Page 1
UICK TART UIDE Cisco ASA 5580 Verifying the Package Contents Powering On the ASA Maximizing Throughput Connecting Interface Cables and Verifying Connectivity Launching ASDM Running the Startup Wizard (Optional) Allowing Access to Public Servers Behind the ASA (Optional) Running VPN Wizards...
ASA. Cis co ASA 558 0 SER Ada ptiv e Sec urit y App lian ASA 5580 Chassis 2 Yellow Ethernet Cables Power Cable (US Shown) Blue Console Cable PC Terminal Adapter RJ-45 to DB-9 Adapter Documentation and Software CD...
Powering On the ASA Attach the power cable to the back of the ASA. If you have redundant power supplies, you Step 1 must connect both power cables to the back of the chassis. P C I- E x P C I- X 1 0 0 M H z P S 1 R es er ve...
Steps a and b achieve both best practices above. If you cannot achieve both practices, then you should prefer the first best practice: have equal amounts of traffic on both I/O bridges. See the Hardware Installation Guide for more information about maximizing throughput on the ASA 5580.
Step 2 Connect your networks to the appropriate ports. The ASA 5580 has nine expansion slots. Slots 3 through 8 support PCI Express network interface adapters. Slots 1, 2, and 9 are reserved. Your exact configuration depends on the configuration you purchased.
ASA from any location by using a web browser. See the ASDM release notes on Cisco.com for the requirements to run ASDM. On the PC connected to the ASA, launch a web browser.
Running the Startup Wizard Run the Startup Wizard to modify the default configuration so that you can customize the security policy to suit your deployment. Using the startup wizard, you can set the following: • Hostname • Static routes • Domain name •...
Page 8
(Optional) Allowing Access to Public Servers Behind the ASA 8.2 and Later The Public Server pane automatically configures the security policy to make an inside server accessible from the Internet. As a business owner, you might have internal network services, such as a web and FTP server, that need to be available to an outside user.
The network administrator provides access to resources by users on a group basis. ACLs can be applied to restrict or allow access to specific corporate resources. • IPsec (IKEv1) Remote Access VPN Wizard—Configures IPsec VPN remote access for the Cisco IPsec client.
Page 10
In the main ASDM window, choose Wizards > VPN Wizards, then choose one of the Step 1 following: • Site-to-Site VPN Wizard • AnyConnect VPN Wizard • Clientless VPN Wizard • IPsec (IKEv1) Remote Access VPN Wizard Step 2 Follow the wizard instructions. (For information about any wizard field, click Help.)
After capturing packets, you can save the packet captures to your PC for examination and replay in the packet analyzer. Advanced Configuration To continue configuring your ASA, see the documents available for your software version at: http://www.cisco.com/go/asadocs...
Page 12
Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners.