Latest

Basic configurations on Cisco ASA Firewall - Part 1

Basic configurations on Cisco ASA Firewall - Part 1

As a part of the understanding on the basics of Cisco ASA firewalls, these are some of the commands used to configure Cisco ASA firewall in real scenario.

Cisco ASA Firewall in a Network
Fig 1.1- Cisco ASA Firewall in a Network 

What is Cisco ASA Firewall?

Cisco ASA is a security device that includes a firewall, antivirus, intrusion prevention, and a virtual private network (VPN). It enables proactive threat defense, preventing assaults from spreading throughout the network.

How to check the show version command ?

Here is the command
NDNA-ASA# show version

Display the ASA file system using the show file system command ?
NDNA-ASA# show file system 

Display the contents of flash memory using one of these commands: show flash, show disk0, dir flash: or dir disk0
NDNA-ASA# show flash

You can restore the ASA to its factory default settings by using the configure factory-default command
NDNA-ASA# conf t
NDNA-ASA(config)# configure factory-default

Use the write erase command to remove the startup-config file from flash memory.
NDNA-ASA# write erase
NDNA-ASA# show start
NDNA-ASA# reload

Configure the hostname and domain name
NDNA-ASA-Init# config t
NDNA-ASA-Init(config)# hostname NDNA-ASA
NDNA-ASA(config)# domain-name theNDNA.com

Configure the login and enable mode passwords.
NDNA-ASA(config)# passwd cisco
NDNA-ASA(config)# enable password class

Set Date and time
NDNA-ASA(config)# clock set 10:19:00 November 12 2024

Configure the inside and outside interfaces.
NDNA-ASA(config)# interface gi1/2
NDNA-ASA(config-if)# nameif inside
NDNA-ASA(config-if)# ip address 10.10.10.1 255.255.255.0
NDNA-ASA(config-if)# security-level 100
NDNA-ASA(config-if)# no shutdown

NDNA-ASA(config-if)# interface G1/1
NDNA-ASA(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
NDNA-ASA(config-if)# ip address 112.23.16.11 255.255.255.248
NDNA-ASA(config-if)# no shutdown

Configure ASDM access to the ASA

You can configure the ASA to accept HTTPS connections using the http command. This allows access to the ASA GUI (ASDM). Configure the ASA to allow HTTPS connections from any host on the inside network (10.10.10.0/24).

NDNA-ASA(config)# http server enable
NDNA-ASA(config)# http 10.10.10.0 255.255.255.0 inside

Continue Reading...

More on Cisco ASA...