index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
1,123
ciscoasa(config-if)# isis Step 2 Enter interface configuration mode to configure padding on IS-IS hello protocol data units (IIH PDUs) for all interfaces on the ASA: isis hello padding Example: ciscoasa(config-if)# isis hello padding Hellos are padded to the full MTU, which allows for early detection of errors that res...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,124
Example: ciscoasa(config-if)# isis hello-multiplier 10 level-1 • multipler—The advertised hold time in IS-IS hello packets is set to the hello multiplier times the hello interval. Neighbors declare an adjacency to this ASA down after not having received any IS-IS hello packets during the advertised hold time. You can s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,125
• (Optional) level-2—Configures the interval of time between transmission of CSNPs for Level 2 independently. It is unlikely that you will need to change the default value for this command. This command applies only for the DR for a specified interface. Only DRs send CSNP packets to maintain database synchronization. Y...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,126
This command configuresthe distances applied to IS-ISroutes when they are inserted in the RIB and influence the likelihood of these routes being preferred over routes to the same destination addresses discovered by other protocols. In general, the higher the value of the administrative distance, the lower the trust rat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,127
Example: ciscoasa(config-router)# metric-style wide level-1 • narrow—Instructs the ASA to use the old style of TLVs with the narrow metric. • transition— Instructs the ASA to accept both old- and new-style TLVs during transition. • wide—Instructs the ASA to use the new style of TLVs to carry the wider metric. • (Option...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,128
• (Optional) suppress—Causes the type of prefix identified by the subsequent keyword or keywords to be suppressed. • (Optional) interlevel—When the suppress keyword is configured, prevents the IPprefixes learned from another IS-IS level from being advertised. • (Optional) external—When the suppress keyword is configure...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,129
• (Optional) spf-initial-wait—Indicates the initial wait time after a topology change before the first SPF calculation. The range is 1 to 120,000 milliseconds. The default is 5500 milliseconds (5.5 seconds). Each subsequent wait interval is twice as long as the previous one until the wait interval reaches the SPF maxim...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,130
Before you begin Before you can enable IS-IS route authentication, you must enable IS-IS and set up an area. See Enable IS-IS Routing Globally, on page 1046 for the procedure. Procedure Step 1 Enter router configuration mode: router isis Example: cisco(config-router)# Step 2 Specify the metric style as wide: metric-sty...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,131
Step 5 Configure multi-path load sharing for IS-IS: maximum-paths number-of-paths Example: ciscoasa(config-router-af)# maximum-paths 8 number-of-paths—The number of routes to install in the routing table. The range is 1 to 8. The default is 1. The maximum-path command is used to configure IS-IS multi-load sharing when ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,132
• (Optional) on-startup—Sets the overload bit at system startup. The overload bit remains set for the number of seconds configured or until BGP has converged, depending on the subsequent argument or keyword specified. • (Optional) seconds—The number of seconds the overload bit is set at system startup and remains set. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,133
ciscoasa(config-router-af)# spf-interval level-1 5 10 20 • (Optional) level-1—Apply intervals to Level 1 areas only. • (Optional) level-2—Apply intervals to Level 2 areas only. • spf-max-wait—Indicates the maximum interval between two consecutive SPF calculations. The range is 1 to 120 seconds. The default is 10 second...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,134
You must specify the metric-style wide command for the redistribute isis command to work. See Step 1 of this procedure. Note In IS-IS, all areas are stub areas, which means that no routing information is leaked from the backbone (Level 2) into areas (Level 1). Level 1-only routers use default routing to the closest Lev...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,135
Monitoring IS-IS IPv4 Use the following commands to monitor IS-IS IPv4: • show isis ip rib—Displays the IPv4 address family-specific RIB for an IS-IS routing process. • show isis ip spf-log—Displays the IPv4 address family-specific SPF logs for an IS-IS routing process. • show isis ip topology—Displays the IPv4 address...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,136
• show clns neighbors [process-tag] [interface-name] [detail]—Displays end system (ES), intermediate system (IS) and multi-topology IS-IS(M-ISIS) neighbors. This command displays the adjacency learned through multitopology IS-IS for IPv6. • show clns is-neighbors [interface-name] [detail] —Displays IS-IS information fo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,137
History for IS-IS Table 42: Feature History for IS-IS Platform Feature Information Releases Feature Name The ASA now supportsthe IntermediateSystem to Intermediate System (IS-IS) routing protocol.Support was added for routing data, performing authentication, and redistributing and monitoring routing information using t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,138
net 49.1234.aaaa.bbbb.cccc.00 interface GigabitEthernet0/0 ipv6 address 2001:192:16:32::1/64 ipv6 router isis Dynamic Routing Within the Same Area iRouter --------(inside G0/1) ASA (G0/0 outside)------------ oRouter ASA Configuration interface GigabitEthernet0/0 nameif outside security-level 0 ip address 192.16.32.1 25...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,139
ipv6 router isis oRouter router isis net 49.1234.2036.2036.2036.00 is-type level-1 metric-style wide Dynamic Routing in More Than One Area iRouter ---------- ASA ------------ oRouter ASA Configuration interface GigabitEthernet0/0 nameif outside security-level 80 ip address 192.16.32.1 255.255.255.0 standby 192.16.32.2 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,140
oRouter interface GigabitEthernet0/0 ip address 192.16.32.3 255.255.255.0 ip router isis ipv6 address 2001:192:16:32::3/64 ipv6 router isis oRouter interface GigabitEthernet0/1 ip address 192.26.32.3 255.255.255.0 ip router isis ipv6 address 2001:192:26:32::3/64 ipv6 router isis oRouter router isis net 49.1234.2036.203...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,141
ipv6 router isis router isis net 49.1234.2005.2005.2005.00 authentication mode md5 authentication key cisco#123 level-2 metric-style wide summary-address 172.16.0.0 255.255.252.0 maximum-paths 5 ! address-family ipv6 unicast redistribute static level-1-2 maximum-paths 6 exit-address-family IOS Configuration iRouter int...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,142
is-type level-1 metric-style wide ASA Configuration router isis net 49.1234.2005.2005.2005.00 authentication mode md5 authentication key cisco#123 level-2 metric-style wide summary-address 172.16.0.0 255.255.252.0 maximum-paths 5 ! address-family ipv6 unicast redistribute static level-1-2 maximum-paths 6 exit-address-f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,143
interface GigabitEthernet0/1 ip address 172.26.32.3 255.255.255.0 ip router isis ipv6 address 2001:172:26:32::3/64 ipv6 router isis iRouter router isis net 49.1234.2035.2035.2035.00 net 49.2001.2035.2035.2035.00 is-type level-2-only metric-style wide oRouter interface GigabitEthernet0/0 ip address 192.16.32.3 255.255.2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,144
authentication mode md5 authentication key cisco#123 level-2 metric-style wide summary-address 172.16.0.0 255.255.252.0 redistribute static maximum-paths 5 address-family ipv6 unicast maximum-paths 6 exit-address-family Passive Interfaces iRouter ---------- ASA ------------ oRouter ASA Configuration interface GigabitEt...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,145
iRouter router isis net 49.1234.2035.2035.2035.00 net 49.2001.2035.2035.2035.00 is-type level-2-only metric-style wide oRouter interface GigabitEthernet0/0 ip address 192.16.32.3 255.255.255.0 ip router isis ipv6 address 2001:192:16:32::3/64 ipv6 router isis oRouter interface GigabitEthernet0/1 ip address 192.26.32.3 2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,146
ip router isis ipv6 address 2001:172:16:32::3/64 ipv6 enable ipv6 router isis isis authentication mode md5 isis authentication key-chain KeyChain level-2 isis priority 120 isis ipv6 metric 600 iRouter key chain KeyChain key 1 key-string cisco#123 iRouter router isis net 49.1234.2035.2035.2035.00 net 49.2001.2035.2035.2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,147
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1088 IP Routing Examples for IS-IS
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,148
CHAPTER 35 EIGRP This chapter describes how to configure the ASA to route data, perform authentication, and redistribute routing information using the Enhanced Interior Gateway Routing Protocol (EIGRP). • About EIGRP, on page 1089 • Guidelines for EIGRP, on page 1090 • Configure EIGRP, on page 1091 • Customize EIGRP, o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,149
Once this neighbor relationship is established, routing updates are not exchanged unless there is a change in the network topology. The neighbor relationship is maintained through the hello packets. Each hello packet received from a neighbor includes a hold time. This is the time in which the ASA can expect to receive ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,150
IPv6 Guidelines Does not support IPv6. Context Guidelines • EIGRP instances cannot form adjacencies with each other across shared interfaces because, by default, inter-context exchange of multicast traffic is not supported across shared interfaces. However, you can use the static neighbor configuration under EIGRP proc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,151
router eigrp as-num Example: ciscoasa(config)# router eigrp 2 To enable EIGRP IPv6 routing process, enter the following command: The as-num argument is the autonomous system number of the EIGRP routing process. Step 2 Configure the interfaces and networks that participate in EIGRP routing: network ip-addr [mask] Exampl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,152
ciscoasa(config)# router eigrp 2 The as-num argument is the autonomous system number of the EIGRP routing process. Step 2 Configure the interfaces and networks that participate in EIGRP routing: network ip-addr [mask] Example: ciscoasa(config)# router eigrp 2 ciscoasa(config-router)# network 10.0.0.0 255.0.0.0 You can ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,153
The Network table displays the networks configured for the EIGRP routing process. Each row of the table displays the network address and associated mask configured for the specified EIGRP routing process. Procedure Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process: router...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,154
The as-num argument is the autonomous system number of the EIGRP routing process. Step 2 Configure the interfaces and networks that participate in EIGRP routing: network ip-addr [mask] Example: ciscoasa(config)# router eigrp 2 ciscoasa(config-router)# network 10.0.0.0 255.0.0.0 You can configure one or more network sta...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,155
ciscoasa(config-if)# delay 200 The value argument entered is in tens of microseconds. To set the delay for 2000 microseconds, enter a value of 200. To view the delay value assigned to an interface, use the show interface command. For more information, see Change the Interface Delay Value, on page 1098. Step 6 Change th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,156
ciscoasa(config)# router eigrp 2 ciscoasa(config-router)# network 10.0.0.0 255.0.0.0 Directly connected and static networks that fall within the defined network are advertised by the ASA. Additionally, only interfaces with an IP address that fall within the defined network participate in the EIGRP routing process. If y...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,157
By default, EIGRP summary addresses that you define have an administrative distance of 5. You can change this value by specifying the optional distance argument in the summary-address command. Change the Interface Delay Value The interface delay value is used in EIGRPdistance calculations. You can modify this value on ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,158
Procedure Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process: router eigrp as-num Example: ciscoasa(config)# router eigrp 2 The as-num argument is the autonomous system number of the EIGRP routing process. Step 2 Configure the interfaces and networks that participate in EI...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,159
authentication key eigrp as-num key key-id key-id Example: ciscoasa(config)# authentication key eigrp 2 cisco key-id 200 • The as-num argument is the autonomous system number of the EIGRP routing process configured on the ASA. If EIGRP is not enabled or if you enter the wrong number, the ASA returns the following error...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,160
ciscoasa(config-router)# neighbor 10.0.0.0 interface interface1 The ip-addr argument is the IP address of the neighbor. The if-name argument is the name of the interface, as specified by the nameif command, through which that neighbor is available. You can define multiple neighbors for an EIGRP routing process. You mus...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,161
redistribute connected [metric bandwidth delay reliability loading mtu] [route-map map_name] Example: ciscoasa(config-router): redistribute connected [metric bandwidth delay reliability loading mtu] [route-map map_name] You must specify the EIGRP metric values in the redistribute command if you do not have a default-me...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,162
Procedure Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process: router eigrp as-num Example: ciscoasa(config)# router eigrp 2 The as-num argument is the autonomous system number of the EIGRP routing process. Step 2 Configure the interfaces and networks that participate in EI...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,163
Customize the EIGRP Hello Interval and Hold Time The ASA periodically sends hello packets to discover neighbors and to learn when neighbors become unreachable or inoperative. By default, hello packets are sent every 5 seconds. The hello packet advertises the ASA hold time. The hold time indicates to EIGRP neighbors the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,164
prevent the possibility of traffic being routed to the wrong location, you should disable automatic route summarization on the routers creating the conflicting summary addresses. Procedure Step 1 Create an EIGRP routing process and enter router configuration mode for this EIGRP process: router eigrp as-num Example: cis...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,165
