OneStart

Cisco 500 Series manuals

500 Series first page preview

500 Series

Brand: Cisco | Category: Network Router
Table of contents
500 Series first page preview

500 Series

Brand: Cisco | Category: Network Router
Table of contents
500 Series first page preview

500 Series

Brand: Cisco | Category: Controller
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. abbreviations and acronyms
  5. related documentation
  6. System Overview
  7. Chapter 1 Overview
  8. The Cisco 526 Wireless Express Mobility Controller
  9. WLC526 Controller Overview
  10. WLC526 Controller Specifications
  11. Configuration Options
  12. CCA Guide Mode and CCA Expert Mode
  13. Smartport Support for Catalyst Express 500 Series Switches
  14. Using the Command-Line Interface
  15. Access Points
  16. Adding a New Controller
  17. Verifying and Configuring Your Ethernet Adapter
  18. Configuring your Ethernet Adapter to a Static IP Address
  19. Adding LAP521 Access Points
  20. Chapter 3 Creating and Connecting to a Community
  21. Creating a Community
  22. connecting to a community
  23. Connecting To a Community
  24. creating a new wlan
  25. Chapter 4 Creating and Modifying WLAN and VLAN
  26. modify a wlan
  27. Modify a WLAN
  28. adding a vlan
  29. Adding a VLAN
  30. modifying a vlan
  31. Modifying a VLAN
  32. upgrading controller software
  33. Chapter 5 Controller Software Upgrade
  34. Restarting the Controller Using CCA
  35. C H A P T E R 6 Restarting, Resetting, Backing Up, and Restoring the Controller
  36. Backing Up the Controller Configuration
  37. Restoring the Controller Configuration
  38. Manually Restarting the Controller Using the Reset Button
  39. Manually Resetting the Controller to Factory Defaults
  40. adding a guest access vlan
  41. C H A P T E R 7 Adding Guest Access with Web Authentication
  42. creating a new ssid for the guest vlan
  43. Creating a New SSID for the Guest VLAN
  44. adding a guest user
  45. Adding a Guest User
  46. adding an employee access vlan
  47. C H A P T E R 8 Adding Employee Access with Web Authentication
  48. creating a new wlan ssid for the employee vlan
  49. Creating a New WLAN SSID for the Employee VLAN
  50. adding an employee user
  51. Adding an Employee User
  52. C H A P T E R 9 Adding Voice Access with Web Authentication
  53. Adding a Voice-Enabled VLAN
  54. creating a new ssid for the voice vlan
  55. Creating a New SSID for the Voice VLAN
  56. Overview
  57. A P P E N D I X A Configuring DHCP Option 43 for Cisco 520 Series Access Points
  58. Appendix B Converting an Autonomou Acces Point
  59. using cca to convert an ap521 access point
  60. Using CCA to Convert an AP521 Access Point
  61. deployment recommendations
  62. A P P E N D I X C Deployment Recommendations and Feature List
  63. Software Feature List for the WLC526 Controller
500 Series first page preview

500 Series

Brand: Cisco | Category: Security System
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. Table Of Contents
  22. Table Of Contents
  23. Table Of Contents
  24. Table Of Contents
  25. Table Of Contents
  26. Table Of Contents
  27. Table Of Contents
  28. Table Of Contents
  29. Table Of Contents
  30. Table Of Contents
  31. Table Of Contents
  32. Table Of Contents
  33. Table Of Contents
  34. Table Of Contents
  35. Table Of Contents
  36. about this guide
  37. related documentation
  38. document conventions
  39. introduction to the security appliance
  40. security policy overview
  41. applying http, https, or ftp filtering
  42. vpn functional overview
  43. intrusion prevention services functional overview
  44. getting started
  45. restoring the factory default configuration
  46. asa 5510 and higher default configuration
  47. pix 515/515e default configuration
  48. setting transparent or routed firewall mode
  49. working with the configuration
  50. saving configuration changes in single context mode
  51. copying the startup configuration to the running configuration
  52. clearing and removing configuration settings
  53. how the security appliance classifies packets
  54. invalid classifier criteria
  55. classification examples
  56. cascading security contexts
  57. management access to security contexts
  58. context administrator access
  59. restoring single context mode
  60. interface overview
  61. understanding asa 5505 ports and interfaces
  62. default interface configuration
  63. configuring a switch port as a trunk port
  64. allowing communication between vlan interfaces on the same security level
  65. configuring ethernet settings, redundant interfaces, and subinterfaces
  66. configuring and enabling fiber interfaces
  67. configuring the fiber interface
  68. redundant interface overview
  69. adding a redundant interface
  70. changing the active interface
  71. maximum subinterfaces
  72. resource limits
  73. class members
  74. configuring a security context
  75. automatically assigning mac addresses to context interfaces
  76. changing between contexts and the system execution space
  77. changing the admin context
  78. reloading a security context
  79. reloading by removing and re-adding the context
  80. viewing resource allocation
  81. viewing resource usage
  82. monitoring syn attacks in contexts
  83. configuring interface parameters
  84. interface parameters overview
  85. default state of interfaces
  86. allowing communication between interfaces on the same security level
  87. configuring basic settings
  88. setting the date and time
  89. setting the time zone and daylight saving time date range
  90. setting the date and time using an ntp server
  91. setting the management ip address for a transparent firewall
  92. configuring ip routing
  93. configuring a static route
  94. configuring a default static route
  95. configuring static route tracking
  96. defining route maps
  97. configuring ospf
  98. ospf overview
  99. redistributing routes into ospf
  100. configuring ospf interface parameters
  101. configuring ospf area parameters
  102. configuring route summarization between ospf areas
  103. defining static ospf neighbors
  104. configuring route calculation timers
  105. displaying ospf update packet pacing
  106. restarting the ospf process
  107. redistributing routes into the rip routing process
  108. enabling rip authentication
  109. configuring eigrp
  110. enabling and configuring eigrp routing
  111. enabling and configuring eigrp stub routing
  112. enabling eigrp authentication
  113. defining an eigrp neighbor
  114. configuring the eigrp hello interval and hold time
  115. configuring summary aggregate addresses
  116. changing the interface delay value
  117. disabling neighbor change and warning message logging
  118. how the routing table is populated
  119. backup routes
  120. dynamic routing and failover
  121. configuring dhcp, ddns, and wccp services
  122. enabling the dhcp server
  123. configuring dhcp options
  124. using cisco ip phones with a dhcp server
  125. configuring dhcp relay services
  126. configuring dynamic dns
  127. example 1: client updates both a and ptr rrs for static ip addresses
  128. example 5: client updates a rr; server updates ptr rr
  129. wccp interaction with other features
  130. configuring multicast routing
  131. enabling multicast routing
  132. disabling igmp on an interface
  133. limiting the number of igmp states on an interface
  134. changing the query response time
  135. configuring pim features
  136. configuring a static rendezvous point address
  137. configuring pim message intervals
  138. supporting mixed bidirctional/sparse-mode pim networks
  139. for more information about multicast routing
  140. configuring ipv6 on an interface
  141. configuring a dual ip stack on an interface
  142. configuring ipv6 default and static routes
  143. configuring ipv6 access lists
  144. configuring ipv6 neighbor discovery
  145. configuring router advertisement messages
  146. configuring a static ipv6 neighbor
  147. the show ipv6 route command
  148. configuring aaa servers and the local database
  149. about authentication
  150. aaa server and local database support
  151. radius server support
  152. sdi server support
  153. ldap server support
  154. fallback support
  155. identifying aaa server groups and servers
  156. configuring an ldap server
  157. authorization with ldap for vpn
  158. using certificates and user login credentials
  159. supporting a zone labs integrity server
  160. configuring integrity server support
  161. hardware requirements
  162. the failover and stateful failover links
  163. stateful failover link
  164. active/active and active/standby failover
  165. determining which type of failover to use
  166. failover health monitoring
  167. unit health monitoring
  168. failover feature/platform matrix
  169. failover configuration limitations
  170. configuring lan-based active/standby failover
  171. configuring optional active/standby failover settings
  172. configuring active/active failover
  173. configuring lan-based active/active failover
  174. configuring optional active/active failover settings
  175. configuring unit health monitoring
  176. verifying the failover configuration
  177. viewing monitored interfaces
  178. testing the failover functionality
  179. disabling failover
  180. failover system messages
  181. changing command modes
  182. security considerations
  183. monitoring the auto update process
  184. routed mode overview
  185. an outside user visits a web server on the dmz
  186. an inside user visits a web server on the dmz
  187. a dmz user attempts to access an inside host
  188. transparent firewall network
  189. mac address vs. route lookups
  190. using the transparent firewall in your network
  191. unsupported features in transparent mode
  192. an inside user visits a web server using nat
  193. access list types
  194. access control implicit deny
  195. adding an extended access list
  196. allowing broadcast and multicast traffic through the transparent firewall
  197. adding an ethertype access list
  198. implicit permit of ip and arps only
  199. adding an ethertype ace
  200. adding a webtype access list
  201. adding object groups
  202. adding a network object group
  203. adding an icmp type object group
  204. nesting object groups
  205. using object groups with an access list
  206. displaying object groups
  207. scheduling extended access list activation
  208. applying the time range to an ace
  209. configuring logging for an access control entry
  210. managing deny flows
  211. nat overview
  212. nat in routed mode
  213. nat in transparent mode
  214. nat control
  215. nat types
  216. bypassing nat when nat control is enabled
  217. nat and same security level interfaces
  218. order of nat commands used to match real addresses
  219. dns and nat
  220. configuring nat control
  221. configuring dynamic nat or pat
  222. using static nat
  223. using static pat
  224. configuring static identity nat
  225. configuring nat exemption
  226. nat examples
  227. redirecting ports
  228. permitting or denying network access
  229. applying an access list to an interface
  230. applying aaa for network access
  231. authentication overview
  232. static pat and http
  233. enabling secure authentication of web clients
  234. authenticating directly with the security appliance
  235. enabling direct authentication using telnet
  236. configuring authorization for network access
  237. configuring radius authorization
  238. configuring a radius server to download per-user access control list names
  239. using mac addresses to exempt traffic from authentication and authorization
  240. applying filtering services
  241. filtering activex objects
  242. filtering java applets
  243. filtering urls and ftp requests with an external server
  244. buffering the content server response
  245. filtering http urls
  246. exempting traffic from filtering
  247. filtering ftp requests
  248. viewing filtering server statistics
  249. viewing buffer configuration and statistics
  250. viewing filtering configuration
  251. using modular policy framework
  252. default global policy
  253. creating a layer 3/4 class map for through traffic
  254. creating a layer 3/4 class map for management traffic
  255. configuring special actions for application inspections
  256. creating a regular expression class map
  257. identifying traffic in an inspection class map
  258. defining actions in an inspection policy map
  259. defining actions using a layer 3/4 policy map
  260. policy map guidelines
  261. feature matching guidelines within a policy map
  262. order in which multiple feature actions are applied
  263. modular policy framework examples
  264. applying inspection to http traffic globally
  265. applying inspection and connection limits to http traffic to specific servers
  266. applying inspection to http traffic with nat
  267. managing the aip ssm and csc ssm
  268. how the aip ssm works with the adaptive security appliance
  269. using virtual sensors
  270. aip ssm procedure overview
  271. sessioning to the aip ssm
  272. configuring the security policy on the aip ssm
  273. diverting traffic to the aip ssm
  274. managing the csc ssm
  275. about the csc ssm
  276. getting started with the csc ssm
  277. limiting connections through the csc ssm
  278. diverting traffic to the csc ssm
  279. checking ssm status
  280. transferring an image onto an ssm
  281. basic threat detection overview
  282. managing basic threat statistics
  283. configuring scanning threat detection
  284. managing shunned hosts
  285. viewing attackers and targets
  286. viewing threat statistics
  287. configuring tcp normalization
  288. configuring connection limits and timeouts
  289. dead connection detection overview
  290. preventing ip spoofing
  291. configuring the fragment size
  292. configuring ip audit for basic ips support
  293. qos concepts
  294. identifying traffic for qos
  295. defining a qos policy map
  296. applying rate limiting
  297. activating the service policy
  298. applying low latency queueing
  299. reducing queue latency
  300. viewing qos configuration
  301. viewing qos policy map configuration
  302. viewing qos priority queue statistics
  303. inspection engine overview
  304. inspection limitations
  305. configuring application inspection
  306. ctiqbe inspection
  307. verifying and monitoring ctiqbe inspection
  308. dcerpc inspection
  309. dns inspection
  310. how dns application inspection works
  311. configuring dns rewrite
  312. using the static command for dns rewrite
  313. dns rewrite with three nat zones
  314. configuring dns rewrite with three nat zones
  315. verifying and monitoring dns inspection
  316. configuring a dns inspection policy map for additional inspection control
  317. esmtp inspection
  318. configuring an ftp inspection policy map for additional inspection control
  319. verifying and monitoring ftp inspection
  320. configuring a gtp inspection policy map for additional inspection control
  321. verifying and monitoring gtp inspection
  322. h.323 inspection overview
  323. configuring an h.323 inspection policy map for additional inspection control
  324. configuring h.323 and h.225 timeout values
  325. monitoring h.245 sessions
  326. monitoring h.323 ras sessions
  327. configuring an http inspection policy map for additional inspection control
  328. im inspection overview
  329. icmp inspection
  330. mgcp inspection overview
  331. configuring an mgcp inspection policy map for additional inspection control
  332. configuring mgcp timeout values
  333. netbios inspection
  334. pptp inspection
  335. configuring a radius inspection policy map for additional inspection control
  336. using realplayer
  337. configuring an rtsp inspection policy map for additional inspection control
  338. configuring a sip inspection policy map for additional inspection control
  339. configuring sip timeout values
  340. verifying and monitoring sip inspection
  341. sccp inspection overview
  342. verifying and monitoring sccp inspection
  343. smtp and extended smtp inspection
  344. snmp inspection
  345. sql*net inspection
  346. sun rpc inspection overview
  347. verifying and monitoring sun rpc inspection
  348. tftp inspection
  349. maximum tls proxy sessions
  350. configuring tls proxy
  351. debugging tls proxy
  352. ctl client
  353. xdmcp inspection
  354. configuring arp inspection
  355. adding a static arp entry
  356. customizing the mac address table
  357. setting the mac address timeout
  358. configuring vpn
  359. ipsec overview
  360. configuring isakmp policies
  361. enabling isakmp on the outside interface
  362. enabling ipsec over tcp
  363. waiting for active sessions to terminate before rebooting
  364. creating a certificate group matching rule and policy
  365. using the tunnel-group-map default-group command
  366. understanding transform sets
  367. changing ipsec sa lifetimes
  368. using dynamic crypto maps
  369. providing site-to-site redundancy
  370. clearing security associations
  371. supporting the nokia vpn client
  372. configuring l2tp over ipsec
  373. ipsec transport and tunnel modes
  374. configuring l2tp over ipsec connections
  375. tunnel group switching
  376. using l2tp debug commands
  377. enabling ipsec debug
  378. setting general ipsec vpn parameters
  379. permitting intra-interface traffic
  380. nat considerations for intra-interface traffic
  381. understanding load balancing
  382. implementing load balancing
  383. some typical mixed cluster scenarios
  384. configuring load balancing
  385. configuring the load balancing cluster attributes
  386. enabling redirection using a fully-qualified domain name
  387. configuring vpn session limits
  388. configuring connection profiles, group policies, and users
  389. connection profiles
  390. general connection profile connection parameters
  391. ipsec tunnel-group connection parameters
  392. connection profile connection parameters for clientless ssl vpn sessions
  393. configuring connection profiles
  394. configuring ipsec tunnel-group general attributes
  395. configuring ipsec remote-access connection profile general attributes
  396. enabling ipv6 vpn access
  397. configuring ipsec remote-access connection profile ipsec attributes
  398. configuring ipsec remote-access connection profile ppp attributes
  399. configuring lan-to-lan connection profiles
  400. default lan-to-lan connection profile configuration
  401. configuring lan-to-lan ipsec attributes
  402. configuring connection profiles for clientless ssl vpn sessions
  403. configuring tunnel-group attributes for clientless ssl vpn sessions
  404. customizing login windows for users of clientless ssl vpn sessions
  405. configuring microsoft active directory settings for password management
  406. using active directory to force the user to change password at next logon
  407. using active directory to specify maximum password age
  408. using active directory to override an account disabled aaa indicator
  409. using active directory to enforce minimum password length
  410. using active directory to enforce password complexity
  411. group policies
  412. default group policy
  413. configuring group policies
  414. configuring an internal group policy
  415. configuring vpn-specific attributes
  416. configuring security attributes
  417. configuring the banner message
  418. configuring ipsec-udp attributes
  419. configuring domain attributes for tunneling
  420. configuring attributes for vpn hardware clients
  421. configuring backup server attributes
  422. configuring microsoft internet explorer client parameters
  423. configuring network admission control parameters
  424. configuring address pools
  425. configuring firewall policies
  426. configuring client access rules
  427. configuring group-policy attributes for clientless ssl vpn sessions
  428. setting a user password and privilege level
  429. configuring vpn user attributes
  430. configuring clientless ssl vpn access for specific users
  431. configuring ip addresses for vpns
  432. configuring dhcp addressing
  433. configuring remote access ipsec vpns
  434. configuring isakmp policy and enabling isakmp on the outside interface
  435. adding a user
  436. creating a dynamic crypto map
  437. creating a crypto map entry to use the dynamic crypto map
  438. configuring network admission control
  439. adding, accessing, or removing a nac policy
  440. configuring a nac policy
  441. setting the revalidation timer
  442. configuring exemptions from nac
  443. assigning a nac policy to a group policy
  444. enabling and disabling clientless authentication
  445. changing nac framework session attributes
  446. configuring easy vpn services on the asa
  447. specifying the primary and secondary servers
  448. configuring automatic xauth authentication
  449. comparing tunneling options
  450. specifying the tunnel group or trustpoint
  451. specifying the trustpoint
  452. configuring split tunneling
  453. configuring remote management
  454. group policy and user attributes pushed to the client
  455. authentication options
  456. configuring the pppoe client
  457. configuring the pppoe client username and password
  458. enabling pppoe
  459. monitoring and debugging the pppoe client
