Part 1 Basics: Cisco ASA Commands
Part 1 Basics: Cisco ASA Commands
What is Cisco ASA Firewall?
Cisco ASA is a security device that includes a firewall, antivirus, intrusion prevention, and a virtual private network (VPN). It enables proactive threat defence, preventing assaults from spreading throughout the network.
Fig 1.1- Cisco ASA Firewalls |
How to check the show version command ?
Here is the command
Securedna-ASA# show version
Display the ASA file system using the show file system command ?
Securedna-ASA# show file system
Display the contents of flash memory using one of these commands: show flash, show disk0, dir flash:or dir disk0
Securedna-ASA# show flash
You can restore the ASA to its factory default settings by using the configure factory-default command
Securedna-ASA# conf t
Securedna-ASA(config)# configure factory-default
Use the write erase command to remove the startup-config file from flash memory.
Securedna-ASA# write erase
Securedna-ASA# show start
Securedna-ASA# reload
Configure the hostname and domain name
Securedna-ASA-Init# config t
Securedna-ASA-Init(config)# hostname Securedna-ASA
Securedna-ASA(config)# domain-name thesecuredna.com
Configure the login and enable mode passwords.
Securedna-ASA(config)# passwd cisco
Securedna-ASA(config)# enable password class
Set Date and time
Securedna-ASA(config)# clock set 10:19:00 November 12 2021
Configure the inside and outside interfaces.
Securedna-ASA(config)# interface gi1/2
Securedna-ASA(config-if)# nameif inside
Securedna-ASA(config-if)# ip address 10.10.10.1 255.255.255.0
Securedna-ASA(config-if)# security-level 100
Securedna-ASA(config-if)# no shutdown
Securedna-ASA(config-if)# interface G1/1
Securedna-ASA(config-if)# nameif outside
INFO: Security level for "outside" set to 0 by default.
Securedna-ASA(config-if)# ip address 112.23.16.11 255.255.255.248
Securedna-ASA(config-if)# no shutdown
Configure ASDM access to the ASA
You can configure the ASA to accept HTTPS connections using the http command. This allows access to the ASA GUI (ASDM). Configure the ASA to allow HTTPS connections from any host on the inside network (10.10.10.0/24).
Securedna-ASA(config)# http server enable
Securedna-ASA(config)# http 10.10.10.0 255.255.255.0 inside
No comments
Note: only a member of this blog may post a comment.