Page 1
Cisco ASA 5505 Getting Started Guide Software Version 7.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7817612= Text Part Number: 78-17612-02...
Page 2
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP,...
Scenario 1: Private Network with External Connectivity Scenario 2: Basic Installation with DMZ Scenario 3: IPSec Remote-Access VPN Scenario 4: Site-to-Site VPN Scenario 5: ASA 5505 Deployed as a Hardware VPN Client Configuration Procedures for Scenarios What to Do Next Planning for a VLAN Configuration...
Page 4
C H A P T E R Verifying the Package Contents PoE Ports and Devices Installing the Chassis Connecting to Network Interfaces Powering on the Cisco ASA 5505 Setting Up a PC for System Administration Optional Procedures Connecting to the Console Installing a Cable Lock...
Page 5
Example IPSec Remote-Access VPN Network Topology Implementing the IPSec Remote-Access VPN Scenario Information to Have Available Starting ASDM Configuring the ASA 5505 for an IPSec Remote-Access VPN Selecting VPN Client Types Specifying the VPN Tunnel Group Name and Authentication Method Specifying a User Authentication Method...
Page 6
8-14 Scenario: Easy VPN Hardware Client Configuration C H A P T E R Using an ASA 5505 as an Easy VPN Hardware Client Client Mode and Network Extension Mode Configuring the Easy VPN Hardware Client Configuring Advanced Easy VPN Attributes...
Learn about VLANs and port allocation Chapter 3, “Planning for a VLAN on the ASA 5505 Configuration” Install the chassis Chapter 4, “Installing the ASA 5505” Perform initial setup of the adaptive Chapter 5, “Configuring the security appliance Adaptive Security Appliance”...
Page 8
To Do This... (continued) See... Refine configuration Cisco Security Appliance Command Line Configuration Guide Configure optional and advanced features Cisco Security Appliance Command Reference Cisco Security Appliance Logging Configuration and System Log Messages Cisco ASA 5505 Getting Started Guide 78-17612-02...
Scenario 3: IPSec Remote-Access VPN, page 2-5 • Scenario 4: Site-to-Site VPN, page 2-6 • Scenario 5: ASA 5505 Deployed as a Hardware VPN Client, page 2-7 • Scenarios for Deployment Planning and Configuration An extended adaptive security appliance deployment can include two or more of the different deployment scenarios described in this chapter.
Page 10
Scenario 3: IPSec VPN Scenario 6: Site-to-site VPN Connection Connection Adaptive Security Appliance A SS r ETH co ns Web Server Email Server Scenario 1: Basic Installation Scenario 2: Basic Installation with DMZ Cisco ASA 5505 Getting Started Guide 78-17612-02...
PIX 501 security appliances in which devices behind the firewall can communicate internally and externally, you can keep the same deployment and replace the PIX 501 devices with ASA 5505 devices. Cisco ASA 5505 Getting Started Guide...
Internet. Figure 2-3 Private Network with DMZ Outside Network (Internet Connection) Internet Router Adaptive Security Appliance A SS r ETH co ns Web Server Printer Personal computers Email Server Private (Inside) Network Cisco ASA 5505 Getting Started Guide 78-17612-02...
Adaptive Security Appliance Personal computers running Cisco VPN Personal Client software computer For information about how to configure an IPSec remote-access VPN deployment, see Chapter 7, “Scenario: IPSec Remote-Access VPN Configuration.” Cisco ASA 5505 Getting Started Guide 78-17612-02...
Adaptive Security Adaptive Security Appliance 1 Appliance 2 Printer Printer Personal Personal computers computers For information about configuring a site-to-site VPN deployment, see Chapter 8, “Scenario: Site-to-Site VPN Configuration.” Cisco ASA 5505 Getting Started Guide 78-17612-02...
Scenario 5: ASA 5505 Deployed as a Hardware VPN Client In this scenario, an ASA 5505 is deployed as a hardware client (sometimes called a remote device). Deploying one or more VPN hardware clients in conjunction with a VPN headend device enables companies with multiple sites to establish secure communications among them and share network resources.
Cisco IOS router with IPSec support Central LAN For information about how to configure the ASA 5505 as a VPN hardware client, Chapter 9, “Scenario: Easy VPN Hardware Client Configuration.” Configuration Procedures for Scenarios Each deployment scenario in this chapter has a corresponding configuration chapter in this document that describes how to configure the ASA 5505 for that type of deployment.
Chapter 2 Deployment Planning What to Do Next To Configure the ASA 5505 For This Scenario..See This Chapter... Scenario 1: Private Network with Chapter 5, “Configuring the External Connectivity Adaptive Security Appliance” Scenario 2: Basic Installation with Chapter 6, “Scenario: DMZ Configuration”...
Page 18
Chapter 2 Deployment Planning What to Do Next Cisco ASA 5505 Getting Started Guide 2-10 78-17612-02...
• Understanding VLANs on the ASA 5505 After you have made a decision about how to deploy the ASA 5505 in your network, you must decide how many VLANs you need to support that deployment and how many ports to allocate to each VLAN.
• About Physical Ports on the ASA 5505 The ASA 5505 has a built-in switch with eight Fast Ethernet ports, called switch ports. Two of the eight physical ports are Power Over Ethernet (PoE) ports. You can connect PoE ports directly to user equipment such as PCs, IP phones, or a DSL modem.
Planning for a VLAN Configuration Understanding VLANs on the ASA 5505 Before you can enable a switch port on the ASA 5505, it must be assigned to a VLAN. With the Base platform, each switch port can be assigned to only one VLAN at a time.
Because there are only 8 physical ports, the additional VLANs are useful for assigning to trunk ports, which aggregate multiple VLANs on a single physical port. The ASA 5505 adaptive security appliance supports active and standby failover, Note but not Stateful Failover. Deployment Scenarios Using VLANs The number of VLANs you need depends on the complexity of the network into which you are installing the adaptive security appliance.
VLAN consists of a single ISP connection using an external WAN router. Figure 3-1, the Inside VLAN uses four switch ports on the ASA 5505 and the Outside VLAN uses only one. Three switch ports are unused. Cisco ASA 5505 Getting Started Guide...
Page 24
PIX 501 security appliances in which devices behind the firewall can communicate internally and externally, you can keep the same deployment and replace the PIX 501 devices with ASA 5505 devices. If this same customer needed to have two Internet connections, the Outside VLAN...
In this example, three physical switch ports are allocated to the Inside VLAN, two switch ports are allocated to the DMZ VLAN, and one switch port is allocated to the Outside VLAN. Two switch ports are left unused. Cisco ASA 5505 Getting Started Guide 78-17612-02...
• Inside and DMZ VLANs In this case, the ASA 5505 protects the critical assets on the Inside (Work) VLAN so that these devices cannot be infected by traffic from the DMZ (Home) VLAN. To enable devices in the Inside (Work) VLAN to establish secure connections...
Game System DMZ (Home) VLAN In this example, the physical ports of the ASA 5505 are used as follows: The Inside (Work) VLAN consists of three physical switch ports, one of • which is a Power over Ethernet (PoE) switch port that is used for an IP phone.
Page 28
Chapter 3 Planning for a VLAN Configuration What to Do Next Cisco ASA 5505 Getting Started Guide 3-10 78-17612-02...
C H A P T E R Installing the ASA 5505 This chapter describes how to install the Cisco ASA 5505 adaptive security appliance. This chapter includes the following sections: Verifying the Package Contents, page 4-1 • PoE Ports and Devices, page 4-3 •...
Page 30
Chapter 4 Installing the ASA 5505 Verifying the Package Contents Figure 4-1 Contents of Cisco ASA 5505 Package Se cu rit P O W E R Se rv ic es C ar d Sl VD C C O N SO...
PoE Ports and Devices PoE Ports and Devices On the Cisco ASA 5505, switch ports Ethernet 0/6 and Ethernet 0/7 support PoE devices that are compliant with the IEEE 802.3af standard, such as IP phones or wireless access points. If you install a non-PoE device or do not connect to these switch ports, the adaptive security appliance does not supply power to the ports and the device must be powered on its own.
You can wall-mount or rack-mount the Cisco ASA 5505. The part number for ordering a wall-mount kit for the Cisco ASA 5505 is ASA-5505-WALL-MNT= , the part number for ordering a rack-mount kit for the Cisco ASA 5505 is ASA5505-RACK-MNT=. For information on wall-mounting or rack-mounting the Cisco ASA 5505, see "Mounting the ASA 5505 Chassis"...
Page 33
0 through 5 are switched ports and ports 6 and 7 are PoE ports and both require that you connect a straight through cable. Cisco ASA 5505 Getting Started Guide 78-17612-02...
For more information about using ASDM for setup and configuration, see Chapter 5, “Configuring the Adaptive Security Appliance.” To set up a PC from which you can configure and manage the Cisco ASA 5505, perform the following steps: Make sure that the speed of the PC interface to be connected to one of the Cisco Step 1 ASA 5505 inside ports is set to autonegotiate.
Use an Ethernet cable to connect the PC to a switched inside port on the rear panel Step 3 of the Cisco ASA 5505 (one of the ports numbered 1 through 7). Check the LINK LED to verify that the PC has basic connectivity to the Cisco Step 4 ASA 5505.
Connecting to the Console You can access the command line for administration using the console port on the Cisco ASA 5505. To do so, you must run a serial terminal emulator on a PC or workstation, as shown in Figure 4-3.
Step 2 Attach the cable lock to the lock slot on the back panel of the Cisco ASA 5505. Ports and LEDs This section describes the front and rear panels of the ASA 5505. This section...
Page 38
Chapter 4 Installing the ASA 5505 Ports and LEDs Figure 4-4 shows the front panel of the Cisco ASA 5505. Figure 4-4 ASA 5505 Front Panel LINK/ACT Power Status Active 100 MBPS Cisco ASA 5505 series Adaptive Security Appliance Port / LED...
Page 39
If the LINK/ACT LED does not light up, the link could be down if there is a duplex mismatch. You can fix the problem by changing the settings either on the Cisco ASA 5505 or on the other end. If auto-negotiation is disabled (it is enabled by default), you might be using the wrong type of cable.
Chapter 4 Installing the ASA 5505 Ports and LEDs Rear Panel Components Figure 4-5 shows the back panel of the Cisco ASA 5505. Figure 4-5 ASA 5505 Rear Panel Security Console Services Card Slot power RESET POWER over ETHERNET Port or LED...
Chapter 4 Installing the ASA 5505 What to Do Next What to Do Next Continue with Chapter 5, “Configuring the Adaptive Security Appliance.” Cisco ASA 5505 Getting Started Guide 4-13 78-17612-02...
Page 42
Chapter 4 Installing the ASA 5505 What to Do Next Cisco ASA 5505 Getting Started Guide 4-14 78-17612-02...
Appliance This chapter describes the initial configuration of the adaptive security appliance. You can perform the configuration steps using either the browser-based Cisco Adaptive Security Device Manager (ASDM) or the command-line interface (CLI). The procedures in this chapter describe how to configure the adaptive security appliance using ASDM.
Page 44
DHCP address from the adaptive security appliance to connect to the appliance. Administrators can then configure and manage the adaptive security appliance using ASDM. For more information about CLI configuration, see the Cisco Security Appliance Command Line Configuration Guide. Cisco ASA 5505 Getting Started Guide...
In addition to the ASDM web configuration tool, you can configure the adaptive security appliance by using the command-line interface. For more information, see the Cisco Security Appliance Command Line Configuration Guide and the Cisco Security Appliance Command Reference. Cisco ASA 5505 Getting Started Guide...
Static routes to be configured. • If you want to create a DMZ, you must create a third VLAN and assign ports • to that VLAN. (By default, there are two VLANs configured.) Cisco ASA 5505 Getting Started Guide 78-17612-02...
To use the Startup Wizard to set up a basic configuration for the adaptive security appliance, perform the following steps: If you have not already done so, connect a PC to a switch port on the ASA 5505. Step 1 Locate an Ethernet cable, which has an RJ-45 connector on each end.
Page 48
Follow the instructions in the Startup Wizard to set up your adaptive security Step 6 appliance. For information about any field in the Startup Wizard, click Help at the bottom of the window. Cisco ASA 5505 Getting Started Guide 78-17612-02...
C H A P T E R Scenario: DMZ Configuration Cisco ASA 5505 DMZ configurations are possible only with the Security Plus Note license. This chapter includes the following sections: Example DMZ Network Topology, page 6-1 • • Configuring the Security Appliance for a DMZ Deployment, page 6-5 What to Do Next, page 6-18 •...
Page 52
The network has one routable IP address that is publicly available: the outside • interface of the adaptive security appliance (209.165.200.225). Figure 6-2 shows the outgoing traffic flow of HTTP requests from the private network to both the DMZ web server and to the Internet. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 53
The DMZ web server returns the HTTP content to the adaptive security appliance with a destination address of the real IP address of the internal client. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 54
Internet Destination IP address translated to the private IP address of the web server. Web server Web server receives request for content. DMZ Web Private IP address: 10.30.30.30 Server Public IP address: 209.165.200.226 Cisco ASA 5505 Getting Started Guide 78-17612-02...
The following sections provide detailed instructions for how to perform each step. Configuration Requirements Configuring the adaptive security appliance for this DMZ deployment requires the following: • Internal clients need to be able to communicate with devices on the Internet. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Remember to add the “s” in “https,” or the connection fails. HTTP over Note SSL (HTTPS) provides a secure connection between your browser and the adaptive security appliance. The ASDM main window appears. Cisco ASA 5505 Getting Started Guide 78-17612-02...
(that is, the public IP address of the adaptive security appliance). Outgoing traffic appears to come from this address. The ASA 5505 comes with a default configuration that includes the necessary address translation rule. Unless you want to change the IP address of the inside interface, you do not need to configure any settings to allow inside clients to access the Internet.
In the ASDM main window, click the Configuration tool. Step 1 In the Features pane, click NAT. Step 2 From the Add drop-down list, choose Add Static NAT Rule. Step 3 The Add Static NAT Rule dialog box appears. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 59
Click OK to add the static NAT rule and return to the Configuration > NAT pane. Review the configuration pane to verify that the translation rule appears as you Step 6 expected. The rule should appear similar to the following: Cisco ASA 5505 Getting Started Guide 78-17612-02...
From the Add drop-down list, choose Add Static NAT Rule. Step 2 The Add Static NAT Rule dialog box appears. In the Real Address area, do the following: Step 3 From the Interface drop-down list, choose DMZ. Cisco ASA 5505 Getting Started Guide 6-10 78-17612-02...
Page 61
From the Interface drop-down list, choose Inside. Enter or choose from the IP Address drop-down list the real address of the DMZ web server. In this scenario, the IP address is 10.30.30.30. Cisco ASA 5505 Getting Started Guide 6-11 78-17612-02...
To map the real web server IP address (10.30.30.30) statically to a public IP address (209.165.200.225), perform the following steps: In the ASDM main window, choose Configuration > NAT. Step 1 Cisco ASA 5505 Getting Started Guide 6-12 78-17612-02...
Page 63
IP address of the adaptive security appliance. To configure Port Address Translation, perform the following steps: Check the Enable Port Address Translation (PAT) check box. From the Protocol drop-down list, choose tcp. In the Original Port field, enter 80. Cisco ASA 5505 Getting Started Guide 6-13 78-17612-02...
Page 64
Confirm that the rule was created the way you expected. The displayed Step 6 configuration should be similar to the following: Click Apply to complete the adaptive security appliance configuration changes. Step 7 Cisco ASA 5505 Getting Started Guide 6-14 78-17612-02...
From the Interface drop-down list, choose Outside. In the Protocol and Service area, specify the type of traffic that you want to permit Step 5 through the adaptive security appliance. From the Protocol drop-down list, choose tcp. Cisco ASA 5505 Getting Started Guide 6-15 78-17612-02...
Page 66
Click OK to return to the Security Policy > Access Rules pane. The displayed configuration should be similar to the following. Verify that the Step 6 information you entered is accurate. Cisco ASA 5505 Getting Started Guide 6-16 78-17612-02...
Page 67
Alternatively, ASDM prompts you to save the configuration changes permanently when you exit ASDM. If you do not save the configuration changes, the previous configuration takes effect the next time that the device starts. Cisco ASA 5505 Getting Started Guide 6-17 78-17612-02...
The following sections provide configuration procedures for other common applications of the adaptive security appliance. To Do This... See... Configure a remote-access VPN Chapter 7, “Scenario: IPSec Remote-Access VPN Configuration” Configure a site-to-site VPN Chapter 8, “Scenario: Site-to-Site VPN Configuration” Cisco ASA 5505 Getting Started Guide 6-18 78-17612-02...
Topology Figure 7-1 shows an adaptive security appliance configured to accept requests from and establish IPSec connections with VPN clients, such as a Cisco Easy VPN software or hardware clients, over the Internet. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Information to Have Available, page 7-3 • Starting ASDM, page 7-3 • Configuring the ASA 5505 for an IPSec Remote-Access VPN, page 7-5 • Selecting VPN Client Types, page 7-6 • Specifying the VPN Tunnel Group Name and Authentication Method, •...
List of IP addresses for local hosts, groups, and networks that should be – made accessible to authenticated remote clients Starting ASDM To run ASDM in a web browser, enter the factory default IP address in the address field: https://192.168.1.1/admin/. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 72
Remember to add the “s” in “https” or the connection fails. HTTP over Note SSL (HTTP) provides a secure connection between your browser and the adaptive security appliance. The Main ASDM window appears. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Chapter 7 Scenario: IPSec Remote-Access VPN Configuration Implementing the IPSec Remote-Access VPN Scenario Configuring the ASA 5505 for an IPSec Remote-Access VPN To begin the process for configuring a remote-access VPN, perform the following steps: In the main ASDM window, choose VPN Wizard from the Wizards drop-down Step 1 menu.
Specify the type of VPN client that will enable remote users to connect to this Step 1 adaptive security appliance. For this scenario, click the Cisco VPN Client radio button. You can also use any other Cisco Easy VPN remote product.
To use a static preshared key for authentication, click the Pre-Shared Key • radio button and enter a preshared key (for example, “Cisco”). This key is used for IPSec negotiations between the adaptive security appliances. To use digital certificates for authentication, click the Certificate radio •...
Chapter 7 Scenario: IPSec Remote-Access VPN Configuration Implementing the IPSec Remote-Access VPN Scenario Enter a Tunnel Group Name (such as “Cisco”) for the set of users that use Step 2 common connection parameters and client attributes to connect to this adaptive security appliance.
Page 77
Click the Authenticate Using an AAA Server Group radio button. Choose a preconfigured server group from the Authenticate using an AAA server group drop-down list, or click New to add a new AAA server group. Click Next to continue. Step 3 Cisco ASA 5505 Getting Started Guide 78-17612-02...
In Step 5 of the VPN Wizard, perform the following steps: To add a new user, enter a username and password, and then click Add. Step 1 When you have finished adding new users, click Next to continue. Step 2 Cisco ASA 5505 Getting Started Guide 7-10 78-17612-02...
(Optional) Enter a subnet mask or choose a subnet mask for the range of IP addresses from the Subnet Mask drop-down list. Click OK to return to Step 6 of the VPN Wizard. Cisco ASA 5505 Getting Started Guide 7-11 78-17612-02...
Easy VPN hardware client when a connection is established. Make sure that you specify the correct values, or remote clients will not be able to use DNS names for resolution or use Windows networking. Cisco ASA 5505 Getting Started Guide 7-12 78-17612-02...
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy; it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default values are sufficient to establish secure VPN tunnels. Cisco ASA 5505 Getting Started Guide 7-13 78-17612-02...
Page 82
Choose the Encryption (DES/3DES/AES), authentication algorithms Step 1 (MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive security appliance during an IKE security association. Click Next to continue. Step 2 Cisco ASA 5505 Getting Started Guide 7-14 78-17612-02...
Configuring IPSec Encryption and Authentication Parameters In Step 9 of the VPN Wizard, perform the following steps: Click the Encryption algorithm (DES/3DES/AES) and authentication algorithm Step 1 (MD5/SHA). Step 2 Click Next to continue. Cisco ASA 5505 Getting Started Guide 7-15 78-17612-02...
Specify hosts, groups, and networks that should be in the list of internal resources Step 1 made accessible to authenticated remote users. To add or remove hosts, groups, and networks dynamically from the Selected Hosts/Networks pane, click Add or Delete, respectively. Cisco ASA 5505 Getting Started Guide 7-16 78-17612-02...
Step 2 Verifying the Remote-Access VPN Configuration In Step 11 of the VPN Wizard, review the configuration attributes for the new VPN tunnel. The displayed configuration should be similar to the following: Cisco ASA 5505 Getting Started Guide 7-17 78-17612-02...
To establish end-to-end, encrypted VPN tunnels for secure connectivity for mobile employees or teleworkers, obtain the Cisco VPN client software. For more information about the Cisco Systems VPN client, see the following URL: http://www.cisco.com/en/US/products/sw/secursw/ps2308/index.html. If you are deploying the adaptive security appliance solely in a remote-access VPN environment, you have completed the initial configuration.
Page 87
What to Do Next To Do This... See... Configure the adaptive security Chapter 6, “Scenario: DMZ appliance to protect a web server in a Configuration” Configure a site-to-site VPN Chapter 8, “Scenario: Site-to-Site VPN Configuration” Cisco ASA 5505 Getting Started Guide 7-19 78-17612-02...
Page 88
Chapter 7 Scenario: IPSec Remote-Access VPN Configuration What to Do Next Cisco ASA 5505 Getting Started Guide 7-20 78-17612-02...
Configuring the Other Side of the VPN Connection, page 8-13 • What to Do Next, page 8-14 • Example Site-to-Site VPN Network Topology Figure 8-1 shows an example VPN tunnel between two adaptive security appliances. Cisco ASA 5505 Getting Started Guide 78-17612-02...
VPN deployment, using example parameters from the remote-access scenario shown in Figure 8-1. This section includes the following topics: Information to Have Available, page 8-3 • Configuring the Site-to-Site VPN, page 8-3 • Cisco ASA 5505 Getting Started Guide 78-17612-02...
To run ASDM in a web browser, enter the factory default IP address in the address field: https://192.168.1.1/admin/. Make sure you add the “s” in “https,” or the connection fails. HTTP over Note SSL (HTTPS) provides a secure connection between your browser and the adaptive security appliance. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 92
To configure Security Appliance 1, perform the following steps: In the ASDM main window, choose the VPN Wizard option from the Wizards Step 1 drop-down menu. ASDM opens the first VPN Wizard screen. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 93
VPN concentrators, or other devices that support site-to-site IPSec connectivity. From the VPN tunnel Interface drop-down list, choose Outside as the enabled interface for the current VPN tunnel. Click Next to continue. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 94
To use a static preshared key for authentication, click the Pre-Shared Key • radio button and enter a preshared key (for example, “Cisco”). This key is used for IPSec negotiations between the adaptive security appliances. For site-to-site connections with pre-shared key authentication such...
In Step 3 of the VPN Wizard, perform the following steps: Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), Step 1 and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance during an IKE security association. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 96
When configuring Security Appliance 2, enter the same values for each of Note the options that you chose for Security Appliance 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow down the process. Click Next to continue. Step 2 Cisco ASA 5505 Getting Started Guide 78-17612-02...
In Step 4 of the VPN Wizard, perform the following steps: Choose the encryption algorithm (DES/3DES/AES) from the Encryption Step 1 drop-down list, and the authentication algorithm (MD5/SHA) from the Authentication drop-down list. Click Next to continue. Step 2 Cisco ASA 5505 Getting Started Guide 78-17612-02...
Page 98
(...) button to select from a list of hosts and networks. If a remote peer has a dynamic IP address, you can use the hostname as Note the peer IP address. Cisco ASA 5505 Getting Started Guide 8-10 78-17612-02...
Page 99
In Step 6 of the VPN Wizard, review the configuration settings for the VPN tunnel that you just created. If you are satisfied with the configuration settings, click Finish to apply the changes to the adaptive security appliance. Cisco ASA 5505 Getting Started Guide 8-11 78-17612-02...
Page 100
ASDM. If you do not save the configuration changes, the previous configuration takes effect the next time that the device starts. This concludes the configuration process for Security Appliance 1. Cisco ASA 5505 Getting Started Guide 8-12 78-17612-02...
For information about verifying or troubleshooting the configuration for the Site-to-Site VPN, see the section "Troubleshooting the Security Appliance" in the Cisco Security Appliance Command Line Configuration Guide. For specific troubleshooting issues, see the Troubleshooting Technotes at the following location: http://www.cisco.com/en/US/products/ps6120/prod_tech_notes_list.html...
What to Do Next debug crypto isakmp sa • See also the Cisco Security Appliance Command Reference for detailed information about each of these commands. What to Do Next If you are deploying the adaptive security appliance only in a site-to-site VPN environment, then you have completed the initial configuration.
Easy VPN server at the main site and Easy VPN hardware clients at the remote offices. The Cisco ASA 5505 can function as a Cisco Easy VPN hardware client or as a Cisco Easy VPN server (sometimes called a “headend device”), but not both at the same time.
Cisco VPN 30xx, or Cisco IOS 12.2(8)T) When used as an Easy VPN hardware client, the ASA 5505 can also be configured to perform basic firewall services, such as protecting devices in a DMZ from from unauthorized access. However, if the ASA 5505 is configured to function as an Easy VPN hardware client, it cannot establish other types of tunnels.
ASA 5505 running in Easy VPN Client Mode. When configured in Client Mode, devices on the inside interface of the ASA 5505 cannot be accessed by devices behind the Easy VPN server. Cisco ASA 5505 Getting Started Guide...
Page 106
LAN from remote LAN When configured in Easy VPN Network Extension Mode, the ASA 5505 does not hide the IP addresses of local hosts by substituting a public IP address. Therefore, hosts on the other side of the VPN connection can communicate directly with hosts on the local network.
Configuring the Easy VPN Hardware Client The Easy VPN server controls the security policies enforced on the ASA 5505 Easy VPN hardware client. However, to establish the initial connection to the Easy VPN server, you must complete some configuration locally.
Page 108
ASDM. To configure the ASA 5505 as an Easy VPN hardware client, perform the following steps: At a PC that has access to the inside interface of the ASA 5505, start ASDM. Step 1 Start a web browser. In the address field of the browser, enter the factory default IP address in the address field: https://192.168.1.1/.
Page 109
Group Password radio button and enter a Group Name and Group Password. In the User Settings area, specify the User Name and User Password to be used by Step 7 the ASA 5505 when establishing a VPN connection. Cisco ASA 5505 Getting Started Guide 78-17612-02...
Easy VPN connection through the tunnel. The public address of the ASA 5505 is not accessible when behind the Note NAT device unless you add static NAT mappings on the NAT device.
You may want to consider performing some of the following additional steps: To Do This... See... Configure the ASA 5505 to protect a Chapter 6, “Scenario: DMZ DMZ web server Configuration” Refine configuration and configure...
Page 112
Chapter 9 Scenario: Easy VPN Hardware Client Configuration What to Do Next Cisco ASA 5505 Getting Started Guide 9-10 78-17612-02...
(SSH, ASDM, and so on), site-to-site VPN, and remote access VPN. You need an encryption license key to enable this license. If you are a registered user of Cisco.com and would like to obtain a 3DES/AES encryption license, go to the following website: http://www.cisco.com/go/license...
Page 114
Step 4 Exits global configuration mode. hostname(config)# exit Step 5 Saves the configuration. hostname# copy running-config startup-config Step 6 Reboots the adaptive security appliance and hostname# reload reloads the configuration. Cisco ASA 5505 Getting Started Guide 78-17612-02...