cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3582
Views
0
Helpful
16
Replies

migrating 5505 to 5506-X

med.rebou
Level 1
Level 1

I would like to change my cisco asa 5505 (ios 7.4) with another cisco asa 5506-x, and I can not configure it is quite different,can you help me please

here is the config of my ASA 5505:


!
hostname xxx
domain-name xxxx
enable password 1234
passwd 1234
names
!
interface Vlan1
nameif inside
security-level 100
ip address x.x.x.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address y.y.y.2 255.255.255.0
!
interface Vlan3
shutdown
no forward interface Vlan1
nameif dmz
security-level 50
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
boot system disk0:/asa724-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name xxxx
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network obj_any
access-list inside_access_in extended permit ip any any log debugging
access-list outside_access_in extended permit icmp any any log debugging
access-list outside_access_in extended permit ip any any

access-list outside_nat_static_9 extended permit ip host y.y.y.210 x.x.0.0 255.255.255.0
access-list outside_nat_static_10 extended permit ip host y.y.y.200 x.x.0.0 255.255.255.0
access-list outside_nat_static_11 extended permit ip host y.y.y.220 x.x.0.0 255.255.255.0
access-list outside_nat_static_12 extended permit ip host y.y.y.240 x.x.0.0 255.255.255.0
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any outside
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0

static (inside,outside) y.y.y.20 x.x.x.2 netmask 255.255.255.255
static (inside,outside) y.y.y.32 x.x.x.32 netmask 255.255.255.255
static (outside,inside) z.z.z.150 access-list outside_nat_static_9
static (outside,inside) z.z.z.10 access-list outside_nat_static_10
static (inside,outside) y.y.y.33 x.x.x.33 netmask 255.255.255.255
static (outside,inside) z.z.z.140 access-list outside_nat_static_11
static (outside,inside) z.z.z.151 access-list outside_nat_static_12
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 y.y.y.4 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
aaa authentication ssh console LOCAL
http server enable
http x.x.x.0 255.255.255.0 inside
http y.y.y.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet 0.0.0.0 0.0.0.0 outside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address x.x.x.2-x.x.x.33 inside
dhcpd dns y.y.y.210 y.y.y.140 interface inside
dhcpd wins y.y.y.210 y.y.y.150 interface inside
dhcpd lease 691200 interface inside
dhcpd domain xxx interface inside
dhcpd enable inside
!


class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp

crypto key generate rsa modulus 512

16 Replies 16

med.rebou
Level 1
Level 1

please excuse me, I could not solve the problem. I found a solution that is based on the migration of cisco asa 5505 8.2 to 8.3

this solution allowed me to transform my configuration from 8.2 to 8.3 which is compatible with ASA 5506 but I still have one problem: I can not yet connect to my exchange server,

@med.rebou 

Please summarize your problem with the detail needed to troubleshoot.

a. What's the Exchange server address.

b. What's the source address (or addresses in the case of public  Internet access) from which you expect to be able to reach it?

Please attach the current running-config of your ASA 5506.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: