index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
823
Asymmetric Routing In the following scenario, a connection was established between an inside host and an outside host through ISP 1 on the Outside1 interface. Due to asymmetric routing on the destination network, return traffic arrived from ISP 2 on the Outside2 interface. Non-Zoned Problem: The ASA maintains the conne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
824
Non-Zoned Problem: The connection between the inside and outside host will be deleted; a new connection must be established using a new next-best route. For UDP, the new route will be used after a single packet drop, but for TCP, a new connection has to be reestablished. Zoned Solution: The ASA detects the lost route a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
825
Non-Zoned Problem: Load-balancing across interfaces is not possible; you can only load-balance with equal cost routes on one interface. ZonedSolution: The ASA load-balances connections across up to eight equal cost routes on all the interfaces in the zone. Per-Zone Connection and Routing Tables The ASA maintains a per-...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
826
ECMP is not supported across multiple interfaces, so you cannot define a route to the same destination on a different interface. The following route is disallowed when configured with any of the routes above: route outside2 0 0 10.2.1.1 Zoned ECMP Support With zones, you can have up to 8 equal cost static or dynamic ro...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
827
• NAT • Service Rules, except for QoS traffic policing. • Routing You can also configure to- and from-the-box services listed in To- and From-the-Box Traffic, on page 768, although full zoned support is not available. Do not configure other services (such as VPN or Botnet Traffic Filter) for interfaces in a traffic zon...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
828
• For management traffic on regular interfaces in a zone, only asymmetric routing on existing flows is supported; there is no ECMP support. • You can configure a managementservice on only one zone interface, but to take advantage of asymmetric routing support, you need to configure it on all interfaces. Even when the c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
829
When you use interface-specific NAT and PAT pools, the ASA cannot switch connections over in case of the original interface failure. If you use interface-specific PAT pools, multiple connections from the same host might load-balance to different interfaces and use different mapped IPaddresses. Internetservicesthat use ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
830
configure a zone in a context, none of the context interfaces can be part of an ASR group. See Configure Support for Asymmetrically Routed Packets (Active/Active Mode), on page 297 for more information about ASR groups. • Only the primary interfaces for each connection are replicated to the standby unit; current interf...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
831
Configure a Traffic Zone Configure a named zone, and assign interfaces to the zone. Procedure Step 1 Add the zone: zone name Example: zone outside The zone name can be up to 48 characters in length. Step 2 Add an interface to the zone: interface id zone-member zone_name Example: interface gigabitethernet0/0 zone-member...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
832
Monitoring Traffic Zones This section describes how to monitor traffic zones. Zone Information • show zone [name] Shows zone ID, context, security level, and members. See the following output for the show zone command: ciscoasa# show zone outside-zone Zone: zone-outside id: 2 Security-level: 0 Context: test-ctx Zone Me...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
833
• show local-host [zone zone_name [zone zone_name] [...]] Shows the network states of local hosts within a zone. See the following output for the show local-host zone command. The primary interface is listed first, and the current interface is in parentheses. ciscoasa# show local-host zone outside-zone Zone:outside-zon...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
834
in 10.2.0.1 255.255.255.255 identity in 10.6.6.4 255.255.255.255 identity in 10.4.4.4 255.255.255.255 via 10.4.0.10 (unresolved, timestamp: 49) in 172.0.0.67 255.255.255.255 identity in 172.0.0.0 255.255.255.0 wan-zone:outside2 in 10.85.43.0 255.255.255.0 via 10.4.0.3 (unresolved, timestamp: 50) in 10.85.45.0 255.255.2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
835
no shutdown description inside switch zone outside interface gigabitethernet0/0.101 vlan 101 nameif outside1 security-level 0 ip address 209.165.200.225 255.255.255.224 zone-member outside no shutdown interface gigabitethernet0/0.102 vlan 102 nameif outside2 security-level 0 ip address 209.165.201.1 255.255.255.224 zon...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
836
# 4 equal cost default routes for outside interfaces route outside1 0 0 209.165.200.230 route outside2 0 0 209.165.201.10 route outside3 0 0 198.51.100.99 route outside4 0 0 203.0.113.87 # Static routes for NAT addresses - see redistribute static command route dmz 209.165.202.129 255.255.255.255 10.3.5.99 route inside ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
837
History for Traffic Zones Platform Description Releases Feature Name You can group interfaces together into a traffic zone to accomplish traffic load balancing (using Equal Cost Multi-Path (ECMP) routing), route redundancy, and asymmetric routing across multiple interfaces. You cannot apply a security policy to a named...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
838
P ART IV Basic Settings • Basic Settings, on page 781 • DHCP and DDNS Services, on page 805 • Digital Certificates, on page 831 • ARP Inspection and the MAC Address Table, on page 869
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
839
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
840
CHAPTER 23 Basic Settings This chapter describes how to configure basic settings on the ASA that are typically required for a functioning configuration. • Set the Hostname, Domain Name, and the Enable and Telnet Passwords, on page 781 • Set the Date and Time, on page 783 • Configure the Master Passphrase, on page 790 •...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
841
ciscoasa(config)# hostname myhostnamexample12345 This name can be up to 63 characters. The hostname must start and end with a letter or digit, and have only letters, digits, or a hyphen. When you set a hostname for the ASA, that name appears in the command line prompt. If you establish sessions to multiple devices, the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
842
This command changes the password for the highest privilege level (15). If you configure local command authorization, you can set enable passwords for each privilege level from 0 to 15 using the following syntax: enable password password level number The encrypted keyword (for passwords 32 characters and fewer in 9.6 a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
843
Set the Time Zone and Daylight Saving Dates To set the time zone and daylight saving date range, perform the following steps. Procedure Step 1 Set the time zone. By default, the time zone is UTC. • Firepower 1000, Firepower 2100 in Appliance mode, Secure Firewall 3100: clock timezone zone • zone—Enter the clock timezon...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
844
• minutes—Sets the number of minutes of offset from UTC. Example: ciscoasa(config)# clock timezone PST -8 Step 2 Enter one of the following commands to change the date range for daylight saving time from the default. The default recurring date range is from 2:00 a.m. on the second Sunday in March to 2:00 a.m. on the fi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
845
• offset —Sets the number of minutes to change the time for daylight savings time. By default, the value is 60 minutes. Example: ciscoasa(config)# clock summer-time PDT recurring first Monday April 2:00 60 Set the Date and Time Using an NTP Server NTP is used to implement a hierarchical system of servers that provide a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
846
The key_id argument is a value between 1 and 4294967295. You can enter multiple trusted keys for use with multiple servers. c) Set a key to authenticate with an NTP server. ntp authentication-key key_id {md5 | sha1 | sha256 | sha512 | cmac} key Example: ciscoasa(config)# ntp authentication-key 1 md5 aNiceKey1 ciscoasa(...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
847
Procedure Set the date time manually. clock set hh:mm:ss {month day | day month} year Example: ciscoasa# clock set 20:54:00 april 1 2004 The hh:mm:ss argument sets the hour, minutes, and seconds in 24-hour time. For example, enter 20:54:00 for 8:54 pm. The day value sets the day of the month, from 1 to 31. You can ente...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
848
• Cisco PTP supports multicast PTP messages only. • PTP is enabled on all ISA 3000 interfaces in transparent mode by default. In routed mode, you must add the necessary configuration to ensure that the PTP packets are allowed to flow through the device. • PTP is available only for IPv4 networks, not for IPv6 networks. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
849
Enable PTP on each interface through which the system can contact a PTP clock in the configured domain. Example: ciscoasa(config)# interface gigabitethernet1/2 ciscoasa(config-if)# ptp enable Configure the Master Passphrase The master passphrase allows you to securely store plain text passwords in encrypted format and ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
850
Procedure Step 1 Set the passphrase used for generating the encryption key. The passphrase must be between 8 and 128 characters long. All characters except a backspace and double quotes are accepted for the passphrase. If you do not enter the new passphrase in the command, you are prompted for it. To change the passphr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
851
in user contexts may be stale. Alternatively, use the write memory all command in the system context to save all configurations. Examples The following example shows that no previous key was present: ciscoasa(config)# key config-key password-encryption 12345678 The following example shows that a key already exists: cis...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
852
Example: ciscoasa(config)# no key config-key password-encryption Warning! You have chosen to revert the encrypted passwords to plain text. This operation will expose passwords in the configuration and therefore exercise caution while viewing, storing, and copying configuration. Old key: bumblebee Step 2 Save the runtim...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
853
Configure the DNS Servers You need to configure a DNS server so that the ASA can resolve host names to IP addresses. You also must configure a DNS server to use fully qualified domain names (FQDN) network objects in access rules. Some ASA features require use of a DNS server to access external servers by domain name. O...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
854
ciscoasa(config)# dns server-group DefaultDNS b) Specify one or more DNS servers for the group. name-server ip_address [ip_address2] [...] [ip_address6] [interface_name] You can enter all six IP addresses in the same command, separated by spaces, or you can enter each command separately. (Optional) Specify the interfac...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
855
e) Repeat the above steps to add additional DNS server groups. Step 3 (Optional) Map domains to specific DNS server groups. dns-group-map dns-to-domain dns_group_name domain You can map up to 30 domains. You cannot map the same domain to multiple DNS server groups, but you can map multiple domains to the same server gr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
856
connections will have to be re-established because of the link that is temporarily down during the switchover. • Cisco TrustSec connections on hardware bypassinterfaces are dropped when hardware bypassis activated. When the ISA 3000 powers on and hardware bypass is deactivated, the connections are renegotiated. • When ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
857
Step 4 Disable TCP sequence randomization. This example shows how to disable randomization for all traffic by adding the setting to the default configuration. policy-map global_policy class sfrclass set connection random-sequence-number disable If you later decide to turn it back on, replace "disable" with enable. Step...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
858
Model Before Compilation During Compilation After Compilation Match old rules. Matches new rules. (The rate for connections persecond is unaffected.) Transactional Matches old rules. An additional benefit of the transactional model is that, when replacing an ACL on an interface, there is no gap between deleting the old...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
859
ASP load balancing is disabled on the ASA virtual. With the integration of DPDK (Dataplane Development Kit) into the ASA virtual’s accelerated security path (ASP), the ASA virtual shows better performance with this feature disabled. Note Procedure Step 1 Enable the automatic switching on and off of ASP load balancing: ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
860
History for Basic Settings Platform Description Releases Feature Name You can now use multiple DNS server groups: one group is the default, while other groups can be associated with specific domains. A DNS request that matches a domain associated with a DNS server group will use that group. For example, if you want tra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
861
Platform Description Releases Feature Name You can now specify an IPv6 address for the NTP server. New/Modified commands: ntp server NTP support on IPv6 9.12(1) The default enable password is blank. When you try to access privileged EXEC mode on the ASA, you are now required to change the password to a value of 3 to 12...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
862
Platform Description Releases Feature Name The ISA 3000 supports a hardware bypass function to allow traffic to continue flowing through the appliance when there is a loss of power. We introduced the following commands: hardware-bypass, hardware-bypass manual, hardware-bypass boot-delay, show hardware-bypass This featu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
863
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 804 Basic Settings History for Basic Settings
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
864
CHAPTER 24 DHCP and DDNS Services This chapter describes how to configure the DHCP server or DHCP relay as well as dynamic DNS (DDNS) update methods. • About DHCP and DDNS Services, on page 805 • Guidelines for DHCP and DDNS Services, on page 807 • Configure the DHCP Server, on page 809 • Configure the DHCP Relay Agent...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
865
• DHCP option 66 gives the IP address or the hostname of a single TFTP server. • DHCP option 3 sets the default route. A single request might include both options 150 and 66. In this case, the ASA DHCP server provides values for both options in the response if they are already configured on the ASA. You can use advance...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
866
DHCPDISCOVER packet to the DHCP Server. The DHCP Server replies with a DHCPOFFER to ASA Site 2. ASA Site 2 forwards it to DHCP relay (ASA Site1), which forwards it to the DHCP Client. Figure 66: DHCP Relay Server over VTI The same procedure is followed for a DHCPREQUEST and DHCPACK/NACK requirements. Guidelines for DHC...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
867
IPv6 Supports IPv6 for DHCP stateless server and DHCP Relay. DHCPv4 Server • The maximum available DHCP pool is 256 addresses. • You can configure only one DHCP server on each interface. Each interface can have its own pool of addresses to use. However the other DHCP settings, such as DNS servers, domain name, options,...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
868
Configure the DHCP Server This section describes how to configure a DHCP server provided by the ASA. Procedure Step 1 Enable the DHCPv4 Server, on page 809. Step 2 Configure Advanced DHCPv4 Options, on page 811. Step 3 Configure the DHCPv6 Stateless Server, on page 812. Enable the DHCPv4 Server To enable the DHCP serve...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
869
ciscoasa(config)# dhcpd reserve-address 10.0.1.109 030c.f142.4cde inside The reserved address must come from the configured address pool, and the address pool must be on the same subnet as the ASA interface. In transparent mode, specify a bridge group member interface. In routed mode, specify a routed interface or a BV...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
870
transparent mode, you must set dhcpd option 3 ip if you want to set a default gateway; the ASA itself cannot act as the default gateway. dhcpd option 3 ip gateway_ip Example: ciscoasa(config)# dhcpd option 3 ip 10.10.1.1 Step 10 Enable the DHCP daemon within the ASA to listen for DHCP client requests on the enabled int...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
871
Example: ciscoasa(config)# dhcpd option 2 hex 22.0011.01.FF1111.00FF.0000.AAAA.1111.1111.1111.11 The ASA does not verify that the option type and value that you provide match the expected type and value for the option code as defined in RFC 2132. For example, you can enter the dhcpd option 46 ascii hello command, and t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
872
autoconfiguration on a client configures IPv6 addresses based on prefixes received in Router Advertisement messages; in other words, based on the prefix that the ASA received using Prefix Delegation. Before you begin This feature is only supported in single, routed mode. This feature is not supported in clustering. Pro...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
873
ciscoasa(config)# interface gigabithethernet 0/0 ciscoasa(config-if)# Step 4 Enable the DHCPv6 server: ipv6 dhcp server pool_name Example: ciscoasa(config-if)# ipv6 dhcp server Inside-Pool ciscoasa(config-if)# Step 5 Configure the Router Advertisement to inform SLAAC clients about the DHCPv6 server: ipv6 nd other-confi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
874
• Global DHCP servers—When a DHCP request enters an interface that does not have interface-specific servers configured, the ASA relays the request to all global servers. If the interface has interface-specific servers, then the global servers are not used. Configure the DHCPv4 Relay Agent When a DHCP request enters an ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
875
ciscoasa(config)# dhcprelay enable mktg Step 3 (Optional) Set the number of seconds allowed for DHCP relay address handling. dhcprelay timeout seconds Example: ciscoasa(config)# dhcprelay timeout 25 Step 4 (Optional) Change the first default router address in the packet sent from the DHCP server to the address of the A...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
876
Configure the DHCPv6 Relay Agent When a DHCPv6 request enters an interface, the ASA relays the request to all DHCPv6 global servers. Procedure Step 1 Specify the IPv6 DHCP server destination address to which client messages are forwarded. ipv6 dhcprelay server ipv6_address [interface] Example: ciscoasa(config)# ipv6 dh...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
877
The ASA supports the following DDNS update methods: • Standard DDNS—The standard DDNS update method is defined by RFC 2136. With this method, the ASA and the DHCP server use DNS requests to update the DNS RRs. The ASA or DHCP server sends a DNS request to its local DNS server for information about the hostname and, bas...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
878
Example: ciscoasa(config)# ddns update method ddns1 ciscoasa(DDNS-update-method)# b) Specify the standard DDNS method. ddns [both] By default, the ASA updates the A RR only. Use this setting if you want the DHCP server to update the PTR RR. If you want the ASA to update both the A and PTR RR, specify both. Use the both...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
879
https://jcrichton:pa$$w0rd17@domains.example.com/nic/update?hostname=<h>&myip=<a> d) (Optional) Specify the address types (IPv4 or IPv6) that you want to update. By default, the ASA updates all IPv4 and IPv6 addresses. If you want to limit the addresses, enter the following command. web update-type {ipv4 | ipv6 [all] |...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
880
ciscoasa(config-if)# ddns update ddns1 c) Assign a hostname for this interface. ddns update hostname hostname If you do not set the hostname, the device hostname is used. If you do not specify an FQDN, then the system domain name or the default domain from the DNS server group is appended (for static or PPPoE IP addres...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
881
[...] quit Standard DDNS Method for a Static IP Address The following example shows how to configure the standard DDNS method for use with a static IP address. Note that you do not configure DHCP client settings for this scenario. ! Define the DDNS method to update both RRs: ddns update method ddns-2 ddns both interfac...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
882
ip address dhcp ddns update hostname asa ! Configure the DHCP server to update both RRs: dhcp client update dns server both Example: Web Type The following example configures the web type method. ! Define the web type method: ddns update method web-1 web update-url https://captainkirk:enterpr1s3@domains.cisco.com/ddns?...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
883
Total number of Relay-Forward messages received: 0 Total number of Relay-Reply messages sent: 0 Error and Failure Statistics: Total number of Re-transmission messages sent: 0 Total number of Message Validation errors in received messages: 0 • show ipv6 dhcp pool [pool_name] • show ipv6 dhcp interface [ifc_name [statist...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
884
ciscoasa(config-if)# show ipv6 dhcp interface outside statistics DHCPV6 Client PD statistics: Protocol Exchange Statistics: Number of Solicit messages sent: 1 Number of Advertise messages received: 1 Number of Request messages sent: 1 Number of Renew messages sent: 45 Number of Rebind messages sent: 0 Number of Reply m...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
885
On an standby unit: ciscoasa(config)# show ipv6 dhcp ha statistics DHCPv6 HA global statistics: DUID sync messages sent: 0 DUID sync messages received: 1 DHCPv6 HA error statistics: Send errors: 0 Troubleshooting DHCP Relay over VTI If the DHCP client fails to get an IP address: • Verify for Tunnel interface/VTI config...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
886
Monitoring DDNS Status See the following command for monitoring DDNS status. • show ddns update {interface if_name | method [name]} This command shows the DDNS update status. The following example show details about the DDNS update method: ciscoasa# show ddns update method ddns1 Dynamic DNS Update Method: ddns1 IETF st...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
887
ciscoasa# show ddns update interface outside Dynamic DNS Update on outside: Update Method Name Update Destination test not available Last Update attempted on 09:01:52.729 UTC Mon Mar 23 2020 Status : Failed Reason : Server error (Error response from server) The following example showsthat a web update was not yet attem...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
888
Platform Description Releases Feature Name The ASA now supports the following features for IPv6 addressing: • DHCPv6 Address client—The ASA obtains an IPv6 global address and optional default route from the DHCPv6 server. • DHCPv6Prefix Delegation client—The ASA obtains delegated prefix(es) from a DHCPv6 server. The AS...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
889
Platform Description Releases Feature Name DHCP relay support for IPv6 was added. We introduced the following commands: ipv6 dhcprelay server, ipv6 dhcprelay enable, ipv6 dhcprelay timeout, clear config ipv6 dhcprelay, ipv6 nd managed-config-flag, ipv6 nd other-config-flag, debug ipv6 dhcp, debug ipv6 dhcprelay, show i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
890
CHAPTER 25 Digital Certificates This chapter describes how to configure digital certificates. • About Digital Certificates, on page 831 • Guidelines for Digital Certificates, on page 838 • Configure Digital Certificates, on page 840 • How to Set Up Specific Certificate Types, on page 860 • Set a Certificate Expiration ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
891
CA certificates and identity certificates apply to both site-to-site VPN connections and remote access VPN connections. Procedures in this document refer to remote access VPN use in the ASDM GUI. Note For an example of a scenario that includes certificate configuration and load balancing, see the following URL: https:/...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
892
Some CAs have an RA as part of their implementation. An RA is a server that acts as a proxy for the CA, so that CA functions can continue when the CA is unavailable. Key Pairs Key pairs are RSA or Elliptic Curve Signature Algorithm (ECDSA) keys, which have the following characteristics: • RSA keys can be used for SSH o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
893
Proxy for SCEP Requests The ASA can proxy SCEP requests between Secure Client and a third-party CA. The CA only needs to be accessible to the ASA if it is acting asthe proxy.For the ASA to provide thisservice, the user must authenticate using any of the methods supported by AAA before the ASA sends an enrollment reques...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
894
• VeriSign CRLs CRLs provide the ASA with one way of determining whether a certificate that is within its valid time range has been revoked by the issuing CA. CRL configuration is part of configuration of a trustpoint. You can configure the ASA to make CRL checks mandatory when authenticating a certificate by using the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
895
• Single context mode—128 MB • Multiple context mode—16 MB per context OCSP OCSP provides the ASA with a way of determining whether a certificate that is within its valid time range has been revoked by the issuing CA. OCSP configuration is part of trustpoint configuration. OCSP localizes certificate status on a validat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
896
Certificates and User Login Credentials The following section describesthe different methods of using certificates and user login credentials(username and password) for authentication and authorization. These methods apply to IPsec,Secure Client, and Clientless SSL VPN. In all cases, LDAPauthorization does not use the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
897
• Enabled by the authorization server group setting • Uses the username value of the certificate primary DN field as a credential If the primary DN field is not present in the certificate, the ASA uses the secondary DN field value as the username for the authorization request. Note For example, consider a user certific...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
898
• Thirty days before the local CA certificate expires, a rollover replacement certificate is generated, and a syslog message informs the administrator that it is time for local CA rollover. The new local CA certificate must be imported onto all necessary devices before the current certificate expires. If the administra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
899
• When a certificate enrollment is completed, the ASA stores a PKCS12 file containing the user's keypair and certificate chain, which requires about 2 KB of flash memory or disk space per enrollment. The actual amount of disk space depends on the configured RSA key size and certificate fields. Keep this guideline in mi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
900
Procedure Step 1 Generate one default, general-purpose RSA key pair. crypto key generate rsa modulus 2048 Example: ciscoasa(config)# crypto key generate rsa modulus 2048 The default key modulus is 2048, but you should specify the modulus explicitly to ensure you get the size you require. The key is named Default-RSA-Ke...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
901
Step 5 If necessary, remove existing key pairs so that you can generate new ones. crypto key zeroize {rsa | ecdsa} Example: ciscoasa(config)# crypto key zeroize rsa Step 6 (Optional) Archive the local CA server certificate and key pair. copy Example: ciscoasa# copy LOCAL-CA-SERVER_0001.pl2 tftp://10.1.1.22/user6/ This ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
902
• Request automatic enrollment using SCEP with the specified trustpoint and configure the enrollment URL. enrollment protocol scep url Example: ciscoasa/contexta(config-ca-trustpoint)# enrollment protocol scep url http://10.29.67.142:80/certsrv/mscep/mscep.dll • Request automatic enrollment using CMP with the specified...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
903
Example: ciscoasa/contexta(config-ca-trustpoint)# revocation-check crl ciscoasa/contexta(config-ca-trustpoint)# revocation-check none To enable either required or optional CRL checking, make sure that you configure the trustpoint for CRL management after obtaining certificates. Note Step 5 Enable or disable the basic c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
904
ciscoasa/contexta(config-ca-trustpoint)# fqdn example.com Step 10 During enrollment, ask the CA to include the IP address of the ASA in the certificate. ip-address ip-address Example: ciscoasa/contexta(config-ca-trustpoint)# ip-address 10.10.100.1 Step 11 Specify the key pair whose public key is to be certified. keypai...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
905
inside Name of interface GigabitEthernet0/0.100 inside1 Name of interface GigabitEthernet0/0.41 mgmt Name of interface Management0/0 outside Name of interface GigabitEthernet0/0.51 ciscoasa(config-ca-trustpoint)# ocsp interface mgmt Step 15 Disable the nonce extension on an OCSP request. The nonce extension cryptograph...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
906
Step 20 During enrollment, ask the CA to include the ASA serial number in the certificate. serial-number Example: ciscoasa/contexta(config-ca-trustpoint)# serial number JMX1213L2A7 Step 21 Save the running configuration. write memory Example: ciscoasa/contexta(config)# write memory Configure CRLs for a Trustpoint To us...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
907
policy cdp ciscoasa(config-ca-crl)# policy cdp Note SCEP retrieval is not supported by distribution points specified in certificates. • CRLs are retrieved only from certificate map match rule that you configure. policy static ciscoasa(config-ca-crl)# policy static • CRLs are retrieved from CRL distribution pointsspecif...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
908
Step 7 Choose one of the following: • Require the NextUpdate field to be present in CRLs. This is the default setting. enforcenextupdate ciscoasa(config-ca-crl)# enforcenextupdate • Allow the NextUpdate field to be absent in CRLs. no enforcenextupdate ciscoasa(config-ca-crl)# no enforcenextupdate Step 8 Identify the LD...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
909
Export or Import a Trustpoint Configuration To export and import a trustpoint configuration, perform the following steps: Procedure Step 1 Export a trustpoint configuration with all associated keys and certificates in PKCS12 format. crypto ca export trustpoint Example: ciscoasa(config)# crypto ca export Main The ASA di...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
910
End with a blank line or the word "quit" on a line by itself: [ PKCS12 data omitted ] quit INFO: Import PKCS12 operation completed successfully The following example manually imports a certificate for the trustpoint Main: ciscoasa (config)# crypto ca import Main certificate % The fully-qualified domain name in the cert...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
911
• dc—Domain Component • dnq—DN Qualifier • emailAddress—Email Address • genq—Generational Qualifier • gn—Given Name • i—Initials • ip—IP Address • l—Locality • n—Name • o—Organization Name • ou—Organizational Unit • ser—Serial Number Ensure you specify the serial number attribute in the subject-name. The certificate ma...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
912
• co—Part or all of the field must match the value given. • nc—No part of the field can match the value given. Step 4 Specify the extended key usage: extended-key-usage operator OID_string Example: ciscoasa(config-ca-cert-map)# extended-key-usage nc clientauth The following are valid operators: • co—Part or all of the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
913
• SRV-ID: A subjectAltName entry of type otherName whose name form is SRVName as defined in RFC 4985. A SRV-ID identifier may contain both a domain name and an application service type.For example, a SRV-ID of “_imaps.example.net” would be split into a DNS domain name portion of “example.net” and an application service...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
914
Example Configure a reference identity for RFC 6125 server certificate validation for a syslog server: ciscoasa(config)# crypto ca reference-identity syslogServer ciscoasa(config-ca-ref-identity)# dns-id syslog1-bxb.cisco.com ciscoasa(config-ca-ref-identity)# cn-id syslog1-bxb.cisco.com What to do next Use the referenc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
915
% The fully-qualified domain name in the certificate will be: securityappliance.example.com % Include the device serial number in the subject name? [yes/no]: n Display Certificate Request to terminal? [yes/no]: y Certificate Request follows: MIIBoDCCAQkCAQAwIzEhMB8GCSqGSIb3DQEJAhYSRmVyYWxQaXguY2lzY28uY29t [ certificate...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
916
ciscoasa(config)# show crypto ca certificate Main Step 7 Save the running configuration. write memory Example: ciscoasa(config)# write memory Step 8 Repeat these steps for each trustpoint that you configure for manual enrollment. Obtain Certificates Automatically with SCEP This section describes how to obtain certifica...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
917
If the ASA reboots after you have issued the crypto ca enroll command but before you have received the certificate, reenter the crypto ca enroll command and notify the CA administrator. Note Step 3 Verify that the enrollment process was successful by displaying certificate details issued for the ASA and the CA certific...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
918
Example: ciscoasa(config)# tunnel-group 209.165.200.225 general-attributes Step 4 Enable SCEP enrollment for the tunnel group. scep-enrollment enable Example: ciscoasa(config-tunnel-general)# scep-enrollment enable INFO: 'authentication aaa certificate' must be configured to complete setup of this option. Step 5 Enter ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
919
ciscoasa(config-tunnel-webvpn)# secondary-pre-fill-username ssl-client hide use-common-password secret Despite the ssl-client keyword inherited from earlier releases, use this command to support Secure Client sessions that use either IKEv2 or SSL. You must use the hide keyword to support the SCEP proxy. Step 9 Supply t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
920
CA Server Management Manage User Certificates To change the certificate status, perform the following steps: Procedure Step 1 Select specific certificates by username or by certificate serial number in the Manage User Certificates pane. Step 2 Choose one of the following options: • Click Revoketo remove user access if ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
921
This command returns information like the following: 0 trustpool certificates installed Trustpool auto renewal statistics: State: Not in progress Last import result: Not attempted N/A Current Jitter: 0 Trustpool auto import statistics: Last import result: N/A Next schedule import at 22:00:00 Tues Jul 21 2015 Trustpool ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
922
Expiration checking is not done on trust pool certificates. The Local CA trust point is treated as a regular trustpoint for expiration checking too. Note Monitoring Digital Certificates See the following commands for monitoring digital certificate status: • show crypto ca server This command shows local CA configuratio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf