20 Most Recent Cisco ASA 5510 Firewall Questions & Answers

0helpful
1answer

Time required, between moments I physically switch off and on again my Cisco ASA 5510, so the device starts correctly?

There isn't a set time. It is a good practice to turn it off long enough that the electricity can actually dissipate. It certainly won't hurt anything to leave it off for a minute before turning it back on. Even removing the power cord in between is ok.
9/15/2018 11:45:35 PM • Cisco ASA 5510... • Answered on Sep 15, 2018
0helpful
1answer

I want toblock web sites on my cisco asa 5510 firewall

I know that iKeyMonitor can also block sites on iPhone/iPad/iPod now. http://ikeymonitor.com/
8/23/2016 9:33:06 AM • Cisco ASA 5510... • Answered on Aug 23, 2016
0helpful
2answers

I want to block social

1. Load your Internet explorer
2. Click Tools
3. Click Internet Options
4. Click the Privacy tab
5. Under the Privacy window, Click Sites
6. Type in the site address that you want to Block and Click OK. Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.

And in the case of Mozila Firefox you have to download a addon(plugin) called 'Foxfilter' to block certain websites
6/2/2016 9:17:30 AM • Cisco ASA 5510... • Answered on Jun 02, 2016
0helpful
1answer

How can i get into ASA 5510 after lost password

Hi, Its simple, you have reboot with console connect, get into to ROM mode and change configuration registry so it will not load the saved configuration. Please refer Resetting the passwords on Cisco ASA 5510 Binary Royale Ltd for the step by step process
8/7/2014 1:48:54 PM • Cisco ASA 5510... • Answered on Aug 07, 2014
0helpful
3answers

Console error

78tfggi
10/24/2012 10:36:34 PM • Cisco ASA 5510... • Answered on Oct 24, 2012
0helpful
2answers

Activation key

Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} Step 1
Obtain the serial number for your security appliance by entering the following command:
hostname# show activation-key
Step 2
Access one of the following URLs.

Use the following website if you are a registered user of Cisco.com:
http://www.cisco.com/go/license

Use the following website if you are not a registered user of Cisco.com:
http://www.cisco.com/go/license/public
Step 3
Enter the following information, when prompted:

Product Authorization Key (if you have multiple keys, enter one of the keys first. You have to enter
each key as a separate process.)

The serial number of your security appliance

Your email address
An activation key is automatically generated and sent to the email address that you provide. This key
includes all features you have registered so far for permanent licenses. For VPN Flex licenses, each
license has a separate activation key.
Step 4
If you have additional Product Authorization Keys, repeat Step 3 for each Product Authorization Key.
After you enter all of the Product Authorization Keys, the final activation key provided includes all of
the permanent features you registered
3/30/2012 5:30:30 PM • Cisco ASA 5510... • Answered on Mar 30, 2012
0answers
0answers
0helpful
1answer

Hi! I wont to migrate config

First you need to convert the configuration from 6.3 to 7.2 format: Follow this guide:
http://www.cisco.com/en/US/docs/security/asa/migration/guide/pix2asa.html
Then once you have it to 7.2 you can convert it to 8.3 Follow this guide: https://supportforums.cisco.com/docs/DOC-12690
3/1/2011 1:23:26 AM • Cisco ASA 5510... • Answered on Mar 01, 2011
0helpful
1answer

How to export log from CISCOASA?like other cisco

ASA's log is usualy stored localy on ASA itself, so easiest way to export that log is to go with telnet/ssh/console on it, do a command : show logging and copy/paste output into a new file.
but beware - this log is really short and as soon as ASA is rebooted - it's gone.
you could set asa to log to a syslog server (free on linux/freebsd or for windows use KIWI app).
that way all ASA log output is stored on pc/server running your syslog server.
1/10/2011 2:30:08 PM • Cisco ASA 5510... • Answered on Jan 10, 2011
0helpful
1answer

I have got a CISCO

nat (inside) access-list <ACLNAME>
12/25/2010 4:15:41 PM • Cisco ASA 5510... • Answered on Dec 25, 2010
0helpful
1answer

When i create a access rule on the outside

Although I can't find anything specific about this, I am sure from experience that the access-list is applied to both interfaces because of the way that the firewall simply passes traffic through the interfaces, as they are not seen as a hop, nor do they have IP addresses allocated to them. If the access list has a source and destination, in theory it doesn't matter which way the packet travels it will still be seen and thus inspected on both interfaces.

I hope that this has been of some help, sorry I couldn't be 100% on the answer, but as I said, from experience I believe this is correct.

If you want any forther information, there is quite a lot of documentation on Ciscos site:
http://www.cisco.com/en/US/products/ps6120/tsd_products_support_series_home.html
and something you might be particularly interested in is:
http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/config.html
This is the configuration guide for ASA5500 via ASDM.

Hope that this has been of some use to you :)
10/18/2010 4:12:39 PM • Cisco ASA 5510... • Answered on Oct 18, 2010
0helpful
1answer

I have a problem in asa5510

It sounds like you have not allowed ICMP (ping) through the firewall, and you may need to put an access list in to allow this.
10/17/2010 8:58:17 PM • Cisco ASA 5510... • Answered on Oct 17, 2010
0helpful
1answer

I have cisco asa 5510 firewall and

Your best bet is to place the ASA into 'transparent' mode, and letting the traffic pass through it and be inspected on the way through.

To do this you need to first do the following command:
firewall transparent

Once in transparent mode, the firewall will no longer look like a hop in the packets journey, and you can set rules to allow/disallow traffic using access lists on the inside and outside interfaces, plus you can perform packet inspections using policy-map and inspects.

Hope that helps!
10/17/2010 8:57:02 PM • Cisco ASA 5510... • Answered on Oct 17, 2010
0helpful
1answer

Could nt access my asa5510?

If you are trying to access it remotely (via telnet or SSH), you will need to enable management on the interface that you are access it on, and it is also advisable to tie an access list to it.

If you are trying to access it via http, you will need to switch on http management with something like: http 0.0.0.0 0.0.0.0 inside

hope that helps!
10/16/2010 11:05:14 AM • Cisco ASA 5510... • Answered on Oct 16, 2010
Not finding what you are looking for?
Cisco ASA 5510 Firewall Logo

57 questions posted

Ask a Question

Usually answered in minutes!

Top Cisco Computers & Internet Experts

Brad Brown

Level 3 Expert

19187 Answers

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Sean Wright
Sean Wright

Level 3 Expert

2045 Answers

Are you a Cisco Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

View Most Popular

ASA Cisco

  • ASA Cisco

Most Popular Question

experts configure asa5510

  • Computers & Internet
Loading...