- About This Guide
- Index
- Glossary
-
- Configuring IPSec and ISAKMP
- Configuring L2TP over IPSec
- Setting General VPN Parameters
- Configuring Tunnel Groups, Group Policies, and Users
- Configuring IP Addresses for VPN
- Configuring Remote Access VPNs
- Configuring Network Admission Control
- Configuring Easy VPN on the ASA 5505
- Configuring the PPPoE Client
- Configuring LAN-to-LAN VPNs
- Configuring Clientless SSL VPN
- Configuring AnyConnect VPN Client Connections
- Configuring AnyConnect Host Scan
Configuring Basic Settings
This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections:
Configuring the Hostname, Domain Name, and Passwords
This section describes how to change the device name and passwords, and includes the following topics:
- Changing the Login Password
- Changing the Enable Password
- Setting the Hostname
- Setting the Domain Name
Changing the Login Password
To change the login password, enter the following command:
Changing the Enable Password
To change the enable password, enter the following command:
Setting the Hostname
To set the hostname, enter the following command:
Setting the Domain Name
To set the domain name, enter the following command:
Setting the Date and Time
This section includes the following topics:
- Setting the Time Zone and Daylight Saving Time Date Range
- Setting the Date and Time Using an NTP Server
- Setting the Date and Time Manually
Setting the Time Zone and Daylight Saving Time Date Range
To change the time zone and daylight saving time date range, perform the following steps:
Setting the Date and Time Using an NTP Server
To obtain the date and time from an NTP server, perform the following steps:
Detailed Steps
|
|
|
|
||
|
Specifies an authentication key ID to be a trusted key, which is required for authentication with an NTP server. The key_id argument is a value between 1 and 4294967295. You can enter multiple trusted keys for use with multiple servers. |
|
ntp authentication-key key_id md5 key |
Sets a key to authenticate with an NTP server. The key_id argument is the ID you set in Step 2 using the ntp trusted-key command, and the key argument is a string up to 32 characters long. |
|
ntp server ip_address [ key key_id ] [ source interface_name ] [ prefer ] |
The key_id argument is the ID you set in Step 2 using the ntp trusted-key command. The source interface_name keyword-argument pair identifies the outgoing interface for NTP packets if you do not want to use the default interface in the routing table. Because the system does not include any interfaces in multiple context mode, specify an interface name defined in the admin context. The prefer keyword sets this NTP server as the preferred server if multiple servers have similar accuracy. NTP uses an algorithm to determine which server is the most accurate and synchronizes to that one. If servers are of similar accuracy, then the prefer keyword specifies which of those servers to use. However, if a server is significantly more accurate than the preferred one, the ASA uses the more accurate one. For example, the ASA uses a server of stratum 2 over a server of stratum 3 that is preferred. You can identify multiple servers; the ASA uses the most accurate server. Note In multiple context mode, set the time in the system configuration only. |
Setting the Date and Time Manually
To set the date and time manually, perform the following steps:
Detailed Steps
Configuring the Master Passphrase
This section describes how to configure the master passphrase and includes the following topics:
- Information About the Master Passphrase
- Licensing Requirements for the Master Passphrase
- Guidelines and Limitations
- Adding or Changing the Master Passphrase
- Disabling the Master Passphrase
- Recovering the Master Passphrase
- Feature History for the Master Passphrase
Information About the Master Passphrase
The master passphrase feature allows you to securely store plain text passwords in encrypted format. The master passphrase provides a key that is used to universally encrypt or mask all passwords, without changing any functionality. Features that implement the master passphrase include the following:
Licensing Requirements for the Master Passphrase
|
|
---|---|
Guidelines and Limitations
This section includes the guidelines and limitations for this feature.
Adding or Changing the Master Passphrase
This section describes how to add or change the master passphrase.
Prerequisites
- If failover is enabled but no failover shared key is set, an error message appears if you change the master passphrase, informing you that you must enter a failover shared key to protect the master passphrase changes from being sent as plain text.
- This procedure will only be accepted in a secure session, for example by console, SSH, or ASDM via HTTPS.
To add or change the master passphrase, perform the following steps:
Detailed Steps
|
|
|
---|---|---|
key config-key password-encryption [ new_passphrase [ old_passphrase ]] |
Sets the passphrase used for generating the encryption key. The passphrase must be between 8 and 128 characters long. All characters except a back space and double quotes are accepted for the passphrase. If you do not enter the new passphrase in the command, you are prompted for it. When you want to change the passphrase, you also have to enter the old passphrase. See the “Examples” section for examples of the interactive prompts. Note Use the interactive prompts to enter passwords to avoid having the passwords logged in the command history buffer. Use the no key config-key password-encrypt command with caution, because it changes the encrypted passwords into plain text passwords. You can use the no form of this command when downgrading to a software version that does not support password encryption. |
|
|
Enables password encryption. As soon as password encryption is turned on and the master passphrase is available, all the user passwords will be encrypted. The running configuration will show the passwords in the encrypted format. If the passphrase is not configured at the time that password encryption is enabled, the command will succeed in anticipation that the passphrase will be available in the future. If you later disable password encryption using the no password encryption aes command, all existing encrypted passwords are left unchanged, and as long as the master passphrase exists, the encrypted passwords will be decrypted, as required by the application. |
|
|
Saves the runtime value of the master passphrase and the resulting configuration. If you do not enter this command, passwords in startup configuration may still be visible if they were not saved with encryption before. In addition, in multiple context mode the master passphrase is changed in the system context configuration. As a result, the passwords in all contexts will be affected. If the write memory command is not entered in the system context mode, but not in all user contexts, then the encrypted passwords in user contexts may be stale. Alternatively, use the write memory all command in the system context to save all configurations. |
Examples
In the following configuration example, no previous key is present:
In the following configuration example, a key already exists:
In the following configuration example, you want to key in interactively, but a key already exists. The Old key, New key, and Confirm key prompts will appear on your screen if you enter the key config-key password-encryption command and press Enter to access interactive mode.
In the following example, you want to key in interactively, but no key is present. The New key and Confirm key prompts will appear on your screen if you are in interactive mode.
Disabling the Master Passphrase
Disabling the master passphrase reverts encrypted passwords into plain text passwords. Removing the passphrase might be useful if you downgrade to a previous software version that does not support encrypted passwords.
Prerequisites
- You must know the current master passphrase to disable it. If you do not know the passphrase, see the “Recovering the Master Passphrase” section.
- This procedure will only be accepted in a secure session, that is, by Telnet, SSH, or ASDM via HTTPS.
Detailed Steps
Recovering the Master Passphrase
You cannot recover the master passphrase.
If the master passphrase is lost or unknown, you can remove it using the write erase command followed by the reload command. These commands remove the master key and the configuration that includes the encrypted passwords.
Feature History for the Master Passphrase
Table 10-1 lists each feature change and the platform release in which it was implemented.
Configuring the DNS Server
Some ASA features require use of a DNS server to access external servers by domain name; for example, the Botnet Traffic Filter feature requires a DNS server to access the dynamic database server and to resolve entries in the static database. Other features, such as the ping or traceroute command, let you enter a name that you want to ping or traceroute, and the ASA can resolve the name by communicating with a DNS server. Many SSL VPN and certificate commands also support names.
Note The ASA has limited support for using the DNS server, depending on the feature. For example, most commands require you to enter an IP address and can only use a name when you manually configure the name command to associate a name with an IP address and enable use of the names using the names command.
For information about dynamic DNS, see the “Configuring DDNS” section.
Prerequisites
Make sure that you configure the appropriate routing for any interface on which you enable DNS domain lookup so you can reach the DNS server. See the “Information About Routing” section for more information about routing.
Detailed Steps
Monitoring DNS Cache
The ASA provides a local cache of DNS information from external DNS queries that are sent for certain clientless SSL VPN and certificate commands. Each DNS translation request is first looked for in the local cache. If the local cache has the information, the resulting IP address is returned. If the local cache can not resolve the request, a DNS query is sent to the various DNS servers that have been configured. If an external DNS server resolves the request, the resulting IP address is stored in the local cache with its corresponding hostname.
DNS Cache Monitoring Commands
To monitor the DNS cache, enter the following command:
|
|
---|---|
Show the DNS cache, which includes dynamically learned entries from a DNS server as well as manually entered name and IP addresses using the name command. |
Feature History for DNS Cache
Table 2 lists each feature change and the platform release in which it was implemented.
|
|
|
---|---|---|
DNS cache stores responses that allow a DNS server to respond more quickly to queries. |