index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
1,123 | ciscoasa(config-if)# isis
Step 2 Enter interface configuration mode to configure padding on IS-IS hello protocol data units (IIH PDUs) for
all interfaces on the ASA:
isis hello padding
Example:
ciscoasa(config-if)# isis hello padding
Hellos are padded to the full MTU, which allows for early detection of errors that res... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,124 | Example:
ciscoasa(config-if)# isis hello-multiplier 10 level-1
• multipler—The advertised hold time in IS-IS hello packets is set to the hello multiplier times the hello
interval. Neighbors declare an adjacency to this ASA down after not having received any IS-IS hello
packets during the advertised hold time. You can s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,125 | • (Optional) level-2—Configures the interval of time between transmission of CSNPs for Level 2
independently.
It is unlikely that you will need to change the default value for this command.
This command applies only for the DR for a specified interface. Only DRs send CSNP packets to maintain
database synchronization. Y... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,126 | This command configuresthe distances applied to IS-ISroutes when they are inserted in the RIB and influence
the likelihood of these routes being preferred over routes to the same destination addresses discovered by
other protocols.
In general, the higher the value of the administrative distance, the lower the trust rat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,127 | Example:
ciscoasa(config-router)# metric-style wide level-1
• narrow—Instructs the ASA to use the old style of TLVs with the narrow metric.
• transition— Instructs the ASA to accept both old- and new-style TLVs during transition.
• wide—Instructs the ASA to use the new style of TLVs to carry the wider metric.
• (Option... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,128 | • (Optional) suppress—Causes the type of prefix identified by the subsequent keyword or keywords to
be suppressed.
• (Optional) interlevel—When the suppress keyword is configured, prevents the IPprefixes learned from
another IS-IS level from being advertised.
• (Optional) external—When the suppress keyword is configure... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,129 | • (Optional) spf-initial-wait—Indicates the initial wait time after a topology change before the first SPF
calculation. The range is 1 to 120,000 milliseconds. The default is 5500 milliseconds (5.5 seconds).
Each subsequent wait interval is twice as long as the previous one until the wait interval reaches the SPF
maxim... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,130 | Before you begin
Before you can enable IS-IS route authentication, you must enable IS-IS and set up an area. See Enable IS-IS
Routing Globally, on page 1046 for the procedure.
Procedure
Step 1 Enter router configuration mode:
router isis
Example:
cisco(config-router)#
Step 2 Specify the metric style as wide:
metric-sty... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,131 | Step 5 Configure multi-path load sharing for IS-IS:
maximum-paths number-of-paths
Example:
ciscoasa(config-router-af)# maximum-paths 8
number-of-paths—The number of routes to install in the routing table. The range is 1 to 8. The default is 1.
The maximum-path command is used to configure IS-IS multi-load sharing when ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,132 | • (Optional) on-startup—Sets the overload bit at system startup. The overload bit remains set for the
number of seconds configured or until BGP has converged, depending on the subsequent argument or
keyword specified.
• (Optional) seconds—The number of seconds the overload bit is set at system startup and remains set.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,133 | ciscoasa(config-router-af)# spf-interval level-1 5 10 20
• (Optional) level-1—Apply intervals to Level 1 areas only.
• (Optional) level-2—Apply intervals to Level 2 areas only.
• spf-max-wait—Indicates the maximum interval between two consecutive SPF calculations. The range
is 1 to 120 seconds. The default is 10 second... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,134 | You must specify the metric-style wide command for the redistribute isis command to work.
See Step 1 of this procedure.
Note
In IS-IS, all areas are stub areas, which means that no routing information is leaked from the backbone (Level
2) into areas (Level 1). Level 1-only routers use default routing to the closest Lev... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,135 | Monitoring IS-IS IPv4
Use the following commands to monitor IS-IS IPv4:
• show isis ip rib—Displays the IPv4 address family-specific RIB for an IS-IS routing process.
• show isis ip spf-log—Displays the IPv4 address family-specific SPF logs for an IS-IS routing
process.
• show isis ip topology—Displays the IPv4 address... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,136 | • show clns neighbors [process-tag] [interface-name] [detail]—Displays end system (ES),
intermediate system (IS) and multi-topology IS-IS(M-ISIS) neighbors. This command displays the
adjacency learned through multitopology IS-IS for IPv6.
• show clns is-neighbors [interface-name] [detail] —Displays IS-IS information fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,137 | History for IS-IS
Table 42: Feature History for IS-IS
Platform Feature Information
Releases
Feature Name
The ASA now supportsthe IntermediateSystem to Intermediate
System (IS-IS) routing protocol.Support was added for routing
data, performing authentication, and redistributing and
monitoring routing information using t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,138 | net 49.1234.aaaa.bbbb.cccc.00
interface GigabitEthernet0/0
ipv6 address 2001:192:16:32::1/64
ipv6 router isis
Dynamic Routing Within the Same Area
iRouter --------(inside G0/1) ASA (G0/0 outside)------------ oRouter
ASA Configuration
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 192.16.32.1 25... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,139 | ipv6 router isis
oRouter
router isis
net 49.1234.2036.2036.2036.00
is-type level-1
metric-style wide
Dynamic Routing in More Than One Area
iRouter ---------- ASA ------------ oRouter
ASA Configuration
interface GigabitEthernet0/0
nameif outside
security-level 80
ip address 192.16.32.1 255.255.255.0 standby 192.16.32.2
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,140 | oRouter
interface GigabitEthernet0/0
ip address 192.16.32.3 255.255.255.0
ip router isis
ipv6 address 2001:192:16:32::3/64
ipv6 router isis
oRouter
interface GigabitEthernet0/1
ip address 192.26.32.3 255.255.255.0
ip router isis
ipv6 address 2001:192:26:32::3/64
ipv6 router isis
oRouter
router isis
net 49.1234.2036.203... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,141 | ipv6 router isis
router isis
net 49.1234.2005.2005.2005.00
authentication mode md5
authentication key cisco#123 level-2
metric-style wide
summary-address 172.16.0.0 255.255.252.0
maximum-paths 5
!
address-family ipv6 unicast
redistribute static level-1-2
maximum-paths 6
exit-address-family
IOS Configuration
iRouter
int... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,142 | is-type level-1
metric-style wide
ASA Configuration
router isis
net 49.1234.2005.2005.2005.00
authentication mode md5
authentication key cisco#123 level-2
metric-style wide
summary-address 172.16.0.0 255.255.252.0
maximum-paths 5
!
address-family ipv6 unicast
redistribute static level-1-2
maximum-paths 6
exit-address-f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,143 | interface GigabitEthernet0/1
ip address 172.26.32.3 255.255.255.0
ip router isis
ipv6 address 2001:172:26:32::3/64
ipv6 router isis
iRouter
router isis
net 49.1234.2035.2035.2035.00
net 49.2001.2035.2035.2035.00
is-type level-2-only
metric-style wide
oRouter
interface GigabitEthernet0/0
ip address 192.16.32.3 255.255.2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,144 | authentication mode md5
authentication key cisco#123 level-2
metric-style wide
summary-address 172.16.0.0 255.255.252.0
redistribute static
maximum-paths 5
address-family ipv6 unicast
maximum-paths 6
exit-address-family
Passive Interfaces
iRouter ---------- ASA ------------ oRouter
ASA Configuration
interface GigabitEt... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,145 | iRouter
router isis
net 49.1234.2035.2035.2035.00
net 49.2001.2035.2035.2035.00
is-type level-2-only
metric-style wide
oRouter
interface GigabitEthernet0/0
ip address 192.16.32.3 255.255.255.0
ip router isis
ipv6 address 2001:192:16:32::3/64
ipv6 router isis
oRouter
interface GigabitEthernet0/1
ip address 192.26.32.3 2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,146 | ip router isis
ipv6 address 2001:172:16:32::3/64
ipv6 enable
ipv6 router isis
isis authentication mode md5
isis authentication key-chain KeyChain level-2
isis priority 120
isis ipv6 metric 600
iRouter
key chain KeyChain
key 1
key-string cisco#123
iRouter
router isis
net 49.1234.2035.2035.2035.00
net 49.2001.2035.2035.2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,147 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1088
IP Routing
Examples for IS-IS | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,148 | CHAPTER 35
EIGRP
This chapter describes how to configure the ASA to route data, perform authentication, and redistribute routing
information using the Enhanced Interior Gateway Routing Protocol (EIGRP).
• About EIGRP, on page 1089
• Guidelines for EIGRP, on page 1090
• Configure EIGRP, on page 1091
• Customize EIGRP, o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,149 | Once this neighbor relationship is established, routing updates are not exchanged unless there is a change in
the network topology. The neighbor relationship is maintained through the hello packets. Each hello packet
received from a neighbor includes a hold time. This is the time in which the ASA can expect to receive ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,150 | IPv6 Guidelines
Does not support IPv6.
Context Guidelines
• EIGRP instances cannot form adjacencies with each other across shared interfaces because, by default,
inter-context exchange of multicast traffic is not supported across shared interfaces. However, you can
use the static neighbor configuration under EIGRP proc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,151 | router eigrp as-num
Example:
ciscoasa(config)# router eigrp 2
To enable EIGRP IPv6 routing process, enter the following command:
The as-num argument is the autonomous system number of the EIGRP routing process.
Step 2 Configure the interfaces and networks that participate in EIGRP routing:
network ip-addr [mask]
Exampl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,152 | ciscoasa(config)# router eigrp 2
The as-num argument is the autonomous system number of the EIGRP routing process.
Step 2 Configure the interfaces and networks that participate in EIGRP routing:
network ip-addr [mask]
Example:
ciscoasa(config)# router eigrp 2
ciscoasa(config-router)# network 10.0.0.0 255.0.0.0
You can ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,153 | The Network table displays the networks configured for the EIGRP routing process. Each row of the table
displays the network address and associated mask configured for the specified EIGRP routing process.
Procedure
Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process:
router... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,154 | The as-num argument is the autonomous system number of the EIGRP routing process.
Step 2 Configure the interfaces and networks that participate in EIGRP routing:
network ip-addr [mask]
Example:
ciscoasa(config)# router eigrp 2
ciscoasa(config-router)# network 10.0.0.0 255.0.0.0
You can configure one or more network sta... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,155 | ciscoasa(config-if)# delay 200
The value argument entered is in tens of microseconds. To set the delay for 2000 microseconds, enter a value
of 200.
To view the delay value assigned to an interface, use the show interface command.
For more information, see Change the Interface Delay Value, on page 1098.
Step 6 Change th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,156 | ciscoasa(config)# router eigrp 2
ciscoasa(config-router)# network 10.0.0.0 255.0.0.0
Directly connected and static networks that fall within the defined network are advertised by the ASA.
Additionally, only interfaces with an IP address that fall within the defined network participate in the EIGRP
routing process.
If y... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,157 | By default, EIGRP summary addresses that you define have an administrative distance of 5. You can change
this value by specifying the optional distance argument in the summary-address command.
Change the Interface Delay Value
The interface delay value is used in EIGRPdistance calculations. You can modify this value on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,158 | Procedure
Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process:
router eigrp as-num
Example:
ciscoasa(config)# router eigrp 2
The as-num argument is the autonomous system number of the EIGRP routing process.
Step 2 Configure the interfaces and networks that participate in EI... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,159 | authentication key eigrp as-num key key-id key-id
Example:
ciscoasa(config)# authentication key eigrp 2 cisco key-id 200
• The as-num argument is the autonomous system number of the EIGRP routing process configured on
the ASA. If EIGRP is not enabled or if you enter the wrong number, the ASA returns the following error... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,160 | ciscoasa(config-router)# neighbor 10.0.0.0 interface interface1
The ip-addr argument is the IP address of the neighbor.
The if-name argument is the name of the interface, as specified by the nameif command, through which that
neighbor is available. You can define multiple neighbors for an EIGRP routing process.
You mus... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,161 | redistribute connected [metric bandwidth delay reliability loading mtu] [route-map map_name]
Example:
ciscoasa(config-router): redistribute connected [metric bandwidth delay reliability loading
mtu] [route-map map_name]
You must specify the EIGRP metric values in the redistribute command if you do not have a default-me... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,162 | Procedure
Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process:
router eigrp as-num
Example:
ciscoasa(config)# router eigrp 2
The as-num argument is the autonomous system number of the EIGRP routing process.
Step 2 Configure the interfaces and networks that participate in EI... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,163 | Customize the EIGRP Hello Interval and Hold Time
The ASA periodically sends hello packets to discover neighbors and to learn when neighbors become
unreachable or inoperative. By default, hello packets are sent every 5 seconds.
The hello packet advertises the ASA hold time. The hold time indicates to EIGRP neighbors the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,164 | prevent the possibility of traffic being routed to the wrong location, you should disable automatic route
summarization on the routers creating the conflicting summary addresses.
Procedure
Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process:
router eigrp as-num
Example:
cis... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,165 | ciscoasa(config)# router eigrp 2
ciscoasa(config-router)# network 10.0.0.0 255.0.0.0
You can configure one or more network statements with this command.
Directly connected and static networks that fall within the defined network are advertised by the ASA.
Additionally, only interfaces with an IP address that fall withi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,166 | ciscoasa(config)# interface phy_if
Step 2 Disable the split horizon:
no split-horizon eigrp as-number
Example:
ciscoasa(config-if)# no split-horizon eigrp 2
Restart the EIGRP Process
You can restart an EIGRP process or clear redistribution or clear counters.
Procedure
Restart an EIGRP process or clear redistribution or... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,167 | • show eigrp [as-number] topology [ip-addr [mask] | active | all-links | pending | summary |
zero-successors]
Displays the EIGRP topology table.
• show eigrp [as-number] traffic
Displays EIGRP traffic statistics.
• show mfib cluster
Displays MFIB information in terms of forwarding entries and interfaces.
• show route c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,168 | Procedure
Step 1 To enable EIGRP, enter the following commands:
ciscoasa(config)# router eigrp 2
ciscoasa(config-router)# network 10.0.0.0 255.0.0.0
Step 2 To configure an interface from sending or receiving EIGRP routing messages, enter the following command:
ciscoasa(config-router)# passive-interface {default}
Step 3... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,169 | Platform Feature Information
Releases
Feature Name
For EIGRP, bulk synchronization, route synchronization, and
layer 2 load balancing are supported in the clustering
environment.
We introduced or modified the following commands: show
route cluster, debug route cluster, show mfib cluster, debug
mfib cluster.
Clustering ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,170 | CHAPTER 36
Multicast Routing
This chapter describes how to configure the ASA to use the multicast routing protocol.
• About Multicast Routing, on page 1111
• Guidelines for Multicast Routing, on page 1114
• Enable Multicast Routing, on page 1115
• Customize Multicast Routing, on page 1115
• Monitoring for PIM, on page ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,171 | multicast data. When configured for stub multicast routing, the ASA cannot be configured for PIM sparse or
bidirectional mode. You must enable PIM on the interfaces participating in IGMP stub multicast routing.
The ASA supports both PIM-SM and bidirectional PIM. PIM-SM is a multicast routing protocol that uses the
unde... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,172 | PIM Bootstrap Router (BSR) Terminology
The following terms are frequently referenced in the PIM BSR configuration:
• Bootstrap Router (BSR) — A BSR advertises Rendezvous Point (RP) information to other routers with
PIM on a hop-by-hop basis. Among multiple Candidate-BSRs, a single BSR is chosen after an election
proces... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,173 | Clustering
Multicast routing supports clustering. InSpanned EtherChannel clustering, the control unitsends all multicast
routing packets and data packets until fast-path forwarding is established. After fast-path forwarding is
established, data units may forward multicast data packets. All data flows are full flows. St... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,174 | Enable Multicast Routing
Enabling multicast routing on the ASA, enables IGMP and PIM on all data interfaces by default, but not on
the management interface for most models (see Management Slot/Port Interface, on page 632 for interfaces
that do not allow through traffic). IGMP is used to learn whether members of a group... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,175 | An ASA acting asthe gateway to the stub area does not need to participate inPIM sparse mode or bidirectional
mode. Instead, you can configure it to act as an IGMP proxy agent and forward IGMP messages from hosts
connected on one interface to an upstream multicast router on another interface. To configure the ASA as an
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,176 | Configure IGMP Features
IP hosts use IGMP to report their group memberships to directly-connected multicast routers. IGMP is used
to dynamically register individual hosts in a multicast group on a particular LAN. Hosts identify group
memberships by sending IGMP messages to their local multicast router. Under IGMP, rout... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,177 | ciscoasa(config-if)# igmp join-group mcast-group
The group-address argument is the IP address of the group.
The igmpjoin-groupcommand enablesPIM to send Join requeststowardsthe sources or towards
the Rendezvous Point (RP), provided, the firewall with this command is the PIM Designated
Router (DR) on that interface wher... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,178 | ciscoasa(config)# access-list acl1 standard permit 192.52.662.25
You can create more than one entry for a single ACL. You can use extended or standard ACLs.
The ip_addr mask argument is the IP address of the multicast group being permitted or denied.
Step 2 Create an extended ACL:’
access-list name extended [permit | d... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,179 | When you change the IGMP limit on the interface with active joins on it, the new limit is not applicable to
the existing groups. ASA validates the limit only when a new group is added to the interface or when the
IGMP join timers expire. To apply the new limit with immediate effect, you must disenable and re-enable
IGM... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,180 | ciscoasa(config-if)# igmp query-timeout 30
Valid values range from 60 to 300; 225 is the default value.
Step 3 Change the maximum query response time:
igmp query-max-response-time seconds
Valid values range from 1 to 25; 10 is the default value.
Example:
ciscoasa(config-if)# igmp query-max-response-time 20
Change the I... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,181 | Enable and Disable PIM on an Interface
You can enable or disable PIM on specific interfaces.
Procedure
Step 1 Enable or reenable PIM on a specific interface:
pim
Example:
ciscoasa(config-if)# pim
Step 2 Disable PIM on a specific interface:
no pim
Example:
ciscoasa(config-if)# no pim
Note Only the no pim command appears... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,182 | The ASA always advertises the bidirectional capability in the PIM hello messages, regardless of
the actual bidirectional configuration.
Note
Example:
ciscoasa(config)# pim rp-address 10.86.75.23 [acl1] [bidir]
Configure the Designated Router Priority
The DR is responsible for sending PIM register, join, and prune messa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,183 | Configure PIM Message Intervals
Router query messages are used to select the PIM DR. The PIM DR is responsible for sending router query
messages. By default, router query messages are sent every 30 seconds. Additionally, every 60 seconds, the
ASA sends PIM join or prune messages.
Procedure
Step 1 Send router query mess... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,184 | Step 2 Filter neighbor routers:
pim neighbor-filter pim_nbr
Example:
ciscoasa(config)# interface GigabitEthernet0/3
ciscoasa(config-if)# pim neighbor-filter pim_nbr
In the example, the 10.1.1.1 router is prevented from becoming aPIM neighbor on interface GigabitEthernet0/3.
Configure a Bidirectional Neighbor Filter
The... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,185 | In the example, the following ACL, when used with the pim neighbor-filter command, prevents the 10.1.1.1
router from becoming a PIM neighbor.
Step 2 Filter neighbor routers:
pim bidirectional-neighbor-filter pim_nbr
Example:
ciscoasa(config)# interface GigabitEthernet0/3
ciscoasa(config-if)# pim bidirectional neighbor-... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,186 | You can set up an administratively scoped boundary on an interface for multicast group addresses. IANA has
designated the multicast address range from 239.0.0.0 to 239.255.255.255 as the administratively scoped
addresses. This range of addresses can be reused in domains administered by different organizations. The
addr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,187 | Displays the group-to-PIM mode mapping. To display the elected RP for a group, specify the group
address or name.
• show pim group-map rp-timers
Displays the timer expiry and uptime for each group to PIM mode mapping entry.
• show pim neighbor
Displays the Protocol Independent Multicast (PIM) neighbors.
Example for Mul... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,188 | Platform Feature Information
Releases
Feature Name
Support was added to allow PIM-SSM packets to pass through
when multicast routing is enabled, unless the ASA is the
Last-Hop Router. This allows greater flexibility in choosing a
multicast group while also protecting against different attacks;
hosts only receive traffi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,189 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1130
IP Routing
History for Multicast Routing | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,190 | P ART VI
AAA Servers and the Local Database
• AAA and the Local Database, on page 1133
• RADIUS Servers for AAA, on page 1145
• TACACS+ Servers for AAA, on page 1165
• LDAP Servers for AAA, on page 1171
• Kerberos Servers for AAA, on page 1183
• RSA SecurID Servers for AAA, on page 1191 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,191 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,192 | CHAPTER 37
AAA and the Local Database
This chapter describes authentication, authorization, and accounting (AAA, pronounced “triple A”). AAA is
a a set of services for controlling access to computer resources, enforcing policies, assessing usage, and
providing the information necessary to bill for services. These proce... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,193 | • The enable command
• Network access
• VPN access
Authorization
Authorization is the process of enforcing policies: determining what types of activities, resources, or services
a user is permitted to access. After a user is authenticated, that user may be authorized for different types of
access or activity.
You can c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,194 | • Configure RSA SecurID AAA Server Groups, on page 1192
See the VPN configuration guide for more information on using Kerberos Constrained Delegation and HTTP
Form.
The following table summarizes the supported types of server and their uses, including the local database.
Table 45: Supported Services for AAA Servers
Ser... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,195 | Server Type and Service Authentication Authorization Accounting
Firewall Sessions (AAA rules) Yes No No
HTTP Form
Administrators No No No
VPN Users Yes No No
Firewall Sessions (AAA rules) No No No
Notes
• RADIUS—Accounting for administrators does not include command accounting.
• RADIUS—Authorization for firewall sessi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,196 | Note You cannot use the local database for network access authorization.
Fallback Support
The local database can act as a fallback method for several functions. This behavior is designed to help you
prevent accidental lockout from the ASA.
When a user logs in, the servers in the group are accessed one at a time, starti... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,197 | Guidelines for the Local Database
Make sure that you prevent a lockout from the ASA when using the local database for authentication or
authorization.
Add a User Account to the Local Database
To add a user to the local database, perform the following steps:
Procedure
Step 1 Create the user account.
username username [p... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,198 | The encrypted keyword (for passwords 32 characters and fewer in 9.6 and earlier) or the pbkdf2 keyword
(for passwordslonger than 32 charactersin 9.6 and later, and passwords of all lengthsin 9.7 and later) indicates
that the password is encrypted (using an MD5-based hash or a PBKDF2 (Password-Based Key Derivation
Funct... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,199 | Step 5 (Optional) If you are using this username for VPN authentication, you can configure many VPN attributes
for the user. See the VPN configuration guide for more information.
Examples
The following example assigns a privilege level of 15 to the admin user account:
ciscoasa(config)# username admin password farscape1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,200 | History for the Local Database
Table 46: History for the Local Database
Platform Description
Releases
Feature Name
Describes how to configure the local database for AAA use.
We introduced the following commands:
username, aaa authorization exec authentication-server,
aaa authenticationconsole LOCAL, aaa authorizationex... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,201 | Platform Description
Releases
Feature Name
Localusername and enable passwords of all lengths are stored
in the configuration using a PBKDF2 (Password-Based Key
Derivation Function 2) hash. Previously, passwords 32
characters and shorter used the MD5-based hashing method.
Already existing passwords continue to use the M... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,202 | Platform Description
Releases
Feature Name
The ASA can lock out local users after a configurable number
of failed login attempts. This feature did not apply to users with
privilege level 15. Also, a user would be locked out indefinitely
until an admin unlocked their account. Now, users will be
unlocked after 10 minutes... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,203 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
1144
AAA Servers and the Local Database
History for the Local Database | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,204 | CHAPTER 38
RADIUS Servers for AAA
This chapter describes how to configure RADIUS servers for AAA.
• About RADIUS Servers for AAA, on page 1145
• Guidelines for RADIUS Servers for AAA, on page 1156
• Configure RADIUS Servers for AAA, on page 1156
• Monitoring RADIUS Servers for AAA, on page 1163
• History for RADIUS Ser... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,205 | To enable MS-CHAPv2 as the protocol used between the ASA and the RADIUS
server for a VPN connection, password management must be enabled in the tunnel
group general attributes. Enabling password management generates an
MS-CHAPv2 authentication request from the ASA to the RADIUS server. See
the description of the passwo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,206 | RADIUS attribute names do not contain the cVPN3000 prefix. Cisco Secure ACS 4.x supports this new
nomenclature, but attribute names in pre-4.0 ACS releases still include the cVPN3000 prefix. The ASAs
enforce the RADIUS attributes based on attribute numeric ID, not attribute name.
All attributes listed in the following ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,207 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
Client-Type-Version-Limiting Y 77 String Single IPsec VPN version number string
DHCP-Network-Scope Y 61 String Single IP Address
Extended-Authentication-On-Rekey Y 122 Integer Single 0 = Disabled 1 = Enabled
Assigned IPv6 interface ID.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,208 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
0 = None 1 = RADIUS 2 = LDAP (authorization only) 3
= NT Domain 4 = SDI 5 = Internal 6 = RADIUS with
Expiry 7 = Kerberos/Active Directory
IPsec-Authentication 13 Integer Single
IPsec-Auth-On-Rekey Y 42 Boolean Single 0 = Disabled 1 = E... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,209 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
Bitmap: 1 = Encryption required 2 = 40 bits 4 = 128 bits
8 = Stateless-Req 15= 40/128-Encr/Stateless-Req
L2TP-Encryption 21 Integer Single
L2TP-MPPC-Compression 38 Integer Single 0 = Disabled 1 = Enabled
Comma-delimited string, for exa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,210 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
Cisco Systems Products:
1 = Cisco Intrusion Prevention Security Agent or Cisco
Integrated Client (CIC)
Zone LabsProducts: 1 = Zone Alarm 2 = Zone AlarmPro
3 = Zone Labs Integrity
NetworkICE Product: 1 = BlackIce Defender/Agent
Sygate P... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,211 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
SVC-DTLS Y 123 Integer Single 0 = False 1 = True
SVC-Keepalive Y 107 Integer Single 0 = Off 15-600 seconds
SVC-Modules Y 127 String Single String (name of a module)
SVC-MTU Y 125 Integer Single MTU value 256-1406 in bytes
SVC-Profiles ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,212 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
Comma-separated DNS/IP with an optional wildcard (*)
(for example *.cisco.com, 192.168.1.*, wwwin.cisco.com)
WebVPN-Group-based-HTTP/HTTPS-Proxy-Exception-List Y 78 String Single
WebVPN-Hidden-Shares Y 126 Integer Single 0 = None 1 = V... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,213 | Single or Description or Value
Multi-Valued
Attr. Syntax/Type
No.
Attribute Name ASA
One of “e networkname,” “i networkname,” or “a,” where
networkname is the name of aSmart Tunnel network list,
e indicates the tunnel excluded, i indicates the tunnel
specified, and a indicates all tunnels.
WebVPN-Smart-Tunnel-Tunnel-Po... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,214 | Table 48: Supported IETF RADIUS Attributes
Single or Multi- Description or Value
Valued
Attr. Syntax/Type
No.
Attribute Name ASA
For Versions 8.2.x and later, we recommend that you
use the Group-Policy attribute (VSA 3076, #25):
• group policy name
• OU=group policy name
• OU=group policy name
IETF-Radius-Class Y 25 Si... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,215 | Disconnect Reason Code
ACCT_DISC_PORT_ERROR = 8
ACCT_DISC_NAS_ERROR = 9
ACCT_DISC_NAS_REQUEST = 10
ACCT_DISC_NAS_REBOOT = 11
ACCT_DISC_PORT_UNNEEDED = 12
ACCT_DISC_PORT_PREEMPTED = 13
ACCT_DISC_PORT_SUSPENDED = 14
ACCT_DISC_SERV_UNAVAIL = 15
ACCT_DISC_CALLBACK = 16
ACCT_DISC_USER_ERROR = 17
ACCT_DISC_HOST_REQUEST = 18
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,216 | • If you are using Cisco ACS: the server already has these attributes integrated. You can skip this step.
• For RADIUS servers from other vendors (for example, Microsoft Internet Authentication Service): you
must manually define each ASA attribute. To define an attribute, use the attribute name or number, type,
value, ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,217 | • depletion [deadtime minutes] reactivates failed servers only after all of the servers in the group are
inactive. This is the default reactivation mode. You can specify the amount of time, between 0 and 1440
minutes, that elapses between the disabling of the last server in the group and the subsequent reenabling
of al... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,218 | When you use the server group in a VPN tunnel, the RADIUS server group will be registered for CoA
notification and the ASA will listen to the port for the CoA policy updates from ISE. Enable dynamic
authorization only if you are using this server group in a remote access VPN in conjunction with ISE.
Example:
ciscoasa(c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,219 | ciscoasa(config)# aaa-server AuthOutbound protocol radius
ciscoasa(config-aaa-server-group)# exit
ciscoasa(config)# aaa-server AuthOutbound (inside) host 10.1.1.3
ciscoasa(config-aaa-server-host)# key RadUauthKey
ciscoasa(config-aaa-server-host)# exit
The following example shows how to configure an ISE server group for... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,220 | Example:
ciscoasa(config-aaa-server-group)# aaa-server servergroup1 outside host 10.10.1.1
If you do not specify an (interface_name), then the ASA uses the inside interface by default.
Step 2 Specify how the ASA treats netmasks received in a downloadable ACL from a RADIUS server.
acl-netmask-convert {auto-detect | stan... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,221 | ciscoasa(config-aaa-server-host)# timeout 15
Step 6 Configure the amount of time between retry attempts for a particular AAA server designated in a previous
command.
retry-interval seconds
Example:
ciscoasa(config-aaa-server-host)# retry-interval 8
The seconds argument specifies the retry interval (1-10 seconds) for th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
1,222 | ciscoasa(config-aaa-host)# key myexamplekey1
The server secret that you configure should match the one configured on the RADIUS server. If you do not
know the server secret value, ask the RADIUS server administrator. The maximum length is 64 characters.
Example
The following example shows how to add a RADIUS server to ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.