Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Federal Communication Commission Interference Statement
(For ISA570 and ISA570W)
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference in which case the user will be required to correct
the interference at his own expense.
(For ISA550 and ISA550W)
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible
for compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement: (For ISA550W and ISA570W)
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
The availability of some specific channels and/or operational frequency bands are country
dependent and are firmware programmed at the factory to match the intended destination.
The firmware setting is not accessible by the end user.
Industry Canada statement:
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference, and (2) this
device must accept any interference received, including interference that may cause
undesired operation.
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils
radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le
dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter
tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement
indésirable.
IMPORTANT NOTE:
Canada Radiation Exposure Statement: (For ISA550W and ISA570W)
This equipment complies with Canada radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20 cm
between the radiator and your body.
NOTE IMPORTANTE: (Pour l'utilisation de dispositifs mobiles)
Déclaration d'exposition aux radiations:
Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un
environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de
20 cm de distance entre la source de rayonnement et votre corps.
This device has been designed to operate with an antenna having a maximum gain of 1.8 dBi.
Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The
required antenna impedance is 50 ohms.
Under Industry Canada regulations, this radio transmitter may only operate using an antenna
of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To
reduce potential radio interference to other users, the antenna type and its gain should be so
chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that
necessary for successful communication.
(Le manuel d'utilisation de dispositifs émetteurs équipés d'antennes amovibles doit contenir
les informations suivantes dans un endroit bien en vue:)
Ce dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximal de 1.8
dBi. Une antenne à gain plus élevé est strictement interdite par les règlements d'Industrie
Canada. L'impédance d'antenne requise est de 50 ohms.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio
peutfonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur) approuvé
pourl'émetteur par Industrie Canada. Dans le but de réduire les risques de brouillage
radioélectriqueà l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain
de sorte que lapuissance isotrope rayonnée équivalente (p.i.r.e.) ne dépasse pas l'intensité
nécessaire àl'établissement d'une communication satisfaisante.
UL/CB
Rack Mount Instructions - The following or similar rack-mount instructions are included with
the installation instructions:
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the
operating ambient temperature of the rack environment may be greater than room ambient.
Therefore, consideration should be given to installing the equipment in an environment
compatible with the maximum ambient temperature (Tma) 40 degree C specified by the
manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the amount
of air flow required for safe operation of the equipment is not compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a
hazardous condition is not achieved due to uneven mechanical loading.
D) Circuit Overloading - Consideration should be given to the connection of the equipment to
the supply circuit and the effect that overloading of the circuits might have on overcurrent
protection and supply wiring. Appropriate consideration of equipment nameplate ratings
should be used when addressing this concern.
Contents
Chapter 1: Getting Started19
Introduction20
Product Overview21
Front Panel21
Back Panel23
Getting Started with the Configuration Utility25
Logging in to the Configuration Utility26
Navigating Through the Configuration Utility27
Using the Help System28
Configuration Utility Icons28
Factory Default Settings30
Default Settings of Key Features30
Restoring the Factory Default Settings31
Performing Basic Configuration Tasks32
Changing the Default Administrator Password32
Upgrading your Firmware After your First Login33
Backing Up Your Configuration34
Chapter 2: Configuration Wizards35
Using the Setup Wizard for the Initial Configuration36
Starting the Setup Wizard37
Configuring Cisco.com Account Credentials37
Enabling Firmware Upgrade38
Validating Security License39
Enabling Bonjour and CDP Discovery Protocols39
Configuring Remote Administration40
Configuring Physical Ports41
Configuring the Primary WAN42
Configuring the Secondary WAN42
Configuring WAN Redundancy42
Configuring Default LAN Settings43
Configuring DMZ44
Cisco ISA500 Series Integrated Security Appliances Administration Guide6
Contents
Configuring DMZ Services45
Configuring Wireless Radio Settings47
Configuring Intranet WLAN Access48
Configure Security Services49
Viewing Configuration Summary50
Using the Dual WAN Wizard to Configure WAN Redundancy Settings51
Starting the Dual WAN Wizard51
Configuring a Configurable Port as a Secondary WAN Port51
Configuring the Primary WAN52
Configuring the Secondary WAN52
Configuring WAN Redundancy52
Configuring Network Failure Detection53
Viewing Configuration Summary54
Using the Remote Access VPN Wizard54
Using the Remote Access VPN Wizard for IPsec Remote Access54
Starting the Remote Access VPN Wizard55
Configuring IPsec Remote Access Group Policy55
Configuring WAN Settings56
Configuring Operation Mode56
Configuring Access Control Settings57
Configuring DNS and WINS Settings57
Configuring Backup Servers58
Configuring Split Tunneling58
Viewing Group Policy Summary58
Configuring IPsec Remote Access User Groups59
Viewing IPsec Remote Access Summary59
Using Remote Access VPN Wizard for SSL Remote Access60
Starting the Remote Access VPN Wizard with SSL Remote Access60
Configuring SSL VPN Gateway60
Configuring SSL VPN Group Policy62
Configuring SSL VPN User Groups65
Viewing SSL VPN Summary66
Using the Site-to-Site VPN Wizard to Configure Site-to-Site VPN66
Starting the Site-to-Site VPN Wizard67
Configuring VPN Peer Settings67
Configuring IKE Policies68
Cisco ISA500 Series Integrated Security Appliances Administration Guide7
Configuring Transform Policies69
Configuring Local and Remote Networks70
Viewing Configuration Summary70
Using the DMZ Wizard to Configure DMZ Settings71
Starting the DMZ Wizard71
Configuring DDNS Profiles71
Configuring DMZ Network72
Configuring DMZ Services74
Viewing Configuration Summary76
Using the Wireless Wizard (for ISA550W and ISA570W only)76
Starting the Wireless Wizard76
Configuring Wireless Radio Settings76
Configuring Wireless Connectivity Types77
Contents
Specify Wireless Connectivity Settings for All Enabled SSIDs78
Viewing Configuration Summary78
Configuring the SSID for Intranet WLAN Access78
Configuring the SSID for Guest WLAN Access80
Chapter 3: Status84
Device Status Dashboard84
Network Status88
Status Summary88
Traffic Statistics91
Usage Reports92
WAN Bandwidth Reports94
ARP Table95
DHCP Bindings95
STP Status96
CDP Neighbor98
Wireless Status (for ISA550W and ISA570W only)99
Wireless Status99
Client Status100
Cisco ISA500 Series Integrated Security Appliances Administration Guide8
NAT Status100
VPN Status101
IPsec VPN Status101
SSL VPN Status103
Active User Sessions105
Security Services Reports106
Web Security Report106
Anti-Virus Report107
Email Security Report108
Network Reputation Report109
IPS Report110
Application Control Report111
System Status112
Contents
Processes112
Resource Utilization113
Chapter 4: Networking115
Viewing Network Status116
Configuring IPv4 or IPv6 Routing116
Managing Ports116
Viewing Status of Physical Interfaces117
Configuring Physical Ports118
Configuring Port Mirroring119
Configuring Port-Based (802.1x) Access Control120
Configuring the WAN122
Configuring WAN Settings for Your Internet Connection122
Configuring WAN Redundancy130
Dual WAN Settings130
Configuring Link Failover Detection132
Load Balancing with Policy-Based Routing Configuration Example133
Configuring Dynamic DNS134
Measuring and Limiting Traffic with the Traffic Meter135
Configuring a VLAN137
Cisco ISA500 Series Integrated Security Appliances Administration Guide9
Contents
Configuring DMZ141
Configuring Zones146
Security Levels for Zones146
Predefined Zones147
Configuring Zones147
Configuring DHCP Reserved IPs149
Configuring Routing149
Viewing the Routing Table150
Configuring Routing Mode150
Configuring Static Routing151
Configuring Dynamic Routing - RIP152
Configuring Policy-Based Routing153
Configuring Quality of Service155
General QoS Settings155
Configuring WAN QoS156
Managing WAN Bandwidth for Upstream Traffic156
Configuring WAN Queue Settings157
Configuring Traffic Selectors158
Configuring WAN QoS Policy Profiles160
Configuring WAN QoS Class Rules160
Mapping WAN QoS Policy Profiles to WAN Interfaces161
WAN QoS Configuration Example162
Configure WAN QoS for Voice Traffic from LAN to WAN164
Configuring WAN QoS for Voice Traffic from WAN to LAN165
Configuring LAN QoS166
Configuring LAN Queue Settings167
Configuring LAN QoS Classification Methods167
Mapping CoS to LAN Queue168
Mapping DSCP to LAN Queue168
Configuring Default CoS169
Configuring Wireless QoS169
Default Wireless QoS Settings169
Configuring Wireless QoS Classification Methods170
Mapping CoS to Wireless Queue171
Mapping DSCP to Wireless Queue171
Understanding DSCP Values171
Cisco ISA500 Series Integrated Security Appliances Administration Guide10
Configuring IGMP172
Configuring VRRP173
Address Management175
Configuring Addresses175
Configuring Address Groups176
Service Management177
Configuring Services177
Configuring Service Groups178
Configuring Captive Portal179
Requirements179
Before You Begin180
VLAN Setup180
Wireless Setup181
Contents
User Authentication181
Configuring a Captive Portal181
Troubleshooting185
Using External Web-Hosted CGI Scripts186
CGI Source Code Example: No Authentication and Accept Button195
Related Information204
Chapter 5: Wireless (for ISA550W and ISA570W only)206
Viewing Wireless Status207
Viewing Wireless Statistics207
Viewing Wireless Client Status208
Configuring the Basic Settings208
Configuring SSID Profiles210
Configuring Wireless Security211
Controlling Wireless Access Based on MAC Addresses217
Mapping the SSID to VLAN218
Configuring SSID Schedule218
Configuring Wi-Fi Protected Setup219
Configuring Captive Portal221
Cisco ISA500 Series Integrated Security Appliances Administration Guide11
Requirements222
Before You Begin222
VLAN Setup222
Wireless Setup223
User Authentication223
Configuring a Captive Portal223
Troubleshooting227
Using External Web-Hosted CGI Scripts228
CGI Source Code Example: No Authentication and Accept Button237
Related Information246
Configuring Wireless Rogue AP Detection247
Advanced Radio Settings248
Contents
Chapter 6: Firewall251
Configuring Firewall Rules to Control Inbound and Outbound Traffic252
About Security Zones252
Default Firewall Settings254
Priorities of Firewall Rules255
Preliminary Tasks for Configuring Firewall Rules255
General Firewall Settings256
Configuring a Firewall Rule257
Configuring a Firewall Rule to Allow Multicast Traffic259
Configuring Firewall Logging Settings260
Configuring NAT Rules to Securely Access a Remote Network261
Viewing NAT Translation Status262
Priorities of NAT Rules263
Configuring Dynamic PAT Rules264
Configuring Static NAT Rules265
Configuring Port Forwarding Rules266
Configuring Port Triggering Rules268
Configuring Advanced NAT Rules269
Configuring IP Alias for Advanced NAT rules270
Cisco ISA500 Series Integrated Security Appliances Administration Guide12
Configuring an Advanced NAT Rule to Support NAT Hairpinning272
Firewall and NAT Rule Configuration Examples274
Allowing Inbound Traffic Using the WAN IP Address274
Allowing Inbound Traffic Using a Public IP Address276
Allowing Inbound Traffic from Specified Range of Outside Hosts279
Blocking Outbound Traffic by Schedule and IP Address Range280
Blocking Outbound Traffic to an Offsite Mail Server280
Configuring Content Filtering to Control Internet Access281
Configuring Content Filtering Policy Profiles281
Configuring Website Access Control List282
Mapping Content Filtering Policy Profiles to Zones283
Configuring MAC Address Filtering to Permit or Block Traffic285
Contents
Configuring IP-MAC Binding to Prevent Spoofing286
Configuring Attack Protection287
Configuring Session Limits288
Configuring Application Level Gateway289
Chapter 7: Security Services291
About Security Services292
Activating Security Services293
Priority of Security Services293
Security Services Dashboard294
Viewing Security Services Reports295
Viewing Web Security Report296
Viewing Anti-Virus Report297
Viewing Email Security Report298
Viewing Network Reputation Report299
Viewing IPS Report300
Viewing Application Control Report301
Configuring Anti-Virus302
General Anti-Virus Settings303
Cisco ISA500 Series Integrated Security Appliances Administration Guide13
Contents
Configuring Advanced Anti-Virus Settings306
Configuring HTTP Notification307
Configuring Email Notification307
Updating Anti-Virus Signatures308
Configuring Application Control309
Configuring Application Control Policies310
General Application Control Policy Settings310
Adding an Application Control Policy311
Permitting or Blocking Traffic for all Applications in a Category312
Permitting or Blocking Traffic for an Application313
General Application Control Settings314
Enabling Application Control Service315
Mapping Application Control Policies to Zones315
Configuring Application Control Policy Mapping Rules316
Updating Application Signature Database317
Advanced Application Control Settings318
Configuring Spam Filter319
Configuring Intrusion Prevention321
Configuring Signature Actions323
Updating IPS Signature Database324
Configuring Web Reputation Filtering325
Configuring Web URL Filtering327
Configuring Web URL Filtering Policy Profiles328
Configuring Website Access Control List329
Mapping Web URL Filtering Policy Profiles to Zones330
Configuring Advanced Web URL Filtering Settings330
Network Reputation332
Chapter 8: VPN333
About VPNs334
Viewing VPN Status335
Viewing IPsec VPN Status335
Viewing SSL VPN Status337
Configuring a Site-to-Site VPN340
Cisco ISA500 Series Integrated Security Appliances Administration Guide14
Contents
Configuration Tasks to Establish a Site-to-Site VPN Tunnel341
General Site-to-Site VPN Settings341
Configuring IPsec VPN Policies343
Configuring IKE Policies349
Configuring Transform Sets351
Remote Teleworker Configuration Examples352
Configuring IPsec Remote Access355
Cisco VPN Client Compatibility356
Enabling IPsec Remote Access357
Configuring IPsec Remote Access Group Policies357
Allowing IPsec Remote VPN Clients to Access the Internet360
Configuring Teleworker VPN Client363
Required IPsec VPN Servers364
Benefits of the Teleworker VPN Client Feature365
Modes of Operation365
Client Mode366
Network Extension Mode367
General Teleworker VPN Client Settings368
Configuring Teleworker VPN Client Group Policies369
Configuring SSL VPN372
Elements of the SSL VPN373
Configuration Tasks to Establish a SSL VPN Tunnel374
Allowing SSL VPN Clients to Access the Internet382
Configuring L2TP Server385
Configuring VPN Passthrough387
Cisco ISA500 Series Integrated Security Appliances Administration Guide15
Contents
Chapter 9: User Management388
Viewing Active User Sessions388
Configuring Users and User Groups389
Default User and User Group389
Available Services for User Groups389
Preempt Administrators390
Configuring Local Users390
Configuring Local User Groups391
Configuring User Authentication Settings393
Using Local Database for User Authentication394
Using RADIUS Server for User Authentication394
Using Local Database and RADIUS Server for User Authentication397
Using LDAP for User Authentication398
Using Local Database and LDAP for Authentication400
Configuring RADIUS Servers401
Chapter 10: Device Management403
Viewing System Status404
Viewing Process Status404
Viewing Resource Utilization404
Administration405
Configuring Administrator Settings406
Configuring Remote Administration407
Configuring Email Alert Settings408
Configuring SNMP415
Backing Up and Restoring a Configuration416
Managing Certificates for Authentication418
Viewing Certificate Status and Details419
Exporting Certificates to Your Local PC420
Exporting Certificates to a USB Device421
Importing Certificates from Your Local PC421
Importing Certificates from a USB Device422
Cisco ISA500 Series Integrated Security Appliances Administration Guide16
Generating New Certificate Signing Requests422
Importing Signed Certificate for CSR from Your Local PC423
Configuring Cisco Services and Support Settings424
Configuring Cisco.com Account424
Configuring Cisco OnPlus425
Configuring Remote Support Settings426
Sending Contents for System Diagnosis426
Configuring System Time427
Configuring Device Properties428
Diagnostic Utilities428
Ping429
Traceroute429
DNS Lookup430
Contents
Packet Capture430
Device Discovery Protocols430
UPnP Discovery431
Bonjour Discovery432
CDP Discovery432
LLDP Discovery433
Firmware Management434
Viewing Firmware Information435
Using the Secondary Firmware435
Upgrading your Firmware from Cisco.com436
Upgrading Firmware from a PC or a USB Device437
Firmware Auto Fall Back Mechanism438
Using Rescue Mode to Recover the System438
Managing Security License439
Checking Security License Status440
Installing or Renewing Security License441
Log Management442
Viewing Logs442
Configuring Log Settings444
Cisco ISA500 Series Integrated Security Appliances Administration Guide17
Configuring Log Facilities447
Rebooting and Resetting the Device448
Restoring the Factory Default Settings448
Rebooting the Security Appliance449
Configuring Schedules449
Contents
Appendix A: Troubleshooting453
Internet Connection453
Date and Time456
Pinging to Test LAN Connectivity457
Testing the LAN Path from Your PC to Your Security Appliance457
Testing the LAN Path from Your PC to a Remote Device458
Appendix B: Technical Specifications and Environmental Requirements459
Appendix C: Factory Default Settings461
Device Management461
User Management463
Networking464
Wireless468
VPN469
Security Services471
Firewall471
Reports473
Default Service Objects474
Default Address Objects478
Appendix D: Where to Go From Here479
Cisco ISA500 Series Integrated Security Appliances Administration Guide18
Getting Started
This chapter provides an overview of the Cisco ISA500 Series Integrated Security
Appliance and describes basic configuration tasks to help you configure your
security appliance. It includes the following sections:
•Introduction, page 20
•Product Overview, page 21
•Getting Started with the Configuration Utility, page 25
•Factory Default Settings, page 30
•Performing Basic Configuration Tasks, page 32
NOTE For information about how to physically install your security appliance, see the
Cisco ISA500 Series Integrated Security Appliances Quick Start Guide at:
www.cisco.com/go/isa500resources.
1
Cisco ISA500 Series Integrated Security Appliances Administration Guide19
Getting Started
Introduction
Introduction
1
Thank you for choosing the Cisco ISA500 Series Integrated Security Appliance, a
member of the Small Business Family. The ISA500 Series is a set of Unified Threat
Management (UTM) security appliances that provide business-class security
gateway solutions with dual WAN, DMZ, zone-based firewall, site-to-site and
remote access VPN (including IPsec Remote Access, Teleworker VPN Client, and
SSL VPN) support, and Internet threat protection, such as Intrusion Prevention
(IPS), Anti-Virus, Application Control, Web URL Filtering, Web Reputation Filtering,
Spam Filter, and Network Reputation. The ISA550W and ISA570W include
802.11b/g/n access point capabilities.
The following table lists the available model numbers.
ModelDescriptionConfiguration
ISA550Cisco ISA550 Integrated
Security Appliance
ISA550WCisco ISA550 Integrated
Security Appliance with
Wi-Fi
ISA570Cisco ISA570 Integrated
Security Appliance
ISA570WCisco ISA570 Integrated
Security Appliance with
Wi-Fi
NOTE Any configurable port can be configured to be a WAN, DMZ, or LAN port. Only one
configurable port can be configured as a WAN port at a time. Up to 4 configurable
ports can be configured as DMZ ports.
1 WAN port, 2 LAN ports,
4 configurable ports, and 1 USB 2.0
port
1 WAN port, 2 LAN ports,
4 configurable ports, 1 USB 2.0 port,
and 802.11b/g/n
1 WAN port, 4 LAN ports,
5 configurable ports, and 1 USB 2.0
port
1 WAN port, 4 LAN ports,
5 configurable ports, 1 USB 2.0 port,
and 802.11b/g/n
Cisco ISA500 Series Integrated Security Appliances Administration Guide20
Getting Started
282351
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
234
56
7
ISA550
Cisco
281983
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
234
56
7
WLAN
ISA550W
Cisco
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
910
234
56
7
8
WLAN
281980
ISA570W
Cisco
Product Overview
Product Overview
Before you use the security appliance, become familiar with the lights on the front
panel and the ports on the rear panel.
•Front Panel, page 21
•Back Panel, page 23
Front Panel
ISA550 Front Panel
1
ISA550W Front Panel
ISA570 Front Panel
ISA570
USB
VPN
ISA570W Front Panel
SPEED
LINK /ACT
1
WANLAN
234
56
Small Business
Cisco
8
7
910
CONFIGURABLEPOWER/SYS
282350
Cisco ISA500 Series Integrated Security Appliances Administration Guide21
Getting Started
Product Overview
1
Front Panel Lights
The following table describes the lights on the front panel of the security
appliance. These lights are used for monitoring system activity.
LightDescription
POWER/SYSIndicates the power and system status.
•Solid green when the system is powered on and is
operating normally.
•Flashes green when the system is booting.
•Solid amber when the system has a booting problem,
a device error occurs, or the system has a problem.
VPNIndicates the site-to-site VPN connection status.
•Solid green when there are active site-to-site VPN
connections.
•Flashes green when attempting to establish a
site-to-site VPN tunnel.
•Flashes amber when the system is experiencing
problems setting up a site-to-site VPN connection
and there is no VPN connection.
USBIndicates the USB device status.
•Solid green when a USB device is detected and is
operating normally.
•Flashes green when the USB device is transmitting
and receiving data.
WLAN
(ISA550W and
ISA570W only)
Indicates the WLAN status.
•Solid green when the WLAN is up.
•Flashes green when the WLAN is transmitting and
receiving data.
Cisco ISA500 Series Integrated Security Appliances Administration Guide22
Getting Started
281984
ANT02ANT01
RESET
I
/
O
POWER
12VDC
4
5
6
7
CONFIGURABLE
2
3
LAN
1
WAN
ANT01ANT02
Reset
Button
Power
Switch
Power
Connector
WAN
Por t
USB
Por t
Configurable
Por ts
LAN
Por ts
Product Overview
1
LightDescription
SPEEDIndicates the traffic rate of the associated port.
•Off when the traffic rate is 10 or 100 Mbps.
•Solid green when the traffic rate is 1000 Mbps.
LINK/ACTIndicates that a connection is being made through the port.
•Solid green when the link is up.
•Flashes green when the port is transmitting and
receiving data.
Back Panel
The back panel is where you connect the network devices. The ports on the panel
vary depending on the model.
ISA550 and ISA550W Back Panel
Cisco ISA500 Series Integrated Security Appliances Administration Guide23
Getting Started
281981
I
/
O
RESET
ANT02ANT01
1
6
7
8910
WAN
CONFIGURABLE
POWER
12VDC
2
3
4
5
LAN
ANT01ANT02
Reset
Button
Power
Switch
Power
Connector
WAN
Por t
USB
Por t
Configurable
Por ts
LAN
Por ts
Product Overview
1
ISA570 and ISA570W Back Panel
Back Panel Descriptions
FeatureDescription
ANT01/ANT02Threaded connectors for the antennas (for ISA550W and
ISA570W only).
USB PortConnects the unit to a USB device. You can use a USB
device to save and restore system configuration, or to
upgrade the firmware.
Configurable
Ports
Can be set to operate as WAN, LAN, or DMZ ports. ISA550
and ISA550W have 4 configurable ports. ISA570 and
ISA570W have 5 configurable ports.
NOTE: Only one configurable port can be configured as a
WAN port at a time. Up to 4 configurable ports can be
configured as DMZ ports.
LAN PortsConnects PCs and other network appliances to the unit.
ISA550 and ISA550W have 2 dedicated LAN ports. ISA570
and ISA570W have 4 dedicated LAN ports.
WAN PortConnects the unit to a DSL or a cable modem, or other WAN
connectivity device.
Cisco ISA500 Series Integrated Security Appliances Administration Guide24
Getting Started
Getting Started with the Configuration Utility
FeatureDescription
RESET ButtonTo reboot the unit, push and release the RESET button for
Power SwitchPowers the unit on or off.
1
less than 3 seconds.
To restore the unit to its factory default settings, push and
hold the RESET button for more than 3 seconds while the
unit is powered on and the POWER/SYS light is solid green.
The POWER/SYS light will flash green when the system is
rebooting.
Power
Connector
Connects the unit to power using the supplied power cord
and adapter.
Getting Started with the Configuration Utility
The ISA500 Series Configuration Utility is a web-based device manager that is
used to provision the security appliance. To use this utility, you must be able to
connect to the security appliance from a PC or laptop. You can access the
Configuration Utility by using the following web browsers:
•Microsoft Internet Explorer 8 and 9
•Mozilla Firefox 3.6.x, 5, and 6
NOTE The minimum recommended display resolution for the PC running the Web
browser used to access the Configuration Utility is 1024 x 768.
This section includes the following topics:
•Logging in to the Configuration Utility, page 26
•Navigating Through the Configuration Utility, page 27
•Using the Help System, page 28
•Configuration Utility Icons, page 28
Cisco ISA500 Series Integrated Security Appliances Administration Guide25
Getting Started
Getting Started with the Configuration Utility
Logging in to the Configuration Utility
STEP 1Connect your computer to an available LAN port on the back panel.
Your PC will become a DHCP client of the security appliance and will receive an IP
address in the 192.168.75.x range.
STEP 2Start a web browser. In the address bar, enter the default IP address of the
security appliance: 192.168.75.1.
NOTE: The above address is the factory default LAN address. If you change this
setting, enter the new IP address to connect to the Configuration Utility.
STEP 3When the login page opens, enter the username and password.
The default username is cisco. The default password is cisco. Usernames and
passwords are case sensitive.
1
STEP 4Click Login.
STEP 5For security purposes, you must change the default password of the default
administrator account. Set a new administrator password and click OK.
STEP 6If you can access the Internet and a newer firmware is detected, the Firmware
Upgrade window opens. Follow the on-screen prompts to download and install
the firmware. See Upgrading your Firmware After your First Login, page 33.
STEP 7If you cannot access the Internet or you are using the latest firmware, the Setup
Wizard will now launch. Follow the on-screen prompts to complete the initial
configuration. See Using the Setup Wizard for the Initial Configuration, page 36.
Cisco ISA500 Series Integrated Security Appliances Administration Guide26
Getting Started
1
2
Getting Started with the Configuration Utility
Navigating Through the Configuration Utility
Use the left hand navigation pane to perform the tasks in the Configuration Utility.
1
NumberComponentDescription
1Left Hand
Navigation
Pane
2Main ContentThe main content of the feature or sub-feature
The left hand navigation pane provides easy
navigation through the configurable features. The
main branches expand to provide the features. Click
the main branch title to expand its contents. Click
the triangle next to a feature to expand or contract
its sub-features. Click the title of a feature or
sub-feature to open it.
appears in this area.
Cisco ISA500 Series Integrated Security Appliances Administration Guide27
Getting Started
Getting Started with the Configuration Utility
Using the Help System
The Configuration Utility provides a context-sensitive help file for all configuration
tasks. To view the Help page, click the Help link in the top right corner of the
screen. A new window opens with information about the page that you are
currently viewing.
Configuration Utility Icons
The Configuration Utility has icons for commonly used configuration options. The
following table describes these icons:
IconDescriptionAction
1
Add iconAdd an entry.
Edit iconEdit an entry.
Duplicate icon
Delete iconDelete an entry or delete multiple selected
Move iconMove an item to a specific location.
Move down icon Move an item down one position.
Move up iconMove an item up one position.
Expand triangle
icon
Contract triangle
icon
Create a copy of an existing entry.
entries.
Expand the sub-features of a feature in the left
navigation pane or expand the items under a
category.
Contract the sub-features of a feature in the left
navigation pane or contract the items under a
category.
Connect iconEstablish a VPN connection.
Disconnect or
Logout icon
Cisco ISA500 Series Integrated Security Appliances Administration Guide28
Terminate a VPN connection or an active user
session.
Getting Started
Getting Started with the Configuration Utility
IconDescriptionAction
1
Forced Authorized
icon
Forced
Unauthorized icon
Auto iconEnable 802.1x access control and cause the
Import PC iconImport a local certificate or a CA certificate
Export to USB or
Import from USB
icon
Details iconView the details of a certificate or a Certificate
Disable 802.1x access control and cause the
port to transition to the authorized state without
any authentication exchange required.
Cause the port to remain in the unauthorized
state, ignoring all attempts by the client to
authenticate.
port to begin in the unauthorized state, allowing
only EAPOL frames to be sent and received
through the port.
from PC.
Export a local certificate, a CA certificate, or a
Certificate Signing Request to a USB key, or
import a local certificate or a CA certificate
from a USB key.
Signing Request.
Download iconDownload a local certificate, a CA certificate, or
a Certificate Signing Request to PC.
Upload iconUpload a signed certificate for the Certificate
Signing Request from PC.
Install or Renew
icon
Refresh iconRefresh the data.
Reset iconReset the device to the factory defaults, or
Check for Updates
Now icon
Credentials iconView the device credentials.
Email Alerts iconView or configure the email alert settings.
Install the security license.
renew the security license.
Check for new signature updates from Cisco’s
signature server immediately.
Cisco ISA500 Series Integrated Security Appliances Administration Guide29
Getting Started
Factory Default Settings
Factory Default Settings
The security appliance is preconfigured with settings to allow you to start using
the device with minimal changes. Depending on the requirements of your Internet
Service Provider (ISP) and the needs of your business, you may need to modify
some of these settings. You can use the Configuration Utility to customize all
settings, as needed.
This section includes the following topics:
•Default Settings of Key Features, page 30
•Restoring the Factory Default Settings, page 31
Default Settings of Key Features
1
The default settings of key features are described below. For a full list of all factory
default settings, see Factory Default Settings, page 461.
•IP Routing Mode: By default, only the IPv4 mode is enabled. To support
IPv4 and IPv6 addressing, enable the IPv4/IPv6 mode. See Configuring IPv4
or IPv6 Routing, page116.
•WAN Configuration: By default, the security appliance is configured to
obtain an IP address from your ISP using Dynamic Host Configuration
Protocol (DHCP). Depending on the requirement of your ISP, configure the
network addressing mode for the primary WAN. You can change other WAN
settings as well. See Configuring WAN Settings for Your Internet
Connection, page122.
•LAN Configuration: By default, the LAN of the security appliance is
configured in the 192.168.75.0 subnet and the LAN IP address is
192.168.75.1. The security appliance acts as a DHCP server to the hosts on
the LAN network. It can automatically assign IP addresses and DNS server
addresses to the PCs and other devices on the LAN. For most deployment
scenarios, the default DHCP and TCP/IP settings should be satisfactory.
However, you can change the subnet address or the default IP address. See
Configuring a VLAN, page 137.
•VLAN Configuration: The security appliance predefines a native VLAN
(DEFAULT) and a guest VLAN (GUEST). You can customize the predefined
VLANs or create new VLANs for your specific business needs. See
Configuring a VLAN, page 137.
Cisco ISA500 Series Integrated Security Appliances Administration Guide30
Loading...
+ 449 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.