CLOUDSTACK--2169 Rest ASA 1000v to factory settings

This commit is contained in:
Radhika PC 2013-08-16 15:56:44 +05:30
parent 088ce975c6
commit 7720e1517c

View File

@ -312,4 +312,39 @@
</listitem>
</orderedlist>
</section>
<section id="reuse-asa">
<title>Reusing ASA 1000v Appliance for new Guest Networks</title>
<para>You can reuse an ASA 1000v appliance in a new guest network after the necessary cleanup.
Typically, ASA 1000v is cleaned up when the logical edge firewall is cleaned up in VNMC. If
this cleanup does not happen, you need to reset the appliance to its factory settings for use
in new guest networks. As part of this, enable SSH on the appliance and store the SSH
credentials by registering on &PRODUCT; .</para>
<orderedlist>
<listitem>
<para>Open a command line prompt on the ASA appliance</para>
<orderedlist>
<listitem>
<para>Run the following:</para>
<programlisting>ASA1000V(config)# reload</programlisting>
<para>You are prompted with the following message:</para>
<programlisting>System config has been modified. Save? [Y]es/[N]o:"</programlisting>
</listitem>
<listitem>
<para>Enter N.</para>
<para>You will get the following confirmation message:</para>
<programlisting>"Proceed with reload? [confirm]"</programlisting>
</listitem>
<listitem>
<para>Restart the appliance.</para>
</listitem>
</orderedlist>
</listitem>
<listitem>
<para>Register the ASA 1000v appliance again with the VNMC:</para>
<programlisting>ASA1000V(config)# vnmc policy-agent
ASA1000V(config-vnmc-policy-agent)# registration host vnmc_ip_address
ASA1000V(config-vnmc-policy-agent)# shared-secret key where key is the shared secret for authentication of the ASA 1000V connection to the Cisco VNMC</programlisting>
</listitem>
</orderedlist>
</section>
</section>