About the ASA
About the ASA
The ASA provides advanced stateful firewall and VPN concentrator functionality in one device.
You can manage the ASA using one of the following managers:
• ASDM (Covered in this guide)—A single device manager included on the device.
• CLI
• Cisco Security Manager—A multi-device manager on a separate server.
You can also access the FXOS CLI for troubleshooting purposes.
Unsupported Features
The following ASA features are not supported on the Firepower 1100:
• Redundant interfaces
• Clustering
• ASA REST API
• ASA FirePOWER module
• Botnet Traffic Filter
• The following inspections:
Migrating an ASA 5500-X Configuration
You can copy and paste an ASA 5500-X configuration into the Firepower 1100. However, you will need to
modify your configuration. Also note some behavioral differences between the platforms.
1. To copy the configuration, enter the more system:running-config command on the ASA 5500-X.
2. Edit the configuration as necessary (see below).
3. Connect to the console port of the Firepower 1100, and enter global configuration mode:
ciscoasa> enable
Password:
The enable password is not set. Please set it now.
Enter Password: ******
Repeat Password: ******
ciscoasa# configure terminal
ciscoasa(config)#
Cisco Firepower 1100 Getting Started Guide
154
• SCTP inspection maps (SCTP stateful inspection using ACLs is supported)
• Diameter
• GTP/GPRS
ASA Deployment with ASDM