  460. clearing the configuration
  461. configuring lan-to-lan ipsec vpns
  462. configuring an acl
  463. creating a crypto map and applying it to an interface
  464. observing clientless ssl vpn security precautions
  465. understanding features not supported in clientless ssl vpn
  466. configuring clientless ssl vpn and asdm ports
  467. configuring ssl/tls encryption protocols
  468. using single sign-on with clientless ssl vpn
  469. configuring sso authentication using siteminder
  470. configuring sso authentication using saml browser post profile
  471. configuring sso with the http form protocol
  472. creating and applying clientless ssl vpn resources
  473. configuring browser access to client-server plug-ins
  474. about installing browser plug-ins
  475. preparing the security appliance for a plug-in
  476. preparing the citrix metraframe server for clientless ssl vpn access
  477. providing a bookmark and optional sso support for citrix sessions
  478. viewing the plug-ins installed on the security appliance
  479. why port forwarding
  480. adding applications to be eligible for port forwarding
  481. assigning a port forwarding list
  482. enabling and disabling port forwarding
  483. about smart tunnels
  484. adding applications to be eligible for smart tunnel access
  485. assigning a smart tunnel list
  486. enabling and disabling smart tunnel access
  487. recovering from hosts file errors when using application access
  488. configuring file access
  489. using clientless ssl vpn with pdas
  490. configuring e-mail proxies
  491. configuring web e-mail: ms outlook web access
  492. configuring content transformation
  493. using proxy bypass
  494. apcf syntax
  495. apcf example
  496. clientless ssl vpn end user setup
  497. defining the end user interface
  498. viewing the clientless ssl vpn home page
  499. viewing the clientless ssl vpn application access panel
  500. viewing the floating toolbar
  501. how customization works
  502. editing the customization template
  503. importing a customization object
  504. applying customizations to connection profiles, group policies and users
  505. customizing help
  506. customizing a help file provided by cisco
  507. importing a help file to flash memory
  508. communicating security tips
  509. translating the language of user messages
  510. referencing the language in a customization object
  511. changing a group policy or user attributes to use the customization object
  512. using a browser to display capture data
  513. configuring anyconnect vpn client connections
  514. remote pc system requirements
  515. enabling anyconnect client connections
  516. enabling permanent client installation
  517. ensuring reliable dtls connections through third-party firewalls
  518. enabling anyconnect client profile downloads
  519. enabling additional anyconnect client features
  520. enabling start before logon
  521. configuring advanced ssl vpn features
  522. enabling keepalive
  523. using compression
  524. viewing ssl vpn sessions
  525. updating ssl vpn client images
  526. configuring certificates
  527. certificate scalability
  528. about trustpoints
  529. about ocsp
  530. supported ca servers
  531. configuring key pairs
  532. removing key pairs
  533. obtaining certificates
  534. obtaining certificates manually
  535. configuring crls for a trustpoint
  536. exporting and importing trustpoints
  537. exporting a trustpoint configuration
  538. the local ca
  539. configuring the local ca server
  540. customizing the local ca server
  541. certificate characteristics
  542. defining storage for local ca files
  543. setting up external local ca file storage
  544. crl downloading
  545. setting up enrollment parameters
  546. enrollment requirements
  547. starting and stopping the local ca server
  548. debugging the local ca server
  549. adding and enrolling users
  550. renewing users
  551. revocation checking
  552. display the local ca certificate
  553. display the user database
  554. local ca server maintenance and backup procedures
  555. local ca certificate rollover
  556. managing system access
  557. allowing ssh access
  558. using an ssh client
  559. enabling https access
  560. configuring aaa for system administrators
  561. configuring authentication to access privileged exec mode (the enable command)
  562. authenticating users using the login command
  563. configuring command authorization
  564. command authorization overview
  565. configuring local command authorization
  566. configuring tacacs+ command authorization
  567. configuring command accounting
  568. recovering from a lockout
  569. configuring a login banner
  570. managing software, licenses, and configurations
  571. entering a new activation key
  572. downloading software or configuration files to flash memory
  573. downloading a file to the startup or running configuration
  574. configuring the application image and asdm image to boot
  575. configuring the file to boot as the startup configuration
  576. upgrading an active/standby failover configuration
  577. backing up configuration files
  578. backing up a context configuration in flash memory
  579. using a script to back up and restore files
  580. running the script
  581. configuring auto update support
  582. configuring communication with an auto update server
  583. configuring client updates as an auto update server
  584. viewing auto update status
  585. monitoring the security appliance
  586. enabling snmp
  587. configuring and managing logs
  588. enabling and disabling logging
  589. configuring log output destinations
  590. sending system log messages to the console port
  591. sending system log messages to an e-mail address
  592. sending system log messages to asdm
  593. sending system log messages to a telnet or ssh session
  594. sending system log messages to the log buffer
  595. filtering system log messages
  596. filtering system log messages by class
  597. filtering system log messages with custom message lists
  598. customizing the log configuration
  599. including the date and time in system log messages
  600. generating system log messages in emblem format
  601. changing the severity level of a system log message
  602. changing the amount of internal flash memory available for logs
  603. understanding system log messages
  604. testing your configuration
  605. pinging security appliance interfaces
  606. pinging through the security appliance
  607. disabling the test configuration
  608. packet tracer
  609. recovering passwords for the asa 5500 series adaptive security appliance
  610. recovering passwords for the pix 500 series security appliance
  611. disabling password recovery
  612. resetting the password on the ssm hardware module
  613. erasing the flash file system
  614. common problems
  615. cisco vpn client support
  616. cryptographic standards
  617. example 1: system configuration
  618. example 1: admin context configuration
  619. example 1: customer c context configuration
  620. example 2: single mode firewall using same security level
  621. example 3: department 1 context configuration
  622. example 3: department 2 context configuration
  623. example 4: multiple mode, transparent firewall with outside access
  624. example 4: system configuration
  625. example 4: admin context configuration
  626. example 4: customer a context configuration
  627. example 4: customer c context configuration
  628. example 6: ipv6 configuration
  629. example 7: cable-based active/standby failover (routed mode)
  630. example 8: lan-based active/standby failover (routed mode)
  631. example 8: secondary unit configuration
  632. example 9: primary unit configuration
  633. example 9: primary admin context configuration
  634. example 9: primary ctx1 context configuration
  635. example 11: primary unit configuration
  636. example 11: secondary unit configuration
  637. example 12: primary unit configuration
  638. example 12: primary system configuration
  639. example 12: primary ctx1 context configuration
  640. example 13: dual isp support using static route tracking
  641. example 14: asa 5505 base license
  642. example 15: primary unit configuration
  643. example 15: secondary unit configuration
  644. using the command-line interface
  645. command modes and prompts
  646. command completion
  647. automatic text entries
  648. ipv6 address types
  649. multicast address
  650. anycast address
  651. required addresses
  652. protocols and applications
  653. local ports and protocols
  654. icmp types
  655. understanding policy enforcement of permissions and attributes
  656. reviewing the ldap directory structure and configuration procedure
  657. searching the hierarchy
  658. binding the security appliance to the ldap server
  659. cisco-av-pair attribute syntax
  660. example security appliance authorization schema
  661. loading the schema in the ldap server
  662. example user file
  663. example 2: configuring ldap authentication with microsoft active directory
  664. example 3: ldap authentication and ldap authorization with microsoft active directory
  665. security appliance tacacs+ attributes
  666. l o s s a r y
500 Series first page preview

500 Series

Brand: Cisco | Category: Switch
500 Series first page preview

500 Series

Brand: Cisco | Category: Switch
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. getting started
  11. launching the configuration utility
  12. quick start device configuration
  13. Interface Naming Conventions
  14. window navigation
  15. system summary
  16. etherlike statistics
  17. gvrp statistics
  18. x eap statistics
  19. acl statistics
  20. tcam utilization
  21. Health
  22. rmon statistics
  23. rmon history
  24. rmon history table
  25. rmon events control
  26. rmon alarms
  27. view log
  28. setting system log settings
  29. setting remote logging settings
  30. viewing memory logs
  31. system files
  32. Upgrade/Backup Firmware/Language
  33. active image
  34. configuration file backwards compatibility
  35. configuration files properties
  36. Copy/Save Configuration
  37. Auto Configuration/Image Update via DHCP
  38. Overview
  39. types of units in stack
  40. unit leds
  41. topology discovery
  42. unit id assignment
  43. Master Selection Process
  44. Unit Failure in Stack
  45. software auto synchronization in stack
  46. stack ports
  47. port speeds
  48. Default Configuration
  49. device models
  50. System Settings
  51. Console Settings (Autobaud Rate Support)
  52. management interface
  53. time settings
  54. routing resources
  55. Diagnostics
  56. Discovery - LLDP
  57. Traceroute
  58. system time options
  59. sntp modes
  60. configuring system time
  61. adding a unicast sntp server
  62. configuring the sntp mode
  63. defining sntp authentication
  64. time range
  65. copper ports tests
  66. displaying optical module status
  67. configuring port and vlan mirroring
  68. viewing cpu utilization and secure core technology
  69. bonjour in layer 2 system mode
  70. bonjour in layer 3 system mode
  71. lldp and cdp
  72. configuring lldp
  73. lldp overview
  74. lldp properties
  75. lldp port settings
  76. lldp med network policy
  77. lldp med port settings
  78. lldp local information
  79. lldp neighbor information
  80. lldp statistics
  81. lldp overloading
  82. configuring cdp
  83. cdp statistics
  84. port management
  85. port configuration
  86. loopback detection
  87. configuring loopback detection
  88. link aggregation
  89. configuring lag settings
  90. configuring lacp
  91. configuring green ethernet
  92. az energy efficient ethernet feature
  93. udld overview
  94. udld operation
  95. usage guidelines
  96. Dependencies On Other Features
  97. Before You Start
  98. configuring udld
  99. what is a smartport
  100. special smartport types
  101. smartport macros
  102. applying a smartport type to an interface
  103. macro failure and the reset operation
  104. auto smartport
  105. identifying smartport type
  106. multiple devices attached to the port
  107. error handling
  108. relationships with other features and backwards compatibility
  109. Configuring Smartport Using The Web-based Interface
  110. smartport properties
  111. smartport type settings
  112. smartport interface settings
  113. Built-in Smartport Macros
  114. poe on the device
  115. poe configuration considerations
  116. poe properties
  117. poe settings
  118. vlan management
  119. vlan description
  120. private vlan
  121. traffic flow
  122. regular vlans
  123. interface settings
  124. vlan membership
  125. private vlan settings
  126. gvrp settings
  127. vlan groups
  128. voice vlan
  129. voice vlan configuration
  130. access port multicast tv vlan
  131. igmp snooping
  132. customer port multicast tv vlan
  133. port multicast vlan membership
  134. spanning tree
  135. stp status and global settings
  136. spanning tree interface settings
  137. rapid spanning tree settings
  138. multiple spanning tree
  139. VLANs to a MSTP Instance
  140. mstp instance settings
  141. mstp interface settings
  142. static mac addresses
  143. dynamic mac addresses
  144. reserved mac addresses
  145. multicast forwarding
  146. typical multicast setup
  147. multicast address properties
  148. multicast properties
  149. ip multicast group addresses
  150. igmp snooping configuration
  151. igmp interface settings
  152. igmp proxy
  153. mld snooping
  154. mld proxy
  155. IGMP/MLD Snooping IP Multicast Group
  156. multicast router ports
  157. forward all
  158. loopback interface
  159. ipv4 management and interfaces
  160. ipv4 routes
  161. access list
  162. arp proxy
  163. dhcp snooping binding database
  164. dhcp server
  165. ipv6 management and interfaces
  166. ipv6 global configuration
  167. ipv6 interface
  168. ipv6 tunnel
  169. defining ipv6 addresses
  170. ipv6 default router list
  171. defining ipv6 neighbors information
  172. viewing ipv6 route tables
  173. dhcpv6 relay
  174. domain name
  175. search list
  176. how rip operates on the device
  177. passive mode
  178. configuring rip
  179. access lists
  180. Configurable Elements of VRRP
  181. vrrp router priority and preemption
  182. vrrp advertisements
  183. vrrp statistics
  184. defining users
  185. configuring tacacs
  186. configuring radius
  187. accounting using a radius server
  188. radius workflow
  189. key management
  190. Management Access Method
  191. active access profile
  192. defining profile rules
  193. management access authentication
  194. secure sensitive data management
  195. ssl server authentication settings
  196. ssh server
  197. ssh client
  198. defining storm control
  199. configuring port security
  200. denial of service prevention
  201. types of dos attacks
  202. defense against dos attacks
  203. configuring dos prevention
  204. dhcp snooping
  205. configuring ip source guard work flow
  206. enabling ip source guard
  207. binding database
  208. arp inspection
  209. how arp prevents cache poisoning
  210. interaction between arp inspection and dhcp snooping
  211. arp inspection work flow
  212. defining dynamic arp inspection interfaces settings
  213. defining arp inspection access control rules
  214. First Hop Security
  215. Overview of 802.1X
  216. authentication server
  217. Authenticator Overview
  218. multiple authentication methods
  219. Common Tasks
  220. x configuration through the gui
  221. x port authentication
  222. defining host and session authentication
  223. viewing authenticated hosts
  224. defining time ranges
  225. Authentication Method and Port Mode Support
  226. IPv6 First Hop Security Overview
  227. Router Advertisement Guard
  228. DHCPv6 Guard
  229. Neighbor Binding Integrity
  230. IPv6 Source Guard
  231. Attack Protection
  232. Policies, Global Parameters and System Defaults
  233. Default Settings and Configuration
  234. Configuring IPv6 First Hop Security through Web GUI
  235. Secure Copy (SCP) and SSH
  236. protection methods
  237. SSH Server Authentication
  238. ssh client authentication
  239. before you begin
  240. ssh client configuration through the gui
  241. SSH Server Configuration
  242. Introduction
  243. ssd management
  244. SSD Properties
  245. local passphrase
  246. configuration file integrity control
  247. read mode
  248. ssd control block
  249. running configuration file
  250. backup and mirror configuration file
  251. ssd management channels
  252. configuring ssd
  253. access control
  254. acl logging
  255. configuring acls
  256. MAC-based ACLs
  257. IPv4-based ACLs
  258. IPv6-Based ACLs
  259. acl binding
  260. quality of service
  261. qos features and components
  262. qos modes
  263. qos workflow
  264. setting qos properties
  265. configuring qos queues
  266. mapping dscp to queue
  267. configuring bandwidth
  268. configuring egress shaping per queue
  269. tcp congestion avoidance
  270. qos basic mode
  271. interface qos settings
  272. qos advanced mode
  273. workflow to configure advanced qos mode
  274. defining class mapping
  275. qos policers
  276. defining aggregate policers
  277. configuring a policy
  278. policy binding
  279. managing qos statistics
  280. viewing queues statistics
  281. snmp versions and workflow
  282. snmpv1 and v2
  283. supported mibs
  284. snmp engine id
  285. configuring snmp views
  286. creating snmp groups
  287. managing snmp users
  288. defining snmp communities
  289. defining trap settings
  290. notification recipients
  291. defining snmpv3 notification recipients
  292. snmp notification filters
500 Series first page preview

