index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
723
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 664 Interfaces History for Switch Ports
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
724
CHAPTER 16 EtherChannel Interfaces This chapter tells how to configure EtherChannels interfaces. For multiple context mode, complete all tasks in this section in the system execution space. To change from the context to the system execution space, enter the changeto system command. For ASA cluster interfaces, which hav...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
725
Channel Group Interfaces Each channel group can have up to 16 active interfaces, except for theFirepower 1000, 2100,SecureFirewall 3100 models, which support 8 active interfaces. For switches that support only 8 active interfaces, you can assign up to 16 interfaces to a channel group: while only 8 interfaces can be act...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
726
ASA system IDs), a single EtherChannel would not be desirable because you do not want traffic sent to the standby ASA device. Figure 63: Active/Standby Failover and VSS/vPC Link Aggregation Control Protocol The Link Aggregation Control Protocol (LACP) aggregates interfaces by exchanging the Link Aggregation Control Pro...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
727
If an active interface goes down and is not replaced by a standby interface, then traffic is rebalanced between the remaining links. The failure is masked from both Spanning Tree at Layer 2 and the routing table at Layer 3, so the switchover is transparent to other network devices. Related Topics Customize the EtherCha...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
728
• If you use an EtherChannel interface for a Failover or state link, then to prevent out-of-order packets, only one interface in the EtherChannel is used. If that interface fails, then the next interface in the EtherChannel is used. You cannot alter the EtherChannel configuration while it is in use as a Failover link. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
729
• Firepower 2100 • Secure Firewall 3100 • In Cisco IOSsoftware versions earlier than 15.1(1)S2, ASA did not support connecting an EtherChannel to a switch stack. With default switch settings, if the ASA EtherChannel is connected cross stack, and if the primary switch is powered down, then the EtherChannel connected to ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
730
• ISA 3000—Each channel group can have up to 16 active interfaces. For switches that support only 8 active interfaces, you can assign up to 16 interfaces to a channel group: while only 8 interfaces can be active, the remaining interfaces can act as standby links in case of interface failure. • Firepower 1000, 2100,Secu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
731
We recommend using active mode. Step 3 (Optional; ISA 3000 models only) Set the priority for a physical interface in the channel group: lacp port-priority number Example: ciscoasa(config-if)# lacp port-priority 12345 The priority number is an integer between 1 and 65535. The default is 32768. The higher the number, the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
732
Example: ciscoasa(config)# interface port-channel 1 This interface was created automatically when you added an interface to the channel group. If you have not yet added an interface, then this command creates the port-channel interface. You need to add at least one member interface to the port-channel interface before ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
733
The number is between 1 and 65535. The default is 32768. The higher the number, the lower the priority. This command is global for the ASA. If the device at the other end of the EtherChannel has conflicting port priorities, the system priority is used to determine which port priorities to use. For interface priorities ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
734
• (ISA 3000 only) show port-channel channel_group_number load-balance [hash-result {ip | ipv6 | l4port | mac | mixed | vlan-only} parameters] For EtherChannel, displays port-channel load-balance information along with the hash result and member interface selected for a given set of parameters. Examples for EtherChannel...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
735
Feature Name Releases Feature Information You can now configure up to 16 active linksin an EtherChannel. Previously, you could have 8 active links and 8 standby links. Be sure that yourswitch can support 16 active links(for example the Cisco Nexus 7000 with F2-Series 10 Gigabit Ethernet Module). If you upgrade from an ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
736
CHAPTER 17 Loopback Interfaces This chapter tells how to configure loopback interfaces. • About Loopback Interfaces, on page 677 • Guidelines for Loopback Interfaces, on page 678 • Configure a Loopback Interface, on page 678 • Rate-Limit Traffic to the Loopback Interface, on page 678 • Monitoring Loopback Interfaces, o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
737
Guidelines for Loopback Interfaces Failover and Clustering • No clustering support. Context Mode • VTI is supported in single context mode only. Other loopback uses are supported in multiple context mode. Additional Guidelines and Limitations • TCP sequence randomization is always disabled for traffic from the physical...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
738
Procedure Step 1 Create an access list identifying traffic to the loopback interface IP address. access-list name extended permit ip any host loopback_ip Create an ACE for each loopback interface IP address. You can also narrow this access list by specifiying the source IP addresses instead of any. Example: ciscoasa(co...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
739
ciscoasa(config)# interface loopback 1 ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0 ciscoasa(config-if)# nameif loop1 ciscoasa(config-if)# interface loopback 2 ciscoasa(config-if)# ip address 10.2.1.1 255.255.255.0 ciscoasa(config-if)# nameif loop2 ciscoasa(config-if)# access-list loop extended permit ip any ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
740
Feature Name Version Feature Information You can now add a loopback interface and use it for: • BGP • AAA • SNMP • Syslog • SSH • Telnet New/Modified commands: interface loopback, logging host, neighbor update-source, snmp-server host, ssh, telnet Support for loopback interface 9.18(2) CLI Book 1: Cisco Secure Firewall...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
741
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 682 Interfaces History for Loopback Interfaces
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
742
CHAPTER 18 VLAN Subinterfaces This chapter tells how to configure VLAN subinterfaces. For multiple context mode, complete all tasks in this section in the system execution space. To change from the context to the system execution space, enter the changeto system command. Note • About VLAN Subinterfaces, on page 683 • L...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
743
Model License Requirement Firepower 1140, 1150 Essentials License: 1024 Firepower 2100 Essentials License: 1024 Secure Firewall 3100 Essentials License: 1024 Firepower 4100 Essentials License: 1024 Firepower 9300 Essentials License: 1024 Throughput capability: 100 Mbps: 25 1 Gbps: 50 2 Gbps: 200 10 Gbps: 1024 ASA Virtu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
744
• All subinterfaces on the same parent interface must be either bridge group members or routed interfaces; you cannot mix and match. • The ASA does not support the Dynamic Trunking Protocol (DTP), so you must configure the connected switch port to trunk unconditionally. • You might want to assign unique MAC addresses t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
745
ciscoasa(config)# interface gigabitethernet 0/1.100 The port-channel number argument is the EtherChannel interface ID, such as port-channel 1. The subinterface ID is an integer between 1 and 4294967293. Step 2 Specify the VLAN for the subinterface: vlan vlan_id [secondary vlan_range] Example: ciscoasa(config-subif)# vl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
746
Monitoring VLAN Subinterfaces See the following commands: • show interface Displays interface statistics. • show interface ip brief Displays interface IP addresses and status. • show vlan mapping Shows the interface, secondary VLANs, and the primary VLANs to which they are mapped. Examples for VLAN Subinterfaces The fo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
747
Catalyst 6500 Configuration vlan 70 private-vlan primary private-vlan association 71-72 ! vlan 71 private-vlan community ! vlan 72 private-vlan isolated ! interface GigabitEthernet1/5 description Connected to ASA GigabitEthernet1/1 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 70-72 swit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
748
CHAPTER 19 VXLAN Interfaces This chapter tells how to configure Virtual eXtensible LAN (VXLAN) interfaces. VXLANs act as Layer 2 virtual networks over Layer 3 physical networks to stretch Layer 2 networks. • About VXLAN Interfaces, on page 689 • Requirements and Prerequisites for VXLAN Interfaces, on page 696 • Guideli...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
749
VXLAN Tunnel Endpoint VXLAN tunnel endpoint (VTEP) devices perform VXLAN encapsulation and decapsulation. Each VTEP has two interface types: one or more virtual interfaces called VXLAN Network Identifier (VNI) interfaces to which you apply your security policy, and a regular interface called the VTEP source interface t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
750
You can only add one VTEP interface, and all VNI interfaces are associated with the same VTEP interface. There is an exception for ASA virtual clustering on AWS. For AWS clustering, you can have two VTEP source interfaces: a VXLAN interface is used for the cluster control link, and a Geneve interface can be used for th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
751
Peer VTEP When the ASA sends a packet to a device behind a peer VTEP, the ASA needs two important pieces of information: • The destination MAC address of the remote device • The destination IP address of the peer VTEP The ASA maintains a mapping of destination MAC addresses to remote VTEP IP addresses for the VNI inter...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
752
VXLAN Bridge When you use a bridge group (transparent firewall mode, or optionally routed mode), the ASA can serve as a VXLAN bridge between a (remote) VXLAN segment and a local segment where both are in the same network. In this case, one member of the bridge group is a regular interface while the other member is a VN...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
753
See the following notes about this scenario: 1. For packets from VM3 to VM1, the destination MAC address is the ASA MAC address, because the ASA is the default gateway. 2. The VTEPsource interface on VirtualServer 2 receives packets from VM3, then encapsulates the packets with VNI 3’s VXLAN tag and sends them to the AS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
754
5. The ASA encapsulates the packets again with the VXLAN tag for VNI 2 and sends the packets to Virtual Server 1. Before encapsulation, the ASA changesthe inner frame destination MAC addressto be the MAC of VM1 (multicast-encapsulated ARP might be needed for the ASA to learn the VM1 MAC address). 6. When Virtual Server...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
755
Figure 65: Azure Gateway Load Balancer with Paired Proxy Requirements and Prerequisites for VXLAN Interfaces Model Requirements • Firepower 1010 switch ports and VLAN interfaces are not supported as VTEP interfaces. • Geneve encapsulation is supported for the following models: ASAv30, ASAv50, ASAv100 on Amazon Web Serv...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
756
IPv6 • The VNI interface supports both IPv4 and IPv6 traffic. • The VTEP source interface IP address only supports IPv4. Clustering and Multiple Context Mode • ASA clustering does not support VXLAN in Individual Interface mode except for the cluster control link (ASA virtual only). Only Spanned EtherChannel mode suppor...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
757
Procedure Step 1 Configure the VTEP Source Interface, on page 698. Step 2 Configure the VNI Interface, on page 700 Step 3 (Optional) Change the VXLAN UDP Port, on page 702. Step 4 (Azure GWLB) Allow Gateway Load Balancer Health Checks, on page 706. Configure the VTEP Source Interface You can configure one VTEP source i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
758
ciscoasa(config-if)# nameif outside ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0 Step 3 Specify the NVE instance: nve 1 You can only specify one NVE instance, with the ID 1. Example: ciscoasa(config)# nve 1 ciscoasa(cfg-nve)# Step 4 Specify VXLAN encapsulation. encapsulation vxlan Example: ciscoasa(cfg-nve)# ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
759
If you do not configure the multicast group per VNI interface, then this group is used. If you configure a group at the VNI interface level, then that group overrides this setting. Configure the VNI Interface Add a VNI interface, associate it with the VTEP source interface, and configure basic interface parameters. For...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
760
c) Set the internal segment ID. internal-segment-id id_number Where the id_number is between 1 and 16777215. Example: ciscoasa(config-if)# internal-segment-id 101 d) Set the external port. external-port port_number Where the port_number is between 1024 and 65535. Example: ciscoasa(config-if)# external-port 2001 e) Set ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
761
ciscoasa(config-if)# nameif vxlan1000 The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering this command with a new value. Do not enter the no form, because that command causes all commands that refer to that name to be deleted. Step 7 (Routed mode) Assign an IP...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
762
Procedure Set the VXLAN UDP port: vxlan port number Example: ciscoasa(config)# vxlan port 5678 Configure Geneve Interfaces To configure Geneve interfaces for the ASA virtual, perform the following steps. You can configure either VXLAN or Geneve. For VXLAN interfaces, see Configure VXLAN Interfaces, on page 697. Note Pr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
763
Step 2 Configure the source interface name and IPv4 address. Example: ciscoasa(config)# interface gigabitethernet 1/1 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0 Step 3 Specify the NVE instance: nve 1 You can only specify one NVE instance, with the ID 1. Example: ciscoasa(...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
764
ciscoasa(config)# interface vni 1 Set the ID between 1 and 10000. This ID is only an internal interface identifier. Step 2 Associate this interface with the VTEP source interface: vtep-nve 1 Step 3 Name the interface: nameif vni_interface_name Example: ciscoasa(config-if)# nameif geneve1000 The name is a text string up...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
765
ciscoasa(config)# same-security-traffic permit intra-interface Allow Gateway Load Balancer Health Checks The AWS or Azure Gateway Load Balancer requires appliances to answer a health check properly. The AWS Gateway Load Balancer will only send traffic to appliances that are considered healthy. You must configure the AS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
766
aaa authentication match gwlb outside LOCAL ! Use an HTTP login page on the ASA aaa authentication listener http outside port www HTTP(S) Redirection Using Static Interface NAT with Port Translation You can configure the ASA virtual to redirect health checks to a metadata HTTP(S) server. For HTTP(S) health checks, the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
767
ciscoasa(config-if)# show nve nve 1, source-interface "inside" is up IP address 15.1.2.1, subnet mask 255.255.255.0 Encapsulation: vxlan Encapsulated traffic statistics: 6701004 packets input, 3196266002 bytes 6700897 packets output, 3437418084 bytes 1 packets dropped Number of configured static peer VTEPs: 0 Number of...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
768
VTEP-NVE 1 Segment-id 5001 Tag-switching: disabled MTU: 1500 MAC: aaaa.bbbb.1234 IP address 192.168.0.1, subnet mask 255.255.255.0 Multicast group not configured • show vni vlan-mapping This command showsthe mapping between VNIsegment IDs and VLAN interfaces or physical interfaces. This command is only valid in transpa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
769
Transparent VXLAN Gateway Example See the following description of this example: • The outside interface on GigabitEthernet 0/0 is used as the VTEP source interface, and it is connected to the Layer 3 network. • The insidevm100 VLAN subinterface on GigabitEthernet 0/1.100 is connected to the 10.10.10.0/24 network, on w...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
770
vtep-nve 1 mcast-group 235.0.0.100 ! interface vni2 segment-id 8000 nameif vxlan8000 security-level 0 bridge-group 2 vtep-nve 1 mcast-group 236.0.0.100 ! interface vni3 segment-id 10000 nameif vxlan10000 security-level 0 bridge-group 3 vtep-nve 1 mcast-group 236.0.0.100 ! interface gigabitethernet0/1.100 nameif insidev...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
771
• The VTEP source-interface is a Layer 3 interface in transparent firewall mode indicated by nve-only in the interface configuration. The VTEPsource interface is not a BVI interface or a management interface, but it has an IP address and uses the routing table. VXLAN Routing Example See the following description of thi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
772
ASA Configuration interface gigabitethernet0/0 nameif outside ip address 192.168.1.30 255.255.255.0 no shutdown ! nve 1 encapsulation vxlan source-interface outside default-mcast-group 235.0.0.100 ! interface vni1 segment-id 6000 nameif vxlan6000 security-level 0 vtep-nve 1 ip address 10.20.20.1 255.255.255.0 ! interfa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
773
Feature Name Releases Feature Information VXLAN support was added, including VXLAN tunnel endpoint (VTEP) support. You can define one VTEP source interface per ASA or security context. We introduced the following commands: debug vxlan, default-mcast-group, encapsulation vxlan, inspect vxlan, interface vni, mcast-group,...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
774
CHAPTER 20 Routed and Transparent Mode Interfaces This chapter includes tasks to complete the interface configuration for all models in routed or transparent firewall mode. For multiple context mode, complete the tasksin thissection in the context execution space. Enter the changeto context name command to change to th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
775
Whether you assign a security level to a BVI depends on the firewall mode. In transparent mode, the BVI interface does not have a security level because it does not participate in routing between interfaces. In routed mode, BVI interfaces have a security level if you choose to route between the BVIs and other interface...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
776
For the failover and optional separate state link, which are point-to-point connections, you can also use a 31-bit subnet. 31-Bit Subnet and Management If you have a directly-connected management station, you can use a point-to-point connection for SSH or HTTP on the ASA, or for SNMP or Syslog on the management station...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
777
• You can only configure IPv6 addresses manually in transparent mode. • The ASA does not support IPv6 anycast addresses. • DHCPv6 and prefix delegation options are not supported with multiple context mode, transparent mode, clustering, or Failover. Model Guidelines • For the ASAv50, bridge groups are not supported in e...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
778
• In routed mode, ASA-defined EtherChannel and VNI interfaces are not supported as bridge group members. EtherChannels on the Firepower 4100/9300 can be bridge group members. • Bidirectional Forwarding Detection (BFD) echo packets are not allowed through the ASA when using bridge group members. If there are two neighbo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
779
• physical—For example, ethernet, gigabitethernet, tengigabitethernet, management. Refer to the hardware installation guide for your model for interface names. • physical.subinterface—For example, gigabitethernet0/0.100. • vni • vlan • loopback • mapped_name—For multiple context mode. Note For the Firepower 1010, you c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
780
ciscoasa(config-if)# ip address dhcp The setroute keyword lets the ASA use the default route supplied by the DHCP server. Reenter this command to reset the DHCP lease and request a new lease. If you do not enable the interface using the no shutdown command before you enter the ip address dhcp command, some DHCP request...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
781
For loopback interfaces, you do not set the management mode because the interface is only supported for to/from the device traffic. Note Examples The following example configures parameters for VLAN 101: ciscoasa(config)# interface vlan 101 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 100 cisc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
782
Enter the appropriate keyword for the type of authentication used by your ISP. When using CHAP or MS-CHAP, the username may be referred to as the remote system name, while the password may be referred to as the CHAP secret. Step 3 Associate the username assigned by your ISP to the VPDN group: vpdn group group_name loca...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
783
Procedure Step 1 Create a BVI: interface bvi bridge_group_number Example: ciscoasa(config)# interface bvi 2 The bridge_group_number is an integer between 1 and 250. You will later assign physical interfaces to this bridge group number. Step 2 (Transparent Mode) Specify the IP address for the BVI: ip address ip_address ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
784
If you do not enable the interface using the no shutdown command before you enter the ip address dhcp command, some DHCP requests might not be sent. Step 4 (Routed Mode) Name the interface: nameif name Example: ciscoasa(config-if)# nameif inside You must name the BVI if you want to route traffic outside the bridge grou...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
785
• For transparent mode, do not use this procedure for Management interfaces;see Configure a Management Interface for Transparent Mode, on page 727 to configure the Management interface. Procedure Step 1 Enter interface configuration mode: interface id Example: ciscoasa(config)# interface gigabithethernet 0/0 The interf...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
786
The name is a text string up to 48 characters, and is not case-sensitive. You can change the name by reentering this command with a new value. Do not enter the no form, because that command causes all commands that refer to that name to be deleted. Step 4 Set the security level: security-level number Example: ciscoasa(...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
787
ciscoasa(config)# interface management 0/0.1 The port-channel number argument is the EtherChannel interface ID, such as port-channel 1. The EtherChannel interface must have only Management member interfaces. In multiple context mode, enter the mapped_name if one was assigned using the allocate-interface command. For th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
788
Example: ciscoasa(config-if)# security-level 100 The number is an integer between 0 (lowest) and 100 (highest). Configure IPv6 Addressing This section describes how to configure IPv6 addressing. About IPv6 This section includes information about IPv6. IPv6 Addressing You can configure two types of unicast addresses for...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
789
format. If the IPv6 packets do not use the Modified EUI-64 format for the interface identifier, the packets are dropped and the following system log message is generated: 325003: EUI-64 source address check failed. The address format verification is only performed when a flow is created. Packets from an existing flow a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
790
IPv6 Prefix Delegation /62 Subnet Example The following example shows the ASA subnetting the prefix into 4 /62 subnets: 2001:DB8:ABCD:1230::/62, 2001:DB8:ABCD:1234::/62, 2001:DB8:ABCD:1238::/62, and 2001:DB8:ABCD:123C::/62. The ASA uses one of 4 available /64 subnets on 2001:DB8:ABCD:1230::/62 for its inside network (:...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
791
Enable the IPv6 Prefix Delegation Client Enable the DHCPv6 Prefix Delegation client on one or more interfaces. The ASA obtains one or more IPv6 prefixes that it can subnet and assign to inside networks. Typically, the interface on which you enable the prefix delegation client obtains its IP address using the DHCPv6 add...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
792
lifetime, use the show ipv6 general-prefix command. To set the ASA RA interval, see Configure IPv6 Neighbor Discovery, on page 736; the default is 200 seconds. Procedure Step 1 Enter interface configuration mode for the interface connected to the DHCPv6 server network: interface id Example: ciscoasa(config)# interface ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
793
ipv6 dhcp client pd Outside-Prefix ipv6 dhcp client pd hint ::/60 interface gigabitethernet 0/1 ipv6 address Outside-Prefix ::1:0:0:0:1/64 interface gigabitethernet 0/2 ipv6 address Outside-Prefix ::2:0:0:0:1/64 Configure a Global IPv6 Address To configure a global IPv6 address for any routed mode interface and for the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
794
ciscoasa(config)# interface management 1/1 Step 2 (Routed interface) Set the IP address using one of the following methods. • Enable stateless autoconfiguration on the interface: ipv6 address autoconfig [default trust {dhcp | ignore}] Enabling stateless autoconfiguration on the interface configuresIPv6 addresses based ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
795
• Use a delegated prefix: ipv6 address prefix_name ipv6_address/prefix_length Example: ciscoasa(config-if)# ipv6 address Outside-Prefix ::1:0:0:0:1/64 This feature requires the ASA to have the DHCPv6 Prefix Delegation client enabled on a different interface.See Enable the IPv6Prefix Delegation Client, on page 732. Typi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
796
to actively keep track of which neighbors are reachable and which are not, and to detect changed link-layer addresses. When a router or the path to a router fails, a host actively searches for functioning alternates. Procedure Step 1 Specify the IPv6 interface you want to configure. interface name Example: ciscoasa(con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
797
Example: ciscoasa(config-if)# ipv6 nd ns-interval 9000 Step 4 Set the amount of time that a remote IPv6 node is reachable. ipv6 nd reachable-time value Values for the value argument range from 0 to 3600000 milliseconds. When 0 is used for the value, the reachable time is sent as undetermined. It is up to the receiving ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
798
ipv6 nd suppress-ra Router advertisement messages (ICMPv6 Type 134) are automatically sent in response to router solicitation messages (ICMPv6 Type 133). Router solicitation messages are sent by hosts at system startup so that the host can immediately autoconfigure without needing to wait for the next scheduled router ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
799
• no-autoconfig—Specifies that the prefix cannot be used for IPv6 autoconfiguration. • off-link—Configures the specified prefix as off-link. The prefix will be advertised with the L-bit clear. The prefix will not be inserted into the routing table as a Connected prefix. When onlink is on (by default), the specified pre...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
800
Monitoring Routed and Transparent Mode Interfaces You can monitor interface statistics, status, PPPoE. For the Firepower 1000, 2100, Secure Firewall 3100 and the Firepower 4100/9300: Some statistics are not shown using the ASA commands. You must view more detailed interface statistics using FXOS commands. • /eth-uplink...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
801
GigabitEthernet1/2 is in client mode Prefix State is OPEN Renew will be sent in 00:03:46 Address State is OPEN Renew for address will be sent in 00:03:47 List of known servers: Reachable via address: fe80::20c:29ff:fe96:1bf4 DUID: 000100011D9D1712005056A07E06 Preference: 0 Configuration parameters: IA PD: IA ID 0x00030...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
802
DHCPV6 Client address statistics: Protocol Exchange Statistics: Number of Solicit messages sent: 1 Number of Advertise messages received: 1 Number of Request messages sent: 1 Number of Renew messages sent: 45 Number of Rebind messages sent: 0 Number of Reply messages received: 46 Number of Release messages sent: 0 Numb...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
803
Error and Failure Statistics: Total number of Re-transmission messages sent: 1 Total number of Message Validation errors in received messages: 0 • show ipv6 dhcp ha statistics The show ipv6 dhcp ha statistics command shows the transaction statistics between failover units, including how many timesthe DUID information w...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
804
• show vpdn session [l2tp | pppoe] [id sess_id | packets | state | window] Views the status of PPPoE sessions. The following examples show information provided by this command: ciscoasa# show vpdn Tunnel id 0, 1 active sessions time since change 65862 secs Remote Internet Address 10.0.0.1 Local Internet Address 199.99....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
805
Examples for Routed and Transparent Mode Interfaces Transparent Mode Example with 2 Bridge Groups The following example for transparent mode includes two bridge groups of three interfaces each, plus a management-only interface: interface gigabitethernet 0/0 nameif inside1 security-level 100 bridge-group 1 no shutdown i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
806
member security level is also 100, these security levels do not apply to inter-BVI communications; only the BVI security levels affect inter-BVI traffic. The security levels of the BVIs and outside (100, 50, and 0) implicitly permit traffic from inside to dmz and inside to outside; and from dmz to outside. An access ru...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
807
nameif dmz1 security-level 100 bridge-group 2 no shutdown interface gigabitethernet 1/6 nameif dmz2 security-level 100 bridge-group 2 no shutdown interface gigabitethernet 1/7 nameif dmz3 security-level 100 bridge-group 2 no shutdown ! interface bvi 2 nameif dmz security-level 50 ip address 209.165.201.1 255.255.255.22...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
808
History for Routed and Transparent Mode Interfaces Platform Feature Information Releases Feature Name We introduced this feature. We introduced the following commands:ipv6ndns-interval,ipv6ndra-lifetime, ipv6 nd suppress-ra, ipv6 neighbor, ipv6 nd prefix, ipv6 nd dad-attempts, ipv6 nd reachable-time, ipv6 address, ipv6...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
809
Platform Feature Information Releases Feature Name The ASA now supports the following features for IPv6 addressing: • DHCPv6 Address client—The ASA obtains an IPv6 global address and optional default route from the DHCPv6 server. • DHCPv6 Prefix Delegation client—The ASA obtains delegated prefix(es) from a DHCPv6 serve...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
810
Platform Feature Information Releases Feature Name For routed interfaces, you can configure an IP address on a 31-bit subnet for point-to-point connections. The 31-bitsubnet includes only 2 addresses; normally, the first and last address in the subnet is reserved for the network and broadcast, so a 2-address subnet is ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
811
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 752 Interfaces History for Routed and Transparent Mode Interfaces
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
812
CHAPTER 21 Advanced Interface Configuration This chapter describes how to configure MAC addresses for interfaces, how to set the maximum transmission unit (MTU), and set the TCP maximum segment size (TCP MSS), and how to allow same security level communication. Setting the correct MTU and maximum TCP segment size is es...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
813
• VLAN interfaces(Firepower 1010)—Routed firewall mode: All VLAN interfacesshare a MAC address. Ensure that any connected switches can support this scenario. If the connected switches require unique MAC addresses, you can manually assign MAC addresses. See Manually Configure the MAC Address, on page 757. Transparent fi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
814
A2F1.03zz.zzzz The MAC address format without a prefix is a legacy version. See the mac-address auto command in the command reference for more information about the legacy format. Note About the MTU The MTU specifies the maximum frame payload size that the ASA can transmit on a given Ethernet interface. The MTU value i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
815
MTU and Jumbo Frames A larger MTU lets you send larger packets. Larger packets might be more efficient for your network. See the following guidelines: • Matching MTUs on the traffic path—We recommend that you set the MTU on all ASA interfaces and other device interfaces along the traffic path to be the same. Matching M...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
816
• IPv4 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 120. For example, if you use jumbo frames and set the MTU to 9000, then you need to set the TCP MSS to 8880 to take advantage of the new MTU. • IPv6 IPsec endpoint traffic—Set the maximum TCP MSS to the MTU - 140. Inter-Interface Communication Allowing ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
817
Procedure Step 1 Enter interface configuration mode: interface id Example: ciscoasa(config)# interface gigabithethernet 0/0 Step 2 Assign a private MAC address to this interface: mac-address mac_address [standby mac_address] Example: ciscoasa(config-if)# mac-address 000C.F142.4CDE The mac_address is in H.H.H format, wh...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
818
Procedure Automatically assign private MAC addresses to each interface: mac-address auto [prefix prefix] If you do not enter a prefix, then the ASA autogenerates the prefix based on the last two bytes of the interface MAC address. If you manually enter a prefix, then the prefix is a decimal value between 0 and 65535. T...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
819
Step 2 Configure the maximum TCP segment size in bytes, between 48 and any maximum number: sysopt connection tcpmss [minimum] bytes Example: ciscoasa(config)# sysopt connection tcpmss 8500 ciscoasa(config)# sysopt connection tcpmss minimum 1290 The default value is 1380 bytes. You can disable this feature by setting by...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
820
Procedure Step 1 Enable interfaces on the same security level so that they can communicate with each other: same-security-traffic permit inter-interface Step 2 Enable communication between hosts connected to the same interface: same-security-traffic permit intra-interface History for Advanced Interface Configuration Ta...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
821
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 762 Interfaces History for Advanced Interface Configuration
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
822
CHAPTER 22 Traffic Zones You can assign multiple interfaces to a traffic zone, which lets traffic from an existing flow exit or enter the ASA on any interface within the zone. This capability allows Equal-Cost Multi-Path (ECMP) routing on the ASA as well as external load balancing of traffic to the ASA across multiple ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf