ASA Basic Command _02

Source: Internet
Author: User
Tags ldap local time snmp

Domain DNSASA1 (config) # hostname asa1asa1 (config) # domain-name java.localasa1 (config) #  show running-config dns    dns domain-lookup dmz               //dns parsing goes out from the DMZ port     dns  server-group DefaultDNS        name-server  192.168.15.200     //These two can be knocked directly in the global  dns + ....         domain-name java.local time ASA1 (config) # clock timezone gmt +8     //Setting the time zone  +8 represents the East 8 zone ASA1 (config) # clock set 10:26:00 jun 10  2016  //set time ASA1 (config) # show clock     10:27:05.239  GMT FRI JUN 10 2016NTP Sync (client) ASA1 (config) # show running-config ntp      ntp authentication-key 1 md5 cisco    ntp authenticate     ntp trusted-key 1    ntp server 192.168.12.100 key 1  Source dmzasa file system ASA1 (config) # dir /all    //virtual machine can only see asdm     disk0:/asa842-k8.bin    //boot system  Optional System     disk0:/ ASDM-731.BIN    //ASDM IMAGE ASDM Mirror     disk0:/boot.cfg         //cfg  boot profiles   runningconfig  and start  invisible ASA1 ( config) # boot system disk0:/asa842-k8.binasa1 (config) # asdm image disk0:/ ASDM-731.BINASA1 (config) # copy running-config disk0:/boot.cfg //saves running to the specified file ASA1 (config ) # boot config disk0:/boot.cfg        //Specify the configuration file to start loading

Log system

Can be sent to: Console;asdm;monitor;buffer;syslog;snmp Trap;email;netflow

Log format and message level:

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/82/8D/wKioL1daMBqhHb_sAABhM8O0bSI325.png "title=" 1616. PNG "alt=" Wkiol1dambqhhb_saabhm8o0bsi325.png "/>

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/82/8F/wKiom1daL0aBjk3LAACUaSqxO2Q046.png "title=" level. PNG "alt=" Wkiom1dal0abjk3laacuasqxo2q046.png "/>

Logging default off logging enablelogging console 7    //indicates that level 7 (all information) is sent to the console port   Cancel Add nologging buffered 7    //cache logging asdm informational  //sent to ASDM Level 6 log ASA1 (config) # show running-config logging logging enablelogging  trap debugging    //  send a specified log level (customizable list) **logging  list   locketest  level information  class  ospf  //define a list of OSPF * * logging  trap  debugging         // Send locketestlogging  message  503001  level  alerts     //set the information level from 503001 to 1no  logging  message  503001                //Disable Logging 503001logging host dmz  192.168.12.1  //specifies the interface log server (SYSLogserver) IP Address 

Troubleshooting tool Packet Tracer

The Packet tracer simulates a packet traversing the data channel of the ASA and tracks the entire processing of the packet by the ASA

ASA1 (config) # packet-tracer input dmz icmp 192.168.12.100 8 0  192.168.12.139 phase: 1                 //View Route Type: route-lookupsubtype: resolve egress interfaceresult:  allowconfig:additional information:in   192.168.12.139  255.255.255.255  identityPhase: 2Type: ACCESS-LISTSubtype: Result: ALLOWConfig:Implicit  Ruleadditional information:phase: 3type: natsubtype: per-sessionresult: allowconfig: additional information:phase: 4                   //View the Options field for IP, the firewall does not allow IP packet type: ip-optionssubtype with options by default:       result: allowconfig:additional information:phase: 5type:  cluster-redirectsubtype: cluster-redirectresult: allowconfig:additional information:phase: 6type: inspectsubtype:  np-inspectresult: allowconfig:additional information:phase: 7type: inspectsubtype:  Np-inspectresult: allowconfig:       additional information:phase : 8type: flow-creationsubtype: result: allowconfig:additional information:new  Flow created with id 33, packet dispatched to next moduleresult: input-interface: dmzinput-status: upinput-line-status: upoutput-interface: np  Identity ifcoutput-status: upoutput-line-status: upaction: allow

Grab Bag

ASA1 (config) # capture Test interface DMZ ASA1 (config) # No capture Test Interface DMZ//stop grab packet ASA1 (config) # no capture test Delete package ASA1 (config) # Show capture test23 packets captured 1:13:34:41.259263 192.168.12.139.514 > 192.168.12.1.514:UDP 2:13:34:41.259340 192.168.12.139.514 > 192.168.12.1.514:udp 107 ..... .....  ............ 23:13:35:17.952999 192.168.12.139.514 > 192.168.12.1.514:UDP 94 Packets shown

Configuring the Out of band management port

Interface ASA1 (config-if) # Security-level 100//recommended security level up to ASA1 (config-if) # Management-only//for network management only

Telnet network Management

Enable Telnet network ASA1 (config) # telnet 192.168.17.100 255.255.255.255 inside//Allow inside port to specify IpTelnetASA1 (config) # telnet 0 0 DMZ//Allow all Telnet connections from the DMZ Port note: The lowest interface level telnet entry ASA1 (config) # passwd Cisco//Login requires password ASA1 (config) # enable PA ssWOrd 502asa1 (config) # username admin password Cisco privilege 15//Also available local user authentication ASA1 (config) # AAA authentication Telnet C Onsole Local//Telnet login app log in locally

SSH Network Management

ASA1 (config) # show running-config DNS//First name DNS domain-lookup dmzdns server-group defaultdns name-server 192.16  8.12.100 domain-name java.local ASA1 (config) # Crypto key generate RSA modulus 1024//Generate encryption key for SSH encryption session ASA1 (config) # SSH 192.168.17.100 255.255.255.255 inside//Allow access ASA1 (config) # AAA authentication SSH Console LOCAL//ssh with AAA Local authentication ASA1 (config) # SSH 0 0 DMZ Note: Remote cannot use Telnet, must be SSH

Create a local admin account

ASA1 (config) # username admin attributes        // Set the attribute named Admin account ASA1 (config-username) # service-type ?            //Set the service type (not set, anything can be used) username mode commands/options:  admin           User is allowed access to the  configuration prompt.    //allowed into config  nas-prompt      user is allowed access to the exec prompt.    // Low privilege   cannot enter config  remote-access  user is allowed network access.     //only Remote   aaa authentication enable console LOCAL         //These two sentences can let service-type take effect aaa authorization exec localr3# ssh -l admin 192.168.12.100                //Login 

HTTPS Network Management

ASA1 (config) # http server enableASA1 (config) # http 192.168.12.0 255.255.255.0 DMZASA1 (config) # AAA authentication HTTP Co Nsole LOCAL ASA1 (config) # username Cisco password Cisco privilege 15//permissions must be 15 levels can only use Asdmasa require a server certificate (default is the ASA self-signed certificate-usually error ) Customer authentication: Any password AAA One-time Password certificate authentication + one-time password


Snmp

V1/v2c/v3 SNMPV3 has cryptographic authentication function. Authentication includes MD5 or SHA, encryption includes des or RSA

ASA1 (config) # snmp-server group group001 v3 priv        //Create group ASA1 (config) # snmp-server user admin group001 v3 auth md5  cisco privde des cisco    //account admin  belongs to group001 Group   version v3   Authentication MD5 password is cisco   encrypted des password CiscoASA1 (config) # snmp-server host dmz 192.168.12.1  version 3 admin    //v1 v2  changed version 3  to comunit  . &NBSP;&NBSP;ASA1 (config) # snmp-server location beijing         //(non-mandatory) ASA1 (config) # snmp-server contact xiaomingasa1 (config) #  snmp-server enable traps snmp ?    //allows trap snmp some information configure  mode commands/options:  authentication  enable authentication trap   coldstart       enable coldstart trap  linkdown         Enable linkDown trap  linkup           Enable linkUp trap  warmstart        Enable warmstart trap  <cr>

Authentication Management Access

ASA1 (config) # aaa-server aaaname protocol ?             //defines the protocol and name to use Configure mode commands/options:  http-form   protocol http form-based  kerberos   protocol kerberos   ldap       Protocol LDAP  radius      protocol radius  sdi        protocol &NBSP;SDI&NBSP;&NBSP;TACACS+&NBSP;&NBSP;&NBSP;&NBSP;PROTOCOL&NBSP;TACACS+ASA1 (config) # aaa-server  aaaname  (DMZ)  host 192.168.12.100 cisco  //defines the server location and Key-cisco on SSH with AAAASA1 (config ) # aaa authentication ssh console aaaname local  Note: Remember no aaa  authentication exec local      to do local authorization, set up an account locally with the same username and password on the authentication server:   &NBSP;&NBSP;ASA1 (config) # usernaMe test1 password cisco privilege 15 



Self-signed certificate




This article is from the "Try" blog, so be sure to keep this source http://beening.blog.51cto.com/9079117/1787927

ASA Basic Command _02

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.