You are on page 1of 15

DownloadDocumentationCommunityMarketplaceAcademy

Kabunda Hichoonga
LatestVideosBlogsDiscussionsSupportGroups
CCNACCIEJNCIACCNPNetwork SecuritySDN & NVFJobs &
CareersSolarWindsCCDA
1MGNS3 Community hits 1 Million users. ALL GNS3 Academy Courses for $10 with
'BACK2SCHOOL' Coupon
LATEST NEWS & BLOG ARTICLES
 NEW POST
GNS3 2.1 RC1 Released!STICKY Posted by Jeremy Grossmann GNS3 TEAM  ·  Last updated 9 minutes
agoNew appliances supported: Cisco NGIPSv, Cisco FTDv and Cisco FMCv STICKY Posted
by Julien Duponchelle GNS3 TEAM  ·  Last updated 3 hours ago 2 Containers in GNS3 series:
Managing devices with Ansible container.STICKY Posted by AJ NOURI MODERATOR  ·  Last updated
2 hours ago
LATEST COMMUNITY DISCUSSIONS
 NEW DISCUSSION
Cisco ASAv 9.7.1 with GNS3 - use VIRL 1.3 images in your GNS3 topologies
running...STICKY Posted by David Bombal GNS3 TEAM  ·  Last updated 4 days ago 3 GNS3 Stickers Are
Here!STICKY Posted by Mark Blackwell GNS3 TEAM  ·  Last updated 4 days ago 2 Poll: Top Network & IT
Free ToolsSTICKY Posted by Mark Blackwell GNS3 TEAM  ·  Last updated 7 days ago 5 IPython:
Powerful interactive Python shell - easy command line for network... STICKY Posted by David
Bombal GNS3 TEAM  ·  Last updated 22 days agoInstalling policy package in Check Point
(Standalone ) in GNS3 VMPosted by Bapi Joseph Lagardo  ·  Last updated an hour ago 2 Docker
Container Data Lost when ShutdownPosted by Zufar Dhiyaulhaq  ·  Last updated an hour
ago 2 Reconfigure GNS3 to run as non-root?Posted by Muhammad Ausaf Ali Yousaf  ·  Last updated
an hour agoNot able to boot nexusv9000 with nxosv-final.7.0.3.I6.1.qcow2 Posted by Sumit
Sharma  ·  Last updated 2 hours ago 3 Couldn't connect to hypervisor on 127.0.0.1:50642 Posted
by Syed jeelani  ·  Last updated 3 hours ago 3 was anyone work with Nexus 9000v I16 or I17? It's
very slowly to connect...Posted by Oliver Zhou  ·  Last updated 5 hours agoAbout Running
VPCsPosted by khalil shuker  ·  Last updated 7 hours ago 3 IOSvL2 VIRL image interface status
incorrect?Posted by Anthony Crawford  ·  Last updated 7 hours ago 1 ASAv telnet does not
workPosted by Raminder Singh  ·  Last updated 10 hours ago 11 Unknown Error on ASAvPosted
by Raza Meer  ·  Last updated 15 hours agoAdding another interface to Automation VM... need
to change default route - how?Posted by Alim H. Ali  ·  Last updated 20 hours ago 5
Page 1

Next
14,780,898DOWNLOADS
1,007,549COMMUNITY MEMBERS

© 2017 GNS3 Technologies Inc. All rights reserved. Terms of Use Privacy Policy

How to configure any ASAv .qcow2


image for serial telnet access
 Answered

I've seen numerous threads here about getting serial console access to an ASAv through
putty instead of the TightVNC viewer. After much trial and error and plenty of Googling, I
have a process to configure any ASAv qcow2 file for serial console access. I've tested it
with 9.4.1(200), 9.5.2(203), 9.5.2(207), and 9.6.1 and all worked. 

 Create the initial "master" ASAv VM

Download the ASAv qcow2 file with the OS version of your choice from Cisco.com. Open
the GNS3 preferences. Go to QEMU > QEMU VMs and hit new. Select the option to run the
Qemu VM on the GNS3 VM. Hit next.
Choose "Default" for the VM type and hit next. Name the VM (ASAV 9.6.1 for example) and
hit next. Select the x86_64 Qemu binary and set  the RAM to 2048mb. Hit next.
Select New Image, browse to your downloaded qcow2 file, and click open to upload the file
to your GNS3 VM. Once it has finished uploading, click next.

Select the ASA symbol, change the category to Security Devices, and set the console type to
vnc. We will change this to telnet later in the guide.
Click the network tab. Set the number of adapters to 8. Set the first port name to
Management0. Set the name format to GigabitEthernet0\{0}. 
Click the Advanced settings tab. Uncheck the "Use as a linked base VM" box. We will check
this later in the guide. Click OK then Apply > OK to save the device.  This device will be
configured as the "master template" for the ASAv.
 Configure the ASAv for telnet access

Create a junk project and drag one instance of the new ASAv to it. Power it on and double
click it to open the TightVNC viewer. The ASAv will automatically reboot once during the
initial power-up after "determining the device platform".  After the second boot, it will stop at
the ciscoasa> prompt. Once you get that you are ready to move to the next step.
The ASAv serial port is disabled by default.  The software seems to require a file on the root
of Disk0: called use_ttyS0 to enable the serial interface. The easiest way to add this is to
clone the existing \coredumpinfo\coredump.cfg file and rename it. Use these commands to
clone it:

ciscoasa#conf t

ciscoasa(config)# cd coredumpinfo

ciscoasa(config)# copy coredump.cfg disk0:/use_ttyS0  (that's  S zero not S and the letter
O)

Verify the file exists with the command dir disk0:/


Once it's there, reload the ASA. There's no need to save the config at this point. We just
want the ASA to reload with that file in place. It should show the GRUB boot loader, and
boot, but the interaction will stop with the message "Lina to use serial port /dev/ttyS0 for
console IO". At this point it has transferred the interactive control to the serial port. 
Power the ASAv off. Right click it, and select configure.  Change the console type from vnc
to telnet. You must power the ASAv off to do this. You can change it with the device
powered on, but it will throw the error "No connection could be made because the target
machine actively refused it" if you try to launch the console and will not connect. Click Apply
> OK to save. 
Power the ASAv back on and double click to open the console. It will take 30-45 seconds
before any output will appear. The GRUB boot screen and boot process won't show in the
serial port output. The serial port isn't active until the ASA software loads. My Surface pro
takes 30 seconds to show output. 
The ASAv "master" is now configured for console access.

 OPTIONAL - configure other base features/options

At this point you can add other options to the master template. If you wish to assign an
interface IP, description, username/password, or any other configuration as a "base" ASA
build,  you can do so now. I added the asdm-761.bin file to the image so I would not have to
download it to the ASA every time I create a new device in a project. I did not want to leave
any config information other than the asdm image in my master file so I issued the write
erase command and reloaded after copying the file. 

 FInalize the master template 

Once you have your ASAv configured for telnet console access and any other features you
want, issue the write memory command (not necessary if you don't have running config
settings in your ASA) and power it off. You can delete the device from your project now. Any
changes are part of the qcow2 file that resides on the GNS3 VM. 

Open the GNS3 preferences, select QEMU > QEMU VMs, choose your ASAv and click edit.
On the General settings tab, change the console type to telnet. All ASAv
instances created from this template will now be configured for telnet to
the console port.

Lastly, click the Advanced Settings tab. Check the box next to "Use as a linked base VM"
and click OK. This option tells GNS3 to clone the qcow2 file for each new ASAv host created
in a project. This will allow your "master template" file to remain unchanged while creating
new instances preconfigured with the telnet serial settings and any other customizations
that were made in the optional section.
Close the preferences page, click Apply > OK to save the template. You're ready to create
your secure firewall labs.

15 people like this
POSTED MAY 23, 2016

BY ALEC DUCHENE

 FOLLOW LIKE

This discussion has been closed

You might also like