index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
823 | Asymmetric Routing
In the following scenario, a connection was established between an inside host and an outside host through
ISP 1 on the Outside1 interface. Due to asymmetric routing on the destination network, return traffic arrived
from ISP 2 on the Outside2 interface.
Non-Zoned Problem: The ASA maintains the conne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
824 | Non-Zoned Problem: The connection between the inside and outside host will be deleted; a new connection
must be established using a new next-best route. For UDP, the new route will be used after a single packet
drop, but for TCP, a new connection has to be reestablished.
Zoned Solution: The ASA detects the lost route a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
825 | Non-Zoned Problem: Load-balancing across interfaces is not possible; you can only load-balance with equal
cost routes on one interface.
ZonedSolution: The ASA load-balances connections across up to eight equal cost routes on all the interfaces
in the zone.
Per-Zone Connection and Routing Tables
The ASA maintains a per-... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
826 | ECMP is not supported across multiple interfaces, so you cannot define a route to the same destination on a
different interface. The following route is disallowed when configured with any of the routes above:
route outside2 0 0 10.2.1.1
Zoned ECMP Support
With zones, you can have up to 8 equal cost static or dynamic ro... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
827 | • NAT
• Service Rules, except for QoS traffic policing.
• Routing
You can also configure to- and from-the-box services listed in To- and From-the-Box Traffic, on page 768,
although full zoned support is not available.
Do not configure other services (such as VPN or Botnet Traffic Filter) for interfaces in a traffic zon... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
828 | • For management traffic on regular interfaces in a zone, only asymmetric routing on existing flows is
supported; there is no ECMP support.
• You can configure a managementservice on only one zone interface, but to take advantage of asymmetric
routing support, you need to configure it on all interfaces. Even when the c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
829 | When you use interface-specific NAT and PAT pools, the ASA cannot switch
connections over in case of the original interface failure.
If you use interface-specific PAT pools, multiple connections from the same host
might load-balance to different interfaces and use different mapped IPaddresses.
Internetservicesthat use ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
830 | configure a zone in a context, none of the context interfaces can be part of an ASR group. See Configure
Support for Asymmetrically Routed Packets (Active/Active Mode), on page 297 for more information
about ASR groups.
• Only the primary interfaces for each connection are replicated to the standby unit; current interf... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
831 | Configure a Traffic Zone
Configure a named zone, and assign interfaces to the zone.
Procedure
Step 1 Add the zone:
zone name
Example:
zone outside
The zone name can be up to 48 characters in length.
Step 2 Add an interface to the zone:
interface id zone-member zone_name
Example:
interface gigabitethernet0/0
zone-member... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
832 | Monitoring Traffic Zones
This section describes how to monitor traffic zones.
Zone Information
• show zone [name]
Shows zone ID, context, security level, and members.
See the following output for the show zone command:
ciscoasa# show zone outside-zone
Zone: zone-outside id: 2
Security-level: 0
Context: test-ctx
Zone Me... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
833 | • show local-host [zone zone_name [zone zone_name] [...]]
Shows the network states of local hosts within a zone.
See the following output for the show local-host zone command. The primary interface is listed first,
and the current interface is in parentheses.
ciscoasa# show local-host zone outside-zone
Zone:outside-zon... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
834 | in 10.2.0.1 255.255.255.255 identity
in 10.6.6.4 255.255.255.255 identity
in 10.4.4.4 255.255.255.255 via 10.4.0.10 (unresolved, timestamp: 49)
in 172.0.0.67 255.255.255.255 identity
in 172.0.0.0 255.255.255.0 wan-zone:outside2
in 10.85.43.0 255.255.255.0 via 10.4.0.3 (unresolved, timestamp: 50)
in 10.85.45.0 255.255.2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
835 | no shutdown
description inside switch
zone outside
interface gigabitethernet0/0.101
vlan 101
nameif outside1
security-level 0
ip address 209.165.200.225 255.255.255.224
zone-member outside
no shutdown
interface gigabitethernet0/0.102
vlan 102
nameif outside2
security-level 0
ip address 209.165.201.1 255.255.255.224
zon... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
836 | # 4 equal cost default routes for outside interfaces
route outside1 0 0 209.165.200.230
route outside2 0 0 209.165.201.10
route outside3 0 0 198.51.100.99
route outside4 0 0 203.0.113.87
# Static routes for NAT addresses - see redistribute static command
route dmz 209.165.202.129 255.255.255.255 10.3.5.99
route inside ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
837 | History for Traffic Zones
Platform Description
Releases
Feature Name
You can group interfaces together into a traffic zone to
accomplish traffic load balancing (using Equal Cost Multi-Path
(ECMP) routing), route redundancy, and asymmetric routing
across multiple interfaces.
You cannot apply a security policy to a named... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
838 | P ART IV
Basic Settings
• Basic Settings, on page 781
• DHCP and DDNS Services, on page 805
• Digital Certificates, on page 831
• ARP Inspection and the MAC Address Table, on page 869 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
839 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
840 | CHAPTER 23
Basic Settings
This chapter describes how to configure basic settings on the ASA that are typically required for a functioning
configuration.
• Set the Hostname, Domain Name, and the Enable and Telnet Passwords, on page 781
• Set the Date and Time, on page 783
• Configure the Master Passphrase, on page 790
•... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
841 | ciscoasa(config)# hostname myhostnamexample12345
This name can be up to 63 characters. The hostname must start and end with a letter or digit, and have only
letters, digits, or a hyphen.
When you set a hostname for the ASA, that name appears in the command line prompt. If you establish
sessions to multiple devices, the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
842 | This command changes the password for the highest privilege level (15). If you configure local command
authorization, you can set enable passwords for each privilege level from 0 to 15 using the following syntax:
enable password password level number
The encrypted keyword (for passwords 32 characters and fewer in 9.6 a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
843 | Set the Time Zone and Daylight Saving Dates
To set the time zone and daylight saving date range, perform the following steps.
Procedure
Step 1 Set the time zone. By default, the time zone is UTC.
• Firepower 1000, Firepower 2100 in Appliance mode, Secure Firewall 3100:
clock timezone zone
• zone—Enter the clock timezon... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
844 | • minutes—Sets the number of minutes of offset from UTC.
Example:
ciscoasa(config)# clock timezone PST -8
Step 2 Enter one of the following commands to change the date range for daylight saving time from the default. The
default recurring date range is from 2:00 a.m. on the second Sunday in March to 2:00 a.m. on the fi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
845 | • offset —Sets the number of minutes to change the time for daylight savings time. By default, the
value is 60 minutes.
Example:
ciscoasa(config)# clock summer-time PDT recurring first Monday April 2:00 60
Set the Date and Time Using an NTP Server
NTP is used to implement a hierarchical system of servers that provide a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
846 | The key_id argument is a value between 1 and 4294967295. You can enter multiple trusted keys for use
with multiple servers.
c) Set a key to authenticate with an NTP server.
ntp authentication-key key_id {md5 | sha1 | sha256 | sha512 | cmac} key
Example:
ciscoasa(config)# ntp authentication-key 1 md5 aNiceKey1
ciscoasa(... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
847 | Procedure
Set the date time manually.
clock set hh:mm:ss {month day | day month} year
Example:
ciscoasa# clock set 20:54:00 april 1 2004
The hh:mm:ss argument sets the hour, minutes, and seconds in 24-hour time. For example, enter 20:54:00 for
8:54 pm.
The day value sets the day of the month, from 1 to 31. You can ente... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
848 | • Cisco PTP supports multicast PTP messages only.
• PTP is enabled on all ISA 3000 interfaces in transparent mode by default. In routed mode, you must add
the necessary configuration to ensure that the PTP packets are allowed to flow through the device.
• PTP is available only for IPv4 networks, not for IPv6 networks.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
849 | Enable PTP on each interface through which the system can contact a PTP clock in the configured domain.
Example:
ciscoasa(config)# interface gigabitethernet1/2
ciscoasa(config-if)# ptp enable
Configure the Master Passphrase
The master passphrase allows you to securely store plain text passwords in encrypted format and ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
850 | Procedure
Step 1 Set the passphrase used for generating the encryption key. The passphrase must be between 8 and 128 characters
long. All characters except a backspace and double quotes are accepted for the passphrase. If you do not enter
the new passphrase in the command, you are prompted for it. To change the passphr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
851 | in user contexts may be stale. Alternatively, use the write memory all command in the system context to save
all configurations.
Examples
The following example shows that no previous key was present:
ciscoasa(config)# key config-key password-encryption 12345678
The following example shows that a key already exists:
cis... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
852 | Example:
ciscoasa(config)# no key config-key password-encryption
Warning! You have chosen to revert the encrypted passwords to plain text.
This operation will expose passwords in the configuration and therefore
exercise caution while viewing, storing, and copying configuration.
Old key: bumblebee
Step 2 Save the runtim... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
853 | Configure the DNS Servers
You need to configure a DNS server so that the ASA can resolve host names to IP addresses. You also must
configure a DNS server to use fully qualified domain names (FQDN) network objects in access rules.
Some ASA features require use of a DNS server to access external servers by domain name. O... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
854 | ciscoasa(config)# dns server-group DefaultDNS
b) Specify one or more DNS servers for the group.
name-server ip_address [ip_address2] [...] [ip_address6] [interface_name]
You can enter all six IP addresses in the same command, separated by spaces, or you can enter each
command separately.
(Optional) Specify the interfac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
855 | e) Repeat the above steps to add additional DNS server groups.
Step 3 (Optional) Map domains to specific DNS server groups.
dns-group-map
dns-to-domain dns_group_name domain
You can map up to 30 domains. You cannot map the same domain to multiple DNS server groups, but you
can map multiple domains to the same server gr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
856 | connections will have to be re-established because of the link that is temporarily down during the
switchover.
• Cisco TrustSec connections on hardware bypassinterfaces are dropped when hardware bypassis activated.
When the ISA 3000 powers on and hardware bypass is deactivated, the connections are renegotiated.
• When ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
857 | Step 4 Disable TCP sequence randomization. This example shows how to disable randomization for all traffic by
adding the setting to the default configuration.
policy-map global_policy
class sfrclass
set connection random-sequence-number disable
If you later decide to turn it back on, replace "disable" with enable.
Step... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
858 | Model Before Compilation During Compilation After Compilation
Match old rules. Matches new rules.
(The rate for connections persecond
is unaffected.)
Transactional Matches old rules.
An additional benefit of the transactional model is that, when replacing an ACL on an interface, there is no
gap between deleting the old... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
859 | ASP load balancing is disabled on the ASA virtual. With the integration of DPDK (Dataplane Development
Kit) into the ASA virtual’s accelerated security path (ASP), the ASA virtual shows better performance with
this feature disabled.
Note
Procedure
Step 1 Enable the automatic switching on and off of ASP load balancing:
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
860 | History for Basic Settings
Platform Description
Releases
Feature Name
You can now use multiple DNS server groups: one group is the default, while other groups can
be associated with specific domains. A DNS request that matches a domain associated with a
DNS server group will use that group. For example, if you want tra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
861 | Platform Description
Releases
Feature Name
You can now specify an IPv6 address for the NTP server.
New/Modified commands: ntp server
NTP support on IPv6 9.12(1)
The default enable password is blank. When you try to access privileged EXEC mode on the
ASA, you are now required to change the password to a value of 3 to 12... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
862 | Platform Description
Releases
Feature Name
The ISA 3000 supports a hardware bypass function to allow traffic to continue flowing through
the appliance when there is a loss of power.
We introduced the following commands: hardware-bypass, hardware-bypass manual,
hardware-bypass boot-delay, show hardware-bypass
This featu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
863 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
804
Basic Settings
History for Basic Settings | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
864 | CHAPTER 24
DHCP and DDNS Services
This chapter describes how to configure the DHCP server or DHCP relay as well as dynamic DNS (DDNS)
update methods.
• About DHCP and DDNS Services, on page 805
• Guidelines for DHCP and DDNS Services, on page 807
• Configure the DHCP Server, on page 809
• Configure the DHCP Relay Agent... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
865 | • DHCP option 66 gives the IP address or the hostname of a single TFTP server.
• DHCP option 3 sets the default route.
A single request might include both options 150 and 66. In this case, the ASA DHCP server provides values
for both options in the response if they are already configured on the ASA.
You can use advance... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
866 | DHCPDISCOVER packet to the DHCP Server. The DHCP Server replies with a DHCPOFFER to ASA Site
2. ASA Site 2 forwards it to DHCP relay (ASA Site1), which forwards it to the DHCP Client.
Figure 66: DHCP Relay Server over VTI
The same procedure is followed for a DHCPREQUEST and DHCPACK/NACK requirements.
Guidelines for DHC... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
867 | IPv6
Supports IPv6 for DHCP stateless server and DHCP Relay.
DHCPv4 Server
• The maximum available DHCP pool is 256 addresses.
• You can configure only one DHCP server on each interface. Each interface can have its own pool of
addresses to use. However the other DHCP settings, such as DNS servers, domain name, options,... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
868 | Configure the DHCP Server
This section describes how to configure a DHCP server provided by the ASA.
Procedure
Step 1 Enable the DHCPv4 Server, on page 809.
Step 2 Configure Advanced DHCPv4 Options, on page 811.
Step 3 Configure the DHCPv6 Stateless Server, on page 812.
Enable the DHCPv4 Server
To enable the DHCP serve... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
869 | ciscoasa(config)# dhcpd reserve-address 10.0.1.109 030c.f142.4cde inside
The reserved address must come from the configured address pool, and the address pool must be on the same
subnet as the ASA interface. In transparent mode, specify a bridge group member interface. In routed mode,
specify a routed interface or a BV... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
870 | transparent mode, you must set dhcpd option 3 ip if you want to set a default gateway; the ASA itself cannot
act as the default gateway.
dhcpd option 3 ip gateway_ip
Example:
ciscoasa(config)# dhcpd option 3 ip 10.10.1.1
Step 10 Enable the DHCP daemon within the ASA to listen for DHCP client requests on the enabled int... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
871 | Example:
ciscoasa(config)# dhcpd option 2 hex 22.0011.01.FF1111.00FF.0000.AAAA.1111.1111.1111.11
The ASA does not verify that the option type and value that you provide match the expected type
and value for the option code as defined in RFC 2132. For example, you can enter the dhcpd
option 46 ascii hello command, and t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
872 | autoconfiguration on a client configures IPv6 addresses based on prefixes received in Router Advertisement
messages; in other words, based on the prefix that the ASA received using Prefix Delegation.
Before you begin
This feature is only supported in single, routed mode. This feature is not supported in clustering.
Pro... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
873 | ciscoasa(config)# interface gigabithethernet 0/0
ciscoasa(config-if)#
Step 4 Enable the DHCPv6 server:
ipv6 dhcp server pool_name
Example:
ciscoasa(config-if)# ipv6 dhcp server Inside-Pool
ciscoasa(config-if)#
Step 5 Configure the Router Advertisement to inform SLAAC clients about the DHCPv6 server:
ipv6 nd other-confi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
874 | • Global DHCP servers—When a DHCP request enters an interface that does not have interface-specific
servers configured, the ASA relays the request to all global servers. If the interface has interface-specific
servers, then the global servers are not used.
Configure the DHCPv4 Relay Agent
When a DHCP request enters an ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
875 | ciscoasa(config)# dhcprelay enable mktg
Step 3 (Optional) Set the number of seconds allowed for DHCP relay address handling.
dhcprelay timeout seconds
Example:
ciscoasa(config)# dhcprelay timeout 25
Step 4 (Optional) Change the first default router address in the packet sent from the DHCP server to the address of
the A... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
876 | Configure the DHCPv6 Relay Agent
When a DHCPv6 request enters an interface, the ASA relays the request to all DHCPv6 global servers.
Procedure
Step 1 Specify the IPv6 DHCP server destination address to which client messages are forwarded.
ipv6 dhcprelay server ipv6_address [interface]
Example:
ciscoasa(config)# ipv6 dh... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
877 | The ASA supports the following DDNS update methods:
• Standard DDNS—The standard DDNS update method is defined by RFC 2136.
With this method, the ASA and the DHCP server use DNS requests to update the DNS RRs. The ASA
or DHCP server sends a DNS request to its local DNS server for information about the hostname and,
bas... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
878 | Example:
ciscoasa(config)# ddns update method ddns1
ciscoasa(DDNS-update-method)#
b) Specify the standard DDNS method.
ddns [both]
By default, the ASA updates the A RR only. Use this setting if you want the DHCP server to update the
PTR RR. If you want the ASA to update both the A and PTR RR, specify both. Use the both... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
879 | https://jcrichton:pa$$w0rd17@domains.example.com/nic/update?hostname=<h>&myip=<a>
d) (Optional) Specify the address types (IPv4 or IPv6) that you want to update.
By default, the ASA updates all IPv4 and IPv6 addresses. If you want to limit the addresses, enter the
following command.
web update-type {ipv4 | ipv6 [all] |... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
880 | ciscoasa(config-if)# ddns update ddns1
c) Assign a hostname for this interface.
ddns update hostname hostname
If you do not set the hostname, the device hostname is used. If you do not specify an FQDN, then the
system domain name or the default domain from the DNS server group is appended (for static or PPPoE
IP addres... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
881 | [...]
quit
Standard DDNS Method for a Static IP Address
The following example shows how to configure the standard DDNS method for use with a static IP
address. Note that you do not configure DHCP client settings for this scenario.
! Define the DDNS method to update both RRs:
ddns update method ddns-2
ddns both
interfac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
882 | ip address dhcp
ddns update hostname asa
! Configure the DHCP server to update both RRs:
dhcp client update dns server both
Example: Web Type
The following example configures the web type method.
! Define the web type method:
ddns update method web-1
web update-url https://captainkirk:enterpr1s3@domains.cisco.com/ddns?... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
883 | Total number of Relay-Forward messages received: 0
Total number of Relay-Reply messages sent: 0
Error and Failure Statistics:
Total number of Re-transmission messages sent: 0
Total number of Message Validation errors in received messages: 0
• show ipv6 dhcp pool [pool_name]
• show ipv6 dhcp interface [ifc_name [statist... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
884 | ciscoasa(config-if)# show ipv6 dhcp interface outside statistics
DHCPV6 Client PD statistics:
Protocol Exchange Statistics:
Number of Solicit messages sent: 1
Number of Advertise messages received: 1
Number of Request messages sent: 1
Number of Renew messages sent: 45
Number of Rebind messages sent: 0
Number of Reply m... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
885 | On an standby unit:
ciscoasa(config)# show ipv6 dhcp ha statistics
DHCPv6 HA global statistics:
DUID sync messages sent: 0
DUID sync messages received: 1
DHCPv6 HA error statistics:
Send errors: 0
Troubleshooting DHCP Relay over VTI
If the DHCP client fails to get an IP address:
• Verify for Tunnel interface/VTI config... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
886 | Monitoring DDNS Status
See the following command for monitoring DDNS status.
• show ddns update {interface if_name | method [name]}
This command shows the DDNS update status.
The following example show details about the DDNS update method:
ciscoasa# show ddns update method ddns1
Dynamic DNS Update Method: ddns1
IETF st... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
887 | ciscoasa# show ddns update interface outside
Dynamic DNS Update on outside:
Update Method Name Update Destination
test not available
Last Update attempted on 09:01:52.729 UTC Mon Mar 23 2020
Status : Failed
Reason : Server error (Error response from server)
The following example showsthat a web update was not yet attem... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
888 | Platform Description
Releases
Feature Name
The ASA now supports the following features for IPv6 addressing:
• DHCPv6 Address client—The ASA obtains an IPv6 global address and optional default
route from the DHCPv6 server.
• DHCPv6Prefix Delegation client—The ASA obtains delegated prefix(es) from a DHCPv6
server. The AS... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
889 | Platform Description
Releases
Feature Name
DHCP relay support for IPv6 was added.
We introduced the following commands: ipv6 dhcprelay server, ipv6 dhcprelay enable, ipv6
dhcprelay timeout, clear config ipv6 dhcprelay, ipv6 nd managed-config-flag, ipv6 nd
other-config-flag, debug ipv6 dhcp, debug ipv6 dhcprelay, show i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
890 | CHAPTER 25
Digital Certificates
This chapter describes how to configure digital certificates.
• About Digital Certificates, on page 831
• Guidelines for Digital Certificates, on page 838
• Configure Digital Certificates, on page 840
• How to Set Up Specific Certificate Types, on page 860
• Set a Certificate Expiration ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
891 | CA certificates and identity certificates apply to both site-to-site VPN connections and remote access VPN
connections. Procedures in this document refer to remote access VPN use in the ASDM GUI.
Note
For an example of a scenario that includes certificate configuration and load balancing, see the following
URL: https:/... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
892 | Some CAs have an RA as part of their implementation. An RA is a server that acts as a proxy for the CA, so
that CA functions can continue when the CA is unavailable.
Key Pairs
Key pairs are RSA or Elliptic Curve Signature Algorithm (ECDSA) keys, which have the following
characteristics:
• RSA keys can be used for SSH o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
893 | Proxy for SCEP Requests
The ASA can proxy SCEP requests between Secure Client and a third-party CA. The CA only needs to be
accessible to the ASA if it is acting asthe proxy.For the ASA to provide thisservice, the user must authenticate
using any of the methods supported by AAA before the ASA sends an enrollment reques... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
894 | • VeriSign
CRLs
CRLs provide the ASA with one way of determining whether a certificate that is within its valid time range
has been revoked by the issuing CA. CRL configuration is part of configuration of a trustpoint.
You can configure the ASA to make CRL checks mandatory when authenticating a certificate by using the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
895 | • Single context mode—128 MB
• Multiple context mode—16 MB per context
OCSP
OCSP provides the ASA with a way of determining whether a certificate that is within its valid time range
has been revoked by the issuing CA. OCSP configuration is part of trustpoint configuration.
OCSP localizes certificate status on a validat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
896 | Certificates and User Login Credentials
The following section describesthe different methods of using certificates and user login credentials(username
and password) for authentication and authorization. These methods apply to IPsec,Secure Client, and Clientless
SSL VPN.
In all cases, LDAPauthorization does not use the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
897 | • Enabled by the authorization server group setting
• Uses the username value of the certificate primary DN field as a credential
If the primary DN field is not present in the certificate, the ASA uses the secondary DN field value as the
username for the authorization request.
Note
For example, consider a user certific... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
898 | • Thirty days before the local CA certificate expires, a rollover replacement certificate is generated, and
a syslog message informs the administrator that it is time for local CA rollover. The new local CA
certificate must be imported onto all necessary devices before the current certificate expires. If the
administra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
899 | • When a certificate enrollment is completed, the ASA stores a PKCS12 file containing the user's keypair
and certificate chain, which requires about 2 KB of flash memory or disk space per enrollment. The
actual amount of disk space depends on the configured RSA key size and certificate fields. Keep this
guideline in mi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
900 | Procedure
Step 1 Generate one default, general-purpose RSA key pair.
crypto key generate rsa modulus 2048
Example:
ciscoasa(config)# crypto key generate rsa modulus 2048
The default key modulus is 2048, but you should specify the modulus explicitly to ensure you get the size
you require. The key is named Default-RSA-Ke... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
901 | Step 5 If necessary, remove existing key pairs so that you can generate new ones.
crypto key zeroize {rsa | ecdsa}
Example:
ciscoasa(config)# crypto key zeroize rsa
Step 6 (Optional) Archive the local CA server certificate and key pair.
copy
Example:
ciscoasa# copy LOCAL-CA-SERVER_0001.pl2 tftp://10.1.1.22/user6/
This ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
902 | • Request automatic enrollment using SCEP with the specified trustpoint and configure the enrollment
URL.
enrollment protocol scep url
Example:
ciscoasa/contexta(config-ca-trustpoint)# enrollment protocol scep url
http://10.29.67.142:80/certsrv/mscep/mscep.dll
• Request automatic enrollment using CMP with the specified... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
903 | Example:
ciscoasa/contexta(config-ca-trustpoint)# revocation-check crl
ciscoasa/contexta(config-ca-trustpoint)# revocation-check none
To enable either required or optional CRL checking, make sure that you configure the trustpoint
for CRL management after obtaining certificates.
Note
Step 5 Enable or disable the basic c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
904 | ciscoasa/contexta(config-ca-trustpoint)# fqdn example.com
Step 10 During enrollment, ask the CA to include the IP address of the ASA in the certificate.
ip-address ip-address
Example:
ciscoasa/contexta(config-ca-trustpoint)# ip-address 10.10.100.1
Step 11 Specify the key pair whose public key is to be certified.
keypai... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
905 | inside Name of interface GigabitEthernet0/0.100
inside1 Name of interface GigabitEthernet0/0.41
mgmt Name of interface Management0/0
outside Name of interface GigabitEthernet0/0.51
ciscoasa(config-ca-trustpoint)# ocsp interface mgmt
Step 15 Disable the nonce extension on an OCSP request. The nonce extension cryptograph... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
906 | Step 20 During enrollment, ask the CA to include the ASA serial number in the certificate.
serial-number
Example:
ciscoasa/contexta(config-ca-trustpoint)# serial number JMX1213L2A7
Step 21 Save the running configuration.
write memory
Example:
ciscoasa/contexta(config)# write memory
Configure CRLs for a Trustpoint
To us... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
907 | policy cdp
ciscoasa(config-ca-crl)# policy cdp
Note SCEP retrieval is not supported by distribution points specified in certificates.
• CRLs are retrieved only from certificate map match rule that you configure.
policy static
ciscoasa(config-ca-crl)# policy static
• CRLs are retrieved from CRL distribution pointsspecif... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
908 | Step 7 Choose one of the following:
• Require the NextUpdate field to be present in CRLs. This is the default setting.
enforcenextupdate
ciscoasa(config-ca-crl)# enforcenextupdate
• Allow the NextUpdate field to be absent in CRLs.
no enforcenextupdate
ciscoasa(config-ca-crl)# no enforcenextupdate
Step 8 Identify the LD... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
909 | Export or Import a Trustpoint Configuration
To export and import a trustpoint configuration, perform the following steps:
Procedure
Step 1 Export a trustpoint configuration with all associated keys and certificates in PKCS12 format.
crypto ca export trustpoint
Example:
ciscoasa(config)# crypto ca export Main
The ASA di... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
910 | End with a blank line or the word "quit" on a line by itself:
[ PKCS12 data omitted ]
quit
INFO: Import PKCS12 operation completed successfully
The following example manually imports a certificate for the trustpoint Main:
ciscoasa (config)# crypto ca import Main certificate
% The fully-qualified domain name in the cert... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
911 | • dc—Domain Component
• dnq—DN Qualifier
• emailAddress—Email Address
• genq—Generational Qualifier
• gn—Given Name
• i—Initials
• ip—IP Address
• l—Locality
• n—Name
• o—Organization Name
• ou—Organizational Unit
• ser—Serial Number
Ensure you specify the serial number attribute in the subject-name. The certificate ma... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
912 | • co—Part or all of the field must match the value given.
• nc—No part of the field can match the value given.
Step 4 Specify the extended key usage:
extended-key-usage operator OID_string
Example:
ciscoasa(config-ca-cert-map)# extended-key-usage nc clientauth
The following are valid operators:
• co—Part or all of the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
913 | • SRV-ID: A subjectAltName entry of type otherName whose name form is SRVName as defined in RFC
4985. A SRV-ID identifier may contain both a domain name and an application service type.For example,
a SRV-ID of “_imaps.example.net” would be split into a DNS domain name portion of “example.net”
and an application service... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
914 | Example
Configure a reference identity for RFC 6125 server certificate validation for a syslog server:
ciscoasa(config)# crypto ca reference-identity syslogServer
ciscoasa(config-ca-ref-identity)# dns-id syslog1-bxb.cisco.com
ciscoasa(config-ca-ref-identity)# cn-id syslog1-bxb.cisco.com
What to do next
Use the referenc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
915 | % The fully-qualified domain name in the certificate will be: securityappliance.example.com
% Include the device serial number in the subject name? [yes/no]: n
Display Certificate Request to terminal? [yes/no]: y
Certificate Request follows:
MIIBoDCCAQkCAQAwIzEhMB8GCSqGSIb3DQEJAhYSRmVyYWxQaXguY2lzY28uY29t
[ certificate... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
916 | ciscoasa(config)# show crypto ca certificate Main
Step 7 Save the running configuration.
write memory
Example:
ciscoasa(config)# write memory
Step 8 Repeat these steps for each trustpoint that you configure for manual enrollment.
Obtain Certificates Automatically with SCEP
This section describes how to obtain certifica... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
917 | If the ASA reboots after you have issued the crypto ca enroll command but before you have
received the certificate, reenter the crypto ca enroll command and notify the CA administrator.
Note
Step 3 Verify that the enrollment process was successful by displaying certificate details issued for the ASA and the
CA certific... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
918 | Example:
ciscoasa(config)# tunnel-group 209.165.200.225 general-attributes
Step 4 Enable SCEP enrollment for the tunnel group.
scep-enrollment enable
Example:
ciscoasa(config-tunnel-general)# scep-enrollment enable
INFO: 'authentication aaa certificate' must be configured to complete setup of this option.
Step 5 Enter ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
919 | ciscoasa(config-tunnel-webvpn)# secondary-pre-fill-username ssl-client hide
use-common-password secret
Despite the ssl-client keyword inherited from earlier releases, use this command to support Secure Client
sessions that use either IKEv2 or SSL.
You must use the hide keyword to support the SCEP proxy.
Step 9 Supply t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
920 | CA Server Management
Manage User Certificates
To change the certificate status, perform the following steps:
Procedure
Step 1 Select specific certificates by username or by certificate serial number in the Manage User Certificates pane.
Step 2 Choose one of the following options:
• Click Revoketo remove user access if ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
921 | This command returns information like the following:
0 trustpool certificates installed
Trustpool auto renewal statistics:
State: Not in progress
Last import result: Not attempted N/A
Current Jitter: 0
Trustpool auto import statistics:
Last import result: N/A
Next schedule import at 22:00:00 Tues Jul 21 2015
Trustpool ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
922 | Expiration checking is not done on trust pool certificates. The Local CA trust point is treated as a regular
trustpoint for expiration checking too.
Note
Monitoring Digital Certificates
See the following commands for monitoring digital certificate status:
• show crypto ca server
This command shows local CA configuratio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.