Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7817644=
Text Part Number: 78-17644-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Wa y We
Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP,
CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the
Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink,
Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers
logo, Networking Academy, Network Registrar, Pa cke t, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast,
SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates
in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0601R)
2Maximizing Throughput on the ASA 5550 Adaptive Security Appliance 2-1
Embedded Network Interfaces 2-1
Balancing Traffic to Maximize Throughput 2-2
What to Do Next 2-5
3Installing the Cisco ASA 5550 Security Appliance 3-1
Verifying the Package Contents 3-2
Installing the Chassis 3-3
Rack-Mounting the Chassis 3-4
Installing SFP Modules 3-5
SFP Module 3-6
Installing an SFP Module 3-7
Ports and LEDs 3-9
Front Panel LEDs 3-9
Rear Panel LEDs and Ports in Slot 0 3-10
Ports and LEDs in Slot 1 3-12
CHAPTER
78-17644-01
What to Do Next 3-13
4Connecting Cables to Network Interfaces 4-1
Connecting Interface Cables 4-1
What to Do Next 4-7
Cisco ASA 5550 Getting Started Guide
iii
Page 4
Contents
CHAPTER
CHAPTER
5Configuring the Adaptive Security Appliance 5-1
About the Factory-Default Configuration 5-2
About the Adaptive Security Device Manager 5-2
Using the Startup Wizard 5-3
Before Launching the Startup Wizard 5-4
Running the Startup Wizard 5-4
Setting the Media Type for Fiber Interfaces 5-6
What to Do Next 5-7
6Scenario: DMZ Configuration 6-1
Example DMZ Network Topology 6-1
Configuring the Security Appliance for a DMZ Deployment 6-4
Configuration Requirements 6-5
Starting ASDM 6-6
Creating IP Pools for Network Address Translation 6-7
Configuring NAT for Inside Clients to Communicate with the DMZ Web
Server
6-12
Configuring NAT for Inside Clients to Communicate with Devices on the
Internet
6-15
Configuring an External Identity for the DMZ Web Server 6-16
Providing Public HTTP Access to the DMZ Web Server 6-18
CHAPTER
iv
What to Do Next 6-24
7Scenario: Remote-Access VPN Configuration 7-1
Example IPsec Remote-Access VPN Network Topology 7-1
Implementing the IPsec Remote-Access VPN Scenario 7-2
Information to Have Available 7-3
Starting ASDM 7-4
Configuring the ASA 5550 for an IPsec Remote-Access VPN 7-5
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 5
Selecting VPN Client Types 7-6
Specifying the VPN Tunnel Group Name and Authentication Method 7-7
Specifying a User Authentication Method 7-8
(Optional) Configuring User Accounts 7-10
Configuring Address Pools 7-11
Configuring Client Attributes 7-12
Configuring the IKE Policy 7-13
Configuring IPsec Encryption and Authentication Parameters 7-15
Specifying Address Translation Exception and Split Tunneling 7-16
Verifying the Remote-Access VPN Configuration 7-17
What to Do Next 7-18
Contents
CHAPTER
APPENDIX
8Scenario: Site-to-Site VPN Configuration 8-1
Example Site-to-Site VPN Network Topology 8-1
Implementing the Site-to-Site Scenario 8-2
Information to Have Available 8-2
Configuring the Site-to-Site VPN 8-3
Starting ASDM 8-3
Configuring the Security Appliance at the Local Site 8-4
Providing Information About the Remote VPN Peer 8-6
Configuring the IKE Policy 8-7
Configuring IPsec Encryption and Authentication Parameters 8-9
Specifying Hosts and Networks 8-10
Viewing VPN Attributes and Completing the Wizard 8-11
Configuring the Other Side of the VPN Connection 8-13
What to Do Next 8-13
AObtaining a DES License or a 3DES-AES License A-1
78-17644-01
Cisco ASA 5550 Getting Started Guide
v
Page 6
Contents
vi
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 7
CHA P T E R
1
Before You Begin
Use the following table to find the installation and configuration steps that are
required for your implementation of the adaptive security appliance.
To Do This ...See ...
Install the chassisChapter 3, “Installing the Cisco ASA
5550 Security Appliance”
Connect cables to network interfaces Chapter 4, “Connecting Cables to
Network Interfaces”
Perform initial setup of the adaptive
security appliance
Configure the adaptive security
appliance for your implementation
Refine configuration
Configure optional and advanced
features
Chapter 5, “Configuring the Adaptive
Security Appliance”
Cisco Security Appliance Command
Line Configuration Guide
Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
78-17644-01
Cisco ASA 5550 Getting Started Guide
1-1
Page 8
Chapter 1 Before You Begin
1-2
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 9
Maximizing Throughput on the ASA
5550 Adaptive Security Appliance
The Cisco ASA 5550 Series Security Appliance is designed to deliver maximum
throughput when configured according to the guidelines described in this chapter.
This chapter includes the following sections:
• Embedded Network Interfaces, page 2-1
• Balancing Traffic to Maximize Throughput, page 2-2
• What to Do Next, page 2-5
Embedded Network Interfaces
CHA P T E R
2
78-17644-01
The adaptive security appliance has two internal buses providing copper Gigabit
Ethernet and fiber Gigabit Ethernet connectivity:
• Slot 0 (corresponding to Bus 0) has four embedded copper Gigabit Ethernet
ports
• Slot 1 (corresponding to Bus 1) has four embedded copper Gigabit Ethernet
ports and four embedded SFPs that support fiber Gigabit Ethernet
connectivity
Cisco ASA 5550 Getting Started Guide
2-1
Page 10
Chapter 2 Maximizing Throughput on the ASA 5550 Adaptive Security Appliance
Balancing Traffic to Maximize Throughput
NoteTo establish fiber connectivity on the adaptive security appliance, you must order
and install SFP modules for each fiber port you want to use. For more information
on fiber ports and SFP modules, see the “Installing SFP Modules” section on
page 3-5.
Figure 2-1 shows the embedded ports on the FWSM.
Figure 2-1Embedded Ports on the ASA 5550
Slot 1
LNK
SPD0123
PWR
STATUS
EthernetFiber
MGMT
USB2
USB1
Slot 0
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
Ethernet
CONSOLE
FLASH
STATUS
ACTIVE
VPN
FLASH
0
POWER
AUX
NoteAlthough Slot 1 has four copper Ethernet ports and four fiber Ethernet ports, you
can use only four Slot 1 ports at a time. For example, you could use two Slot 1
copper ports and two fiber ports, but you cannot use fiber ports if you are already
using all four Slot 1 copper ports.
Balancing Traffic to Maximize Throughput
To maximize traffic throughput, configure the adaptive security appliance so that
traffic is distributed equally between the two buses in the device. To achieve this,
lay out the network so that all traffic flows through both Bus 0 (Slot 0) and Bus 1
(Slot 1), entering through one bus and exiting through the other.
153217
2-2
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 11
Chapter 2 Maximizing Throughput on the ASA 5550 Adaptive Security Appliance
Balancing Traffic to Maximize Throughput
In Figure 2-2 and Figure 2-3, network traffic is distributed so that all traffic flows
through both buses in the device, enabling the adaptive security appliance to
deliver maximum throughput.
Figure 2-2Traffic Evenly Distributed for Maximum Throughput (Copper to Copper)
Maximum
Slot 1
throughput
Slot 0
LNK
Incoming and
outgoing traffic
MGMT
SPD0123
PWR
STATUS
USB2
USB1
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
0
POWER
STATUS
FLASH
ACTIVE
VPN
FLASH
Incoming and
outgoing traffic
CONSOLE
AUX
Figure 2-3Traffic Evenly Distributed for Maximum Throughput (Copper to Fiber)
Maximum
Slot 1
LNK
SPD0123
PWR
STATUS
Incoming and
outgoing traffic
throughput
MGMT
USB2
USB1
Slot 0
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
0
Incoming and
outgoing traffic
POWER
STATUS
FLASH
ACTIVE
CONSOLE
AUX
VPN
FLASH
153104
153305
78-17644-01
Cisco ASA 5550 Getting Started Guide
2-3
Page 12
Balancing Traffic to Maximize Throughput
Figure 2-4 illustrates several configurations that do not enable the adaptive
security appliance to deliver maximum throughput because network traffic flows
through only one bus on the device.
Figure 2-4Configurations Not Enabling Maximum Throughput
Chapter 2 Maximizing Throughput on the ASA 5550 Adaptive Security Appliance
Slot 1
LNK
SPD0123
Slot 1
LNK
SPD0123
Slot 1
LNK
SPD0123
Incoming and
outgoing traffic
S
U
T
R
A
W
T
P
S
S
U
T
R
A
W
T
P
S
Incoming and
outgoing traffic
S
U
T
R
A
W
T
P
S
Slot 0
MGMT
USB2
USB1
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
Incoming and
outgoing traffic
Slot 0
MGMT
USB2
USB1
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
Slot 0
MGMT
USB2
USB1
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
CONSOLE
FLASH
0
0
0
VPN
ACTIVE
POWER
STATUS
FLASH
VPN
ACTIVE
POWER
STATUS
FLASH
VPN
ACTIVE
POWER
STATUS
AUX
FLASH
CONSOLE
AUX
FLASH
CONSOLE
AUX
FLASH
2-4
Slot 1
LNK
SPD0123
SUT
R
A
W
T
P
S
Incoming and outgoing traffic
Cisco ASA 5550 Getting Started Guide
Slot 0
MGMT
USB2
USB1
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
FLASH
0
VPN
ACTIVE
POWER
STATUS
CONSOLE
AUX
FLASH
153306
78-17644-01
Page 13
Chapter 2 Maximizing Throughput on the ASA 5550 Adaptive Security Appliance
NoteYou can use the show traffic command to see the traffic throughput over each bus.
For more information about using the command, see the Cisco Security Appliance
Command Reference.
What to Do Next
Continue with Chapter 3, “Installing the Cisco ASA 5550 Security Appliance.”
What to Do Next
78-17644-01
Cisco ASA 5550 Getting Started Guide
2-5
Page 14
What to Do Next
Chapter 2 Maximizing Throughput on the ASA 5550 Adaptive Security Appliance
2-6
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 15
CHA P T E R
3
Installing the Cisco ASA 5550 Security
Appliance
Warning
CautionRead the safety warnings in the Regulatory Compliance and Safety Information
Only trained and qualified personnel should be allowed to install, replace, or
service this equipment.
for the Cisco ASA 5500 Series and follow proper safety procedures when
performing these steps.
This chapter describes the ASA 5550 adaptive security appliance and rack-mount
and installation procedures for the adaptive security appliance. This chapter
includes the following sections:
• Verifying the Package Contents, page 3-2
• Installing the Chassis, page 3-3
• Installing SFP Modules, page 3-5
• Ports and LEDs, page 3-9
• What to Do Next, page 3-13
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-1
Page 16
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Verifying the Package Contents
Verifying the Package Contents
Verify the contents of the packing box, shown in Figure 3-1, to ensure that you
have received all items necessary to install the Cisco ASA 5550.
Figure 3-1Contents of ASA 5550 Package
L
N
K
3
2
1
0
Cisco SSM-4GE
S
P
D
POWER
MGMT
USB2
STATUS
USB1
L
IN
K
S
P
D
L
IN
3
F
L
A
S
K
S
P
2
H
D
L
IN
K
S
P
D
L
IN
K
1
S
R
P
D
E
S
0
W
U
O
T
E
P
A
IV
T
N
T
H
S
P
S
C
V
A
A
L
F
Cisco ASA 5550 adaptive
security appliance
Mounting brackets
(700-18797-01 AO) right
(700-18798-01 AO) left
2 long cap screws
(48-0654-01 AO)
4 flathead screws
(48-0451-01 AO)
4 cap screws
(48-0523-01 AO)
4 rubber feet
Yellow Ethernet cable
(72-1482-01)
Blue console cable
PC terminal adapter
Cable holder
Cisco ASA
5550 Adaptive
Security Appliance
Product CD
Documentation
Safety and
Compliance
Guide
153215
3-2
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 17
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Installing the Chassis
This section describes how to rack-mount and install the adaptive security
appliance. You can mount the adaptive security appliance in a 19-inch rack (with
a 17.5- or 17.75-inch opening).
Installing the Chassis
Warning
Warning
To prevent bodily injury when mounting or servicing this unit in a rack, you must
take special precautions to ensure that the system remains stable. The
following guidelines are provided to ensure your safety.
The following information can help plan equipment rack installation:
• Allow clearance around the rack for maintenance.
•When mounting a device in an enclosed rack ensure adequate ventilation. An
enclosed rack should never be overcrowded.
Make sure that the rack is not
congested, because each unit generates heat.
• When mounting a device in an open rack, make sure that the rack frame does
not block the intake or exhaust ports.
• If the rack contains only one unit, mount the unit at the bottom of the rack.
• If the rack is partially filled, load the rack from the bottom to the top, with the
heaviest component at the bottom of the rack.
• If the rack contains stabilizing devices, install the stabilizers prior to
mounting or servicing the unit in the rack.
Before performing any of the following procedures, ensure that the power
source is off. (AC or DC). To ensure that power is removed from the DC circuit,
locate the circuit breaker on the panel board that services the DC circuit,
switch the circuit breaker to the OFF position, and tape the switch handle of the
circuit breaker in the OFF position.
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-3
Page 18
Installing the Chassis
Rack-Mounting the Chassis
To rack-mount the chassis, perform the following steps:
Step 1Attach the rack-mount brackets to the chassis using the supplied screws. Attach
the brackets to the holes as shown in Figure 3-2. After the brackets are secured to
the chassis, you can rack-mount it.
Figure 3-2Installing the Right and Left Brackets
LNK
3
2
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
1
153216
3-4
Step 2
Cisco ASA 5550 Getting Started Guide
Attach the chassis to the rack using the supplied screws, as shown in Figure 3-3.
78-17644-01
Page 19
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Figure 3-3Rack-Mounting the Chassis
Installing SFP Modules
C
IS
CO
A
S
A
POWER
STATUS
ACT
IVE
VP
554
A
0
d
a
S
p
E
tiv
R
I
e
E
S
S
e
c
u
r
ity
A
p
p
N
FLASH
lia
n
c
e
119633
To remove the chassis from the rack, remove the screws that attach the chassis to
the rack, and then remove the chassis.
Installing SFP Modules
The adaptive security appliance uses a field-replaceable SFP module to establish
fiber Gigabit Ethernet connections.
This section describes how to install and remove SFP modules in the adaptive
security appliance. This section includes the following topics:
• SFP Module, page 3-6
• Installing an SFP Module, page 3-7
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-5
Page 20
Installing SFP Modules
SFP Module
NoteIf you install an SFP module after the switch has powered on, you must reload the
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
The SFP (Small Form-Factor Pluggable) module is a hot-swappable input/output
device that plugs into the fiber ports.
adaptive security appliance to enable the SFP module.
Table 3-1 lists the SFP modules that are supported by the adaptive security
appliance.
Table 3-1Supported SFP Modules
SFP Module Type of Connection Cisco Part Number
1000BASE-LX/LHFiberGLC-LH-SM=
1000BASE-SXFiberGLC-SX-MM=
The 1000BASE-LX/LH and 1000BASE-SX SFP modules are used to establish
fiber connections. Use fiber cables with LC connectors to connect to an SFP
module. The SFP modules support 850 to 1550 nm nominal wavelengths. The
cables must not exceed the required cable length for reliable communications.
Table 3-2 lists the cable length requirements.
Table 3-2Cabling Requirements for Fiber-Optic SFP Modules
SFP Module
62.5/125 micron
Multimode 850
nm Fiber
50/125 micron
Multimode 850
nm Fiber
62.5/125 micron
Multimode
1310 nm Fiber
——550 m at
LX/LH
SX
275 m at
200 Mhz-km
Cisco ASA 5550 Getting Started Guide
550 m at
500 Mhz-km
500 Mhz-km
———
3-6
50/125 micron
Multimode
1310 nm Fiber
550 m at
400 Mhz-km
9/125 micron
Single-mode
1310 nm Fiber
10 km
78-17644-01
Page 21
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Use only Cisco-certified SFP modules on the adaptive security appliance. Each
SFP module has an internal serial EEPROM that is encoded with security
information. This encoding provides a way for Cisco to identify and validate that
the SFP module meets the requirements for the adaptive security appliance.
NoteOnly SFP modules certified by Cisco are supported on the adaptive security
appliance.
CautionProtect your SFP modules by inserting clean port plugs into the SFPs after the
cables are extracted from them. Be sure to clean the optic surfaces of the fiber
cables before you plug them back into the optical bores of another SFP module.
Avoid getting dust and other contaminants into the optical bores of your SFP
modules: The optics do not work correctly when obstructed with dust.
Installing SFP Modules
Warning
Because invisible laser radiation may be emitted from the aperture of the port
when no cable is connected, avoid exposure to laser radiation and do not stare
into open apertures.
Installing an SFP Module
To install an SFP module in a fiber port in Slot 1, perform the following steps:
Step 1Line up the SFP module with the port and slide the SFP module into the port slot
until it locks into position as shown in Figure 3-4.
78-17644-01
Statement 70
Cisco ASA 5550 Getting Started Guide
3-7
Page 22
Installing SFP Modules
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Figure 3-4Installing an SFP Module
3
2
132985
1
1Port plug3SFP module
2Port slot
3-8
CautionDo not remove the port plugs from the SFP module until you are ready to connect
the cables.
Step 2Remove the port plug; then connect the network cable to the SFP module.
Step 3Connect the other end of the cable to your network. For more information on
connecting the cables, see Chapter 4, “Connecting Cables to Network Interfaces.”
CautionThe latching mechanism used on many SFP modules locks them into place when
cables are connected. Do not pull on the cabling in an attempt to remove the SFP
module.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 23
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Ports and LEDs
This section describes the front and rear panels. Figure 3-5 shows the front panel
LEDs. This section includes the following topics:
• Front Panel LEDs, page 3-9
• Rear Panel LEDs and Ports in Slot 0, page 3-10
• Ports and LEDs in Slot 1, page 3-12
Front Panel LEDs
Figure 3-5 shows the LEDs on the front panel of the adaptive security appliance.
Figure 3-5Front Panel LEDs
Ports and LEDs
POWER STATUS
1
2
ACTIVE
3
CISCO ASA 5540
VPN
FLASH
5
4
SERIES
Adaptive Security Appliance
119638
LED ColorStateDescription
1Power GreenOnThe system has power.
2Status GreenFlashing The power-up diagnostics are running or the system is booting.
SolidThe system has passed power-up diagnostics.
Amber SolidThe power-up diagnostics have failed.
3Active GreenFlashingThere is network activity.
4VPNGreenSolidVPN tunnel is established.
5FlashGreen SolidThe CompactFlash is being accessed.
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-9
Page 24
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Ports and LEDs
Rear Panel LEDs and Ports in Slot 0
Figure 3-6 shows the rear panel LEDs and ports in Slot 0.
Figure 3-6Rear Panel LEDs and Ports on Slot 0 (AC Power Supply Model Shown)
1
MGMT
LNK
SPD0123
PWR
1 Management Port
STATUS
1
USB2
USB1
6
LINK SPD2LINK SPD1LINK SPD
LINK SPD
3
0
7
6USB 2.0 interfaces
2 External CompactFlash slot 7Network interfaces
2
FLASH
ACTIVE
POWER
STATUS
810 12
11
9
2
3
3
CONSOLE
AUX
VPN
FLASH
13
11VPN LED
12Flash LED
4
5
153103
14
3 Serial Console port8Power indicator LED13AUX port
4 Power switch9Status indicator LED14Power connector
5 Power indicator LED10 Active LED
1. The management 0/0 interface is a Fast Ethernet interface designed for management traffic only.
2. Reserved for future use.
3. GigabiteEthernet interfaces, from right to left, GigabitEthernet 0/0, GigabitEthernet 0/1, GigabitEthernet 0/2, and
GigabitEthernet 0/3.
3-10
For more information on the Management Port, see the management-only
commandin the Cisco Security Appliance Command Reference.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 25
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Figure 3-7 shows the adaptive security appliance rear panel LEDs.
Figure 3-7Rear Panel Link and Speed Indicator LEDs
21
MGMT
USB2
USB1
Ports and LEDs
LNK SPD
LNK SPD2LNK SPD1LNK SPD
3
0
126917
1MGMT indicator LEDs2Network interface LEDs
Table 3-3 lists the rear MGMT and Network interface LEDs.
Table 3-3Link and Speed LEDs
IndicatorColorDescription
Left side Solid green
Green flashing
Right sideNot lit
Green
Amber
Physical link
Network activity
10 Mbps
100 Mbps
1000 Mbps
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-11
Page 26
Ports and LEDs
Ports and LEDs in Slot 1
Figure 3-8 illustrates the ports and LEDs in Slot 1.
Figure 3-8Ports and LEDs in Slot 1
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
8
7
153212
LNK
Cisco SSM-4GE
3
2
SPD0123
PWR
STATUS
5
1
4
6
1Copper Ethernet ports5Status LED
2RJ-45 Link LED6Fiber Ethernet ports
3RJ-45 Speed LED7SFP Link LED
4Power LED8SFP Speed LED
NoteFigure 3-8 shows SFP modules installed in the fiber Ethernet ports. You must
order and install the SFP modules if you want to establish fiber Ethernet
connectivity. For more information on fiber ports and SFP modules, see the
“Installing SFP Modules” section on page 3-5.
Table 3-4 describes the LEDs in Slot 1.
3-12
Table 3-4 LEDs on Bus G1
LED ColorStateDescription
2, 7LINKGreenSolid There is an Ethernet link.
FlashingThere is Ethernet activity.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 27
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
Table 3-4 LEDs on Bus G1 (continued)
LED ColorStateDescription
3, 8SPEEDOff
Green
Amber
4POWERGreenOnThe system has power.
5STATUSGreen
Green
Amber
What to Do Next
Continue with Chapter 4, “Connecting Cables to Network Interfaces.”
What to Do Next
10 MBThere is no network activity.
100 MBThere is network activity at
100 Mbps.
1000 MB
(GigE)
FlashingThe system is booting.
SolidThe system booted correctly.
SolidThe system diagnostics failed.
There is network activity at
1000 Mbps.
78-17644-01
Cisco ASA 5550 Getting Started Guide
3-13
Page 28
What to Do Next
Chapter 3 Installing the Cisco ASA 5550 Security Appliance
3-14
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 29
CHA P T E R
4
Connecting Cables to Network
Interfaces
This chapter describes how to connect the appropriate cables to the Console,
Auxiliary, Management, copper Ethernet, and fiber Ethernet ports.
This chapter includes the following sections:
• Connecting Interface Cables, page 4-1
• What to Do Next, page 4-7
Warning
CautionRead the safety warnings in the Regulatory Compliance and Safety Information for
Only trained and qualified personnel should install, replace, or service this
equipment. Statement 49
the Cisco ASA 5500 Series and follow proper safety procedures when performing
these steps.
Connecting Interface Cables
To connect cables to the network interfaces, perform the following steps:
Step 1Place the chassis on a flat, stable surface, or in a rack (if you are rack-mounting it).
Step 2Connect to the Management port.
78-17644-01
Cisco ASA 5550 Getting Started Guide
4-1
Page 30
Connecting Interface Cables
The adaptive security appliance has a dedicated interface for device management
that is referred to as the Management0/0 port. The Management0/0 port is a Fast
Ethernet interface. This port is similar to the Console port, but the Management0/0
port only accepts incoming traffic to the adaptive security appliance.
NoteYou can configure any interface to be a management-only interface using
a. Locate an Ethernet cable, which has an RJ-45 connector on each end.
b. Connect one RJ-45 connector to the Management0/0 port, as shown in
c. Connect the other end of the Ethernet cable to the Ethernet port on your
Figure 4-1Connecting to the Management Port
Chapter 4 Connecting Cables to Network Interfaces
the management-only command. You can also disable management-only
mode on the management interface. For more information about this
command, see the management-only command in the Cisco Security Appliance Command Reference.
Figure 4-1.
computer or to your management network.
4-2
1
MGMT
USB2
USB1
LNK SPD
1Management port 2RJ-45 to RJ-45 Ethernet cable
Cisco ASA 5550 Getting Started Guide
LNK SPD2LNK SPD1LNK SPD
3
2
0
92684
78-17644-01
Page 31
Chapter 4 Connecting Cables to Network Interfaces
Step 3Connect to the Console port.
a. Before connecting a computer or terminal to any ports, check to determine the
baud rate of the serial port. The baud rate must match the default baud rate
(9600 baud) of the Console port of the adaptive security appliance.
Set up the terminal as follows: 9600 baud (default), 8 data bits, no parity, 1 stop
bits, and Flow Control (FC) = Hardware.
b. Locate the serial console cable, which has an RJ-45 connector on one end and
a DB-9 connector on the other end for the serial port on your computer.
c. Connect the RJ-45 connector to the Console port of the adaptive security
appliance as shown in Figure 4-2.
d. Connect the DB-9 connector to the console port on your computer.
Figure 4-2Connecting the Console Cable
Connecting Interface Cables
CONSOLE
Step 4
POWER
STATUS
ACTIVE
FLASH
VPN
FLASH
AUX
1
2
126982
1 RJ-45 Console port 2RJ-45 to DB-9 console cable
Connect to the Auxiliary port (labeled AUX).
a. Locate the serial console cable, which has an RJ-45 connector on one end and
a DB-9 connector on the other end for the serial port on your computer.
b. Connect the RJ-45 connector of the cable to the Auxiliary port (labeled AUX)
on the adaptive security appliance, as shown in Figure 4-3.
78-17644-01
Cisco ASA 5550 Getting Started Guide
4-3
Page 32
Connecting Interface Cables
c. Connect the other end of the cable, the DB-9 connector, to the serial port on
Figure 4-3Connecting to the AUX Port
1RJ-45 AUX port 2RJ-45 to DB-9 console cable
your computer.
FLASH
VPN
FLASH
ACTIVE
POWER
STATUS
Chapter 4 Connecting Cables to Network Interfaces
CONSOLE
AUX
1
2
92686
4-4
Step 5Connect to copper Ethernet ports to be used for network connections. Copper
Ethernet ports are available both in Slot 0 and Slot 1.
NoteYou must use a port in Slot 0 for the inside interface, and a port in Slot 1
for the outside interface.
a. Connect one end of an Ethernet cable to a copper Ethernet port, as shown in
Figure 4-4 and Figure 4-5.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 33
Chapter 4 Connecting Cables to Network Interfaces
Figure 4-4Connecting to a Copper Ethernet Interface in Slot 0
MGMT
USB2
USB1
LNK SPD
3
1Copper Ethernet ports2RJ-45 connector
LNK SPD2LNK SPD1LNK SPD
0
1
2
Connecting Interface Cables
92685
78-17644-01
Figure 4-5Connecting to a Copper Ethernet Interfaces in Slot 1
L
N
K
23
1
Cisco SSM-4GE
0
S
PD
S
ER
U
T
W
A
T
PO
S
MGMT
USB2
MGMT
USB2
USB1
1
2
153213
1Copper Ethernet ports2RJ-45 connector
Cisco ASA 5550 Getting Started Guide
4-5
Page 34
Connecting Interface Cables
b. Connect the other end of the Ethernet cable to a network device, such as a
Step 6Connect to fiber Ethernet ports to be used for network connections.
NoteSlot 1 contains four copper Ethernet ports and four fiber Ethernet ports.
For each fiber port you want to use, perform the following steps:
a. Install the SFP module:
Figure 4-6Removing the Fiber Port Plug
Chapter 4 Connecting Cables to Network Interfaces
router, switch or hub.
You can use both types of ports, but you can only have a total of four
Slot 1 ports in use at a time. For example, you could use two copper
Ethernet ports and two fiber Ethernet ports.
–
Insert and slide the SFP module into the fiber port until you hear a click.
The click indicates that the SFP module is locked into the port.
–
Remove the port plug from the installed SFP as shown in Figure 4-6.
4-6
1
1Port plug2SFP module
b.
Connect the LC connector to the SFP module as shown in Figure 4-7.
Cisco ASA 5550 Getting Started Guide
2
SUTA
TS
143146
78-17644-01
Page 35
Chapter 4 Connecting Cables to Network Interfaces
Figure 4-7Connecting the LC Connector
1LC connector2SFP module
What to Do Next
LN
K
3
2
1
Cisco SSM-4GE
0
SP
D
ER
WOP
STATUS
MGMT
USB2
MGMT
USB2
USB1
153214
2
1
c. Connect the other end of the cable to a network device, such as a router,
switch, or hub.
Step 7Connect the power cord to the adaptive security appliance and plug the other end
to the power source.
Step 8Power on the chassis.
What to Do Next
Continue with Chapter 5, “Configuring the Adaptive Security Appliance.”
78-17644-01
Cisco ASA 5550 Getting Started Guide
4-7
Page 36
What to Do Next
Chapter 4 Connecting Cables to Network Interfaces
4-8
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 37
CHA P T E R
5
Configuring the Adaptive Security
Appliance
This chapter describes the initial configuration of the adaptive security appliance.
You can perform the configuration steps using either the browser-based Cisco
Adaptive Security Device Manager (ASDM) or the command-line interface
(CLI). However, the procedures in this chapter refer to the method using ASDM.
NoteTo use ASDM, you must have a DES license or a 3DES-AES license. For more
information, see Appendix A, “Obtaining a DES License or a 3DES-AES
License.”
This chapter includes the following sections:
• About the Factory-Default Configuration, page 5-2
• About the Adaptive Security Device Manager, page 5-2
78-17644-01
• Using the Startup Wizard, page 5-3
• Setting the Media Type for Fiber Interfaces, page 5-6
• What to Do Next, page 5-7
Cisco ASA 5550 Getting Started Guide
5-1
Page 38
Chapter 5 Configuring the Adaptive Security Appliance
About the Factory-Default Configuration
About the Factory-Default Configuration
Cisco adaptive security appliances are shipped with a factory-default configuration
that enables quick startup. The factory-default configuration automatically
configures an interface for management so you can quickly connect to the device and
use ASDM to complete your configuration.
By default, the adaptive security appliance Management interface is configured with
a default DHCP address pool. This configuration enables a client on the inside
network to obtain a DHCP address from the adaptive security appliance to connect to
the appliance. Administrators can then configure and manage the adaptive security
appliance using ASDM.
About the Adaptive Security Device Manager
5-2
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 39
Chapter 5 Configuring the Adaptive Security Appliance
The Adaptive Security Device Manager (ASDM) is a feature-rich graphical
interface that enables you to manage and monitor the adaptive security appliance.
Its web-based design provides secure access so that you can connect to and
manage the adaptive security appliance from any location by using a web browser.
In addition to its complete configuration and management capability, ASDM
features intelligent wizards to simplify and accelerate the deployment of the
adaptive security appliance.
In addition to the ASDM web configuration tool, you can configure the adaptive
security appliance by using the command-line interface. For more information, see
the Cisco Security Appliance Command Line Configuration Guide and the Cisco
Security Appliance Command Reference.
Using the Startup Wizard
ASDM includes a Startup Wizard to simplify the initial configuration of your
adaptive security appliance. With a few steps, the Startup Wizard enables you to
configure the adaptive security appliance so that it allows packets to flow securely
between the inside network and the outside network.
Using the Startup Wizard
78-17644-01
NoteYou must use a port in Slot 0 for the inside interface and a port in Slot 1
for the outside interface.
This section describes how to use the Startup Wizard to set basic configuration
parameters. This section includes the following topics:
• Before Launching the Startup Wizard, page 5-4
• Running the Startup Wizard, page 5-4
Cisco ASA 5550 Getting Started Guide
5-3
Page 40
Chapter 5 Configuring the Adaptive Security Appliance
Using the Startup Wizard
Before Launching the Startup Wizard
Before you launch the Startup Wizard, perform the following steps:
Step 1Obtain a DES license or a 3DES-AES license.
To run ASDM, you must have a DES license or a 3DES-AES license. If you did
not purchase one of these licenses with the adaptive security appliance, see
Appendix A, “Obtaining a DES License or a 3DES-AES License” for information
about how to obtain and activate one.
Step 2Enable Java and Javascript in your web browser.
Step 3Gather the following information:
• A unique hostname to identify the adaptive security appliance on your
network.
• The IP addresses of your outside interface, inside interface, and any other
interfaces to be configured.
• The IP addresses to use for NAT or PAT configuration.
• The IP address range for the DHCP server.
Running the Startup Wizard
To use the Startup Wizard to set up a basic configuration for the adaptive security
appliance, perform the following steps:
Step 1If you have not already done so, connect to the management port.
a. Locate an Ethernet cable, which has an RJ-45 connector on each end.
b. Connect one RJ-45 connector to the Management0/0 port.
c. Connect the other end of the Ethernet cable to the Ethernet port on your
computer or to your management network.
d. If you connected to your management network, connect a PC for configuring
the adaptive security appliance to your management network.
Cisco ASA 5550 Getting Started Guide
5-4
78-17644-01
Page 41
Chapter 5 Configuring the Adaptive Security Appliance
Step 2Launch the Startup Wizard.
a. On the PC connected to the switch, hub, or management network, launch an
Internet browser.
b. In the address field of the browser, enter this URL: https://192.168.1.1/.
NoteThe adaptive security appliance ships with a default IP address of
192.168.1.1. Remember to add the “s” in “https” or the connection
fails. HTTPS (HTTP over SSL) provides a secure connection between
your browser and the adaptive security appliance.
c. In the window that requires you to choose the method you want to use to run
the ASDM software, choose either to download the ASDM launcher or to run
the ASDM software as a Java applet.
Step 3In the dialog box that requires a username and password, leave both fields empty.
Press Enter.
Step 4Click Ye s to accept the certificates. Click Ye s for all subsequent authentication
and certificate dialog boxes.
ASDM starts.
Using the Startup Wizard
78-17644-01
Step 5From the Wizards menu, choose Startup Wizard.
Step 6Follow the instructions in the Startup Wizard to set up your adaptive security
appliance.
For information about any field in the Startup Wizard, click Help at the bottom of
the window.
NoteBased on your network security policy, you should also consider configuring the
adaptive security appliance to deny all ICMP traffic through the outside interface
or any other interface that is necessary. You can configure this access control
policy using the icmp command. For more information about the icmp command,
see the Cisco Security Appliance Command Reference.
Cisco ASA 5550 Getting Started Guide
5-5
Page 42
Chapter 5 Configuring the Adaptive Security Appliance
Setting the Media Type for Fiber Interfaces
Setting the Media Type for Fiber Interfaces
If you are using any fiber connections in Slot 1, you must change the media type
setting from the default setting to Fiber Connector.
NoteBecause the default media type setting is for a copper Ethernet port, you do not
need to set the media type setting for copper Ethernet ports you use.
To set the media type for fiber interfaces using ASDM, perform the following
steps starting from the main ASDM window:
Step 1In the ASDM window, click Configuration.
Step 2In the Features pane, click Interfaces.
Step 3Click the 4GE SSM interface and click Edit. The Edit Interface dialog box
appears.
Step 4Click Configure Hardware Properties. The Hardware Properties dialog box
appears.
5-6
Step 5From the Media Type drop-down list, choose Fiber Connector.
Step 6Click OK to return to the Edit Interfaces dialog box, then click OK to return to
the interfaces configuration dialog box.
Step 7Repeat this procedure for each fiber interface.
You can also set the media type from the command line. For more information,
see Configuring Ethernet Settings and Subinterfaces in the Cisco Security
Appliance Command Line Configuration Guide.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 43
Chapter 5 Configuring the Adaptive Security Appliance
What to Do Next
Next, configure the adaptive security appliance for your deployment using one or
more of the following chapters:
To Do This ...See ...
Configure the adaptive security
appliance to protect a DMZ web server
Configure the adaptive security
appliance for remote-access VPN
Configure the adaptive security
appliance for Site-to-Site VPN
Chapter 5 Configuring the Adaptive Security Appliance
5-8
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 45
CHA P T E R
Scenario: DMZ Configuration
This chapter describes a configuration scenario in which the adaptive security
appliance is used to protect network resources located in a demilitarized zone
(DMZ). A DMZ is a separate network located in the neutral zone between a
private (inside) network and a public (outside) network.
This chapter includes the following sections:
• Example DMZ Network Topology, page 6-1
• Configuring the Security Appliance for a DMZ Deployment, page 6-4
• What to Do Next, page 6-24
Example DMZ Network Topology
6
78-17644-01
The example network topology shown in Figure 6-1 is typical of most DMZ
implementations of the adaptive security appliance.
Cisco ASA 5550 Getting Started Guide
6-1
Page 46
Example DMZ Network Topology
Figure 6-1Network Layout for DMZ Configuration Scenario
Security
HTTP client
inside interface
10.10.10.0
(private address)
10.10.10.0
(private address)
Appliance
outside interface
209.165.200.225
(public address)
DMZ interface
10.30.30.0
(private address)
Internet
Chapter 6 Scenario: DMZ Configuration
HTTP client
HTTP client
DMZ Web
Server
Private IP address: 10.30.30.30
Public IP address: 209.165.200.226
132064
This example scenario has the following characteristics:
• The web server is on the DMZ interface of the adaptive security appliance.
• HTTP clients on the private network can access the web server in the DMZ
and can also communicate with devices on the Internet.
• Clients on the Internet are permitted HTTP access to the DMZ web server; all
other traffic is denied.
• The network has two routable IP addresses that are publicly available: one for
the outside interface of the adaptive security appliance (209.165.200.225),
and one for the public IP address of the DMZ web server (209.165.200.226).
Figure 6-2 shows the outgoing traffic flow of HTTP requests from the private
network to both the DMZ web server and to the Internet.
6-2
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 47
Chapter 6 Scenario: DMZ Configuration
Figure 6-2Outgoing HTTP Traffic Flow from the Private Network
Internal IP address
translated to address
of outside interface
HTTP client
Security
Appliance
Example DMZ Network Topology
10.10.10.0
(private address)
Internal IP address
translated to address
HTTP request
HTTP request
from IP pool
DMZ network
DMZ Web
Server
outside interface
209.165.200.225
(public address)
Private IP address: 10.30.30.30
Public IP address: 209.165.200.226
Internet
HTTP client
HTTP client
In Figure 6-2, the adaptive security appliance permits HTTP traffic originating
from inside clients and destined for both the DMZ web server and devices on the
Internet. To permit the traffic through, the adaptive security appliance
configuration includes the following:
• Access control rules permitting traffic destined for the DMZ web server and
for devices on the Internet.
• Address translation rules translating private IP addresses so that the private
addresses are not visible to the Internet.
153777
78-17644-01
For traffic destined for the DMZ web server, private IP addresses are
translated to an address from an IP pool.
For traffic destined for the Internet, private IP addresses are translated to the
public IP address of the adaptive security appliance. Outgoing traffic appears
to come from this address.
Figure 6-3 shows HTTP requests originating from the Internet and destined for
the public IP address of the DMZ web server.
Cisco ASA 5550 Getting Started Guide
6-3
Page 48
Configuring the Security Appliance for a DMZ Deployment
Figure 6-3Incoming HTTP Traffic Flow From the Internet
HTTP request
1
sent to public address
of DMZ web server.
Internet
Security
Appliance
2
Incoming request
destined for public
address of DMZ web
server intercepted.
3
Destination IP address
translated to the private IP
address of the web server.
4
Web server receives
request for content.
Chapter 6 Scenario: DMZ Configuration
HTTP client
HTTP client
DMZ Web
Server
Private IP address: 10.30.30.30
Public IP address: 209.165.200.226
153779
To permit incoming traffic to access the DMZ web server, the adaptive security
appliance configuration includes the following:
• An address translation rule translating the public IP address of the DMZ web
server to the private IP address of the DMZ web server.
• An access control rule permitting incoming HTTP traffic that is destined for
the DMZ web server.
The procedures for creating this configuration are detailed in the remainder of this
chapter.
Configuring the Security Appliance for a DMZ
Deployment
This section describes how to use ASDM to configure the adaptive security
appliance for the configuration scenario shown in Figure 6-1. The procedure uses
sample parameters based on the scenario.
6-4
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 49
Chapter 6 Scenario: DMZ Configuration
This configuration procedure assumes that the adaptive security appliance already
has interfaces configured for the inside interface, the DMZ interface, and the
outside interface. Set up interfaces of the adaptive security appliance by using the
Startup Wizard in ASDM. Be sure that the DMZ interface security level is set
between 0 and 100. (A common choice is 50.)
For more information about using the Startup Wizard, see Chapter 5,
“Configuring the Adaptive Security Appliance.”
The section includes the following topics:
• Configuration Requirements, page 6-5
• Starting ASDM, page 6-6
• Creating IP Pools for Network Address Translation, page 6-7
• Configuring NAT for Inside Clients to Communicate with the DMZ Web
Server, page 6-12
• Configuring NAT for Inside Clients to Communicate with Devices on the
Internet, page 6-15
• Configuring an External Identity for the DMZ Web Server, page 6-16
• Providing Public HTTP Access to the DMZ Web Server, page 6-18
The following sections provide detailed instructions for how to perform each step.
Configuring the Security Appliance for a DMZ Deployment
Configuration Requirements
Configuring the adaptive security appliance for this DMZ deployment requires the
following configuration tasks:
• For the internal clients to have HTTP access to the DMZ web server, you must
create a pool of IP addresses for address translation and identify which clients
should use addresses from the pool. To accomplish this task, you should
configure the following:
–
A pool of IP addresses for the DMZ interface. In this scenario, the IP pool
is 10.30.30.50–10.30.30.60.
–
A dynamic NAT translation rule for the inside interface that specifies
which client IP addresses can be assigned an address from the IP pool.
78-17644-01
Cisco ASA 5550 Getting Started Guide
6-5
Page 50
Configuring the Security Appliance for a DMZ Deployment
• For the internal clients to have access to HTTP and HTTPS resources on the
Internet, you must create a rule that translates the real IP addresses of internal
clients to an external address that can be used as the source address.
To accomplish this task, you should configure a PAT translation rule (port
address translation rule, sometimes called an interface NAT) for the internal
interface that translates internal IP addresses to the external IP address of the
adaptive security appliance.
In this scenario, the internal address to be translated is that of a subnet of the
private network (10.10.10.0). Addresses from this subnet are translated to the
public address of the adaptive security appliance (209.165.200.225).
• For external clients to have HTTP access to the DMZ web server, you must
configure an external identity for the DMZ web server and an access rule that
permits HTTP requests coming from clients on the Internet. To accomplish
this task, you should configure the following:
–
Create a static NAT rule. This rule translates the real IP address of the
DMZ web server to a single public IP address. In this scenario, the public
address of the web server is 209.165.200.226.
–
Create a security access rule permitting traffic from the Internet if the
traffic is an HTTP request destined for the public IP address of the DMZ
web server.
Chapter 6 Scenario: DMZ Configuration
Starting ASDM
Cisco ASA 5550 Getting Started Guide
6-6
To run ASDM in a web browser, enter the factory-default IP address in the address
field: https://192.168.1.1/admin/.
NoteRemember to add the “s” in “https” or the connection fails. HTTPS
(HTTP over SSL) provides a secure connection between your browser and
the adaptive security appliance.
The Main ASDM window appears.
78-17644-01
Page 51
Chapter 6 Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
Creating IP Pools for Network Address Translation
The adaptive security appliance uses Network Address Translation (NAT) and
Port Address Translation (PAT) to prevent internal IP addresses from being
exposed externally. This procedure describes how to create a pool of IP addresses
that the DMZ interface and outside interface can use for address translation.
A single IP pool can contain both NAT and PAT entries, and it can contain entries
for more than one interface.
Cisco ASA 5550 Getting Started Guide
78-17644-01
6-7
Page 52
Configuring the Security Appliance for a DMZ Deployment
To configure a pool of IP addresses that can be used for network address
translation, perform the following steps:
Step 1In the ASDM window, click the Configuration tool.
a. In the Features pane, click NAT.
The NAT Configuration screen appears.
Chapter 6 Scenario: DMZ Configuration
6-8
b. In the right pane, click the Global Pools tab.
c. Click Add to create a new global pool for the DMZ interface.
The Add Global Address Pool dialog box appears.
NoteFor most configurations, IP pools are added to the less secure, or public,
interfaces.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 53
Chapter 6 Scenario: DMZ Configuration
d. From the Interfaces drop-down list, choose DMZ.
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
e. To create a new IP pool, enter a unique Pool ID. In this scenario, the Pool ID
is 200.
f. In the IP Addresses to Add area, specify the range of IP addresses to be used
by the DMZ interface:
–
Click the Range radio button.
–
Enter the Starting IP address and Ending IP address of the range. In this
scenario, the range of IP addresses is 10.30.30.50–10.30.30.60.
–
(Optional) Enter the Netmask for the range of IP addresses.
Cisco ASA 5550 Getting Started Guide
6-9
Page 54
Configuring the Security Appliance for a DMZ Deployment
g. Click Add to add this range of IP addresses to the Address Pool.
The Add Global Pool dialog box configuration should be similar to the
following:
Chapter 6 Scenario: DMZ Configuration
6-10
h. Click OK to return to the Configuration > NAT window.
Step 2Add addresses to the IP pool to be used by the outside interface. These addresses
are used to translate private IP addresses so that inside clients can communicate
securely with clients on the Internet.
In this scenario, there are limited public IP addresses available. Use Port Address
Translation (PAT) so that many internal IP addresses can map to the same public
IP address, as follows:
a. In the right pane of the NAT Configuration screen, click the Global Pools tab.
b. Under the Global Pools tab, click Add.
The Add Global Pool Item dialog box appears.
c. From the Interface drop-down list, choose Outside.
d. Specify a Pool ID for the Outside interface.
You can add these addresses to the same IP pool that contains the address pool
used by the DMZ interface (in this scenario, the Pool ID is 200).
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 55
Chapter 6 Scenario: DMZ Configuration
e. Click the Port Address Translation (PAT) using the IP address of the
interface radio button.
If you select the option Port Address Translation using the IP address of the
interface, all traffic initiated from the inside network exits the adaptive
security appliance using the IP address of the outside interface. To the devices
on the Internet, it appears that all traffic is coming from this one IP address.
f. Click the Add button to add this new address to the IP pool.
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
g. Click OK.
Cisco ASA 5550 Getting Started Guide
6-11
Page 56
Configuring the Security Appliance for a DMZ Deployment
The displayed configuration should be similar to the following:
Chapter 6 Scenario: DMZ Configuration
Step 3Confirm that the configuration values are correct.
Step 4Click Apply in the main ASDM window.
Configuring NAT for Inside Clients to Communicate with the DMZ
Web Server
In the previous procedure, you created a pool of IP addresses that could be used
by the adaptive security appliance to mask the private IP addresses of inside
clients.
Cisco ASA 5550 Getting Started Guide
6-12
78-17644-01
Page 57
Chapter 6 Scenario: DMZ Configuration
In this procedure, you configure a Network Address Translation (NAT) rule that
associates IP addresses from this pool with the inside clients so they can
communicate securely with the DMZ web server.
To configure NAT between the inside interface and the DMZ interface, perform
the following steps starting from the main ASDM window:
Step 1In the main ASDM window, click the Configuration tool.
Step 4In the Real Address area, specify the IP address to be translated. For this scenario,
address translation for inside clients is done according to the IP address of the
subnet.
a. From the Interface drop-down list, choose the Inside interface.
b. Enter the IP address of the client or network. In this scenario, the IP address
of the network is 10.10.10.0.
c. From the Netmask drop-down list, choose the Netmask. In this scenario, the
netmask is 255.255.255.0.
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
Step 5In the Dynamic Translation area:
a. From the Interface drop-down list, choose the DMZ interface.
b. To specify the address pool to be used for this Dynamic NAT rule, check the
Select check box next to Global Pool ID. In this scenario, the IP pool ID is
200.
In this scenario, the IP pool that we want to use is already created. If it was
not already created, you would click Add to create a new IP pool.
Cisco ASA 5550 Getting Started Guide
6-13
Page 58
Configuring the Security Appliance for a DMZ Deployment
Chapter 6 Scenario: DMZ Configuration
6-14
c. Click OK to add the Dynamic NAT Rule and return to the Configuration >
NAT window.
Review the configuration screen to verify that the translation rule appears as you
expected.
NoteWhen you click OK to create this rule, notice that there are actually two
translation rules created:
• A translation rule between the inside and DMZ interfaces to be used when
inside clients communicate with the DMZ web server.
• A translation rule between the inside and outside interfaces to be used when
inside clients communicate with the Internet.
ASDM is able to create both rules because the addresses to be used for translation
are both in the same IP pool.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 59
Chapter 6 Scenario: DMZ Configuration
The displayed configuration should be similar to the following:
Configuring the Security Appliance for a DMZ Deployment
Step 6Click Apply to complete the adaptive security appliance configuration changes.
Configuring NAT for Inside Clients to Communicate with Devices
on the Internet
In the previous procedure, you configured a Network Address Translation (NAT)
rule that associates IP addresses from the IP pool with the inside clients so they
can communicate securely with the DMZ web server.
Cisco ASA 5550 Getting Started Guide
78-17644-01
6-15
Page 60
Chapter 6 Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
For many configurations you would also need to create a NAT rule between the
inside interface and the outside interface to enable inside clients to communicate
with the Internet.
However, in this scenario you do not need to create this rule explicitly. The reason
is that the IP pool (pool ID 200) contains both types of addresses needed for
address translation: the range of IP addresses to be used by the DMZ interface,
and the IP address to be used for the outside interface. This enables ASDM to
create the second translation rule for you.
Configuring an External Identity for the DMZ Web Server
The DMZ web server needs to be accessible by all hosts on the Internet. This
configuration requires translating the private IP address of the DMZ web server
to a public IP address, enabling access to outside HTTP clients that are unaware
of the adaptive security appliance. To map the real web server IP address
(10.30.30.30) statically to a public IP address (209.165.200.226), perform the
following steps:
6-16
Step 1In the ASDM window, click the Configuration tool.
Step 2In the Features pane, click NAT.
Step 3From the Add drop-down list, choose Add Static NAT Rule. The Add Static NAT
Rule dialog box appears.
Step 4In the Real Address area, specify the real IP address of the web server:
a. From the Interface drop-down list, choose the DMZ interface.
b. Enter the real IP address of the DMZ web server. In this scenario, the IP
address is 10.30.30.30.
c. From the Netmask drop-down list, choose the Netmask 255.255.255.255.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 61
Chapter 6 Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
Step 5In the Static Translation area, specify the public IP address to be used for the web
server:
a. From the Interface drop-down list, choose Outside.
b. From the IP Address drop-down list, choose the public IP address of the DMZ
web server.
In this scenario, the public IP address of the DMZ web server is
209.165.200.226.
Step 6Click OK to add the rule and return to the list of Address Translation Rules.
This rule maps the real web server IP address (10.30.30.30) statically to the public
IP address of the web server (209.165.200.226).
Cisco ASA 5550 Getting Started Guide
6-17
Page 62
Configuring the Security Appliance for a DMZ Deployment
The displayed configuration should be similar to the following:
Chapter 6 Scenario: DMZ Configuration
Step 7Click Apply to complete the adaptive security appliance configuration changes.
Providing Public HTTP Access to the DMZ Web Server
By default, the adaptive security appliance denies all traffic coming in from the
public network. You must create an access control rule on the adaptive security
appliance to permit specific traffic types from the public network to resources in
the DMZ. This access control rule specifies the interface of the adaptive security
Cisco ASA 5550 Getting Started Guide
6-18
78-17644-01
Page 63
Chapter 6 Scenario: DMZ Configuration
appliance that processes the traffic, whether the traffic is incoming or outgoing,
the origin and destination of the traffic, and the type of traffic protocol and service
to be permitted.
In this section, you create an access rule that permits incoming HTTP traffic
originating from any host or network on the Internet, if the destination of the
traffic is the web server on the DMZ network. All other traffic coming in from the
public network is denied.
To configure the access control rule, perform the following steps:
Step 1In the ASDM window:
a. Click the Configuration tool.
b. In the Features pane, click Security Policy.
c. Click the Access Rules tab, and then from the Add pull-down list, choose
Add Access Rule.
The Add Access Rule dialog box appears.
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
Cisco ASA 5550 Getting Started Guide
6-19
Page 64
Configuring the Security Appliance for a DMZ Deployment
Chapter 6 Scenario: DMZ Configuration
6-20
Step 2In the Interface and Action area:
a. From the Interface drop-down list, choose Outside.
b. From the Direction drop-down list, choose Incoming.
c. From the Action drop-down list, choose Permit.
Step 3In the Source area:
a. From the Type drop-down list, choose IP Address.
b. Enter the IP address of the source host or source network. Use 0.0.0.0 to allow
traffic originating from any host or network.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 65
Chapter 6 Scenario: DMZ Configuration
Alternatively, if the address of the source host or network is preconfigured,
choose the source IP address from the IP Address drop-down list.
c. Enter the netmask for the source IP address or select one from the Netmask
drop-down list.
Step 4In the Destination area:
a. In the IP address field, enter the public IP address of the destination host or
network, such as a web server. (In this scenario, the public IP address of the
DMZ web server is 209.165.200.226.)
Step 5In the Protocol and Service area, specify the type of traffic that you want to permit
through the adaptive security appliance.
a. From the Protocol drop-down list, choose tcp.
b. In the Source Port area, click the Service radio button, choose “=” (equal to)
from the Service drop-down list, and then choose Any from the next
drop-down list.
c. In the Destination Port area, click the Service radio button, choose “=” (equal
to) from the Service drop-down list, and then choose HTTP/WWW from the
next drop-down list.
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
Cisco ASA 5550 Getting Started Guide
6-21
Page 66
Configuring the Security Appliance for a DMZ Deployment
At this point, the entries in the Add Access Rule dialog box should be similar to
the following:
Chapter 6 Scenario: DMZ Configuration
6-22
d. Click OK.
Step 6The displayed configuration should be similar to the following. Verify that the
information you entered is accurate.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 67
Chapter 6 Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
78-17644-01
Step 7Click Apply to save the configuration changes to the configuration that the
adaptive security appliance is currently running.
Clients on both the private and public networks can now resolve HTTP requests
for content from the DMZ web server, while keeping the private network secure.
NoteAlthough the destination address specified is the private address of the DMZ web
server (10.30.30.30), HTTP traffic from any host on the Internet destined for the
public address 209.165.200.226 is permitted through the adaptive security
appliance. The address translation (209.165.200.226 to 10.30.30.30) allows the
traffic to be permitted. For information about creating the translation rule, see the
“Configuring NAT for Inside Clients to Communicate with the DMZ Web Server”
section on page 6-12.
Cisco ASA 5550 Getting Started Guide
6-23
Page 68
What to Do Next
Step 8If you want the configuration changes to be saved to the startup configuration so
that they are applied the next time the device starts, from the File menu, click
Save.
Alternatively, ASDM prompts you to save the configuration changes permanently
when you exit ASDM.
If you do not save the configuration changes, the old configuration takes effect the
next time the device starts.
What to Do Next
If you are deploying the adaptive security appliance solely to protect a web server
in a DMZ, you have completed the initial configuration. You may want to consider
performing some of the following additional steps:
To Do This ...See ...
Refine configuration and configure
optional and advanced features
Learn about daily operationsCisco Security Appliance Command
Chapter 6 Scenario: DMZ Configuration
Cisco Security Appliance Command
Line Configuration Guide
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
6-24
You can configure the adaptive security appliance for more than one application.
The following sections provide configuration procedures for other common
applications of the adaptive security appliance.
To Do This ...See ...
Configure a remote-access VPNChapter 7, “Scenario: Remote-Access
VPN Configuration”
Configure a site-to-site VPNChapter 8, “Scenario: Site-to-Site
VPN Configuration”
Cisco ASA 5550 Getting Started Guide
78-17644-01
Page 69
CHA P T E R
7
Scenario: Remote-Access VPN
Configuration
This chapter describes how to use the adaptive security appliance to accept
remote-access IPsec VPN connections. A remote-access VPN enables you to
create secure connections, or tunnels, across the Internet, thus providing secure
access to off-site users.
If you are implementing an Easy VPN solution, this chapter describes how to
configure the Easy VPN server (sometimes called a headend device).
This chapter includes the following sections:
• Example IPsec Remote-Access VPN Network Topology, page 7-1
• Implementing the IPsec Remote-Access VPN Scenario, page 7-2
• What to Do Next, page 7-18
Example IPsec Remote-Access VPN Network
Topology
Figure 7-1 shows an adaptive security appliance configured to accept requests
from and establish IPsec connections with VPN clients, such as a Cisco Easy VPN
hardware client, over the Internet.
Cisco ASA 5550 Getting Started Guide
78-17644-01
7-1
Page 70
Implementing the IPsec Remote-Access VPN Scenario
Figure 7-1Network Layout for Remote Access VPN Scenario
This section describes how to configure the adaptive security appliance to accept
IPsec VPN connections from remote clients and devices. If you are implementing
an Easy VPN solution, this section describes how to configure an Easy VPN
server (also known as a headend device).
(user 1)
(user 2)
(user 3)
132209
7-2
Values for example configuration settings are taken from the remote-access
scenario illustrated in Figure 7-1.
This section includes the following topics:
• Information to Have Available, page 7-3
• Starting ASDM, page 7-4
• Configuring the ASA 5550 for an IPsec Remote-Access VPN, page 7-5
• Specifying the VPN Tunnel Group Name and Authentication Method,
page 7-7
• Specifying a User Authentication Method, page 7-8
• (Optional) Configuring User Accounts, page 7-10
• Configuring Address Pools, page 7-11
• Configuring Client Attributes, page 7-12
• Configuring the IKE Policy, page 7-13
• Configuring IPsec Encryption and Authentication Parameters, page 7-15
• Specifying Address Translation Exception and Split Tunneling, page 7-16
• Verifying the Remote-Access VPN Configuration, page 7-17
Information to Have Available
Before you begin configuring the adaptive security appliance to accept remote
access IPsec VPN connections, make sure that you have the following information
available:
• Range of IP addresses to be used in an IP pool. These addresses are assigned
to remote VPN clients as they are successfully connected.
• List of users to be used in creating a local authentication database, unless you
are using a AAA server for authentication.
Implementing the IPsec Remote-Access VPN Scenario
78-17644-01
• Networking information to be used by remote clients when connecting to the
VPN, including:
–
IP addresses for the primary and secondary DNS servers
–
IP addresses for the primary and secondary WINS servers
–
Default domain name
–
List of IP addresses for local hosts, groups, and networks that should be
made accessible to authenticated remote clients
Cisco ASA 5550 Getting Started Guide
7-3
Page 72
Implementing the IPsec Remote-Access VPN Scenario
Starting ASDM
To run ASDM in a web browser, enter the factory default IP address in the address
field: https://192.168.1.1/admin/.
NoteRemember to add the “s” in “https” or the connection fails. HTTPS
(HTTP over SSL) provides a secure connection between your browser and
the adaptive security appliance.
Specifying the VPN Tunnel Group Name and Authentication
Method
In Step 3 of the VPN Wizard, perform the following steps:
Step 1Specify the type of authentication that you want to use by performing one of the
following steps:
• To use a static preshared key for authentication, click the Pre-Shared Key
radio button and enter a preshared key (for example, “Cisco”). This key is
used for IPsec negotiations between the adaptive security appliances.
• To use digital certificates for authentication, click the Certificate radio
button, choose the Certificate Signing Algorithm from the drop-down list,
and then choose a preconfigured trustpoint name from the drop-down list.
If you want to use digital certificates for authentication but have not yet
configured a trustpoint name, you can continue with the Wizard by using one
of the other two options. You can revise the authentication configuration later
using the standard ASDM screens.
• Click the Challenge/Response Authentication (CRACK) radio button to
Step 2Enter a Tunnel Group Name (such as “Cisco”) for the set of users that use
common connection parameters and client attributes to connect to this adaptive
security appliance.
Step 3Click Next to continue.
Specifying a User Authentication Method
Users can be authenticated either by a local authentication database or by using
external authentication, authorization, and accounting (AAA) servers (RADIUS,
TACACS+, SDI, NT, Kerberos, and LDAP).
If you have chosen to authenticate users with the local user database, you can
create new user accounts here. You can also add users later using the ASDM
configuration interface.
In Step 5 of the VPN Wizard, perform the following steps:
Step 1To add a new user, enter a username and password, and then click Add.
7-10
Step 2When you have finished adding new users, click Next to continue.
For remote clients to gain access to your network, you must configure a pool of
IP addresses that can be assigned to remote VPN clients as they are successfully
connected. In this scenario, the pool is configured to use the range of IP addresses
209.165.201.1–209.166.201.20.
In Step 6 of the VPN Wizard, perform the following steps:
Step 1Enter a pool name or choose a preconfigured pool from the drop-down list.
Alternatively, click New to create a new address pool.
The Add IP Pool dialog box appears.
Implementing the IPsec Remote-Access VPN Scenario
78-17644-01
Step 2In the Add IP Pool dialog box:
a. Enter the Starting IP address and Ending IP address of the range.
b. (Optional) Enter the Netmask for the range of IP addresses.
c. Click OK to return to Step 6 of the VPN Wizard.
To access your network, each remote access client needs basic network
configuration information, such as which DNS and WINS servers to use and the
default domain name. Rather than configuring each remote client individually,
you can provide the client information to ASDM. The adaptive security appliance
pushes this information to the remote client or Easy VPN hardware client when a
connection is established.
Ensure that you specify the correct values, or remote clients will not be able to use
DNS names for resolution or use Windows networking.
In Step 7 of the VPN Wizard, perform the following steps:
Step 1Enter the network configuration information to be pushed to remote clients.
Implementing the IPsec Remote-Access VPN Scenario
Step 2Click Next to continue.
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels.
78-17644-01
Cisco ASA 5550 Getting Started Guide
7-13
Page 82
Implementing the IPsec Remote-Access VPN Scenario
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following
steps:
Step 1Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5/7) used by the
during an IKE security association.
Specifying Address Translation Exception and Split Tunneling
Split tunneling lets a remote-access IPsec client conditionally direct packets over
an IPsec tunnel in encrypted form or to a network interface in clear text form.
The adaptive security appliance uses Network Address Translation (NAT) to
prevent internal IP addresses from being exposed externally. You can make
exceptions to this network protection by identifying local hosts and networks that
should be made accessible to authenticated remote users. (In this scenario, the
entire inside network 10.10.10.0 is exposed to all remote clients.)
In Step 10 of the VPN Wizard, perform the following steps:
Step 1Specify hosts, groups, and networks that should be in the list of internal resources
made accessible to authenticated remote users.
To add or remove hosts, groups, and networks dynamically from the Selected
Hosts/Networks pane, click Add or Delete, respectively.
NoteEnable split tunneling by checking the Enable Split Tunneling check box
at the bottom of the screen. Split tunneling allows traffic outside the
configured networks to be sent out directly to the Internet instead of over
the encrypted VPN tunnel.
Step 2Click Next to continue.
Verifying the Remote-Access VPN Configuration
In Step 11 of the VPN Wizard, review the configuration attributes for the VPN
tunnel you just created. The displayed configuration should be similar to the
following:
78-17644-01
Cisco ASA 5550 Getting Started Guide
7-17
Page 86
What to Do Next
If you are satisfied with the configuration, click Finish to apply the changes to the
adaptive security appliance.
If you want the configuration changes to be saved to the startup configuration so
that they are applied the next time the device starts, from the File menu, click
Save. Alternatively, ASDM prompts you to save the configuration changes
permanently when you exit ASDM.
If you do not save the configuration changes, the old configuration takes effect the
next time the device starts.
What to Do Next
If you are deploying the adaptive security appliance solely in a remote-access
VPN environment, you have completed the initial configuration. In addition, you
may want to consider performing some of the following steps:
To Do This ...See ...
Refine configuration and configure
optional and advanced features
Learn about daily operations Cisco Security Appliance Command
Cisco Security Appliance Command
Line Configuration Guide
Reference
7-18
Cisco Security Appliance Logging
Configuration and System Log
Messages
You can configure the adaptive security appliance for more than one application.
The following sections provide configuration procedures for other common
applications of the adaptive security appliance.
This chapter describes how to use the adaptive security appliance to create a
site-to-site VPN.
Site-to-site VPN features provided by the adaptive security appliance enable
businesses to extend their networks across low-cost public Internet connections to
business partners and remote offices worldwide while maintaining their network
security. A VPN connection enables you to send data from one location to another
over a secure connection, or tunnel, first by authenticating both ends of the
connection, and then by automatically encrypting all data sent between the two
sites.
This chapter includes the following sections:
• Example Site-to-Site VPN Network Topology, page 8-1
• Implementing the Site-to-Site Scenario, page 8-2
• Configuring the Other Side of the VPN Connection, page 8-13
• What to Do Next, page 8-13
Example Site-to-Site VPN Network Topology
Figure 8-1 shows an example VPN tunnel between two adaptive security
Figure 8-1Network Layout for Site-to-Site VPN Configuration Scenario
Site A
Inside
10.10.10.0
Security
Appliance 1
209.165.200.226
Outside
Internet
Outside
209.165.200.236
Security
Appliance 2
Creating a VPN site-to-site deployment such as the one in Figure 8-1 requires you
to configure two adaptive security appliances, one on each side of the connection.
Implementing the Site-to-Site Scenario
This section describes how to configure the adaptive security appliance in a
site-to-site VPN deployment, using example parameters from the remote-access
scenario shown in Figure 8-1.
This section includes the following sections:
• Information to Have Available, page 8-2
• Configuring the Site-to-Site VPN, page 8-3
Information to Have Available
Inside
10.20.20.0
Site B
132066
8-2
Before you begin the configuration procedure, gather the following information:
• IP address of the remote adaptive security appliance peer
• IP addresses of local hosts and networks permitted to use the tunnel to
communicate with resources on the remote site
• IP addresses of remote hosts and networks permitted to use the tunnel to
The VPN peer is the system on the other end of the connection that you are
configuring, usually at a remote site.
NoteIn this scenario, the remote VPN peer is referred to as Security Appliance 2 from
this point forward.
In Step 2 of the VPN Wizard, perform the following steps:
Step 1Enter the Peer IP Address (the IP address of Security Appliance 2, in this scenario
209.165.200.236) and a Tunnel Group Name (for example “Cisco”).
Step 2Specify the type of authentication that you want to use by performing one of the
following steps:
• To use a static preshared key for authentication, click the Pre-Shared Key
radio button and enter a preshared key (for example, “Cisco”). This key is
used for IPsec negotiations between the adaptive security appliances.
8-6
NoteWhen you configure Security Appliance 2 at the remote site, the VPN
peer is Security Appliance 1. Be sure to enter the same preshared key
(Cisco) that you use here.
• Click the Challenge/Response Authentication radio button to use that
method of authentication.
• To use digital certificates for authentication, click the Certificate radio
button, choose the Certificate Signing Algorithm from the drop-down list,
and then choose a preconfigured trustpoint name from the drop-down list.
If you want to use digital certificates for authentication but have not yet
configured a trustpoint name, you can continue with the Wizard by using one
of the other two options. You can revise the authentication configuration later
using the standard ASDM screens.
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels between two peers.
In Step 3 of the VPN Wizard, perform the following steps:
Step 1Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance
during an IKE security association.
Configuring IPsec Encryption and Authentication Parameters
In Step 4 of the VPN Wizard, perform the following steps:
Step 1Choose the Encryption algorithm (DES/3DES/AES) and authentication algorithm
(MD5/SHA) from the drop-down lists.
78-17644-01
Step 2Click Next to continue.
Cisco ASA 5550 Getting Started Guide
8-9
Page 98
Implementing the Site-to-Site Scenario
Specifying Hosts and Networks
Identify hosts and networks at the local site that are permitted to use this IPsec
tunnel to communicate with the remote-site peer. Add or remove hosts and
networks dynamically by clicking Add or Delete, respectively. In the current
scenario, traffic from Network A (10.10.10.0) is encrypted by Security
Appliance 1 and transmitted through the VPN tunnel.
In addition, identify hosts and networks at the remote site to be allowed to use this
IPsec tunnel to access local hosts and networks. Add or remove hosts and
networks dynamically by clicking Add or Delete respectively. In this scenario, for
Security Appliance 1, the remote network is Network B (10.20.20.0), so traffic
encrypted from this network is permitted through the tunnel.
In Step 5 of the VPN Wizard, perform the following steps:
Step 1In the Source area, choose IP Address from the Type drop-down list.
Step 2Enter the local IP address and netmask in the IP Address and Netmask fields.
Step 3In the Destination area, choose IP Address from the Type drop-down list.
Step 4Enter the IP address and Netmask for the remote host or network.
In Step 6 of the VPN Wizard, review the configuration list for the VPN tunnel you
just created. If you are satisfied with the configuration, click Finish to apply the
changes to the adaptive security appliance.
If you want the configuration changes to be saved to the startup configuration so
that they are applied the next time the device starts, from the File menu, click
Save.
Alternatively, ASDM prompts you to save the configuration changes permanently
when you exit ASDM.
If you do not save the configuration changes, the old configuration takes effect the
next time the device starts.
This concludes the configuration process for Security Appliance 1.
Cisco ASA 5550 Getting Started Guide
78-17644-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.