20 Most Recent Cisco ASA 5510 Firewall Questions & Answers


There isn't a set time. It is a good practice to turn it off long enough that the electricity can actually dissipate. It certainly won't hurt anything to leave it off for a minute before turning it back on. Even removing the power cord in between is ok.

Cisco ASA 5510... | Answered on Sep 15, 2018


I know that iKeyMonitor can also block sites on iPhone/iPad/iPod now.
http://ikeymonitor.com/

Cisco ASA 5510... | Answered on Aug 23, 2016


1. Load your Internet explorer
2. Click Tools
3. Click Internet Options
4. Click the Privacy tab
5. Under the Privacy window, Click Sites
6. Type in the site address that you want to Block and Click OK. Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.

And in the case of Mozila Firefox you have to download a addon(plugin) called 'Foxfilter' to block certain websites

Cisco ASA 5510... | Answered on Jun 02, 2016


Hi,

Its simple, you have reboot with console connect, get into to ROM mode and change configuration registry so it will not load the saved configuration. Please refer Resetting the passwords on Cisco ASA 5510 Binary Royale Ltd for the step by step process

Cisco ASA 5510... | Answered on Aug 07, 2014


78tfggi

Cisco ASA 5510... | Answered on Oct 24, 2012


Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} Step 1
Obtain the serial number for your security appliance by entering the following command:
hostname# show activation-key
Step 2
Access one of the following URLs.

Use the following website if you are a registered user of Cisco.com:
http://www.cisco.com/go/license

Use the following website if you are not a registered user of Cisco.com:
http://www.cisco.com/go/license/public
Step 3
Enter the following information, when prompted:

Product Authorization Key (if you have multiple keys, enter one of the keys first. You have to enter
each key as a separate process.)

The serial number of your security appliance

Your email address
An activation key is automatically generated and sent to the email address that you provide. This key
includes all features you have registered so far for permanent licenses. For VPN Flex licenses, each
license has a separate activation key.
Step 4
If you have additional Product Authorization Keys, repeat Step 3 for each Product Authorization Key.
After you enter all of the Product Authorization Keys, the final activation key provided includes all of
the permanent features you registered

Cisco ASA 5510... | Answered on Mar 30, 2012


First you need to convert the configuration from 6.3 to 7.2 format: Follow this guide:
http://www.cisco.com/en/US/docs/security/asa/migration/guide/pix2asa.html
Then once you have it to 7.2 you can convert it to 8.3 Follow this guide: https://supportforums.cisco.com/docs/DOC-12690

Cisco ASA 5510... | Answered on Mar 01, 2011


ASA's log is usualy stored localy on ASA itself, so easiest way to export that log is to go with telnet/ssh/console on it, do a command : show logging and copy/paste output into a new file.
but beware - this log is really short and as soon as ASA is rebooted - it's gone.
you could set asa to log to a syslog server (free on linux/freebsd or for windows use KIWI app).
that way all ASA log output is stored on pc/server running your syslog server.

Cisco ASA 5510... | Answered on Jan 10, 2011


nat (inside) access-list <ACLNAME>

Cisco ASA 5510... | Answered on Dec 25, 2010


Although I can't find anything specific about this, I am sure from experience that the access-list is applied to both interfaces because of the way that the firewall simply passes traffic through the interfaces, as they are not seen as a hop, nor do they have IP addresses allocated to them. If the access list has a source and destination, in theory it doesn't matter which way the packet travels it will still be seen and thus inspected on both interfaces.

I hope that this has been of some help, sorry I couldn't be 100% on the answer, but as I said, from experience I believe this is correct.

If you want any forther information, there is quite a lot of documentation on Ciscos site:
http://www.cisco.com/en/US/products/ps6120/tsd_products_support_series_home.html
and something you might be particularly interested in is:
http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/config.html
This is the configuration guide for ASA5500 via ASDM.

Hope that this has been of some use to you :)

Cisco ASA 5510... | Answered on Oct 18, 2010


It sounds like you have not allowed ICMP (ping) through the firewall, and you may need to put an access list in to allow this.

Cisco ASA 5510... | Answered on Oct 17, 2010

Not finding what you are looking for?
Cisco ASA 5510 Firewall Logo

57 questions posted

Ask a Question

Usually answered in minutes!

Top Cisco Computers & Internet Experts

Prashant M
Prashant M

Level 3 Expert

2276 Answers

J John

Level 2 Expert

299 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18429 Answers

Are you a Cisco Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

View Most Popular

ASA Cisco

  • ASA Cisco

Most Popular Question

experts configure asa5510

  • Computers & Internet
Loading...