Download Print this page

Cisco ASA 5580 Quick Start Manual

Hide thumbs


Cisco ASA 5580
Verifying the Package Contents
Powering On the ASA
Maximizing Throughput
Connecting Interface Cables and Verifying Connectivity
Launching ASDM
Running the Startup Wizard
(Optional) Allowing Access to Public Servers Behind the ASA
(Optional) Running VPN Wizards
(Optional) Running Other Wizards in ASDM
Advanced Configuration
Regulatory Compliance and Safety Information
Read the safety warnings in the Regulatory Compliance and Safety Information (RCSI),
and follow proper safety procedures when performing the steps in this guide. See
for links to the RCSI and other documents.



  Related Manuals for Cisco ASA 5580

  Summary of Contents for Cisco ASA 5580

  • Page 1 UICK TART UIDE Cisco ASA 5580 Verifying the Package Contents Powering On the ASA Maximizing Throughput Connecting Interface Cables and Verifying Connectivity Launching ASDM Running the Startup Wizard (Optional) Allowing Access to Public Servers Behind the ASA (Optional) Running VPN Wizards...
  • Page 2: Verifying The Package Contents

    ASA. Cis co ASA 558 0 SER Ada ptiv e Sec urit y App lian ASA 5580 Chassis 2 Yellow Ethernet Cables Power Cable (US Shown) Blue Console Cable PC Terminal Adapter RJ-45 to DB-9 Adapter Documentation and Software CD...
  • Page 3: Powering On The Asa

    Powering On the ASA Attach the power cable to the back of the ASA. If you have redundant power supplies, you Step 1 must connect both power cables to the back of the chassis. P C I- E x P C I- X 1 0 0 M H z P S 1 R es er ve...
  • Page 4: Maximizing Throughput

    Steps a and b achieve both best practices above. If you cannot achieve both practices, then you should prefer the first best practice: have equal amounts of traffic on both I/O bridges. See the Hardware Installation Guide for more information about maximizing throughput on the ASA 5580.
  • Page 5: Connecting Interface Cables And Verifying Connectivity

    Step 2 Connect your networks to the appropriate ports. The ASA 5580 has nine expansion slots. Slots 3 through 8 support PCI Express network interface adapters. Slots 1, 2, and 9 are reserved. Your exact configuration depends on the configuration you purchased.
  • Page 6: Launching Asdm

    ASA from any location by using a web browser. See the ASDM release notes on for the requirements to run ASDM. On the PC connected to the ASA, launch a web browser.
  • Page 7: Running The Startup Wizard

    Running the Startup Wizard Run the Startup Wizard to modify the default configuration so that you can customize the security policy to suit your deployment. Using the startup wizard, you can set the following: • Hostname • Static routes • Domain name •...
  • Page 8 (Optional) Allowing Access to Public Servers Behind the ASA 8.2 and Later The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet. As a business owner, you might have internal network services, such as a web and FTP server, that need to be available to an outside user.
  • Page 9: (Optional) Running Vpn Wizards

    The network administrator provides access to resources by users on a group basis. ACLs can be applied to restrict or allow access to specific corporate resources. • IPsec (IKEv1) Remote Access VPN Wizard—Configures IPsec VPN remote access for the Cisco IPsec client.
  • Page 10 In the main ASDM window, choose Wizards > VPN Wizards, then choose one of the Step 1 following: • Site-to-Site VPN Wizard • AnyConnect VPN Wizard • Clientless VPN Wizard • IPsec (IKEv1) Remote Access VPN Wizard Step 2 Follow the wizard instructions. (For information about any wizard field, click Help.)
  • Page 11: Advanced Configuration

    After capturing packets, you can save the packet captures to your PC for examination and replay in the packet analyzer. Advanced Configuration To continue configuring your ASA, see the documents available for your software version at:
  • Page 12 Cisco Website at Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: Third-party trademarks mentioned are the property of their respective owners.