index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
30
xxx Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Deployment Scenario of AnyConnect Client 1112 Step 1: Set Up CSD for Registry Check 1114 Step 2: Set Up RADIUS for Authentication 1114 Step 3: Configure AnyConnect SSL VPN 1115 Step 4: Enable Address Translation for Internet Access...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
31
xxxi Configuring Quality of Service 1142 QoS Configuration via ASDM 1143 Step 1: Tune Priority Queue 1143 Step 2: Define a Service Policy 1144 Step 3: Specify Traffic Classification Criteria 1145 Step 4: Apply an Action Rule 1148 QoS Configuration via CLI 1152 Step 1: Tune the Priority Queue 1152 Step 2: Set Up a Class...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
32
xxxii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Icons Used in This Book PC Cisco ASA 5500 Secure Server Cisco CallManager Terminal File Server Web Server Ciscoworks Workstation Printer Laptop IBM Mainframe Cluster Controller DSU/CSU Router Bridge Hub DSU/CSU Catalyst Switch M...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
33
xxxiii Foreword First, let me congratulate Jazib, Omar, and Andrew for producing what will be regarded as the definitive guide to maximizing the value of the Cisco Adaptive Security Appliance (ASA). This book takes a hands-on approach to its subject and illuminates the design concepts and functionality built into th...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
34
xxxiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Introduction Cyber security has always been a challenge for many organizations, especially for those that cannot deploy separate devices to provide next-generation firewall, intrusion pre￾vention, and virtual private network (VP...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
35
Introduction xxxv ■ Chapter 3, “Licensing”: Different features in the Cisco ASA require a license. This chapter describes the available licenses for each Cisco ASA model and specific features, and explains how to install such licenses. It also covers the details about how you can configure a Cisco ASA as a licensing...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
36
xxxvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition ■ Chapter 10, “Network Address Translation”: This chapter provides details on how to configure Network Address Translation (NAT) on the Cisco ASA. It covers the dif￾ferent address translation types, how to configure address tran...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
37
Introduction xxxvii Part IV, “Virtual Private Network (VPN) Solutions,” includes the following chapters: ■ Chapter 19, “Site-to-Site IPsec VPNs”: The Cisco ASA supports IPsec VPN features that enable you to connect networks in different geographic locations. This chapter provides configuration and troubleshooting gui...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
38
This page intentionally left blank
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
39
This page intentionally left blank
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
40
Chapter 3 Licensing This chapter covers the following topics: ■ Licensed features on ASA ■ Managing licenses with activation keys ■ Combined licenses in failover and clustering ■ Shared Premium AnyConnect VPN licensing ASA offers a very comprehensive feature set that helps secure networks of all shapes and ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
41
60 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition For example, you can increase the maximum concurrent fi rewall connection count on the Cisco ASA 5505 from 10,000 to 25,000 by installing a Security Plus license. In addition to the Base and Security Plus licenses, you can activa...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
42
Chapter 3: Licensing 61 As you identify the correct feature set to take the most advantage of Cisco ASA capabil￾ities while fully protecting your network, it helps to organize the licensed features into the following logical categories: ■ Basic platform capabilities: Typically are relevant to all Cisco ASA deploymen...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
43
62 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition ■ VLAN Trunk Ports: This feature is applicable only to Cisco ASA 5505 appliances because they have the built-in Ethernet switch. With the Base License, you can con￾figure the physical switch ports only in access mode; with the Secu...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
44
Chapter 3: Licensing 63 ■ Encryption-3DES-AES: This license adds 3DES and AES algorithms in order to provide strong encryption capabilities for VPN, Unified Communications Proxy, and management sessions. Some features, such as VPN Load Balancing, also require this license for proper operation. Export regulations con...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
45
64 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition platform limit (unrestricted). After applying this license, use the tls-proxy maxi￾mum-sessions command to raise the configured session limit as desired. It should be noted that other Unified Communications inspection features that...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
46
Chapter 3: Licensing 65 the imperfections of external load-balancing. All devices in a cluster must have this feature enabled. The availability of the Cluster feature and the maximum supported number of cluster members depend on the particular software image version and hardware platform type. ■ IPS Module: This fe...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
47
66 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition transit VoIP connections that rely on the cleartext application inspection. Keep in mind that the number of active TLS proxy sessions may exceed the number of active VoIP endpoints, depending on their high-availability configurati...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
48
Chapter 3: Licensing 67 command issued on a Cisco ASA 5525-X appliance. Notice that the count of Firewall Connections does not show up as a licensed feature; check the output of the show resource usage command for some of these platform capacities. However, this sample output contains several pieces of additional in...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
49
68 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Active Timebased Activation Key: 0x493c3ecd 0xcd6458a1 0x31b5a533 0xc970a48b 0x05867295 Encryption-3DES-AES : Enabled 56 days Advanced Endpoint Assessment : Enabled 56 days Botnet Traffic Filter : Enabled 56 days Managing Lic...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
50
Chapter 3: Licensing 69 In addition to the permanent activation key, you can install one or more time-based keys to enable certain features for a limited period of time. All premium features can be activated by either permanent or time-based keys, with the exception of Botnet Traffic Filter, which is only available...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
51
70 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition ■ Total UC Proxy and Security Contexts counts combine between the permanent and active time-based keys up to the platform limit. This way, you can configure a total of 22 virtual contexts by adding a time-based license for 20 cont...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
52
Chapter 3: Licensing 71 Some features may show no impact from the time-based key expiration until the Cisco ASA system reloads; because the feature is no longer licensed upon the reload, the device may reject some elements of the startup configuration. When a Cisco ASA that was previously licensed for 20 security c...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
53
72 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition You can also deactivate a previously installed time-based license using the optional deac￾tivate argument at the end of the activation-key key command, as shown in Example 3-5 ; this keyword is not available for the permanent acti...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
54
Chapter 3: Licensing 73 Module license enabled, the same activation key remains valid after the downgrade even though the older software no longer supports this feature. Combined Licenses in Failover and Clustering Prior to Cisco ASA Software version 8.3(1), both units in a failover pair required identi￾cal licens...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
55
74 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition units have the active AnyConnect Premium Peers licenses for 500 sessions each. After aggregating these capacities, each device in this failover pair allows up to 750 sessions for this feature. Notice that the combined count of 100...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
56
Chapter 3: Licensing 75 Aggregated Time-Based License Countdown If the combined failover pair or cluster license relies on time-based activation keys to activate any features or aggregate licensed capacities, the countdown rules for these keys depend on the feature type: ■ For any features that can be either enab...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
57
76 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Shared Server and Participants To utilize a shared license pool for AnyConnect Premium sessions, you need to designate one Cisco ASA in the network as the shared licensing server. Other ASA devices that ter￾minate AnyConnect Pre...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
58
Chapter 3: Licensing 77 ■ Each participant ASA has bidirectional IP reachability with the configured shared server and backup server, if applicable. The communication channel uses SSL encryption and allows crossing intermediate routers. Each participant ASA follows this process when handling AnyConnect Premium con...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
59
78 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Configuring Shared Licensing You should have the following information ready before starting the configuration pro￾cess of Shared Licensing: ■ Shared secret key that the given shared licensing group will use . ■ Identity of the ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
60
Chapter 3: Licensing 79 Follow these steps to configure the shared licensing server on this ASDM panel: 1. Set the shared secret. Configure the same value on all of the participants within the same shared licensing domain. 2. Optionally, set a particular TCP port that the participants would use to connect to the s...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
61
80 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Monitoring Shared Licensing Operation Use the show shared license command to monitor the communication between the shared license server and its participants. This command also displays information about the shared pool size an...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
62
Index Numbers 10GE I/O feature, 62 A AAA (authentication, autho￾rization, and accounting), 191 , 227 accounting, configuring, 219 - 222 administrative connections, troubleshooting, 222 - 227 attributes, DAP (dynamic access policies), 1063 - 1065 configuring, 204 - 209 configuring of adminis￾trati...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
63
auto configuration, 351 - 355 bypassing, 817 - 818 clustering, 698 - 700 configuration use cases, 362 - 371 manual configuration, 356 - 359 transparent firewall restrictions, 600 - 602 PAT (Port Address Translation), 4 - 5 , 340 policy NAT/PAT, 344 redesigning, 349 - 350 security protection me...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
64
AnyConnect tab (ASDM), 1074 appe FTP command, 485 appliances, accessing, 81 - 87 clientless remote-access SSL VPNs, configuring, 1034 - 1040 Application Centric Infrastructure (ACI), 27 Application endpoint attri￾bute (DAP), 1067 Application Inspection Engine module (CX), 276 application inspections...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
65
1168 application inspections (ASASM), 173 ASA’s Full Configuration Showing QoS for VoIP, Mail, and Web example (25- 10), 1160 - 1162 ASA’s Full Configuration Using Inbound and Outbound ACLs example (8-9), 259 - 260 ASASM (ASA Services Module), 51 , 173 - 176 , 189 deployment scenarios, 180 - 183 edge ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
66
Basic Host Scan 1169 and accounting (AAA). See AAA (authentication, authorization, and account￾ing) authentication server, defining, 198 - 204 AuthenticationApp (IPS), 741 authorization, 191 see also AAA (authentica￾tion, authorization, and accounting) commands, 217 - 218 configuring, 215 - 219 servic...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
67
1170 Basic Management Configuration on Master Unit example (16-19) certificates, 932 - 933 CA (Certificate Authority), 933 - 935 importing certificates manually, 989 installing certificates from files, 937 - 938 Local CA (Certificate Authority), 957 - 966 Cisco ASA, configuring to accept remote-access ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
68
CLI (command-line interface) 1171 Service), setting up, 1152 - 1153 Class Maps to Identify Mail and VoIP Traffic example (25-3), 1153 Class Maps to Identify Tunnel Traffic example (25- 4), 1153 class Syslog Commands example (22-18), 1080 - 1081 classes, event, 148 classification, packet, virtual firewa...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
69
1172 CLI (command-line interface) Selection example (16-18), 708 Cluster State Transition History example (16-25), 719 clustering, 685 - 731 combined licenses, 73 - 75 configuring, 706 - 716 connection processing, 702 - 705 control interface, 690 - 697 data interface, 690 - 697 versus failover, 685 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
70
configuration 1173 778 - 780 IPsec remote-access VPNs IKEv1 configuration, 862 - 889 IKEv2 configuration, 889 - 896 IPsec site-to-site tunnels, PKI certificates, 966 - 971 IPv6, 382 - 390 L2TP over IPsec remote￾access VPN, configuring, 912 - 915 Local CA (Certificate Authority) ASDM, 958 - 960 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
71
1174 configuration Configuration of Use Case 2 in Version 8.3 and Later Software example (10-8), 365 Configuration of Use Case 3 in Pre-8.3 Version of Software example (10-11), 367 Configuration of Use Case 3 in Version 8.3 and Later Software example (10-10), 367 Configuration of Use Case 4 in Pre-8.3 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
72
crypto maps, creating 1175 control interface, clustering, 690 - 697 Control Plane module (CX), 276 - 277 copy running-config startup￾config command, 124 Copying a System Image from a TFTP Server to the Local Flash example (5-13), 134 Copying a System Image from an FTP Server to the Local Flash exampl...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
73
1176 CSD (Cisco Secure Desktop) dashboard reports, 329 - 331 packet capturing, 332 - 335 NG IPS, enabling, 323 - 324 objects, 293 policy elements application objects, 299 - 300 application-service objects, 303 - 304 configuring header, 294 defining, 293 - 308 destination object groups, 305 - 3...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
74
Debugs to Show ISAKMP Proposal Is Acceptable example (19-24) 1177 debug mrib table command, 1129 debug ospf events command, 439 debug Output to Show IPsec SAs Are Activated example (20-45), 928 debug Output to Show ISAKMP Proposal Is Acceptable example (20- 39), 926 - 927 debug Output to Show Mode-Confi...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
75
1178 Debugs to Show Mismatched ISAKMP Policies example (19-28) Defining the IGMP Version example (24-4), 1124 deny option (prefix-list command), 431 Denying Specific FTP Commands example (13-10), 484 deployment Active/Standby failover, 680 - 684 AnyConnect client, 1112 - 1116 ASASM (ASA Services M...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
76
DNS (Domain Name System) 1179 IPS signatures, 791 - 792 message IDs, 118 NAT-T for a peer, 827 password recovery process, 141 - 144 Sysopt, 886 , 1109 Disabling a Feature with Reload Requirement exam￾ple (3-6), 72 Disabling a Message ID example (5-33), 118 Disabling DTLS example (23- 10), 1108 Disa...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
77
1180 DNS (Domain Name System) Rule), 242 Enabling Accounting by Using an ACL to Define Interesting Traffic example (7-13), 220 Enabling an Interface exam￾ple (4-10), 104 Enabling ARP Inspection example (15-12), 614 Enabling Cisco AnyConnect Secure Mobility Client SSL VPN example (23-4), 1098 Enabling Co...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
78
features 1181 data addressing, 660 - 662 link security, 659 - 660 stateful link, 659 monitoring, 678 - 680 role transition, 666 - 667 software requirements, 656 - 658 state transition, 666 - 667 stateful, 653 - 654 troubleshooting, 678 - 680 unit roles, 652 - 653 Failover Event Syslog Message exa...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
79
1182 features 597 - 599 monitoring, 636 - 637 restrictions, 599 - 602 versus routed firewalls, 593 - 594 setting up interfaces, 604 - 605 SMTFs (single-mode transparent firewalls), 593 - 597 troubleshooting, 637 - 640 virtual firewall, 531 - 533 , 535 , 590 architecture, 533 - 544 configuring...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
80
ha event class 1183 configuring, 706 - 716 hardware requirements, 687 - 690 health monitoring, 697 - 698 interfaces, 690 - 697 monitoring, 717 - 720 NAT (Network Address Translation), 698 - 700 packet flow, 702 - 706 performance, 700 - 702 software requirements, 687 - 690 spanned EtherChannel ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
81
1184 hairpinning IPsec Management Protocol) defining versions, 1123 - 1124 IP multicast routing, 1120 query timeout, 1123 states, limiting, 1122 - 1123 IGMP group, statically assigning, 1122 IGMP Query Timeout example (24-3), 1123 IGP (Interior Gateway Protocol), 400 IKE (Internet Key Exchange) pr...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
82
IP (Internet Protocol) routing 1185 (Monitoring screen), 99 interfaces option (system execution space), 534 Interior Gateway Protocol (IGP), 400 internal segment firewall￾ing, ASASM (ASA Services Module), 181 - 182 internal-control interface (CX), 270 internal-data interface (CX), 270 Internet access, ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
83
1186 IP (Internet Protocol) routing process information, display￾ing, 771 - 772 promiscuous mode, 738 - 739 protocol analysis, 12 remote blocking, 758 - 762 risk rating (RR), 789 - 791 SensorApp, 743 signatures disabling, 791 - 792 retiring, 792 - 793 upgrading, 772 - 776 software architecture, 73...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
84
license keys, CIPS, installing 1187 router advertisement trans￾mission interval, 385 - 386 topology, 386 traffic filtering, configuring, 387 ISAKMP (Internet Security Association and Key Management Protocol) attributes, 802 enabling, 806 , 872 policy configuration, 968 ISAKMP Policy Configuration exa...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
85
1188 licensed features Security Device Manager), 958 - 960 enrolling users ASDM (Adaptive Security Device Manager), 963 - 965 CLI (command-line inter￾face), 965 - 966 Local CA Certificate Chain example (21-21), 961 - 962 Local User Accounts example (20-6), 880 Local User Accounts example (22-8), 1001 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
86
modules 1189 (Open Shortest Path First), 424 Media Gateway Control Protocol (MGCP), inspec￾tions, 519 - 521 Member Class to Context Mapping example (14-17), 559 memberOf AAA attribute, 1063 message-length command (GTP map), 492 metric option (route com￾mand), 394 MGCP (Media Gateway Control Protocol)...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
87
1190 modules enabling, 1121 - 1124 IGMP support, 1120 PIM (Protocol Independent Multicast), enabling, 1124 - 1127 PIM-SM (Protocol Independent Multicast￾Sparse Mode), 1120 troubleshooting, 1127 - 1129 Multiple Device mode (PRSM), 282 multiple-mode firewalls, MMTFs (multimode trans￾parent firewalls), ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
88
OSPF (Open Shortest Path First) 1191 NTP option (system execu￾tion space), 534 O object group policy element (CX), 293 object grouping, ACLs (access control lists), 243 - 250 object policy elements (CX), 293 Obtaining the CA Certificate from the CA Server exam￾ple (21-6), 949 Obtaining the ID Certific...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
89
1192 OSPF (Open Shortest Path First) policy, 344 static, 341 - 342 pattern matching IDS (intrusion detection systems), 11 IPS (intrusion prevention system), 11 payload length field (IPv6 header), 381 PBR (policy-based routing) ASASM (ASA Services Module), trusted flow bypass, 183 - 189 configurati...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
90
prioritization, traffic, QoS (Quality of Service) 1193 policy NAT/PAT, 344 Policy Table component (Data Plane), 274 policy-based routing (PBR), ASASM (ASA Services Module), trusted flow bypass, 186 pools of addresses, defining, 1101 - 1103 Port Address Translation (PAT). See PAT (Port Address Translati...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
91
1194 priority queuing, QoS (Quality of Service), tuning NAT topology, 389 optional parameters, 385 - 386 origins, 379 - 382 router advertisement transmission interval, 385 - 386 topology, 386 traffic filtering, 387 ISAKMP (Internet Security Association and Key Management Protocol) attributes, 802 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
92
recovery process, passwords 1195 IP flow, 1141 policing, 1134 - 1135 , 1149 - 1150 prioritization, 1133 , 1148 shaping, 1135 - 1136 , 1150 - 1151 Traffic Classification Criteria wizard, 1145 - 1147 VPN tunnel group, 1141 VPN tunnels, 1142 Quality of Service (QoS). See QoS (Quality of Service) qu...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
93
1196 redesigning address translation resource management, vir￾tual firewall, 555 - 559 resource management option (system execution space), 534 resource traps, 162 response option (max-head￾er-length command), 512 restrict access to VLAN attribute (SSL VPN), 998 restrictions, transparent fire￾walls, 599 -...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
94
security 1197 Sample IPS Redirection Policy example (17-7), 780 SCCP (Simple Client Control Protocol), inspections, 525 - 527 SCEP (Simple Certificate Enrollment Protocol), PKI (Public Key Infrastructure), 936 enrollment problems, 975 - 976 certificates, installing, 940 - 943 SCEP Required AAA attri...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
95
1198 security anomaly-based analysis, 12 - 14 ASDM, setting up, 752 backing up configuration, 776 basic management set￾tings, 748 - 752 BTF (Botnet Traffic Filter), 780 - 786 CIPS, 744 - 776 CMS event tables, 794 CollaborationApp, 744 configuring basic man￾agement settings, 748 - 752 configuring...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
96
sequence of events, DAP (dynamic access policies) 1199 user context, 535 - 538 virtualization, 26 - 27 VPNs (Virtual Private Networks), 14 - 25 security appliances, support￾ed subinterfaces, 107 Security Context Creation Failure example (14-26), 588 security contexts site-to-site IPsec VPNs, hub and sp...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
97
1200 serial console connections, authentication Shared Premium licensing, SSL VPNs, 985 shared premium VPN licens￾ing, 75 - 80 show aaa-server command, 225 show aaa-server protocol command, 202 - 203 show access-list outside_ access_in command, 261 show admin-context com￾mand, 586 show asp drop command,...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
98
Sig Fidelity Rating parameter (Add Signature dialog box) 1201 show statistics analysis￾engine command, 795 - 796 show statistics analysis￾engine Command Output example (18-2), 795 - 796 show statistics authentication command, 796 show statistics authentication Command Output example (18-3), 796 show statis...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
99
1202 Signature ID parameter (Add Signature dialog box) Site-to-Site VPN Feature icon (Configuration screen), 98 site-to-site VPN tunnels, identity NAT, 367 - 369 sizes, buffers, 166 Skinny (SCCP), inspections, 525 - 527 SLA monitor, static routes, configuring, 647 - 648 slave units, clustering, 685 - ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
100
static address translation 1203 customized, 1016 - 1018 full customization, 1019 - 1021 logout page, 1015 navigation panel, 1013 portal customization, config￾uring, 1006 - 1024 portal page, 1012 customized, 1018 - 1019 servers, 1004 title area, 1008 - 1010 title panel, 1012 Toolbar screen, 1013 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
101
1204 static IP routes, configuring syslog servers defining, 153 - 154 logging, 150 system clock automatic clock adjustment, 116 - 118 configuring, 114 - 118 date, setting, 116 manual adjustment, 114 - 116 time zone, setting, 114 - 115 System Context Configuration with Failover Groups example (16-...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
102
traffic 1205 ules, enabling, 316 - 322 defining decryption policy, 320 - 322 TLS (Transport Layer Security) Decryption Proxy module, 276 TLS Proxy Commands Sent by ASDM example (13-16), 506 TLS Proxy feature, 505 - 506 Toolbar screen, SSL VPNs, 1013 topologies EIGRP, displaying, 454 IPv6, 386 N...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
103
1206 traffic (Monitoring screen), 100 Trivial File Transfer Protocol (TFTP), inspections, 528 troubleshooting administrative connections, 222 - 227 AnyConnect SSL VPNs, 1116 - 1118 clientless remote-access SSL VPNs, 1081 - 1084 clustering, 717 - 720 CPUs, 172 devices, 168 - 172 EIGRP, 454 - 462 ...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
104
Verifying Firewalls Mode example (15-3) 1207 User attribute (Add Access Rule dialog box), 236 User attribute (Add Management Access Rule), 241 user authentication, client￾based remote-access SSL VPNs, 1094 - 1095 User Comments parameter (Add Signature dialog box), 758 user context, virtual firewall, 53...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
105
1208 Verifying the Admin Context example (14-12) configuring, 1115 - 1116 troubleshooting, 1116 - 1118 client-based remote-access SSL VPNs, 1085 , 1118 AnyConnect secure mobility client configu￾ration, 1096 - 1112 configuring, 1090 - 1095 , 1090 - 1094 deploying, 1086 - 1088 enrolling digital certifi￾c...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
106
Zero Downtime upgrade, clustering 1209 Service), 1142 W-Z WAAS (Wide Area Application Services), inspections, 528 web ACL attribute (SSL VPN), 998 Web Categories dashboard (CX), 330 Web Destinations dashboard (CX), 330 web reputation profiles (CX), 306 - 307 webfo event class, 148 Webtype ACL Fil...
https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf
0
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 First Published: 2022-11-29 Last Modified: 2023-11-06 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
2
CONTENTS PREF ACE About This Guide lv Document Objectives lv Related Documentation lv Document Conventions lv Communications, Services, and Additional Information lvii P ART I Getting Started with the ASA 59 CHAPTER 1 Introduction to the Secure Firewall ASA 1 Hardware and Software Compatibility 1 VPN Compatibility 1 Ne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
3
Security Context Overview 8 ASA Clustering Overview 8 Special and Legacy Services 8 CHAPTER 2 Getting Started 11 Access the Console for the Command-Line Interface 11 Access the ISA 3000 Console 11 Access the Firepower 2100 Platform Mode Console 12 Access the Firepower 1000, 2100 Appliance Mode, and Secure Firewall 3100...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
4
Create Text Configuration Files Offline 42 Apply Configuration Changes to Connections 43 Reload the ASA 43 CHAPTER 3 Licenses: Product Authorization Key Licensing for the ISA 3000 45 About PAK Licenses 45 Preinstalled License 45 Permanent License 45 Time-Based Licenses 46 Time-Based License Activation Guidelines 46 How...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
5
Obtain a Strong Encryption License 56 Activate or Deactivate Keys 58 Configure a Shared License (Secure Client 3 and Earlier) 59 About Shared Licenses 60 About the Shared Licensing Server and Participants 60 Communication Issues Between Participant and Server 61 About the Shared Licensing Backup Server 61 Failover and ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
6
Carrier License 95 Total TLS Proxy Sessions 95 VLANs, Maximum 96 Botnet Traffic Filter License 96 Failover or ASA Cluster Licenses 96 Failover Licenses for the ASAv 96 Failover Licenses for the Firepower 1010 96 Failover Licenses for the Firepower 1100 97 Failover Licenses for the Firepower 2100 98 Failover Licenses fo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
7
(Optional) Return the Firepower 1000, 2100, Secure Firewall 3100 Permanent License 136 (Optional) Deregister the Firepower 1000, 2100, Secure Firewall 3100 (Regular and On-Prem) 137 (Optional) Renew the Firepower 1000, 2100, Secure Firewall 3100 ID Certificate or License Entitlement (Regular and On-Prem) 137 Firepower ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
8
Requirements and Prerequisites for Hardware and Software Combinations 168 Guidelines and Limitations for Logical Devices 169 Guidelines and Limitations for Interfaces 169 General Guidelines and Limitations 170 Requirements and Prerequisites for High Availability 170 Configure Interfaces 170 Configure a Physical Interfa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
9
Guidelines for Firewall Mode 195 Set the Firewall Mode 197 Examples for Firewall Mode 198 How Data Moves Through the ASA in Routed Firewall Mode 198 An Inside User Visits a Web Server 198 An Outside User Visits a Web Server on the DMZ 199 An Inside User Visits a Web Server on the DMZ 200 An Outside User Attempts to Acc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
10
Resource Classes 219 Resource Limits 219 Default Class 220 Use Oversubscribed Resources 221 Use Unlimited Resources 221 About MAC Addresses 222 MAC Addresses in Multiple Context Mode 222 Automatic MAC Addresses 222 VPN Support 223 Licensing for Multiple Context Mode 223 Prerequisites for Multiple Context Mode 224 Guide...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
11
View MAC Addresses in the System Configuration 250 View MAC Addresses Within a Context 252 Examples for Multiple Context Mode 252 History for Multiple Context Mode 254 CHAPTER 8 Failover for High Availability 259 About Failover 259 Failover Modes 259 Failover System Requirements 260 Hardware Requirements 260 Software R...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
12
Failover Events 275 About Active/Active Failover 276 Active/Active Failover Overview 276 Primary/Secondary Roles and Active/Standby Status for a Failover Group 276 Active Unit Determination for Failover Groups at Startup 277 Failover Events 277 Licensing for Failover 278 Guidelines for Failover 279 Defaults for Failove...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
13
SNMP Failover Traps 307 Monitoring Failover Status 307 History for Failover 308 CHAPTER 9 Failover for High Availability in the Public Cloud 311 About Failover in the Public Cloud 311 About Active/Backup Failover 312 Primary/Secondary Roles and Active/Backup Status 312 Failover Connection 312 Polling and Hello Messages...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
14
Failover Messages 330 History for Failover in the Public Cloud 330 CHAPTER 1 0 ASA Cluster for the Secure Firewall 3100 331 About ASA Clustering 331 How the Cluster Fits into Your Network 331 Cluster Members 332 Bootstrap Configuration 332 Control and Data Node Roles 332 Cluster Interfaces 332 Cluster Control Link 332 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
15
Configure Connection Rebalancing and the Cluster TCP Replication Delay 365 Configure Inter-Site Features 366 Manage Cluster Nodes 373 Become an Inactive Node 373 Deactivate a Node 374 Rejoin the Cluster 375 Leave the Cluster 375 Change the Control Node 377 Execute a Command Cluster-Wide 377 Monitoring the ASA Cluster 3...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
16
AAA for Network Access and Clustering 405 Connection Settings and Clustering 406 FTP and Clustering 406 ICMP Inspection and Clustering 406 Multicast Routing and Clustering 406 NAT and Clustering 406 Dynamic Routing and Clustering 408 SCTP and Clustering 409 SIP Inspection and Clustering 409 SNMP and Clustering 409 STUN...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
17
Cluster Control Link 420 Size the Cluster Control Link 421 Cluster Control Link Redundancy 421 Cluster Control Link Reliability 422 Cluster Control Link Network 422 Cluster Interfaces 422 Connecting to a Redundant Switch System 422 Configuration Replication 423 Secure Firewall ASA Cluster Management 423 Management Netw...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
18
Become an Inactive Member 467 Deactivate a Unit 468 Rejoin the Cluster 469 Change the Control Unit 470 Execute a Command Cluster-Wide 470 ASA: Monitoring the ASA Cluster on the Firepower 4100/9300 chassis 471 Monitoring Cluster Status 471 Capturing Packets Cluster-Wide 476 Monitoring Cluster Resources 476 Monitoring Cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
19
Dynamic Routing and Clustering 496 SCTP and Clustering 497 SIP Inspection and Clustering 497 SNMP and Clustering 497 STUN and Clustering 497 Syslog and NetFlow and Clustering 497 Cisco TrustSec and Clustering 497 VPN and Clustering on the Secure Firewall eXtensible Operating System (FXOS) Chassis 497 Performance Scalin...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
20
Equal-Cost Multi-Path Routing 516 Cluster Control Link 516 Cluster Control Link Traffic Overview 516 Cluster Control Link Failure 517 Configuration Replication 517 ASA Virtual Cluster Management 517 Management Network 517 Management Interface 517 Control Node Management Vs. Data Node Management 518 Crypto Key Replicati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
21
Rejoin the Cluster 548 Leave the Cluster 548 Change the Control Node 549 Execute a Command Cluster-Wide 550 Monitoring the ASA Virtual Cluster 551 Monitoring Cluster Status 551 Capturing Packets Cluster-Wide 555 Monitoring Cluster Resources 555 Monitoring Cluster Traffic 555 Monitoring Cluster Routing 560 Configuring L...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
22
Performance Scaling Factor 570 Control Node Election 570 High Availability Within the ASA Virtual Cluster 571 Node Health Monitoring 571 Interface Monitoring 571 Status After Failure 571 Rejoining the Cluster 572 Data Path Connection State Replication 572 How the ASA Virtual Cluster Manages Connections 573 Connection R...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf