Basic configurations on Cisco ASA Firewall - Part 1
Basic configurations on Cisco ASA Firewall - Part 1
As a part of the understanding on the basics of Cisco ASA firewalls, these are some of the commands used to configure Cisco ASA firewall in real scenario.
Fig 1.1- Cisco ASA Firewall in a Network
What is Cisco ASA Firewall?
Cisco ASA is a security device that includes a firewall, antivirus, intrusion prevention, and a virtual private network (VPN). It enables proactive threat defense, preventing assaults from spreading throughout the network.
How to check the show version command ?
Here is the command
NDNA-ASA# show version
Display the ASA file system using the show file system command ?
NDNA-ASA# show file system
Display the contents of flash memory using one of these commands: show flash, show disk0, dir flash: or dir disk0
NDNA-ASA# show flash
You can restore the ASA to its factory default settings by using the configure factory-default command
NDNA-ASA# conf t
NDNA-ASA(config)# configure factory-default
Use the write erase command to remove the startup-config file from flash memory.
NDNA-ASA# write erase
NDNA-ASA# show start
NDNA-ASA# reload
Configure the hostname and domain name
NDNA-ASA-Init# config t
NDNA-ASA-Init(config)# hostname NDNA-ASA
NDNA-ASA(config)# domain-name theNDNA.com
Configure the login and enable mode passwords.
NDNA-ASA(config)# passwd cisco
NDNA-ASA(config)# enable password class
Set Date and time
NDNA-ASA(config)# clock set 10:19:00 November 12 2024
Configure the inside and outside interfaces.
NDNA-ASA(config)# interface gi1/2
NDNA-ASA(config-if)# nameif inside
NDNA-ASA(config-if)# ip address 10.10.10.1 255.255.255.0
NDNA-ASA(config-if)# security-level 100
NDNA-ASA(config-if)# no shutdown
NDNA-ASA(config-if)# interface G1/1
NDNA-ASA(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
NDNA-ASA(config-if)# ip address 112.23.16.11 255.255.255.248
NDNA-ASA(config-if)# no shutdown
Configure ASDM access to the ASA
You can configure the ASA to accept HTTPS connections using the http command. This allows access to the ASA GUI (ASDM). Configure the ASA to allow HTTPS connections from any host on the inside network (10.10.10.0/24).
NDNA-ASA(config)# http server enable
NDNA-ASA(config)# http 10.10.10.0 255.255.255.0 inside
Continue Reading...
- Security: Cisco ASA Vs Cisco FTD - The Network DNA
- Site-to-Site VPN: IPSEC Tunnel Between an ASA and a Cisco IOS Router
- Cisco Security: Cisco ASA 5505 Interfaces configuration for Access Ports
- Cisco Security: Cisco ASA 5505 Interfaces configuration for Trunk Port
- Cisco ASA Series 1: Restoring the ASA to Factory Default Configuration
- Cisco ASA Series 2: Configuring NAT
- Cisco ASA Series 3: Easy VPN Remote
- Cisco ASA Series 4: Configuring VLANs and Sub interfaces
- Cisco ASA Series 5: Configuring Threat Detection
- Site to Site IPSec VPN Tunnel between Cisco ASA and Palo Alto Firewalls
More on Cisco ASA...