PDF

Cisco ASA for Firepower 9300
Quick Start Guide
First Published: July 16, 2015
Last Updated: May 9, 2016
1. About the ASA for Firepower 9300
The Firepower 9300 security appliance can include up to three security modules running the ASA application.
In Firepower eXtensible Operating System (FXOS) 1.1.3 and later, you can create an inter-chassis cluster to
include up to six ASAs across multiple chassis.
How the ASA Works with the Firepower 9300
The Firepower 9300 security appliance runs its own operating system on the supervisor called the Firepower
eXtensible Operating System (FXOS). You can configure hardware interface settings, smart licensing, and other
basic operating parameters on the supervisor using the Firepower Chassis Manager web interface or CLI.
All physical interface operations are owned by the supervisor, including establishing external EtherChannels. You
can create two types of interfaces: Data and Management. Only Management interfaces can be shared across
modules. You can assign interfaces to the ASA either at the time of deployment or later as needed. These
interfaces use the same IDs in the supervisor as in the ASA configuration. The Firepower 9300 delivers network
traffic to the ASA over internal backplane EtherChannels.
When you deploy the ASA, the supervisor downloads an ASA image of your choice, and establishes a default
configuration. You can deploy the ASA as either a standalone logical device, or as a cluster of ASAs. When you
use clustering, all modules in the chassis must belong to the cluster. For FXOS 1.1.2 and earlier, only intra-chassis
clustering is supported. FXOS 1.1.3 supports inter-chassis clustering.
You must install the ASA software on all modules in the chassis; different software types are not supported at this
time.
ASA Management
When you deploy the ASA, you can pre-configure a management interface and management client information,
so the deployed ASA allows ASDM access from that client.
You can also access the ASA CLI from the Firepower 9300 CLI using an internal Telnet connection. From within
the ASA, you can later configure SSH or Telnet access over any of its management or data interfaces.
Note: See Licensing Requirements for the Firepower 9300 ASA Security Module, page 2 for licensing
requirements for ASDM access.
Cisco Systems, Inc.
www.cisco.com
1
Cisco ASA for Firepower 9300 Quick Start Guide
2. Deploy the ASA
Licensing Requirements for the Firepower 9300 ASA Security Module
For the ASA on the Firepower 9300, Smart Software Licensing configuration is split between the Firepower 9300
supervisor and the ASA.

Firepower 9300—Configure all Smart Software Licensing infrastructure in the supervisor, including parameters
for communicating with the License Authority. The Firepower 9300 itself does not require any licenses to
operate.

ASA—Configure all license entitlements in the ASA, including the required Standard tier license. Other optional
licenses are also available. (FXOS 1.1.3 and later) The Strong Encryption license is automatically enabled for
qualified customers when you apply the registration token on the Firepower 9300, so no additional action is
required.
Note: For FXOS 1.1.2 and earlier, and for 1.1.3 and later Smart Software Manager satellite deployments, before
you can use ASDM (and features such as VPN) you must enable the Strong Encryption (3DES/AES) license by
requesting the entitlement within the ASA software. You must perform this task from the ASA CLI, which is
accessible from the FXOS CLI. For an evaluation license, you cannot receive a Strong Encryption license.
2. Deploy the ASA
You can deploy a standalone ASA or a cluster of ASAs using the Firepower Chassis Manager. For CLI procedures,
see the FXOS Configuration Guide.
Configure a Management Interface and Data Interfaces
Configure a Management type interface on the supervisor that you can include in the deployment configuration for
the ASA. You must also configure at least one Data type interface.
Procedure
1. Choose Interfaces to open the Interfaces page.
2. To add an EtherChannel:
a. Click Add Port Channel.
b. For the Port Channel ID, enter a value between 1 and 47.
c. Leave Enable checked.
d. For the Type, choose Management or Data. You can only include one management interface per logical
device. Do not choose Cluster.
e. Add member interfaces as desired.
f. Click OK.
3. For a single interface:
a. Click the Edit icon in the interface row to open the Edit Interface dialog box.
b. Check Enable.
c. For the Type, click Management or Data. You can only include one management interface per logical
device.
d. Click OK.
2
Cisco ASA for Firepower 9300 Quick Start Guide
2. Deploy the ASA
Deploy a Standalone ASA
Procedure
1. Choose Logical Devices to open the Logical Devices page.
2. Click Add Device to open the Add Device dialog box.
3. For the Device Name, provide a name for the logical device. This name is used by the Firepower 9300 to
configure management settings and assign interfaces; it is not the device name used in the ASA configuration.
4. For the Template, choose asa.
5. For the Image Version, choose the ASA software version.
6. For the Device Mode, click the Standalone radio button.
7. Click OK. You see the Provisioning - device name window.
8. Expand the Data Ports area, and ensure all of the interfaces are assigned to the ASA.
9. Click the device icon in the center of the screen. The ASA Configuration dialog box appears.
10. Configure the deployment options as prompted.
11. Click OK to close the ASA Configuration dialog box.
12. Click Save. The Firepower 9300 deploys the logical device by downloading the specified software version and
pushing the bootstrap configuration and management interface settings to the security engine.
Deploy an ASA Cluster
Procedure
1. Choose Logical Devices to open the Logical Devices page.
2. Click Add Device to open the Add Device dialog box.
3. For the Device Name, provide a name for the logical device. This name is used by the Firepower 9300
supervisor to configure clustering/management settings and assign interfaces; it is not the cluster or device
name used in the ASA configuration.
4. For the Template, choose asa.
5. For the Image Version, choose the ASA software version.
6. For the Device Mode, click the Cluster radio button.
7. Click OK. You see the Provisioning - device name window.
8. Expand the Data Ports area, and ensure all of the interfaces are assigned to the ASA.
9. Click the device icon in the center of the screen. The ASA Configuration dialog box appears.
10. Configure the deployment options as prompted.
Note: In the Management IP Pool field, configure a pool of Local IP addresses, one of which will be assigned
to each cluster unit for the interface, by entering the starting and ending addresses separated by a hyphen.
Include at least as many addresses as there are units in the cluster. If you plan to expand the cluster, include
additional addresses. The Virtual IP address (known as the Main cluster IP address) that belongs to the
current primary unit is not a part of this pool; be sure to reserve an IP address on the same network for the
virtual IP address. You can use IPv4 and/or IPv6 addresses.
11. Click OK to close the ASA Configuration dialog box.
3
Cisco ASA for Firepower 9300 Quick Start Guide
3. Access the ASA CLI
12. Click Save. The Firepower 9300 supervisor deploys the logical device by downloading the specified software
version and pushing the bootstrap configuration and management interface settings to the specified security
module(s).
13. For inter-chassis clustering, add the next chassis to the cluster:
a. On the first chassis Firepower Chassis Manager, click the Show Cluster Details icon at the top right.
b. Select and copy the displayed cluster configuration text.
c. Connect to the Firepower Chassis Manager on the next chassis, and add a logical device according to this
procedure.
d. Choose Join an Existing Cluster.
e. Click the Copy config check box, and click OK. If you uncheck this check box, you must manually enter
the settings to match the first chassis configuration.
f. In the Copy Cluster Details box, paste in the cluster configuration from the first chassis, and click OK.
g. Click the device icon in the center of the screen. The cluster information is pre-filled, except for the Chassis
ID; enter a unique chassis ID, and click OK.
h. Click Save.
3. Access the ASA CLI
For initial configuration or for troubleshooting, you may need to access the ASA CLI from the Firepower 9300
supervisor.
Procedure
1. Connect to the Firepower 9300 supervisor CLI, either from the console port or using SSH, for example.
2. Connect to the ASA.
connect module slot console
Example:
4
Cisco ASA for Firepower 9300 Quick Start Guide
3. Access the ASA CLI
Firepower> connect module 1 console
Firepower-module1>
For an ASA cluster, you need to access the primary unit for configuration. Refer to the Firepower Chassis
Manager Logical Devices screen to see which module is the primary unit, or use the ASA CLI to check.
3. The first time you connect to the module, you enter the FXOS module CLI. You must then connect to the
ASA application:
connect asa
Example:
Firepower-module1> connect asa
asa>
Subsequent connections place you directly in the ASA application.
4. Enter privileged EXEC (enable) mode, and then global configuration mode. By default, the enable password is
blank.
enable
configure terminal
Example:
asa> enable
Password:
asa# configure terminal
asa(config)#
5. If required, for an ASA cluster confirm that this module is the primary unit:
show cluster info
Example:
asa(config)# show cluster info
Cluster cluster1: On
Interface mode: spanned
This is "unit-1-2" in state MASTER
ID
: 2
Version
: 9.5(2)
Serial No.: FCH183770GD
CCL IP
: 127.2.1.2
CCL MAC
: 0015.c500.019f
Last join : 01:18:34 UTC Nov 4
Last leave: N/A
Other members in the cluster:
Unit "unit-1-3" in state SLAVE
ID
: 4
Version
: 9.5(2)
Serial No.: FCH19057ML0
CCL IP
: 127.2.1.3
CCL MAC
: 0015.c500.018f
Last join : 20:29:57 UTC Nov 4
Last leave: 20:24:55 UTC Nov 4
Unit "unit-1-1" in state SLAVE
ID
: 1
Version
: 9.5(2)
Serial No.: FCH19057ML0
CCL IP
: 127.2.1.1
CCL MAC
: 0015.c500.017f
Last join : 20:20:53 UTC Nov 4
2015
2015
2015
2015
5
Cisco ASA for Firepower 9300 Quick Start Guide
4. Configure ASA License Entitlements
Last leave:
Unit "unit-2-1"
ID
:
Version
:
Serial No.:
CCL IP
:
CCL MAC
:
Last join :
Last leave:
20:18:15 UTC Nov 4 2015
in state SLAVE
3
9.5(2)
FCH19057ML0
127.2.2.1
0015.c500.020f
20:19:57 UTC Nov 4 2015
20:24:55 UTC Nov 4 2015
If a different module is the primary unit, exit the connection and connect to the correct slot number. See below
for information about exiting the connection.
6. To exit the console connection, type ~. You exit to the Telnet application. Enter quit to exit to the supervisor
CLI.
4. Configure ASA License Entitlements
FXOS 1.1.2 and earlier; FXOS 1.1.3 with Smart Software Manager satellite
To run ASDM and other features such as VPN, you must have a Strong Encryption (3DES/AES) license. You must
request this license in the ASA configuration using the CLI.
Before You Begin
You must configure Cisco Smart Software Licensing on the Firepower 9300 supervisor before you configure
license entitlements on the ASA.
Procedure
1. Access the ASA CLI. See 3. Access the ASA CLI, page 4.
2. Enter license smart configuration mode:
license smart
Example:
ciscoasa(config)# license smart
ciscoasa(config-smart-lic)#
3. Set the feature tier:
feature tier standard
Only the standard tier is available. A tier license is a prerequisite for adding other feature licenses.
4. Request one or more of the following features:
— Strong Encryption (3DES)
feature strong-encryption
— ASA 9.5(1) and earlier: Mobile SP (GTP/GPRS)
feature mobile-sp
— ASA 9.5(2) and later: Carrier (Diameter, GTP/GPRS, SCTP)
feature carrier
— Security Contexts
feature context <1-248>
6
Cisco ASA for Firepower 9300 Quick Start Guide
5. Launch ASDM
5. Save the configuration:
write memory
5. Launch ASDM
ASDM includes many easy-to-use Wizards as well as a complete suite of individual ASA feature configuration
tools.
Before You Begin

See the ASDM release notes on Cisco.com for the requirements to run ASDM.

You must configure Cisco Smart Software Licensing on the Firepower 9300 supervisor before you can connect
to ASDM; the Strong Encryption (3DES/AES) is required to use ASDM. For FXOS 1.1.3 and later, the Strong
Encryption license is automatically enabled for qualified customers when you apply the registration token on
the Firepower 9300. For FXOS 1.1.2 and earlier, and for 1.1.3 and later Smart Software Manager satellite
deployments, see 4. Configure ASA License Entitlements, page 6.
Procedure
1. On the computer connected to the ASA, launch a web browser.
2. In the Address field, enter the following URL: https://ip_address/admin. The ip_address is the one you set for
the management interface when you deployed the ASA. The Cisco ASDM web page appears.
3. Click one of the available options: Install ASDM Launcher, Run ASDM, or Run Startup Wizard.
4. Follow the onscreen instructions to launch ASDM according to the option you chose. The Cisco ASDM-IDM
Launcher appears.
Note: If you click Install ASDM Launcher, for some Java 7 versions you need to install an identity certificate
for the ASA according to Install an Identity Certificate for ASDM.
5. Leave the username and password fields empty, and click OK. The main ASDM window appears.
6. Where to Go Next

You can find links to all ASA/ASDM documentation at Navigating the Cisco ASA Series Documentation.

See all Firepower 9300 documentation.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To
view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property
of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other
company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command
display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in
illustrative content is unintentional and coincidental.
© 2016 Cisco Systems, Inc. All rights reserved.
7
Cisco ASA for Firepower 9300 Quick Start Guide
6. Where to Go Next
8