Tải bản đầy đủ (.pdf) (226 trang)

Tài liệu Cisco ASA 5500 Series Getting Started Guide docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (4.99 MB, 226 trang )

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA

Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Cisco ASA 5500 Series
Getting Started Guide
For the Cisco ASA 5510, ASA 5520, ASA 5540, and ASA 5550
Software Version 8.0
Customer Order Number: DOC-78-18002-01
Text Part Number: 78-18002-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU
ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A
COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR


INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCVP, the Cisco logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn
is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco,
the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient,
IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking
Academy, Network Registrar, Packet, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient,
and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0705R)
Cisco ASA 5500 Series Getting Started Guide
© 2007 Cisco Systems, Inc. All rights reserved.
iii
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
CONTENTS
CHAPTER

1
Before You Begin
1-1
ASA 5500
1-1
ASA 5500 with AIP SSM
1-2
ASA 5500 with CSC SSM
1-3
ASA 5500 with 4GE SSM
1-4

ASA 5550
1-5
CHAPTER

2
Maximizing Throughput on the ASA 5550
2-1
Embedded Network Interfaces
2-1
Balancing Traffic to Maximize Throughput
2-2
What to Do Next
2-5
CHAPTER

3
Installing the ASA 5550
3-1
Verifying the Package Contents
3-2
Installing the Chassis
3-3
Rack-Mounting the Chassis
3-4
Installing SFP Modules
3-5
SFP Module
3-6
Installing an SFP Module
3-7

Ports and LEDs
3-9
Front Panel LEDs
3-9
Rear Panel LEDs and Ports in Slot 0
3-10
Ports and LEDs in Slot 1
3-12
Connecting Interface Cables
3-13
Contents
iv
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
What to Do Next
3-19
CHAPTER

4
Installing the ASA 5500, ASA 5510, ASA 5520, and ASA 5540
4-1
Verifying the Package Contents
4-2
Installing the Chassis
4-3
Rack-Mounting the Chassis
4-4
Ports and LEDs
4-6
What to Do Next

4-9
CHAPTER

5
Installing Optional SSMs
5-1
Cisco 4GE SSM
5-1
4GE SSM Components
5-2
Installing the Cisco 4GE SSM
5-3
Installing the SFP Modules
5-4
SFP Module
5-5
Installing the SFP Module
5-6
Cisco AIP SSM and CSC SSM
5-8
Installing an SSM
5-9
What to Do Next
5-10
CHAPTER

6
Connecting Interface Cables on the ASA 5500, ASA 5510, ASA 5520, and ASA
5540 Platforms
6-1

Connecting Interface Cables
6-2
Connecting to SSMs
6-5
Connecting to a 4GE SSM
6-7
Powering On the Adaptive Security Appliance
6-9
What to Do Next
6-9
v
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Contents
CHAPTER

7
Configuring the Adaptive Security Appliance
7-1
About the Factory Default Configuration
7-1
Using the CLI for Configuration
7-2
Using the Adaptive Security Device Manager for Configuration
7-3
Preparing to Use ASDM
7-4
Gathering Configuration Information for Initial Setup
7-5
Installing the ASDM Launcher

7-5
Starting ASDM with a Web Browser
7-8
Running the ASDM Startup Wizard
7-9
What to Do Next
7-10
CHAPTER

8
Scenario: DMZ Configuration
8-1
Basic Network Layout for a DMZ Configuration
8-1
Example DMZ Network Topology
8-2
An Inside User Visits a Web Server on the Internet
8-4
An Internet User Visits the DMZ Web Server
8-6
An Inside User Visits the DMZ Web Server
8-8
Configuring the Adaptive Security Appliance for a DMZ Deployment
8-10
Configuration Requirements
8-11
Information to Have Available
8-11
Starting ASDM
8-12

Enabling Inside Clients to Communicate with Devices on the Internet
8-14
Enabling Inside Clients to Communicate with the DMZ Web Server
8-15
Translating Internal Client IP Addresses Between the Inside and DMZ
Interfaces
8-16
Translating the Public Address of the Web Server to its Real
Address
8-20
Configuring Static PAT for Public Access to the DMZ Web Server (Port
Forwarding)
8-22
Contents
vi
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Providing Public HTTP Access to the DMZ Web Server
8-26
What to Do Next
8-29
CHAPTER

9
Scenario: IPsec Remote-Access VPN Configuration
9-1
Example IPsec Remote-Access VPN Network Topology
9-1
Implementing the IPsec Remote-Access VPN Scenario
9-2

Information to Have Available
9-3
Starting ASDM
9-3
Configuring an IPsec Remote-Access VPN
9-5
Selecting VPN Client Types
9-7
Specifying the VPN Tunnel Group Name and Authentication Method
9-8
Specifying a User Authentication Method
9-9
(Optional) Configuring User Accounts
9-11
Configuring Address Pools
9-12
Configuring Client Attributes
9-13
Configuring the IKE Policy
9-14
Configuring IPsec Encryption and Authentication Parameters
9-16
Specifying Address Translation Exception and Split Tunneling
9-17
Verifying the Remote-Access VPN Configuration
9-18
What to Do Next
9-20
CHAPTER


10
Scenario: Configuring Connections for a Cisco AnyConnect VPN Client
10-1
About SSL VPN Client Connections
10-1
Obtaining the Cisco AnyConnect VPN Client Software
10-2
Example Topology Using AnyConnect SSL VPN Clients
10-3
Implementing the Cisco SSL VPN Scenario
10-3
Information to Have Available
10-4
Starting ASDM
10-5
vii
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Contents
Configuring the Adaptive Security Appliance for the Cisco AnyConnect VPN
Client
10-7
Specifying the SSL VPN Interface
10-8
Specifying a User Authentication Method
10-9
Specifying a Group Policy
10-11
Configuring the Cisco AnyConnect VPN Client
10-12

Verifying the Remote-Access VPN Configuration
10-14
What to Do Next
10-15
CHAPTER

11
Scenario: SSL VPN Clientless Connections
11-1
About Clientless SSL VPN
11-1
Security Considerations for Clientless SSL VPN Connections
11-2
Example Network with Browser-Based SSL VPN Access
11-3
Implementing the Clientless SSL VPN Scenario
11-4
Information to Have Available
11-5
Starting ASDM
11-5
Configuring the Adaptive Security Appliance for Browser-Based SSL VPN
Connections
11-7
Specifying the SSL VPN Interface
11-8
Specifying a User Authentication Method
11-10
Specifying a Group Policy
11-11

Creating a Bookmark List for Remote Users
11-12
Verifying the Configuration
11-16
What to Do Next
11-18
CHAPTER

12
Scenario: Site-to-Site VPN Configuration
12-1
Example Site-to-Site VPN Network Topology
12-1
Implementing the Site-to-Site Scenario
12-2
Information to Have Available
12-3
Contents
viii
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Configuring the Site-to-Site VPN
12-3
Starting ASDM
12-3
Configuring the Security Appliance at the Local Site
12-5
Providing Information About the Remote VPN Peer
12-7
Configuring the IKE Policy

12-8
Configuring IPsec Encryption and Authentication Parameters
12-10
Specifying Hosts and Networks
12-11
Viewing VPN Attributes and Completing the Wizard
12-12
Configuring the Other Side of the VPN Connection
12-14
What to Do Next
12-14
CHAPTER

13
Configuring the AIP SSM
13-1
Understanding the AIP SSM
13-2
How the AIP SSM Works with the Adaptive Security Appliance
13-2
Operating Modes
13-3
Using Virtual Sensors
13-4
Configuring the AIP SSM
13-6
AIP SSM Procedure Overview
13-6
Sessioning to the AIP SSM
13-6

Configuring the Security Policy on the AIP SSM
13-8
Assigning Virtual Sensors to Security Contexts
13-9
Diverting Traffic to the AIP SSM
13-11
What to Do Next
13-14
CHAPTER

14
Configuring the CSC SSM
14-1
About the CSC SSM
14-1
About Deploying the Security Appliance with the CSC SSM
14-2
Scenario: Security Appliance with CSC SSM Deployed for Content Security
14-4
Configuration Requirements
14-5
ix
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Contents
Configuring the CSC SSM for Content Security
14-5
Obtain Software Activation Key from Cisco.com
14-6
Gather Information

14-6
Starting ASDM
14-7
Verify Time Settings
14-9
Run the CSC Setup Wizard
14-10
What to Do Next
14-17
CHAPTER

15
Configuring the 4GE SSM for Fiber
15-1
Cabling 4GE SSM Interfaces
15-2
Setting the 4GE SSM Media Type for Fiber Interfaces (Optional)
15-3
What to Do Next
15-5
APPENDIX

A
Obtaining a 3DES/AES License
A-1
Contents
x
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
1-1

Cisco ASA 5500 Series Getting Started Guide
78-18002-01
CHAPTER
1
Before You Begin
Use the following table to find the installation and configuration steps that are
required for your implementation of the Cisco ASA 5500 series adaptive security
appliance.
The adaptive security appliance implementations included in this document are as
follows:

ASA 5500, page 1-1

ASA 5500 with AIP SSM, page 1-2

ASA 5500 with CSC SSM, page 1-3

ASA 5500 with 4GE SSM, page 1-4

ASA 5550, page 1-5
ASA 5500
To Do This ... See ...
Install the chassis Chapter 4, “Installing the ASA 5500,
ASA 5510, ASA 5520, and ASA
5540”
Connect interface cables Chapter 6, “Connecting Interface
Cables on the ASA 5500, ASA 5510,
ASA 5520, and ASA 5540
Platforms”
Chapter 1 Before You Begin

ASA 5500 with AIP SSM
1-2
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
ASA 5500 with AIP SSM
Perform initial setup of the adaptive security
appliance
Chapter 7, “Configuring the
Adaptive Security Appliance”
Configure the adaptive security appliance for
your implementation
Chapter 8, “Scenario: DMZ
Configuration”
Chapter 9, “Scenario: IPsec
Remote-Access VPN Configuration”
Chapter 10, “Scenario: Configuring
Connections for a Cisco AnyConnect
VPN Client”
Chapter 11, “Scenario: SSL VPN
Clientless Connections”
Chapter 12, “Scenario: Site-to-Site
VPN Configuration”
Configure optional and advanced features Cisco Security Appliance Command
Line Configuration Guide
Operate the system on a daily basis Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
To Do This ... See ...

Install the chassis Chapter 4, “Installing the ASA 5500,
ASA 5510, ASA 5520, and ASA
5540”
Install the AIP SSM Chapter 5, “Installing Optional
SSMs”

Cisco Intrusion Prevention System
Command Reference
Refine configuration and configure optional
and advanced features
Cisco Security Appliance Command
Line Configuration Guide
Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
To Do This ... See ...
Install the chassis Chapter 4, “Installing the ASA 5500,
ASA 5510, ASA 5520, and ASA
5540”
Install the CSC SSM Chapter 5, “Installing Optional
SSMs”
Connect interface cables Chapter 6, “Connecting Interface
Cables on the ASA 5500, ASA 5510,
ASA 5520, and ASA 5540
Platforms”

security appliance
Chapter 7, “Configuring the
Adaptive Security Appliance”
Configure the adaptive security appliance
for content security
Chapter 14, “Configuring the CSC
SSM”
Configure the CSC SSM Cisco Content Security and Control
SSM Administrator Guide
Refine configuration and configure
optional and advanced features
Cisco Security Appliance Command
Line Configuration Guide
Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
To Do This ... See ...
Install the chassis Chapter 4, “Installing the ASA 5500,
ASA 5510, ASA 5520, and ASA
5540”
Install the 4GE SSM Chapter 5, “Installing Optional
SSMs”
Connect interface cables Chapter 6, “Connecting Interface
Cables on the ASA 5500, ASA 5510,
ASA 5520, and ASA 5540
Platforms”
Perform initial setup of the adaptive
security appliance

Chapter 7, “Configuring the
Adaptive Security Appliance”

Refine configuration and configure
optional and advanced features
Cisco Security Appliance Command
Line Configuration Guide
Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages


Embedded Network Interfaces, page 2-1

Balancing Traffic to Maximize Throughput, page 2-2

What to Do Next, page 2-5
Embedded Network Interfaces
The adaptive security appliance has two internal buses providing copper Gigabit
Ethernet and fiber Gigabit Ethernet connectivity:

Slot 0 (corresponding to Bus 0) has four embedded copper Gigabit Ethernet
ports

Slot 1 (corresponding to Bus 1) has four embedded copper Gigabit Ethernet
ports and four embedded SFPs that support fiber Gigabit Ethernet
connectivity
Chapter 2 Maximizing Throughput on the ASA 5550
Balancing Traffic to Maximize Throughput
2-2
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Note
To establish fiber connectivity on the adaptive security appliance, you must order
and install SFP modules for each fiber port you want to use. For more information
on fiber ports and SFP modules, see the “Installing SFP Modules” section on
page 3-5.
Figure 2-1 shows the embedded ports on the Cisco ASA 5550.
Figure 2-1 Embedded Ports on the ASA 5550
Note
Although Slot 1 has four copper Ethernet ports and four fiber Ethernet ports, you

can use only four Slot 1 ports at a time. For example, you could use two Slot 1
copper ports and two fiber ports, but you cannot use fiber ports if you are already
using all four Slot 1 copper ports.
Balancing Traffic to Maximize Throughput
To maximize traffic throughput, configure the adaptive security appliance so that
traffic is distributed equally between the two buses in the device. To achieve this,
lay out the network so that all traffic flows through both Bus 0 (Slot 0) and Bus 1
(Slot 1), entering through one bus and exiting through the other.
153217
LINK SPD
2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE
AUX
POWER
STATUS
FLASH
VPN
ACTIVE
PWR
STATUS

LNK
SPD0123
Slot 1
Slot 0
Ethernet Fiber
Ethernet
2-3
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Chapter 2 Maximizing Throughput on the ASA 5550
Balancing Traffic to Maximize Throughput
In Figure 2-2 and Figure 2-3, network traffic is distributed so that all traffic flows
through both buses in the device, enabling the adaptive security appliance to
deliver maximum throughput.
Figure 2-2 Traffic Evenly Distributed for Maximum Throughput (Copper to Copper)
Figure 2-3 Traffic Evenly Distributed for Maximum Throughput (Copper to Fiber)
153104
LINK SPD
2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE

AUX
POWER
STATUS
FLASH
VPN
ACTIVE
PWR
STATUS
LNK
SPD0123
Slot 1
Slot 0
Incoming and
outgoing traffic
Incoming and
outgoing traffic
Maximum
throughput
153305
LINK SPD
2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1

FLASH
CONSOLE
AUX
POWER
STATUS
FLASH
VPN
ACTIVE
PWR
STATUS
LNK
SPD0123
Slot 1
Slot 0
Maximum
throughput
Incoming and
outgoing traffic
Incoming and
outgoing traffic
Chapter 2 Maximizing Throughput on the ASA 5550
Balancing Traffic to Maximize Throughput
2-4
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Figure 2-4 illustrates several configurations that do not enable the adaptive
security appliance to deliver maximum throughput because network traffic flows
through only one bus on the device.
Figure 2-4 Configurations Not Enabling Maximum Throughput
LINK SPD

2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE
AUX
POWER
STATUS
FLASH
VPN
ACTIVE
P
W
R
S
T
A
T
U
S
LNK
SPD0123
LINK SPD

2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE
AUX
POWER
STATUS
FLASH
VPN
ACTIVE
P
W
R
S
T
A
T
U
S
LNK
SPD0123
LINK SPD

2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE
AUX
POWER
STAT US
FLASH
VPN
ACTIVE
P
W
R
S
T
A
T
U
S
LNK
SPD0123
LINK SPD

2
LINK SPD
1
LINK SPD
0
LINK SPD
3
MGMT
USB2
USB1
FLASH
CONSOLE
AUX
POWER
STATUS
FLASH
VPN
ACTIVE
P
W
R
S
T
A
T
U
S
LNK
SPD0123
Slot 1

Slot 0
Incoming and
outgoing traffic
Slot 1
Slot 0
Slot 1
Slot 0
153306
Slot 1
Slot 0
Incoming and
outgoing traffic
Incoming and
outgoing traffic
Incoming and outgoing traffic
2-5
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Chapter 2 Maximizing Throughput on the ASA 5550
What to Do Next
Note
You can use the show traffic command to see the traffic throughput over each
bus. For more information about using the command, see the Cisco Security
Appliance Command Reference.
What to Do Next
Continue with Chapter 3, “Installing the ASA 5550.”
Chapter 2 Maximizing Throughput on the ASA 5550
What to Do Next
2-6
Cisco ASA 5500 Series Getting Started Guide

78-18002-01
3-1
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
CHAPTER
3
Installing the ASA 5550
Caution
Read the safety warnings in the Regulatory Compliance and Safety Information
for the Cisco ASA 5500 Series and follow proper safety procedures when
performing these steps.
Warning
Only trained and qualified personnel should install, replace, or service this
equipment
.
Statement 49
This chapter describes the ASA 5550 adaptive security appliance and rack-mount
and installation procedures for the adaptive security appliance. This chapter
includes the following sections:

Verifying the Package Contents, page 3-2

Installing the Chassis, page 3-3

Installing SFP Modules, page 3-5

Ports and LEDs, page 3-9

Connecting Interface Cables, page 3-13


What to Do Next, page 3-19
Chapter 3 Installing the ASA 5550
Verifying the Package Contents
3-2
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Verifying the Package Contents
Verify the contents of the packing box, shown in Figure 3-1, to ensure that you
have received all items necessary to install the Cisco ASA 5550.
Figure 3-1 Contents of ASA 5550 Package
Yellow Ethernet cable
(72-1482-01)
Mounting brackets
(700-18797-01 AO) right
(700-18798-01 AO) left
4 flathead screws
(48-0451-01 AO)
2 long cap screws
(48-0654-01 AO)
4 cap screws
(48-0523-01 AO)
Safety and
Compliance
Guide
Cisco ASA 5550 adaptive
security appliance
Documentation
Cisco ASA
5550 Adaptive
Security Appliance

Product CD
4 rubber feet
Cable holder
153215
Blue console cable
PC terminal adapter
L
IN
K

S
P
D
3
L
IN
K

S
P
D
2
L
IN
K
S
P
D
1
L

IN
K
S
P
D
0
MGMT
USB2
USB1
F
L
A
S
H
P
O
W
E
R
S
T
A
T
U
S
F
L
A
S
H

V
P
N
A
C
T
IV
E
Cisco SSM-4GE
L
N
K
S
P
D
0
1
2
3
POWER
STATUS
3-3
Cisco ASA 5500 Series Getting Started Guide
78-18002-01
Chapter 3 Installing the ASA 5550
Installing the Chassis
Installing the Chassis
This section describes how to rack-mount and install the adaptive security
appliance. You can mount the adaptive security appliance in a 19-inch rack (with
a 17.5- or 17.75-inch opening).

Warning
To prevent bodily injury when mounting or servicing this unit in a rack, you must
take special precautions to ensure that the system remains stable. The
following guidelines are provided to ensure your safety.
The following information can help plan equipment rack installation:

Allow clearance around the rack for maintenance.

When mounting a device in an enclosed rack ensure adequate ventilation. An
enclosed rack should never be overcrowded.

Make sure that the rack is not
congested, because each unit generates heat.

When mounting a device in an open rack, make sure that the rack frame does
not block the intake or exhaust ports.

If the rack contains only one unit, mount the unit at the bottom of the rack.

If the rack is partially filled, load the rack from the bottom to the top, with the
heaviest component at the bottom of the rack.

If the rack contains stabilizing devices, install the stabilizers prior to
mounting or servicing the unit in the rack.
Warning
Before performing any of the following procedures, ensure that the power
source is off. (AC or DC). To ensure that power is removed from the DC circuit,
locate the circuit breaker on the panel board that services the DC circuit,
switch the circuit breaker to the OFF position, and tape the switch handle of the
circuit breaker in the OFF position.

×