configuration 633 Default Settings for Basic Interface Configuration 634 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
26
Examples for Switch Ports 658 Routed Mode Example 659 Transparent Mode Example 659 Mixed Firewall Interface/Switch Port Example 660 Integrated Routing and Bridging Example 660 Failover Example 662 History for Switch Ports 663 CHAPTER 1 6 EtherChannel Interfaces 665 About EtherChannels 665 About EtherChannels 665 Channe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
27
About VLAN Subinterfaces 683 Licensing for VLAN Subinterfaces 683 Guidelines and Limitations for VLAN Subinterfaces 684 Default Settings for VLAN Subinterfaces 685 Configure VLAN Subinterfaces and 802.1Q Trunking 685 Monitoring VLAN Subinterfaces 687 Examples for VLAN Subinterfaces 687 History for VLAN Subinterfaces 68...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
28
Allow Gateway Load Balancer Health Checks 706 Monitoring VXLAN Interfaces 707 Examples for VXLAN Interfaces 709 Transparent VXLAN Gateway Example 710 VXLAN Routing Example 712 History for VXLAN Interfaces 713 CHAPTER 2 0 Routed and Transparent Mode Interfaces 715 About Routed and Transparent Mode Interfaces 715 Securit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
29
Interface Statistics and Information 741 DHCP Information 741 PPPoE 744 IPv6 Neighbor Discovery 745 Examples for Routed and Transparent Mode Interfaces 746 Transparent Mode Example with 2 Bridge Groups 746 Switched LAN Segment Example with 2 Bridge Groups 746 History for Routed and Transparent Mode Interfaces 749 CHAPT...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
30
Asymmetric Routing 764 Lost Route 764 Load Balancing 765 Per-Zone Connection and Routing Tables 766 ECMP Routing 766 Non-Zoned ECMP Support 766 Zoned ECMP Support 767 How Connections Are Load-Balanced 767 Falling Back to a Route in Another Zone 767 Interface-Based Security Policy 767 Supported Services for Traffic Zone...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
31
Set the Date and Time Manually 787 Configure Precision Time Protocol (ISA 3000) 788 Configure the Master Passphrase 790 Add or Change the Master Passphrase 790 Disable the Master Passphrase 792 Remove the Master Passphrase 793 Configure the DNS Servers 794 Configure the Hardware Bypass and Dual Power Supply (Cisco ISA ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
32
History for DHCP and DDNS Services 828 CHAPTER 2 5 Digital Certificates 831 About Digital Certificates 831 Public Key Cryptography 832 Certificate Scalability 832 Key Pairs 833 Trustpoints 833 Certificate Enrollment 833 Proxy for SCEP Requests 834 Revocation Checking 834 Supported CA Servers 834 CRLs 835 OCSP 836 Certi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
33
CHAPTER 2 6 ARP Inspection and the MAC Address Table 869 About ARP Inspection and the MAC Address Table 869 ARP Inspection for Bridge Group Traffic 869 MAC Address Table 870 Default Settings 870 Guidelines for ARP Inspection and the MAC Address Table 870 Configure ARP Inspection and Other ARP Parameters 871 Add a Stati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
34
Dynamic Routing in Spanned EtherChannel Mode 887 Dynamic Routing in Individual Interface Mode 888 Dynamic Routing in Multiple Context Mode 889 Route Resource Management 889 Routing Table for Management Traffic 889 Management Interface Identification 890 Equal-Cost Multi-Path (ECMP) Routing 891 Disable Proxy ARP Request...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
35
Load Sharing 907 Implementation of PBR 907 Guidelines for Policy Based Routing 907 Configure Policy Based Routing 909 Examples for Policy Based Routing 912 Examples for Route Map Configuration 912 Example Configuration for PBR 914 Direct Internet Access using Software-Defined WAN 915 Policy Based Routing in Action 917 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
36
Configure BFD Maps 936 Monitoring for BFD 937 History for BFD Routing 938 CHAPTER 3 2 BGP 939 About BGP 939 When to Use BGP 939 Routing Table Changes 939 BGP Path Selection 941 BGP Multipath 941 Guidelines for BGP 942 Configure BGP 943 Enable BGP 943 Define the Best Path for a BGP Routing Process 945 Configure Policy L...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
37
History for BGP 977 CHAPTER 3 3 OSPF 979 About OSPF 979 OSPF Support for Fast Hello Packets 981 Prerequisites for OSPF Support for Fast Hello Packets 981 About OSPF Support for Fast Hello Packets 981 Implementation Differences Between OSPFv2 and OSPFv3 982 Guidelines for OSPF 982 Configure OSPFv2 985 Configure a Key Ch...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
38
Configure OSPFv3 Passive Interfaces 1016 Configure OSPFv3 Administrative Distance 1016 Configure OSPFv3 Timers 1017 Define Static OSPFv3 Neighbors 1019 Reset OSPFv3 Default Parameters 1020 Send Syslog Messages 1021 Suppress Syslog Messages 1021 Calculate Summary Route Costs 1022 Generate a Default External Route into a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
39
IS-IS Shutdown Protocol 1045 Prerequisites for IS-IS 1045 Guidelines for IS-IS 1045 Configure IS-IS 1046 Enable IS-IS Routing Globally 1046 Enable IS-IS Authentication 1050 Configure IS-IS LSP 1053 Configure IS-IS Summary Addresses 1057 Configure IS-IS Passive Interfaces 1058 Configure IS-IS Interfaces 1059 Configure I...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
40
Disable Automatic Route Summarization 1104 Configure Default Information in EIGRP 1105 Disable EIGRP Split Horizon 1106 Restart the EIGRP Process 1107 Monitoring for EIGRP 1107 Example for EIGRP 1108 History for EIGRP 1109 CHAPTER 3 6 Multicast Routing 1111 About Multicast Routing 1111 Stub Multicast Routing 1111 PIM M...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
41
Configure the Designated Router Priority 1123 Configure and Filter PIM Register Messages 1123 Configure PIM Message Intervals 1124 Filter PIM Neighbors 1124 Configure a Bidirectional Neighbor Filter 1125 Configure the ASA as a Candidate BSR 1126 Configure a Multicast Boundary 1126 Monitoring for PIM 1127 Example for Mu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
42
Supported IETF RADIUS Authorization Attributes 1154 RADIUS Accounting Disconnect Reason Codes 1155 Guidelines for RADIUS Servers for AAA 1156 Configure RADIUS Servers for AAA 1156 Configure RADIUS Server Groups 1157 Add a RADIUS Server to a Group 1160 Monitoring RADIUS Servers for AAA 1163 History for RADIUS Servers fo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
43
CHAPTER 4 1 Kerberos Servers for AAA 1183 Guidelines for Kerberos Servers for AAA 1183 Configure Kerberos Servers for AAA 1183 Configure Kerberos AAA Server Groups 1183 Add Kerberos Servers to a Kerberos Server Group 1185 Configure Kerberos Key Distribution Center Validation 1186 Monitor Kerberos Servers for AAA 1187 H...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
44
Configure AAA for System Administrators 1217 Configure Management Authentication 1217 About Management Authentication 1217 Configure Authentication for CLI and ASDM Access 1219 Configure Enable Authentication (Privileged EXEC Mode) 1219 Configure ASDM Certificate Authentication 1220 Control CLI and ASDM Access with Man...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
45
Erase the Flash File System 1259 Configure File Access 1259 Configure the FTP Client Mode 1259 Configure the ASA Secure Copy Client 1259 Configure the ASA TFTP Client Path 1261 Copy a File to the ASA 1262 Copy a File to the Startup or Running Configuration 1264 Set the ASA Image, ASDM, and Startup Configuration 1266 Ba...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
46
Configure the EEM 1293 Create an Event Manager Applet and Configure Events 1293 Configure an Action and Destinations for Output from an Action 1295 Run an Event Manager Applet 1297 Track Memory Allocation and Memory Usage 1297 Examples for the EEM 1300 Monitoring the EEM 1301 History for the EEM 1302 CHAPTER 4 6 Testin...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
47
Test Your Configuration 1318 Test Basic Connectivity: Pinging Addresses 1318 What You Can Test Using Ping 1318 Choosing Between ICMP and TCP Ping 1319 Enable ICMP 1319 Ping Hosts 1320 Test ASA Connectivity Systematically 1321 Trace Routes to Hosts 1324 Make the ASA Visible on Trace Routes 1325 Determine Packet Routes 1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
48
Send Syslog Messages to the Console Port 1352 Send Syslog Messages to an SNMP Server 1352 Send Syslog Messages to a Telnet or SSH Session 1353 Configure Syslog Messages 1353 Show or Hide Invalid Usernames in Syslogs 1353 Include the Date and Time in Syslog Messages 1354 Disable a Syslog Message 1354 Change the Severity...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
49
Application Services and Third-Party Tools 1376 Guidelines for SNMP 1376 Configure SNMP 1380 Enable the SNMP Agent and SNMP Server 1380 Configure SNMP Traps 1381 Configure a CPU Usage Threshold 1382 Configure a Physical Interface Threshold 1383 Configure Parameters for SNMP Version 1 or 2c 1383 Configure Parameters for...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
50
About Anonymous Reporting 1415 DNS Requirement 1416 About Smart Call Home 1416 Subscribe to Alert Groups 1417 Attributes of Alert Groups 1417 Messages Sent to Cisco by Alert Groups 1418 Message Severity Threshold 1420 Subscription Profiles 1421 Guidelines for Anonymous Reporting and Smart Call Home 1422 Configure Anony...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
51
Command-Line Editing 1444 Command Completion 1444 Command Help 1444 View the Running Configuration 1445 Filter show and more Command Output 1445 Redirecting and Appending show Command Output 1446 Getting a Line Count for show Command Output 1446 Command Output Paging 1447 Add Comments 1447 Text Configuration Files 1448...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
52
Protocols and Applications 1460 TCP and UDP Ports 1461 Local Ports and Protocols 1465 ICMP Types 1466 CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 liii Contents
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
53
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 liv Contents
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
54
About This Guide The following topics explain how to use this guide. • Document Objectives, on page lv • Related Documentation, on page lv • Document Conventions, on page lv • Communications, Services, and Additional Information, on page lvii Document Objectives The purpose of this guide is to help you configure genera...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
55
Convention Indication Variables, for which you supply values, are presented in an italic typeface. Italic type is also used for document titles, and for general emphasis. italic Terminalsessions and information that the system displays appear in monospace type. monospace Required alternative keywords are grouped in bra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
56
Communications, Services, and Additional Information • To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager. • To get the business impact you’re looking for with the technologies that matter, visit Cisco Services. • To submit a service request, visit Cisco Support. • To discover and brow...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
57
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 lviii About This Guide Communications, Services, and Additional Information
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
58
P ART I Getting Started with the ASA • Introduction to the Secure Firewall ASA, on page 1 • Getting Started, on page 11 • Licenses: Product Authorization Key Licensing for the ISA 3000, on page 45 • Licenses: Smart Software Licensing, on page 85 • Logical Devices for the Firepower 4100/9300, on page 165 • Transparent o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
59
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
60
CHAPTER 1 Introduction to the Secure Firewall ASA The Secure Firewall ASA provides advanced stateful firewall and VPN concentrator functionality in one device. The ASA includes many advanced features, such as multiple security contexts (similar to virtualized firewalls), clustering (combining multiple firewalls into a ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
61
New Features in ASA 9.19(1) Released: November 29, 2022 Feature Description Platform Features Secure Firewall 3105 We introduced the ASA for the Secure Firewall 3105. You can now deploy the ASA virtual Auto Scale Solution with Gateway Load Balancer on Microsoft Azure. See the Interfaces features for more information. A...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
62
Feature Description When you set the FEC to Auto on the Secure Firewall 3100 fixed ports, the default type is now set to cl108-rs instead of cl74-fc for 25 GB SR, CSR, and LR transceivers. New/Modified commands: fec Default Forward Error Correction (FEC) onSecureFirewall 3100 fixed ports changed to cl108-rs from cl74-f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
63
Feature Description SecureFirewall ASA now supports dualstack IPrequest from IKEv2 third-party remote access VPN clients. If the third-party remote access VPN client requests for both IPv4 and IPv6 addresses, ASA can now assign both IPversion addresses using multiple traffic selectors. This feature enables third-party ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
64
• NAT can resolve IP routing problems by supporting overlapping IP addresses. Protecting from IP Fragments The ASA provides IP fragment protection. This feature performs full reassembly of all ICMP error messages and virtual reassembly of the remaining IP fragments that are routed through the ASA. Fragments that fail t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
65
The host database tracks suspicious activity such as connections with no return activity, access of closed service ports, vulnerable TCP behaviors such as non-random IPID, and many more behaviors. You can configure the ASA to send system log messages about an attacker or you can automatically shun the host. Firewall Mo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
66
• Establishing sessions in the “fast path” The ASA creates forward and reverse flows in the fast path for TCP traffic; the ASA also creates connection state information for connectionless protocols like UDP, ICMP (when you enable ICMP inspection), so that they can also use the fast path. For other IP protocols, like SC...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
67
• Authenticates users • Assigns user addresses • Encrypts and decrypts data • Manages security keys • Manages data transfer across the tunnel • Manages data transfer inbound and outbound as a tunnel endpoint or router The ASA invokes various standard protocols to accomplish these functions. Security Context Overview Yo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
68
conjunction with the dynamic database from the Cisco update server, or by providing WCCP services for the Cisco Web Security Appliance. Some of these special services are covered in separate guides: • Cisco ASA Botnet Traffic Filter Guide • Cisco ASA NetFlow Implementation Guide • Cisco ASA Unified Communications Guide...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
69
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 10 Getting Started with the ASA Special and Legacy Services
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
70
CHAPTER 2 Getting Started This chapter describes how to get started with your ASA. • Access the Console for the Command-Line Interface, on page 11 • Configure ASDM Access, on page 17 • Start ASDM, on page 20 • Factory Default Configurations, on page 22 • Set the Firepower 2100 to Appliance or Platform Mode, on page 36 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
71
ciscoasa> This prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode. Step 3 Access privileged EXEC mode. enable You are prompted to change the password the first time you enter the enable command: Example: ciscoasa> enable Password: The enable password is not set. Pleas...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
72
Procedure Step 1 Connect your management computer to the console port. The Firepower 2100 ships with a DB-9 to RJ-45 serial cable, so you will need a third party serial-to-USB cable to make the connection. Be sure to install any necessary USB serial drivers for your operating system. Use the following serial settings: ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
73
You can begin to configure the ASA from global configuration mode. To exit global configuration mode, enter the exit, quit, or end command. Step 5 To return to the FXOS console, enter Ctrl+a, d. Step 6 If you SSH to the ASA (after you configure SSH access in the ASA), connect to the FXOS CLI. connect fxos You are promp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
74
You connect to the ASA CLI. There are no user credentials required for console access by default. Step 2 Access privileged EXEC mode. enable You are prompted to change the password the first time you enter the enable command. Example: ciscoasa> enable Password: The enable password is not set. Please set it now. Enter P...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
75
ciscoasa# Access the ASA Console on the Firepower 4100/9300 Chassis For initial configuration, accessthe command-line interface by connecting to theFirepower 4100/9300 chassis supervisor (either to the console port or remotely using Telnet orSSH) and then connecting to the ASA security module. Procedure Step 1 Connect ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
76
Example: asa# configure terminal asa(config)# To exit global configuration mode, enter the disable, exit, or quit command. Step 4 Exit the application console to the FXOS module CLI by entering Ctrl-a, d You might want to use the FXOS module CLI for troubleshooting purposes. Step 5 Return to the supervisor level of the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
77
• Firepower 4100/9300—The Management type interface and IPaddress of your choice defined when you deployed. Management hosts are allowed from any network. • ASA Virtual—Management 0/0 (set during deployment). Management hosts are limited to the management network. • ISA 3000—Management 1/1 (192.168.1.1). Management hos...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
78
interface interface_id nameif name security-level level no shutdown ip address ip_address mask Example: ciscoasa(config)# interface management 0/0 ciscoasa(config-if)# nameif management ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# ip address 192.168.1.1 255.255.255.0 The...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
79
When prompted, confirm that you want to convert the existing configuration to be the admin context. You are then prompted to reload the ASA. Examples The following configuration converts the firewall mode to transparent mode, configures the Management 0/0 interface, and enables ASDM for a management host: firewall tran...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
80
ASDM stores files in the local \Users\<user_id>\.asdm directory, including cache, log, and preferences, and also in the Temp directory, including Secure Client profiles. Procedure Step 1 On the computer that you specified as the ASDM client, enter the following URL: https://asa_ip_address/admin Be sure to specify https...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
81
a username and password at the login screen (instead of leaving the username blank), ASDM checks the local database for a match. Factory Default Configurations The factory default configuration is the configuration applied by Cisco to new ASAs. • Firepower 1010—The factory default configuration enables a functional ins...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
82
Restore the Factory Default Configuration This section describes how to restore the factory default configuration. For the ASA virtual, this procedure erases the deployment configuration and applies the following configuration: interface management 0/0 ip address 192.168.1.1 255.255.255.0 nameif management security-lev...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
83
• Firepower 2100 in Platform mode—Sets the management interface IP address. • Secure Firewall 3100—Sets the inside interface IP address. • Firepower 4100/9300—No effect. • ASA Virtual—Sets the management interface IP address. • ISA 3000—Sets the management interface IP address. The http command uses the subnet you spec...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
84
This command saves the running configuration to the default location for the startup configuration, even if you previously configured the boot config command to set a different location; when the configuration was cleared, this path was also cleared. Restore the ASA Virtual Deployment Configuration This section describ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
85
• ASDM access—Management and inside hosts allowed. Management hosts are limited to the 192.168.45.0/24 network, and inside hosts are limited to the 192.168.1.0/24 network. • NAT—Interface PAT for all traffic from inside to outside. • DNS servers—OpenDNS servers are pre-configured. The configuration consists of the foll...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
86
interface Ethernet1/8 no shutdown switchport switchport mode access switchport access vlan 1 ! object network obj_any subnet 0.0.0.0 0.0.0.0 nat (any,outside) dynamic interface ! dhcpd auto_config outside dhcpd address 192.168.1.20-192.168.1.254 inside dhcpd address 192.168.45.10-192.168.45.12 management dhcpd enable i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
87
no shutdown ! interface Ethernet1/2 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 no shutdown ! object network obj_any subnet 0.0.0.0 0.0.0.0 nat (any,outside) dynamic interface ! http server enable http 0.0.0.0 0.0.0.0 management http 192.168.1.0 255.255.255.0 inside ! dhcpd auto_config outside...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
88
The configuration consists of the following commands: interface Management1/1 management-only nameif management security-level 100 ip address 192.168.45.1 255.255.255.0 no shutdown ! interface Ethernet1/1 nameif outside security-level 0 ip address dhcp setroute no shutdown ! interface Ethernet1/2 nameif inside security...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
89
Firepower 2100 Appliance Mode Default Configuration The Firepower 2100 runs in Appliance mode by default. For pre-9.13(1) versions,Platform mode was the default and only option. If you upgrade from Platform mode, Platform mode is maintained. Note The default factory configuration for the Firepower 2100 in Appliance mod...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
90
! dns domain-lookup outside dns server-group DefaultDNS name-server 208.67.222.222 outside name-server 208.67.220.220 outside ! Secure Firewall 3100 Default Configuration The default factory configuration for the Secure Firewall 3100 configures the following: • inside→outside traffic flow—Ethernet 1/1 (outside), Ethern...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
91
! dns domain-lookup outside dns server-group DefaultDNS name-server 208.67.222.222 outside name-server 208.67.220.220 outside ! Firepower 4100/9300 Chassis Default Configuration When you deploy the ASA on the Firepower 4100/9300 chassis, you can pre-set many parameters that let you connect to the Management interface u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
92
• 1 Bridge Virtual Interface—All member interfaces are in the same network (IP address not pre-configured; you mustset to matchyournetwork): GigabitEthernet 1/1 (outside1), GigabitEthernet 1/2 (inside1), GigabitEthernet 1/3 (outside2), GigabitEthernet 1/4 (inside2) • All inside and outside interfaces can communicate wi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
93
same-security-traffic permit inter-interface hardware-bypass GigabitEthernet 1/1-1/2 hardware-bypass GigabitEthernet 1/3-1/4 http server enable http 192.168.1.0 255.255.255.0 management dhcpd address 192.168.1.5-192.168.1.254 management dhcpd enable management ASA Virtual Deployment Configuration When you deploy the AS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
94
To successfully register the ASA virtual with the Cisco Licensing Authority, the ASA virtual requires Internet access. You might need to perform additional configuration after deployment to achieve Internet access and successful license registration. Note See the following sample configuration for a standalone unit: in...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
95
rest-api agent failover failover lan unit primary failover lan interface fover gigabitethernet0/8 failover link fover gigabitethernet0/8 failover interface ip fover primary_ip mask standby standby_ip Set the Firepower 2100 to Appliance or Platform Mode The Firepower 2100 runs an underlying operating system called the F...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
96
reload After you set the mode, you need to save the configuration and reload the device. Prior to reloading, you can set the mode back to the original value without any disruption. Example: ciscoasa(config)# no fxos mode appliance Mode set to platform mode WARNING: This command will take effect after the running-config...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
97
About the Startup Configuration and the Running Configuration Startup Configuration When the ASA starts up, it loads the configuration from a text file called the startup configuration. This file resides by default as a hidden file in internal flash memory. You can, however, specify a different file for the startup con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
98
Note The copy running-config startup-config command is equivalent to the write memory command. Save Configuration Changes in Multiple Context Mode You can save each context (and system) configuration separately, or you can save all context configurations at the same time. Save Each Context and System Separately Use the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
99
Sometimes, a context is not saved because of an error. See the following information for errors: • For contexts that are not saved because of low memory, the following message appears: The context 'context a' could not be saved due to Unavailability of resources • For contexts that are not saved because the remote dest...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
100
View the Configuration The following commands let you view the running and startup configurations: • show running-config Views the running configuration. • show running-config command Views the running configuration of a specific command. • show startup-config Views the startup configuration. Clear and Remove Configura...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
101
• clear configure all Erases the running configuration. In multiple context mode, if you enter clear configure all from the system configuration, you also remove all contexts and stop them from running. The context configuration files are not erased, and remain in their original location. Note For the Firepower 1000, a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
102
Apply Configuration Changes to Connections When you make security policy changes to the configuration, all new connections use the new security policy. Existing connections continue to use the policy that was configured at the time of the connection establishment. show command output for old connections reflect the old...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
103
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 44 Getting Started with the ASA Reload the ASA
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
104
CHAPTER 3 Licenses: Product Authorization Key Licensing for the ISA 3000 A license specifiesthe optionsthat are enabled on a given ASA. This document describes product authorization key (PAK) licenses for the ISA 3000. For other models, see Licenses: Smart Software Licensing, on page 85. • About PAK Licenses, on page 4...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
105
Related Topics How Permanent and Time-Based Licenses Combine, on page 46 Time-Based Licenses In addition to permanent licenses, you can purchase time-based licenses or receive an evaluation license that has a time-limit.For example, you might buy a time-basedSecure ClientPremium license to handle short-term surges in t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
106
Time-Based Feature Combined License Rule The time-based license sessions are added to the permanent sessions, up to the platform limit. For example, if the permanent license is 2500 sessions, and the time-based license is 1000 sessions, then 3500 sessions are enabled for as long as the time-based license is active. Uni...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
107
If you have more than one additional time-based license installed for a feature, then the ASA uses the first license it finds; which license is used is not user-configurable and depends on internal operations. If you prefer to use a different time-based license than the one the ASA activated, then you must manually act...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
108
simultaneously; or 700Secure Client and 300 Other VPN; or use all 1000 forSecure Client. If you exceed the total VPN peers, you can overload the ASA, so be sure to size your network appropriately. VPN Load Balancing VPN load balancing requires a Strong Encryption (3DES/AES) License. Legacy VPN Licenses Refer to the Sup...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
109
For license part numbers ending in “K8” (for example, licenses under 250 users), TLS proxy sessions are limited to 1000. For license part numbers ending in “K9” (for example, licenses 250 users or larger), the TLS proxy limit depends on the configuration, up to the model limit. K8 and K9 refer to whether the license is...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
