Step 4 - Auto Update Server; Step 5 - Management Ip Address Configuration; Step 6 - Interface Selection - Cisco ASA 5505 Configuration Manual

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Startup Wizard Screens for the ASA 5505 Adaptive Security Appliance

Step 4 - Auto Update Server

To enable communication between the adaptive security appliance and an Auto Update Server, check the
Step 1
Enable Auto Update for ASA check box.
To define the beginning of the URL for the Auto Update Server, from the Server URL drop-down list,
Step 2
choose either HTTPS or HTTP.
Step 3
To confirm that an SSL certificate is enabled on the Auto Update Server, check the Verify Server SSL
certificate check box.
Step 4
Enter the username to log in to the Auto Update Server.
Step 5
Enter the password to log in to the Auto Update Server.
Step 6
Reenter the password to confirm it.
To uniquely identify the security appliance, choose the Device ID Type from the drop-down list. To
Step 7
enable the Device ID field and specify a particular name, choose User-defined name.
Step 8
Enter a unique string to use as the security appliance ID.
Step 9
(For IPS only) To enable signature and engine updates from Cisco.com, check the Enable Signature
and Engine Updates from Cisco.com check box.
Step 10
(For IPS only) Enter your Cisco.com username and password, and then confirm the password.
Step 11
(For IPS only) Enter the start time in hh:mm:ss format, using a 24-hour clock.
Step 12
Click Next to continue.

Step 5 - Management IP Address Configuration

Specify the IP address of the host that can access this context for management purposes using ASDM or
Step 1
a session protocol.
Specify the subnet mask for the management IP address.
Step 2
Click Next to continue.
Step 3

Step 6 - Interface Selection

This screen allows you to group the eight, Fast Ethernet switch ports on the ASA 5505 into three VLANs.
These VLANs function as separate, Layer 3 networks. You can then choose or create the VLANs that
define your network—one for each interface: outside (Internet), inside (Business), or DMZ (Home). A
DMZ is a separate network located in the neutral zone between a private (inside) network and a public
(outside) network.
To create three VLANs to define your network, perform the following steps:
In the Outside VLAN or Internet VLAN area, do the following:
Step 1
a.
Cisco ASA 5500 Series Configuration Guide using ASDM
7-6
From the Choose a VLAN drop-down list, choose a predefined outside VLAN by number.
Chapter 7
Using the Startup Wizard
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents