Open In App

Basic configuration of Adaptive Security Appliance (ASA)

Last Updated : 15 Mar, 2023
Improve
Improve
Like Article
Like
Save
Share
Report

Prerequisite – Adaptive security appliance (ASA) 
Adaptive Security Appliance (ASA) is a Cisco security appliance that combines classic firewall features with VPN, Intrusion Prevention, and antivirus capabilities. It has the capability to provide threat defense before the attacks spread into the networks. 

As an administrator, we have to ensure protection against unauthorized access to our firewall. We can set login passwords, enable passwords for this. Also, we will discuss configuring an IP address on the ASA interface. 

Administrative Configuration – 

Bring up the interface and assign an IP address to ASA. 
To configure an IP address on the interface of an ASA, we have to configure 4 things: 

1. Bring up the interface – 
After entering into global interface mode, use the command no shut to bring up the interface. 

2. Assign an IP address to the interface of ASA – 
After bringing up the interface, assign an IP address by the command 

IP address IP_address Subnet_Mask  

It’s the same way by which we assign an IP address to the router’s interface. But the difference is that we can assign an IP address to the ASA interface without the subnet mask also. 

IP address IP_address

Now, if we don’t give a subnet mask, it automatically takes a classful subnet mask. for example, if we assign 192.168.1.1 to the ASA interface it will automatically take 255.255.255.0 as a subnet mask. 

3. Assign a nameif to the ASA interface – 
In ASA, we also assign a name to the interface otherwise the interface will be down. The most common names are INSIDE OUTSIDE or DMZ. These names are used while applying a policy but have no role in forwarding the traffic. 
We can assign a name to an ASA interface by the command: 

nameif NAME 

NAME is the name you want to give to an interface. 

4. Assign a security level to the interface – 
The security level is an integer value ranging from 0 to 100. It tells the trustworthiness of an interface i.e which interface is most trusted. 0 means less trusted while 100 means the most trusted. 
If we provide the name INSIDE to an interface, it will automatically provide security level 100 to it and if we provide any other name like OUTSIDE or DMZ, it will assign automatically 0 to it but can be changed manually. 
We can assign a security level to an interface by the command: 

Security-level {value} 

Here is an example where we will provide IP address 192.268.1.1 and subnet mask 255.255.255.0, name as INSIDE and security-level as 100. 

asa(config)#int e0
asa(config-if)#no shut
asa(config-if)#ip address 192.168.1.1 255.255.255.0
asa(config-if)#nameif INSIDE 
asa(config-if)#security level 100

Giving hostname to ASA – 
It is used to set a name to a device stating an identity to a device. It is given by the same command that is used on the router:- 

asa(config)#hostname ciscoasa
ciscoasa(config)#

Setting passwords – 
As ASA is a security device, by default it will ask for a password while we try to enter privilege mode. By default, no password is set therefore by simply clicking enter, we can enter the privilege mode. 

enable password – 
The enable password is used for securing privilege mode. In routers, this password is shown in clear text in running configuration but in ASA, this password is encrypted (therefore no enable secret is required.) The password is a case-sensitive password of up to 16 alphanumeric and special characters. We can set an enable password by 

asa(config)#enable password GeeksforGeeks 

Or by the command  

asa(config)#enable passwd GeeksforGeeks 

Where GeeksforGeeks is the password. 
If we want to disable this password or set a password to default then simply enter the command.  

asa(config)#enable password 

login password – 
This password is used for taking access to ASA by using Telnet or SSH. By default, the login password is “Cisco”. We can change it by the command  

asa(config)#password GeeksforGeeks 
or 
asa(config)#passwd GeeksforGeeks 

Where GeeksforGeeks is the login password. 

Using a local database for login: 
A local database is configured on the device (username and password) so that it can be used for login purposes. It is configured in the same manner as it is configured on the router. A local database can be configured on the device using the command 

asa(config)#username SAURABH password GeeksforGeeks 

Where SAURABH is username and password is GeeksforGeeks. 
If we want the ASA to use its local database for its login purpose then we can use the command 

asa(config)#aaa authentication serial console LOCAL

Here, note that LOCAL is case-sensitive
 

Drawbacks:

Complexity: ASA is a complex device that requires a good understanding of networking and security concepts to configure properly. This can make it challenging for some users to set up and manage the device.

Limited functionality: The basic configuration of ASA offers limited functionality, which may not be sufficient for some users. For example, basic ASA configurations may not include advanced features like VPN or intrusion prevention.

Lack of scalability: The basic configuration of ASA is designed for small to medium-sized networks. As a network grows in size, the basic configuration may not be able to handle the increased traffic and security requirements.

Limited customization: The basic configuration of ASA may not offer the level of customization that some users require. This can limit the device’s ability to adapt to specific network security needs.

Cost: ASA devices can be expensive, and the basic configuration may not justify the cost for some users, especially those with smaller networks or limited security requirements.

while ASA is a powerful security tool, its basic configuration may not meet the needs of all users. It’s important to carefully consider the device’s features and limitations before making a purchasing decision.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads