60-7
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter60 Configuring the ASA CSC Module
Configuring the CSC SSM
Configuring the CSC SSM
This section describes how to configure the CSC SSM and includes the following topics:
Before Configuring the CSC SSM, page60-7
Connecting to the CSC SSM, page60-8
Diverting Traffic to the CSC SSM, page60-10

Before Configuring the CSC SSM

Before configuring the ASA and the CSC SSM, perform the following steps:
Step1 If the CSC SSM did not come preinstalled in a Cisco ASA, install it and connect a network cable to the
management port of the SSM. For assistance with installation and connecting the SSM, see the Cisco
ASA 5500 Series Adaptive Security Appliance Getting Started Guide.
The management port of the CSC SSM must be connected to your network to allow management of and
automatic updates to the CSC SSM software. Additionally, the CSC SSM uses the management port for
e-mail notifications and syslog messages.
Step2 You should have received a Product Authorization Key (PAK) with the CSC SSM. Use the PAK to
register the CSC SSM at the following URL.
http://www.cisco.com/go/license
After you register, you receive activation keys by e-mail. The activation keys are required before you can
complete Step 6.
Step3 Obtain the following information for use in Step6:
Activation keys
CSC SSM management port IP address, netmask, and gateway IP address
DNS server IP address
HTTP proxy server IP address (needed only if your security policies require the use of a proxy server
for HTTP access to the Internet)
Domain name and hostname for the CSC SSM
An e-mail address, and SMTP server IP address and port number for e-mail notifications
E-mail address(es) for product license renewal notifications
IP addresses of hosts or networks that are allowed to manage the CSC SSM
Password for the CSC SSM
Step4 In a web browser, access ASDM for the ASA in which the CSC SSM is installed.
Note If you are accessing ASDM for the first time, see the “Additional References” section on
page 60-18.
For more information about enabling ASDM access, see the “Configuring ASA Access for ASDM,
Telnet, or SSH” section on page37-1.
Step5 Verify time settings on the ASA. Time setting accuracy is important for logging of security events and
for automatic updates of CSC SSM software. Do one of the following: