index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
723 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
664
Interfaces
History for Switch Ports | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
724 | CHAPTER 16
EtherChannel Interfaces
This chapter tells how to configure EtherChannels interfaces.
For multiple context mode, complete all tasks in this section in the system execution space. To change from
the context to the system execution space, enter the changeto system command.
For ASA cluster interfaces, which hav... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
725 | Channel Group Interfaces
Each channel group can have up to 16 active interfaces, except for theFirepower 1000, 2100,SecureFirewall
3100 models, which support 8 active interfaces. For switches that support only 8 active interfaces, you can
assign up to 16 interfaces to a channel group: while only 8 interfaces can be act... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
726 | ASA system IDs), a single EtherChannel would not be desirable because you do not want traffic sent to the
standby ASA device.
Figure 63: Active/Standby Failover and VSS/vPC
Link Aggregation Control Protocol
The Link Aggregation Control Protocol (LACP) aggregates interfaces by exchanging the Link Aggregation
Control Pro... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
727 | If an active interface goes down and is not replaced by a standby interface, then traffic is rebalanced between
the remaining links. The failure is masked from both Spanning Tree at Layer 2 and the routing table at Layer
3, so the switchover is transparent to other network devices.
Related Topics
Customize the EtherCha... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
728 | • If you use an EtherChannel interface for a Failover or state link, then to prevent out-of-order packets,
only one interface in the EtherChannel is used. If that interface fails, then the next interface in the
EtherChannel is used. You cannot alter the EtherChannel configuration while it is in use as a Failover
link. ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
729 | • Firepower 2100
• Secure Firewall 3100
• In Cisco IOSsoftware versions earlier than 15.1(1)S2, ASA did not support connecting an EtherChannel
to a switch stack. With default switch settings, if the ASA EtherChannel is connected cross stack, and if
the primary switch is powered down, then the EtherChannel connected to ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
730 | • ISA 3000—Each channel group can have up to 16 active interfaces. For switches that support only
8 active interfaces, you can assign up to 16 interfaces to a channel group: while only 8 interfaces
can be active, the remaining interfaces can act as standby links in case of interface failure.
• Firepower 1000, 2100,Secu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
731 | We recommend using active mode.
Step 3 (Optional; ISA 3000 models only) Set the priority for a physical interface in the channel group:
lacp port-priority number
Example:
ciscoasa(config-if)# lacp port-priority 12345
The priority number is an integer between 1 and 65535. The default is 32768. The higher the number, the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
732 | Example:
ciscoasa(config)# interface port-channel 1
This interface was created automatically when you added an interface to the channel group. If you have not
yet added an interface, then this command creates the port-channel interface.
You need to add at least one member interface to the port-channel interface before ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
733 | The number is between 1 and 65535. The default is 32768. The higher the number, the lower the priority.
This command is global for the ASA.
If the device at the other end of the EtherChannel has conflicting port priorities, the system priority is used
to determine which port priorities to use. For interface priorities ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
734 | • (ISA 3000 only) show port-channel channel_group_number load-balance [hash-result {ip | ipv6 |
l4port | mac | mixed | vlan-only} parameters]
For EtherChannel, displays port-channel load-balance information along with the hash result and member
interface selected for a given set of parameters.
Examples for EtherChannel... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
735 | Feature Name Releases Feature Information
You can now configure up to 16 active linksin an EtherChannel.
Previously, you could have 8 active links and 8 standby links.
Be sure that yourswitch can support 16 active links(for example
the Cisco Nexus 7000 with F2-Series 10 Gigabit Ethernet
Module).
If you upgrade from an ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
736 | CHAPTER 17
Loopback Interfaces
This chapter tells how to configure loopback interfaces.
• About Loopback Interfaces, on page 677
• Guidelines for Loopback Interfaces, on page 678
• Configure a Loopback Interface, on page 678
• Rate-Limit Traffic to the Loopback Interface, on page 678
• Monitoring Loopback Interfaces, o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
737 | Guidelines for Loopback Interfaces
Failover and Clustering
• No clustering support.
Context Mode
• VTI is supported in single context mode only. Other loopback uses are supported in multiple context
mode.
Additional Guidelines and Limitations
• TCP sequence randomization is always disabled for traffic from the physical... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
738 | Procedure
Step 1 Create an access list identifying traffic to the loopback interface IP address.
access-list name extended permit ip any host loopback_ip
Create an ACE for each loopback interface IP address. You can also narrow this access list by specifiying the
source IP addresses instead of any.
Example:
ciscoasa(co... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
739 | ciscoasa(config)# interface loopback 1
ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0
ciscoasa(config-if)# nameif loop1
ciscoasa(config-if)# interface loopback 2
ciscoasa(config-if)# ip address 10.2.1.1 255.255.255.0
ciscoasa(config-if)# nameif loop2
ciscoasa(config-if)# access-list loop extended permit ip any ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
740 | Feature Name Version Feature Information
You can now add a loopback interface and use it for:
• BGP
• AAA
• SNMP
• Syslog
• SSH
• Telnet
New/Modified commands: interface loopback, logging host, neighbor
update-source, snmp-server host, ssh, telnet
Support for loopback interface 9.18(2)
CLI Book 1: Cisco Secure Firewall... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
741 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
682
Interfaces
History for Loopback Interfaces | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
742 | CHAPTER 18
VLAN Subinterfaces
This chapter tells how to configure VLAN subinterfaces.
For multiple context mode, complete all tasks in this section in the system execution space. To change from
the context to the system execution space, enter the changeto system command.
Note
• About VLAN Subinterfaces, on page 683
• L... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
743 | Model License Requirement
Firepower 1140, 1150 Essentials License: 1024
Firepower 2100 Essentials License: 1024
Secure Firewall 3100 Essentials License: 1024
Firepower 4100 Essentials License: 1024
Firepower 9300 Essentials License: 1024
Throughput capability:
100 Mbps: 25
1 Gbps: 50
2 Gbps: 200
10 Gbps: 1024
ASA Virtu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
744 | • All subinterfaces on the same parent interface must be either bridge group members or routed interfaces;
you cannot mix and match.
• The ASA does not support the Dynamic Trunking Protocol (DTP), so you must configure the connected
switch port to trunk unconditionally.
• You might want to assign unique MAC addresses t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
745 | ciscoasa(config)# interface gigabitethernet 0/1.100
The port-channel number argument is the EtherChannel interface ID, such as port-channel 1.
The subinterface ID is an integer between 1 and 4294967293.
Step 2 Specify the VLAN for the subinterface:
vlan vlan_id [secondary vlan_range]
Example:
ciscoasa(config-subif)# vl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
746 | Monitoring VLAN Subinterfaces
See the following commands:
• show interface
Displays interface statistics.
• show interface ip brief
Displays interface IP addresses and status.
• show vlan mapping
Shows the interface, secondary VLANs, and the primary VLANs to which they are mapped.
Examples for VLAN Subinterfaces
The fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
747 | Catalyst 6500 Configuration
vlan 70
private-vlan primary
private-vlan association 71-72
!
vlan 71
private-vlan community
!
vlan 72
private-vlan isolated
!
interface GigabitEthernet1/5
description Connected to ASA GigabitEthernet1/1
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 70-72
swit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
748 | CHAPTER 19
VXLAN Interfaces
This chapter tells how to configure Virtual eXtensible LAN (VXLAN) interfaces. VXLANs act as Layer 2
virtual networks over Layer 3 physical networks to stretch Layer 2 networks.
• About VXLAN Interfaces, on page 689
• Requirements and Prerequisites for VXLAN Interfaces, on page 696
• Guideli... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
749 | VXLAN Tunnel Endpoint
VXLAN tunnel endpoint (VTEP) devices perform VXLAN encapsulation and decapsulation. Each VTEP
has two interface types: one or more virtual interfaces called VXLAN Network Identifier (VNI) interfaces to
which you apply your security policy, and a regular interface called the VTEP source interface t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
750 | You can only add one VTEP interface, and all VNI interfaces are associated with the same VTEP interface.
There is an exception for ASA virtual clustering on AWS. For AWS clustering, you can have two VTEP
source interfaces: a VXLAN interface is used for the cluster control link, and a Geneve interface can be used
for th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
751 | Peer VTEP
When the ASA sends a packet to a device behind a peer VTEP, the ASA needs two important pieces of
information:
• The destination MAC address of the remote device
• The destination IP address of the peer VTEP
The ASA maintains a mapping of destination MAC addresses to remote VTEP IP addresses for the VNI
inter... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
752 | VXLAN Bridge
When you use a bridge group (transparent firewall mode, or optionally routed mode), the ASA can serve as
a VXLAN bridge between a (remote) VXLAN segment and a local segment where both are in the same
network. In this case, one member of the bridge group is a regular interface while the other member is a VN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
753 | See the following notes about this scenario:
1. For packets from VM3 to VM1, the destination MAC address is the ASA MAC address, because the ASA
is the default gateway.
2. The VTEPsource interface on VirtualServer 2 receives packets from VM3, then encapsulates the packets
with VNI 3’s VXLAN tag and sends them to the AS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
754 | 5. The ASA encapsulates the packets again with the VXLAN tag for VNI 2 and sends the packets to Virtual
Server 1. Before encapsulation, the ASA changesthe inner frame destination MAC addressto be the MAC
of VM1 (multicast-encapsulated ARP might be needed for the ASA to learn the VM1 MAC address).
6. When Virtual Server... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
755 | Figure 65: Azure Gateway Load Balancer with Paired Proxy
Requirements and Prerequisites for VXLAN Interfaces
Model Requirements
• Firepower 1010 switch ports and VLAN interfaces are not supported as VTEP interfaces.
• Geneve encapsulation is supported for the following models: ASAv30, ASAv50, ASAv100 on Amazon
Web Serv... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
756 | IPv6
• The VNI interface supports both IPv4 and IPv6 traffic.
• The VTEP source interface IP address only supports IPv4.
Clustering and Multiple Context Mode
• ASA clustering does not support VXLAN in Individual Interface mode except for the cluster control link
(ASA virtual only). Only Spanned EtherChannel mode suppor... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
757 | Procedure
Step 1 Configure the VTEP Source Interface, on page 698.
Step 2 Configure the VNI Interface, on page 700
Step 3 (Optional) Change the VXLAN UDP Port, on page 702.
Step 4 (Azure GWLB) Allow Gateway Load Balancer Health Checks, on page 706.
Configure the VTEP Source Interface
You can configure one VTEP source i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
758 | ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0
Step 3 Specify the NVE instance:
nve 1
You can only specify one NVE instance, with the ID 1.
Example:
ciscoasa(config)# nve 1
ciscoasa(cfg-nve)#
Step 4 Specify VXLAN encapsulation.
encapsulation vxlan
Example:
ciscoasa(cfg-nve)# ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
759 | If you do not configure the multicast group per VNI interface, then this group is used. If you configure a group
at the VNI interface level, then that group overrides this setting.
Configure the VNI Interface
Add a VNI interface, associate it with the VTEP source interface, and configure basic interface parameters.
For... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
760 | c) Set the internal segment ID.
internal-segment-id id_number
Where the id_number is between 1 and 16777215.
Example:
ciscoasa(config-if)# internal-segment-id 101
d) Set the external port.
external-port port_number
Where the port_number is between 1024 and 65535.
Example:
ciscoasa(config-if)# external-port 2001
e) Set ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
761 | ciscoasa(config-if)# nameif vxlan1000
The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering
this command with a new value. Do not enter the no form, because that command causes all commands that
refer to that name to be deleted.
Step 7 (Routed mode) Assign an IP... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
762 | Procedure
Set the VXLAN UDP port:
vxlan port number
Example:
ciscoasa(config)# vxlan port 5678
Configure Geneve Interfaces
To configure Geneve interfaces for the ASA virtual, perform the following steps.
You can configure either VXLAN or Geneve. For VXLAN interfaces, see Configure VXLAN Interfaces, on
page 697.
Note
Pr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
763 | Step 2 Configure the source interface name and IPv4 address.
Example:
ciscoasa(config)# interface gigabitethernet 1/1
ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0
Step 3 Specify the NVE instance:
nve 1
You can only specify one NVE instance, with the ID 1.
Example:
ciscoasa(... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
764 | ciscoasa(config)# interface vni 1
Set the ID between 1 and 10000. This ID is only an internal interface identifier.
Step 2 Associate this interface with the VTEP source interface:
vtep-nve 1
Step 3 Name the interface:
nameif vni_interface_name
Example:
ciscoasa(config-if)# nameif geneve1000
The name is a text string up... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
765 | ciscoasa(config)# same-security-traffic permit intra-interface
Allow Gateway Load Balancer Health Checks
The AWS or Azure Gateway Load Balancer requires appliances to answer a health check properly. The AWS
Gateway Load Balancer will only send traffic to appliances that are considered healthy.
You must configure the AS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
766 | aaa authentication match gwlb outside LOCAL
! Use an HTTP login page on the ASA
aaa authentication listener http outside port www
HTTP(S) Redirection Using Static Interface NAT with Port Translation
You can configure the ASA virtual to redirect health checks to a metadata HTTP(S) server. For HTTP(S)
health checks, the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
767 | ciscoasa(config-if)# show nve
nve 1, source-interface "inside" is up
IP address 15.1.2.1, subnet mask 255.255.255.0
Encapsulation: vxlan
Encapsulated traffic statistics:
6701004 packets input, 3196266002 bytes
6700897 packets output, 3437418084 bytes
1 packets dropped
Number of configured static peer VTEPs: 0
Number of... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
768 | VTEP-NVE 1
Segment-id 5001
Tag-switching: disabled
MTU: 1500
MAC: aaaa.bbbb.1234
IP address 192.168.0.1, subnet mask 255.255.255.0
Multicast group not configured
• show vni vlan-mapping
This command showsthe mapping between VNIsegment IDs and VLAN interfaces or physical interfaces.
This command is only valid in transpa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
769 | Transparent VXLAN Gateway Example
See the following description of this example:
• The outside interface on GigabitEthernet 0/0 is used as the VTEP source interface, and it is connected
to the Layer 3 network.
• The insidevm100 VLAN subinterface on GigabitEthernet 0/1.100 is connected to the 10.10.10.0/24
network, on w... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
770 | vtep-nve 1
mcast-group 235.0.0.100
!
interface vni2
segment-id 8000
nameif vxlan8000
security-level 0
bridge-group 2
vtep-nve 1
mcast-group 236.0.0.100
!
interface vni3
segment-id 10000
nameif vxlan10000
security-level 0
bridge-group 3
vtep-nve 1
mcast-group 236.0.0.100
!
interface gigabitethernet0/1.100
nameif insidev... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
771 | • The VTEP source-interface is a Layer 3 interface in transparent firewall mode indicated by nve-only in
the interface configuration. The VTEPsource interface is not a BVI interface or a management interface,
but it has an IP address and uses the routing table.
VXLAN Routing Example
See the following description of thi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
772 | ASA Configuration
interface gigabitethernet0/0
nameif outside
ip address 192.168.1.30 255.255.255.0
no shutdown
!
nve 1
encapsulation vxlan
source-interface outside
default-mcast-group 235.0.0.100
!
interface vni1
segment-id 6000
nameif vxlan6000
security-level 0
vtep-nve 1
ip address 10.20.20.1 255.255.255.0
!
interfa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
773 | Feature Name Releases Feature Information
VXLAN support was added, including VXLAN tunnel endpoint (VTEP) support.
You can define one VTEP source interface per ASA or security context.
We introduced the following commands: debug vxlan, default-mcast-group,
encapsulation vxlan, inspect vxlan, interface vni, mcast-group,... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
774 | CHAPTER 20
Routed and Transparent Mode Interfaces
This chapter includes tasks to complete the interface configuration for all models in routed or transparent
firewall mode.
For multiple context mode, complete the tasksin thissection in the context execution space. Enter the changeto
context name command to change to th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
775 | Whether you assign a security level to a BVI depends on the firewall mode. In transparent mode, the BVI
interface does not have a security level because it does not participate in routing between interfaces. In routed
mode, BVI interfaces have a security level if you choose to route between the BVIs and other interface... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
776 | For the failover and optional separate state link, which are point-to-point connections, you can also use a
31-bit subnet.
31-Bit Subnet and Management
If you have a directly-connected management station, you can use a point-to-point connection for SSH or
HTTP on the ASA, or for SNMP or Syslog on the management station... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
777 | • You can only configure IPv6 addresses manually in transparent mode.
• The ASA does not support IPv6 anycast addresses.
• DHCPv6 and prefix delegation options are not supported with multiple context mode, transparent mode,
clustering, or Failover.
Model Guidelines
• For the ASAv50, bridge groups are not supported in e... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
778 | • In routed mode, ASA-defined EtherChannel and VNI interfaces are not supported as bridge group
members. EtherChannels on the Firepower 4100/9300 can be bridge group members.
• Bidirectional Forwarding Detection (BFD) echo packets are not allowed through the ASA when using
bridge group members. If there are two neighbo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
779 | • physical—For example, ethernet, gigabitethernet, tengigabitethernet, management. Refer to the
hardware installation guide for your model for interface names.
• physical.subinterface—For example, gigabitethernet0/0.100.
• vni
• vlan
• loopback
• mapped_name—For multiple context mode.
Note For the Firepower 1010, you c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
780 | ciscoasa(config-if)# ip address dhcp
The setroute keyword lets the ASA use the default route supplied by the DHCP server.
Reenter this command to reset the DHCP lease and request a new lease.
If you do not enable the interface using the no shutdown command before you enter the ip
address dhcp command, some DHCP request... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
781 | For loopback interfaces, you do not set the management mode because the interface is only
supported for to/from the device traffic.
Note
Examples
The following example configures parameters for VLAN 101:
ciscoasa(config)# interface vlan 101
ciscoasa(config-if)# nameif inside
ciscoasa(config-if)# security-level 100
cisc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
782 | Enter the appropriate keyword for the type of authentication used by your ISP.
When using CHAP or MS-CHAP, the username may be referred to as the remote system name, while the
password may be referred to as the CHAP secret.
Step 3 Associate the username assigned by your ISP to the VPDN group:
vpdn group group_name loca... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
783 | Procedure
Step 1 Create a BVI:
interface bvi bridge_group_number
Example:
ciscoasa(config)# interface bvi 2
The bridge_group_number is an integer between 1 and 250. You will later assign physical interfaces to this
bridge group number.
Step 2 (Transparent Mode) Specify the IP address for the BVI:
ip address ip_address ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
784 | If you do not enable the interface using the no shutdown command before you enter the ip address dhcp
command, some DHCP requests might not be sent.
Step 4 (Routed Mode) Name the interface:
nameif name
Example:
ciscoasa(config-if)# nameif inside
You must name the BVI if you want to route traffic outside the bridge grou... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
785 | • For transparent mode, do not use this procedure for Management interfaces;see Configure a Management
Interface for Transparent Mode, on page 727 to configure the Management interface.
Procedure
Step 1 Enter interface configuration mode:
interface id
Example:
ciscoasa(config)# interface gigabithethernet 0/0
The interf... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
786 | The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering
this command with a new value. Do not enter the no form, because that command causes all commands that
refer to that name to be deleted.
Step 4 Set the security level:
security-level number
Example:
ciscoasa(... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
787 | ciscoasa(config)# interface management 0/0.1
The port-channel number argument is the EtherChannel interface ID, such as port-channel 1. The
EtherChannel interface must have only Management member interfaces.
In multiple context mode, enter the mapped_name if one was assigned using the allocate-interface command.
For th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
788 | Example:
ciscoasa(config-if)# security-level 100
The number is an integer between 0 (lowest) and 100 (highest).
Configure IPv6 Addressing
This section describes how to configure IPv6 addressing.
About IPv6
This section includes information about IPv6.
IPv6 Addressing
You can configure two types of unicast addresses for... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
789 | format. If the IPv6 packets do not use the Modified EUI-64 format for the interface identifier, the packets are
dropped and the following system log message is generated:
325003: EUI-64 source address check failed.
The address format verification is only performed when a flow is created. Packets from an existing flow a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
790 | IPv6 Prefix Delegation /62 Subnet Example
The following example shows the ASA subnetting the prefix into 4 /62 subnets: 2001:DB8:ABCD:1230::/62,
2001:DB8:ABCD:1234::/62, 2001:DB8:ABCD:1238::/62, and 2001:DB8:ABCD:123C::/62. The ASA uses
one of 4 available /64 subnets on 2001:DB8:ABCD:1230::/62 for its inside network (:... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
791 | Enable the IPv6 Prefix Delegation Client
Enable the DHCPv6 Prefix Delegation client on one or more interfaces. The ASA obtains one or more IPv6
prefixes that it can subnet and assign to inside networks. Typically, the interface on which you enable the
prefix delegation client obtains its IP address using the DHCPv6 add... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
792 | lifetime, use the show ipv6 general-prefix command. To set the ASA RA interval, see Configure IPv6
Neighbor Discovery, on page 736; the default is 200 seconds.
Procedure
Step 1 Enter interface configuration mode for the interface connected to the DHCPv6 server network:
interface id
Example:
ciscoasa(config)# interface ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
793 | ipv6 dhcp client pd Outside-Prefix
ipv6 dhcp client pd hint ::/60
interface gigabitethernet 0/1
ipv6 address Outside-Prefix ::1:0:0:0:1/64
interface gigabitethernet 0/2
ipv6 address Outside-Prefix ::2:0:0:0:1/64
Configure a Global IPv6 Address
To configure a global IPv6 address for any routed mode interface and for the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
794 | ciscoasa(config)# interface management 1/1
Step 2 (Routed interface) Set the IP address using one of the following methods.
• Enable stateless autoconfiguration on the interface:
ipv6 address autoconfig [default trust {dhcp | ignore}]
Enabling stateless autoconfiguration on the interface configuresIPv6 addresses based ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
795 | • Use a delegated prefix:
ipv6 address prefix_name ipv6_address/prefix_length
Example:
ciscoasa(config-if)# ipv6 address Outside-Prefix ::1:0:0:0:1/64
This feature requires the ASA to have the DHCPv6 Prefix Delegation client enabled on a different
interface.See Enable the IPv6Prefix Delegation Client, on page 732. Typi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
796 | to actively keep track of which neighbors are reachable and which are not, and to detect changed link-layer
addresses. When a router or the path to a router fails, a host actively searches for functioning alternates.
Procedure
Step 1 Specify the IPv6 interface you want to configure.
interface name
Example:
ciscoasa(con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
797 | Example:
ciscoasa(config-if)# ipv6 nd ns-interval 9000
Step 4 Set the amount of time that a remote IPv6 node is reachable.
ipv6 nd reachable-time value
Values for the value argument range from 0 to 3600000 milliseconds. When 0 is used for the value, the
reachable time is sent as undetermined. It is up to the receiving ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
798 | ipv6 nd suppress-ra
Router advertisement messages (ICMPv6 Type 134) are automatically sent in response to router solicitation
messages (ICMPv6 Type 133). Router solicitation messages are sent by hosts at system startup so that the
host can immediately autoconfigure without needing to wait for the next scheduled router ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
799 | • no-autoconfig—Specifies that the prefix cannot be used for IPv6 autoconfiguration.
• off-link—Configures the specified prefix as off-link. The prefix will be advertised with the L-bit clear.
The prefix will not be inserted into the routing table as a Connected prefix.
When onlink is on (by default), the specified pre... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
800 | Monitoring Routed and Transparent Mode Interfaces
You can monitor interface statistics, status, PPPoE.
For the Firepower 1000, 2100, Secure Firewall 3100 and the Firepower 4100/9300: Some statistics are not
shown using the ASA commands. You must view more detailed interface statistics using FXOS commands.
• /eth-uplink... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
801 | GigabitEthernet1/2 is in client mode
Prefix State is OPEN
Renew will be sent in 00:03:46
Address State is OPEN
Renew for address will be sent in 00:03:47
List of known servers:
Reachable via address: fe80::20c:29ff:fe96:1bf4
DUID: 000100011D9D1712005056A07E06
Preference: 0
Configuration parameters:
IA PD: IA ID 0x00030... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
802 | DHCPV6 Client address statistics:
Protocol Exchange Statistics:
Number of Solicit messages sent: 1
Number of Advertise messages received: 1
Number of Request messages sent: 1
Number of Renew messages sent: 45
Number of Rebind messages sent: 0
Number of Reply messages received: 46
Number of Release messages sent: 0
Numb... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
803 | Error and Failure Statistics:
Total number of Re-transmission messages sent: 1
Total number of Message Validation errors in received messages: 0
• show ipv6 dhcp ha statistics
The show ipv6 dhcp ha statistics command shows the transaction statistics between failover units,
including how many timesthe DUID information w... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
804 | • show vpdn session [l2tp | pppoe] [id sess_id | packets | state | window]
Views the status of PPPoE sessions.
The following examples show information provided by this command:
ciscoasa# show vpdn
Tunnel id 0, 1 active sessions
time since change 65862 secs
Remote Internet Address 10.0.0.1
Local Internet Address 199.99.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
805 | Examples for Routed and Transparent Mode Interfaces
Transparent Mode Example with 2 Bridge Groups
The following example for transparent mode includes two bridge groups of three interfaces each, plus a
management-only interface:
interface gigabitethernet 0/0
nameif inside1
security-level 100
bridge-group 1
no shutdown
i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
806 | member security level is also 100, these security levels do not apply to inter-BVI communications; only the
BVI security levels affect inter-BVI traffic. The security levels of the BVIs and outside (100, 50, and 0)
implicitly permit traffic from inside to dmz and inside to outside; and from dmz to outside. An access ru... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
807 | nameif dmz1
security-level 100
bridge-group 2
no shutdown
interface gigabitethernet 1/6
nameif dmz2
security-level 100
bridge-group 2
no shutdown
interface gigabitethernet 1/7
nameif dmz3
security-level 100
bridge-group 2
no shutdown
!
interface bvi 2
nameif dmz
security-level 50
ip address 209.165.201.1 255.255.255.22... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
808 | History for Routed and Transparent Mode Interfaces
Platform Feature Information
Releases
Feature Name
We introduced this feature.
We introduced the following commands:ipv6ndns-interval,ipv6ndra-lifetime,
ipv6 nd suppress-ra, ipv6 neighbor, ipv6 nd prefix, ipv6 nd dad-attempts,
ipv6 nd reachable-time, ipv6 address, ipv6... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
809 | Platform Feature Information
Releases
Feature Name
The ASA now supports the following features for IPv6 addressing:
• DHCPv6 Address client—The ASA obtains an IPv6 global address and
optional default route from the DHCPv6 server.
• DHCPv6 Prefix Delegation client—The ASA obtains delegated prefix(es)
from a DHCPv6 serve... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
810 | Platform Feature Information
Releases
Feature Name
For routed interfaces, you can configure an IP address on a 31-bit subnet for
point-to-point connections. The 31-bitsubnet includes only 2 addresses; normally,
the first and last address in the subnet is reserved for the network and broadcast,
so a 2-address subnet is ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
811 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
752
Interfaces
History for Routed and Transparent Mode Interfaces | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
812 | CHAPTER 21
Advanced Interface Configuration
This chapter describes how to configure MAC addresses for interfaces, how to set the maximum transmission
unit (MTU), and set the TCP maximum segment size (TCP MSS), and how to allow same security level
communication. Setting the correct MTU and maximum TCP segment size is es... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
813 | • VLAN interfaces(Firepower 1010)—Routed firewall mode: All VLAN interfacesshare a MAC address.
Ensure that any connected switches can support this scenario. If the connected switches require unique
MAC addresses, you can manually assign MAC addresses. See Manually Configure the MAC Address,
on page 757.
Transparent fi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
814 | A2F1.03zz.zzzz
The MAC address format without a prefix is a legacy version. See the mac-address auto command in the
command reference for more information about the legacy format.
Note
About the MTU
The MTU specifies the maximum frame payload size that the ASA can transmit on a given Ethernet interface.
The MTU value i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
815 | MTU and Jumbo Frames
A larger MTU lets you send larger packets. Larger packets might be more efficient for your network. See the
following guidelines:
• Matching MTUs on the traffic path—We recommend that you set the MTU on all ASA interfaces and
other device interfaces along the traffic path to be the same. Matching M... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
816 | • IPv4 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 120. For example, if you use
jumbo frames and set the MTU to 9000, then you need to set the TCP MSS to 8880 to take advantage
of the new MTU.
• IPv6 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 140.
Inter-Interface Communication
Allowing ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
817 | Procedure
Step 1 Enter interface configuration mode:
interface id
Example:
ciscoasa(config)# interface gigabithethernet 0/0
Step 2 Assign a private MAC address to this interface:
mac-address mac_address [standby mac_address]
Example:
ciscoasa(config-if)# mac-address 000C.F142.4CDE
The mac_address is in H.H.H format, wh... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
818 | Procedure
Automatically assign private MAC addresses to each interface:
mac-address auto [prefix prefix]
If you do not enter a prefix, then the ASA autogenerates the prefix based on the last two bytes of the interface
MAC address.
If you manually enter a prefix, then the prefix is a decimal value between 0 and 65535. T... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
819 | Step 2 Configure the maximum TCP segment size in bytes, between 48 and any maximum number:
sysopt connection tcpmss [minimum] bytes
Example:
ciscoasa(config)# sysopt connection tcpmss 8500
ciscoasa(config)# sysopt connection tcpmss minimum 1290
The default value is 1380 bytes. You can disable this feature by setting by... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
820 | Procedure
Step 1 Enable interfaces on the same security level so that they can communicate with each other:
same-security-traffic permit inter-interface
Step 2 Enable communication between hosts connected to the same interface:
same-security-traffic permit intra-interface
History for Advanced Interface Configuration
Ta... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
821 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
762
Interfaces
History for Advanced Interface Configuration | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
822 | CHAPTER 22
Traffic Zones
You can assign multiple interfaces to a traffic zone, which lets traffic from an existing flow exit or enter the
ASA on any interface within the zone. This capability allows Equal-Cost Multi-Path (ECMP) routing on the
ASA as well as external load balancing of traffic to the ASA across multiple ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.