Asav Quick
Asav Quick
Asav Quick
www.cisco.com
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs
public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples,
command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP
addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies are considered un-Controlled copies and the original on-line version should be referred to for latest version.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does
not imply a partnership relationship between Cisco and any other company. (1110R)
2014 Cisco Systems, Inc. All rights reserved.
Clustering
Active/Active failover
EtherChannels
www.cisco.com
License Requirement
ASAv5
Standard license
See the following specifications:
ASAv10
1 vCPU
2 GB RAM
Standard license
See the following specifications:
ASAv30
1 Gbps Throughput
1 vCPU
2 GB RAM
Standard license
See the following specifications:
2 Gbps Throughput
4 vCPUs
8 GB RAM
Note: If you choose to deploy 2 or 3 vCPUs, then see the following values:
2 vCPUs4 GB RAM, vCPU Frequency Limit of 10000 MHz, 250,000 concurrent firewall connections.
3 vCPUs4 GB RAM, vCPU Frequency Limit of 15000 MHz, 350,000 concurrent firewall connections.
Note: You must install a smart license on the ASAv. Until you install a license, throughput is limited to 100 Kbps so you
can perform preliminary connectivity tests. A smart license is required for regular operation.
9.3(1)
Model
License Requirement
ASAv10
Premium license: 250 SSL VPN sessions, Advanced Endpoint Assessment, AnyConnect for Cisco
VPN Phone, AnyConnect for Mobile.
ASAv30
1 Virtual CPU
2 GB RAM
Premium license: 750 SSL VPN sessions, Advanced Endpoint Assessment, AnyConnect for Cisco
VPN Phone, AnyConnect for Mobile.
4 Virtual CPUs
8 GB RAM
Note: If you apply an ASAv30 license, but choose to deploy 2 or 3 vCPUs, then see the following
values:
2 Virtual CPUs4 GB RAM, vCPU Frequency Limit of 10000 MHz, 250,000 concurrent firewall
connections.
3 Virtual CPUs4 GB RAM, vCPU Frequency Limit of 15000 MHz, 350,000 concurrent firewall
connections.
Note: You must install a model license on the ASAv. Until you install a license, throughput is limited to 100 Kbps so you
can perform preliminary connectivity tests. A model license is required for regular operation.
Feature
Description
Support
(Yes/No)
Comment
Cold clone
Yes
DRS
Yes
Hot add
Yes
Hot clone
No
Hot removal
Yes
Snapshot
Yes
Suspend and
resume
Yes
vCloud Director
No
VM migration
Yes
vMotion
Yes
VMware FT
No
VMware HA
Yes
www.cisco.com
Table 1
Feature
Description
Support
(Yes/No)
Comment
VMware HA with
VM heartbeats
No
VMware vSphere
Standalone
Windows Client
Yes
VMware vSphere
Web Client
Yes
You may need to modify these settings for the following ASAv configurations.
Table 2
Security Exception
No Failover
Failover
No Failover
Failover
Promiscuous Mode
<Any>
<Any>
Accept
Accept
<Any>
Accept
<Any>
Accept
Forged Transmits
<Any>
Accept
Accept
Accept
IPv6 Guidelines
You cannot specify IPv6 addresses for the management interface when you first deploy the ASAv OVA file using the
VMware vSphere Web Client; you can later add IPv6 addressing using ASDM or the CLI.
Additional Guidelines and Limitations
The ASAv OVA deployment does not support localization (installing the components in non-English mode). Be sure
that the VMware vCenter and the LDAP servers in your environment are installed in an ASCII-compatible mode.
You must set your keyboard to United States English before installing the ASAv and for using the VM console.
The memory allocated to the ASAv is sized specifically for the number of vCPUs you choose when you deploy (for
9.3(2) and later, vCPUs are determined by the Throughput Level). Do not change the memory setting or any vCPU
hardware settings in the Edit Settings dialog box unless you are requesting a license for a different number of vCPUs
or Throughput Level. Under-provisioning can affect performance, and over-provisioning causes the ASAv to warn
you that it will reload; after a waiting period (24 hours for 100-125% over-provisioning; 1 hour for 125% and up), the
ASAv will reload.
Note: If you need to change the memory or vCPU hardware settings, use only the values documented in Licensing
for the ASAv, page 4. Do not use the VMware-recommended memory configuration minimum, default, and
maximum values.
Use the ASAv show vm and show cpu commands or the ASDM Home > Device Dashboard > Device Information
> Virtual Resources tab or the Monitoring > Properties > System Resources Graphs > CPU pane to view the
resource allocation and any resources that are over- or under-provisioned.
During ASAv deployment, if you have a host cluster, you can either provision storage locally (on a specific host) or
on a shared host. However, if you try to vMotion the ASAv to another host, using any kind of storage (SAN or local)
causes an interruption in connectivity.
The vSphere Web Client is not supported for ASAv OVA deployment; use the vSphere client instead.
Deployment fields might be duplicated; fill out the first instance of any given field and ignore the duplicated fields.
Access the vSphere Web Client and Install the Client Integration Plug-In
This section describes how to access the vSphere Web Client. This section also describes how to install the Client
Integration Plug-In, which is required for ASAv console access. Some Web Client features (including the plug-in) are not
supported on the Macintosh. See the VMware website for complete client support information.
You can also choose to use the standalone vSphere Client, but this guide only describes the Web Client.
Procedure
1. Launch the VMware vSphere Web Client from your browser:
https://vCenter_server:port/vsphere-client/
b. Close your browser and then install the plug-in using the installer.
c. After the plug-in installs, reconnect to the vSphere Web Client.
3. Enter your username and password, and click Login, or check the Use Windows session authentication check box
(Windows only).
10
Network Adapter ID
ASAv Interface ID
Network Adapter 1
Management0/0
Network Adapter 2
GigabitEthernet0/0
Network Adapter 3
GigabitEthernet0/1
Network Adapter 4
GigabitEthernet0/2
Network Adapter 5
GigabitEthernet0/3
Network Adapter 6
GigabitEthernet0/4
Network Adapter 7
GigabitEthernet0/5
Network Adapter 8
GigabitEthernet0/6
Network Adapter 9
GigabitEthernet0/7
Network Adapter 10
GigabitEthernet0/8
You do not need to use all ASAv interfaces; however, the vSphere Web Client requires you to assign a network to all
interfaces. For interfaces you do not intend to use, you can simply leave the interface disabled within the ASAv
configuration. After you deploy the ASAv, you can optionally return to the vSphere Web Client to delete the extra
interfaces from the Edit Settings dialog box. For more information, see the vSphere Web Client online help.
Note: For failover/HA deployments, GigabitEthernet 0/8 is pre-configured as the failover interface.
7. (9.3(2) and Later) If your network uses an HTTP proxy for Internet access, you must configure the proxy address for
smart licensing in the Smart Call Home Settings area. This proxy is also used for Smart Call Home in general.
8. For failover/HA deployments, in the Customize template screen:
Specify the standby management IP address.
When you configure your interfaces, you must specify an active IP address and a standby IP address on the same
network. When the primary unit fails over, the secondary unit assumes the IP addresses and MAC addresses of
the primary unit and begins passing traffic. The unit that is now in a standby state takes over the standby IP
addresses and MAC addresses. Because network devices see no change in the MAC to IP address pairing, no
ARP entries change or time out anywhere on the network.
Configure the failover link settings in the HA Connection Settings area.
11
The two units in a failover pair constantly communicate over a failover link to determine the operating status of
each unit. GigabitEthernet 0/8 is pre-configured as the failover link. Enter the active and standby IP addresses
for the link on the same network.
9. After you complete the wizard, the vSphere Web Client processes the VM; you can see the Initialize OVF
deployment status in the Global Information area Recent Tasks pane.
When it is finished, you see the Deploy OVF Template completion status.
The ASAv VM instance then appears under the specified data center in the Inventory.
12
10. If the ASAv VM is not yet running, click Power on the virtual machine.
Wait for the ASAv to boot up before you try to connect with ASDM or to the console. When the ASAv starts up for
the first time, it reads parameters provided through the OVA file and adds them to the ASAv system configuration. It
then automatically restarts the boot process until it is up and running. This double boot process only occurs when
you first deploy the ASAv. To view bootup messages, access the ASAv console by clicking the Console tab.
11. For failover/HA deployments, repeat this procedure to add the secondary unit. See the following guidelines:
(9.3(1)) Set the same number of vCPUs as the primary unit. (9.3(2)) Set the same throughput level as the primary
unit.
Enter the exact same IP address settings as for the primary unit. The bootstrap configurations on both units are
identical except for the parameter identifying a unit as primary or secondary.
Note: (9.3(2) and later) To successfully register the ASAv with the Cisco Licensing Authority, the ASAv requires Internet
access. You might need to perform additional configuration after deployment to achieve Internet access and successful
license registration.
13
This prompt indicates that you are in user EXEC mode. Only basic commands are available from user EXEC mode.
3. Access privileged EXEC mode:
ciscoasa> enable
4. Press the Enter key to continue. By default, the password is blank. If you previously set an enable password, enter
it instead of pressing Enter.
The prompt changes to:
ciscoasa#
All non-configuration commands are available in privileged EXEC mode. You can also enter configuration mode from
privileged EXEC mode.
To exit privileged mode, enter the disable, exit, or quit command.
5. Access global configuration mode:
ciscoasa# configure terminal
You can begin to configure the ASAv from global configuration mode. To exit global configuration mode, enter the
exit, quit, or end command.
14
The ASAv stops sending to the vSphere console, and instead sends to the serial console.
4. Telnet to the vSphere host IP address and the port number you specified when you added the serial port; or Telnet
to the vSPC IP address and port.
FailoverIn the vSphere Web Client, power off the standby ASAv. For example, click the ASAv and then click
Power Off the virtual machine, or right-click the ASAv and choose Shut Down Guest OS.
No FailoverIn the vSphere Web Client, power off the ASAv. For example, click the ASAv and then click Power
Off the virtual machine, or right-click the ASAv and choose Shut Down Guest OS.
15
4. Click the ASAv and then click Edit Virtual machine settings (or right-click the ASAv and choose Edit Settings).
The Edit Settings dialog box appears.
5. Refer to the CPU/frequency/memory requirement in Licensing for the ASAv, page 4 to determine the correct values
for the new vCPU license.
6. On the Virtual Hardware tab, for the CPU, choose the new value from the drop-down list. You must also click the
expand arrow to change the value for the vCPU frequency Limit.
7. For the Memory, enter the new value for the RAM.
8. Click OK.
9. Power on the ASAv. For example, click Power On the Virtual Machine.
10. For failover pairs:
a. Open a console to the active unit or Launch ASDM on the active unit.
b. After the standby unit finishes starting up, failover to the standby unit:
- ASDM: Choose Monitoring > Properties > Failover > Status, and clicking Make Standby.
- CLI:
ciscoasa# no failover active
16
10.1.1.2
g0/0
ASAv
198.51.100.2
g0/1
192.168.1.2
m0/0
Linux Guest
Inside
192.168.1.3
eth0
Inside
Network
Linux Guest
Outside
Mgmt
Network
Outside
Network
198.51.100.3
eth0
KVM
Linux
virbr2
10.1.1.10
virbr3
198.51.100.10
virbr1
192.168.1.10
eth0
10.15.2.30
Linux Host
17
www.cisco.com
373011
10.1.1.3
eth0
Linux Guest
Mgmt
Download the ASAv qcow2 file from Cisco.com and put it on your Linux host:
Note: A Cisco.com login and Cisco service contract are required.
For the purpose of the sample deployment in this document, we are assuming you are using Ubuntu 14.04 LTS. Install
the following packages on top of the Ubuntu 14.04 LTS host:
qemu-kvm
libvirt-bin
bridge-utils
virt-manager
virtinst
virsh tools
genisoimage
Performance is affected by the host and its configuration. You can maximize the throughput of the ASAv on KVM by
tuning your host. For generic host-tuning concepts, see Network Function Virtualization Packet Processing
Performance of Virtualized Platforms with Linux and Intel Architecture.
macvtapHigh performance Linux bridge; you can use macvtap instead of a Linux bridge. Note that you must
configure specific settings to use macvtap instead of the Linux bridge.
Transparent Huge PagesIncreases memory page size and is on by default in Ubuntu 14.04.
txqueuelengthIncreases the default txqueuelength to 4000 packets and reduces drop rate.
pinningPins qemu and vhost processes to specific CPU cores; under certain conditions, pinning is a significant
boost to performance.
For information on optimizing a RHEL-based distribution, see Red Hat Enterprise Linux6 Virtualization Tuning and
Optimization Guide.
18
2. (Optional) Download the Smart License identity token file issued by the Cisco Smart Software Manager to your
computer.
3. (Optional) Copy the ID token from the download file and put it a text file that only contains the ID token.
4. (Optional) For automated licensing during initial ASAv deployment, make sure the following information is in the
day0-config file:
A route command that enables connectivity to the HTTP proxy (if specified) or to tools.cisco.com
Smart Licensing configuration specifying the ASAv license you are requesting
(Optional) A unique host name to make the ASAv easier to find in CSSM
5. Generate the virtual CD-ROM by converting the text file to an ISO file:
stack@user-ubuntu:-/KvmAsa$ sudo genisoimage -r -o day0.iso day0-config idtoken
I: input-charset not specified, using utf-8 (detected in locale settings)
Total translation table size: 0
Total rockridge attributes bytes: 252
Total directory bytes: 0
Path table size (byptes): 10
Max brk space used 0
176 extents written (0 MB)
stack@user-ubuntu:-/KvmAsa$
The Identity Token automatically registers the ASAv with the Smart Licensing server.
6. Repeat Steps 1 through 3 to create separate default configuration files with the appropriate IP addresses for each
ASAv you want to deploy.
19
Prepare the virtual bridge XML files on the KVM host. For the sample virtual network topology described in Prepare the
Default Configuration File, page 18, you need the following three virtual bridge files: virbr1.xml, virbr2.xml, and virbr3.xml
(you must use these three filenames; for example, virbr0 is not allowed because it already exists). Each file has the
information needed to set up the virtual bridges. You must give the virtual bridge a name and a unique MAC address.
Providing an IP address is optional.
Procedure
1. Create three virtual networks bridge XML files:
virbr1.xml:
<network>
<name>virbr1</name>
<bridge name='virbr1' stp='on' delay='0' />
<mac address='52:54:00:05:6e:00' />
<ip address='192.168.1.10' netmask='255.255.255.0' />
</network>
virbr2.xml:
<network>
<name>virbr2</name>
<bridge name='virbr2' stp='on' delay='0' />
<mac address='52:54:00:05:6e:01' />
<ip address='10.1.1.10' netmask='255.255.255.0' />
</network>
virbr3.xml:
<network>
<name>virbr3</name>
<bridge name='virbr3' stp='on' delay='0' />
<mac address='52:54:00:05:6e:02' />
<ip address='198.51.100.10' netmask='255.255.255.0' />
</network>
2. Create a script that contains the following (in our example, we will name the script virt_network_setup.sh):
virsh net-create virbr1.xml
virsh net-create virbr2.xml
virsh net-create virbr3.xml
3. Run this script to setup the virtual network. The script brings the virtual networks up. The networks stay up as long
as the KVM host is running.
stack@user-ubuntu:-/KvmAsa$ virt_network_setup.sh
Note: If you reload the Linux host, you must re-run the virt_network_setup.sh script. It does not persist over reboots.
4. Verify that the virtual networks were created:
stack@user-ubuntu:-/KvmAsa$ brctl show
bridge name
bridge id
STP enabled
virbr0
8000.0000000000000
yes
virbr1
8000.5254000056eed
yes
virbr2
8000.5254000056eee
yes
virbr3
8000.5254000056eec
yes
stack@user-ubuntu:-/KvmAsa$
Interfaces
virb1-nic
virb2-nic
virb3-nic
5. Display the IP address assigned to the virbr1 bridge. This is the IP address that you assigned in the XML file.
stack@user-ubuntu:-/KvmAsa$ ip address show virbr1
S: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN
link/ether 52:54:00:05:6e:00 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.10/24 brd 192.168.1.255 scope global virbr1
valid_lft forever preferred_lft forever
20
A window appears displaying the console of the VM. You can see that the VM is booting. It takes a few minutes for
the VM to boot. Once the VM stops booting you can issue CLI commands from the console screen.
This command displays a list of all the guest/VMs in the host regardless of their state (ON, OFF, suspended).
asav# virsh destroy ASAv
21
3. Add the following to the <domain type=kvm> line in the XML file:
xmlns:qemu=http://libvirt.org/schemas/domain/qemu/1.0
Example:
<domain type='kvm' xmlns:qemu='http://libvirt.org/schemas/domain/qemu/1.0'>
22
Start ASDM
Procedure
1. On the PC that you specified as the ASDM client, enter the following URL:
https://asa_ip_address/admin
The ASDM launch page appears with the following buttons:
Install ASDM Launcher and Run ASDM
Run ASDM
Run Startup Wizard
2. To download the Launcher:
a. Click Install ASDM Launcher and Run ASDM.
b. Leave the username and password fields empty (for a new installation), and click OK. With no HTTPS
authentication configured, you can gain access to ASDM with no username and the enable password, which is
blank by default. Note: If you enabled HTTPS authentication, enter your username and associated password.
c. Save the installer to your PC, and then start the installer. The ASDM-IDM Launcher opens automatically after
installation is complete.
d. Enter the management IP address, leave the username and password blank (for a new installation), and then click
OK. Note: If you enabled HTTPS authentication, enter your username and associated password.
3. To use Java Web Start:
a. Click Run ASDM or Run Startup Wizard.
b. Save the shortcut to your PC when prompted. You can optionally open it instead of saving it.
c. Start Java Web Start from the shortcut.
d. Accept any certificates according to the dialog boxes that appear. The Cisco ASDM-IDM Launcher appears.
23
www.cisco.com
e. Leave the username and password blank (for a new installation), and then click OK. Note: If you enabled HTTPS
authentication, enter your username and associated password.
For example:
ciscoasa# show version | grep Serial
Serial Number: VBXQEFMXX44
ciscoasa#
2. Obtain a Product Authorization Key, which you can purchase from your Cisco account representative. You need to
purchase a separate Product Authorization Key for each feature license. For the ASAv, the only required feature
license is for CPUs (1 to 4), but you can purchase other feature keys as well.
3. Request an activation key from Cisco.com for the serial number according to the ASA licensing guide. Be sure to
request a CPU license that matches the number of CPUs you specified when you deployed the ASAv.
4. After you receive the activation key from Cisco, at the ASAv console, apply the key:
ciscoasa# activation-key key
For example:
ciscoasa# activation-key 592811f1 19ed804b 613befa3 d85bb703 c61b7da2
Validating activation key. This may take a few minutes...
The requested key is a timebases key and is activated, it has 364 days remaining.
ASAv platform license state is Compliant
24
3. Obtain a Product Authorization Key, which you can purchase from your Cisco account representative. You need to
purchase a separate Product Authorization Key for each feature license. For the ASAv, the only required feature
license is for vCPUs (1 to 4), but you can purchase other feature keys as well.
4. Request an activation key from Cisco.com for the serial number according to the ASA licensing guide. Be sure to
request a CPU license that matches the number of CPUs you specified when you deployed the ASAv.
5. After you receive the activation key from Cisco, on the Configuration > Device Management > Licensing >
Activation Key pane, paste the key into the New Activation Key field.
6. Click Update Activation Key.
ASDM shows a status dialog box while it verifies the key.
When the key update is complete, you see the following dialog box:
25
Hostname
Static routes
Domain name
DHCP server
Administrative passwords
Interfaces
and more...
IP addresses
AnyConnect VPN WizardConfigures SSL VPN remote access for the Cisco AnyConnect VPN client. AnyConnect
provides secure SSL connections to the ASA for remote users with full VPN tunneling to corporate resources. The
ASA policy can be configured to download the AnyConnect client to remote users when they initially connect via a
browser. With AnyConnect 3.0 and later, the client can run either the SSL or IPsec IKEv2 VPN protocol.
Clientless SSL VPN WizardConfigures clientless SSL VPN remote access for a browser. Clientless, browser-based
SSL VPN lets users establish a secure, remote-access VPN tunnel to the ASA using a web browser. After
authentication, users access a portal page and can access specific, supported internal resources. The network
administrator provides access to resources by users on a group basis. ACLs can be applied to restrict or allow
access to specific corporate resources.
IPsec (IKEv1 or IKEv2) Remote Access VPN WizardConfigures IPsec VPN remote access for the Cisco IPsec client.
Packet Capture WizardConfigure and run packet capture. The wizard will run one packet capture on each of the
ingress and egress interfaces. After capturing packets, you can save the packet captures to your PC for examination
and replay in the packet analyzer.
Advanced Configuration
To continue configuring your ASAv, see the documents available for your software version at:
http://www.cisco.com/go/asadocs
26