Cisco ASA5505 quick setup guide

Print Friendly, PDF & Email

Notes I took while initially setting up a Cisco ASA 5505 for my house.’, ‘As this was a used device, I needed to start by resetting the password. I then dumped the current configs, just to take a look, and then reset to a factory config. I\’m hoping to do everything from the CLI so that I don\’t have to play with java and the GUI as well as trying to keep the configs as clean as possible.

So let\’s get started!

– Connect your console cable
– Power cycle the unit
– Press ESC during boot up when prompted

rommon #0> confreg 0x41
rommon #1> boot
ciscoasa> en
Password: (press enter, password is blank)
ciscoasa# copy start run
Destination filename [running-config]? (Just press enter)

This will load the current configs, at which case you can do:

ciscoasa# show run

and it will show the current configs if you want to “learn” from the previous owner.

ciscoasa# conf t
ciscoasa(config)# enable password blah (blah is whatever you want the password to be)
ciscoasa(config)# config-register 0x01
ciscoasa(config)# exit
ciscoasa# wr
ciscoasa# reload
Proceed with reload? [confirm] (Just press enter)

Now, to reset the config to factory defaults so you can start fresh. log in using the password you set above and \’enable\’.

ciscoasa# conf t
ciscoasa(config)# config factory-default
ciscoasa(config)# exit
ciscoasa# wr
ciscoasa# reload
Proceed with reload? [confirm] (Just press enter)

There you go, a fresh Cisco ASA 5505 waiting to be configured from scratch…

So, here is what we have:

VLAN1 = inside and is set to 192.168.1.1/24
VLAN2 = outside and is set to DHCP

Port 0 is on VLAN2

DHCP is enabled and handing out IPs from 192.168.1.2-192.168.1.33 on the “inside” network.

First, I want to change the default IP and DHCP range.

ciscoasa# conf t
ciscoasa(config)# no dhcpd address 192.168.1.2-192.168.1.33 inside
ciscoasa(config)# no dhcpd enable inside
ciscoasa(config)# no http server enable
ciscoasa(config)# no http 192.168.1.0 255.255.255.0 inside
ciscoasa(config)# int vlan 1
ciscoasa(config-if)# ip address 10.10.10.1 255.255.255.0
ciscoasa(config-if)# exit
ciscoasa(config)# dhcpd address 10.10.10.100-10.10.10.131 inside
ciscoasa(config)# dhcpd enable inside
ciscoasa(config)# http 10.10.10.0 255.255.255.0 inside
ciscoasa(config)# http server enable

Now, to open some pinholes (or port forward) through the firewall. In this example, SSH on port 22.

ciscoasa(config)# access-list outside_access_in extended permit tcp any interface outside eq 22
static (inside,outside) tcp interface 22 10.10.10.55 22 netmask 255.255.255.255
access-group outside_access_in in interface outside

Allow ssh access to the asa5505 on the inside.

ciscoasa(config)# username xxxx password xxxx
ciscoasa(config)# ssh 10.10.10.1 255.255.255.255 inside
ciscoasa(config)# crypto key generate rsa modulus 1024
ciscoasa(config)# aaa authentication ssh console LOCAL

Allow pings to the outside interface:

ciscoasa(config)# access-list outside_access_in permit icmp any interface outside

**** IN PROGRESS ****

Comments are closed.