Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found
at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1005R)
Federal Communication Commission Interference Statement
(For ISA570 and ISA570W)
This equipment has been tested and found to compl y with the limits for a Class A digital d evice, pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmfu l
interference when the equipment is operated in a commercial environment. This equipment genera tes,
uses, and can radiate radio frequency energy and, if not insta lled and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Operation of this
equipment in a residential area is likely to cause harmful interference in which case the user will be
required to correct the interference at his own expense.
(For ISA550 and ISA550W)
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuan t
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, us es and can radi ate radio frequency
energy and, if not installed and used in accordance with the instructi ons, may cause harmful interference
to radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which
can be determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
•Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement: (For ISA550W and ISA570W)
This equipment complies with FCC radiation exposure limits set forth for an uncontrol led environment.
This equipment should be installed and operated with minimum distance 20cm between the radiator &
your body.
This transmitter must not be co-located or operating in conjunction with any oth er antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are country dependent
and are firmware programmed at the factory to match the intended destination. The firmware setting is
not accessible by the end user.
Industry Canada statement:
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and ( 2) this device must accept any
interference received, including interference that may cause undesired operation.
OL-23370-01
3
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio
exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doi t
pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouill age reçu, y compris
un brouillage susceptible de provoquer un fonctionnement indésirable.
IMPORTANT NOTE:
Canada Radiation Exposure Statement: (For ISA550W and ISA570W)
This equipment complies with Canada radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm between
the radiator and your body.
NOTE IMPORTANTE: (Pour l'utilisation de dispositifs mobiles)
Déclaration d'exposition aux radiations:
Cet équipement est conforme aux limites d'exposition aux rayonnements IC établies pour un
environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de
distance entre la source de rayonnement et votre corps.
This device has been designed to operate with an antenna having a maximum ga in of 1.8 dBi. Antenna
having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna
impedance is 50 ohms.
Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type
and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio
interference to other users, the antenna type and its gain should be so chosen that the equivalent
isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication.
(Le manuel d'utilisation de dispositifs émetteurs équipés d'antennes amovibles doit contenir les
informations suivantes dans un endroit bien en vue:)
Ce dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximal de 1.8 dBi. Une
antenne à gain plus élevé est strictement interdite par les règlements d'Industrie Canada. L'impédance
d'antenne requise est de 50 ohms.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio peutfonctionner avec
une antenne d'un type et d'un gain maximal (ou inférieur) approuvé pourl'émetteur par Ind ustrie Canada.
Dans le but de réduire les risques de brouillage radioélectriqueà l'intention des aut res utilisateurs, il faut
choisir le type d'antenne et son gain de sorte que lapuissance isotrope rayonnée équivalente (p.i.r.e.) ne
dépasse pas l'intensité nécessaire àl'établissement d'une communication satisfaisante.
UL/CB
Rack Mount Instructions - The following or similar rack-mount instructions are included with the
installation instructions:
A) Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating
ambient temperature of the rack environment may be greater than room ambient. Therefore,
consideration should be given to installing the equipment in an environment compatible with the
maximum ambient temperature (Tma) 40 degree C specified by the manufacturer.
B) Reduced Air Flow - Installation of the equipment in a rack should be such that the amount of air flow
required for safe operation of the equipment is not compromised.
C) Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous
condition is not achieved due to uneven mechanical loading.
4
OL-23370-01
D) Circuit Overloading - Consideration should be given to the connection of the equ ipment to the supply
circuit and the effect that overloading of the circuits might have on overcurrent protection and supply
wiring. Appropriate consideration of equipment nameplate ratings should be used when addressing this
concern.
OL-23370-01
5
6
OL-23370-01
Contents
Chapter 1: Getting Started12
Introduction12
Feature Overview13
Device Overview14
Front Panel14
Back Panel17
Installation18
Before You Begin19
Installation Options19
Placement Tips19
Wall Mounting20
Rack Mounting21
Hardware Installation22
Getting Started with the Configuration Utility23
Launching the Configuration Utility23
Navigating Through the Configuration Utility24
Using the Help System25
Using the Management Buttons25
About the Default Settings25
Performing Common Configuration Tasks27
Changing the User Name and Password of the Default Administrator Account
at Your First Login27
Saving Your Configuration28
Upgrading the Firmware if needed29
Resetting the Device30
Chapter 2: Wizards32
Using the Startup Wizard32
Using the Wireless Wizard to Configure the Wireless Settings for ISA550W and
ISA570W40
Using the Wireless Wizard to Configure the Wireless Settings41
Configuring the SSID for Intranet WLAN Access43
Configuring the SSID for Guest WLAN Access44
Configuring the SSID for Guest WLAN Access (Captive Portal)45
Cisco ISA500 Series Integrated Security Appliance Administration Guide1
Contents
Using the DMZ Wizard to Configure the DMZ Settings46
Using the DMZ Wizard to Configure the DMZ Settings47
Configuring the DMZ48
Configuring the DMZ Services49
Using the Dual WAN Wizard to Configure the WAN Redundancy Settings51
Using the Site-to-Site Wizard to Establish the Site-to-Site VPN Tunnels53
Using the Site-to-Site Wizard to Establish the Site-to-Site VPN tunnel53
Configuring the IKE Policies55
Configuring the Transform Policies57
Using the Remote Access Wizard to Establish the IPSec VPN Tunnels or SSL VPN
Tunnels for Remote Access58
Using Cisco IPSec VPN to Establish the IPSec VPN Tunnels58
Configuring the Cisco IPSec VPN User Groups63
Using SSL VPN to Establish the SSL VPN Tunnels63
Configuring the SSL VPN Group Policies66
Configuring the SSL VPN User Groups69
Chapter 3: Status70
System Status70
Interface Status74
ARP Table74
DHCP Pool Assignment75
Interface75
Interface Statistics77
Wireless Status for ISA550W and ISA570W79
Wireless Status80
Client Status81
Active Users81
VPN Status81
IPSec VPN Status82
SSL VPN Status83
Reports85
Reports of Event Logs86
Reports of WAN Bandwidth87
Reports of Security Services87
Cisco ISA500 Series Integrated Security Appliance Administration Guide2
Web Security Blocked Report88
Anti-Virus Report88
Email Security Report89
Network Reputation Report90
IPS Policy Protocol Inspection Report90
IM and P2P Blocking Report91
Contents
Process Status92
Resource Utilization92
Chapter 4: Networking94
Configuring IP Routing Mode95
Port Management95
Viewing the Status of Physical Interfaces95
Configuring the Physical Interfaces96
Configuring 802.1X Access Control on Physical Ports98
Configuring the Port Mirroring100
Configuring the WAN101
Configuring the Primary WAN101
Configuring the Secondary WAN104
Configuring the Network Addressing Mode106
Configuring the PPPoE Profiles111
Configuring the WAN Redundancy112
Loading Balancing for WAN Redundancy113
Load Balancing with Policy-based Routing Configuration Example115
Failover for WAN Redundancy116
Routing Table for WAN Redundancy117
Configuring the Link Failover Detection117
Configuring the VLAN118
Configuring the VLANs119
Configuring DHCP Reserved IPs122
Configuring the DMZ123
Configuring the Zones127
Security Levels for Zones128
Predefined Zones128
Cisco ISA500 Series Integrated Security Appliance Administration Guide3
Contents
Configuring the Zones129
Configuring the Routing130
Configuring the Routing Mode131
Viewing the Routing Table131
Configuring the Static Routing132
Configuring the Dynamic Routing133
Configuring Policy-based Routing Settings134
Priority of Routing Rules136
Dynamic DNS136
IGMP138
VRRP139
Configuring the Quality of Service140
General QoS Settings141
Configuring the WAN QoS141
Managing the WAN Bandwidth for Upstream Traffic142
Configuring the WAN Queue Settings142
Configuring the Traffic Selectors for WAN Interfaces144
Configuring the WAN QoS Policy Profiles145
Mapping the WAN QoS Policy Profiles to WAN Interfaces146
Configuring the LAN QoS147
Configuring the LAN Queue Settings147
Configuring the LAN QoS Classification Methods148
Mapping CoS to LAN Queue149
Mapping DSCP to LAN Queue149
Configuring Default CoS149
Configuring the Wireless QoS150
Default Wireless QoS Settings150
Configuring the Wireless QoS Classification Methods151
Mapping CoS to Wireless Queue151
Mapping DSCP to Wireless Queue151
Address Management152
Configuring the Addresses152
Configuring the Group Addresses153
Service Management154
Configuring the Services154
Cisco ISA500 Series Integrated Security Appliance Administration Guide4
Configuring the Group Services155
Contents
Chapter 5: Wireless Configuration for ISA550W and ISA570W157
Configuring the Radio Settings157
Basic Radio Settings158
Advanced Radio Settings160
Configuring the Access Points162
Configuring the Security Mode162
Controlling the Wireless Access Based on MAC Addresses169
Mapping the SSID to VLAN170
Configuring the SSID Schedule171
Configuring Wi-Fi Protected Setup172
Configuring Wireless Rogue AP Detection173
Configuring Wireless Captive Portal174
Chapter 6: Firewall177
Configuring the Firewall Access Rules to Control Inbound and Outbound Traffic
178
Default Firewall Settings178
Priorities of Firewall Access Rules180
Preliminary Tasks for Configuring the Firewall Access Rules180
General Settings for Configuring the Firewall Access Rules181
Configuring a Firewall Access Rule183
Configuring a Firewall Access Rule to Allow the Multicast Traffic185
Configuring the Firewall Schedule186
Firewall Access Rule Configuration Examples187
Configuring the NAT Rules to Securely Access a Remote Network192
Configuring Dynamic PAT Rules193
Configuring Static NAT Rules194
Configuring Port Forwarding Rules195
Configuring Port Triggering Rules196
Configuring Advanced NAT Rules197
Viewing NAT Translation Status199
Cisco ISA500 Series Integrated Security Appliance Administration Guide5
Priorities of NAT Rules200
Configuring the Session Settings200
Configuring the Content Filtering to Control Access to Internet201
Configuring the Content Filtering Policy Profiles201
Configuring the Website Access Control List203
Mapping the Content Filtering Policy Profiles to Zones204
Configuring Advanced Settings204
Configuring the MAC Filtering to Permit or Block Traffic205
Configuring the IP/MAC Binding to Prevent Spoofing206
Configuring the Attack Protection207
Configuring the Application Level Gateway209
Contents
Chapter 7: Security Services210
Managing the Security Services210
About the Security Services211
Security License212
Priority of Security Services212
Managing the Security Services212
Viewing the Security Service Reports214
Intrusion Prevention Service214
General IPS Settings215
Configuring the IPS Policy and Protocol Inspection216
Blocking the Instant Messaging and Peer-to-Peer Applications218
Anti-Virus220
Configuring the Anti-Virus220
Configuring the Email Notification223
Configuring the HTTP Notification224
Email Reputation Filter224
Web URL Filter226
Configuring the Web URL Filter Policy Profiles226
Configuring the Whitelist and Blacklist of Websites227
Mapping the Web URL Filter Policy Profiles to Zones228
Cisco ISA500 Series Integrated Security Appliance Administration Guide6
Configuring Advanced Web URL Filter Settings229
Web Reputation Filter230
Network Reputation231
Contents
Chapter 8: VPN232
About VPN232
Configuring the Cisco IPSec VPN Server233
Cisco VPN Client Compatibility234
Configuring the Group Policies for Cisco IPSec VPN Server235
Configuring the Cisco IPSec VPN Client238
Restrictions for Cisco IPSec VPN Client239
Benefits of the Cisco IPSec VPN Client Feature239
Modes of Operation240
Client Mode240
Network Extension Mode241
General Settings242
Configuring the Group Policies for Cisco IPSec VPN Client243
Configuring the Site-to-Site VPN246
Configuration Tasks to Establish a Site-to-Site VPN246
General Site-to-Site VPN Settings247
Configuring the IPSec VPN Policies248
Configuring the IPSec IKE Policies254
Configuring the IPSec Transform Policies256
Configuring the SSL VPN257
Elements of the SSL VPN258
Configuration Tasks to Establish a SSL VPN Tunnel259
Installing the Cisco AnyConnect VPN Client on User’s PC260
Importing the Certificates for User Authentication260
Configuring the SSL VPN Users260
Configuring the SSL VPN Gateway261
Configuring the SSL VPN Group Policies263
Configuring the SSL VPN Portal266
Configuring the L2TP Server266
Cisco ISA500 Series Integrated Security Appliance Administration Guide7
Configuring the VPN Passthrough268
Viewing the VPN Status268
Monitoring the IPSec VPN Status269
Monitoring the SSL VPN Status270
Contents
Chapter 9: User Management273
About the Users and Groups273
Available Services for User Groups273
Default User and Group274
Preempt the Administrators274
Configuring the Users and Groups275
Configuring Local Users275
Configuring Local User Groups276
Configuring the User Authentication Settings277
Authentication Methods for User Login278
Using Local Database for Authentication279
Using RADIUS Server for Authentication279
Using Local Database and RADIUS Server for Authentication282
Using LDAP for Authentication283
Using Local Database and LDAP for Authentication286
Configuring the User Session Settings286
Viewing Active User Sessions287
Chapter 10: Device Management288
Remote Management289
Administration290
Changing the User Name and Password for the Default Administrator Account
290
Configuring the User Session Settings291
SNMP292
Configuration Management294
Saving your Current Configurations294
Restoring your Settings from a Saved Configuration File295
Cisco ISA500 Series Integrated Security Appliance Administration Guide8
Contents
Reverting to the Factory Default Settings296
Firmware Management297
Viewing the Firmware Information297
Checking for New Firmwares298
Upgrading the Firmware299
Using the Secondary Firmware300
Firmware Auto Fall Back Mechanism301
Using the Rescue Mode to Recover the System302
Rebooting the Security Appliance302
Log Management302
Configuring the Log Settings303
Configuring the Log Facilities305
Viewing the Logs306
Managing the Security License307
Checking the License Status308
Renewing the Security License309
Managing the Certificates for Authentication310
Viewing the Certificate Status310
Managing the Certificates311
Exporting the Certificates to Local PC312
Exporting the Certificates to a USB Device313
Importing the Certificates from Your Local PC313
Importing the Certificates from a Mounted USB Device314
Importing the Signed Certificate for CSR from Your Local PC314
Generating New Certificate Signing Requests315
Configuring the Email Alert Settings316
Configuring the RADIUS Servers319
Configuring the Time Zone320
Device Discovery321
UPnP321
Bonjour322
CDP323
LLDP324
Cisco ISA500 Series Integrated Security Appliance Administration Guide9
Diagnosing the Device324
Ping325
Tracert325
DNS Lookup326
Packet Capture326
System Diagnostics327
Measuring and Limiting Traffic with the Traffic Meter328
Configuring the ViewMaster330
Configuring the CCO Account331
Configuring the Device Properties332
Configuring the Debug Settings332
Contents
Appendix A: Troubleshooting333
Internet Connection333
Date and Time336
Pinging to Test LAN Connectivity337
Testing the LAN Path from Your PC to Your Security Appliance337
Testing the LAN Path from Your PC to a Remote Device338
Restoring Factory Default Settings339
Appendix B: Technical Specifications and Environmental Requirements340
Appendix C: Factory Default Settings343
Device Management343
User Management346
Networking347
Wireless352
VPN353
Security Services356
Firewall357
Reports359
Default Service Objects360
Default Address Objects363
Cisco ISA500 Series Integrated Security Appliance Administration Guide10
Contents
Appendix D: Where to Go From Here365
Cisco ISA500 Series Integrated Security Appliance Administration Guide11
Getting Started
This chapter provides the product overview and installation instruction to help you
to install the security appliance, and describes the default settings and some
basic configuration tasks to help you to begin configuring your security appliance.
It includes the following sections:
•Introduction, page 12
•Feature Overview, page 13
1
Introduction
•Device Overview, page14
•Installation, page 18
•Getting Started with the Configuration Utility, page 23
•About the Default Settings, page 25
•Performing Common Configuration Tasks, page 27
The Cisco ISA500 Series Integrated Security Appliances are a set of Unified
Threat Management (UTM) security appliances that provide business class
security gateway solutions with zone-based firewall, site-to-site and remote
access VPN (including Cisco IPSec VPN and SSL VPN) support, and Internet
threat protection with multiple UTM security services. The ISA550W and
ISA570W include 802.11b/g/n access point capabilities.
The following table lists the available model numbers to help you become familiar
with your security appliance.
Cisco ISA500 Series Integrated Security Appliance Administration Guide12
Getting Started
Feature Overview
1
ModelsDescriptionConfiguration
ISA550Cisco ISA550 Integrated
ISA550WCisco ISA550 Integrated
ISA570Cisco ISA570 Integrated
ISA570WCisco ISA570 Integrated
Feature Overview
The features of the Cisco ISA500 Series Integrated Security Appliance are
compared in the following table.
Security Appliance
Security Appliance with
WiFi
Security Appliance
Security Appliance with
WiFi
1 WAN port, 2 LAN ports, 4
configurable ports, and 1 USB 2.0 port
1 WAN port, 2 LAN ports, 4
configurable ports, 1 USB 2.0 port,
and 802.11b/g/n
1 WAN port, 4 LAN ports, 5
configurable ports, and 1 USB 2.0 port
1 WAN port, 4 LAN ports, 5
configurable ports, 1 USB 2.0 port,
and 802.11b/g/n
FeatureISA550ISA550WISA570ISA570W
Firewall Throughput
(1000B)
Firewall Throughput
(IMIX)
IPSec VPN (large
packet)
Anti-Virus
Throughput
Intrusion Prevention
Service Throughput
UTM Throughput45 Mbps45 Mbps120 Mbps120 Mbps
Cisco ISA500 Series Integrated Security Appliance Administration Guide13
150 Mbps150 Mbps300 Mbps300 Mbps
70 Mbps70 Mbps150 Mbps150 Mbps
75 Mbps75 Mbps150 Mbps150 Mbps
60 Mbps60 Mbps130 Mbps130 Mbps
80 Mbps80 Mbps150 Mbps150 Mbps
Getting Started
282351
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
234
56
7
ISA550
Cisco
281983
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
234
56
7
WLAN
ISA550W
Cisco
Device Overview
1
FeatureISA550ISA550WISA570ISA570W
Maximum
Concurrent Sessions
Sessions per
Seconds (cps)
Wireless (802.11b/g/n)NoYesNoYes
IPSec Tunnels5050100100
SSL VPN Tunnels25255050
Device Overview
Before you begin to use the security appliance, become familiar with the lights on
the front panel and the ports on the rear panel. It includes the following sections:
15,00015,00040,00040,000
2,5002,5003,0003,000
•Front Panel, page 14
•Back Panel, page 17
Front Panel
ISA550 Front Panel
ISA550W Front Panel
Cisco ISA500 Series Integrated Security Appliance Administration Guide14
Getting Started
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
910
234
56
7
8
282350
ISA570
Cisco
Small Business
1
VPN
USB
WANLAN
CONFIGURABLEPOWER/SYS
SPEED
LINK /ACT
910
234
56
7
8
WLAN
281980
ISA570W
Cisco
Device Overview
1
ISA570 Front Panel
ISA570W Front Panel
Front Panel Lights
The following table describes the lights on the front panel of the security
appliance. These lights are used for monitoring system activity.
LightsDescription
POWER/SYSIndicates the power status and system status.
•Green lights when the system is powered on and
operates normally.
•Green flashes when the system is booting.
•Amber flashes when the system booting has a
problem, a device error occurs, or the system has a
problem.
VPNIndicates the Site-to-Site VPN connection status.
•Green lights when the Site-to-Site VPN tunnel is
established.
•Green flashes when attempting to establish the Site-to-
Site VPN tunnel.
•Amber flashes when the system is experiencing
problems setting up the Site-to-Site VPN connection.
Cisco ISA500 Series Integrated Security Appliance Administration Guide15
Getting Started
Device Overview
1
LightsDescription
USBIndicates the USB device status.
•Green lights when a USB device is detected and
operates normally.
•Green flashes when the USB device is transmitting and
receiving data.
WLAN
(ISA550W and
ISA570W
only)
SPEEDIndicates the traffic rate of the associated port.
LINK/ACTIndicates a connection is being made through the port.
NOTE The front panel of the ISA550 and ISA570 does not include the WLAN light.
Indicates the WLAN status.
•Green lights when the WLAN is enabled and
associated.
•Green flashes when the WLAN is transmitting and
receiving data.
•Off when the traffic rate is 10 or 100 Mbps.
•Green lights when the traffic rate is 1000 Mbps.
•Green lights when the link is up.
•Green flashes when the port is transmitting and
receiving data.
Cisco ISA500 Series Integrated Security Appliance Administration Guide16
Getting Started
281984
ANT02ANT01
RESET
I
/
O
POWER
12VDC
4
5
6
7
CONFIGURABLE
2
3
LAN
1
WAN
ANT01ANT02
Reset
Button
Power
Switch
Power
Connector
WAN
Por t
USB
Por t
Configurable
Por ts
LAN
Por ts
281981
I
/
O
RESET
ANT02ANT01
1
6
7
8910
WAN
CONFIGURABLE
POWER
12VDC
2
3
4
5
LAN
ANT01ANT02
Reset
Button
Power
Switch
Power
Connector
WAN
Por t
USB
Por t
Configurable
Por ts
LAN
Por ts
Device Overview
1
Back Panel
The back panel is where you connect the network devices. The ports on the panel
vary depending on the model.
ISA550 and ISA550W Back Panel
ISA570 and ISA570W Back Panel
Cisco ISA500 Series Integrated Security Appliance Administration Guide17
Getting Started
Installation
1
Back Panel Descriptions
FeatureDescription
ANT01/ANT02Threaded connectors for the antennas (for ISA550W and
ISA570W only).
USB PortConnects the unit to a USB device. You can use a USB
device to backup and restore the configurations, or to
upgrade the firmware images.
Configurable
Ports
LAN PortsConnects PCs and other network appliances to the unit.
WAN PortConnects the unit to a DSL or a cable modem, or another
RESET ButtonTo reboot the unit, push and release the RESET button. To
Power SwitchTurns the unit on or off.
Power
Connector
NOTE The back panel of ISA550 and ISA570 does not include two threaded connectors
for the antennas.
Can be set to operate as WAN, LAN, or DMZ ports. The
ISA550 and ISA550W have 4 configurable ports. The
ISA570 and ISA570W have 5 configurable ports.
The ISA550 and ISA550W have 2 dedicated LAN ports.
The ISA570 and ISA570W have 4 dedicated LAN ports.
WAN connectivity device.
restore the factory default settings, push and hold the
RESET button for 3 seconds.
Connects the unit to power using the supplied power cord
and adapter.
Installation
This section describes how to install the security appliance. It includes the
following topics:
•Before You Begin, page 19
Cisco ISA500 Series Integrated Security Appliance Administration Guide18
Getting Started
Installation
1
•Installation Options, page 19
•Hardware Installation, page 22
Before You Begin
Before you begin the installation, make sure that you have the following
equipments and services:
•An active Internet account.
•Mounting kits and tools for installing the hardware. The kits packed with the
security appliance are used for desktop placement and rack mounting. The
kits include 4 rubber feet, 2 brackets, 2 silicon rubber spacers, 8 M3
screws, 4 M5 screws, and 4 washers.
NOTE The Wall-mounting kit is not included.
•RJ-45 Ethernet cables (Category 5 or higher) for connecting computers,
WAN and LAN interfaces, or other devices.
•A computer with Microsoft Internet Explorer 8.0, or Mozilla Firefox 3.6.x (or
later) for using the web-based Configuration Utility.
Installation Options
You can place your security appliance on a desktop, mount it on a wall, or mount it
in a rack. It includes the following topics:
•Placement Tips, page 19
•Wall Mounting, page 20
•Rack Mounting, page 21
Placement Tips
•Ambient Temperature: To prevent the security appliance from overheating,
do not operate it in an area that exceeds an ambient temperature of 104°F
(40°C).
•Air Flow: Be sure that there is adequate air flow around the device.
Cisco ISA500 Series Integrated Security Appliance Administration Guide19
Getting Started
1
2
4
3
196243
Installation
1
•Mechanical Loading: Be sure that the security appliance is level and stable
to avoid any hazardous conditions.
To place the security appliance on a desktop, install the supplied four rubber feet
on the bottom of the security appliance. Place the security appliance on a flat
surface.
Wall Mounting
There is no wall-mounting kit included with your security appliance. We
recommend that you use the following screws to install your security appliance to
the wall or the ceiling:
WARNING Insecure mounting might damage the device or cause injury. Cisco is not
responsible for damages incurred by improper wall-mounting.
To mount the security appliance to the wall:
STEP 1Determine where you want to mount the security appliance. Verify that the surface
is smooth, flat, dry, and sturdy.
STEP 2Insert two 18.6 mm (0.73 inch) screws, with anchors, into the wall 234 mm apart
(9.21 inches). Leave 3 to 4 mm (about 1/8 inch) of the head exposed.
STEP 3Place the security appliance wall-mount slots over the screws. Slide the security
appliance down until the screws fit snugly into the wall-mount slots.
Cisco ISA500 Series Integrated Security Appliance Administration Guide20
Getting Started
!
Installation
CAUTION Do not overload the power outlet or circuit when installing multiple devices in a
1
Rack Mounting
You can mount the security appliance in any standard size, 19-inch (about 48 cm)
wide rack. The security appliance requires 1 rack unit (RU) of space, which is 1.75
inches (44.45 mm) high.
rack.
STEP 1Place one of the supplied silicon rubber spacers on the side of the security
appliance so that the four holes align to the screw holes. Place the rack mount
bracket next to the silicon rubber spacer and install the M3 screws.
NOTE If the M3 screws are not long enough to reattach the bracket with the silicon
rubber spacer, attach the bracket directly to the case without the silicon
rubber spacer.
STEP 2Install the security appliance into a standard rack as shown below. Place the
washers on the brackets so that the holes align to the screw holes and then install
the M5 screws.
Step 1
Step 2
281985
Cisco ISA500 Series Integrated Security Appliance Administration Guide21
Getting Started
I
/
O
RESET
ANT02ANT01
1
6
7
8910
WAN
CONFIGURABLE
POWER
12VDC
2
3
4
5
LAN
Internet
Access
Device
Public
Web Server
Power
Network
Devices
Installation
1
Hardware Installation
Follow these steps to connect the security appliance:
STEP 1Connect the security appliance to power using the supplied power cord and
adapter. Make sure that the power switch is turned off.
STEP 2If you are installing the ISA550W and ISA570W, screw each antenna onto a
threaded connector on the back panel. Orient each antenna to point upward.
STEP 3For a DSL or cable modem, or other WAN connectivity devices, connect an
Ethernet network cable from the device to the WAN port on the back panel. Cisco
strongly recommends using Cat5E or better cable.
STEP 4For network devices, connect an Ethernet network cable from the network device
to one of the dedicated LAN ports on the back panel.
STEP 5For a UC 500 or a UC 300, connect an Ethernet network cable from the WAN port
of the UC 500 or a UC 300 to an available LAN port of the security appliance.
STEP 6For a UC500 or a UC300, connect an Ethernet network cable from the WAN port of
the UC500 or UC300 to an available LAN port on the back panel of the security
appliance.
STEP 7Power on the connected devices.
STEP 8Power on the security appliance. The lights on the front panel for all connected
ports light up to show active connections.
A sample configuration is illustrated below.
Congratulations! The installation of the security appliance is complete.
Cisco ISA500 Series Integrated Security Appliance Administration Guide22
Getting Started
Getting Started with the Configuration Utility
Getting Started with the Configuration Utility
The Configuration Utility is a web based device manager that is used to provision
the security appliance. To use this utility, you must be able to connect to the
security appliance from your administration PC or laptop. You can access the
security appliance by using web browser such as Microsoft Internet Explorer 8.0,
or Mozilla Firefox 3.6.x (or later). It includes the following sections:
•Launching the Configuration Utility, page 23
•Navigating Through the Configuration Utility, page 24
•Using the Help System, page 25
•Using the Management Buttons, page 25
1
Launching the Configuration Utility
STEP 1Connect your computer to an available LAN port on the back panel of the security
appliance.
STEP 2Start a web browser. In the Address bar, enter the default IP address of the
security appliance: 192.168.1.1.
NOTE The above address is the factory default LAN address. If you change this
setting in the DEFAULT VLAN configuration, you will need to enter the new IP
address to connect to the Configuration Utility.
STEP 3Enter the default user name and password in the login screen:
•Username: cisco
•Password: cisco
STEP 4Click Login.
For the first login, you are forced to immediately change the default user name and
password of the default administrator account to prevent unauthorized access.
For more information, see Changing the User Name and Password of the
Default Administrator Account at Your First Login, page 27.
Cisco ISA500 Series Integrated Security Appliance Administration Guide23
Getting Started
1
2
Getting Started with the Configuration Utility
After you change them, the Startup Wizard launches. For more information about
how to use the Startup Wizard to configure your security appliance, see Using the
Startup Wizard, page 32.
Navigating Through the Configuration Utility
Use the left hand navigation pane and content pane to perform the tasks in the
Configuration Utility.
1
NumberComponentsDescription
1Left Hand
Navigation
2Content PaneThe content of the feature or subfeature appears in
Cisco ISA500 Series Integrated Security Appliance Administration Guide24
Pane
The left hand navigation pane provides easy
navigation through the configurable features. The
main branches expand to provide the features.
Click on the main branch title to expand its
contents. Click on the right arrow of a feature to
open its subfeatures, or click on the down arrow of
a feature to contract its subfeatures. Click on the
title of a feature or subfeature to open it.
this area.
Loading...
+ 341 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.