index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
923
• show running-config This command shows local CA certificate map rules. Examples The following example shows an RSA general-purpose key: ciscoasa/contexta(config)# show crypto key mypubkey rsa Key pair was generated at: 16:39:47 central Feb 10 2010 Key name: <Default-RSA-Key> Usage: General Purpose Key Modulus Size (b...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
924
subject-name attr ou eq Engineering History for Certificate Management Table 33: History for Certificate Management Platform Description Releases Feature Name Digital certificates (including CA certificates, identity certificates, and code signer certificates) provide digital identification for authentication. A digita...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
925
Platform Description Releases Feature Name We introduced this feature, which provides secure deployment of device certificates from third-party CAs. We introduced the following commands: crypto ikev2 enable outside client-servicesport portnumber, scep-enrollment enable, scep-forwarding-url value URL, secondary-pre-fill...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
926
Platform Description Releases Feature Name To prevent failure of large CRL downloads, the cache size was increased, and the limit on the number of entriesin an individual CRL was removed. • Increased the total CRL cache size to 16 MB per context for multi-context mode. • Increased the total CRL cache size to 128 MB for...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
927
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 868 Basic Settings History for Certificate Management
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
928
CHAPTER 26 ARP Inspection and the MAC Address Table This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. • About ARP Inspection and the MAC Address Table, on page 869 • Default Settings, on page 870 • Guidelines for ARP Inspection and the MAC Address Table, on pa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
929
• If the ARP packet does not match any entries in the static ARP table, then you can set the ASA to either forward the packet out all interfaces (flood), or to drop the packet. The dedicated Management interface never floods packets even if this parameter is set to flood. Note MAC Address Table When you use bridge grou...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
930
Configure ARP Inspection and Other ARP Parameters For bridge groups, you can enable ARP inspection. You can also configure other ARP parameters for both bridge groups and for routed mode interfaces. Procedure Step 1 Add static ARP entries according to Add a Static ARP Entry and Customize Other ARP Parameters, on page 8...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
931
Specify alias in routed mode to enable proxy ARP for this mapping. If the ASA receives an ARP request for the specified IP address, then it responds with the ASA MAC address. This keyword is useful if you have devices that do not perform ARP, for example. In transparent firewall mode, this keyword is ignored; the ASA d...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
932
arp-inspection interface_name enable [flood | no-flood] Example: ciscoasa(config)# arp-inspection outside enable no-flood The flood keyword forwards non-matching ARP packets out all interfaces, and no-flood drops non-matching packets. The default setting is to flood non-matching packets. To restrict ARP through the ASA...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
933
Procedure Set the MAC address entry timeout: mac-address-table aging-time timeout_value Example: ciscoasa(config)# mac-address-table aging-time 10 The timeout_value (in minutes) is between 5 and 720 (12 hours). 5 minutes is the default. Configure MAC Address Learning By default, each interface automatically learns the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
934
Monitors ARP Inspection. Shows the current settings for ARP inspection on all interfaces. • show mac-address-table [interface_name] Monitors the MAC address table. You can view the entire MAC address table (including static and dynamic entries for both interfaces), or you can view the MAC address table for an interface...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
935
Platform Feature Information Releases Feature Name You might want to customize the MAC address table for transparent mode, and for interfaces in a bridge group in both Transparent and Routed modes starting in 9.7(1). We introduced the following commands: mac-address-table static, mac-address-table aging-time, mac-learn...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
936
Platform Feature Information Releases Feature Name Integrated Routing and Bridging provides the ability to route between a bridge group and a routed interface. A bridge group is a group of interfaces that the ASA bridges instead of routes. The ASA is not a true bridge in that the ASA continues to act as a firewall: acc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
937
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 878 Basic Settings History for ARP Inspection and the MAC Address Table
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
938
P ART V IP Routing • Routing Overview, on page 881 • Static and Default Routes, on page 895 • Policy Based Routing, on page 905 • Route Maps, on page 923 • Bidirectional Forwarding Detection Routing, on page 929 • BGP, on page 939 • OSPF, on page 979 • IS-IS, on page 1039 • EIGRP, on page 1089 • Multicast Routing, on p...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
939
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
940
CHAPTER 27 Routing Overview This chapter describes how routing behaves within the ASA. • Path Determination, on page 881 • Supported Route Types, on page 882 • Supported Internet Protocols for Routing, on page 883 • Routing Table, on page 884 • Routing Table for Management Traffic, on page 889 • Equal-Cost Multi-Path (...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
941
Note Asymmetric routing is only supported for Active/Active failover in multiple context mode. Supported Route Types There are several route types that a router can use. The ASA uses the following route types: • Static Versus Dynamic • Single-Path Versus Multipath • Flat Versus Hierarchical • Link-State Versus Distance...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
942
can communicate only with routers within their domain. In very large networks, additional hierarchical levels may exist, with routers at the highest hierarchical level forming the routing backbone. The primary advantage of hierarchical routing is that it mimics the organization of most companies and therefore supports ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
943
IS-IS is a link state Interior Gateway Protocol (IGP). Link-state protocols are characterized by the propagation of the information required to build a complete network connectivity map on each participating router. That map is then used to calculate the shortest path to destinations. Routing Table The ASA uses separat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
944
Administrative distance is a route parameter that the ASA uses to select the best path when there are two or more different routesto the same destination from two different routing protocols. Because the routing protocols have metrics based on algorithms that are different from the other protocols, it is not always pos...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
945
Backup Dynamic and Floating Static Routes A backup route is registered when the initial attempt to install the route in the routing table fails because another route was installed instead. If the route that was installed in the routing table fails, the routing table maintenance process calls each routing protocol proce...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
946
Dynamic Routing and Clustering This section describes how to use dynamic routing with clustering. Dynamic Routing in Spanned EtherChannel Mode Note IS-IS is not supported in Spanned EtherChannel mode. In Spanned EtherChannel mode: The routing process only runs on the control node, and routes are learned through the con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
947
Dynamic Routing in Individual Interface Mode In Individual interface mode, each node runsthe routing protocol as a standalone router, and routes are learned by each node independently. Figure 68: Dynamic Routing in Individual Interface Mode In the above diagram, Router A learns that there are 4 equal-cost paths to Rout...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
948
Dynamic Routing in Multiple Context Mode In multiple context mode, each context maintains a separate routing table and routing protocol databases. This enables you to configure OSPFv2 and EIGRP independently in each context. You can configure EIGRP in some contexts and OSPFv2 in the same or different contexts. In mixed...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
949
management-only traffic vs. data traffic. Separate routing tables means that you can create separate default routes for data and management as well. Types of Traffic for Each Routing Table Through-the-device traffic always uses the data routing table. From-the-device traffic, depending on the type, uses either the mana...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
950
security-level 100 ip address 10.10.10.123 255.255.255.0 ipv6 address 123::123/64 a/admin(config-if)# show running-config int m0/0 ! interface Management0/0 management-only nameif mgmt security-level 0 ip address 10.106.167.118 255.255.255.0 a/admin(config-if)# Equal-Cost Multi-Path (ECMP) Routing The ASA supports Equa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
951
Under rare circumstances, you might want to disable proxy ARP for NAT addresses. If you have a VPN client address pool that overlaps with an existing network, the ASA by default sends proxy ARP requests on all interfaces. If you have another interface that is on the same Layer 2 domain, it will see the ARP requests and...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
952
History for Route Overview Table 35: History for Route Overview Feature Name Platform Releases Feature Information To segregate and isolate, management traffic from data traffic, a separate routing table is added for management traffic. Separate routing tables, for management and data respectively, are created for both...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
953
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 894 IP Routing History for Route Overview
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
954
CHAPTER 28 Static and Default Routes This chapter describes how to configure static and default routes on the ASA. • About Static and Default Routes, on page 895 • Guidelines for Static and Default Routes, on page 897 • Configure Default and Static Routes, on page 898 • Monitoring a Static or Default Route, on page 902...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
955
• Your network is small and you can easily manage static routes. • You do not want the traffic or CPU overhead associated with routing protocols. • In some cases, a default route is not enough. The default gateway might not be able to reach the destination network, so you must also configure more specific static routes...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
956
The static route tracking feature provides a method for tracking the availability of a static route and installing a backup route if the primary route should fail. For example, you can define a default route to an ISP gateway and a backup default route to a secondary ISP in case the primary ISP becomes unavailable. The...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
957
ASP and RIB Route Entries All routes and its distance installed on the device are captured in the ASP routing table. This is common for all static and dynamic routing protocols. Only the best distance route is captured in the RIB table. Configure Default and Static Routes At a minimum, you should configure a default ro...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
958
ciscoasa(config)# ipv6 route inside ::/0 3FFE:1100:0:CC00::1 The if_name isthe interface through which you want to send the specific traffic.For transparent mode,specify a bridge group member interface name. For routed mode with bridge groups, specify the BVI name. The distance argument is the administrative distance f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
959
The if_name is the interface through which you want to send the specific traffic. To drop unwanted traffic, enter the null0 interface. For transparent mode, specify a bridge group member interface name. For routed mode with bridge groups, specify the BVI name. The dest_ip and mask or dest_ipv6_prefix/prefix_length argu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
960
ciscoasa(config-sla-monitor-echo)# The target_ip argument isthe IPaddress of the network object whose availability the tracking process monitors. While this object is available, the tracking process route is installed in the routing table. When this object becomes unavailable, the tracking process removes the route and...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
961
ip address pppoe setroute Step 7 Create an untracked backup route. The backup route is a static route to the same destination as the tracked route, but through a different interface or gateway. You must assign this route a higher administrative distance (metric) than your tracked route. Monitoring a Static or Default R...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
962
Feature Information Platform Releases Feature Name Sending traffic to a null0 interface results in dropping the packets destined to the specified network. This feature is useful in configuring Remotely Triggered Black Hole (RTBH) for BGP. We modified the following command: route. Static null0 route to drop traffic 9.2(...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
963
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 904 IP Routing History for Static and Default Routes
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
964
CHAPTER 29 Policy Based Routing This chapter describes how to configure the ASA to support policy based routing (PBR). The following sections describe policy based routing, guidelines for PBR, and configuration for PBR. • About Policy Based Routing, on page 905 • Guidelines for Policy Based Routing, on page 907 • Confi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
965
obtained by the bandwidth and/or delay (using EIGRP or OSPF) characteristics of the link. PBR allows you to route higher priority traffic over the high-bandwidth/low-delay link, while sending all other traffic over the low-bandwidth/high-delay link. Some applications of policy based routing are: Equal-Access and Source...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
966
Load Sharing In addition to the dynamic load-sharing capabilities offered by ECMPload balancing, network administrators can now implement policies to distribute traffic among multiple paths based on the traffic characteristics. As an example, in the topology depicted in the Equal-Access Source Sensitive Routing scenari...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
967
PBR Policies Not Applied for Embryonic Traffic An embryonic connection is where the necessary handshake between source and destination has not been made. Note When a new internal interface is added and a new VPN policy is created using a unique address pool, PBR is applied to the outside interface matching the source o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
968
Configure Policy Based Routing A route map is comprised of one or more route-map statements. Each statement has a sequence number, as well as a permit or deny clause. Each route-map statement contains match and set commands. The match command denotes the match criteria to be applied on the packet. The set command denot...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
969
Step 3 Define the match criteria to be applied using an access-list: match ip address access-list_name [access-list_name...] Example: ciscoasa(config-route-map)# match ip address testacl Ensure that the access list does not contain any inactive rules. You cannot set match ACL with inactive rules to a PBR. Note Step 4 C...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
970
The egress interface is selected from the space-separated list of interfaces. If the costs of the interfaces are the same, it is an active-active configuration and packets are load-balanced (round-robin) on the egress interfaces. If the costs are different, the interface with the lowest cost is selected. Interfaces are...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
971
• ipv4—Sends ICMP probes to the specified peer IPv4 address (next-hop IP) for monitoring. • ipv6—Sends ICMP probes to the specified peer IPv4 address (next-hop IP) for monitoring. • auto4—Sends ICMP probes to the IPv4 default gateway of the interface. • auto6—Send ICMP probes to the IPv6 default gateway of the interfac...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
972
ciscoasa(config)# route-map testmap In the following example, since no match criteria is specified, an implicit match 'any' is assumed: ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# set ip next-hop 1.1.1.10 In this example, all traffic matching <acl> will be policy routed and forwarded throu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
973
In the following example, when multiple set actions are configured, they are evaluated in the order mentioned above. Only when all options of a set action are evaluated and cannot be applied, the next set actions will be considered. This ordering will ensure that the most available and least distant next-hop will be tr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
974
ciscoasa(config)# access-list acl-2 permit ip 10.2.0.0 255.255.0.0 We need to configure a route-map by specifying the above access-list as match criteria along with the required set actions. ciscoasa(config)# route-map equal-access permit 10 ciscoasa(config-route-map)# match ip address acl-1 ciscoasa(config-route-map)#...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
975
Before you begin This example assumes that you already have defined a site-to-site VPN using virtual tunnel interfaces (VTI) defined on the outside (WAN-facing) interfaces to connect the branch to the corporate hub and that it is functioning correctly. Traffic routed to the VTI interfaces is thus directed to the corpor...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
976
Assuming the output1 and output2 interfaces are already configured and functioning,simply add the policy-route cost command. This step is optional if you want to configure the system to use round robin processing to load balance acrossthe 2 egress WAN links. However, you mustset the costsif you want to create an active...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
977
First, we will start with the basic configuration for all the devices involved in the set-up. Here, A, B, C, and D represent ASA devices, and H1 and H2 represent IOS routers. ASA-A: ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 100 ciscoasa(config-...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
978
ciscoasa(config-if)# ip address 35.1.1.60 255.255.255.0 ASA-B: ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/0.1 ciscoasa(config-if)# vlan 291 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip addr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
979
ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 65.1.1.60 255.255.255.0 H1: ciscoasa(config)# interface Loopback1 ciscoasa(config-if)# ip address 15.1.1.100 255.255.255.255 ciscoasa(config-if)# interface Loopback2 ciscoasa(config-if)# ip address 15.1.1.101 255.2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
980
in 25.1.1.0 255.255.255.0 outside in 35.1.1.0 255.255.255.0 dmz Next let's configure ASA-A to route packets from H1 loopback2 out of ASA-A dmz interface. ciscoasa(config)# access-list pbracl_2 extended permit ip host 15.1.1.101 any ciscoasa(config)# route-map testmap permit 20 ciscoasa(config-route-map)# match ip addre...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
981
History for Policy Based Routing Table 37: History for Route Maps Platform Feature Information Releases Feature Name PBR uses the metrics to determine the best path (egress interface) for forwarding the traffic.Path monitoring periodically notifies PBR with the monitored interface whose metric got changed.PBR retrieves...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
982
CHAPTER 30 Route Maps This chapter describes how to configure and customize route-maps, for ASA. • About Route Maps, on page 923 • Guidelines for Route Maps, on page 925 • Define a Route Map, on page 925 • Customize a Route Map, on page 925 • Example for Route Maps, on page 927 • History for Route Maps, on page 928 Abo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
983
Permit and Deny Clauses Route maps can have permit and deny clauses. The deny clause rejects route matches from redistribution. You can use an ACL as the matching criterion in the route map. Because ACLs also have permit and deny clauses, the following rules apply when a packet matches the ACL: • ACL permit + route map...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
984
Guidelines for Route Maps Firewall Mode Supported only in routed firewall mode. Transparent firewall mode is not supported. Additional Guidelines Route maps do not support ACLs that include a user, user group, or fully qualified domain name objects. Define a Route Map You must define a route map when specifying which o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
985
ciscoasa(config)# route-map name {permit} [12] Route map entries are read in order. You can identify the order using the sequence_number option, or the ASA uses the order in which you add route map entries. Step 2 Match any routes that have a destination network that matches a standard ACL or prefix list: match ip addr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
986
match route-type {internal | external [type-1 | type-2]} Configure the Metric Values for a Route Action If a route matches the match commands, then the following set commands determine the action to perform on the route before redistributing it. To configure the metric value for a route action, perform the following st...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
987
ciscoasa(config)# route-map 1-to-2 permit ciscoasa(config-route-map)# match metric 1 ciscoasa(config-route-map)# set metric 5 ciscoasa(config-route-map)# set metric-type type-1 The following example shows how to redistribute the 10.1.1.0 static route into eigrp process 1 with the configured metric value: ciscoasa(confi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
988
CHAPTER 31 Bidirectional Forwarding Detection Routing This chapter describes how to configure the ASA to use the BidirectionalForwarding Detection (BFD) routing protocol. • About BFD Routing, on page 929 • Guidelines for BFD Routing, on page 932 • Configure BFD, on page 933 • Monitoring for BFD, on page 937 • History f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
989
process, the number of BFD control packets that are sent out between BFD neighbors is reduced. And also because the forwarding engine is testing the forwarding path on the remote neighbor system without involving the remote system, the inter-packet delay variance is improved. This results in quicker failure detection t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
990
After the remote BFD device receives a BFD control packet during the session initiation phase, it copies the value of the My Discriminator field into its own Your Discriminator field and the transition from Down state to Init state and then eventually to Up state occurs. Once both systems see their own Discriminators i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
991
BFD Failure Detection When the BFD session and timers have been negotiated, the BFD peers send BFD control packets to each other at the negotiated interval. These control packets act as a heartbeat that is very similar to IGP Hello protocol except that the rate is more accelerated. As long as each BFD peer receives a B...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
992
Firewall Mode Guidelines Supported in routed firewall mode; support for standalone, failover, and cluster modes. BFD is not supported on failover and cluster interfaces. In clustering this feature is only supported on the primary unit. BFD is not supported in transparent mode. IPv6 Guidelines Echo mode is not supported...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
993
• single-hop—Specifies a single-hop BFD template. • multi-hop—Specifies a multi-hop BFD template. • template-name—Specifies the template name. The template name cannot contains spaces. The bfd-template command lets you create the BFD template and enter BFD configuration mode. Step 2 (Optional) Configure Echo on a singl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
994
• 0|8—0 specifies that an UNENCRYPTED password will follow. 8 specifies that an ENCRYPTED password will follow. • word—The BFD password (key), which is a single-digit password/key of up to 29 characters.Passwords starting with a digit followed by a whitespace are not supported, for example, '0 pass' and '1' are not val...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
995
• interval milliseconds—Specifiesthe rate at which BFD control packets are sent to BFD peers. The range is 50 to 999 milliseconds. • min_rx milliseconds—Specifies the rate at which BFD control packets are expected to be received from BFD peers. The range is 50 to 999 milliseconds. • multiplier multiplier-value—Specifie...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
996
• template-name—Specifies the name of the multi-hop template associated with this BFD map. Step 3 (Optional) Configure the BFD slow timers value: bfd slow-timers [milliseconds] Example: ciscoasa(config)# bfd slow-timers 14000 ciscoasa(config-bfd)# milliseconds—(Optional) The BFD slow timers value. The range is 1000 to ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
997
History for BFD Routing Table 39: Feature History for BFD Routing Platform Feature Information Releases Feature Name The ASA now supports the BFD routing protocol. Support was added for configuring BFD templates, interfaces, and maps. Support for BGP routing protocol to use BFD was also added. We added the following co...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
998
CHAPTER 32 BGP This chapter describes how to configure the ASA to route data, perform authentication, and redistribute routing information using the Border Gateway Protocol (BGP). • About BGP, on page 939 • Guidelines for BGP, on page 942 • Configure BGP, on page 943 • Monitoring BGP, on page 972 • Example for BGP, on ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
999
those routes that have changed. BGP routers do not send periodic routing updates, and BGP routing updates advertise only the optimal path to a destination network. AS loop detection is done by scanning the full AS path (as specified in the AS_PATH attribute), and checking that the AS number of the local system does not...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,000
• no-advertise—Do not advertise this route to any peer. • internet—Advertise this route to the Internet community; all routers in the network belong to it. BGP Path Selection BGP may receive multiple advertisements for the same route from different sources. BGP selects only one path as the best path. When this path is ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,001
• AS-PATH length • Origin code • Multi Exit Discriminator (MED) • One of these: • Neighboring AS or sub-AS (before the addition of the BGP Multipaths) • AS-PATH (after the addition of the BGP Multipaths) Some BGP Multipath features put additional requirements on multipath candidates: • The path should be learned from a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,002
Additional Guidelines • The system does not add route entry for the IP address received over PPPoE in the CP route table. BGP always looks into CP route table for initiating the TCP session, hence BGP does not form TCP session. Thus, BGP over PPPoE is not supported. • To avoid adjacency flaps due to route updates being...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,003
Valid values for autonomous-num are from 1-4294967295 and 1.0-XX.YY. Step 2 Discard routes that have as-path segments that exceed a specified value: bgp maxas-limit number Example: ciscoasa(config-router)# bgp maxas-limit 15 The number argumentspecifiesthe maximum number of autonomoussystem segments, allowed. Valid val...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,004
bgp graceful-restart [restart-time seconds|stalepath-time seconds][all] Example: ciscoasa(config-router)# bgp graceful-restart restart-time 200 • restart-time — maximum time period (in seconds) that the ASA will wait for a graceful-restart-capable neighbor to return to normal operation after a restart event occurs. The...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,005
Step 5 Select the best MED path advertised from the neighboring AS: bgp deterministic-med Step 6 Set a path with a missing MED attribute as the least preferred path: bgp bestpath med missing-as-worst Configure Policy Lists When a policy list is referenced within a route map, all of the match statements within the polic...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,006
Example: ciscoasa(config-policy-list)# match community ExampleCommunity1 Step 6 Redistribute routes with the metrics specified: match metric metric [metric […]] Step 7 Redistribute routes in the routing table that match the specified tags: match tag tag [tag […]] Configure AS Path Filters An ASpath filter allows you to...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,007
Procedure Create or configure a BGP community list and control access to it: community-list {standard| community list-name {deny|permit} [community-number] [AA:NN] [internet] [no-advertise][no-export]}| {expanded|expanded list-name {deny| permit}regexp} Example: ciscoasa(config)# community-list standard excomm1 permit ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,008
Procedure Step 1 Enable a BGP routing process, which places the router in router configuration mode: router bgp autonomous-num Example: ciscoasa(config)# router bgp 2 Step 2 Enter address family configuration mode to configure a routing session using standard IP Version 4 (IPv4) address prefixes: address-family ipv4 [u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,009
Step 6 Modify metric and tag values when the IP routing table is updated with BGP learned routes: table-map {WORD|route-map_name} Example: ciscoasa(config-router-af)# table-map example1 The argument route-map_name specifies the route map name from the route-map command. Step 7 Configure a BGP routing process to distrib...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,010
Step 14 Control the maximum number of parallel iBGP routes that can be installed in a routing table: maximum-paths {number_of_paths|ibgp number_of_paths} Example: ciscoasa(config-router-af)# maximum-paths ibgp 2 If the ibgp keyword is not used, then the number_of_paths argument controls the maximum number of parallel E...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,011
• (Optional) summary-only — filters all more-specific routes from updates. • (Optional) Suppress-map map-name —specifies the name of the route map used to select the routes to be suppressed. • (Optional) Advertise-map map-name — specifies the name of the route map used to select the routes to create AS_SET origin commu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,012
Configure IPv4 Family BGP Neighbor Settings This section describes the steps required to define BGP neighbors and neighbor settings. Procedure Step 1 Enable a BGP routing process, which places the router in router configuration mode: router bgp autonomous-num Example: ciscoasa(config)# router bgp 2 Step 2 Enter address...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,013
Step 7 Distribute BGP neighbor information as specified in an access list: neighbor {ip-address} distribute-list {access-list-name}{in|out} Example: ciscoasa(config-router-af)# neighbor 10.86.118.12 distribute-list ExampleAcl in • access-list-number — the number of a standard or extended access list. The range of a sta...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,014
• out — that the access list is applied to outgoing advertisements to that neighbor. Step 11 Control the number of prefixes that can be received from a neighbor: neighbor {ip-address} maximum-prefix maximum [threshold][restart restart interval][warning-only] Example: ciscoasa(config-router-af)# neighbor 10.86.118.12 ma...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,015
• exist-map map name — the name of the exist-map that is compared with the routes in the BGP table to determine whether the advertise-map route is advertised or not. • non-exist-map map name — the name of the non-exist-map that is compared with the routes in the BGP table to determine whether the advertise-map route is...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,016
Example: ciscoasa(config-router-af)# neighbor 10.86.118.12 send-community Step 19 Configure the router as the next hop for a BGP-speaking neighbor or peer group: neighbor {ip-address}next-hop-self Example: ciscoasa(config-router-af)# neighbor 10.86.118.12 next-hop-self Step 20 Accept and attempt BGP connections to exte...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,017
neighbor {ip-address} version number Example: ciscoasa(config-router-af)# neighbor 10.86.118.12 version 4 The argument number specifies the BGP version number. The version can be set to 2 to force the software to use only Version 2 with the specified neighbor. The default is to use Version 4 and dynamically negotiate d...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,018
Configure IPv4 Network Settings This section describes the steps required to define the networks to be advertised by the BGP routing process. Procedure Step 1 Enable a BGP routing process, which places the ASA in router configuration mode: router bgp autonomous-num Example: ciscoasa(config)# router bgp 2 Step 2 Enter a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,019
ciscoasa(config)# router bgp 2 Step 2 Enter address family configuration mode to configure a routing session using standard IP Version 4 (IPv4) address prefixes: address-family ipv4 [unicast] Example: ciscoasa(config-router)# address-family ipv4[unicast] The keyword unicast specifies IPv4 unicast address prefixes. This...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,020
address-family ipv4 [unicast] Example: ciscoasa(config-router)# address-family ipv4[unicast] The keyword unicast specifies IPv4 unicast address prefixes. This is the default, even if not specified. Step 3 Configure conditional route injection to inject more specific routes into a BGP routing table: bgp inject-map injec...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,021
distance bgp external-distance internal-distance local-distance Example: ciscoasa(config-router-af)# distance bgp 80 180 180 • external-distance — administrative distance for external BGP routes. Routes are external when learned from an external autonomous system. The range of values for this argument are from 1 to 255...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,022
Configure IPv6 Family Aggregate Address Settings This section describes the steps required to define the aggregation of specific routes into one route. Procedure Step 1 Enable a BGP routing process, which places the ASA in router configuration mode: router bgp autonomous-num Example: ciscoasa(config)# router bgp 2 Step...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf