
The switchport access command on the ASA 5505 security appliance assigns a physical interface to a logical (VLAN) interface. In the following sample configuration, an IP address is assigned to VLAN 1, the inside interface. If you are using non-standard masks, you must explicitly configure the mask, otherwise, it is not necessary. With modern versions of security appliance software, it is not necessary to explicitly configure default subnet masks. The ip address command assigns an IP address to a VLAN interface either statically or by making it a DHCP client. INFO: Security level for "outside" set to 0 by default. INFO: Security level for "inside" set to 100 by default. Once in interface configuration mode, you can assign physical interfaces to switchports and enable them (turn them on) or you can assign names and security levels to VLAN interfaces. The interface command identifies either the hardware interface or the Switch Virtual Interface (VLAN interface) that will be configured.
#Cisco asa initial config software#
To enable basic functionality, there are eight basic commands (these commands are based on software version 8.3(1) or greater): Additionally, management must be allowed from at least one inside host. Basic functionality is defined as allowing inside hosts to access outside hosts, but not allowing outside hosts to access the inside hosts. Initially, however, there are just a few commands required to configure basic functionality on the appliance. As you gain knowledge of the appliance, you will use more and more of the commands. There are literally thousands of commands and sub-commands available to configure a Cisco security appliance. It is an excerpt from his latest: The Accidental Administrator: Cisco ASA Security Appliance: A Step-by-Step Configuration Guide Here's a guest post sent to me by Don Crawley, author of The Accidental Administrator book series.
