diff --git a/docs/en-US/vnmc-cisco.xml b/docs/en-US/vnmc-cisco.xml index 1190910512c..7c721785c7e 100644 --- a/docs/en-US/vnmc-cisco.xml +++ b/docs/en-US/vnmc-cisco.xml @@ -313,15 +313,15 @@
- Reusing ASA 1000v Appliance for new Guest Networks + Reusing ASA 1000v Appliance in new Guest Networks You can reuse an ASA 1000v appliance in a new guest network after the necessary cleanup. Typically, ASA 1000v is cleaned up when the logical edge firewall is cleaned up in VNMC. If this cleanup does not happen, you need to reset the appliance to its factory settings for use in new guest networks. As part of this, enable SSH on the appliance and store the SSH - credentials by registering on &PRODUCT; . + credentials by registering on VNMC. - Open a command line prompt on the ASA appliance + Open a command line on the ASA appliance: Run the following: @@ -340,7 +340,7 @@ - Register the ASA 1000v appliance again with the VNMC: + Register the ASA 1000v appliance with the VNMC: ASA1000V(config)# vnmc policy-agent ASA1000V(config-vnmc-policy-agent)# registration host vnmc_ip_address ASA1000V(config-vnmc-policy-agent)# shared-secret key where key is the shared secret for authentication of the ASA 1000V connection to the Cisco VNMC