ciscoasa(config)# show version
? configure factory-default ? confreg 0x2040 ? relo
ciscoasa> confreg 0x41 boot
ciscoasa> enable ciscoasa> configure terminal
ciscoasa(config)# config-register 0x1
ciscoasa(config)# enable password (password)
ciscoasa(config)# write memory ciscoasa(config)# reload
ciscoasa> enable ciscoasa> configure terminal ciscoasa> conf t
ciscoasa(config)# hostname (hostname)
ciscoasa(config)# clear configure call-home ciscoasa(config)# no service call-home
show interface ip brief show switch vlan
ciscoasa(config)# interface vlan 10 ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 192.168.1.2 255.225.255.0 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# interface vlan 10 ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# security-level 0
ciscoasa(config-if)# ip address dhcp setroute ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# interface vlan 20 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# ip address 192.168.2.1 255.225.255.0 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# interface ethernet 0/0 ciscoasa(config-if)# no nameif ciscoasa(config-if)# no security-level ciscoasa(config-if)# no ip address ciscoasa(config-if)# switchport access vlan 10 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# show interface vlan 10 [...]
IP address 192.168.1.157, subnet mask 255.255.255.0
[...]
ciscoasa(config)# interface ethernet 0/(1...7) ciscoasa(config-if)# switchport access vlan 20 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# dhcpd address 192.168.1.100-192.168.1.199 inside
ciscoasa(config)# dhcpd auto_config outside
ciscoasa(config)# dhcpd dns 9.9.9.9 1.1.1.1
ciscoasa(config)# dhcpd enable inside
ciscoasa(config)# wr m ciscoasa(config)# relo
ciscoasa(config)# ping outside 1.1.1.1
ciscoasa(config)# nat (inside) 1 0.0.0.0 0.0.0.0 ciscoasa(config)# global (outside) 1 interface
ciscoasa(config)# object network obj_any ciscoasa(config)# subnet 0.0.0.0 0.0.0.0 ciscoasa(config)# nat (inside,outside) dynamic interface
ciscoasa(config)# no nat-control ciscoasa(config)# access-list INSIDE_IN extended permit ip any any ciscoasa(config)# access-group INSIDE_IN in interface inside
ciscoasa(config)# dns domain-lookup inside
ciscoasa(config)# dns server-group DefaultDNS
ciscoasa(config-dns-server-group)# name-server 10.1.1.5 192.168.1.67 209.165.201.6
ciscoasa(config)# show clock ciscoasa(config)# clock set 07:29:00 May 06 2019 ciscoasa(config)# clock timezone UTC +3
ciscoasa(config)# clock summer-time MST recurring 1 Sunday April 2:00 last Sunday October 2:00
ciscoasa(config)# ntp server 10.1.1.1 key 1 prefer ciscoasa(config)# sh ntp associations ciscoasa(config)# sh ntp status
?
ciscoasa(config)# asdm image disk0:/asdm-647.bin
ciscoasa(config)# http server enable
ciscoasa(config)# http 10.10.10.0 255.255.255.0 inside
ciscoasa(config)# username admin password adminpass
ciscoasa(config)# same-security-traffic permit inter-interface
ciscoasa(config)# same-security-traffic permit intra-interface
ciscoasa(config)# show access-list OUTSIDE-IN Sample output: access-list OUTSIDE-IN line 1 extended permit tcp 100.100.100.0 255.255.255.0 10.10.10.0 255.255.255.0 eq telnet (hitcnt=15) 0xca10ca21
ciscoasa(config)# show conn
ciscoasa(config)# show conn all
ciscoasa(config)# show conn state up,http_get,h323,sip
ciscoasa(config)# show conn count 54 in use, 123 most used
ciscoasa(config)# show cpu usage
ciscoasa(config)# show processes cpu-usage ciscoasa(config)# show processes memory
ciscoasa(config)# show disk
? ciscoasa(config)# show environment
ciscoasa(config)# show memory
ciscoasa(config)# show failover
ciscoasa(config)# show interface
ciscoasa(config)# show local-host
ciscoasa(config)# show route
ciscoasa(config)# show xlate
ciscoasa(config)# show startup-config ciscoasa(config)# show running-config
ciscoasa(config)# write memory ciscoasa(config)# wr m ciscoasa(config)# copy running-config startup-config ciscoasa(config)# copy run start Source filename [running-config] ?
ciscoasa(config)# logging enable ciscoasa(config)# logging timestamp ciscoasa(config)# logging buffer-size 65536 ciscoasa(config)# logging buffered warnings ciscoasa(config)# logging asdm errors
ciscoasa(config)# logging host inside 192.168.1.30 ciscoasa(config)# logging trap errors
ciscoasa(config)# aaa authorization exec authentication-server
username (username) nopassword
username (username) password (password)
? no username
username (username) password (password) privilege 15 username (username) attributes ciscoasa(config-username)# service-type admin ciscoasa(config-username)# service-type nas-prompt ciscoasa(config-username)# service-type remote-access ciscoasa(config-username)# exit
ASA#configure terminal ciscoasa(config)#domain-name local.local ciscoasa(config)#aaa authentication ssh console LOCAL ciscoasa(config)#crypto key generate rsa modulus 2048 ciscoasa(config)#crypto key generate rsa general-keys modulus 1024 ciscoasa(config)#ssh 192.168.1.10 255.255.255.255 inside ciscoasa(config)#ssh 0.0.0.0 0.0.0.0 OUTSIDE
show ssh
ciscoasa(config)# copy tftp flash
ciscoasa(config)# boot system flash:/asa911-k8.bin
ciscoasa(config)# interface Ethernet 0/6
show power inline
show interfaces trunk (config-if)#interface gigabitEthernet 0/23 (config-if)#description Trunk port to (host) (config-if)#switchport mode trunk (config-if)#switchport trunk allowed vlan all (config-if)#switchport trunk allowed vlan 2-4094 no shutdown
(config)#interface gigabitEthernet 0/23 (config-if)#description (host) (config-if)#switchport mode access (config-if)#switchport access vlan 128 (config-if)#no shutdown
ciscoasa(config)# interface Ethernet 0/1 ciscoasa(config-if)# no nameif ciscoasa(config-if)# no security-level ciscoasa(config-if)# no ip address ciscoasa(config-if)# switchport access 20 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# exit
ciscoasa(config)# route outside 0.0.0.0 0.0.0.0 100.1.1.1
ciscoasa(config-if)# route outside 0.0.0.0 0.0.0.0 192.168.100.1 1
ciscoasa(config)# route inside 192.168.2.0 255.255.255.0 192.168.1.1
ciscoasa(config)# same-security-traffic permit inter-interface
[Configure PAT for internal LAN (192.168.1.0/24) to access the Internet using the outside interface] ciscoasa(config)# object network internal_lan ciscoasa(config-network-object)# subnet 192.168.1.0 255.255.255.0 ciscoasa(config-network-object)# nat (inside,outside) dynamic interface
ciscoasa(config)# object network obj_any ciscoasa(config-network-object)# subnet 0.0.0.0 0.0.0.0 ciscoasa(config-network-object)# nat (any,outside) dynamic interface
ciscoasa(config)# object network web_server_static ciscoasa(config-network-object)# host 192.168.1.1 ciscoasa(config-network-object)# nat (DMZ , outside) static 100.1.1.1
ciscoasa(config)# object network web_server_static ciscoasa(config-network-object)# host 192.168.1.1 ciscoasa(config-network-object)# nat (DMZ , outside) static 100.1.1.1 service tcp 80 80
show run access-list (host) show access-list (host)
ciscoasa(config)# access-group OUTSIDE_IN in interface outside ciscoasa(config)# access-group INSIDE_IN in interface inside
ciscoasa(config)# access-list OUTSIDE_IN extended permit tcp any host 192.168.1.1 eq 80
ciscoasa(config)# access-list INSIDE_IN extended deny ip host 192.168.1.1 any ciscoasa(config)# access-list INSIDE_IN extended permit ip any any
ciscoasa(config)# object-group network WEB_SRV ciscoasa(config-network)# network-object host 192.168.1.1 ciscoasa(config-network)# network-object host 192.168.1.2
ciscoasa(config)# object-group network DMZ_SUBNETS ciscoasa(config-network)# network-object 10.1.1.0 255.255.255.0 ciscoasa(config-network)# network-object 10.2.2.0 255.255.255.0
ciscoasa(config)# object-group service DMZ_SERVICES tcp ciscoasa(config-service)# port-object eq http ciscoasa(config-service)# port-object eq https ciscoasa(config-service)# port-object range 21 23
ciscoasa(config)# access-list OUTSIDE-IN extended permit tcp any object-group DMZ_SUBNETS object-group DMZ_SERVICES
(config)# object-group network (hostgroup)
(config-network-object-group)# network-object object (newhost)
show object-group network exit
object network (newhost) host (ip)
https://www.opentechguides.com/how-to/article/cisco/39/Cisco-configure-ssh.html
show running-config | include (ip-from) show running-config | include (ip-to) show access-list outside_in show run | include (ip) show (ip)
show interfaces status
show configuration | include access-group ip access-group access-list-name {in | out} no ip access-group access-list-name {in | out}
access-list (zone) extended permit udp host (ip) host (ip) eq (port) access-list (zone) extended permit tcp host (ip) host (ip) eq (port) access-list (zone) extended permit tcp any4 host (ip) eq https
wr (copy running-config startup-config) wr write mem
capture capin interface outside match tcp host (host) host (host) eq (port) show capture show capture capin
show run | include route
service unsupported-transceiver no errdisable detect cause gbic-invalid
write mem
ciscoasa(config)# show crypto ipsec sa
ciscoasa(config)# show crypto isakmp sa
https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config.html https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/access_aaa.html
https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/interface-basic-5505.pdf https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/route_static.pdf
Books: