Page 1
Cisco ASA 5505 Getting Started Guide Software Version 8.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Customer Order Number: DOC-78-18003= Text Part Number: 78-18003-02...
Page 2
DAMAGES. CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco,...
2-10 Planning a VLAN Configuration C H A P T E R Understanding VLANs on the ASA 5505 About Physical Ports on the ASA 5505 About VLANs Maximum Number and Types of VLANs Deployment Scenarios Using VLANs Basic Deployment Using Two VLANs...
Page 4
C H A P T E R Verifying the Package Contents PoE Ports and Devices Installing the Chassis Connecting to Network Interfaces Powering on the ASA 5505 Setting Up a PC for System Administration Optional Procedures Connecting to the Console Installing a Cable Lock...
Page 5
Example IPsec Remote-Access VPN Network Topology Implementing the IPsec Remote-Access VPN Scenario Information to Have Available Starting ASDM Configuring the ASA 5505 for an IPsec Remote-Access VPN Selecting VPN Client Types Specifying the VPN Tunnel Group Name and Authentication Method Specifying a User Authentication Method...
Page 6
Example Topology Using AnyConnect SSL VPN Clients Implementing the Cisco SSL VPN Scenario Information to Have Available Starting ASDM Configuring the ASA 5505 for the Cisco AnyConnect VPN Client Specifying the SSL VPN Interface Specifying a User Authentication Method Specifying a Group Policy...
Page 7
What to Do Next 10-14 Scenario: Easy VPN Hardware Client Configuration 11-1 C H A P T E R Using an ASA 5505 as an Easy VPN Hardware Client 11-1 Client Mode and Network Extension Mode 11-2 Configuring the Easy VPN Hardware Client...
Page 8
Contents Configuring Advanced Easy VPN Attributes 11-11 What to Do Next 11-12 Obtaining a 3DES/AES License A P P E N D I X ASA 5505 Getting Started Guide viii 78-18003-02...
C H A P T E R Before You Begin Use the following table to find the installation and configuration steps that are required for your implementation of the Cisco ASA 5505 Adaptive Security Appliance. To Do This... See... Learn about typical deployments of the Chapter 2, “Deployment Planning”...
Page 10
To Do This... (continued) See... Refine the configuration Cisco Security Appliance Command Line Configuration Guide Configure optional and advanced features Cisco Security Appliance Command Reference Cisco Security Appliance Logging Configuration and System Log Messages ASA 5505 Getting Started Guide 78-18003-02...
Page 11
C H A P T E R Deployment Planning This document is based on several example scenarios that represent typical customer deployments of the ASA 5505. The deployment scenarios in this chapter correspond to subsequent configuration chapters. This chapter includes the following sections: Scenarios for Deployment Planning and Configuration, page 2-2 •...
Figure 2-1 illustrates an extended network that includes most of the deployment and configuration scenarios included in this document. ASA 5505 Getting Started Guide 78-18003-02...
Page 13
Scenario 3: IPSec VPN Scenario 6: Site-to-site VPN Connection Connection Adaptive Security Appliance A SS r ETH co ns Web Server Email Server Scenario 1: Basic Installation Scenario 2: Basic Installation with DMZ ASA 5505 Getting Started Guide 78-18003-02...
PIX 501 security appliances in which devices behind the firewall can communicate internally and externally, you can keep the same deployment and replace the PIX 501 devices with ASA 5505 devices. ASA 5505 Getting Started Guide...
Internet. Figure 2-3 Private Network with DMZ Outside Network (Internet Connection) Internet Router Adaptive Security Appliance A SS r ETH co ns Web Server Printer Personal computers Email Server Private (Inside) Network ASA 5505 Getting Started Guide 78-18003-02...
ETH co ns Adaptive Security Appliance Personal computers running Cisco VPN Personal Client software computer For information about how to configure an IPsec remote-access VPN deployment, see Chapter 7, “Scenario: IPsec Remote-Access VPN Configuration.” ASA 5505 Getting Started Guide 78-18003-02...
“Scenario: Site-to-Site VPN Configuration.” Scenario 6: Easy VPN Hardware Client In this scenario, an ASA 5505 is deployed as a hardware client (sometimes called a remote device). Deploying one or more VPN hardware clients in conjunction with a VPN headend device enables companies with multiple sites to establish secure communications among them and share network resources.
Page 19
ASA 5500 series Cisco IOS router with IPSec support Central LAN For information about how to configure the ASA 5505 as a VPN hardware client, see Chapter 11, “Scenario: Easy VPN Hardware Client Configuration.” ASA 5505 Getting Started Guide 78-18003-02...
Where to Find Configuration Procedures Where to Find Configuration Procedures Each deployment scenario in this chapter has a corresponding configuration chapter in this document that describes how to configure the ASA 5505 for that type of deployment. To Configure the ASA 5505 For This Scenario..
• Understanding VLANs on the ASA 5505 After you have made a decision about how to deploy the ASA 5505 in your network, you must decide how many VLANs you need to support that deployment and how many ports to allocate to each VLAN.
VLAN connecting devices that you do not want to be able to communicate with each other. Before you can enable a switch port on the ASA 5505, it must be assigned to a VLAN. With the Base platform, each switch port can be assigned to only one VLAN at a time.
Your license determines how many active VLANs that you can have on the ASA 5505. Although the ASA 5505 comes preconfigured with two VLANs, you can create a as many as three VLANs, depending on your license. For example, you could create VLANs for the Inside, Outside, and DMZ network segments.
One active VLAN as a backup link to your ISP. The backup interface does not send or receive traffic unless the route through the primary interface fails. The ASA 5505 adaptive security appliance supports active and standby failover, Note but not Stateful Failover. Deployment Scenarios Using VLANs The number of VLANs you need depends on the complexity of the network into which you are installing the adaptive security appliance.
In this scenario, the Outside VLAN consists of a single ISP connection using an external WAN router. In Figure 3-1, the Inside VLAN uses four switch ports on the ASA 5505 and the Outside VLAN uses only one. Three switch ports are unused.
Page 26
PIX 501 security appliances in which devices behind the firewall can communicate internally and externally, you can keep the same deployment and replace the PIX 501 devices with ASA 5505 devices. If this same customer needed to have two Internet connections, the Outside VLAN could be allocated an additional port, as shown in Figure 3-2.
In this example, three physical switch ports are allocated to the Inside VLAN, two switch ports are allocated to the DMZ VLAN, and one switch port is allocated to the Outside VLAN. Two switch ports are left unused. ASA 5505 Getting Started Guide 78-18003-02...
VPN hardware client to support a teleworker. In Figure 3-4, an ASA 5505 is installed in a home office environment and used as a remote VPN hardware client. The ASA 5505 is configured for three VLANs: Inside (Work) VLAN that consists of all devices used to support access to the •...
Page 29
Game System DMZ (Home) VLAN In this example, the physical ports of the ASA 5505 are used as follows: The Inside (Work) VLAN consists of three physical switch ports, one of • which is a Power over Ethernet (PoE) switch port that is used for an IP phone.
Page 30
Chapter 3 Planning a VLAN Configuration What to Do Next ASA 5505 Getting Started Guide 3-10 78-18003-02...
C H A P T E R Installing the ASA 5505 This chapter describes how to install the ASA 5505 adaptive security appliance. This chapter includes the following sections: • Verifying the Package Contents, page 4-1 PoE Ports and Devices, page 4-3 •...
Page 32
Chapter 4 Installing the ASA 5505 Verifying the Package Contents Figure 4-1 Contents of ASA 5505 Package Se cu rit P O W E R Se rv ic es VD C C ar d Sl C O N SO PO W ER...
PoE Ports and Devices PoE Ports and Devices On the ASA 5505, switch ports Ethernet 0/6 and Ethernet 0/7 support PoE devices that are compliant with the IEEE 802.3af standard, such as IP phones and wireless access points. If you install a non-PoE device or do not connect to these switch ports, the adaptive security appliance does not supply power to the ports and the device must be powered on its own.
Connect one end of the Ethernet cable to an Ethernet port (ports 0 through 7) as Step 2 shown in Figure 4-2. (Typically Ethernet port 0 is used to connect to an Internet router.) ASA 5505 Getting Started Guide 78-18003-02...
Connect the other end of the Ethernet cable to a device, such as a router, desktop computer, or printer. Powering on the ASA 5505 To power on the ASA 5505, perform the following steps: Connect the power supply with the power cable. Step 1...
For more information about using ASDM for setup and configuration, see Chapter 5, “Configuring the Adaptive Security Appliance.” To set up a PC from which you can configure and manage the ASA 5505, perform the following steps: Make sure that the speed of the PC interface to be connected to one of the ASA Step 1 5505 inside ports is set to autonegotiate.
Connecting to the Console You can access the command line for administration using the console port on the ASA 5505. To do so, you must run a serial terminal emulator on a PC or workstation as shown in Figure 4-3.
1 stop bit. Installing a Cable Lock The ASA 5505 includes a slot that accepts standard desktop cable locks to provide physical security for small portable equipment, such as a laptop computer. The cable lock is not included.
Follow the directions from the manufacturer for attaching the other end of the Step 1 cable for securing the adaptive security appliance. Attach the cable lock to the lock slot on the back panel of the ASA 5505. Step 2 Ports and LEDs This section describes the front and rear panels of the ASA 5505.
Page 40
Chapter 4 Installing the ASA 5505 Ports and LEDs Figure 4-4 illustrates the front panel of the ASA 5505. Figure 4-4 ASA 5505 Front Panel LINK/ACT Power Status Active 100 MBPS Cisco ASA 5505 series Adaptive Security Appliance Port / LED...
Page 41
If the LINK/ACT LED does not light up, the link could be down if there is a duplex mismatch. You can fix the problem by changing the settings either on the ASA 5505 or on the other end. If auto-negotiation is disabled (it is enabled by default), you might be using the wrong type of cable.
Chapter 4 Installing the ASA 5505 Ports and LEDs Rear Panel Components Figure 4-5 illustrates the back panel of the ASA 5505. Figure 4-5 ASA 5505 Rear Panel Security Console Services Card Slot power RESET POWER over ETHERNET Port or LED...
0 through 5. If a PoE device is not attached, power is not supplied to the port and the device must be powered on its own. What to Do Next Continue with Chapter 5, “Configuring the Adaptive Security Appliance.” ASA 5505 Getting Started Guide 4-13 78-18003-02...
Page 44
Chapter 4 Installing the ASA 5505 What to Do Next ASA 5505 Getting Started Guide 4-14 78-18003-02...
What to Do Next, page 5-10 • About the Factory Default Configuration Cisco adaptive security appliances are shipped with a factory-default configuration that enables quick startup. The ASA 5505 comes preconfigured with the following: Two VLANs: VLAN 1 and VLAN2 •...
LAN-to-LAN connections in the CLI itself by using the vpnsetup ipsec-remote-access steps and vpnsetup site-to-site steps commands. For more information about these commands, see the Cisco Security Appliance Command Reference. For step-by-step configuration procedures for all functional areas of the adaptive security appliance, see the Cisco Security Appliance Command Line Configuration Guide.
In addition to complete configuration and management capability, ASDM features intelligent wizards to simplify and accelerate the deployment of the adaptive security appliance. This section includes the following topics: Preparing to Use ASDM, page 5-4 • ASA 5505 Getting Started Guide 78-18003-02...
Check the LINK LED on the MGMT interface. Step 3 When a connection is established, the LINK LED interface on the adaptive security appliance and the corresponding LINK LED on the switch or hub turn solid green. ASA 5505 Getting Started Guide 78-18003-02...
Launcher software so that ASDM runs locally on your PC, or by enabling Java and JavaScript in your web browser and accessing ASDM remotely from your PC. This procedure describes how to set up your system to run ASDM locally. ASA 5505 Getting Started Guide 78-18003-02...
Page 50
It is not necessary to save the installation software to your hard drive. When the InstallShield Wizard appears, follow the instructions to install the ASDM Launcher software. From your desktop, start the Cisco ASDM Launcher software. Step 2 A dialog box appears. ASA 5505 Getting Started Guide...
Page 51
Step 3 Enter the IP address or the host name of your adaptive security appliance. Leave the Username and Password fields blank. Step 4 By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Step 5 Click OK.
Using the Adaptive Security Device Manager for Configuration ASDM starts and the main window appears. Starting ASDM with a Web Browser To run ASDM in a web browser, enter the factory default IP address in the address field: https://192.168.1.1/admin/. ASA 5505 Getting Started Guide 78-18003-02...
ASDM. From the ASDM main page, click Configuration > Properties > ICMP Rules. Add an entry for the outside interface. Set the IP address to 0.0.0.0, the netmask to 0.0.0.0, and Action to deny. ASA 5505 Getting Started Guide 78-18003-02...
C H A P T E R Scenario: DMZ Configuration Cisco ASA 5505 DMZ configurations are possible only with the Security Plus Note license. A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside) network and a public (outside) network.
Web Server Printer Personal computers Email Server Private (Inside) Network Example DMZ Network Topology The chapter describes how to configure a DMZ deployment of the adaptive security appliance as shown in Figure 6-2. ASA 5505 Getting Started Guide 78-18003-02...
Page 57
Clients on the private network can access the web server in the DMZ and can • also communicate with devices on the Internet. Clients on the Internet are permitted HTTP access to the DMZ web server; all • other traffic coming from the Internet is denied. ASA 5505 Getting Started Guide 78-18003-02...
An Inside User Visits a Web Server on the Internet Figure 6-3 shows the traffic flow through the adaptive security appliance when an inside user requests an HTTP page from a web server on the Internet. ASA 5505 Getting Started Guide 78-18003-02...
Page 59
The adaptive security appliance receives the packet and, because it is a new session, verifies that the packet is allowed. The adaptive security appliance performs network address translation (NAT) to translate the local source address (192.168.1.2) to the public address of the outside interface (209.165.200.225). ASA 5505 Getting Started Guide 78-18003-02...
An Internet User Visits the DMZ Web Server Figure 6-4 shows the traffic flow through the adaptive security appliance when a user on the Internet requests a web page from the DMZ web server. ASA 5505 Getting Started Guide 78-18003-02...
Page 61
IP address of the adaptive security appliance (209.165.200.225, the IP address of the outside interface). The adaptive security appliance receives the packet and, because it is a new session, verifies that the packet is allowed. ASA 5505 Getting Started Guide 78-18003-02...
DMZ web server (209.165.200.225). The adaptive security appliance forwards the packet to the outside user. An Inside User Visits the DMZ Web Server Figure 6-5 shows an inside user accessing the DMZ web server. ASA 5505 Getting Started Guide 78-18003-02...
Page 63
DNS server, internal client requests for the DMZ web server are handled as follows: A lookup request is sent to the DNS server of the ISP. The public IP address of the DMZ web server is returned to the client. ASA 5505 Getting Started Guide 78-18003-02...
Information to Have Available, page 6-11 • Starting ASDM, page 6-12 • Enabling Inside Clients to Communicate with Devices on the Internet, • page 6-14 • Enabling Inside Clients to Communicate with the DMZ Web Server, page 6-15 ASA 5505 Getting Started Guide 6-10 78-18003-02...
Before you begin this configuration procedure, gather the following information: Internal IP address of the server inside the DMZ that you want to make • available to clients on the public network (in this scenario, a web server). ASA 5505 Getting Started Guide 6-11 78-18003-02...
If you prefer to access ASDM directly with a web browser or using Java, see Starting ASDM with a Web Browser, page 5-8. To start ASDM using the ASDM Launcher software, perform the following steps: From your desktop, start the Cisco ASDM Launcher software. Step 1 A dialog box appears.
Page 67
Chapter 6 Scenario: DMZ Configuration Configuring the Security Appliance for a DMZ Deployment By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Step 4 Click OK. If you receive a security warning containing a request to accept a certificate, click Step 5 Yes.
IP addresses of internal clients to the external address of the outside interface (that is, the public IP address of the adaptive security appliance). Outgoing traffic appears to come from this address. ASA 5505 Getting Started Guide 6-14 78-18003-02...
Scenario: DMZ Configuration Configuring the Security Appliance for a DMZ Deployment The ASA 5505 comes with a default configuration that includes the necessary address translation rule. Unless you want to change the IP address of the inside interface, you do not need to configure any settings to allow inside clients to access the Internet.
In the Firewall pane on the left side of the ASDM window, click NAT Rules. Step 3 Step 4 Click the green plus (+) icon and choose Add Static NAT Rule. The Add Static NAT Rule dialog box appears. ASA 5505 Getting Started Guide 6-16 78-18003-02...
Page 71
From the Interface drop-down list, choose the DMZ interface. In the IP Address field, enter the IP address of the internal client or network. In this scenario, the IP address of the network is 10.10.10.0. ASA 5505 Getting Started Guide 6-17 78-18003-02...
Page 72
Chapter 6 Scenario: DMZ Configuration Configuring the Security Appliance for a DMZ Deployment Click OK to add the Static NAT Rule and return to the Configuration > NAT pane. ASA 5505 Getting Started Guide 6-18 78-18003-02...
Page 73
Translating the Public Address of the Web Server to its Real Address To configure a NAT rule that translates the public IP address of the web server to its real IP address, perform the following steps: ASA 5505 Getting Started Guide 6-19 78-18003-02...
Page 74
Step 3 From the Interface drop-down list, choose Inside. Enter or choose from the IP Address drop-down list the real address of the DMZ web server. In this scenario, the IP address is 10.30.30.30. ASA 5505 Getting Started Guide 6-20 78-18003-02...
IP address, which allows outside HTTP clients to access the web server without being aware of the adaptive security appliance. In this scenario the DMZ web server shares a public IP address with the outside interface of the adaptive security appliance (209.165.200.225). ASA 5505 Getting Started Guide 6-21 78-18003-02...
In the Translated area, specify the public IP address to be used for the web server: From the Interface drop-down list, choose Outside. Click the Interface IP radio button. This is the IP address for the specified interface, in this case, the outside interface. ASA 5505 Getting Started Guide 6-22 78-18003-02...
Page 77
To configure Port Address Translation, perform the following steps: Check the Enable Port Address Translation check box. Click the TCP Protocol radio button. In the Original Port field, enter 80. In the Translated Port field, enter 80. ASA 5505 Getting Started Guide 6-23 78-18003-02...
Page 78
Confirm that the rule was created the way you expected. The displayed Step 5 configuration should be similar to the following: Click Apply to complete the adaptive security appliance configuration changes. Step 6 ASA 5505 Getting Started Guide 6-24 78-18003-02...
Click More Options. If you want the Access Control rule to be enabled immediately, check the Enable Rule check box. Next to Traffic Direction, click In. In the Source Service field, enter tcp/http. ASA 5505 Getting Started Guide 6-25 78-18003-02...
Page 80
At this point, the entries in the Add Access Rule dialog box should be similar to the following: Click OK to return to the Security Policy > Access Rules pane. The displayed configuration should be similar to the following. ASA 5505 Getting Started Guide 6-26 78-18003-02...
Page 81
DMZ web server, while keeping the private network secure. If you want the configuration changes to be saved to the startup configuration so Step 3 that they are applied the next time the device starts, from the File menu, click Save. ASA 5505 Getting Started Guide 6-27 78-18003-02...
To Do This... See... Configure a remote-access VPN Chapter 7, “Scenario: IPsec Remote-Access VPN Configuration” Configure an SSL VPN for Cisco Chapter 8, “Scenario: Configuring AnyConnect software clients Connections for a Cisco AnyConnect VPN Client” ASA 5505 Getting Started Guide...
Page 83
Scenario: DMZ Configuration What to Do Next To Do This... See... Configure a browser-based SSL VPN Chapter 9, “Scenario: SSL VPN Clientless Connections” Configure a site-to-site VPN Chapter 10, “Scenario: Site-to-Site VPN Configuration” ASA 5505 Getting Started Guide 6-29 78-18003-02...
Page 84
Chapter 6 Scenario: DMZ Configuration What to Do Next ASA 5505 Getting Started Guide 6-30 78-18003-02...
Example IPsec Remote-Access VPN Network Topology Figure 7-1 shows an adaptive security appliance configured to accept requests from and establish IPsec connections with VPN clients, such as a Cisco Easy VPN software or hardware clients, over the Internet. ASA 5505 Getting Started Guide...
Information to Have Available, page 7-3 • Starting ASDM, page 7-3 • Configuring the ASA 5505 for an IPsec Remote-Access VPN, page 7-5 • Selecting VPN Client Types, page 7-7 • Specifying the VPN Tunnel Group Name and Authentication Method, •...
Starting ASDM This section describes how to start ASDM using the ASDM Launcher software. If you have not installed the ASDM Launcher software, see Installing the ASDM Launcher, page 5-5. ASA 5505 Getting Started Guide 78-18003-02...
Page 88
Enter the IP address or the host name of your adaptive security appliance. Step 2 Leave the Username and Password fields blank. Step 3 By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Click OK.
Chapter 7 Scenario: IPsec Remote-Access VPN Configuration Implementing the IPsec Remote-Access VPN Scenario Configuring the ASA 5505 for an IPsec Remote-Access VPN To begin the process for configuring a remote-access VPN, perform the following steps: In the main ASDM window, choose IPsec VPN Wizard from the Wizards Step 1 drop-down menu.
Page 90
In Step 1 of the VPN Wizard, perform the following steps: Step 2 Click the Remote Access radio button. From the drop-down list, choose Outside as the enabled interface for the incoming VPN tunnels. Click Next to continue. ASA 5505 Getting Started Guide 78-18003-02...
Specify the type of VPN client that will enable remote users to connect to this Step 1 adaptive security appliance. For this scenario, click the Cisco VPN Client radio button. You can also use any other Cisco Easy VPN remote product.
To use a static preshared key for authentication, click the Pre-Shared Key • radio button and enter a preshared key (for example, “Cisco”). This key is used for IPsec negotiations between the adaptive security appliances. To use digital certificates for authentication, click the Certificate radio •...
Chapter 7 Scenario: IPsec Remote-Access VPN Configuration Implementing the IPsec Remote-Access VPN Scenario Enter a Tunnel Group Name (such as “Cisco”) for the set of users that use Step 2 common connection parameters and client attributes to connect to this adaptive security appliance.
Page 94
Click the Authenticate Using an AAA Server Group radio button. Choose a preconfigured server group from the Authenticate using an AAA server group drop-down list, or click New to add a new AAA server group. Click Next to continue. Step 3 ASA 5505 Getting Started Guide 7-10 78-18003-02...
In Step 5 of the VPN Wizard, perform the following steps: To add a new user, enter a username and password, and then click Add. Step 1 When you have finished adding new users, click Next to continue. Step 2 ASA 5505 Getting Started Guide 7-11 78-18003-02...
Enter a pool name or choose a preconfigured pool from the Pool Name drop-down Step 1 list. Alternatively, click New to create a new address pool. The Add IP Pool dialog box appears. ASA 5505 Getting Started Guide 7-12 78-18003-02...
Easy VPN hardware client when a connection is established. Make sure that you specify the correct values, or remote clients will not be able to use DNS names for resolution or use Windows networking. ASA 5505 Getting Started Guide 7-13 78-18003-02...
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy; it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default values are sufficient to establish secure VPN tunnels. ASA 5505 Getting Started Guide 7-14 78-18003-02...
Page 99
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following steps: Choose the Encryption (DES/3DES/AES), authentication algorithms Step 1 (MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive security appliance during an IKE security association. Click Next to continue. Step 2 ASA 5505 Getting Started Guide 7-15 78-18003-02...
Configuring IPsec Encryption and Authentication Parameters In Step 9 of the VPN Wizard, perform the following steps: Click the Encryption algorithm (DES/3DES/AES) and authentication algorithm Step 1 (MD5/SHA). Click Next to continue. Step 2 ASA 5505 Getting Started Guide 7-16 78-18003-02...
Specify hosts, groups, and networks that should be in the list of internal resources Step 1 made accessible to authenticated remote users. To add or remove hosts, groups, and networks dynamically from the Selected Hosts/Networks area, click Add or Delete, respectively. ASA 5505 Getting Started Guide 7-17 78-18003-02...
Click Next to continue. Step 2 Verifying the Remote-Access VPN Configuration In Step 11 of the VPN Wizard, review the configuration attributes for the new VPN tunnel. The displayed configuration should be similar to the following: ASA 5505 Getting Started Guide 7-18 78-18003-02...
To establish end-to-end, encrypted VPN tunnels for secure connectivity for mobile employees or teleworkers, obtain the Cisco VPN client software. For more information about the Cisco Systems VPN client, see the following URL: http://www.cisco.com/en/US/products/sw/secursw/ps2308/index.html. If you are deploying the adaptive security appliance solely in a remote-access VPN environment, you have completed the initial configuration.
Page 104
See... Configure the adaptive security Chapter 6, “Scenario: DMZ appliance to protect a web server in a Configuration” Configure an SSL VPN for the Cisco Chapter 8, “Scenario: Configuring AnyConnect software client Connections for a Cisco AnyConnect VPN Client” Configure a clientless (browser-based) Chapter 9, “Scenario: SSL VPN...
Instead, remote users enter the IP address or DNS name of a Cisco SSL VPN interface in their browser. The browser connects to that interface and displays the SSL VPN login screen. If the...
The adaptive security appliance obtains the AnyConnect VPN Client software from the Cisco website. This chapter provides instructions for configuring the SSL VPN using a configuration Wizard. You can download the Cisco SSL VPN software during the configuration process. Users can download the AnyConnect VPN Client from the adaptive security appliance, or it can be installed manually on the remote PC by the system administrator.
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Example Topology Using AnyConnect SSL VPN Clients Example Topology Using AnyConnect SSL VPN Clients Figure 8-1 shows an adaptive security appliance configured to accept requests for and establish SSL connections from clients running the AnyConnect SSL VPN software.
Enter the IP address or the host name of your adaptive security appliance. Step 2 Leave the Username and Password fields blank. Step 3 By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Click OK.
Page 110
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario The ASA checks to see if there is updated software and if so, downloads it automatically. The main ASDM window appears. ASA 5505 Getting Started Guide...
Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario Configuring the ASA 5505 for the Cisco AnyConnect VPN Client To begin the configuration process, perform the following steps: In the main ASDM window, choose SSL VPN Wizard from the Wizards Step 1 drop-down menu.
Step 3 remote user to authenticate the ASA. Note The ASA 5505 generates a self-signed certificate by default. However, for enhanced security you may want to purchase a publicly trusted SSL VPN certificate before putting the system in a production environment.
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario Click Next to continue. Step 4 Specifying a User Authentication Method In Step 3 of the SSL VPN Wizard, perform the following steps:...
Page 114
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario Specify a AAA Server Group Name. You can either choose an existing AAA server group name from the drop down list, or you can create a new server group by clicking New.
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario If you have chosen to authenticate users with the local user database, you can Step 2 create new user accounts here. You can also add users later using the ASDM configuration interface.
VPN client connections, so click Next again. Configuring the Cisco AnyConnect VPN Client For remote clients to gain access to your network with a Cisco VPN Client, you must configure a pool of IP addresses that can be assigned to remote VPN clients as they are successfully connected.
Page 117
Specify the location of the AnyConnect VPN Client software image. Step 3 To obtain the most current version of the software, click Download Latest AnyConnect VPN Client from cisco.com. This downloads the client software to your PC. Click Next to continue.
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client Implementing the Cisco SSL VPN Scenario Verifying the Remote-Access VPN Configuration In Step 7 of the SSL VPN Wizard, review the configuration settings to ensure that they are correct. The displayed configuration should be similar to the following: If you are satisfied with the configuration, click Finish to apply the changes to the adaptive security appliance.
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client What to Do Next What to Do Next If you are deploying the adaptive security appliance solely to support AnyConnect VPN connections, you have completed the initial configuration. In addition, you may want to consider performing some of the following steps: To Do This...
Page 120
Chapter 8 Scenario: Configuring Connections for a Cisco AnyConnect VPN Client What to Do Next ASA 5505 Getting Started Guide 8-16 78-18003-02...
SSL-enabled web-server presents before communicating with it. To minimize the risks involved with SSL certificates: Configure a group policy that consists of all users who need Clientless SSL VPN access and enable it only for that group policy. ASA 5505 Getting Started Guide 78-18003-02...
PAT, permitting multiple outbound sessions appear to originate from a single • IP address. Example Network with Browser-Based SSL VPN Access Figure 9-1 shows an adaptive security appliance configured to accept SSL VPN connection requests over the Internet using a web browser. ASA 5505 Getting Started Guide 78-18003-02...
This section includes the following topics: Information to Have Available, page 9-5 • Starting ASDM, page 9-5 • Configuring the ASA 5505 for Browser-Based SSL VPN Connections, • page 9-7 Specifying the SSL VPN Interface, page 9-8 • Specifying a User Authentication Method, page 9-10 •...
Portal Page is displayed. Digital certificate • The ASA 5505 generates a self-signed certificate by default. For improved security and to eliminate browser warning messages, you may want to purchase a publicly trusted SSL VPN certificate before putting the system in a production environment.
Page 126
Enter the IP address or the host name of your adaptive security appliance. Step 2 Leave the Username and Password fields blank. Step 3 By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Click OK.
Chapter 9 Scenario: SSL VPN Clientless Connections Implementing the Clientless SSL VPN Scenario Configuring the ASA 5505 for Browser-Based SSL VPN Connections To begin the process for configuring a browser-based SSL VPN, perform the following steps: In the main ASDM window, choose SSL VPN Wizard from the Wizards Step 1 drop-down menu.
Check the Browser-based SSL VPN (Web VPN) check box. Click Next to continue. Specifying the SSL VPN Interface In Step 2 of the SSL VPN Wizard, perform the following steps: Specify a Connection Name to which remote users connect. Step 1 ASA 5505 Getting Started Guide 78-18003-02...
Page 129
From the Certificate drop-down list, choose the certificate the ASA sends to the Step 3 remote user to authenticate the ASA. The ASA 5505 generates a self-signed certificate by default. For improved Note security and to eliminate browser warning messages, you may want to purchase a publicly trusted SSL VPN certificate before putting the system in a production environment.
New to add a new AAA server group. To create a new AAA Server Group, click New. The New Authentication Server Group dialog box appears. In this dialog box, specify the following: ASA 5505 Getting Started Guide 9-10 78-18003-02...
Step 1 Click the Create new group policy radio button and specify a group name. Click the Modify an existing group policy radio button and choose a group from the drop-down list. ASA 5505 Getting Started Guide 9-11 78-18003-02...
In Step 5 of the SSL VPN Wizard, specify URLs to appear on the VPN portal page by performing the following steps: To specify an existing bookmark list, choose the Bookmark List name from the Step 1 drop-down list. ASA 5505 Getting Started Guide 9-12 78-18003-02...
Page 133
Chapter 9 Scenario: SSL VPN Clientless Connections Implementing the Clientless SSL VPN Scenario To add a new list or edit an existing list, click Manage. The Configure GUI Customization Objects dialog box appears. ASA 5505 Getting Started Guide 9-13 78-18003-02...
Page 134
Implementing the Clientless SSL VPN Scenario To create a new bookmark list, click Add. Step 2 To edit an existing bookmark list, choose the list and click Edit. The Add Bookmark List dialog box appears. ASA 5505 Getting Started Guide 9-14 78-18003-02...
Page 135
From the URL Value drop-down list, choose the type of URL you are specifying. Step 6 For example, choose http, https, ftp, and so on. Then, specify the complete URL for the page. Click OK to return to the Add Bookmark List dialog box. Step 7 ASA 5505 Getting Started Guide 9-15 78-18003-02...
Click Next to continue. Step 11 Verifying the Configuration In Step 7 of the SSL VPN Wizard, review the configuration settings to ensure that they are correct. The displayed configuration should be similar to the following: ASA 5505 Getting Started Guide 9-16 78-18003-02...
Page 137
Save. Alternatively, ASDM prompts you to save the configuration changes permanently when you exit ASDM. If you do not save the configuration changes, the old configuration takes effect the next time the device starts. ASA 5505 Getting Started Guide 9-17 78-18003-02...
Configuring the Other Side of the VPN Connection, page 10-14 • What to Do Next, page 10-14 • Example Site-to-Site VPN Network Topology Figure 10-1 shows an example VPN tunnel between two adaptive security appliances. ASA 5505 Getting Started Guide 10-1 78-18003-02...
VPN deployment, using example parameters from the remote-access scenario shown in Figure 10-1. This section includes the following topics: Information to Have Available, page 10-3 • • Configuring the Site-to-Site VPN, page 10-3 ASA 5505 Getting Started Guide 10-2 78-18003-02...
If you prefer to access ASDM directly with a web browser or using Java, see Starting ASDM with a Web Browser, page 5-8. To start ASDM using the ASDM Launcher software, perform the following steps: ASA 5505 Getting Started Guide 10-3 78-18003-02...
Page 142
Enter the IP address or the host name of your adaptive security appliance. Step 2 Leave the Username and Password fields blank. Step 3 By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Click OK.
Page 143
Configuring the Security Appliance at the Local Site The adaptive security appliance at the first site is referred to as Security Note Appliance 1 in this scenario. To configure the Security Appliance 1, perform the following steps: ASA 5505 Getting Started Guide 10-5 78-18003-02...
Page 144
VPN concentrators, or other devices that support site-to-site IPsec connectivity. From the VPN tunnel Interface drop-down list, choose Outside as the enabled interface for the current VPN tunnel. ASA 5505 Getting Started Guide 10-6 78-18003-02...
Page 145
To use a static preshared key for authentication, click the Pre-Shared Key • radio button and enter a preshared key (for example, “Cisco”). This key is used for IPsec negotiations between the adaptive security appliances. When using preshared key authentication, the Tunnel Group Name Note must be the IP address of the peer.
Page 146
In Step 3 of the VPN Wizard, perform the following steps: Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), Step 1 and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance during an IKE security association. ASA 5505 Getting Started Guide 10-8 78-18003-02...
Page 147
When configuring Security Appliance 2, enter the exact values for each of the options that you chose for Security Appliance 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow down the process. Click Next to continue. Step 2 ASA 5505 Getting Started Guide 10-9 78-18003-02...
Page 148
In Step 4 of the VPN Wizard, perform the following steps: Choose the encryption algorithm (DES/3DES/AES) from the Encryption Step 1 drop-down list, and the authentication algorithm (MD5/SHA) from the Authentication drop-down list. Click Next to continue. Step 2 ASA 5505 Getting Started Guide 10-10 78-18003-02...
Page 149
(...) button to select from a list of hosts and networks. Enter the IP address of remote networks to be protected or not protected, or click Step 3 the ellipsis (...) button to select from a list of hosts and networks. ASA 5505 Getting Started Guide 10-11 78-18003-02...
Page 150
Implementing the Site-to-Site Scenario Click Next to continue. Step 4 Viewing VPN Attributes and Completing the Wizard In Step 6 of the VPN Wizard, review the configuration list for the VPN tunnel you just created. ASA 5505 Getting Started Guide 10-12 78-18003-02...
Page 151
Alternatively, ASDM prompts you to save the configuration changes permanently when you exit ASDM. If you do not save the configuration changes, the old configuration takes effect the next time the device starts. This concludes the configuration process for Security Appliance 1. ASA 5505 Getting Started Guide 10-13 78-18003-02...
Refine configuration and configure Cisco Security Appliance Command optional and advanced features Line Configuration Guide Learn about daily operations Cisco Security Appliance Command Reference Cisco Security Appliance Logging Configuration and System Log Messages ASA 5505 Getting Started Guide 10-14 78-18003-02...
Page 153
Remote-Access VPN Configuration” Configure a clientless (browser-based) Chapter 9, “Scenario: SSL VPN SSL VPN Clientless Connections” Configure an SSL VPN for the Cisco Chapter 8, “Scenario: Configuring AnyConnect software client Connections for a Cisco AnyConnect VPN Client” ASA 5505 Getting Started Guide...
Page 154
Chapter 10 Scenario: Site-to-Site VPN Configuration What to Do Next ASA 5505 Getting Started Guide 10-16 78-18003-02...
Easy VPN server at the main site and Easy VPN hardware clients at the remote offices. The Cisco ASA 5505 can function as a Cisco Easy VPN hardware client or as a Cisco Easy VPN server (sometimes called a “headend device”), but not both at the same time.
Cisco VPN 30xx, or Cisco IOS 12.2(8)T) When used as an Easy VPN hardware client, the ASA 5505 can also be configured to perform basic firewall services, such as protecting devices in a DMZ from from unauthorized access. However, if the ASA 5505 is configured to function as an Easy VPN hardware client, it cannot establish other types of tunnels.
Page 157
Easy VPN hardware client using the CLI, you must specify a mode. Figure 11-2 shows a sample network topology with the ASA 5505 running in Easy VPN Client Mode. When configured in Client Mode, devices on the inside interface of the ASA 5505 cannot be accessed by devices behind the Easy VPN server.
Page 158
LAN from remote LAN When configured in Easy VPN Network Extension Mode, the ASA 5505 does not hide the IP addresses of local hosts by substituting a public IP address. Therefore, hosts on the other side of the VPN connection can communicate directly with hosts on the local network.
Configuring the Easy VPN Hardware Client The Easy VPN server controls the security policies enforced on the ASA 5505 Easy VPN hardware client. However, to establish the initial connection to the Easy VPN server, you must complete some configuration locally.
Launcher, page 5-5. If you prefer to access ASDM directly with a web browser or using Java, see Starting ASDM with a Web Browser, page 5-8. To start ASDM, perform the following steps: From your desktop, double-click the Cisco ASDM Launcher icon. The ASDM Step 1 Launcher dialog box appears.
Page 161
Chapter 11 Scenario: Easy VPN Hardware Client Configuration Configuring the Easy VPN Hardware Client By default, there is no Username and Password set for the Cisco ASDM Note Launcher. Step 4 Click OK. Click Yes to accept the certificates. Step 5 The ASA checks to see if there is updated software and if so, downloads it automatically.
Scenario: Easy VPN Hardware Client Configuration Configuring the Easy VPN Hardware Client Configuring the Hardware Client To configure the ASA 5505 as an Easy VPN hardware client, perform the following steps: In the ASDM window, click the Configuration tool. Step 1...
Page 164
Pre shared key radio button and enter a Group Name and Group Password. In the User Settings area, specify the User Name and User Password to be used Step 6 by the ASA 5505 when establishing a VPN connection. ASA 5505 Getting Started Guide 11-10 78-18003-02...
Page 165
Easy VPN connection through the tunnel. The public address of the ASA 5505 is not accessible when behind the Note NAT device unless you add static NAT mappings on the NAT device.
Page 166
Refine configuration and configure Cisco Security Appliance Command optional and advanced features Line Configuration Guide Learn about daily operations Cisco Security Appliance Command Reference Cisco Security Appliance Logging Configuration and System Log Messages ASA 5505 Getting Started Guide 11-12 78-18003-02...
Page 167
(SSH, ASDM, and so on), site-to-site VPN, and remote access VPN. You need an encryption license key to enable this license. If you are a registered user of Cisco.com and would like to obtain a 3DES/AES encryption license, go to the following website: http://www.cisco.com/go/license...
Page 168
Step 4 Exits global configuration mode. hostname(config)# exit Step 5 Saves the configuration. hostname# copy running-config startup-config Step 6 Reboots the adaptive security appliance and hostname# reload reloads the configuration. ASA 5505 Getting Started Guide 78-18003-02...