ciscoasa(config)# router eigrp 2 ciscoasa(config-router)# network 10.0.0.0 255.0.0.0 You can configure one or more network statements with this command. Directly connected and static networks that fall within the defined network are advertised by the ASA. Additionally, only interfaces with an IP address that fall withi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,166
ciscoasa(config)# interface phy_if Step 2 Disable the split horizon: no split-horizon eigrp as-number Example: ciscoasa(config-if)# no split-horizon eigrp 2 Restart the EIGRP Process You can restart an EIGRP process or clear redistribution or clear counters. Procedure Restart an EIGRP process or clear redistribution or...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,167
• show eigrp [as-number] topology [ip-addr [mask] | active | all-links | pending | summary | zero-successors] Displays the EIGRP topology table. • show eigrp [as-number] traffic Displays EIGRP traffic statistics. • show mfib cluster Displays MFIB information in terms of forwarding entries and interfaces. • show route c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,168
Procedure Step 1 To enable EIGRP, enter the following commands: ciscoasa(config)# router eigrp 2 ciscoasa(config-router)# network 10.0.0.0 255.0.0.0 Step 2 To configure an interface from sending or receiving EIGRP routing messages, enter the following command: ciscoasa(config-router)# passive-interface {default} Step 3...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,169
Platform Feature Information Releases Feature Name For EIGRP, bulk synchronization, route synchronization, and layer 2 load balancing are supported in the clustering environment. We introduced or modified the following commands: show route cluster, debug route cluster, show mfib cluster, debug mfib cluster. Clustering ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,170
CHAPTER 36 Multicast Routing This chapter describes how to configure the ASA to use the multicast routing protocol. • About Multicast Routing, on page 1111 • Guidelines for Multicast Routing, on page 1114 • Enable Multicast Routing, on page 1115 • Customize Multicast Routing, on page 1115 • Monitoring for PIM, on page ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,171
multicast data. When configured for stub multicast routing, the ASA cannot be configured for PIM sparse or bidirectional mode. You must enable PIM on the interfaces participating in IGMP stub multicast routing. The ASA supports both PIM-SM and bidirectional PIM. PIM-SM is a multicast routing protocol that uses the unde...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,172
PIM Bootstrap Router (BSR) Terminology The following terms are frequently referenced in the PIM BSR configuration: • Bootstrap Router (BSR) — A BSR advertises Rendezvous Point (RP) information to other routers with PIM on a hop-by-hop basis. Among multiple Candidate-BSRs, a single BSR is chosen after an election proces...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,173
Clustering Multicast routing supports clustering. InSpanned EtherChannel clustering, the control unitsends all multicast routing packets and data packets until fast-path forwarding is established. After fast-path forwarding is established, data units may forward multicast data packets. All data flows are full flows. St...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,174
Enable Multicast Routing Enabling multicast routing on the ASA, enables IGMP and PIM on all data interfaces by default, but not on the management interface for most models (see Management Slot/Port Interface, on page 632 for interfaces that do not allow through traffic). IGMP is used to learn whether members of a group...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,175
An ASA acting asthe gateway to the stub area does not need to participate inPIM sparse mode or bidirectional mode. Instead, you can configure it to act as an IGMP proxy agent and forward IGMP messages from hosts connected on one interface to an upstream multicast router on another interface. To configure the ASA as an ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,176
Configure IGMP Features IP hosts use IGMP to report their group memberships to directly-connected multicast routers. IGMP is used to dynamically register individual hosts in a multicast group on a particular LAN. Hosts identify group memberships by sending IGMP messages to their local multicast router. Under IGMP, rout...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,177
ciscoasa(config-if)# igmp join-group mcast-group The group-address argument is the IP address of the group. The igmpjoin-groupcommand enablesPIM to send Join requeststowardsthe sources or towards the Rendezvous Point (RP), provided, the firewall with this command is the PIM Designated Router (DR) on that interface wher...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,178
ciscoasa(config)# access-list acl1 standard permit 192.52.662.25 You can create more than one entry for a single ACL. You can use extended or standard ACLs. The ip_addr mask argument is the IP address of the multicast group being permitted or denied. Step 2 Create an extended ACL:’ access-list name extended [permit | d...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,179
When you change the IGMP limit on the interface with active joins on it, the new limit is not applicable to the existing groups. ASA validates the limit only when a new group is added to the interface or when the IGMP join timers expire. To apply the new limit with immediate effect, you must disenable and re-enable IGM...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,180
ciscoasa(config-if)# igmp query-timeout 30 Valid values range from 60 to 300; 225 is the default value. Step 3 Change the maximum query response time: igmp query-max-response-time seconds Valid values range from 1 to 25; 10 is the default value. Example: ciscoasa(config-if)# igmp query-max-response-time 20 Change the I...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,181
Enable and Disable PIM on an Interface You can enable or disable PIM on specific interfaces. Procedure Step 1 Enable or reenable PIM on a specific interface: pim Example: ciscoasa(config-if)# pim Step 2 Disable PIM on a specific interface: no pim Example: ciscoasa(config-if)# no pim Note Only the no pim command appears...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,182
The ASA always advertises the bidirectional capability in the PIM hello messages, regardless of the actual bidirectional configuration. Note Example: ciscoasa(config)# pim rp-address 10.86.75.23 [acl1] [bidir] Configure the Designated Router Priority The DR is responsible for sending PIM register, join, and prune messa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,183
Configure PIM Message Intervals Router query messages are used to select the PIM DR. The PIM DR is responsible for sending router query messages. By default, router query messages are sent every 30 seconds. Additionally, every 60 seconds, the ASA sends PIM join or prune messages. Procedure Step 1 Send router query mess...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,184
Step 2 Filter neighbor routers: pim neighbor-filter pim_nbr Example: ciscoasa(config)# interface GigabitEthernet0/3 ciscoasa(config-if)# pim neighbor-filter pim_nbr In the example, the 10.1.1.1 router is prevented from becoming aPIM neighbor on interface GigabitEthernet0/3. Configure a Bidirectional Neighbor Filter The...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,185
In the example, the following ACL, when used with the pim neighbor-filter command, prevents the 10.1.1.1 router from becoming a PIM neighbor. Step 2 Filter neighbor routers: pim bidirectional-neighbor-filter pim_nbr Example: ciscoasa(config)# interface GigabitEthernet0/3 ciscoasa(config-if)# pim bidirectional neighbor-...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,186
You can set up an administratively scoped boundary on an interface for multicast group addresses. IANA has designated the multicast address range from 239.0.0.0 to 239.255.255.255 as the administratively scoped addresses. This range of addresses can be reused in domains administered by different organizations. The addr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,187
Displays the group-to-PIM mode mapping. To display the elected RP for a group, specify the group address or name. • show pim group-map rp-timers Displays the timer expiry and uptime for each group to PIM mode mapping entry. • show pim neighbor Displays the Protocol Independent Multicast (PIM) neighbors. Example for Mul...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,188
Platform Feature Information Releases Feature Name Support was added to allow PIM-SSM packets to pass through when multicast routing is enabled, unless the ASA is the Last-Hop Router. This allows greater flexibility in choosing a multicast group while also protecting against different attacks; hosts only receive traffi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,189
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1130 IP Routing History for Multicast Routing
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,190
P ART VI AAA Servers and the Local Database • AAA and the Local Database, on page 1133 • RADIUS Servers for AAA, on page 1145 • TACACS+ Servers for AAA, on page 1165 • LDAP Servers for AAA, on page 1171 • Kerberos Servers for AAA, on page 1183 • RSA SecurID Servers for AAA, on page 1191
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,191
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,192
CHAPTER 37 AAA and the Local Database This chapter describes authentication, authorization, and accounting (AAA, pronounced “triple A”). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing usage, and providing the information necessary to bill for services. These proce...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,193
• The enable command • Network access • VPN access Authorization Authorization is the process of enforcing policies: determining what types of activities, resources, or services a user is permitted to access. After a user is authenticated, that user may be authorized for different types of access or activity. You can c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,194
• Configure RSA SecurID AAA Server Groups, on page 1192 See the VPN configuration guide for more information on using Kerberos Constrained Delegation and HTTP Form. The following table summarizes the supported types of server and their uses, including the local database. Table 45: Supported Services for AAA Servers Ser...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,195
Server Type and Service Authentication Authorization Accounting Firewall Sessions (AAA rules) Yes No No HTTP Form Administrators No No No VPN Users Yes No No Firewall Sessions (AAA rules) No No No Notes • RADIUS—Accounting for administrators does not include command accounting. • RADIUS—Authorization for firewall sessi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,196
Note You cannot use the local database for network access authorization. Fallback Support The local database can act as a fallback method for several functions. This behavior is designed to help you prevent accidental lockout from the ASA. When a user logs in, the servers in the group are accessed one at a time, starti...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,197
Guidelines for the Local Database Make sure that you prevent a lockout from the ASA when using the local database for authentication or authorization. Add a User Account to the Local Database To add a user to the local database, perform the following steps: Procedure Step 1 Create the user account. username username [p...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,198
The encrypted keyword (for passwords 32 characters and fewer in 9.6 and earlier) or the pbkdf2 keyword (for passwordslonger than 32 charactersin 9.6 and later, and passwords of all lengthsin 9.7 and later) indicates that the password is encrypted (using an MD5-based hash or a PBKDF2 (Password-Based Key Derivation Funct...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,199
Step 5 (Optional) If you are using this username for VPN authentication, you can configure many VPN attributes for the user. See the VPN configuration guide for more information. Examples The following example assigns a privilege level of 15 to the admin user account: ciscoasa(config)# username admin password farscape1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,200
History for the Local Database Table 46: History for the Local Database Platform Description Releases Feature Name Describes how to configure the local database for AAA use. We introduced the following commands: username, aaa authorization exec authentication-server, aaa authenticationconsole LOCAL, aaa authorizationex...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,201
Platform Description Releases Feature Name Localusername and enable passwords of all lengths are stored in the configuration using a PBKDF2 (Password-Based Key Derivation Function 2) hash. Previously, passwords 32 characters and shorter used the MD5-based hashing method. Already existing passwords continue to use the M...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,202
Platform Description Releases Feature Name The ASA can lock out local users after a configurable number of failed login attempts. This feature did not apply to users with privilege level 15. Also, a user would be locked out indefinitely until an admin unlocked their account. Now, users will be unlocked after 10 minutes...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,203
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 1144 AAA Servers and the Local Database History for the Local Database
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,204
CHAPTER 38 RADIUS Servers for AAA This chapter describes how to configure RADIUS servers for AAA. • About RADIUS Servers for AAA, on page 1145 • Guidelines for RADIUS Servers for AAA, on page 1156 • Configure RADIUS Servers for AAA, on page 1156 • Monitoring RADIUS Servers for AAA, on page 1163 • History for RADIUS Ser...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,205
To enable MS-CHAPv2 as the protocol used between the ASA and the RADIUS server for a VPN connection, password management must be enabled in the tunnel group general attributes. Enabling password management generates an MS-CHAPv2 authentication request from the ASA to the RADIUS server. See the description of the passwo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,206
RADIUS attribute names do not contain the cVPN3000 prefix. Cisco Secure ACS 4.x supports this new nomenclature, but attribute names in pre-4.0 ACS releases still include the cVPN3000 prefix. The ASAs enforce the RADIUS attributes based on attribute numeric ID, not attribute name. All attributes listed in the following ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,207
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA Client-Type-Version-Limiting Y 77 String Single IPsec VPN version number string DHCP-Network-Scope Y 61 String Single IP Address Extended-Authentication-On-Rekey Y 122 Integer Single 0 = Disabled 1 = Enabled Assigned IPv6 interface ID....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,208
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA 0 = None 1 = RADIUS 2 = LDAP (authorization only) 3 = NT Domain 4 = SDI 5 = Internal 6 = RADIUS with Expiry 7 = Kerberos/Active Directory IPsec-Authentication 13 Integer Single IPsec-Auth-On-Rekey Y 42 Boolean Single 0 = Disabled 1 = E...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,209
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA Bitmap: 1 = Encryption required 2 = 40 bits 4 = 128 bits 8 = Stateless-Req 15= 40/128-Encr/Stateless-Req L2TP-Encryption 21 Integer Single L2TP-MPPC-Compression 38 Integer Single 0 = Disabled 1 = Enabled Comma-delimited string, for exa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,210
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA Cisco Systems Products: 1 = Cisco Intrusion Prevention Security Agent or Cisco Integrated Client (CIC) Zone LabsProducts: 1 = Zone Alarm 2 = Zone AlarmPro 3 = Zone Labs Integrity NetworkICE Product: 1 = BlackIce Defender/Agent Sygate P...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,211
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA SVC-DTLS Y 123 Integer Single 0 = False 1 = True SVC-Keepalive Y 107 Integer Single 0 = Off 15-600 seconds SVC-Modules Y 127 String Single String (name of a module) SVC-MTU Y 125 Integer Single MTU value 256-1406 in bytes SVC-Profiles ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,212
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA Comma-separated DNS/IP with an optional wildcard (*) (for example *.cisco.com, 192.168.1.*, wwwin.cisco.com) WebVPN-Group-based-HTTP/HTTPS-Proxy-Exception-List Y 78 String Single WebVPN-Hidden-Shares Y 126 Integer Single 0 = None 1 = V...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,213
Single or Description or Value Multi-Valued Attr. Syntax/Type No. Attribute Name ASA One of “e networkname,” “i networkname,” or “a,” where networkname is the name of aSmart Tunnel network list, e indicates the tunnel excluded, i indicates the tunnel specified, and a indicates all tunnels. WebVPN-Smart-Tunnel-Tunnel-Po...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,214
Table 48: Supported IETF RADIUS Attributes Single or Multi- Description or Value Valued Attr. Syntax/Type No. Attribute Name ASA For Versions 8.2.x and later, we recommend that you use the Group-Policy attribute (VSA 3076, #25): • group policy name • OU=group policy name • OU=group policy name IETF-Radius-Class Y 25 Si...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,215
Disconnect Reason Code ACCT_DISC_PORT_ERROR = 8 ACCT_DISC_NAS_ERROR = 9 ACCT_DISC_NAS_REQUEST = 10 ACCT_DISC_NAS_REBOOT = 11 ACCT_DISC_PORT_UNNEEDED = 12 ACCT_DISC_PORT_PREEMPTED = 13 ACCT_DISC_PORT_SUSPENDED = 14 ACCT_DISC_SERV_UNAVAIL = 15 ACCT_DISC_CALLBACK = 16 ACCT_DISC_USER_ERROR = 17 ACCT_DISC_HOST_REQUEST = 18 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,216
• If you are using Cisco ACS: the server already has these attributes integrated. You can skip this step. • For RADIUS servers from other vendors (for example, Microsoft Internet Authentication Service): you must manually define each ASA attribute. To define an attribute, use the attribute name or number, type, value, ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,217
• depletion [deadtime minutes] reactivates failed servers only after all of the servers in the group are inactive. This is the default reactivation mode. You can specify the amount of time, between 0 and 1440 minutes, that elapses between the disabling of the last server in the group and the subsequent reenabling of al...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,218
When you use the server group in a VPN tunnel, the RADIUS server group will be registered for CoA notification and the ASA will listen to the port for the CoA policy updates from ISE. Enable dynamic authorization only if you are using this server group in a remote access VPN in conjunction with ISE. Example: ciscoasa(c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,219
ciscoasa(config)# aaa-server AuthOutbound protocol radius ciscoasa(config-aaa-server-group)# exit ciscoasa(config)# aaa-server AuthOutbound (inside) host 10.1.1.3 ciscoasa(config-aaa-server-host)# key RadUauthKey ciscoasa(config-aaa-server-host)# exit The following example shows how to configure an ISE server group for...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,220
Example: ciscoasa(config-aaa-server-group)# aaa-server servergroup1 outside host 10.10.1.1 If you do not specify an (interface_name), then the ASA uses the inside interface by default. Step 2 Specify how the ASA treats netmasks received in a downloadable ACL from a RADIUS server. acl-netmask-convert {auto-detect | stan...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,221
ciscoasa(config-aaa-server-host)# timeout 15 Step 6 Configure the amount of time between retry attempts for a particular AAA server designated in a previous command. retry-interval seconds Example: ciscoasa(config-aaa-server-host)# retry-interval 8 The seconds argument specifies the retry interval (1-10 seconds) for th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
1,222
ciscoasa(config-aaa-host)# key myexamplekey1 The server secret that you configure should match the one configured on the RADIUS server. If you do not know the server secret value, ask the RADIUS server administrator. The maximum length is 64 characters. Example The following example shows how to add a RADIUS server to ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf