Another question. I am upgrading a 515E (v 6.3) to a ASA 5505. With the amount of configuration done to the 515E, I was thinking the easiest way to upgrade to the 5505 would be to simply copy the configuration over from the one Pix to the ASA. From the research I've done, it sounds like this would work and that the ASA will actually convert some of the old commands with the new syntax (where necessary).
Am I going about this the right way? Or is there another way in which most people would do this upgrade?
As far as I know , not all the configuration can be copy-pasted , but there is a tool on cisco where you can convert the older configuration files to newer ones and still you might have some missing from the new config.
If I remember correctly outside access is disabled by default. You can configure outside access to the firewall (SSH, telnet or ASDM.. etc) from the outside if needed. Generally I will use remote access VPN to access the firewall instead of just accessing the outside interface. You can reference this with the ASA configuration guide for more info.
I'm setting up a site2site vpn and was starting to think about how to access the second remote ASA when there is no tunnel configured yet. Sounds like I'll need to a basic config and ship it out there (making sure I can reach the outside ip before it leaves the office).
Seems funny to need to ask all these basic Q's when I already know how to do the more elaborate stuff like the VPNs, Access Controls, etc.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :