Configure and Access ASDM on an ASA5505 PDF

Title Configure and Access ASDM on an ASA5505
Author Sneyder Rojjas
Course Estadistica
Institution Universidad Libre de Colombia
Pages 1
File Size 89.7 KB
File Type PDF
Total Downloads 46
Total Views 160

Summary

12231234567890...


Description

Video – Configure and Access ASDM on an ASA5505 (5 min) In this video, I'll demonstrate how to connect to a Cisco ASA 5505 firewall router using Cisco's Adaptive Security Device Manager. For this demonstration, I've already updated my Java Runtime Environment to the latest version, and I have a console connection using PuTTY to my Cisco ASA firewall device. I have also a default configuration. If you need to reset your router to the default configuration, go to global configuration mode, and you can type "configure fac"-- I'll hit the tab key-- "factory-default." And if I hit enter, it will restore the firewall to the default configurations. You can see all the commands are automatically being put in to restore the firewall to the default configuration. Okay, now that that's done, I'll need to put in some configuration commands to activate the ASA 5505's web server. I'll type "http server enable" to enable the web server, and then I'll type "http 192.168.1.0", the subnet mask, and the inside keyword signifying the inside network. This will allow users on the one network to access the ASA 5505 on Ethernet switch port 1. I'll press enter. So now that the ASA's web server is enabled and we're allowing the 192.168.1.0 network to contact it, it's time to connect to the ASA device with an Ethernet cable from our Ethernet port on our laptop or desktop computer to switch port 1 on the ASA device. I already have a cable connected. I'll open my control panel, go to the network and sharing center, click on "change adapter settings" and make sure that my local area connection is configured with the DHCP client to automatically pick up addressing from the ASA firewall's DHCP server. As you can see, the settings are correct. I'll open up a command prompt to verify that I've picked up an IP address from the ASA firewall. I'll type in "ipconfig" and you can see that I've picked up the address 192.168.1.5 from the ASA's DHCP server, which is enabled and configured by default from the factory default settings. This means that now, if I want to configure the ASA firewall with the graphical user interface, all I need to do is open up a web browser --I'll open up Firefox -- and I'll need to type in "https://192.168.1.1". I'll hit enter, and I'll need to accept the self-signed security certificate from the ASA firewall device. I'll click "I Understand the Risks," add an exception, and confirm the security exception. And you can see that I'm presented with the web server for the Cisco ASA device. Notice this is adaptive security device manager 7.4(1). Now I have two choices. I can install an ASDM launcher, a shortcut on my desktop, or I could just run ASDM from the browser. For the sake of the demonstration, I'll install the ASDM launcher. I'll click "ASDM Launcher." I'm prompted for a username and password. Since this is the factory default settings on the ASA firewall, there is no user and password, so all I have to do is click "OK." I'll save the dm-launcher.msi file... Go to my downloads folder, and launch it. I'll run the installer... Click "Next" to install, and "Next," and "Install." Offscreen, in the user account control settings, I'll click "Yes" to allow the program to make changes to my computer. The installation is finished, and I'll click the "Finish" button. I'll minimize these windows. Now that the ASDM-IDM launcher has been installed on my desktop, I can double-click it to launch ASDM. The ASA does not have a username or password, but you can see that the IP address, 192.168.1.1, is under the "Device IP Address" field. I'll click "OK," click "Continue" to accept the self-signed certificate... And you can see that ASDM 7.4 for ASA fires up. Now that Cisco ASDM is running and connected to my ASA 5505 firewall device, I can use the graphical user interface to configure the router, monitor, and manage the network.

© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 1 of 1...


Similar Free PDFs