cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6167
Views
0
Helpful
2
Replies

CISCO ASA 5505 vs CISCO ASA 5506-x

Hi All,

First of all I really hope to find someone who is able to help me.

We have in our (small) office a CISCO ASA 5505 but it died and I have ordered a new ASA device. As we had a template for the 5505 Series I tried to order a 5505 and use the template. But I heard from our supplier that the 5505 is oudated and only a 5506-x can be ordered.

unfurtunately, because now my template isn't working. I dont have loads of cisco knowledge, and I have searched on the web for solutions. The port configuration has been changed and I found a usefull document to change it, but all the rest of my commands are not working to...

my task now to get our new purchased 5506-x working, and I hope to find someone who can help me?

I have copied the code from the template below:

ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns domain-lookup Trust
dns server-group DefaultDNS
 name-server 172.xx.1.xx
 name-server 172.xx.1.xx
 domain-name domain-xxx
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list Untrust_cryptomap extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0
access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 10.0.0.0 255.0.0.0
access-list Trust_access_in extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0
access-list Trust_nat0_outbound extended permit ip 172.FPC#IP.0 255.255.254.0 172.16.0.0 255.255.0.0
access-list Untrust_access_in extended permit ip 10.0.0.0 255.0.0.0 any
pager lines 24
logging enable
logging console errors
logging asdm warnings
logging mail errors
logging from-address FW-TMPL@xxxxxxxx.nl
logging recipient-address servicedesk@xxxxxxxx.nl level errors
mtu Trust 1500
mtu Untrust 1500
ip verify reverse-path interface Untrust
icmp unreachable rate-limit 10 burst-size 1
icmp permit any Trust
asdm history enable
arp timeout 14400
global (Untrust) 1 interface
nat (Trust) 0 access-list Trust_nat0_outbound
no nat (Trust) 1 0.0.0.0 0.0.0.0
nat (Trust) 1 172.FPC#IP.0 255.255.254.0
access-group Trust_access_in in interface Trust
access-group Untrust_access_in in interface Untrust
route Untrust 0.0.0.0 0.0.0.0 172.FPC#RT 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
no http 192.168.1.0 255.255.255.0 Trust
http 172.FPC#IP.0 255.255.254.0 Trust
http 172.xx.xx.0 255.255.255.0 Trust
http redirect Trust 80
snmp-server host Trust 172.xx.1.xx community public version 2c
snmp-server host Trust 172.xx.1.xx community public version 2c
snmp-server host Trust 172.xx.1.xx community public version 2c
snmp-server location FPC#LOC
no snmp-server contact
snmp-server community public
snmp-server enable traps snmp authentication linkup linkdown coldstart
sysopt noproxyarp Trust
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map Untrust_map1 1 match address Untrust_cryptomap
crypto map Untrust_map1 1 set pfs
crypto map Untrust_map1 1 set peer 172.xx.xx.xx
crypto map Untrust_map1 1 set transform-set ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map Untrust_map1 1 set reverse-route
crypto map Untrust_map1 interface Untrust
crypto isakmp enable Untrust
crypto isakmp policy 1
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp policy 2
 authentication pre-share
 encryption aes
 hash sha
 group 2
 lifetime 86400
crypto isakmp policy 3
 authentication pre-share
 encryption aes-256
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
management-access Trust
no dhcpd auto_config Untrust
dhcprelay server 172.xx.xx.xx Untrust
dhcprelay enable Trust
dhcprelay timeout 60

threat-detection basic-threat
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 172.xx.xx.xx source Trust
ntp server 172.xx.xx.xx source Trust prefer
webvpn
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
 vpn-tunnel-protocol IPSec
username admin password EIzFbn/fVy4aIhV3 encrypted privilege 15
username 2invision password js/4oXuKmz.tSZYq encrypted privilege 15
tunnel-group 172.xx.xx.xx type ipsec-l2l
tunnel-group 172.xx.xx.xx general-attributes
 default-group-policy GroupPolicy1
tunnel-group 172.xx.xx.xx ipsec-attributes
 pre-shared-key JH,virtual47
 peer-id-validate nocheck
 isakmp keepalive disable
!
class-map inspection_default
 match default-inspection-traffic

!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny 
  inspect sunrpc
  inspect xdmcp
  inspect sip 
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
smtp-server 172.xx.xx.xx
prompt hostname context
no call-home reporting anonymous

2 Replies 2

Marvin Rhoads
Hall of Fame
Hall of Fame

The 5506-X differs from the 5505 in several ways. Most notably for purposes of configuration there are two major differences"

1. There are no switchports. All interfaces are routed and require an IP address. If you were using the switching (VLAN assignment) feature on the 505, a redesign is required.

2. The new ASA only runs ASA software 9.1 or higher. If you had a configuration built with old software (8.2(x) or lower - such as your template appears to be built from) then you will have to convert several configuration bits - most notably NAT and access-lists.

I don't see any interface configurations in your template. They will also need to be updated to reflect the lack of VLAN interfaces in the 5506.

interface configurations can be as factory default for 5505. that means ip dhcp for outside and something like 192.168.1.1 for inside

Review Cisco Networking products for a $25 gift card