index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
30 | xxx Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Deployment Scenario of AnyConnect Client 1112
Step 1: Set Up CSD for Registry Check 1114
Step 2: Set Up RADIUS for Authentication 1114
Step 3: Configure AnyConnect SSL VPN 1115
Step 4: Enable Address Translation for Internet Access... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
31 | xxxi
Configuring Quality of Service 1142
QoS Configuration via ASDM 1143
Step 1: Tune Priority Queue 1143
Step 2: Define a Service Policy 1144
Step 3: Specify Traffic Classification Criteria 1145
Step 4: Apply an Action Rule 1148
QoS Configuration via CLI 1152
Step 1: Tune the Priority Queue 1152
Step 2: Set Up a Class... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
32 | xxxii Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Icons Used in This Book
PC Cisco ASA
5500
Secure
Server
Cisco
CallManager
Terminal File
Server
Web
Server
Ciscoworks
Workstation
Printer Laptop IBM
Mainframe
Cluster
Controller
DSU/CSU
Router Bridge Hub DSU/CSU Catalyst
Switch
M... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
33 | xxxiii
Foreword
First, let me congratulate Jazib, Omar, and Andrew for producing what will be regarded
as the definitive guide to maximizing the value of the Cisco Adaptive Security Appliance
(ASA).
This book takes a hands-on approach to its subject and illuminates the design concepts
and functionality built into th... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
34 | xxxiv Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Introduction
Cyber security has always been a challenge for many organizations, especially for those
that cannot deploy separate devices to provide next-generation firewall, intrusion prevention, and virtual private network (VP... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
35 | Introduction xxxv
■ Chapter 3, “Licensing”: Different features in the Cisco ASA require a license. This
chapter describes the available licenses for each Cisco ASA model and specific
features, and explains how to install such licenses. It also covers the details about
how you can configure a Cisco ASA as a licensing... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
36 | xxxvi Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
■ Chapter 10, “Network Address Translation”: This chapter provides details on how to
configure Network Address Translation (NAT) on the Cisco ASA. It covers the different address translation types, how to configure address tran... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
37 | Introduction xxxvii
Part IV, “Virtual Private Network (VPN) Solutions,” includes the following chapters:
■ Chapter 19, “Site-to-Site IPsec VPNs”: The Cisco ASA supports IPsec VPN features
that enable you to connect networks in different geographic locations. This chapter
provides configuration and troubleshooting gui... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
38 | This page intentionally left blank | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
39 | This page intentionally left blank | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
40 | Chapter 3
Licensing
This chapter covers the following topics:
■ Licensed features on ASA
■ Managing licenses with activation keys
■ Combined licenses in failover and clustering
■ Shared Premium AnyConnect VPN licensing
ASA offers a very comprehensive feature set that helps secure networks of all shapes
and ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
41 | 60 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
For example, you can increase the maximum concurrent fi rewall connection count on the
Cisco ASA 5505 from 10,000 to 25,000 by installing a Security Plus license.
In addition to the Base and Security Plus licenses, you can activa... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
42 | Chapter 3: Licensing 61
As you identify the correct feature set to take the most advantage of Cisco ASA capabilities while fully protecting your network, it helps to organize the licensed features into
the following logical categories:
■ Basic platform capabilities: Typically are relevant to all Cisco ASA deploymen... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
43 | 62 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
■ VLAN Trunk Ports: This feature is applicable only to Cisco ASA 5505 appliances
because they have the built-in Ethernet switch. With the Base License, you can configure the physical switch ports only in access mode; with the Secu... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
44 | Chapter 3: Licensing 63
■ Encryption-3DES-AES: This license adds 3DES and AES algorithms in order to
provide strong encryption capabilities for VPN, Unified Communications Proxy,
and management sessions. Some features, such as VPN Load Balancing, also require
this license for proper operation. Export regulations con... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
45 | 64 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
platform limit (unrestricted). After applying this license, use the tls-proxy maximum-sessions command to raise the configured session limit as desired. It should
be noted that other Unified Communications inspection features that... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
46 | Chapter 3: Licensing 65
the imperfections of external load-balancing. All devices in a cluster must have this
feature enabled. The availability of the Cluster feature and the maximum supported
number of cluster members depend on the particular software image version and
hardware platform type.
■ IPS Module: This fe... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
47 | 66 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
transit VoIP connections that rely on the cleartext application inspection. Keep
in mind that the number of active TLS proxy sessions may exceed the number of
active VoIP endpoints, depending on their high-availability configurati... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
48 | Chapter 3: Licensing 67
command issued on a Cisco ASA 5525-X appliance. Notice that the count of Firewall
Connections does not show up as a licensed feature; check the output of the show
resource usage command for some of these platform capacities. However, this sample
output contains several pieces of additional in... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
49 | 68 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Active Timebased Activation Key:
0x493c3ecd 0xcd6458a1 0x31b5a533 0xc970a48b 0x05867295
Encryption-3DES-AES : Enabled 56 days
Advanced Endpoint Assessment : Enabled 56 days
Botnet Traffic Filter : Enabled 56 days
Managing Lic... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
50 | Chapter 3: Licensing 69
In addition to the permanent activation key, you can install one or more time-based
keys to enable certain features for a limited period of time. All premium features can be
activated by either permanent or time-based keys, with the exception of Botnet Traffic
Filter, which is only available... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
51 | 70 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
■ Total UC Proxy and Security Contexts counts combine between the permanent and
active time-based keys up to the platform limit. This way, you can configure a total
of 22 virtual contexts by adding a time-based license for 20 cont... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
52 | Chapter 3: Licensing 71
Some features may show no impact from the time-based key expiration until the Cisco
ASA system reloads; because the feature is no longer licensed upon the reload, the
device may reject some elements of the startup configuration. When a Cisco ASA that
was previously licensed for 20 security c... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
53 | 72 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
You can also deactivate a previously installed time-based license using the optional deactivate argument at the end of the activation-key key command, as shown in Example
3-5 ; this keyword is not available for the permanent acti... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
54 | Chapter 3: Licensing 73
Module license enabled, the same activation key remains valid after the downgrade even
though the older software no longer supports this feature.
Combined Licenses in Failover and Clustering
Prior to Cisco ASA Software version 8.3(1), both units in a failover pair required identical licens... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
55 | 74 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
units have the active AnyConnect Premium Peers licenses for 500 sessions each. After
aggregating these capacities, each device in this failover pair allows up to 750 sessions
for this feature. Notice that the combined count of 100... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
56 | Chapter 3: Licensing 75
Aggregated Time-Based License Countdown
If the combined failover pair or cluster license relies on time-based activation keys to
activate any features or aggregate licensed capacities, the countdown rules for these keys
depend on the feature type:
■ For any features that can be either enab... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
57 | 76 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Shared Server and Participants
To utilize a shared license pool for AnyConnect Premium sessions, you need to designate
one Cisco ASA in the network as the shared licensing server. Other ASA devices that terminate AnyConnect Pre... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
58 | Chapter 3: Licensing 77
■ Each participant ASA has bidirectional IP reachability with the configured shared
server and backup server, if applicable. The communication channel uses SSL
encryption and allows crossing intermediate routers.
Each participant ASA follows this process when handling AnyConnect Premium
con... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
59 | 78 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Configuring Shared Licensing
You should have the following information ready before starting the configuration process of Shared Licensing:
■ Shared secret key that the given shared licensing group will use .
■ Identity of the ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
60 | Chapter 3: Licensing 79
Follow these steps to configure the shared licensing server on this ASDM panel:
1. Set the shared secret. Configure the same value on all of the participants within the
same shared licensing domain.
2. Optionally, set a particular TCP port that the participants would use to connect to
the s... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
61 | 80 Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Monitoring Shared Licensing Operation
Use the show shared license command to monitor the communication between the
shared license server and its participants. This command also displays information about
the shared pool size an... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
62 | Index
Numbers
10GE I/O feature, 62
A
AAA (authentication, authorization, and accounting),
191 , 227
accounting, configuring,
219 - 222
administrative connections,
troubleshooting, 222 - 227
attributes, DAP (dynamic
access policies), 1063 - 1065
configuring, 204 - 209
configuring of administrati... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
63 | auto configuration,
351 - 355
bypassing, 817 - 818
clustering, 698 - 700
configuration use cases,
362 - 371
manual configuration,
356 - 359
transparent firewall
restrictions, 600 - 602
PAT (Port Address
Translation), 4 - 5 , 340
policy NAT/PAT, 344
redesigning, 349 - 350
security protection me... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
64 | AnyConnect tab
(ASDM), 1074
appe FTP command, 485
appliances, accessing, 81 - 87
clientless remote-access SSL
VPNs, configuring,
1034 - 1040
Application Centric
Infrastructure (ACI), 27
Application endpoint attribute (DAP), 1067
Application Inspection
Engine module (CX), 276
application inspections... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
65 | 1168 application inspections
(ASASM), 173
ASA’s Full Configuration
Showing QoS for VoIP,
Mail, and Web example (25-
10), 1160 - 1162
ASA’s Full Configuration
Using Inbound and
Outbound ACLs example
(8-9), 259 - 260
ASASM (ASA Services
Module), 51 , 173 - 176 , 189
deployment scenarios,
180 - 183
edge ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
66 | Basic Host Scan 1169
and accounting (AAA).
See AAA (authentication,
authorization, and accounting)
authentication server,
defining, 198 - 204
AuthenticationApp
(IPS), 741
authorization, 191
see also AAA (authentication, authorization, and
accounting)
commands, 217 - 218
configuring, 215 - 219
servic... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
67 | 1170 Basic Management Configuration on Master Unit example (16-19)
certificates, 932 - 933
CA (Certificate Authority),
933 - 935
importing certificates
manually, 989
installing certificates
from files, 937 - 938
Local CA (Certificate
Authority), 957 - 966
Cisco ASA, configuring to
accept remote-access ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
68 | CLI (command-line interface) 1171
Service), setting up,
1152 - 1153
Class Maps to Identify Mail
and VoIP Traffic example
(25-3), 1153
Class Maps to Identify
Tunnel Traffic example (25-
4), 1153
class Syslog Commands
example (22-18),
1080 - 1081
classes, event, 148
classification, packet, virtual
firewa... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
69 | 1172 CLI (command-line interface)
Selection example
(16-18), 708
Cluster State Transition
History example
(16-25), 719
clustering, 685 - 731
combined licenses, 73 - 75
configuring, 706 - 716
connection processing,
702 - 705
control interface, 690 - 697
data interface, 690 - 697
versus failover, 685 ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
70 | configuration 1173
778 - 780
IPsec remote-access VPNs
IKEv1 configuration,
862 - 889
IKEv2 configuration,
889 - 896
IPsec site-to-site tunnels, PKI
certificates, 966 - 971
IPv6, 382 - 390
L2TP over IPsec remoteaccess VPN, configuring,
912 - 915
Local CA (Certificate
Authority)
ASDM, 958 - 960
... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
71 | 1174 configuration
Configuration of Use Case
2 in Version 8.3 and Later
Software example
(10-8), 365
Configuration of Use Case
3 in Pre-8.3 Version of
Software example
(10-11), 367
Configuration of Use Case
3 in Version 8.3 and Later
Software example
(10-10), 367
Configuration of Use Case
4 in Pre-8.3 ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
72 | crypto maps, creating 1175
control interface, clustering,
690 - 697
Control Plane module (CX),
276 - 277
copy running-config startupconfig command, 124
Copying a System Image
from a TFTP Server to the
Local Flash example (5-13),
134
Copying a System Image
from an FTP Server to the
Local Flash exampl... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
73 | 1176 CSD (Cisco Secure Desktop)
dashboard reports,
329 - 331
packet capturing,
332 - 335
NG IPS, enabling, 323 - 324
objects, 293
policy elements
application objects,
299 - 300
application-service
objects, 303 - 304
configuring header, 294
defining, 293 - 308
destination object groups,
305 - 3... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
74 | Debugs to Show ISAKMP Proposal Is Acceptable example (19-24) 1177
debug mrib table
command, 1129
debug ospf events
command, 439
debug Output to Show IPsec
SAs Are Activated example
(20-45), 928
debug Output to Show
ISAKMP Proposal Is
Acceptable example (20-
39), 926 - 927
debug Output to Show
Mode-Confi... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
75 | 1178 Debugs to Show Mismatched ISAKMP Policies example (19-28)
Defining the IGMP Version
example (24-4), 1124
deny option (prefix-list
command), 431
Denying Specific FTP
Commands example
(13-10), 484
deployment
Active/Standby failover,
680 - 684
AnyConnect client,
1112 - 1116
ASASM (ASA Services
M... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
76 | DNS (Domain Name System) 1179
IPS signatures, 791 - 792
message IDs, 118
NAT-T for a peer, 827
password recovery process,
141 - 144
Sysopt, 886 , 1109
Disabling a Feature with
Reload Requirement example (3-6), 72
Disabling a Message ID
example (5-33), 118
Disabling DTLS example (23-
10), 1108
Disa... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
77 | 1180 DNS (Domain Name System)
Rule), 242
Enabling Accounting by
Using an ACL to Define
Interesting Traffic example
(7-13), 220
Enabling an Interface example (4-10), 104
Enabling ARP Inspection
example (15-12), 614
Enabling Cisco AnyConnect
Secure Mobility Client SSL
VPN example (23-4), 1098
Enabling Co... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
78 | features 1181
data addressing, 660 - 662
link security, 659 - 660
stateful link, 659
monitoring, 678 - 680
role transition, 666 - 667
software requirements,
656 - 658
state transition, 666 - 667
stateful, 653 - 654
troubleshooting, 678 - 680
unit roles, 652 - 653
Failover Event Syslog
Message exa... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
79 | 1182 features
597 - 599
monitoring, 636 - 637
restrictions, 599 - 602
versus routed firewalls,
593 - 594
setting up interfaces,
604 - 605
SMTFs (single-mode
transparent firewalls),
593 - 597
troubleshooting, 637 - 640
virtual firewall, 531 - 533 ,
535 , 590
architecture, 533 - 544
configuring... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
80 | ha event class 1183
configuring, 706 - 716
hardware requirements,
687 - 690
health monitoring,
697 - 698
interfaces, 690 - 697
monitoring, 717 - 720
NAT (Network Address
Translation), 698 - 700
packet flow, 702 - 706
performance, 700 - 702
software requirements,
687 - 690
spanned EtherChannel
... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
81 | 1184 hairpinning IPsec
Management Protocol)
defining versions,
1123 - 1124
IP multicast routing, 1120
query timeout, 1123
states, limiting, 1122 - 1123
IGMP group, statically
assigning, 1122
IGMP Query Timeout
example (24-3), 1123
IGP (Interior Gateway
Protocol), 400
IKE (Internet Key Exchange)
pr... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
82 | IP (Internet Protocol) routing 1185
(Monitoring screen), 99
interfaces option (system
execution space), 534
Interior Gateway Protocol
(IGP), 400
internal segment firewalling, ASASM (ASA Services
Module), 181 - 182
internal-control interface
(CX), 270
internal-data interface
(CX), 270
Internet access, ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
83 | 1186 IP (Internet Protocol) routing
process information, displaying, 771 - 772
promiscuous mode, 738 - 739
protocol analysis, 12
remote blocking, 758 - 762
risk rating (RR), 789 - 791
SensorApp, 743
signatures
disabling, 791 - 792
retiring, 792 - 793
upgrading, 772 - 776
software architecture,
73... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
84 | license keys, CIPS, installing 1187
router advertisement transmission interval, 385 - 386
topology, 386
traffic filtering,
configuring, 387
ISAKMP (Internet Security
Association and Key
Management Protocol)
attributes, 802
enabling, 806 , 872
policy configuration, 968
ISAKMP Policy
Configuration exa... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
85 | 1188 licensed features
Security Device
Manager), 958 - 960
enrolling users
ASDM (Adaptive
Security Device
Manager), 963 - 965
CLI (command-line interface), 965 - 966
Local CA Certificate Chain
example (21-21), 961 - 962
Local User Accounts
example (20-6), 880
Local User Accounts
example (22-8), 1001 ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
86 | modules 1189
(Open Shortest Path
First), 424
Media Gateway Control
Protocol (MGCP), inspections, 519 - 521
Member Class to Context
Mapping example
(14-17), 559
memberOf AAA
attribute, 1063
message-length command
(GTP map), 492
metric option (route command), 394
MGCP (Media Gateway
Control Protocol)... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
87 | 1190 modules
enabling, 1121 - 1124
IGMP support, 1120
PIM (Protocol Independent
Multicast), enabling,
1124 - 1127
PIM-SM (Protocol
Independent MulticastSparse Mode), 1120
troubleshooting, 1127 - 1129
Multiple Device mode
(PRSM), 282
multiple-mode firewalls,
MMTFs (multimode transparent firewalls), ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
88 | OSPF (Open Shortest Path First) 1191
NTP option (system execution space), 534
O
object group policy element
(CX), 293
object grouping, ACLs
(access control lists),
243 - 250
object policy elements
(CX), 293
Obtaining the CA Certificate
from the CA Server example (21-6), 949
Obtaining the ID Certific... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
89 | 1192 OSPF (Open Shortest Path First)
policy, 344
static, 341 - 342
pattern matching
IDS (intrusion detection
systems), 11
IPS (intrusion prevention
system), 11
payload length field (IPv6
header), 381
PBR (policy-based routing)
ASASM (ASA Services
Module), trusted flow
bypass, 183 - 189
configurati... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
90 | prioritization, traffic, QoS (Quality of Service) 1193
policy NAT/PAT, 344
Policy Table component
(Data Plane), 274
policy-based routing (PBR),
ASASM (ASA Services
Module), trusted flow
bypass, 186
pools of addresses, defining,
1101 - 1103
Port Address Translation
(PAT). See PAT (Port
Address Translati... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
91 | 1194 priority queuing, QoS (Quality of Service), tuning
NAT topology, 389
optional parameters,
385 - 386
origins, 379 - 382
router advertisement
transmission interval,
385 - 386
topology, 386
traffic filtering, 387
ISAKMP (Internet Security
Association and Key
Management Protocol)
attributes, 802
... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
92 | recovery process, passwords 1195
IP flow, 1141
policing, 1134 - 1135 ,
1149 - 1150
prioritization,
1133 , 1148
shaping, 1135 - 1136 ,
1150 - 1151
Traffic Classification Criteria
wizard, 1145 - 1147
VPN tunnel group, 1141
VPN tunnels, 1142
Quality of Service (QoS). See
QoS (Quality of Service)
qu... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
93 | 1196 redesigning address translation
resource management, virtual firewall, 555 - 559
resource management option
(system execution
space), 534
resource traps, 162
response option (max-header-length command), 512
restrict access to VLAN
attribute (SSL VPN), 998
restrictions, transparent firewalls, 599 -... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
94 | security 1197
Sample IPS Redirection
Policy example (17-7), 780
SCCP (Simple Client Control
Protocol), inspections,
525 - 527
SCEP (Simple Certificate
Enrollment Protocol),
PKI (Public Key
Infrastructure), 936
enrollment problems,
975 - 976
certificates, installing,
940 - 943
SCEP Required AAA
attri... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
95 | 1198 security
anomaly-based analysis,
12 - 14
ASDM, setting up, 752
backing up
configuration, 776
basic management settings, 748 - 752
BTF (Botnet Traffic
Filter), 780 - 786
CIPS, 744 - 776
CMS event tables, 794
CollaborationApp, 744
configuring basic management settings,
748 - 752
configuring... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
96 | sequence of events, DAP (dynamic access policies) 1199
user context, 535 - 538
virtualization, 26 - 27
VPNs (Virtual Private
Networks), 14 - 25
security appliances, supported subinterfaces, 107
Security Context Creation
Failure
example (14-26), 588
security contexts
site-to-site IPsec VPNs, hub
and sp... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
97 | 1200 serial console connections, authentication
Shared Premium licensing,
SSL VPNs, 985
shared premium VPN licensing, 75 - 80
show aaa-server
command, 225
show aaa-server protocol
command, 202 - 203
show access-list outside_
access_in command, 261
show admin-context command, 586
show asp drop command,... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
98 | Sig Fidelity Rating parameter (Add Signature dialog box) 1201
show statistics analysisengine command, 795 - 796
show statistics analysisengine Command Output
example (18-2), 795 - 796
show statistics authentication
command, 796
show statistics authentication
Command Output example
(18-3), 796
show statis... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
99 | 1202 Signature ID parameter (Add Signature dialog box)
Site-to-Site VPN Feature icon
(Configuration screen), 98
site-to-site VPN tunnels,
identity NAT, 367 - 369
sizes, buffers, 166
Skinny (SCCP), inspections,
525 - 527
SLA monitor, static routes,
configuring, 647 - 648
slave units, clustering,
685 - ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
100 | static address translation 1203
customized, 1016 - 1018
full customization,
1019 - 1021
logout page, 1015
navigation panel, 1013
portal customization, configuring, 1006 - 1024
portal page, 1012
customized, 1018 - 1019
servers, 1004
title area, 1008 - 1010
title panel, 1012
Toolbar screen, 1013
... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
101 | 1204 static IP routes, configuring
syslog servers
defining, 153 - 154
logging, 150
system clock
automatic clock adjustment,
116 - 118
configuring, 114 - 118
date, setting, 116
manual adjustment, 114 - 116
time zone, setting, 114 - 115
System Context
Configuration with Failover
Groups example (16-... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
102 | traffic 1205
ules, enabling, 316 - 322
defining decryption policy,
320 - 322
TLS (Transport Layer
Security) Decryption
Proxy module, 276
TLS Proxy Commands Sent
by ASDM example
(13-16), 506
TLS Proxy feature, 505 - 506
Toolbar screen, SSL
VPNs, 1013
topologies
EIGRP, displaying, 454
IPv6, 386
N... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
103 | 1206 traffic
(Monitoring screen), 100
Trivial File Transfer Protocol
(TFTP), inspections, 528
troubleshooting
administrative connections,
222 - 227
AnyConnect SSL VPNs,
1116 - 1118
clientless remote-access SSL
VPNs, 1081 - 1084
clustering, 717 - 720
CPUs, 172
devices, 168 - 172
EIGRP, 454 - 462 ... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
104 | Verifying Firewalls Mode example (15-3) 1207
User attribute (Add Access
Rule dialog box), 236
User attribute (Add
Management Access
Rule), 241
user authentication, clientbased remote-access SSL
VPNs, 1094 - 1095
User Comments parameter
(Add Signature dialog
box), 758
user context, virtual firewall,
53... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
105 | 1208 Verifying the Admin Context example (14-12)
configuring, 1115 - 1116
troubleshooting, 1116 - 1118
client-based remote-access
SSL VPNs, 1085 , 1118
AnyConnect secure
mobility client configuration, 1096 - 1112
configuring, 1090 - 1095 ,
1090 - 1094
deploying, 1086 - 1088
enrolling digital certific... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
106 | Zero Downtime upgrade, clustering 1209
Service), 1142
W-Z
WAAS (Wide Area
Application Services),
inspections, 528
web ACL attribute (SSL
VPN), 998
Web Categories dashboard
(CX), 330
Web Destinations dashboard
(CX), 330
web reputation profiles (CX),
306 - 307
webfo event class, 148
Webtype ACL Fil... | https://ptgmedia.pearsoncmg.com/images/9781587143076/samplepages/9781587143076.pdf |
0 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI
Configuration Guide, 9.19
First Published: 2022-11-29
Last Modified: 2023-11-06
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
2 | CONTENTS
PREF ACE About This Guide lv
Document Objectives lv
Related Documentation lv
Document Conventions lv
Communications, Services, and Additional Information lvii
P ART I Getting Started with the ASA 59
CHAPTER 1 Introduction to the Secure Firewall ASA 1
Hardware and Software Compatibility 1
VPN Compatibility 1
Ne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
3 | Security Context Overview 8
ASA Clustering Overview 8
Special and Legacy Services 8
CHAPTER 2 Getting Started 11
Access the Console for the Command-Line Interface 11
Access the ISA 3000 Console 11
Access the Firepower 2100 Platform Mode Console 12
Access the Firepower 1000, 2100 Appliance Mode, and Secure Firewall 3100... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
4 | Create Text Configuration Files Offline 42
Apply Configuration Changes to Connections 43
Reload the ASA 43
CHAPTER 3 Licenses: Product Authorization Key Licensing for the ISA 3000 45
About PAK Licenses 45
Preinstalled License 45
Permanent License 45
Time-Based Licenses 46
Time-Based License Activation Guidelines 46
How... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
5 | Obtain a Strong Encryption License 56
Activate or Deactivate Keys 58
Configure a Shared License (Secure Client 3 and Earlier) 59
About Shared Licenses 60
About the Shared Licensing Server and Participants 60
Communication Issues Between Participant and Server 61
About the Shared Licensing Backup Server 61
Failover and ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
6 | Carrier License 95
Total TLS Proxy Sessions 95
VLANs, Maximum 96
Botnet Traffic Filter License 96
Failover or ASA Cluster Licenses 96
Failover Licenses for the ASAv 96
Failover Licenses for the Firepower 1010 96
Failover Licenses for the Firepower 1100 97
Failover Licenses for the Firepower 2100 98
Failover Licenses fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
7 | (Optional) Return the Firepower 1000, 2100, Secure Firewall 3100 Permanent License 136
(Optional) Deregister the Firepower 1000, 2100, Secure Firewall 3100 (Regular and On-Prem) 137
(Optional) Renew the Firepower 1000, 2100, Secure Firewall 3100 ID Certificate or License
Entitlement (Regular and On-Prem) 137
Firepower ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
8 | Requirements and Prerequisites for Hardware and Software Combinations 168
Guidelines and Limitations for Logical Devices 169
Guidelines and Limitations for Interfaces 169
General Guidelines and Limitations 170
Requirements and Prerequisites for High Availability 170
Configure Interfaces 170
Configure a Physical Interfa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
9 | Guidelines for Firewall Mode 195
Set the Firewall Mode 197
Examples for Firewall Mode 198
How Data Moves Through the ASA in Routed Firewall Mode 198
An Inside User Visits a Web Server 198
An Outside User Visits a Web Server on the DMZ 199
An Inside User Visits a Web Server on the DMZ 200
An Outside User Attempts to Acc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
10 | Resource Classes 219
Resource Limits 219
Default Class 220
Use Oversubscribed Resources 221
Use Unlimited Resources 221
About MAC Addresses 222
MAC Addresses in Multiple Context Mode 222
Automatic MAC Addresses 222
VPN Support 223
Licensing for Multiple Context Mode 223
Prerequisites for Multiple Context Mode 224
Guide... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
11 | View MAC Addresses in the System Configuration 250
View MAC Addresses Within a Context 252
Examples for Multiple Context Mode 252
History for Multiple Context Mode 254
CHAPTER 8 Failover for High Availability 259
About Failover 259
Failover Modes 259
Failover System Requirements 260
Hardware Requirements 260
Software R... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
12 | Failover Events 275
About Active/Active Failover 276
Active/Active Failover Overview 276
Primary/Secondary Roles and Active/Standby Status for a Failover Group 276
Active Unit Determination for Failover Groups at Startup 277
Failover Events 277
Licensing for Failover 278
Guidelines for Failover 279
Defaults for Failove... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
13 | SNMP Failover Traps 307
Monitoring Failover Status 307
History for Failover 308
CHAPTER 9 Failover for High Availability in the Public Cloud 311
About Failover in the Public Cloud 311
About Active/Backup Failover 312
Primary/Secondary Roles and Active/Backup Status 312
Failover Connection 312
Polling and Hello Messages... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
14 | Failover Messages 330
History for Failover in the Public Cloud 330
CHAPTER 1 0 ASA Cluster for the Secure Firewall 3100 331
About ASA Clustering 331
How the Cluster Fits into Your Network 331
Cluster Members 332
Bootstrap Configuration 332
Control and Data Node Roles 332
Cluster Interfaces 332
Cluster Control Link 332
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
15 | Configure Connection Rebalancing and the Cluster TCP Replication Delay 365
Configure Inter-Site Features 366
Manage Cluster Nodes 373
Become an Inactive Node 373
Deactivate a Node 374
Rejoin the Cluster 375
Leave the Cluster 375
Change the Control Node 377
Execute a Command Cluster-Wide 377
Monitoring the ASA Cluster 3... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
16 | AAA for Network Access and Clustering 405
Connection Settings and Clustering 406
FTP and Clustering 406
ICMP Inspection and Clustering 406
Multicast Routing and Clustering 406
NAT and Clustering 406
Dynamic Routing and Clustering 408
SCTP and Clustering 409
SIP Inspection and Clustering 409
SNMP and Clustering 409
STUN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
17 | Cluster Control Link 420
Size the Cluster Control Link 421
Cluster Control Link Redundancy 421
Cluster Control Link Reliability 422
Cluster Control Link Network 422
Cluster Interfaces 422
Connecting to a Redundant Switch System 422
Configuration Replication 423
Secure Firewall ASA Cluster Management 423
Management Netw... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
18 | Become an Inactive Member 467
Deactivate a Unit 468
Rejoin the Cluster 469
Change the Control Unit 470
Execute a Command Cluster-Wide 470
ASA: Monitoring the ASA Cluster on the Firepower 4100/9300 chassis 471
Monitoring Cluster Status 471
Capturing Packets Cluster-Wide 476
Monitoring Cluster Resources 476
Monitoring Cl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
19 | Dynamic Routing and Clustering 496
SCTP and Clustering 497
SIP Inspection and Clustering 497
SNMP and Clustering 497
STUN and Clustering 497
Syslog and NetFlow and Clustering 497
Cisco TrustSec and Clustering 497
VPN and Clustering on the Secure Firewall eXtensible Operating System (FXOS) Chassis 497
Performance Scalin... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
20 | Equal-Cost Multi-Path Routing 516
Cluster Control Link 516
Cluster Control Link Traffic Overview 516
Cluster Control Link Failure 517
Configuration Replication 517
ASA Virtual Cluster Management 517
Management Network 517
Management Interface 517
Control Node Management Vs. Data Node Management 518
Crypto Key Replicati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
21 | Rejoin the Cluster 548
Leave the Cluster 548
Change the Control Node 549
Execute a Command Cluster-Wide 550
Monitoring the ASA Virtual Cluster 551
Monitoring Cluster Status 551
Capturing Packets Cluster-Wide 555
Monitoring Cluster Resources 555
Monitoring Cluster Traffic 555
Monitoring Cluster Routing 560
Configuring L... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
22 | Performance Scaling Factor 570
Control Node Election 570
High Availability Within the ASA Virtual Cluster 571
Node Health Monitoring 571
Interface Monitoring 571
Status After Failure 571
Rejoining the Cluster 572
Data Path Connection State Replication 572
How the ASA Virtual Cluster Manages Connections 573
Connection R... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.