• (Optional) Change the IP Address, on page 183
• Log Into ASDM, on page 184
• Configure Licensing, on page 185
• Configure the ASA, on page 191
• Access the ASA and FXOS CLI, on page 192
• What's Next?, on page 193
About the ASA
The ASA provides advanced stateful firewall and VPN concentrator functionality in one device.
Unsupported Features
The following ASA features are not supported on the Firepower 2100:
• Integrated Routing and Bridging
• Redundant interfaces
• Clustering
• Clientless SSL VPN with KCD
• ASA REST API
• ASA FirePOWER module
• Botnet Traffic Filter
• The following inspections:
• SCTP inspection maps (SCTP stateful inspection using ACLs is supported)
• Diameter
• GTP/GPRS
Migrating an ASA 5500-X Configuration
You can copy and paste an ASA 5500-X configuration into the Firepower 2100 in Appliance Mode. However,
you will need to modify your configuration. Also note some behavioral differences between the platforms.
1. To copy the configuration, enter the more system:running-config command on the ASA 5500-X.
2. Edit the configuration as necessary (see below).
3. Connect to the console port of the Firepower 2100 in Appliance Mode, and enter global configuration
mode:
ciscoasa> enable
Password:
The enable password is not set. Please set it now.
Enter Password: ******
Repeat Password: ******
Cisco Firepower 2100 Getting Started Guide
176
ASA Deployment with ASDM
About the ASA