

Ssh 192.168.10.100 255.255.255.255 insideĪfter performing these steps you should be able to access the firewall through the SSH protocol from the workstation with IP 192.168.10.100. You can specify multiple IP addresses or entire networks to be designated as management. Specify the IP address of the administrator workstation, from which to allow remote access via SSH and the interface for accepting remote access requests ( inside). Specify the authentication method and generate the RSA keys:
Config cisco asa 5505 password#
Username admin password YYYYY privilege 15 Enter your desired password instead of “ YYYYY” for the user admin:

Enter your desired password instead of “ XXXXX”:Ĭreate an administrator account. In order to configure remote access for administration of your device through SSH protocol, you need to do the following:Ĭreate a password for privileged mode ( #). When you configure any other VLAN tag, except the default one, you will see the line in the running configuration.Ĭonfigure your internal inside interface to use physical port Ethernet 0/1: The reason for this is that VLAN 1 is configured for each physical interface by default. Notice that the line with “ switchport access vlan 1” command will not be displayed in the running configuration output (the one shown with the “ show run” command). Here is how you tie together the outside interface and port Ethernet0/0: The internal interface, inside, should be configured for the LAN:Īt this point you have to attach your virtual VLAN interfaces to real Ethernet ports. Configure it with the IP address and subnet mask provided by your ISP: The outside interface will communicate with the Internet. In order to give your device a hostname and make it easier and more convenient to administer later, use the command “ hostname ”Īt the very minimum, you need to configure two interfaces on your firewall: the outside and the inside. The command “ clear configure all” executed on the firewall leaves only the service lines from factory configuration and you can immediately begin to configure your device afresh. Unlike with Cisco routers, you don’t have to reload the device in order to erase its configuration. To do this, connect using a console cable to the console port of the device, enter the CLI and type:Īfter this confirm the deletion of all configuration files. Lets completely erase the startup configuration of the device. If your new device with factory settings is asking for a password to enter the privileged mode (#) enable, just hit “Enter”. (Should be done only on new or test lab equipment, since it completely erases all existing configuration) Our task: allow the internal LAN hosts to access the Internet through the firewall.
Config cisco asa 5505 how to#
Let’s look over an example of how to connect an office LAN to the Internet with using a Cisco ASA firewall.
