Cisco ASA 5506-X セキュリティアプライアンス ASA5506 V07 初期化済み、テスト済み ・本体 ・ACアダプター テストログは下記の内容をご確認ください。------------------------------------------------------------------------------------------------------------------ ** Cisco ASA 5506-X * S/N : JMX2412X09W** Factory default* * No password ** Cisco Systems ROMMON, Version 1.1.15, RELEASE SOFTWARECopyright (c) 1994-2019 by Cisco Systems, Inc.Compiled Sat 03/30/2019 7:00:46.51 by wchen64
Current image running: Boot ROM0Last reset cause: PowerCycleRequestDIMM Slot 0 : Present Platform ASA5506 with 4096 Mbytes of main memoryMAC Address: cc:7f:76:47:bb:f9
Use BREAK or ESC to interrupt boot.Use SPACE to begin boot immediately.
Located ".boot_string" @ cluster 893616. #Attempt autoboot: "boot disk0:/asa981-lfbff-k8.SPA"Located "asa981-lfbff-k8.SPA" @ cluster 867675. ############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################LFBFF signature verified.INIT: version 2.88 bootingStarting udevConfiguring network interfaces... done.Populating dev cachedosfsck 2.11, 12 Mar 2005, FAT32, LFNThere are differences between boot sector and its backup.Differences: (offset:original/backup) 65:01/00 Not automatically fixing this.Starting check/repair pass.Starting verification pass./dev/sdb1: 108 files, 847720/1918808 clustersdosfsck(/dev/sdb1) returned 0Mounting /dev/sdb1IO Memory Nodes: 1IO Memory Per Node: 205520896 bytes Global Reserve Memory Per Node: 314572800 bytes Nodes=1 LCMB: got 205520896 bytes on numa-id=0, phys=0x108c00000, virt=0x2aaaab000000LCMB: HEAP-CACHE POOL got 314572800 bytes on numa-id=0, virt=0x7f1da7a00000Processor memory: 1527125316 Compiled on Wed 10-May-17 15:37 PDT by builders Total NICs found: 14i354 rev03 Gigabit Ethernet @ irq255 dev 20 index 08 MAC: cc7f.7647.bbf9ivshmem rev03 Backplane Data Interface @ index 09 MAC: 0000.0001.0002en_vtun rev00 Backplane Control Interface @ index 10 MAC: 0000.0001.0001en_vtun rev00 Backplane Int-Mgmt Interface @ index 11 MAC: 0000.0001.0003en_vtun rev00 Backplane Ext-Mgmt Interface @ index 12 MAC: 0000.0000.0000en_vtun rev00 Backplane Tap Interface @ index 13 MAC: 0000.0100.0001Verify the activation-key, it might take a while...Running Permanent Activation Key: 0x180cf345 0x08d42ce5 0x4060796c 0x9308a8c4 0x0938249c Licensed features for this platform:Maximum Physical Interfaces : Unlimited perpetualMaximum VLANs : 5 perpetualInside Hosts : Unlimited perpetualFailover : Disabled perpetualEncryption-DES : Enabled perpetualEncryption-3DES-AES : Enabled perpetualCarrier : Disabled perpetualAnyConnect Premium Peers : 2 perpetualAnyConnect Essentials : Disabled perpetualOther VPN Peers : 10 perpetualTotal VPN Peers : 12 perpetualAnyConnect for Mobile : Disabled perpetualAnyConnect for Cisco VPN Phone : Disabled perpetualAdvanced Endpoint Assessment : Disabled perpetualShared License : Disabled perpetualTotal TLS Proxy Sessions : 2 perpetualBotnet Traffic Filter : Disabled perpetualCluster : Disabled perpetual This platform has a Base license. Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1) Cisco Adaptive Security Appliance Software Version 9.8(1) ****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************Cisco Adaptive Security Appliance Software, version 9.8Copyright (c) 1996-2017 by Cisco Systems, Inc.For licenses and notices for open source software used in this product, please visithttp://www.cisco.com/go/asa-opensource Restricted Rights LegendUse, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Reading from flash...Flash read failedERROR: MIGRATION - Could not get the startup configuration. Cryptochecksum (changed): d41d8cd9 8f00b204 e9800998 ecf8427eINFO: converting "fixup protocol dns maximum-length 512" to MPF commandsERROR: Inspect configuration of this type exists, first removethat configuration and then add the new configurationINFO: converting "fixup protocol ftp 21" to MPF commandsINFO: converting "fixup protocol h323_h225 1720" to MPF commandsINFO: converting "fixup protocol h323_ras 1718-1719" to MPF commandsINFO: converting "fixup protocol ip-options 1" to MPF commandsINFO: converting "fixup protocol netbios 137-138" to MPF commandsINFO: converting "fixup protocol rsh 514" to MPF commandsINFO: converting "fixup protocol rtsp 554" to MPF commandsINFO: converting "fixup protocol sip 5060" to MPF commandsINFO: converting "fixup protocol skinny 2000" to MPF commandsINFO: converting "fixup protocol smtp 25" to MPF commandsINFO: converting "fixup protocol sqlnet 1521" to MPF commandsINFO: converting "fixup protocol sunrpc 111" to MPF commandsINFO: converting "fixup protocol sunrpc_udp 111" to MPF commandsINFO: converting "fixup protocol tftp 69" to MPF commandsINFO: converting "fixup protocol sip udp 5060" to MPF commandsINFO: converting "fixup protocol xdmcp 177" to MPF commands INFO: Power-On Self-Test in process........................................................................INFO: Power-On Self-Test complete. INFO: Starting HW-DRBG health test...INFO: HW-DRBG health test passed. INFO: Starting SW-DRBG health test...INFO: SW-DRBG health test passed.Pre-configure Firewall now through interactive prompts [yes]? no
User enable_1 logged in to ciscoasaLogins over the last 1 days: 1.Failed logins since the last login: 0.Type help or "?" for a list of available commands.ciscoasa>ciscoasa> enablePassword:ciscoasa#ciscoasa#ciscoasa# show clock01:16:49.949 UTC Thu Mar 31 2022ciscoasa#ciscoasa#ciscoasa# show invciscoasa# show inventoryName: "Chassis", DESCR: "ASA 5506-X with SW, 8GE Data, 1GE Mgmt, AC"PID: ASA5506 , VID: V07 , SN: JMX2412X09W Name: "Storage Device 1", DESCR: "ASA 5506-X SSD"PID: ASA5506-SSD , VID: N/A , SN: c ciscoasa#ciscoasa#ciscoasa# show envciscoasa# show environment Temperature:----------------------------------- Processors: -------------------------------- Processor 1: 43.0 C - OK (CPU Core Temperature) Accelerators: -------------------------------- Accelerator 1: 40.0 C - OK (Accelerator Temperature) Chassis: -------------------------------- Ambient 1: 45.0 C - OK (Chassis Temperature) Motherboard: -------------------------------- Ambient: 45.0 C - OK (Chassis Temperature) Voltage:----------------------------------- Channel 1: 12.012 V - OK (12V) Channel 2: 5.082 V - OK (5V) Channel 3: 1.337 V - OK (1.35V_CPU) Channel 4: 0.719 V - OK (1.0V_VCC) Channel 5: 0.967 V - OK (1.0V_VNN) Channel 6: 1.791 V - OK (1.8V_CPU) Channel 7: 1.066 V - OK (1.07V_CPU) Channel 8: 0.849 V - OK (0.85V) Channel 9: 3.318 V - OK (3.3V) Channel 10: 2.519 V - OK (2.5V) Channel 11: 1.500 V - OK (1.5V) Channel 12: 1.208 V - OK (1.2V) Channel 13: 0.899 V - OK (0.9V) Channel 14: 1.345 V - OK (1.35V_DDR) Channel 15: 3.308 V - OK (3.3V_STBY) ALARM CONTACT 1 Status: not asserted Description: external alarm contact 1 Severity: minor Trigger: closed ALARM CONTACT 2 Status: not asserted Description: external alarm contact 2 Severity: minor Trigger: closed Driver Information:--------------------Status : RUNNING Driver Error Statistics:-------------------------I2C I/O Errors : 0GPIO Errors : 0Ioctl Null Ptr Errors : 0Poll Errors : 0Invalid Ioctl Errors : 1PECI Errors : 0Unknown Errors : 0 Error displaying IPMI error logciscoasa#ciscoasa#ciscoasa# show version Cisco Adaptive Security Appliance Software Version 9.8(1)Firepower Extensible Operating System Version 2.2(1.47)Device Manager Version 7.12(2) Compiled on Wed 10-May-17 15:37 PDT by buildersSystem image file is "disk0:/asa981-lfbff-k8.SPA"Config file at boot was "startup-config" ciscoasa up 1 min 41 secs Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)Internal ATA Compact Flash, 8000MBBIOS Flash M25P64 @ 0xfed01000, 16384KB Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1) Number of accelerators: 1 1: Ext: GigabitEthernet1/1 : address is cc7f.7647.bbfa, irq 255 2: Ext: GigabitEthernet1/2 : address is cc7f.7647.bbfb, irq 255 3: Ext: GigabitEthernet1/3 : address is cc7f.7647.bbfc, irq 255 4: Ext: GigabitEthernet1/4 : address is cc7f.7647.bbfd, irq 255 5: Ext: GigabitEthernet1/5 : address is cc7f.7647.bbfe, irq 255 6: Ext: GigabitEthernet1/6 : address is cc7f.7647.bbff, irq 255 7: Ext: GigabitEthernet1/7 : address is cc7f.7647.bc00, irq 255 8: Ext: GigabitEthernet1/8 : address is cc7f.7647.bc01, irq 255 9: Int: Internal-Data1/1 : address is cc7f.7647.bbf9, irq 25510: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 011: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 012: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 013: Ext: Management1/1 : address is cc7f.7647.bbf9, irq 014: Int: Internal-Data1/4 : address is 0000.0100.0001, irq 0 Licensed features for this platform:Maximum Physical Interfaces : Unlimited perpetualMaximum VLANs : 5 perpetualInside Hosts : Unlimited perpetualFailover : Disabled perpetualEncryption-DES : Enabled perpetualEncryption-3DES-AES : Enabled perpetualCarrier : Disabled perpetualAnyConnect Premium Peers : 2 perpetualAnyConnect Essentials : Disabled perpetualOther VPN Peers : 10 perpetualTotal VPN Peers : 12 perpetualAnyConnect for Mobile : Disabled perpetualAnyConnect for Cisco VPN Phone : Disabled perpetualAdvanced Endpoint Assessment : Disabled perpetualShared License : Disabled perpetualTotal TLS Proxy Sessions : 2 perpetualBotnet Traffic Filter : Disabled perpetualCluster : Disabled perpetual This platform has a Base license. Serial Number: JAD24110C4RRunning Permanent Activation Key: 0x180cf345 0x08d42ce5 0x4060796c 0x9308a8c4 0x0938249cConfiguration register is 0x1Image type : ReleaseKey Version : AConfiguration has not been modified since last system restart.ciscoasa#ciscoasa#ciscoasa# show runnciscoasa# show running-config: Saved :: Serial Number: JAD24110C4R: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores):ASA Version 9.8(1)!hostname ciscoasaenable password $sha512$5000$Q3EG2/0poFzVk5g8VlIEaA==$asQdeW25AOP6p8X+x9UAOA== pbkdf2xlate per-session deny tcp any4 any4xlate per-session deny tcp any4 any6xlate per-session deny tcp any6 any4xlate per-session deny tcp any6 any6xlate per-session deny udp any4 any4 eq domainxlate per-session deny udp any4 any6 eq domainxlate per-session deny udp any6 any4 eq domainxlate per-session deny udp any6 any6 eq domainnames !interface GigabitEthernet1/1 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/2 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/3 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/4 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/5 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/6 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/7 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/8 shutdown no nameif no security-level no ip address!interface Management1/1 management-only shutdown no nameif no security-level no ip address!ftp mode passivepager lines 24icmp unreachable rate-limit 1 burst-size 1no asdm history enablearp timeout 14400no arp permit-nonconnectedarp rate-limit 16384timeout xlate 3:00:00timeout pat-xlate 0:00:30timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00timeout floating-conn 0:00:00timeout conn-holddown 0:00:15timeout igp stale-route 0:01:10user-identity default-domain LOCALaaa authentication login-historyno snmp-server locationno snmp-server contactservice sw-reset-buttoncrypto ipsec security-association pmtu-aging infinitecrypto ca trustpool policytelnet timeout 5ssh stricthostkeycheckssh timeout 5ssh key-exchange group dh-group1-sha1console timeout 0 threat-detection basic-threatthreat-detection statistics access-listno threat-detection statistics tcp-interceptdynamic-access-policy-record DfltAccessPolicy!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 no tcp-inspectionpolicy-map global_policy class inspection_default inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp inspect dns preset_dns_mappolicy-map type inspect dns migrated_dns_map_2 parameters message-length maximum client auto message-length maximum 512 no tcp-inspectionpolicy-map type inspect dns migrated_dns_map_1 parameters message-length maximum client auto message-length maximum 512 no tcp-inspection!service-policy global_policy globalprompt hostname contextcall-home profile CiscoTAC-1 no active destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address email callhome@cisco.com destination transport-method http subscribe-to-alert-group diagnostic subscribe-to-alert-group environment subscribe-to-alert-group inventory periodic monthly subscribe-to-alert-group configuration periodic monthly subscribe-to-alert-group telemetry periodic dailyCryptochecksum:d41d8cd98f00b204e9800998ecf8427e: endciscoasa#ciscoasa# *細かい傷や汚れがあります。 ■ 保証期間: ノークレームノーリターンでお願いします。■
テストログは下記の内容をご確認ください。------------------------------------------------------------------------------------------------------------------
** Cisco ASA 5506-X * S/N : JMX2412X09W** Factory default* * No password **
Cisco Systems ROMMON, Version 1.1.15, RELEASE SOFTWARECopyright (c) 1994-2019 by Cisco Systems, Inc.Compiled Sat 03/30/2019 7:00:46.51 by wchen64
Current image running: Boot ROM0Last reset cause: PowerCycleRequestDIMM Slot 0 : Present
Platform ASA5506 with 4096 Mbytes of main memoryMAC Address: cc:7f:76:47:bb:f9
Use BREAK or ESC to interrupt boot.Use SPACE to begin boot immediately.
Located ".boot_string" @ cluster 893616.
#Attempt autoboot: "boot disk0:/asa981-lfbff-k8.SPA"Located "asa981-lfbff-k8.SPA" @ cluster 867675.
############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################LFBFF signature verified.INIT: version 2.88 bootingStarting udevConfiguring network interfaces... done.Populating dev cachedosfsck 2.11, 12 Mar 2005, FAT32, LFNThere are differences between boot sector and its backup.Differences: (offset:original/backup) 65:01/00 Not automatically fixing this.Starting check/repair pass.Starting verification pass./dev/sdb1: 108 files, 847720/1918808 clustersdosfsck(/dev/sdb1) returned 0Mounting /dev/sdb1IO Memory Nodes: 1IO Memory Per Node: 205520896 bytes
Global Reserve Memory Per Node: 314572800 bytes Nodes=1
LCMB: got 205520896 bytes on numa-id=0, phys=0x108c00000, virt=0x2aaaab000000LCMB: HEAP-CACHE POOL got 314572800 bytes on numa-id=0, virt=0x7f1da7a00000Processor memory: 1527125316
Compiled on Wed 10-May-17 15:37 PDT by builders
Total NICs found: 14i354 rev03 Gigabit Ethernet @ irq255 dev 20 index 08 MAC: cc7f.7647.bbf9ivshmem rev03 Backplane Data Interface @ index 09 MAC: 0000.0001.0002en_vtun rev00 Backplane Control Interface @ index 10 MAC: 0000.0001.0001en_vtun rev00 Backplane Int-Mgmt Interface @ index 11 MAC: 0000.0001.0003en_vtun rev00 Backplane Ext-Mgmt Interface @ index 12 MAC: 0000.0000.0000en_vtun rev00 Backplane Tap Interface @ index 13 MAC: 0000.0100.0001Verify the activation-key, it might take a while...Running Permanent Activation Key: 0x180cf345 0x08d42ce5 0x4060796c 0x9308a8c4 0x0938249c
Licensed features for this platform:Maximum Physical Interfaces : Unlimited perpetualMaximum VLANs : 5 perpetualInside Hosts : Unlimited perpetualFailover : Disabled perpetualEncryption-DES : Enabled perpetualEncryption-3DES-AES : Enabled perpetualCarrier : Disabled perpetualAnyConnect Premium Peers : 2 perpetualAnyConnect Essentials : Disabled perpetualOther VPN Peers : 10 perpetualTotal VPN Peers : 12 perpetualAnyConnect for Mobile : Disabled perpetualAnyConnect for Cisco VPN Phone : Disabled perpetualAdvanced Endpoint Assessment : Disabled perpetualShared License : Disabled perpetualTotal TLS Proxy Sessions : 2 perpetualBotnet Traffic Filter : Disabled perpetualCluster : Disabled perpetual
This platform has a Base license.
Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
Cisco Adaptive Security Appliance Software Version 9.8(1)
****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************Cisco Adaptive Security Appliance Software, version 9.8Copyright (c) 1996-2017 by Cisco Systems, Inc.For licenses and notices for open source software used in this product, please visithttp://www.cisco.com/go/asa-opensource
Restricted Rights LegendUse, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Reading from flash...Flash read failedERROR: MIGRATION - Could not get the startup configuration.
Cryptochecksum (changed): d41d8cd9 8f00b204 e9800998 ecf8427eINFO: converting "fixup protocol dns maximum-length 512" to MPF commandsERROR: Inspect configuration of this type exists, first removethat configuration and then add the new configurationINFO: converting "fixup protocol ftp 21" to MPF commandsINFO: converting "fixup protocol h323_h225 1720" to MPF commandsINFO: converting "fixup protocol h323_ras 1718-1719" to MPF commandsINFO: converting "fixup protocol ip-options 1" to MPF commandsINFO: converting "fixup protocol netbios 137-138" to MPF commandsINFO: converting "fixup protocol rsh 514" to MPF commandsINFO: converting "fixup protocol rtsp 554" to MPF commandsINFO: converting "fixup protocol sip 5060" to MPF commandsINFO: converting "fixup protocol skinny 2000" to MPF commandsINFO: converting "fixup protocol smtp 25" to MPF commandsINFO: converting "fixup protocol sqlnet 1521" to MPF commandsINFO: converting "fixup protocol sunrpc 111" to MPF commandsINFO: converting "fixup protocol sunrpc_udp 111" to MPF commandsINFO: converting "fixup protocol tftp 69" to MPF commandsINFO: converting "fixup protocol sip udp 5060" to MPF commandsINFO: converting "fixup protocol xdmcp 177" to MPF commands
INFO: Power-On Self-Test in process........................................................................INFO: Power-On Self-Test complete.
INFO: Starting HW-DRBG health test...INFO: HW-DRBG health test passed.
INFO: Starting SW-DRBG health test...INFO: SW-DRBG health test passed.Pre-configure Firewall now through interactive prompts [yes]? no
User enable_1 logged in to ciscoasaLogins over the last 1 days: 1.Failed logins since the last login: 0.Type help or "?" for a list of available commands.ciscoasa>ciscoasa> enablePassword:ciscoasa#ciscoasa#ciscoasa# show clock01:16:49.949 UTC Thu Mar 31 2022ciscoasa#ciscoasa#ciscoasa# show invciscoasa# show inventoryName: "Chassis", DESCR: "ASA 5506-X with SW, 8GE Data, 1GE Mgmt, AC"PID: ASA5506 , VID: V07 , SN: JMX2412X09W
Name: "Storage Device 1", DESCR: "ASA 5506-X SSD"PID: ASA5506-SSD , VID: N/A , SN: c
ciscoasa#ciscoasa#ciscoasa# show envciscoasa# show environment
Temperature:-----------------------------------
Processors: -------------------------------- Processor 1: 43.0 C - OK (CPU Core Temperature)
Accelerators: -------------------------------- Accelerator 1: 40.0 C - OK (Accelerator Temperature)
Chassis: -------------------------------- Ambient 1: 45.0 C - OK (Chassis Temperature)
Motherboard: -------------------------------- Ambient: 45.0 C - OK (Chassis Temperature)
Voltage:----------------------------------- Channel 1: 12.012 V - OK (12V) Channel 2: 5.082 V - OK (5V) Channel 3: 1.337 V - OK (1.35V_CPU) Channel 4: 0.719 V - OK (1.0V_VCC) Channel 5: 0.967 V - OK (1.0V_VNN) Channel 6: 1.791 V - OK (1.8V_CPU) Channel 7: 1.066 V - OK (1.07V_CPU) Channel 8: 0.849 V - OK (0.85V) Channel 9: 3.318 V - OK (3.3V) Channel 10: 2.519 V - OK (2.5V) Channel 11: 1.500 V - OK (1.5V) Channel 12: 1.208 V - OK (1.2V) Channel 13: 0.899 V - OK (0.9V) Channel 14: 1.345 V - OK (1.35V_DDR) Channel 15: 3.308 V - OK (3.3V_STBY)
ALARM CONTACT 1 Status: not asserted Description: external alarm contact 1 Severity: minor Trigger: closed
ALARM CONTACT 2 Status: not asserted Description: external alarm contact 2 Severity: minor Trigger: closed
Driver Information:--------------------Status : RUNNING
Driver Error Statistics:-------------------------I2C I/O Errors : 0GPIO Errors : 0Ioctl Null Ptr Errors : 0Poll Errors : 0Invalid Ioctl Errors : 1PECI Errors : 0Unknown Errors : 0
Error displaying IPMI error logciscoasa#ciscoasa#ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 9.8(1)Firepower Extensible Operating System Version 2.2(1.47)Device Manager Version 7.12(2)
Compiled on Wed 10-May-17 15:37 PDT by buildersSystem image file is "disk0:/asa981-lfbff-k8.SPA"Config file at boot was "startup-config"
ciscoasa up 1 min 41 secs
Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)Internal ATA Compact Flash, 8000MBBIOS Flash M25P64 @ 0xfed01000, 16384KB
Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1) Number of accelerators: 1
1: Ext: GigabitEthernet1/1 : address is cc7f.7647.bbfa, irq 255 2: Ext: GigabitEthernet1/2 : address is cc7f.7647.bbfb, irq 255 3: Ext: GigabitEthernet1/3 : address is cc7f.7647.bbfc, irq 255 4: Ext: GigabitEthernet1/4 : address is cc7f.7647.bbfd, irq 255 5: Ext: GigabitEthernet1/5 : address is cc7f.7647.bbfe, irq 255 6: Ext: GigabitEthernet1/6 : address is cc7f.7647.bbff, irq 255 7: Ext: GigabitEthernet1/7 : address is cc7f.7647.bc00, irq 255 8: Ext: GigabitEthernet1/8 : address is cc7f.7647.bc01, irq 255 9: Int: Internal-Data1/1 : address is cc7f.7647.bbf9, irq 25510: Int: Internal-Data1/2 : address is 0000.0001.0002, irq 011: Int: Internal-Control1/1 : address is 0000.0001.0001, irq 012: Int: Internal-Data1/3 : address is 0000.0001.0003, irq 013: Ext: Management1/1 : address is cc7f.7647.bbf9, irq 014: Int: Internal-Data1/4 : address is 0000.0100.0001, irq 0
Licensed features for this platform:Maximum Physical Interfaces : Unlimited perpetualMaximum VLANs : 5 perpetualInside Hosts : Unlimited perpetualFailover : Disabled perpetualEncryption-DES : Enabled perpetualEncryption-3DES-AES : Enabled perpetualCarrier : Disabled perpetualAnyConnect Premium Peers : 2 perpetualAnyConnect Essentials : Disabled perpetualOther VPN Peers : 10 perpetualTotal VPN Peers : 12 perpetualAnyConnect for Mobile : Disabled perpetualAnyConnect for Cisco VPN Phone : Disabled perpetualAdvanced Endpoint Assessment : Disabled perpetualShared License : Disabled perpetualTotal TLS Proxy Sessions : 2 perpetualBotnet Traffic Filter : Disabled perpetualCluster : Disabled perpetual
This platform has a Base license.
Serial Number: JAD24110C4RRunning Permanent Activation Key: 0x180cf345 0x08d42ce5 0x4060796c 0x9308a8c4 0x0938249cConfiguration register is 0x1Image type : ReleaseKey Version : AConfiguration has not been modified since last system restart.ciscoasa#ciscoasa#ciscoasa# show runnciscoasa# show running-config: Saved
:: Serial Number: JAD24110C4R: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores):ASA Version 9.8(1)!hostname ciscoasaenable password $sha512$5000$Q3EG2/0poFzVk5g8VlIEaA==$asQdeW25AOP6p8X+x9UAOA== pbkdf2xlate per-session deny tcp any4 any4xlate per-session deny tcp any4 any6xlate per-session deny tcp any6 any4xlate per-session deny tcp any6 any6xlate per-session deny udp any4 any4 eq domainxlate per-session deny udp any4 any6 eq domainxlate per-session deny udp any6 any4 eq domainxlate per-session deny udp any6 any6 eq domainnames
!interface GigabitEthernet1/1 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/2 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/3 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/4 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/5 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/6 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/7 shutdown no nameif no security-level no ip address!interface GigabitEthernet1/8 shutdown no nameif no security-level no ip address!interface Management1/1 management-only shutdown no nameif no security-level no ip address!ftp mode passivepager lines 24icmp unreachable rate-limit 1 burst-size 1no asdm history enablearp timeout 14400no arp permit-nonconnectedarp rate-limit 16384timeout xlate 3:00:00timeout pat-xlate 0:00:30timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00timeout floating-conn 0:00:00timeout conn-holddown 0:00:15timeout igp stale-route 0:01:10user-identity default-domain LOCALaaa authentication login-historyno snmp-server locationno snmp-server contactservice sw-reset-buttoncrypto ipsec security-association pmtu-aging infinitecrypto ca trustpool policytelnet timeout 5ssh stricthostkeycheckssh timeout 5ssh key-exchange group dh-group1-sha1console timeout 0
threat-detection basic-threatthreat-detection statistics access-listno threat-detection statistics tcp-interceptdynamic-access-policy-record DfltAccessPolicy!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 no tcp-inspectionpolicy-map global_policy class inspection_default inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect xdmcp inspect dns preset_dns_mappolicy-map type inspect dns migrated_dns_map_2 parameters message-length maximum client auto message-length maximum 512 no tcp-inspectionpolicy-map type inspect dns migrated_dns_map_1 parameters message-length maximum client auto message-length maximum 512 no tcp-inspection!service-policy global_policy globalprompt hostname contextcall-home profile CiscoTAC-1 no active destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address email callhome@cisco.com destination transport-method http subscribe-to-alert-group diagnostic subscribe-to-alert-group environment subscribe-to-alert-group inventory periodic monthly subscribe-to-alert-group configuration periodic monthly subscribe-to-alert-group telemetry periodic dailyCryptochecksum:d41d8cd98f00b204e9800998ecf8427e: endciscoasa#ciscoasa#
*細かい傷や汚れがあります。
■ 保証期間: ノークレームノーリターンでお願いします。■