500 Series

Brand: Cisco | Category: Firewall
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. Table Of Contents
  22. Table Of Contents
  23. Table Of Contents
  24. Table Of Contents
  25. Table Of Contents
  26. Table Of Contents
  27. Table Of Contents
  28. Table Of Contents
  29. about this guide
  30. related documentation
  31. document conventions
  32. documentation feedback
  33. Intrusion Prevention Services Functional Overview
  34. Security Context Overview
  35. Getting Started with Your Platform Model
  36. Chapter 2 Getting Started
  37. ASA 5510 and Higher Default Configuration
  38. PIX 515/515E Default Configuration
  39. Setting Transparent or Routed Firewall Mode
  40. Working with the Configuration
  41. Saving Configuration Changes in Single Context Mode
  42. Copying the Startup Configuration to the Running Configuration
  43. Clearing and Removing Configuration Settings
  44. Chapter 3 Enabling Multiple Context Mode
  45. How the Security Appliance Classifies Packets
  46. Invalid Classifier Criteria
  47. Classification Examples
  48. Cascading Security Contexts
  49. Management Access to Security Contexts
  50. Context Administrator Access
  51. Restoring Single Context Mode
  52. Appliance
  53. Understanding ASA 5505 Ports and Interfaces
  54. Default Interface Configuration
  55. VLAN MAC Addresses
  56. Security Level Overview
  57. Configuring Switch Ports as Access Ports
  58. Configuring a Switch Port as a Trunk Port
  59. Allowing Communication Between VLAN Interfaces on the Same Security Level
  60. C H A P T E R 5 Configuring Ethernet Settings and Subinterfaces
  61. Configuring and Enabling Fiber Interfaces
  62. Configuring and Enabling RJ-45 Interfaces
  63. Configuring Resource Management
  64. Resource Limits
  65. C H A P T E R 6 Adding and Managing Security Contexts
  66. Class Members
  67. Configuring a Security Context
  68. Automatically Assigning MAC Addresses to Context Interfaces
  69. Managing Security Contexts
  70. Changing the Admin Context
  71. Reloading a Security Context
  72. Reloading by Removing and Re-adding the Context
  73. Viewing Resource Allocation
  74. Viewing Resource Usage
  75. Monitoring SYN Attacks in Contexts
  76. C H A P T E R 7 Configuring Interface Parameters
  77. Configuring the Interface
  78. Allowing Communication Between Interfaces on the Same Security Level
  79. Changing the Login Password
  80. Chapter 8 Configuring Basic Setting
  81. Setting the Time Zone and Daylight Saving Time Date Range
  82. Setting the Date and Time Using an NTP Server
  83. Setting the Management IP Address for a Transparent Firewall
  84. Configuring Static and Default Routes
  85. Chapter 9 Configuring IP Routing
  86. Configuring a Default Route
  87. Defining Route Maps
  88. Configuring OSPF
  89. OSPF Overview
  90. Redistributing Routes Into OSPF
  91. Configuring OSPF Interface Parameters
  92. Configuring OSPF Area Parameters
  93. Configuring OSPF NSSA
  94. Configuring Route Summarization Between OSPF Areas
  95. Defining Static OSPF Neighbors
  96. Generating a Default Route
  97. Logging Neighbors Going Up or Down
  98. Monitoring OSPF
  99. Configuring RIP
  100. Redistributing Routes into the RIP Routing Process
  101. Configuring RIP Send/Receive Version on an Interface
  102. Monitoring RIP
  103. How the Routing Table is Populated
  104. Backup Routes
  105. Configuring a DHCP Server
  106. C H A P T E R 10 Configuring DHCP, DDNS, and WCCP Services
  107. Configuring DHCP Options
  108. Using Cisco IP Phones with a DHCP Server
  109. Configuring DHCP Relay Services
  110. Configuring Dynamic DNS
  111. Example 1: Client Updates Both A and PTR RRs for Static IP Addresses
  112. Client and Updates Both RRs
  113. Example 5: Client Updates A RR; Server Updates PTR RR
  114. WCCP Interaction With Other Features
  115. Multicast Routing Overview
  116. C H A P T E R 11 Configuring Multicast Routing
  117. Disabling IGMP on an Interface
  118. Limiting the Number of IGMP States on an Interface
  119. Changing the Query Response Time
  120. Configuring PIM Features
  121. Configuring a Static Rendezvous Point Address
  122. Configuring a Multicast Boundary
  123. Supporting Mixed Bidirctional/Sparse-Mode PIM Networks
  124. IPv6-enabled Commands
  125. Configuring IPv6
  126. Configuring IPv6 on an Interface
  127. Configuring a Dual IP Stack on an Interface
  128. Configuring IPv6 Default and Static Routes
  129. Configuring IPv6 Access Lists
  130. Configuring IPv6 Neighbor Discovery
  131. Configuring Router Advertisement Messages
  132. Configuring a Static IPv6 Neighbor
  133. The show ipv6 route Command
  134. AAA Overview
  135. C H A P T E R 13 Configuring AAA Servers and the Local Database
  136. Summary of Support
  137. Authentication Methods
  138. SDI Version Support
  139. LDAP Server Support
  140. Authorization with LDAP for VPN
  141. LDAP Attribute Mapping
  142. SSO Support for WebVPN with HTTP Forms
  143. User Profiles
  144. Identifying AAA Server Groups and Servers
  145. Using Certificates and User Login Credentials
  146. Using certificates
  147. Overview of Integrity Server and Security Appliance Interaction
  148. Understanding Failover
  149. Chapter 14 Configuring Failover
  150. The Failover and Stateful Failover Links
  151. Stateful Failover Link
  152. Active/Active and Active/Standby Failover
  153. Active/Active Failover
  154. Determining Which Type of Failover to Use
  155. Failover Health Monitoring
  156. Interface Monitoring
  157. Failover Feature/Platform Matrix
  158. Failover Configuration Limitations
  159. Configuring LAN-Based Active/Standby Failover
  160. Configuring Optional Active/Standby Failover Settings
  161. Configuring Active/Active Failover
  162. Configuring LAN-Based Active/Active Failover
  163. Configuring Optional Active/Active Failover Settings
  164. Configuring Unit Health Monitoring
  165. Verifying the Failover Configuration
  166. Viewing Monitored Interfaces
  167. Testing the Failover Functionality
  168. Disabling Failover
  169. Failover System Messages
  170. Routed Mode Overview
  171. Chapter 15 Firewall Mode Overview
  172. An Inside User Visits a Web Server
  173. An Outside User Visits a Web Server on the DMZ
  174. An Inside User Visits a Web Server on the DMZ
  175. An Outside User Attempts to Access an Inside Host
  176. A DMZ User Attempts to Access an Inside Host
  177. Transparent Firewall Network
  178. MAC Address Lookups
  179. Unsupported Features in Transparent Mode
  180. How Data Moves Through the Transparent Firewall
  181. An Outside User Visits a Web Server on the Inside Network
  182. Access List Overview
  183. Access List Types
  184. C H A P T E R 16 Identifying Traffic with Access Lists
  185. Adding an Extended Access List
  186. Allowing Special IP Traffic through the Transparent Firewall
  187. Adding an EtherType Access List
  188. Adding a Standard Access List
  189. Adding a Webtype Access List
  190. Adding Object Groups
  191. Adding a Network Object Group
  192. Adding an ICMP Type Object Group
  193. Nesting Object Groups
  194. Using Object Groups with an Access List
  195. Displaying Object Groups
  196. Scheduling Extended Access List Activation
  197. Applying the Time Range to an ACE
  198. Configuring Logging for an Access Control Entry
  199. Managing Deny Flows
  200. NAT Overview
  201. Introduction to NAT
  202. Chapter 17 Applying NAT
  203. NAT Types
  204. Static NAT
  205. Bypassing NAT when NAT Control is Enabled
  206. NAT and Same Security Level Interfaces
  207. Order of NAT Commands Used to Match Real Addresses
  208. Configuring NAT Control
  209. Using Dynamic NAT and PAT
  210. Configuring Dynamic NAT or PAT
  211. Using Static NAT
  212. Using Static PAT
  213. Bypassing NAT
  214. Configuring Static Identity NAT
  215. Configuring NAT Exemption
  216. NAT Examples
  217. Overlapping Networks
  218. Redirecting Ports
  219. C H A P T E R 18 Permitting or Denying Network Access
  220. Applying an Access List to an Interface
  221. AAA Performance
  222. Chapter 19 Applying AAA for Network Acces
  223. Static PAT and HTTP
  224. Enabling Secure Authentication of Web Clients
  225. Configuring RADIUS Authorization
  226. Configuring a RADIUS Server to Download Per-User Access Control List Names
  227. Configuring Accounting for Network Access
  228. Using MAC Addresses to Exempt Traffic from Authentication and Authorization
  229. Filtering Overview
  230. C H A P T E R 20 Applying Filtering Services
  231. Filtering Java Applets
  232. URL Filtering Overview
  233. Buffering the Content Server Response
  234. Caching Server Addresses
  235. Enabling Filtering of Long HTTP URLs
  236. Filtering HTTPS URLs
  237. Viewing Filtering Statistics and Configuration
  238. Viewing Buffer Configuration and Statistics
  239. Viewing Caching Statistics
  240. Modular Policy Framework Overview
  241. Chapter 21 Using Modular Policy Framework
  242. Creating a Layer 3/4 Class Map for Through Traffic
  243. Creating a Layer 3/4 Class Map for Management Traffic
  244. Creating a Regular Expression
  245. Creating a Regular Expression Class Map
  246. Identifying Traffic in an Inspection Class Map
  247. Defining Actions in an Inspection Policy Map
  248. Defining Actions Using a Layer 3/4 Policy Map
  249. Default Layer 3/4 Policy Map
  250. Adding a Layer 3/4 Policy Map
  251. Applying a Layer 3/4 Policy to an Interface Using a Service Policy
  252. Applying Inspection and QoS Policing to HTTP Traffic
  253. Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers
  254. Applying Inspection to HTTP Traffic with NAT
  255. Managing the AIP SSM
  256. Chapter 22 Managing AIP SSM and CSC SSM
  257. Sessioning to the AIP SSM and Running Setup
  258. Managing the CSC SSM
  259. Getting Started with the CSC SSM
  260. Determining What Traffic to Scan
  261. Limiting Connections Through the CSC SSM
  262. Checking SSM Status
  263. Transferring an Image onto an SSM
  264. Configuring TCP Normalization
  265. Chapter 23 Preventing Network Attack
  266. Configuring Connection Limits and Timeouts
  267. Preventing IP Spoofing
  268. Configuring the Fragment Size
  269. Configuring IP Audit for Basic IPS Support
  270. Overview
  271. Chapter 24 Applying Qo Policie
  272. Identifying Traffic for QoS
  273. Defining a QoS Policy Map
  274. Applying Rate Limiting
  275. Activating the Service Policy
  276. Applying Low Latency Queueing
  277. Reducing Queue Latency
  278. Viewing QoS Configuration
  279. Viewing QoS Policy Map Configuration
  280. Viewing QoS Statistics
  281. Viewing QoS Priority Queue Statistics
  282. C H A P T E R 25 Configuring Application Layer Protocol Inspection
  283. Default Inspection Policy
  284. Configuring Application Inspection
  285. CTIQBE Inspection
  286. Limitations and Restrictions
  287. DCERPC Inspection
  288. Configuring a DCERPC Inspection Policy Map for Additional Inspection Control
  289. DNS Inspection
  290. How DNS Rewrite Works
  291. Configuring DNS Rewrite
  292. Using the Alias Command for DNS Rewrite
  293. DNS Rewrite with Three NAT Zones
  294. Configuring DNS Rewrite with Three NAT Zones
  295. Verifying and Monitoring DNS Inspection
  296. ESMTP Inspection
  297. FTP Inspection
  298. FTP Inspection Overview
  299. Configuring an FTP Inspection Policy Map for Additional Inspection Control
  300. Verifying and Monitoring FTP Inspection
  301. GTP Inspection
  302. Configuring a GTP Inspection Policy Map for Additional Inspection Control
  303. Verifying and Monitoring GTP Inspection
  304. H.323 Inspection
  305. Configuring H.323 and H.225 Timeout Values
  306. Monitoring H.245 Sessions
  307. Monitoring H.323 RAS Sessions
  308. Configuring an HTTP Inspection Policy Map for Additional Inspection Control
  309. Instant Messaging Inspection
  310. IM Inspection Overview
  311. ICMP Inspection
  312. MGCP Inspection
  313. MGCP Inspection Overview
  314. Configuring an MGCP Inspection Policy Map for Additional Inspection Control
  315. Configuring MGCP Timeout Values
  316. Configuring a NetBIOS Inspection Policy Map for Additional Inspection Control
  317. PPTP Inspection
  318. RADIUS Accounting Inspection
  319. RSH Inspection
  320. Restrictions and Limitations
  321. SIP Instant Messaging
  322. Configuring a SIP Inspection Policy Map for Additional Inspection Control
