index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
923 | • show running-config
This command shows local CA certificate map rules.
Examples
The following example shows an RSA general-purpose key:
ciscoasa/contexta(config)# show crypto key mypubkey rsa
Key pair was generated at: 16:39:47 central Feb 10 2010
Key name: <Default-RSA-Key>
Usage: General Purpose Key
Modulus Size (b... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
924 | subject-name attr ou eq Engineering
History for Certificate Management
Table 33: History for Certificate Management
Platform Description
Releases
Feature Name
Digital certificates (including CA certificates, identity
certificates, and code signer certificates) provide digital
identification for authentication. A digita... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
925 | Platform Description
Releases
Feature Name
We introduced this feature, which provides secure deployment
of device certificates from third-party CAs.
We introduced the following commands:
crypto ikev2 enable outside client-servicesport portnumber,
scep-enrollment enable, scep-forwarding-url value URL,
secondary-pre-fill... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
926 | Platform Description
Releases
Feature Name
To prevent failure of large CRL downloads, the cache size was
increased, and the limit on the number of entriesin an individual
CRL was removed.
• Increased the total CRL cache size to 16 MB per context
for multi-context mode.
• Increased the total CRL cache size to 128 MB for... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
927 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
868
Basic Settings
History for Certificate Management | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
928 | CHAPTER 26
ARP Inspection and the MAC Address Table
This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge
groups.
• About ARP Inspection and the MAC Address Table, on page 869
• Default Settings, on page 870
• Guidelines for ARP Inspection and the MAC Address Table, on pa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
929 | • If the ARP packet does not match any entries in the static ARP table, then you can set the ASA to either
forward the packet out all interfaces (flood), or to drop the packet.
The dedicated Management interface never floods packets even if this parameter
is set to flood.
Note
MAC Address Table
When you use bridge grou... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
930 | Configure ARP Inspection and Other ARP Parameters
For bridge groups, you can enable ARP inspection. You can also configure other ARP parameters for both
bridge groups and for routed mode interfaces.
Procedure
Step 1 Add static ARP entries according to Add a Static ARP Entry and Customize Other ARP Parameters, on page
8... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
931 | Specify alias in routed mode to enable proxy ARP for this mapping. If the ASA receives an ARP request for
the specified IP address, then it responds with the ASA MAC address. This keyword is useful if you have
devices that do not perform ARP, for example. In transparent firewall mode, this keyword is ignored; the
ASA d... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
932 | arp-inspection interface_name enable [flood | no-flood]
Example:
ciscoasa(config)# arp-inspection outside enable no-flood
The flood keyword forwards non-matching ARP packets out all interfaces, and no-flood drops non-matching
packets.
The default setting is to flood non-matching packets. To restrict ARP through the ASA... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
933 | Procedure
Set the MAC address entry timeout:
mac-address-table aging-time timeout_value
Example:
ciscoasa(config)# mac-address-table aging-time 10
The timeout_value (in minutes) is between 5 and 720 (12 hours). 5 minutes is the default.
Configure MAC Address Learning
By default, each interface automatically learns the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
934 | Monitors ARP Inspection. Shows the current settings for ARP inspection on all interfaces.
• show mac-address-table [interface_name]
Monitors the MAC address table. You can view the entire MAC address table (including static and
dynamic entries for both interfaces), or you can view the MAC address table for an interface... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
935 | Platform Feature Information
Releases
Feature Name
You might want to customize the MAC address table for
transparent mode, and for interfaces in a bridge group in both
Transparent and Routed modes starting in 9.7(1).
We introduced the following commands: mac-address-table
static, mac-address-table aging-time, mac-learn... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
936 | Platform Feature Information
Releases
Feature Name
Integrated Routing and Bridging provides the ability to route
between a bridge group and a routed interface. A bridge group
is a group of interfaces that the ASA bridges instead of routes.
The ASA is not a true bridge in that the ASA continues to act
as a firewall: acc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
937 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
878
Basic Settings
History for ARP Inspection and the MAC Address Table | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
938 | P ART V
IP Routing
• Routing Overview, on page 881
• Static and Default Routes, on page 895
• Policy Based Routing, on page 905
• Route Maps, on page 923
• Bidirectional Forwarding Detection Routing, on page 929
• BGP, on page 939
• OSPF, on page 979
• IS-IS, on page 1039
• EIGRP, on page 1089
• Multicast Routing, on p... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
939 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
940 | CHAPTER 27
Routing Overview
This chapter describes how routing behaves within the ASA.
• Path Determination, on page 881
• Supported Route Types, on page 882
• Supported Internet Protocols for Routing, on page 883
• Routing Table, on page 884
• Routing Table for Management Traffic, on page 889
• Equal-Cost Multi-Path (... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
941 | Note Asymmetric routing is only supported for Active/Active failover in multiple context mode.
Supported Route Types
There are several route types that a router can use. The ASA uses the following route types:
• Static Versus Dynamic
• Single-Path Versus Multipath
• Flat Versus Hierarchical
• Link-State Versus Distance... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
942 | can communicate only with routers within their domain. In very large networks, additional hierarchical levels
may exist, with routers at the highest hierarchical level forming the routing backbone.
The primary advantage of hierarchical routing is that it mimics the organization of most companies and
therefore supports ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
943 | IS-IS is a link state Interior Gateway Protocol (IGP). Link-state protocols are characterized by the
propagation of the information required to build a complete network connectivity map on each participating
router. That map is then used to calculate the shortest path to destinations.
Routing Table
The ASA uses separat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
944 | Administrative distance is a route parameter that the ASA uses to select the best path when there are two or
more different routesto the same destination from two different routing protocols. Because the routing protocols
have metrics based on algorithms that are different from the other protocols, it is not always pos... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
945 | Backup Dynamic and Floating Static Routes
A backup route is registered when the initial attempt to install the route in the routing table fails because
another route was installed instead. If the route that was installed in the routing table fails, the routing table
maintenance process calls each routing protocol proce... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
946 | Dynamic Routing and Clustering
This section describes how to use dynamic routing with clustering.
Dynamic Routing in Spanned EtherChannel Mode
Note IS-IS is not supported in Spanned EtherChannel mode.
In Spanned EtherChannel mode: The routing process only runs on the control node, and routes are learned
through the con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
947 | Dynamic Routing in Individual Interface Mode
In Individual interface mode, each node runsthe routing protocol as a standalone router, and routes are learned
by each node independently.
Figure 68: Dynamic Routing in Individual Interface Mode
In the above diagram, Router A learns that there are 4 equal-cost paths to Rout... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
948 | Dynamic Routing in Multiple Context Mode
In multiple context mode, each context maintains a separate routing table and routing protocol databases. This
enables you to configure OSPFv2 and EIGRP independently in each context. You can configure EIGRP in
some contexts and OSPFv2 in the same or different contexts. In mixed... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
949 | management-only traffic vs. data traffic. Separate routing tables means that you can create separate default
routes for data and management as well.
Types of Traffic for Each Routing Table
Through-the-device traffic always uses the data routing table.
From-the-device traffic, depending on the type, uses either the mana... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
950 | security-level 100
ip address 10.10.10.123 255.255.255.0
ipv6 address 123::123/64
a/admin(config-if)# show running-config int m0/0
!
interface Management0/0
management-only
nameif mgmt
security-level 0
ip address 10.106.167.118 255.255.255.0
a/admin(config-if)#
Equal-Cost Multi-Path (ECMP) Routing
The ASA supports Equa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
951 | Under rare circumstances, you might want to disable proxy ARP for NAT addresses.
If you have a VPN client address pool that overlaps with an existing network, the ASA by default sends proxy
ARP requests on all interfaces. If you have another interface that is on the same Layer 2 domain, it will see
the ARP requests and... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
952 | History for Route Overview
Table 35: History for Route Overview
Feature Name Platform Releases Feature Information
To segregate and isolate, management traffic from data traffic, a separate routing
table is added for management traffic. Separate routing tables, for management and
data respectively, are created for both... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
953 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
894
IP Routing
History for Route Overview | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
954 | CHAPTER 28
Static and Default Routes
This chapter describes how to configure static and default routes on the ASA.
• About Static and Default Routes, on page 895
• Guidelines for Static and Default Routes, on page 897
• Configure Default and Static Routes, on page 898
• Monitoring a Static or Default Route, on page 902... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
955 | • Your network is small and you can easily manage static routes.
• You do not want the traffic or CPU overhead associated with routing protocols.
• In some cases, a default route is not enough. The default gateway might not be able to reach the destination
network, so you must also configure more specific static routes... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
956 | The static route tracking feature provides a method for tracking the availability of a static route and installing
a backup route if the primary route should fail. For example, you can define a default route to an ISP gateway
and a backup default route to a secondary ISP in case the primary ISP becomes unavailable.
The... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
957 | ASP and RIB Route Entries
All routes and its distance installed on the device are captured in the ASP routing table. This is common for
all static and dynamic routing protocols. Only the best distance route is captured in the RIB table.
Configure Default and Static Routes
At a minimum, you should configure a default ro... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
958 | ciscoasa(config)# ipv6 route inside ::/0 3FFE:1100:0:CC00::1
The if_name isthe interface through which you want to send the specific traffic.For transparent mode,specify
a bridge group member interface name. For routed mode with bridge groups, specify the BVI name.
The distance argument is the administrative distance f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
959 | The if_name is the interface through which you want to send the specific traffic. To drop unwanted traffic,
enter the null0 interface. For transparent mode, specify a bridge group member interface name. For routed
mode with bridge groups, specify the BVI name.
The dest_ip and mask or dest_ipv6_prefix/prefix_length argu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
960 | ciscoasa(config-sla-monitor-echo)#
The target_ip argument isthe IPaddress of the network object whose availability the tracking process monitors.
While this object is available, the tracking process route is installed in the routing table. When this object
becomes unavailable, the tracking process removes the route and... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
961 | ip address pppoe setroute
Step 7 Create an untracked backup route.
The backup route is a static route to the same destination as the tracked route, but through a different interface
or gateway. You must assign this route a higher administrative distance (metric) than your tracked route.
Monitoring a Static or Default R... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
962 | Feature Information Platform
Releases Feature Name
Sending traffic to a null0 interface results in dropping the
packets destined to the specified network. This feature is useful
in configuring Remotely Triggered Black Hole (RTBH) for
BGP.
We modified the following command: route.
Static null0 route to drop traffic 9.2(... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
963 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
904
IP Routing
History for Static and Default Routes | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
964 | CHAPTER 29
Policy Based Routing
This chapter describes how to configure the ASA to support policy based routing (PBR). The following
sections describe policy based routing, guidelines for PBR, and configuration for PBR.
• About Policy Based Routing, on page 905
• Guidelines for Policy Based Routing, on page 907
• Confi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
965 | obtained by the bandwidth and/or delay (using EIGRP or OSPF) characteristics of the link. PBR allows you
to route higher priority traffic over the high-bandwidth/low-delay link, while sending all other traffic over the
low-bandwidth/high-delay link.
Some applications of policy based routing are:
Equal-Access and Source... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
966 | Load Sharing
In addition to the dynamic load-sharing capabilities offered by ECMPload balancing, network administrators
can now implement policies to distribute traffic among multiple paths based on the traffic characteristics.
As an example, in the topology depicted in the Equal-Access Source Sensitive Routing scenari... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
967 | PBR Policies Not Applied for Embryonic Traffic
An embryonic connection is where the necessary handshake between source and destination has not been
made.
Note
When a new internal interface is added and a new VPN policy is created using a unique address pool, PBR
is applied to the outside interface matching the source o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
968 | Configure Policy Based Routing
A route map is comprised of one or more route-map statements. Each statement has a sequence number, as
well as a permit or deny clause. Each route-map statement contains match and set commands. The match
command denotes the match criteria to be applied on the packet. The set command denot... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
969 | Step 3 Define the match criteria to be applied using an access-list:
match ip address access-list_name [access-list_name...]
Example:
ciscoasa(config-route-map)# match ip address testacl
Ensure that the access list does not contain any inactive rules. You cannot set match ACL with
inactive rules to a PBR.
Note
Step 4 C... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
970 | The egress interface is selected from the space-separated list of interfaces. If the costs of the interfaces
are the same, it is an active-active configuration and packets are load-balanced (round-robin) on the
egress interfaces. If the costs are different, the interface with the lowest cost is selected. Interfaces are... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
971 | • ipv4—Sends ICMP probes to the specified peer IPv4 address (next-hop IP) for monitoring.
• ipv6—Sends ICMP probes to the specified peer IPv4 address (next-hop IP) for monitoring.
• auto4—Sends ICMP probes to the IPv4 default gateway of the interface.
• auto6—Send ICMP probes to the IPv6 default gateway of the interfac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
972 | ciscoasa(config)# route-map testmap
In the following example, since no match criteria is specified, an implicit match 'any' is assumed:
ciscoasa(config)# route-map testmap permit 10
ciscoasa(config-route-map)# set ip next-hop 1.1.1.10
In this example, all traffic matching <acl> will be policy routed and forwarded throu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
973 | In the following example, when multiple set actions are configured, they are evaluated in the order mentioned
above. Only when all options of a set action are evaluated and cannot be applied, the next set actions will be
considered. This ordering will ensure that the most available and least distant next-hop will be tr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
974 | ciscoasa(config)# access-list acl-2 permit ip 10.2.0.0 255.255.0.0
We need to configure a route-map by specifying the above access-list as match criteria along with the required
set actions.
ciscoasa(config)# route-map equal-access permit 10
ciscoasa(config-route-map)# match ip address acl-1
ciscoasa(config-route-map)#... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
975 | Before you begin
This example assumes that you already have defined a site-to-site VPN using virtual tunnel interfaces (VTI)
defined on the outside (WAN-facing) interfaces to connect the branch to the corporate hub and that it is
functioning correctly. Traffic routed to the VTI interfaces is thus directed to the corpor... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
976 | Assuming the output1 and output2 interfaces are already configured and functioning,simply add the policy-route
cost command. This step is optional if you want to configure the system to use round robin processing to load
balance acrossthe 2 egress WAN links. However, you mustset the costsif you want to create an active... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
977 | First, we will start with the basic configuration for all the devices involved in the set-up. Here, A, B, C, and
D represent ASA devices, and H1 and H2 represent IOS routers.
ASA-A:
ciscoasa(config)# interface GigabitEthernet0/0
ciscoasa(config-if)# nameif inside
ciscoasa(config-if)# security-level 100
ciscoasa(config-... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
978 | ciscoasa(config-if)# ip address 35.1.1.60 255.255.255.0
ASA-B:
ciscoasa(config)# interface GigabitEthernet0/0
ciscoasa(config-if)# no shut
ciscoasa(config)# interface GigabitEthernet0/0.1
ciscoasa(config-if)# vlan 291
ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# security-level 0
ciscoasa(config-if)# ip addr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
979 | ciscoasa(config-if)# nameif outside
ciscoasa(config-if)# security-level 0
ciscoasa(config-if)# ip address 65.1.1.60 255.255.255.0
H1:
ciscoasa(config)# interface Loopback1
ciscoasa(config-if)# ip address 15.1.1.100 255.255.255.255
ciscoasa(config-if)# interface Loopback2
ciscoasa(config-if)# ip address 15.1.1.101 255.2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
980 | in 25.1.1.0 255.255.255.0 outside
in 35.1.1.0 255.255.255.0 dmz
Next let's configure ASA-A to route packets from H1 loopback2 out of ASA-A dmz interface.
ciscoasa(config)# access-list pbracl_2 extended permit ip host 15.1.1.101 any
ciscoasa(config)# route-map testmap permit 20
ciscoasa(config-route-map)# match ip addre... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
981 | History for Policy Based Routing
Table 37: History for Route Maps
Platform Feature Information
Releases
Feature Name
PBR uses the metrics to determine the best path (egress
interface) for forwarding the traffic.Path monitoring periodically
notifies PBR with the monitored interface whose metric got
changed.PBR retrieves... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
982 | CHAPTER 30
Route Maps
This chapter describes how to configure and customize route-maps, for ASA.
• About Route Maps, on page 923
• Guidelines for Route Maps, on page 925
• Define a Route Map, on page 925
• Customize a Route Map, on page 925
• Example for Route Maps, on page 927
• History for Route Maps, on page 928
Abo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
983 | Permit and Deny Clauses
Route maps can have permit and deny clauses. The deny clause rejects route matches from redistribution.
You can use an ACL as the matching criterion in the route map. Because ACLs also have permit and deny
clauses, the following rules apply when a packet matches the ACL:
• ACL permit + route map... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
984 | Guidelines for Route Maps
Firewall Mode
Supported only in routed firewall mode. Transparent firewall mode is not supported.
Additional Guidelines
Route maps do not support ACLs that include a user, user group, or fully qualified domain name objects.
Define a Route Map
You must define a route map when specifying which o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
985 | ciscoasa(config)# route-map name {permit} [12]
Route map entries are read in order. You can identify the order using the sequence_number option, or the
ASA uses the order in which you add route map entries.
Step 2 Match any routes that have a destination network that matches a standard ACL or prefix list:
match ip addr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
986 | match route-type {internal | external [type-1 | type-2]}
Configure the Metric Values for a Route Action
If a route matches the match commands, then the following set commands determine the action to perform
on the route before redistributing it.
To configure the metric value for a route action, perform the following st... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
987 | ciscoasa(config)# route-map 1-to-2 permit
ciscoasa(config-route-map)# match metric 1
ciscoasa(config-route-map)# set metric 5
ciscoasa(config-route-map)# set metric-type type-1
The following example shows how to redistribute the 10.1.1.0 static route into eigrp process 1 with the
configured metric value:
ciscoasa(confi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
988 | CHAPTER 31
Bidirectional Forwarding Detection Routing
This chapter describes how to configure the ASA to use the BidirectionalForwarding Detection (BFD) routing
protocol.
• About BFD Routing, on page 929
• Guidelines for BFD Routing, on page 932
• Configure BFD, on page 933
• Monitoring for BFD, on page 937
• History f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
989 | process, the number of BFD control packets that are sent out between BFD neighbors is reduced. And
also because the forwarding engine is testing the forwarding path on the remote neighbor system without
involving the remote system, the inter-packet delay variance is improved. This results in quicker failure
detection t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
990 | After the remote BFD device receives a BFD control packet during the session initiation phase, it copies the
value of the My Discriminator field into its own Your Discriminator field and the transition from Down state
to Init state and then eventually to Up state occurs. Once both systems see their own Discriminators i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
991 | BFD Failure Detection
When the BFD session and timers have been negotiated, the BFD peers send BFD control packets to each
other at the negotiated interval. These control packets act as a heartbeat that is very similar to IGP Hello
protocol except that the rate is more accelerated.
As long as each BFD peer receives a B... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
992 | Firewall Mode Guidelines
Supported in routed firewall mode; support for standalone, failover, and cluster modes. BFD is not supported
on failover and cluster interfaces. In clustering this feature is only supported on the primary unit. BFD is not
supported in transparent mode.
IPv6 Guidelines
Echo mode is not supported... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
993 | • single-hop—Specifies a single-hop BFD template.
• multi-hop—Specifies a multi-hop BFD template.
• template-name—Specifies the template name. The template name cannot contains spaces.
The bfd-template command lets you create the BFD template and enter BFD configuration mode.
Step 2 (Optional) Configure Echo on a singl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
994 | • 0|8—0 specifies that an UNENCRYPTED password will follow. 8 specifies that an ENCRYPTED
password will follow.
• word—The BFD password (key), which is a single-digit password/key of up to 29 characters.Passwords
starting with a digit followed by a whitespace are not supported, for example, '0 pass' and '1' are not
val... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
995 | • interval milliseconds—Specifiesthe rate at which BFD control packets are sent to BFD peers. The range
is 50 to 999 milliseconds.
• min_rx milliseconds—Specifies the rate at which BFD control packets are expected to be received from
BFD peers. The range is 50 to 999 milliseconds.
• multiplier multiplier-value—Specifie... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
996 | • template-name—Specifies the name of the multi-hop template associated with this BFD map.
Step 3 (Optional) Configure the BFD slow timers value:
bfd slow-timers [milliseconds]
Example:
ciscoasa(config)# bfd slow-timers 14000
ciscoasa(config-bfd)#
milliseconds—(Optional) The BFD slow timers value. The range is 1000 to ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
997 | History for BFD Routing
Table 39: Feature History for BFD Routing
Platform Feature Information
Releases
Feature Name
The ASA now supports the BFD routing protocol. Support was
added for configuring BFD templates, interfaces, and maps.
Support for BGP routing protocol to use BFD was also added.
We added the following co... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
998 | CHAPTER 32
BGP
This chapter describes how to configure the ASA to route data, perform authentication, and redistribute routing
information using the Border Gateway Protocol (BGP).
• About BGP, on page 939
• Guidelines for BGP, on page 942
• Configure BGP, on page 943
• Monitoring BGP, on page 972
• Example for BGP, on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
999 | those routes that have changed. BGP routers do not send periodic routing updates, and BGP routing updates
advertise only the optimal path to a destination network.
AS loop detection is done by scanning the full AS path (as specified in the AS_PATH attribute), and checking
that the AS number of the local system does not... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,000 | • no-advertise—Do not advertise this route to any peer.
• internet—Advertise this route to the Internet community; all routers in the network belong to it.
BGP Path Selection
BGP may receive multiple advertisements for the same route from different sources. BGP selects only one
path as the best path. When this path is ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,001 | • AS-PATH length
• Origin code
• Multi Exit Discriminator (MED)
• One of these:
• Neighboring AS or sub-AS (before the addition of the BGP Multipaths)
• AS-PATH (after the addition of the BGP Multipaths)
Some BGP Multipath features put additional requirements on multipath candidates:
• The path should be learned from a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,002 | Additional Guidelines
• The system does not add route entry for the IP address received over PPPoE in the CP route table. BGP
always looks into CP route table for initiating the TCP session, hence BGP does not form TCP session.
Thus, BGP over PPPoE is not supported.
• To avoid adjacency flaps due to route updates being... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,003 | Valid values for autonomous-num are from 1-4294967295 and 1.0-XX.YY.
Step 2 Discard routes that have as-path segments that exceed a specified value:
bgp maxas-limit number
Example:
ciscoasa(config-router)# bgp maxas-limit 15
The number argumentspecifiesthe maximum number of autonomoussystem segments, allowed. Valid val... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,004 | bgp graceful-restart [restart-time seconds|stalepath-time seconds][all]
Example:
ciscoasa(config-router)# bgp graceful-restart restart-time 200
• restart-time — maximum time period (in seconds) that the ASA will wait for a graceful-restart-capable
neighbor to return to normal operation after a restart event occurs. The... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,005 | Step 5 Select the best MED path advertised from the neighboring AS:
bgp deterministic-med
Step 6 Set a path with a missing MED attribute as the least preferred path:
bgp bestpath med missing-as-worst
Configure Policy Lists
When a policy list is referenced within a route map, all of the match statements within the polic... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,006 | Example:
ciscoasa(config-policy-list)# match community ExampleCommunity1
Step 6 Redistribute routes with the metrics specified:
match metric metric [metric […]]
Step 7 Redistribute routes in the routing table that match the specified tags:
match tag tag [tag […]]
Configure AS Path Filters
An ASpath filter allows you to... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,007 | Procedure
Create or configure a BGP community list and control access to it:
community-list {standard| community list-name {deny|permit} [community-number] [AA:NN] [internet]
[no-advertise][no-export]}| {expanded|expanded list-name {deny| permit}regexp}
Example:
ciscoasa(config)# community-list standard excomm1 permit ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,008 | Procedure
Step 1 Enable a BGP routing process, which places the router in router configuration mode:
router bgp autonomous-num
Example:
ciscoasa(config)# router bgp 2
Step 2 Enter address family configuration mode to configure a routing session using standard IP Version 4 (IPv4)
address prefixes:
address-family ipv4 [u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,009 | Step 6 Modify metric and tag values when the IP routing table is updated with BGP learned routes:
table-map {WORD|route-map_name}
Example:
ciscoasa(config-router-af)# table-map example1
The argument route-map_name specifies the route map name from the route-map command.
Step 7 Configure a BGP routing process to distrib... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,010 | Step 14 Control the maximum number of parallel iBGP routes that can be installed in a routing table:
maximum-paths {number_of_paths|ibgp number_of_paths}
Example:
ciscoasa(config-router-af)# maximum-paths ibgp 2
If the ibgp keyword is not used, then the number_of_paths argument controls the maximum
number of parallel E... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,011 | • (Optional) summary-only — filters all more-specific routes from updates.
• (Optional) Suppress-map map-name —specifies the name of the route map used to select the routes to
be suppressed.
• (Optional) Advertise-map map-name — specifies the name of the route map used to select the routes to
create AS_SET origin commu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,012 | Configure IPv4 Family BGP Neighbor Settings
This section describes the steps required to define BGP neighbors and neighbor settings.
Procedure
Step 1 Enable a BGP routing process, which places the router in router configuration mode:
router bgp autonomous-num
Example:
ciscoasa(config)# router bgp 2
Step 2 Enter address... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,013 | Step 7 Distribute BGP neighbor information as specified in an access list:
neighbor {ip-address} distribute-list {access-list-name}{in|out}
Example:
ciscoasa(config-router-af)# neighbor 10.86.118.12 distribute-list ExampleAcl in
• access-list-number — the number of a standard or extended access list. The range of a sta... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,014 | • out — that the access list is applied to outgoing advertisements to that neighbor.
Step 11 Control the number of prefixes that can be received from a neighbor:
neighbor {ip-address} maximum-prefix maximum [threshold][restart restart interval][warning-only]
Example:
ciscoasa(config-router-af)# neighbor 10.86.118.12 ma... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,015 | • exist-map map name — the name of the exist-map that is compared with the routes in the BGP table to
determine whether the advertise-map route is advertised or not.
• non-exist-map map name — the name of the non-exist-map that is compared with the routes in the BGP
table to determine whether the advertise-map route is... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,016 | Example:
ciscoasa(config-router-af)# neighbor 10.86.118.12 send-community
Step 19 Configure the router as the next hop for a BGP-speaking neighbor or peer group:
neighbor {ip-address}next-hop-self
Example:
ciscoasa(config-router-af)# neighbor 10.86.118.12 next-hop-self
Step 20 Accept and attempt BGP connections to exte... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,017 | neighbor {ip-address} version number
Example:
ciscoasa(config-router-af)# neighbor 10.86.118.12 version 4
The argument number specifies the BGP version number. The version can be set to 2 to force the software to
use only Version 2 with the specified neighbor. The default is to use Version 4 and dynamically negotiate
d... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,018 | Configure IPv4 Network Settings
This section describes the steps required to define the networks to be advertised by the BGP routing process.
Procedure
Step 1 Enable a BGP routing process, which places the ASA in router configuration mode:
router bgp autonomous-num
Example:
ciscoasa(config)# router bgp 2
Step 2 Enter a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,019 | ciscoasa(config)# router bgp 2
Step 2 Enter address family configuration mode to configure a routing session using standard IP Version 4 (IPv4)
address prefixes:
address-family ipv4 [unicast]
Example:
ciscoasa(config-router)# address-family ipv4[unicast]
The keyword unicast specifies IPv4 unicast address prefixes. This... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,020 | address-family ipv4 [unicast]
Example:
ciscoasa(config-router)# address-family ipv4[unicast]
The keyword unicast specifies IPv4 unicast address prefixes. This is the default, even if not specified.
Step 3 Configure conditional route injection to inject more specific routes into a BGP routing table:
bgp inject-map injec... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,021 | distance bgp external-distance internal-distance local-distance
Example:
ciscoasa(config-router-af)# distance bgp 80 180 180
• external-distance — administrative distance for external BGP routes. Routes are external when learned
from an external autonomous system. The range of values for this argument are from 1 to 255... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,022 | Configure IPv6 Family Aggregate Address Settings
This section describes the steps required to define the aggregation of specific routes into one route.
Procedure
Step 1 Enable a BGP routing process, which places the ASA in router configuration mode:
router bgp autonomous-num
Example:
ciscoasa(config)# router bgp 2
Step... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.