index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
23 | Requirements and Prerequisites for ASA Virtual Clustering 584
Guidelines for ASA Virtual Clustering 585
Deploy the Cluster in AWS 586
AWS Gateway Load Balancer and Geneve Single-Arm Proxy 586
Sample Topology 587
End-to-End Process for Deploying ASA Virtual Cluster on AWS 587
Templates 589
Deploy the Stack in AWS Using ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
24 | Features Applied to Individual Nodes 616
AAA for Network Access and Clustering 616
Connection Settings and Clustering 616
Dynamic Routing and Clustering 616
FTP and Clustering 617
ICMP Inspection and Clustering 618
Multicast Routing and Clustering 618
NAT and Clustering 618
SCTP and Clustering 620
SIP Inspection and Cl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
25 | Auto-MDI/MDIX Feature 631
Management Interface 632
Management Interface Overview 632
Management Slot/Port Interface 632
Use Any Interface for Management-Only Traffic 633
Management Interface for Transparent Mode 633
Guidelines for Basic Interface Configuration 633
Default Settings for Basic Interface Configuration 634
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
26 | Examples for Switch Ports 658
Routed Mode Example 659
Transparent Mode Example 659
Mixed Firewall Interface/Switch Port Example 660
Integrated Routing and Bridging Example 660
Failover Example 662
History for Switch Ports 663
CHAPTER 1 6 EtherChannel Interfaces 665
About EtherChannels 665
About EtherChannels 665
Channe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
27 | About VLAN Subinterfaces 683
Licensing for VLAN Subinterfaces 683
Guidelines and Limitations for VLAN Subinterfaces 684
Default Settings for VLAN Subinterfaces 685
Configure VLAN Subinterfaces and 802.1Q Trunking 685
Monitoring VLAN Subinterfaces 687
Examples for VLAN Subinterfaces 687
History for VLAN Subinterfaces 68... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
28 | Allow Gateway Load Balancer Health Checks 706
Monitoring VXLAN Interfaces 707
Examples for VXLAN Interfaces 709
Transparent VXLAN Gateway Example 710
VXLAN Routing Example 712
History for VXLAN Interfaces 713
CHAPTER 2 0 Routed and Transparent Mode Interfaces 715
About Routed and Transparent Mode Interfaces 715
Securit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
29 | Interface Statistics and Information 741
DHCP Information 741
PPPoE 744
IPv6 Neighbor Discovery 745
Examples for Routed and Transparent Mode Interfaces 746
Transparent Mode Example with 2 Bridge Groups 746
Switched LAN Segment Example with 2 Bridge Groups 746
History for Routed and Transparent Mode Interfaces 749
CHAPT... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
30 | Asymmetric Routing 764
Lost Route 764
Load Balancing 765
Per-Zone Connection and Routing Tables 766
ECMP Routing 766
Non-Zoned ECMP Support 766
Zoned ECMP Support 767
How Connections Are Load-Balanced 767
Falling Back to a Route in Another Zone 767
Interface-Based Security Policy 767
Supported Services for Traffic Zone... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
31 | Set the Date and Time Manually 787
Configure Precision Time Protocol (ISA 3000) 788
Configure the Master Passphrase 790
Add or Change the Master Passphrase 790
Disable the Master Passphrase 792
Remove the Master Passphrase 793
Configure the DNS Servers 794
Configure the Hardware Bypass and Dual Power Supply (Cisco ISA ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
32 | History for DHCP and DDNS Services 828
CHAPTER 2 5 Digital Certificates 831
About Digital Certificates 831
Public Key Cryptography 832
Certificate Scalability 832
Key Pairs 833
Trustpoints 833
Certificate Enrollment 833
Proxy for SCEP Requests 834
Revocation Checking 834
Supported CA Servers 834
CRLs 835
OCSP 836
Certi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
33 | CHAPTER 2 6 ARP Inspection and the MAC Address Table 869
About ARP Inspection and the MAC Address Table 869
ARP Inspection for Bridge Group Traffic 869
MAC Address Table 870
Default Settings 870
Guidelines for ARP Inspection and the MAC Address Table 870
Configure ARP Inspection and Other ARP Parameters 871
Add a Stati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
34 | Dynamic Routing in Spanned EtherChannel Mode 887
Dynamic Routing in Individual Interface Mode 888
Dynamic Routing in Multiple Context Mode 889
Route Resource Management 889
Routing Table for Management Traffic 889
Management Interface Identification 890
Equal-Cost Multi-Path (ECMP) Routing 891
Disable Proxy ARP Request... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
35 | Load Sharing 907
Implementation of PBR 907
Guidelines for Policy Based Routing 907
Configure Policy Based Routing 909
Examples for Policy Based Routing 912
Examples for Route Map Configuration 912
Example Configuration for PBR 914
Direct Internet Access using Software-Defined WAN 915
Policy Based Routing in Action 917
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
36 | Configure BFD Maps 936
Monitoring for BFD 937
History for BFD Routing 938
CHAPTER 3 2 BGP 939
About BGP 939
When to Use BGP 939
Routing Table Changes 939
BGP Path Selection 941
BGP Multipath 941
Guidelines for BGP 942
Configure BGP 943
Enable BGP 943
Define the Best Path for a BGP Routing Process 945
Configure Policy L... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
37 | History for BGP 977
CHAPTER 3 3 OSPF 979
About OSPF 979
OSPF Support for Fast Hello Packets 981
Prerequisites for OSPF Support for Fast Hello Packets 981
About OSPF Support for Fast Hello Packets 981
Implementation Differences Between OSPFv2 and OSPFv3 982
Guidelines for OSPF 982
Configure OSPFv2 985
Configure a Key Ch... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
38 | Configure OSPFv3 Passive Interfaces 1016
Configure OSPFv3 Administrative Distance 1016
Configure OSPFv3 Timers 1017
Define Static OSPFv3 Neighbors 1019
Reset OSPFv3 Default Parameters 1020
Send Syslog Messages 1021
Suppress Syslog Messages 1021
Calculate Summary Route Costs 1022
Generate a Default External Route into a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
39 | IS-IS Shutdown Protocol 1045
Prerequisites for IS-IS 1045
Guidelines for IS-IS 1045
Configure IS-IS 1046
Enable IS-IS Routing Globally 1046
Enable IS-IS Authentication 1050
Configure IS-IS LSP 1053
Configure IS-IS Summary Addresses 1057
Configure IS-IS Passive Interfaces 1058
Configure IS-IS Interfaces 1059
Configure I... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
40 | Disable Automatic Route Summarization 1104
Configure Default Information in EIGRP 1105
Disable EIGRP Split Horizon 1106
Restart the EIGRP Process 1107
Monitoring for EIGRP 1107
Example for EIGRP 1108
History for EIGRP 1109
CHAPTER 3 6 Multicast Routing 1111
About Multicast Routing 1111
Stub Multicast Routing 1111
PIM M... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
41 | Configure the Designated Router Priority 1123
Configure and Filter PIM Register Messages 1123
Configure PIM Message Intervals 1124
Filter PIM Neighbors 1124
Configure a Bidirectional Neighbor Filter 1125
Configure the ASA as a Candidate BSR 1126
Configure a Multicast Boundary 1126
Monitoring for PIM 1127
Example for Mu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
42 | Supported IETF RADIUS Authorization Attributes 1154
RADIUS Accounting Disconnect Reason Codes 1155
Guidelines for RADIUS Servers for AAA 1156
Configure RADIUS Servers for AAA 1156
Configure RADIUS Server Groups 1157
Add a RADIUS Server to a Group 1160
Monitoring RADIUS Servers for AAA 1163
History for RADIUS Servers fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
43 | CHAPTER 4 1 Kerberos Servers for AAA 1183
Guidelines for Kerberos Servers for AAA 1183
Configure Kerberos Servers for AAA 1183
Configure Kerberos AAA Server Groups 1183
Add Kerberos Servers to a Kerberos Server Group 1185
Configure Kerberos Key Distribution Center Validation 1186
Monitor Kerberos Servers for AAA 1187
H... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
44 | Configure AAA for System Administrators 1217
Configure Management Authentication 1217
About Management Authentication 1217
Configure Authentication for CLI and ASDM Access 1219
Configure Enable Authentication (Privileged EXEC Mode) 1219
Configure ASDM Certificate Authentication 1220
Control CLI and ASDM Access with Man... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
45 | Erase the Flash File System 1259
Configure File Access 1259
Configure the FTP Client Mode 1259
Configure the ASA Secure Copy Client 1259
Configure the ASA TFTP Client Path 1261
Copy a File to the ASA 1262
Copy a File to the Startup or Running Configuration 1264
Set the ASA Image, ASDM, and Startup Configuration 1266
Ba... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
46 | Configure the EEM 1293
Create an Event Manager Applet and Configure Events 1293
Configure an Action and Destinations for Output from an Action 1295
Run an Event Manager Applet 1297
Track Memory Allocation and Memory Usage 1297
Examples for the EEM 1300
Monitoring the EEM 1301
History for the EEM 1302
CHAPTER 4 6 Testin... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
47 | Test Your Configuration 1318
Test Basic Connectivity: Pinging Addresses 1318
What You Can Test Using Ping 1318
Choosing Between ICMP and TCP Ping 1319
Enable ICMP 1319
Ping Hosts 1320
Test ASA Connectivity Systematically 1321
Trace Routes to Hosts 1324
Make the ASA Visible on Trace Routes 1325
Determine Packet Routes 1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
48 | Send Syslog Messages to the Console Port 1352
Send Syslog Messages to an SNMP Server 1352
Send Syslog Messages to a Telnet or SSH Session 1353
Configure Syslog Messages 1353
Show or Hide Invalid Usernames in Syslogs 1353
Include the Date and Time in Syslog Messages 1354
Disable a Syslog Message 1354
Change the Severity... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
49 | Application Services and Third-Party Tools 1376
Guidelines for SNMP 1376
Configure SNMP 1380
Enable the SNMP Agent and SNMP Server 1380
Configure SNMP Traps 1381
Configure a CPU Usage Threshold 1382
Configure a Physical Interface Threshold 1383
Configure Parameters for SNMP Version 1 or 2c 1383
Configure Parameters for... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
50 | About Anonymous Reporting 1415
DNS Requirement 1416
About Smart Call Home 1416
Subscribe to Alert Groups 1417
Attributes of Alert Groups 1417
Messages Sent to Cisco by Alert Groups 1418
Message Severity Threshold 1420
Subscription Profiles 1421
Guidelines for Anonymous Reporting and Smart Call Home 1422
Configure Anony... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
51 | Command-Line Editing 1444
Command Completion 1444
Command Help 1444
View the Running Configuration 1445
Filter show and more Command Output 1445
Redirecting and Appending show Command Output 1446
Getting a Line Count for show Command Output 1446
Command Output Paging 1447
Add Comments 1447
Text Configuration Files 1448... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
52 | Protocols and Applications 1460
TCP and UDP Ports 1461
Local Ports and Protocols 1465
ICMP Types 1466
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
liii
Contents | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
53 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
liv
Contents | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
54 | About This Guide
The following topics explain how to use this guide.
• Document Objectives, on page lv
• Related Documentation, on page lv
• Document Conventions, on page lv
• Communications, Services, and Additional Information, on page lvii
Document Objectives
The purpose of this guide is to help you configure genera... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
55 | Convention Indication
Variables, for which you supply values, are presented in an italic typeface.
Italic type is also used for document titles, and for general emphasis.
italic
Terminalsessions and information that the system displays appear in monospace
type.
monospace
Required alternative keywords are grouped in bra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
56 | Communications, Services, and Additional Information
• To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
• To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
• To submit a service request, visit Cisco Support.
• To discover and brow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
57 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
lviii
About This Guide
Communications, Services, and Additional Information | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
58 | P ART I
Getting Started with the ASA
• Introduction to the Secure Firewall ASA, on page 1
• Getting Started, on page 11
• Licenses: Product Authorization Key Licensing for the ISA 3000, on page 45
• Licenses: Smart Software Licensing, on page 85
• Logical Devices for the Firepower 4100/9300, on page 165
• Transparent o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
59 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
60 | CHAPTER 1
Introduction to the Secure Firewall ASA
The Secure Firewall ASA provides advanced stateful firewall and VPN concentrator functionality in one
device. The ASA includes many advanced features, such as multiple security contexts (similar to virtualized
firewalls), clustering (combining multiple firewalls into a ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
61 | New Features in ASA 9.19(1)
Released: November 29, 2022
Feature Description
Platform Features
Secure Firewall 3105 We introduced the ASA for the Secure Firewall 3105.
You can now deploy the ASA virtual Auto Scale Solution with Gateway Load Balancer on
Microsoft Azure. See the Interfaces features for more information.
A... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
62 | Feature Description
When you set the FEC to Auto on the Secure Firewall 3100 fixed ports, the default type is
now set to cl108-rs instead of cl74-fc for 25 GB SR, CSR, and LR transceivers.
New/Modified commands: fec
Default Forward Error Correction
(FEC) onSecureFirewall 3100 fixed
ports changed to cl108-rs from
cl74-f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
63 | Feature Description
SecureFirewall ASA now supports dualstack IPrequest from IKEv2 third-party remote access
VPN clients. If the third-party remote access VPN client requests for both IPv4 and IPv6
addresses, ASA can now assign both IPversion addresses using multiple traffic selectors. This
feature enables third-party ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
64 | • NAT can resolve IP routing problems by supporting overlapping IP addresses.
Protecting from IP Fragments
The ASA provides IP fragment protection. This feature performs full reassembly of all ICMP error messages
and virtual reassembly of the remaining IP fragments that are routed through the ASA. Fragments that fail
t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
65 | The host database tracks suspicious activity such as connections with no return activity, access of closed
service ports, vulnerable TCP behaviors such as non-random IPID, and many more behaviors.
You can configure the ASA to send system log messages about an attacker or you can automatically shun the
host.
Firewall Mo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
66 | • Establishing sessions in the “fast path”
The ASA creates forward and reverse flows in the fast path for TCP traffic; the ASA also creates
connection state information for connectionless protocols like UDP, ICMP (when you enable ICMP
inspection), so that they can also use the fast path.
For other IP protocols, like SC... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
67 | • Authenticates users
• Assigns user addresses
• Encrypts and decrypts data
• Manages security keys
• Manages data transfer across the tunnel
• Manages data transfer inbound and outbound as a tunnel endpoint or router
The ASA invokes various standard protocols to accomplish these functions.
Security Context Overview
Yo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
68 | conjunction with the dynamic database from the Cisco update server, or by providing WCCP services
for the Cisco Web Security Appliance. Some of these special services are covered in separate guides:
• Cisco ASA Botnet Traffic Filter Guide
• Cisco ASA NetFlow Implementation Guide
• Cisco ASA Unified Communications Guide... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
69 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
10
Getting Started with the ASA
Special and Legacy Services | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
70 | CHAPTER 2
Getting Started
This chapter describes how to get started with your ASA.
• Access the Console for the Command-Line Interface, on page 11
• Configure ASDM Access, on page 17
• Start ASDM, on page 20
• Factory Default Configurations, on page 22
• Set the Firepower 2100 to Appliance or Platform Mode, on page 36
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
71 | ciscoasa>
This prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC
mode.
Step 3 Access privileged EXEC mode.
enable
You are prompted to change the password the first time you enter the enable command:
Example:
ciscoasa> enable
Password:
The enable password is not set. Pleas... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
72 | Procedure
Step 1 Connect your management computer to the console port. The Firepower 2100 ships with a DB-9 to RJ-45
serial cable, so you will need a third party serial-to-USB cable to make the connection. Be sure to install any
necessary USB serial drivers for your operating system. Use the following serial settings:
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
73 | You can begin to configure the ASA from global configuration mode. To exit global configuration mode,
enter the exit, quit, or end command.
Step 5 To return to the FXOS console, enter Ctrl+a, d.
Step 6 If you SSH to the ASA (after you configure SSH access in the ASA), connect to the FXOS CLI.
connect fxos
You are promp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
74 | You connect to the ASA CLI. There are no user credentials required for console access by default.
Step 2 Access privileged EXEC mode.
enable
You are prompted to change the password the first time you enter the enable command.
Example:
ciscoasa> enable
Password:
The enable password is not set. Please set it now.
Enter P... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
75 | ciscoasa#
Access the ASA Console on the Firepower 4100/9300 Chassis
For initial configuration, accessthe command-line interface by connecting to theFirepower 4100/9300 chassis
supervisor (either to the console port or remotely using Telnet orSSH) and then connecting to the ASA security
module.
Procedure
Step 1 Connect ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
76 | Example:
asa# configure terminal
asa(config)#
To exit global configuration mode, enter the disable, exit, or quit command.
Step 4 Exit the application console to the FXOS module CLI by entering Ctrl-a, d
You might want to use the FXOS module CLI for troubleshooting purposes.
Step 5 Return to the supervisor level of the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
77 | • Firepower 4100/9300—The Management type interface and IPaddress of your choice defined when
you deployed. Management hosts are allowed from any network.
• ASA Virtual—Management 0/0 (set during deployment). Management hosts are limited to the
management network.
• ISA 3000—Management 1/1 (192.168.1.1). Management hos... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
78 | interface interface_id
nameif name
security-level level
no shutdown
ip address ip_address mask
Example:
ciscoasa(config)# interface management 0/0
ciscoasa(config-if)# nameif management
ciscoasa(config-if)# security-level 100
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# ip address 192.168.1.1 255.255.255.0
The... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
79 | When prompted, confirm that you want to convert the existing configuration to be the admin context. You
are then prompted to reload the ASA.
Examples
The following configuration converts the firewall mode to transparent mode, configures the
Management 0/0 interface, and enables ASDM for a management host:
firewall tran... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
80 | ASDM stores files in the local \Users\<user_id>\.asdm directory, including cache, log, and preferences, and
also in the Temp directory, including Secure Client profiles.
Procedure
Step 1 On the computer that you specified as the ASDM client, enter the following URL:
https://asa_ip_address/admin
Be sure to specify https... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
81 | a username and password at the login screen (instead of leaving the username blank), ASDM checks the
local database for a match.
Factory Default Configurations
The factory default configuration is the configuration applied by Cisco to new ASAs.
• Firepower 1010—The factory default configuration enables a functional ins... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
82 | Restore the Factory Default Configuration
This section describes how to restore the factory default configuration. For the ASA virtual, this procedure
erases the deployment configuration and applies the following configuration:
interface management 0/0
ip address 192.168.1.1 255.255.255.0
nameif management
security-lev... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
83 | • Firepower 2100 in Platform mode—Sets the management interface IP address.
• Secure Firewall 3100—Sets the inside interface IP address.
• Firepower 4100/9300—No effect.
• ASA Virtual—Sets the management interface IP address.
• ISA 3000—Sets the management interface IP address.
The http command uses the subnet you spec... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
84 | This command saves the running configuration to the default location for the startup configuration, even if
you previously configured the boot config command to set a different location; when the configuration was
cleared, this path was also cleared.
Restore the ASA Virtual Deployment Configuration
This section describ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
85 | • ASDM access—Management and inside hosts allowed. Management hosts are limited to the
192.168.45.0/24 network, and inside hosts are limited to the 192.168.1.0/24 network.
• NAT—Interface PAT for all traffic from inside to outside.
• DNS servers—OpenDNS servers are pre-configured.
The configuration consists of the foll... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
86 | interface Ethernet1/8
no shutdown
switchport
switchport mode access
switchport access vlan 1
!
object network obj_any
subnet 0.0.0.0 0.0.0.0
nat (any,outside) dynamic interface
!
dhcpd auto_config outside
dhcpd address 192.168.1.20-192.168.1.254 inside
dhcpd address 192.168.45.10-192.168.45.12 management
dhcpd enable i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
87 | no shutdown
!
interface Ethernet1/2
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
no shutdown
!
object network obj_any
subnet 0.0.0.0 0.0.0.0
nat (any,outside) dynamic interface
!
http server enable
http 0.0.0.0 0.0.0.0 management
http 192.168.1.0 255.255.255.0 inside
!
dhcpd auto_config outside... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
88 | The configuration consists of the following commands:
interface Management1/1
management-only
nameif management
security-level 100
ip address 192.168.45.1 255.255.255.0
no shutdown
!
interface Ethernet1/1
nameif outside
security-level 0
ip address dhcp setroute
no shutdown
!
interface Ethernet1/2
nameif inside
security... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
89 | Firepower 2100 Appliance Mode Default Configuration
The Firepower 2100 runs in Appliance mode by default.
For pre-9.13(1) versions,Platform mode was the default and only option. If you upgrade from Platform mode,
Platform mode is maintained.
Note
The default factory configuration for the Firepower 2100 in Appliance mod... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
90 | !
dns domain-lookup outside
dns server-group DefaultDNS
name-server 208.67.222.222 outside
name-server 208.67.220.220 outside
!
Secure Firewall 3100 Default Configuration
The default factory configuration for the Secure Firewall 3100 configures the following:
• inside→outside traffic flow—Ethernet 1/1 (outside), Ethern... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
91 | !
dns domain-lookup outside
dns server-group DefaultDNS
name-server 208.67.222.222 outside
name-server 208.67.220.220 outside
!
Firepower 4100/9300 Chassis Default Configuration
When you deploy the ASA on the Firepower 4100/9300 chassis, you can pre-set many parameters that let
you connect to the Management interface u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
92 | • 1 Bridge Virtual Interface—All member interfaces are in the same network (IP address not
pre-configured; you mustset to matchyournetwork): GigabitEthernet 1/1 (outside1), GigabitEthernet
1/2 (inside1), GigabitEthernet 1/3 (outside2), GigabitEthernet 1/4 (inside2)
• All inside and outside interfaces can communicate wi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
93 | same-security-traffic permit inter-interface
hardware-bypass GigabitEthernet 1/1-1/2
hardware-bypass GigabitEthernet 1/3-1/4
http server enable
http 192.168.1.0 255.255.255.0 management
dhcpd address 192.168.1.5-192.168.1.254 management
dhcpd enable management
ASA Virtual Deployment Configuration
When you deploy the AS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
94 | To successfully register the ASA virtual with the Cisco Licensing Authority, the ASA virtual requires Internet
access. You might need to perform additional configuration after deployment to achieve Internet access and
successful license registration.
Note
See the following sample configuration for a standalone unit:
in... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
95 | rest-api agent
failover
failover lan unit primary
failover lan interface fover gigabitethernet0/8
failover link fover gigabitethernet0/8
failover interface ip fover primary_ip mask standby standby_ip
Set the Firepower 2100 to Appliance or Platform Mode
The Firepower 2100 runs an underlying operating system called the F... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
96 | reload
After you set the mode, you need to save the configuration and reload the device. Prior to reloading, you can
set the mode back to the original value without any disruption.
Example:
ciscoasa(config)# no fxos mode appliance
Mode set to platform mode
WARNING: This command will take effect after the running-config... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
97 | About the Startup Configuration and the Running Configuration
Startup Configuration
When the ASA starts up, it loads the configuration from a text file called the startup configuration. This file
resides by default as a hidden file in internal flash memory. You can, however, specify a different file for the
startup con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
98 | Note The copy running-config startup-config command is equivalent to the write memory command.
Save Configuration Changes in Multiple Context Mode
You can save each context (and system) configuration separately, or you can save all context configurations
at the same time.
Save Each Context and System Separately
Use the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
99 | Sometimes, a context is not saved because of an error. See the following information for errors:
• For contexts that are not saved because of low memory, the following message appears:
The context 'context a' could not be saved due to Unavailability of resources
• For contexts that are not saved because the remote dest... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
100 | View the Configuration
The following commands let you view the running and startup configurations:
• show running-config
Views the running configuration.
• show running-config command
Views the running configuration of a specific command.
• show startup-config
Views the startup configuration.
Clear and Remove Configura... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
101 | • clear configure all
Erases the running configuration.
In multiple context mode, if you enter clear configure all from the system
configuration, you also remove all contexts and stop them from running. The
context configuration files are not erased, and remain in their original location.
Note
For the Firepower 1000, a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
102 | Apply Configuration Changes to Connections
When you make security policy changes to the configuration, all new connections use the new security policy.
Existing connections continue to use the policy that was configured at the time of the connection establishment.
show command output for old connections reflect the old... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
103 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
44
Getting Started with the ASA
Reload the ASA | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
104 | CHAPTER 3
Licenses: Product Authorization Key Licensing
for the ISA 3000
A license specifiesthe optionsthat are enabled on a given ASA. This document describes product authorization
key (PAK) licenses for the ISA 3000. For other models, see Licenses: Smart Software Licensing, on page 85.
• About PAK Licenses, on page 4... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
105 | Related Topics
How Permanent and Time-Based Licenses Combine, on page 46
Time-Based Licenses
In addition to permanent licenses, you can purchase time-based licenses or receive an evaluation license that
has a time-limit.For example, you might buy a time-basedSecure ClientPremium license to handle short-term
surges in t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
106 | Time-Based Feature Combined License Rule
The time-based license sessions are added to the permanent sessions, up to
the platform limit. For example, if the permanent license is 2500 sessions,
and the time-based license is 1000 sessions, then 3500 sessions are enabled
for as long as the time-based license is active.
Uni... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
107 | If you have more than one additional time-based license installed for a feature, then the ASA uses the first
license it finds; which license is used is not user-configurable and depends on internal operations. If you prefer
to use a different time-based license than the one the ASA activated, then you must manually act... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
108 | simultaneously; or 700Secure Client and 300 Other VPN; or use all 1000 forSecure Client. If you exceed
the total VPN peers, you can overload the ASA, so be sure to size your network appropriately.
VPN Load Balancing
VPN load balancing requires a Strong Encryption (3DES/AES) License.
Legacy VPN Licenses
Refer to the Sup... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
109 | For license part numbers ending in “K8” (for example, licenses under 250 users), TLS proxy sessions are
limited to 1000. For license part numbers ending in “K9” (for example, licenses 250 users or larger), the
TLS proxy limit depends on the configuration, up to the model limit. K8 and K9 refer to whether the license
is... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
110 | Failover License Requirements and Exceptions
For most models, failover units do not require the same license on each unit. If you have licenses on both
units, they combine into a single running failover cluster license. There are some exceptions to this rule. See
the following table for precise licensing requirements f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
111 | Related Topics
Monitoring PAK Licenses, on page 68
Loss of Communication Between Failover Units
If the units lose communication for more than 30 days, then each unit reverts to the license installed locally.
During the 30-day grace period, the combined running license continues to be used by all units.
If you restore c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
112 | CanI “stack” time-basedlicenses so that whenthe time limit runs out,it will automaticallyuse thenext
license?
Yes. For identical licenses, the time limit is combined when you install multiple time-based licenses. For
non-identical licenses (for example, a 1000-session Secure Client Premium license and a 2500-session
li... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
113 | • The ASA 5506-X and ASA 5506W-X do not support time-based licenses.
Upgrade and Downgrade Guidelines
Your activation key remains compatible if you upgrade to the latest version from any previous version.
However, you might have issues if you want to maintain downgrade capability:
• Downgrading to Version 8.1 or earlie... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
114 | upgrade price, for example from 25 sessions to 75 sessions; this kind of upgrade should be distinguished
from adding two separate licenses together).
• Although you can activate all license types, some features are incompatible with each other. In the case
of the AnyConnect Essentialslicense, the license isincompatible... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
115 | The serial number used for licensing is different from the chassis serial number printed on the outside of your
hardware. The chassis serial number is used for technical support, but not for licensing.
Step 3 To obtain the activation key, go to the following licensing website:
http://www.cisco.com/go/license
Step 4 Ent... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
116 | Figure 1: Get Other Licenses
Step 3 Choose IPS, Crypto, Other.
Figure 2: IPS, Crypto, Other
Step 4 In the Search by Keyword field, enter asa, and select Cisco ASA 3DES/AES License.
Figure 3: Cisco ASA 3DES/AES License
Step 5 Select your Smart Account, Virtual Account, enter the ASA Serial Number, and click Next.
CLI Bo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
117 | Figure 4: Smart Account, Virtual Account, and Serial Number
Step 6 Your Send To email address and End User name are auto-filled; enter additional email addresses if needed.
Check the I Agree check box, and click Submit.
Figure 5: Submit
Step 7 You will then receive an email with the activation key, but you can also dow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
118 | Table 2: Permanent License Reloading Requirements
Model License Action Requiring Reload
All models Downgrading the Encryption license.
Procedure
Step 1 Apply an activation key to the ASA:
activation-key key [activate | deactivate]
Example:
ciscoasa# activation-key 0xd11b3d48 0xa80a4c0a 0x48e0fd1c 0xb0443480 0x843fc490
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
119 | About Shared Licenses
A shared license lets you purchase a large number of Secure Client Premium sessions and share the sessions
as needed among a group of ASAs by configuring one of the ASAs as a shared licensing server, and the rest
as shared licensing participants.
About the Shared Licensing Server and Participants
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
120 | 9. When the load is reduced on a participant, it sends a message to the server to release the shared sessions.
Note The ASA uses SSL between the server and participant to encrypt all communications.
Communication Issues Between Participant and Server
See the following guidelines for communication issues between the par... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
121 | Failover and Shared Licenses
This section describes how shared licenses interact with failover.
Failover and Shared License Servers
This section describes how the main server and backup server interact with failover. Because the shared
licensing server is also performing normal duties as the ASA, including performing f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
122 | Figure 6: Failover and Shared License Servers
The standby backup server shares the same operating limits as the primary backup server; if the standby unit
becomes active, it continues counting down where the primary unit left off.
Related Topics
About the Shared Licensing Backup Server, on page 61
Failover and Shared L... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.