Post

Cisco Adaptive Secure Appliance (ASA)


Cisco ASA (Adaptive Security Appliance) is a security device developed by Cisco Systems that provides firewall, VPN (Virtual Private Network), and other network security features.



Network Topology

Here’s this deployment’s network topology

x



Preparing the Installer

Download the installer from Cisco Download Central

x


Deploy the OVA as usual, and boot the VM

x



Initial Configuration

Connect through console, and start configuring the management interface

1
2
3
4
interface Management0/0
 nameif management
 security-level 100
 ip address 198.18.0.251 255.255.255.0 


Create a local user

1
username helena password cisco privilege 15


Enable local user access to SSH and HTTP

1
2
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL


Next enable all segments to access SSH and HTTP through management interface

1
2
ssh 0.0.0.0 0.0.0.0 management
http 0.0.0.0 0.0.0.0 management


Lastly enable HTTP service

1
http server enable



Configuring Cisco ASDM

Cisco ASDM (Adaptive Security Device Manager) is a GUI tool used for configuring and managing Cisco ASA firewalls

Now open the management IP using web browser, select Install ASDM Launcher

x


Next just run the installer

x


After that just login to the management interface using the local user

x


And we’re in ASDM

x


Plus its also available on MacOS

x



Configuring Interfaces

First, lets configure the outside interface

1
2
3
4
interface GigabitEthernet0/1
 nameif outside
 security-level 0
 ip address 198.100.0.2 255.255.255.0 


Next the inside

1
2
3
4
interface GigabitEthernet0/2
 nameif inside
 security-level 100
 ip address 63.0.0.1 255.255.255.0 


Add a static route on the outside to the internet

1
route outside 0.0.0.0 0.0.0.0 198.100.0.1 1


That should do, this configuration can also be viewed on ASDM

x

x


And pinging the interfaces from inside and outside network shows these are up and running

x


This post is licensed under CC BY 4.0 by the author.