110
Failover License Requirements and Exceptions For most models, failover units do not require the same license on each unit. If you have licenses on both units, they combine into a single running failover cluster license. There are some exceptions to this rule. See the following table for precise licensing requirements f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
111
Related Topics Monitoring PAK Licenses, on page 68 Loss of Communication Between Failover Units If the units lose communication for more than 30 days, then each unit reverts to the license installed locally. During the 30-day grace period, the combined running license continues to be used by all units. If you restore c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
112
CanI “stack” time-basedlicenses so that whenthe time limit runs out,it will automaticallyuse thenext license? Yes. For identical licenses, the time limit is combined when you install multiple time-based licenses. For non-identical licenses (for example, a 1000-session Secure Client Premium license and a 2500-session li...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
113
• The ASA 5506-X and ASA 5506W-X do not support time-based licenses. Upgrade and Downgrade Guidelines Your activation key remains compatible if you upgrade to the latest version from any previous version. However, you might have issues if you want to maintain downgrade capability: • Downgrading to Version 8.1 or earlie...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
114
upgrade price, for example from 25 sessions to 75 sessions; this kind of upgrade should be distinguished from adding two separate licenses together). • Although you can activate all license types, some features are incompatible with each other. In the case of the AnyConnect Essentialslicense, the license isincompatible...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
115
The serial number used for licensing is different from the chassis serial number printed on the outside of your hardware. The chassis serial number is used for technical support, but not for licensing. Step 3 To obtain the activation key, go to the following licensing website: http://www.cisco.com/go/license Step 4 Ent...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
116
Figure 1: Get Other Licenses Step 3 Choose IPS, Crypto, Other. Figure 2: IPS, Crypto, Other Step 4 In the Search by Keyword field, enter asa, and select Cisco ASA 3DES/AES License. Figure 3: Cisco ASA 3DES/AES License Step 5 Select your Smart Account, Virtual Account, enter the ASA Serial Number, and click Next. CLI Bo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
117
Figure 4: Smart Account, Virtual Account, and Serial Number Step 6 Your Send To email address and End User name are auto-filled; enter additional email addresses if needed. Check the I Agree check box, and click Submit. Figure 5: Submit Step 7 You will then receive an email with the activation key, but you can also dow...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
118
Table 2: Permanent License Reloading Requirements Model License Action Requiring Reload All models Downgrading the Encryption license. Procedure Step 1 Apply an activation key to the ASA: activation-key key [activate | deactivate] Example: ciscoasa# activation-key 0xd11b3d48 0xa80a4c0a 0x48e0fd1c 0xb0443480 0x843fc490 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
119
About Shared Licenses A shared license lets you purchase a large number of Secure Client Premium sessions and share the sessions as needed among a group of ASAs by configuring one of the ASAs as a shared licensing server, and the rest as shared licensing participants. About the Shared Licensing Server and Participants ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
120
9. When the load is reduced on a participant, it sends a message to the server to release the shared sessions. Note The ASA uses SSL between the server and participant to encrypt all communications. Communication Issues Between Participant and Server See the following guidelines for communication issues between the par...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
121
Failover and Shared Licenses This section describes how shared licenses interact with failover. Failover and Shared License Servers This section describes how the main server and backup server interact with failover. Because the shared licensing server is also performing normal duties as the ASA, including performing f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
122
Figure 6: Failover and Shared License Servers The standby backup server shares the same operating limits as the primary backup server; if the standby unit becomes active, it continues counting down where the primary unit left off. Related Topics About the Shared Licensing Backup Server, on page 61 Failover and Shared L...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf