EasyManuals Logo
Home>Cisco>Firewall>5510 - ASA SSL / IPsec VPN Edition

Cisco 5510 - ASA SSL / IPsec VPN Edition User Manual

Cisco 5510 - ASA SSL / IPsec VPN Edition
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #423 background imageLoading...
Page #423 background image
1-19
Cisco ASA Series CLI Configuration Guide
Chapter 1 Starting Interface Configuration (ASA 5510 and Higher)
Starting Interface Configuration (ASA 5510 and Higher)
Note Other optional EtherChannel parameters can be configured after you import the new
configuration. See the “Configuring an EtherChannel” section on page 1-28.
Step 8 At the ASA CLI prompt, perform the following steps depending on your connection (console or remote).
Console connection:
a. Copy the entire new configuration to the clipboard, including the altered interface section.
b. Clear the running configuration by entering:
hostname(config)# clear configure all
Traffic through the ASA stops at this point.
c. Paste in the new configuration at the prompt.
Traffic through the ASA resumes.
Remote connection:
a. Save the new configuration to a TFTP or FTP server, so you can copy it to the startup
configuration on the ASA. For example, you can run a TFTP or FTP server on your PC.
b. Clear the startup configuration by entering:
hostname(config)# write erase
c. Copy the new configuration to the startup configuration by entering:
hostname(config)# copy url startup-config
See the “Downloading a File” section on page 1-11
d. Reload the ASA using the reload command. Do not save the running configuration.
Step 9 Reenable failover by entering the failover command.
Detailed Steps (Multiple Mode)
We recommend that you update your system and context configurations offline as text files, and reimport
them for the following reasons:
Because you cannot add an allocated interface as a member of a redundant or EtherChannel
interface, you must deallocate the interface from any contexts. When you deallocate the interface,
any context command that referred to that interface is deleted. Because commands that refer to
interfaces are widespread throughout the configuration and affect multiple features, removing an
allocation from an in-use interface at the CLI or in ASDM would cause significant damage to your
configuration, not to mention significant downtime while you reconfigure all your features around
a new interface.
Changing your configuration offline lets you use the same interface names for your new logical
interfaces, so you do not need to touch the feature configurations that refer to interface names. You
only need to change the interface configuration.
Clearing the running system configuration and immediately applying a new configuration will
minimize the downtime of your interfaces. You will not be waiting to configure the interfaces in real
time.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals