Skip to main content
How do I configure my Cisco ASA 5505 router for 8x8 service?
8x8 Support

How do I configure my Cisco ASA 5505 router for 8x8 service?

Cisco ASA 5505 Router

cisco.png

Administrative Information

  1. Make sure your router is powered on and connected to your network.
  2. In a browser on a computer on the same network as the router, navigate to the following IP address: 192.168.1.1.
  3. Log in (default credentials shown below).
    • Username: <blank>
    • Password: <enable_password>

Tested on firmware version 8.2 (1).

Adding/editing 8x8 subnets is recommended when available. Please click here and review the Traffic Shaping and Specific Subnet/Port Configuration section.


Set up IP Address

  1. Go to Configuration > Device Setup > Interfaces.
  2. Click Add button on the right side of the screen to add an interface. The Edit Interface settings will appear on your screen.
  3. Under Switch Ports select Ethernet 1/0. Click the Add button to add this Ethernet port to the Selected Switch Ports
  4. Set the Interface Name and click the box next Enable Interface.
  5. Select the Use PPoE option in the IP Address section.
  6. Set the following values for the IP Address
    • Group Name
    • PPoE Username
    • PPoE Password
    • Confirm Password
  7. Select PAP for the PPP Authentication field. 
  8. Check the box at the bottom of the IP Address section to Store Username and Password in Local Flash.
  9. Click OK to apply these settings.
    cisco1.png

Edit Device Interfaces

  1.  Go to the Advanced tab in the Edit Interface settings. 
  2. Set the MTU to 1492.
  3. Click OK.
    cisco2.png

Configure Access Rules

  1. Go to Configuration > Firewall > Access Rules.
  2. Add the 8x8 subnets by clicking the Add button under the Addresses tab on the right side of the screen.
  3. Set the values below for the Access Rules for all the 8x8 subnets.
  4. Click Apply.
    cisco3.png

ACL Manager

  1. Go to Configuration > Firewall > ACL Manager
  2. Add the values below by clicking Add. Ensure that you click the Enable checkbox for each line.
  3. Click Apply.
    cisco4.png

Add Network Objects

Note: 8x8 subnets can be found in the Virtual Office Technical Requirements document.

  1. Go to Configuration > Firewall > Objects > Network Objects/Groups.
  2. Add the IP Addresses and 8x8 subnets listed in the link above by clicking the Add button.
  3. Click Apply.
    cisco5.png

Configure Policy Rules

  1. Go to Configuration > Firewall > Service Policy Rules.
  2. Set the values listed below for the Outside Interface and the Global Policy.
  3. Click Apply.
    cisco6.png
  4. Select the first service policy rule for COS1_traffic.
  5. Check the box next to Source and Destination IP Address (uses ACL) in the Traffic Criteria section.
  6. Click OK.
    cisco7.png
  7. Select the row for outside-class.
  8. Check the box next to Any Traffic under the Traffic Match Criteria section in the pop-up settings window.
    cisco8.png
  9. Click OK.
  10. Click Apply.

Set Rule Actions

  1. Go to the Rule Actions tab in the Edit Service Policy Settings window.
  2. Select the QoS tab.
  3. Check the box to Enable Policing.
  4. Select the checkboxes next to Input Policing and Output Policing.
  5. Set the values below for Input Policing and Output Policing.
  6. Click OK.
  7. Click Apply.
    cisco9.png

Ports, Subnets, and DSCP Values for Cisco Routers

Here are some values users can add to their Cisco configuration file. If subnets are set to high priority or open, specific UDP traffic passing through those subnets does not need to be listed individually.

Under Class Definitions, add:

  • match access-group 2000
  • match access-group 2001
  • match access-group 2003

Under Access List Definitions, add:

  • access-list 2000 permit udp any any dscp ef
  • access-list 2001 permit udp any any dscp af31
  • access-list 2003 permit udp any 192.84.16.0 0.0.0.255
  • access-list 2003 permit udp any 192.84.18.0 0.0.0.255
  • access-list 2003 permit udp any 8.28.0.0 0.0.1.255
  • access-list 2003 permit udp any 217.163.57.0 0.0.0.255
  • access-list 2003 permit udp 192.84.16.0 0.0.0.255 any
  • access-list 2003 permit udp 192.84.18.0 0.0.0.255 any
  • access-list 2003 permit udp 8.28.0.0 0.0.1.255 any
  • access-list 2003 permit udp 217.163.57.0 0.0.0.255 any