Saving the configuration can be easily done using the write memory command:ĪSA5505(config)# username admin password s1jw$528ds2 privilege 15 Note: it is highly advisable to frequently save the ASA configuration to ensure no work is lost in the event of a power failure or accident restart. Configure logging/debugging of events and errors.Apply Firewall access lists to ‘inside’ and ‘outside’ interfaces.Configuration of access-lists for ICMP packets to the Internet.Create, configure and apply TCP/UDP Object-Groups to firewall access lists.Enable SSH & Telnet Management for inside and outside interfaces.Enable HTTP Management for inside interface.Configure AAA authentication for local database user authentication.Configure Network Address Translation (NAT) for Internal Networks.Configure default route (default Gateway) & static routes.Setup Inside (private) & Outside (public) Interfaces.Configure interface IP addresses or Vlan IP addresses (ASA5505) & Descriptions.Configure Hostname, Users, Enable password & Disable Anonymous Reporting.Here is the list of items that will be covered in this article: We’ve created a simple configuration check-list that will help us keep track of the configured services on our ASA Firewall.
In any case, we should keep in mind that if we are able to configure a small ASA5505 then configuring the larger models won’t be an issue.Īt the time of writing of this article Firewall.cx came across a Cisco ASA5505, so we decided to put it to good use for this article, however, do note that all commands and configuration philosophy is the same across all ASA5500 series security appliances.Ĭisco ASA, PIX, and FWSM Firewall Handbook, 2nd Edition The main differences besides the licenses, which enable or disable features, are the physical interfaces of each ASA model (mainly between the ASA 5505 and the larger 5510/5520) and possibly modules that might be installed. The same steps are required to setup pretty much all ASA 5500 series Firewalls – which is Great News! Perhaps one of the most important points, especially for an engineer with limited experience, is that configuring the smaller ASA 5505 Firewall does not really differ from configuring the larger ASA5520 Firewall.
Users can also download the complete technical datasheet for the Cisco ASA 5500 series firewalls by visiting our Cisco Product Datasheet & Guides Download section. Premium An圜onnect VPN Peers * (Included/Maximum)Ĩ-port Fast Ethernet switch (including 2 PoE ports)ĥ Fast Ethernet ports 2 Gigabit Ethernet + 3 Fast Ethernet ports *Ĩ Gigabit Ethernet, 4 SFP Fiber, 1 Fast Ethernetģ (no trunking support)/20 (with trunking support) * The table below provides a brief comparison between the different ASA5500 series security appliances: We’ve done it with other Cisco technologies and devices, and we’ll do it again :) While many consider the Cisco ASA Firewalls complex and difficult to configure devices, Firewall.cx aims to break that myth and show how easy you can setup an ASA Firewall to deliver basic and advanced functionality.
Today Firewall.cx takes a look at how to easily setup a Cisco ASA5500 series firewall to perform basic functions, more than enough to provide secure & restricted access to the Internet, securely access and manage the ASA Firewall and more. The Cisco ASA 5500 series security appliances have been around for quite some time and are amongst the most popular hardware firewalls available in the market.
Introducing the Cisco ASA 5500 Series Firewall Appliance