Download Print this page

Cisco ASA 5506-X Configuration Manual page 374

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

The ASA CX Module
Figure 17-3
ASA CX Management Access
There are two separate layers of access for managing an ASA CX module: initial configuration (and
subsequent troubleshooting) and policy management.
Initial Configuration
For initial configuration, you must use the CLI on the ASA CX module to run the setup command and
configure other optional settings.
To access the CLI, you can use the following methods:
Cisco ASA Series Firewall CLI Configuration Guide
17-4
ASA CX Traffic-Forwarding
ASA
Main System
inside
ASA CX inspection
ASA CX
Initial Configuration, page 17-4
Policy Configuration and Management, page 17-5
ASA 5585-X:
ASA CX console port—The ASA CX console port is a separate external console port.
ASA CX Management 1/0 interface using SSH—You can connect to the default IP address
(192.168.8.8), or you can use ASDM to change the management IP address and then connect
using SSH. The ASA CX management interface is a separate external Gigabit Ethernet
interface.
You cannot access the ASA CX hardware module CLI over the ASA backplane using the
Note
session command.
ASA 5512-X through ASA 5555-X:
ASA session over the backplane—If you have CLI access to the ASA, then you can session to
the module and access the module CLI.
ASA CX Management 0/0 interface using SSH—You can connect to the default IP address
(192.168.1.2), or you can use ASDM to change the management IP address and then connect
using SSH. These models run the ASA CX module as a software module. The ASA CX
management interface shares the Management 0/0 interface with the ASA. Separate MAC
addresses and IP addresses are supported for the ASA and ASA CX module. You must perform
VPN
Firewall
Decryption
Policy
Forwarded Traffic
Chapter 17
Switch
Gig 0/2
outside
Gig 0/3
SPAN
Port
ASA CX Module

Hide quick links:

Advertisement

loading