Getting Started
Performing Common Configuration Tasks
Cisco ISA500 Series Integrated Security Appliance Administration Guide
27
1
•
Security Services:
By default, the UTM security services such as Intrusion
Prevention Service (IPS), Web URL Filter, Web Reputation Filter, Anti-Virus,
and Email Reputation Filter are disabled. For more information about how to
configure the security services, see
•
Firewall:
By default, the firewall prevents inbound traffic and allows all
outbound traffic. If you want to allow some inbound traffic or prevent some
outbound traffic, you must customize firewall access rules. The security
appliance supports up to 100 custom access rules. See
Firewall Access Rules to Control Inbound and Outbound Traffic,
page 178
.
•
VPN:
By default, the VPN feature is disabled. The security appliance can
function as a Cisco IPSec VPN server or a Cisco VPN hardware client, or as
a SSL VPN gateway so that remote users can securely access the corporate
network resources over the VPN tunnels. You can also establish a secure
IPSec VPN tunnel between two sites that are physically separated by using
the Site-to-Site VPN feature. For more information about how to configure the
VPN features, see
.
Performing Common Configuration Tasks
We strongly recommend that you complete the following common tasks before
you begin configuring your security appliance. It includes the following sections:
•
•
Saving Your Configuration, page 28
•
Upgrading the Firmware if needed, page 29
•
Changing the User Name and Password of the Default
Administrator Account at Your First Login
The default administrator account is an administrative account that has fully
privilege to set the configurations and read the system status. It does not belong to
any user group. To prevent unauthorized access, you are forced to immediately
change the default user name and password at its first login.