These commands are expected to be issued on a factory default ASA. The configuration was done on ASA 9.0(2) but should work with anything 8.3 or higher (since the new NAT rules). I do not plan on explaining anything already available online. This post is to help bring everything together into one place. I personally can attest to the vast amount of information on the internet about the ASA. This is for two reasons, one to teach me and two to prevent accidents. I do use the ASDM however I make it show me the commands before it sends them. I am no expert by any means, in fact I believe Cisco is currently emphasizing the ASDM however I just felt more comfortable in CLI. I also setup my ASA completely via the CLI. It personally gave me the confidence to do anything I wanted without worrying about lossing the connection.
#Cisco asa 5505 setup serial
It is important to note if this is your first time playing with an ASA it would be wise to attach the blue serial cable. For this example I will define the networks as (substitute yours in): ASA Inside-Network = 10.1.0.0/24 This has some disadvantages but only in the configuration. This way my ASA will only ever see one host. I kept my existing Airport Extreme with its current subnet and simply placed the entire router in a NAT on my ASA. I setup my network in a rather unique way. Honestly, I decided not to test the water. Some say its defined by ARP entries or XLAT’s. This is a limit I still do not quite understand. Of course my budget was limited so I opted for the base license (10 hosts). I had limited experience with Cisco’s IOS in the past so I was willing to make an attempt at taming an ASA (Adaptive Security Appliance) 5505. I embarked on securing my home network while providing reliable VPN access.