Avatar of David Schmalzer
David SchmalzerFlag for United States of America

asked on 

Cisco ASA5505 console command vs. ASDM interface

I would like a little instruction please.  Please see the attached configuration file with ip addresses x'ed out of course.  I would like someone who has console command and asdm experience to section off the configuration file and on the side of each section show me where those sections are configured in the ASDM.

I have also attached an example file so you can see what I mean.
asaconfig.txt
asaExample.txt
Hardware FirewallsSoftware FirewallsVPN

Avatar of undefined
Last Comment
David Schmalzer
Avatar of bignewf
bignewf
Flag of United States of America image

I can do this for you later, but fyi, the asdm configs sometimes are out of sync with the cli, and cisco has remarked this is a known issue

the access lists are found in security policy of asdm

the network interfaces are found in interfaces,

the user account info is found in vpn>general>users
the tunnel group info (tunnel group attributes, policy settings) in vpn>general>tunnel groups, as well as group policy settings
cryptomaps  are found in vpn>ipsec.ipsec rules and transform sets
default routes will be on routing tab

I don't have time to go into more detail, but tonight I can give you the rest of where everything is
Avatar of David Schmalzer

ASKER

And what section(s) do I need to be concerned with as far as allowing certain ip addresses through if they are using a cisco vpn client?
Avatar of David Schmalzer

ASKER

Any progress on this?
ASKER CERTIFIED SOLUTION
Avatar of bignewf
bignewf
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of David Schmalzer

ASKER

Ok, great, thanks!
VPN
VPN

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

26K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo