Cisco Small Business ISA500 Series Security Appliances Administration Guide (HTML)
Getting Started

Table Of Contents

Getting Started

Introduction

Product Overview

Front Panel

Back Panel

Getting Started with the Configuration Utility

Logging in to the Configuration Utility

Navigating Through the Configuration Utility

Using the Help System

Configuration Utility Icons

Factory Default Settings

Default Settings of Key Features

Restoring the Factory Default Settings

Performing Basic Configuration Tasks

Changing the Default Administrator Password

Upgrading your Firmware After your First Login

Backing Up Your Configuration


Getting Started


This chapter provides an overview of the Cisco ISA500 Series Integrated Security Appliance and describes basic configuration tasks to help you configure your security appliance. It includes the following sections:

Introduction

Product Overview

Getting Started with the Configuration Utility

Factory Default Settings

Performing Basic Configuration Tasks


NOTE For information about how to physically install your security appliance, see the Cisco ISA500 Series Integrated Security Appliances Quick Start Guide at: www.cisco.com/go/isa500resources.


Introduction

Thank you for choosing the Cisco ISA500 Series Integrated Security Appliance, a member of the Small Business Family. The ISA500 Series is a set of Unified Threat Management (UTM) security appliances that provide business-class security gateway solutions with dual WAN, DMZ, zone-based firewall, site-to-site and remote access VPN (including IPsec Remote Access, Teleworker VPN Client, and SSL VPN) support, and Internet threat protection, such as Intrusion Prevention (IPS), Anti-Virus, Application Control, Web URL Filtering, Web Reputation Filtering, Spam Filter, and Network Reputation. The ISA550W and ISA570W include 802.11b/g/n access point capabilities.

The following table lists the available model numbers.

Model
Description
Configuration
ISA550

Cisco ISA550 Integrated Security Appliance

1 WAN port, 2 LAN ports, 4 configurable ports, and 1 USB 2.0 port

ISA550W

Cisco ISA550 Integrated Security Appliance with Wi-Fi

1 WAN port, 2 LAN ports, 4 configurable ports, 1 USB 2.0 port, and 802.11b/g/n

ISA570

Cisco ISA570 Integrated Security Appliance

1 WAN port, 4 LAN ports, 5 configurable ports, and 1 USB 2.0 port

ISA570W

Cisco ISA570 Integrated Security Appliance with Wi-Fi

1 WAN port, 4 LAN ports, 5 configurable ports, 1 USB 2.0 port, and 802.11b/g/n



NOTE Any configurable port can be configured to be a WAN, DMZ, or LAN port. Only one configurable port can be configured as a WAN port at a time. Up to 4 configurable ports can be configured as DMZ ports.


Product Overview

Before you use the security appliance, become familiar with the lights on the front panel and the ports on the rear panel.

Front Panel

Back Panel

Front Panel

ISA550 Front Panel

ISA550W Front Panel

ISA570 Front Panel

ISA570W Front Panel

Front Panel Lights

The following table describes the lights on the front panel of the security appliance. These lights are used for monitoring system activity.

Light
Description
POWER/SYS

Indicates the power and system status.

Solid green when the system is powered on and is operating normally.

Flashes green when the system is booting.

Solid amber when the system has a booting problem, a device error occurs, or the system has a problem.

VPN

Indicates the site-to-site VPN connection status.

Solid green when there are active site-to-site VPN connections.

Flashes green when attempting to establish a site-to-site VPN tunnel.

Flashes amber when the system is experiencing problems setting up a site-to-site VPN connection and there is no VPN connection.

USB

Indicates the USB device status.

Solid green when a USB device is detected and is operating normally.

Flashes green when the USB device is transmitting and receiving data.

WLAN
(ISA550W and ISA570W only)

Indicates the WLAN status.

Solid green when the WLAN is up.

Flashes green when the WLAN is transmitting and receiving data.

SPEED

Indicates the traffic rate of the associated port.

Off when the traffic rate is 10 or 100 Mbps.

Solid green when the traffic rate is 1000 Mbps.

LINK/ACT

Indicates that a connection is being made through the port.

Solid green when the link is up.

Flashes green when the port is transmitting and receiving data.


Back Panel

The back panel is where you connect the network devices. The ports on the panel vary depending on the model.

ISA550 and ISA550W Back Panel

ISA570 and ISA570W Back Panel

Back Panel Descriptions

Feature
Description
ANT01/ANT02

Threaded connectors for the antennas (for ISA550W and ISA570W only).

USB Port

Connects the unit to a USB device. You can use a USB device to save and restore system configuration, or to upgrade the firmware.

Configurable Ports

Can be set to operate as WAN, LAN, or DMZ ports. ISA550 and ISA550W have 4 configurable ports. ISA570 and ISA570W have 5 configurable ports.

NOTE: Only one configurable port can be configured as a WAN port at a time. Up to 4 configurable ports can be configured as DMZ ports.

LAN Ports

Connects PCs and other network appliances to the unit. ISA550 and ISA550W have 2 dedicated LAN ports. ISA570 and ISA570W have 4 dedicated LAN ports.

WAN Port

Connects the unit to a DSL or a cable modem, or other WAN connectivity device.

RESET Button

To reboot the unit, push and release the RESET button for less than 3 seconds.

To restore the unit to its factory default settings, push and hold the RESET button for more than 3 seconds while the unit is powered on and the POWER/SYS light is solid green. The POWER/SYS light will flash green when the system is rebooting.

Power Switch

Powers the unit on or off.

Power Connector

Connects the unit to power using the supplied power cord and adapter.


Getting Started with the Configuration Utility

The ISA500 Series Configuration Utility is a web-based device manager that is used to provision the security appliance. To use this utility, you must be able to connect to the security appliance from a PC or laptop. You can access the Configuration Utility by using the following web browsers:

Microsoft Internet Explorer 8 and 9

Mozilla Firefox 3.6.x, 5, and 6


NOTE The minimum recommended display resolution for the PC running the Web browser used to access the Configuration Utility is 1024 x 768.


This section includes the following topics:

Logging in to the Configuration Utility

Navigating Through the Configuration Utility

Using the Help System

Configuration Utility Icons

Logging in to the Configuration Utility


STEP 1 Connect your computer to an available LAN port on the back panel.

Your PC will become a DHCP client of the security appliance and will receive an IP address in the 192.168.75.x range.

STEP 2 Start a web browser. In the address bar, enter the default IP address of the security appliance: 192.168.75.1.

NOTE: The above address is the factory default LAN address. If you change this setting, enter the new IP address to connect to the Configuration Utility.

STEP 3 When the login page opens, enter the username and password.

The default username is cisco. The default password is cisco. Usernames and passwords are case sensitive.

STEP 4 Click Login.

STEP 5 For security purposes, you must change the default password of the default administrator account. Set a new administrator password and click OK.

STEP 6 If you can access the Internet and a newer firmware is detected, the Firmware Upgrade window opens. Follow the on-screen prompts to download and install the firmware. See Upgrading your Firmware After your First Login.

STEP 7 If you cannot access the Internet or you are using the latest firmware, the Setup Wizard will now launch. Follow the on-screen prompts to complete the initial configuration. See Using the Setup Wizard for the Initial Configuration.


Navigating Through the Configuration Utility

Use the left hand navigation pane to perform the tasks in the Configuration Utility.

Number
Component
Description

1

Left Hand Navigation Pane

The left hand navigation pane provides easy navigation through the configurable features. The main branches expand to provide the features. Click the main branch title to expand its contents. Click the triangle next to a feature to expand or contract its sub-features. Click the title of a feature or sub-feature to open it.

2

Main Content

The main content of the feature or sub-feature appears in this area.


Using the Help System

The Configuration Utility provides a context-sensitive help file for all configuration tasks. To view the Help page, click the Help link in the top right corner of the screen. A new window opens with information about the page that you are currently viewing.

Configuration Utility Icons

The Configuration Utility has icons for commonly used configuration options. The following table describes these icons:

Icon
Description
Action

Add icon

Add an entry.

Edit icon

Edit an entry.

Duplicate icon

Create a copy of an existing entry.

Delete icon

Delete an entry or delete multiple selected entries.

Move icon

Move an item to a specific location.

Move down icon

Move an item down one position.

Move up icon

Move an item up one position.

Expand triangle icon

Expand the sub-features of a feature in the left navigation pane or expand the items under a category.

Contract triangle icon

Contract the sub-features of a feature in the left navigation pane or contract the items under a category.

Connect icon

Establish a VPN connection.

Disconnect or Logout icon

Terminate a VPN connection or an active user session.

Forced Authorized icon

Disable 802.1x access control and cause the port to transition to the authorized state without any authentication exchange required.

Forced Unauthorized icon

Cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.

Auto icon

Enable 802.1x access control and cause the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port.

Import PC icon

Import a local certificate or a CA certificate from PC.

Export to USB or Import from USB icon

Export a local certificate, a CA certificate, or a Certificate Signing Request to a USB key, or import a local certificate or a CA certificate from a USB key.

Details icon

View the details of a certificate or a Certificate Signing Request.

Download icon

Download a local certificate, a CA certificate, or a Certificate Signing Request to PC.

Upload icon

Upload a signed certificate for the Certificate Signing Request from PC.

Install or Renew icon

Install the security license.

Refresh icon

Refresh the data.

Reset icon

Reset the device to the factory defaults, or renew the security license.

Check for Updates Now icon

Check for new signature updates from Cisco's signature server immediately.

Credentials icon

View the device credentials.

Email Alerts icon

View or configure the email alert settings.


Factory Default Settings

The security appliance is preconfigured with settings to allow you to start using the device with minimal changes. Depending on the requirements of your Internet Service Provider (ISP) and the needs of your business, you may need to modify some of these settings. You can use the Configuration Utility to customize all settings, as needed.

This section includes the following topics:

Default Settings of Key Features

Restoring the Factory Default Settings

Default Settings of Key Features

The default settings of key features are described below. For a full list of all factory default settings, see Factory Default Settings.

IP Routing Mode: By default, only the IPv4 mode is enabled. To support IPv4 and IPv6 addressing, enable the IPv4/IPv6 mode. See Configuring IPv4 or IPv6 Routing, page 116.

WAN Configuration: By default, the security appliance is configured to obtain an IP address from your ISP using Dynamic Host Configuration Protocol (DHCP). Depending on the requirement of your ISP, configure the network addressing mode for the primary WAN. You can change other WAN settings as well. See Configuring WAN Settings for Your Internet Connection, page 122.

LAN Configuration: By default, the LAN of the security appliance is configured in the 192.168.75.0 subnet and the LAN IP address is 192.168.75.1. The security appliance acts as a DHCP server to the hosts on the LAN network. It can automatically assign IP addresses and DNS server addresses to the PCs and other devices on the LAN. For most deployment scenarios, the default DHCP and TCP/IP settings should be satisfactory. However, you can change the subnet address or the default IP address. See Configuring a VLAN, page 137.

VLAN Configuration: The security appliance predefines a native VLAN (DEFAULT) and a guest VLAN (GUEST). You can customize the predefined VLANs or create new VLANs for your specific business needs. See Configuring a VLAN, page 137.

Configurable Ports: Any configurable port can be configured to be a WAN, DMZ, or LAN port. By default, all configurable ports are set to be LAN ports. Only one configurable port can be configured as a WAN port at a time (See Configuring the WAN, page 122). Up to four configurable ports can be configured as DMZ ports (see Configuring DMZ, page 141).

Wireless Network (for ISA550W and ISA570W only): ISA550W and ISA570W are configured with four SSIDs. All SSIDs are disabled by default. For security purposes, we strongly recommend that you configure the SSIDs with the appropriate security settings. See Wireless (for ISA550W and ISA570W only), page 206.

Administrative Access: You can access the Configuration Utility by using a web browser from the LAN side and entering the default LAN IP address of 192.168.75.1. You can log on by entering the username (cisco) and password (cisco) of the default administrator account. To prevent unauthorized access, you must immediately change the administrator password at the first login and are encouraged to change the username for the default administrator account. See Changing the Default Administrator Password.

Security Services: By default, the security services such as Intrusion Prevention (IPS), Anti-Virus, Application Control, Web URL Filtering, Web Reputation Filtering, and Spam Filter are disabled. See Chapter 7, "Security Services."

Firewall: By default, the firewall prevents inbound traffic and allows all outbound traffic. If you want to allow some inbound traffic or prevent some outbound traffic, you must customize firewall rules. Up to 100 custom firewall rules can be configured on the security appliance. See Configuring Firewall Rules to Control Inbound and Outbound Traffic, page 252.

VPN: By default, the VPN feature is disabled. The security appliance can function as an IPsec VPN server, a Teleworker VPN client, or as a SSL VPN gateway so that remote users can securely access the corporate network resources over the VPN tunnels. You can also establish a secure IPsec VPN tunnel between two sites that are physically separated by using the Site-to-Site VPN feature. See VPN.

Restoring the Factory Default Settings

To restore the factory defaults, choose one of the following actions:

Press and hold the RESET button on the back panel of the unit for more than 3 seconds while the unit is powered on and the POWER/SYS light is solid green. Release the button and wait for the unit to reboot. The POWER/SYS light will flash green when the system is rebooting.

Or launch the Configuration Utility and login. Click Device Management > Reboot/Reset in the left hand navigation pane. In the Reset Device area, click Reset to Factory Defaults.

After a restore to factory defaults, the following settings apply:

Parameter
Default Value

Username

cisco

Password

cisco

LAN IP

192.168.75.1

DHCP Range

192.168.75.100 to 200


Performing Basic Configuration Tasks

We recommend that you complete the following tasks before you configure the security appliance:

Changing the Default Administrator Password

Upgrading your Firmware After your First Login

Backing Up Your Configuration

Changing the Default Administrator Password

The default administrator account ("cisco") has full privilege to set the configuration and read the system status. For security purposes, you must change the default administrator password at the first login.


STEP 1 Enter the following information:

User name: Enter the current username or enter a new username if you want to change the default username.

New password: Enter a new administrator password. Passwords are case sensitive.

NOTE: A password requires a minimum of 8 characters, including at least three of these character classes: uppercase letters, lowercase letters, digits, and special characters. Do not repeat any password more than three times in a row. Do not set the password as the username or "cisco." Do not capitalize or spell these words backwards.

Confirm password: Enter the new administrator password again for confirmation.

STEP 2 Click OK to save your settings.


Upgrading your Firmware After your First Login

The security appliance uses a built-in IDA client to query the firmware from Cisco's IDA server. If a newer firmware is detected after you log in to the Configuration Utility for the first time, we recommend that you upgrade your firmware to the latest version before you do any other tasks. This feature requires that you have an active WAN connection to access the Internet.


STEP 1 Log in to the Configuration Utility for the first time and change the default administrator password. See Logging in to the Configuration Utility.

If newer firmware is detected, the Firmware Upgrade window opens. The version number for the firmware that you are currently using and the version number for the latest firmware that is detected are displayed.

STEP 2 Enter your Cisco.com account credentials in the Username and Password fields.

A valid Cisco.com account is required to download and install the firmware from Cisco.com. If you do not have one, go to this page:
https:// tools.cisco.com/RPF/register/register.do
Then click the Create a Cisco.com Account link to register a Cisco.com account.

NOTE: Skip this step if your Cisco.com account credentials are already configured on the security appliance.

STEP 3 Click Continue.

NOTE: You can click Install Later to upgrade the firmware later. An Upgrade Available link will be displayed at the top right corner of the screen and the Setup Wizard will now launch. We strongly recommend that you upgrade the firmware immediately.

STEP 4 Validate your Cisco.com account credentials through the Internet. If your Cisco.com account credentials are valid, the security appliance starts downloading and installing the firmware. This process will take several minutes.

STEP 5 The security appliance reboots after the firmware is upgraded. You will be redirected to the login screen when the security appliance boots up.

STEP 6 Log in to the Configuration Utility again. The Setup Wizard will launch. Follow the on-screen prompts to complete the initial configuration. See Using the Setup Wizard for the Initial Configuration.



NOTE Other options to upgrade the firmware:

If you cannot access the Internet after you log in to the Configuration Utility for the first time, you can use the Setup Wizard to configure your Internet connection and then automatically check for firmware updates after the Setup Wizard is complete. The Setup Wizard also allows you to manually upgrade the firmware from a firmware image stored on your local PC. See Using the Setup Wizard for the Initial Configuration.

You can manually upgrade the firmware from a firmware image stored on your PC or on a USB device. You must first download the latest firmware image from Cisco.com and save it to your local PC or to a USB device. See Upgrading Firmware from a PC or a USB Device, page 437.

The security appliance automatically checks for firmware updates from Cisco's IDA server every 24 hours. You can upgrade your firmware to the latest version if a newer firmware is available on Cisco.com. This feature requires that you have an active WAN connection and a valid Cisco.com account is configured on the security appliance in advance. See Upgrading your Firmware from Cisco.com, page 436.

Backing Up Your Configuration

At any point during the configuration process, you can back up your configuration. Later, if you make changes that you want to abandon, you can easily restore the saved configuration. See Backing Up and Restoring a Configuration, page 416.