Home
Cisco Systems 5505 Network Router User Manual
Contents
1. amp Note Read the safety warnings in the Regulatory Compliance and Safety Information RCSI and follow proper safety procedures when performing the steps in this guide See http www cisco com go asadocs for links to the RCSI and other documents 1 Verifying the Package Contents Power supply adapter Power cable US shown Documentation 3 Powering on and Verifying Interface Connectivity Step 1 Connect the power supply adaptor to the power cable Step 2 Connect the rectangular connector of the power supply adaptor to the power connector on the rear panel of the ASA Step 3 Connect the AC power connector of the power cable to an electrical outlet The ASA does not have a power switch Completing this step powers on the device Step 4 Check the Power LED on the front of the ASA if it is solid green the device is powered on Step 5 Check your management PC to make sure it received an IP address on the 192 168 1 0 24 network using DHCP Step 6 Check the LINK ACT indicators to verify interface connectivity Interface Connectivity Each Ethernet interface has an LED to indicate a physical link is established When the LED is solid green a link is established When the LED is flashing green there is network activity LINK ACT Indicator Power Indicator Cisco Systems LINK ACT 100 MBPS Cisco ASA 5505 series Adaptive Security Appliance If a LINK ACT LED is not lit the link could be down due to a duplex misma
2. have internal network services such as a web and FTP server that need to be available to an outside user You can place these services on a separate network behind the ASA called a demilitarized zone DMZ By placing the public servers on the DMZ any attacks launched against the public servers do not affect your inside networks Add Public Server So Use this panel to define the server that you wish to expose to a public interface You will need to specify the private interface and address of the server and the service to be exposed and then the public interface address and service that the server will be seen at Private Interface UC wiz test Private IP Address web_server OO Private Service tcp http 4 Public Interface outside D Public IP Address 209 165 201 10 Options __ Specify Public Service if different from Private Service This will enable the static PAT Public Service TCP or UDP service only Step 1 In the main ASDM window choose Configuration gt Firewall gt Public Servers The Public Server pane appears Step 2 Click Add then enter the public server settings in the Add Public Server dialog box For information about any field click Help Step 3 Click OK The server appears in the list Step 4 Click Apply to submit the configuration to the ASA File View Tools MUJERES Window Help a Startup Wizard VPN Wizards jonitoring i Save p ids amaes S
3. your security appliance Run ASDM Run Startup Wizard 300017 Step 3 Click Run Startup Wizard Step 4 Accept any certificates according to the dialog boxes that appear The Cisco ASDM IDM Launcher appears Step 5 Leave the username and password fields empty and click OK The main ASDM window appears and the Startup Wizard opens See 6 Running the Startup Wizard 2 Installing the Chassis The ASA ships with a default configuration that includes two preconfigured networks the Inside network and the Outside network and an Inside interface configured for a DHCP server Clients on the Inside network obtain a dynamic IP address from the ASA so that they can communicate with each other as well as with devices on the Internet Step 1 Connect one end of a yellow Ethernet cable to Ethernet 0 on the ASA By default Ethernet 0 is the Outside interface Connect the other end to a cable DSL ISDN modem the Outside network Step 2 Connect your devices such as PCs printers and servers with Ethernet cables to Ethernet 1 through 7 A Note Connect a PC to the ASA so that you can run the Adaptive Security Device Manager ASDM See 4 Initial Configuration Considerations Step 3 Connect Power over Ethernet PoE devices such as Cisco IP Phones or network cameras with Ethernet cables to switch ports 6 or 7 the only ports providing power to PoE devices Inside Network Outside Network Ports 1 7 Port 0 Inside Net
4. asis ACLs can be applied to restrict or allow access to specific corporate resources e IPsec IKEv1 Remote Access VPN Wizard Configures IPsec VPN remote access for the Cisco IPsec client 10 Optional Configuring the IPS Module ASA 8 2 and Later If your ASA came installed with a Security Services Card SSC you can use ASDM to set up the SSC and configure the Intrusion Prevention System IPS application to run on the SSC An SSC does not have any external interfaces d Add Delete g Connect EE co lh 10 86 194 171 Hm 172 23 204 53 Hm 172 23 59 101 Management Interface Interface VLAN 2220 v IP Address 172 23 204 89 Subnet Mask 255 255 255 0 v Default Gateway 172 23 204 1 g Startup Wizard B Interfaces 43 Routing H a Device Name Password Syste i g Allowed Hosts Networks IP Address Network Mask IP Address 0 0 0 0 0 0 0 0 Host Network Subnet Mask 0 0 0 0 v IPS Password Username cisco Old Password New Password Confirm New Password o Configure the IPS SSC module 300019 Step 1 In the main ASDM window choose Configuration gt Device Setup gt SSC Setup The SSC pane appears Step 2 Complete the SSC setup fields and click Apply For information about any field click Help in the dialog box Step 3 To configure the IPS module on the SSC click the Configure the IPS SSC module link The Startup Wizard appears Click Launch Startup Wi
5. ite to site VPN Wizard High Availability and Scalability Wizard AnyConnect VPN Wizard a Unified Communication Wizard Clientless SSL VPN Wizard VERMA Packet Capture Wizard IPsec IKEv1 Remote Access VPN Wizard e090 AnyConnect VPN Connection Setup Wizard Introduction Use this wizard to configure the ASA to accept VPN connections from the AnyConnect VPN Client The connections will be protected using either the IPsec or the SSL protocol The ASA will automatically upload the AnyConnect VPN Client to the end user s device when a VPN connection is established VPN Remote Access Locel Remot Next gt Cancel Help Step 1 In the main ASDM window choose Wizards gt VPN Wizards then choose one of the following e Site to Site VPN Wizard e AnyConnect VPN Wizard e Clientless VPN Wizard e IPsec IKEv1 Remote Access VPN Wizard Step 2 Follow the wizard instructions For information about any wizard field click Help Americas Headquarters Asia Pacific Headquarters Europe Headquarters 8 i D n n Cisco Systems Inc Cisco Systems USA Pte Ltd Cisco Systems International BV San Jose CA Singapore Amsterdam The Netherlands CISCO Cisco has more than 200 offices worldwide Addresses phone numbers and fax numbers are listed on the Cisco Website at www cisco com go offices Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and or its affiliates in the U S and
6. other countries To view a list of Cisco trademarks go to this URL www cisco com go trademarks Third party trademarks mentioned are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 1110R 2011 2014 Cisco Systems Inc All rights reserved gt Printed in the USA on recycled paper containing 10 postconsumer waste 78 19752 01 8 Optional Running VPN Wizards You can configure VPN using the following wizards e Site to Site VPN Wizard Creates an IPsec site to site tunnel between two ASAs e ASA 8 0 and later AnyConnect VPN Wizard Configures SSL VPN remote access for the Cisco AnyConnect VPN client AnyConnect provides secure SSL connections to the ASA for remote users with full VPN tunneling to corporate resources The ASA policy can be configured to download the AnyConnect Client to remote users when they initially connect via a browser With AnyConnect 3 0 and later the client can run either the SSL or IPSec IKEv2 VPN protocol e ASA 8 0 and later Clientless SSL VPN Wizard Configures clientless SSL VPN remote access for a browser Clientless browser based SSL VPN lets users establish a secure remote access VPN tunnel to the ASA using a web browser After authentication users access a portal page and can access specific supported internal resources The network administrator provides access to resources by users on a group b
7. tch If auto negotiation is disabled verify you are using a straight through Ethernet cable For a description of all chassis components see the hardware installation guide on Cisco com 5 Launching ASDM See the ASDM release notes on Cisco com for the requirements to run ASDM Step 1 On the PC connected to the ASA launch a web browser Step 2 In the Address field enter the following URL https 192 168 1 1 admin The Cisco ASDM web page appears Bie Ek Yen Fates De g Address https 4 192 168 1 fadminpublicjindex html MI gt E z stents g Cisco ASDM cisco Cisco ASDM X XX provides an intuitive graphical user interface that makes it easy to set up configure and manage your Cisco security appliances Cisco ASDM can run as a local application or as a Java Web Start application When you run Cisco ASDM as a local application it connects to your security appliance from your desktop using SSL Running Cisco ASDM as an application has these advantages e You can invoke ASOM from a desktop shortcut No browser is required e One desktop shortcut allows you to connect to multiple security appliances Install ASDM Launcher and Run ASOM You can run Cisco ASOM as a Java Web Start application that is dynamically downloaded from the security appliance Click Run ASOM to run Cisco ASDM Click Run Startup Wizard to run the Startup Wizard The Startup Wizard walks you through step by step the initial configuration of
8. work Interfaces Outside Network Interface ISP Connection Cisco IP Phone Web Server If you connect a server such as a web server to the ASA you can use ASDM to make services on that server accessible by internal and external users See 7 Optional Allowing Access to Public Servers Behind the ASA 4 Initial Configuration Considerations The ASA ships with a default configuration that in most cases is sufficient for your basic deployment You configure the ASA by using ASDM ASDM is a graphical interface that allows you to manage the ASA from any location by using a web browser However changing certain settings is recommended or required For example you should change the following settings from their defaults e The privileged mode enable password that is required to administer the ASA through ASDM and the CLI e When using the ASA as a VPN endpoint using the SSL VPN features The hostname domain name and DNS server names Outside interface IP address to a static address Identity certificate WINS names when access to Windows file shares is required Use the Start up Wizard in ASDM to make these changes See 6 Running the Startup Wizard 6 Running the Startup Wizard Run the Startup Wizard to modify the default configuration so that you can customize the security policy to suit your deployment Using the startup wizard you can set the following e Hostname e Static routes DHCP server Net
9. work address translation rules e Domain name e Administrative passwords e Interfaces e and more e IP addresses File View Tools Egg Window Help Startup Wizard onitoring F Save VPN Wizards High Availability and Scalability Wizard SCR Unified Communication Wizard WE Deveeeshboors Packet Capture Wizard e090 __ AnyConnect VPN Connection Setup Wizard VPN Wizard 7 i a Site to site VPN Wizard AnyConnect VPN Wizard Clientless SSL VPN Wizard IPsec IKEv1 Remote Access VPN Wizard Introduction Use this wizard to configure the ASA to accept VPN connections from the AnyConnect VPN Client The connections will be protected using either the IPsec or the SSL protocol The ASA will automatically upload the AnyConnect VPN Client to the end user s device when a VPN connection is established VPN Remote Access Step 1 If the wizard is not already running in the main ASDM window choose Wizards gt Startup Wizard Step 2 Follow the instructions in the Startup Wizard to configure your ASA Step 3 While running the wizard you can accept the default settings or change them as required For information about any wizard field click Help 7 Optional Allowing Access to Public Servers Behind the ASA ASA 8 2 and Later The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet As a business owner you might
10. zard Alternatively you can choose Configure gt IPS gt Sensor Setup gt Startup Wizard to access the wizard For more information about configuring the IPS module see the IPS module quick start guide on Cisco com stfecntas CISCO QUICK START GUIDE ora c Cisco ASA 5505 Adaptive Security Appliance
Download Pdf Manuals
Related Search
Related Contents
Kensington K39554WW mobile phone case ソルベントナフサ,米山薬品工業 ,CE0018,2013年1月7日, 安全データ GENESY Micro MAGNOMATIC Mode d`emploi Mode d`emploi Cisco Systems WIC-1AM-V2 User's Manual Infotainment Navigation Amundsen Manual de instrucciones Copyright © All rights reserved.
Failed to retrieve file