  323. Configuring SIP Timeout Values
  324. Verifying and Monitoring SIP Inspection
  325. SCCP Inspection Overview
  326. Verifying and Monitoring SCCP Inspection
  327. SMTP and Extended SMTP Inspection
  328. SNMP Inspection
  329. SQL*Net Inspection
  330. Sun RPC Inspection Overview
  331. Verifying and Monitoring Sun RPC Inspection
  332. TFTP Inspection
  333. Configuring ARP Inspection
  334. C H A P T E R 26 Configuring ARP Inspection and Bridging Parameters
  335. Customizing the MAC Address Table
  336. Setting the MAC Address Timeout
  337. Tunneling Overview
  338. Chapter 27 Configuring IPSec and ISAKMP
  339. Configuring ISAKMP Policies
  340. Enabling ISAKMP on the Outside Interface
  341. Enabling IPSec over NAT-T
  342. Enabling IPSec over TCP
  343. Waiting for Active Sessions to Terminate Before Rebooting
  344. Creating a Certificate Group Matching Rule and Policy
  345. Using the Tunnel-group-map default-group Command
  346. Understanding Transform Sets
  347. Applying Crypto Maps to Interfaces
  348. Changing IPSec SA Lifetimes
  349. Using Dynamic Crypto Maps
  350. Providing Site-to-Site Redundancy
  351. Clearing Security Associations
  352. Supporting the Nokia VPN Client
  353. L2TP Overview
  354. IPSec Transport and Tunnel Modes
  355. Chapter 28 Configuring L2TP over IPSec
  356. Tunnel Group Switching
  357. Using L2TP Debug Commands
  358. Enabling IPSec Debug
  359. Configuring VPNs in Single, Routed Mode
  360. C H A P T E R 29 Setting General IPSec VPN Parameters
  361. NAT Considerations for Intra-Interface Traffic
  362. Understanding Load Balancing
  363. Implementing Load Balancing
  364. Eligible Platforms
  365. Some Typical Mixed Cluster Scenarios
  366. Configuring Load Balancing
  367. Configuring the Load Balancing Cluster Attributes
  368. Configuring VPN Session Limits
  369. Overview of Tunnel Groups, Group Policies, and Users
  370. C H A P T E R 30 Configuring Tunnel Groups, Group Policies, and Users
  371. IPSec Tunnel-Group Connection Parameters
  372. WebVPN Tunnel-Group Connection Parameters
  373. Configuring Tunnel Groups
  374. Configuring IPSec Tunnel-Group General Attributes
  375. Configuring IPSec Remote-Access Tunnel Group IPSec Attributes
  376. Configuring IPSec Remote-Access Tunnel Group PPP Attributes
  377. Configuring LAN-to-LAN Tunnel Groups
  378. Configuring LAN-to-LAN Tunnel Group General Attributes
  379. Configuring WebVPN Tunnel Groups
  380. Configuring WebVPN Tunnel-Group General Attributes
  381. Configuring WebVPN Tunnel-Group WebVPN Attributes
  382. Customizing Login Windows for WebVPN Users
  383. Configuring Microsoft Active Directory Settings for Password Management
  384. Using Active Directory to Specify Maximum Password Age
  385. Using Active Directory to Override an Account Disabled AAA Indicator
  386. Using Active Directory to Enforce Minimum Password Length
  387. Using Active Directory to Enforce Password Complexity
  388. Group Policies
  389. Default Group Policy
  390. Configuring Group Policies
  391. Configuring an Internal Group Policy
  392. Configuring VPN-Specific Attributes
  393. Configuring Security Attributes
  394. Configuring the Banner Message
  395. Configuring Split-Tunneling Attributes
  396. Configuring Domain Attributes for Tunneling
  397. Configuring Attributes for VPN Hardware Clients
  398. Configuring Backup Server Attributes
  399. Configuring Microsoft Internet Explorer Client Parameters
  400. Configuring Network Admission Control Parameters
  401. Configuring Address Pools
  402. Configuring Firewall Policies
  403. Configuring Client Access Rules
  404. Configuring Group-Policy WebVPN Attributes
  405. Configuring User Attributes
  406. Viewing the Username Configuration
  407. Configuring WebVPN for Specific Users
  408. Configuring an IP Address Assignment Method
  409. Chapter 31 Configuring IP Addresse for VPN
  410. Configuring DHCP Addressing
  411. Summary of the Configuration
  412. C H A P T E R 32 Configuring Remote Access IPSec VPNs
  413. Configuring ISAKMP Policy and Enabling ISAKMP on the Outside Interface
  414. Configuring an Address Pool
  415. Defining a Tunnel Group
  416. Creating a Dynamic Crypto Map
  417. Creating a Crypto Map Entry to Use the Dynamic Crypto Map
  418. Uses, Requirements, and Limitations
  419. C H A P T E R 33 Configuring Network Admission Control
  420. Configuring the Default ACL for NAC
  421. Configuring Exemptions from NAC
  422. Changing Advanced Settings
  423. Changing the Login Credentials Used for Clientless Authentication
  424. Configuring NAC Session Attributes
  425. Setting the Query-for-Posture-Changes Timer
  426. Specifying the Client/Server Role of the Cisco ASA 5505
  427. Specifying the Primary and Secondary Servers
  428. Configuring Automatic Xauth Authentication
  429. Comparing Tunneling Options
  430. Specifying the Tunnel Group or Trustpoint
  431. Specifying the Trustpoint
  432. Configuring Split Tunneling
  433. Configuring Remote Management
  434. Group Policy and User Attributes Pushed to the Client
  435. Authentication Options
  436. PPPoE Client Overview
  437. Chapter 35 Configuring the PPPoE Client
  438. Enabling PPPoE
  439. Monitoring and Debugging the PPPoE Client
  440. Clearing the Configuration
  441. C H A P T E R 36 Configuring LAN-to-LAN IPSec VPNs
  442. Creating a Transform Set
  443. Creating a Crypto Map and Applying It To an Interface
  444. Getting Started with WebVPN
  445. Chapter 37 Configuring WebVPN
  446. Using SSL to Access the Central Site
  447. Setting WebVPN HTTP/HTTPS Proxy
  448. Enabling Cookies on Browsers for WebVPN
  449. Configuring SSO with HTTP Basic or NTLM Authentication
  450. Configuring SSO Authentication Using SiteMinder
  451. Configuring SSO with the HTTP Form Protocol
  452. Authenticating with Digital Certificates
  453. Creating Port Forwarding, URL, and Access Lists in Global Configuration Mode
  454. Configuring WebVPN Tunnel Group Attributes
  455. Configuring Application Access
  456. Recovering from hosts File Errors When Using Application Access
  457. Stopping Application Access Improperly
  458. Configuring File Access
  459. Configuring Access to Citrix MetaFrame Services
  460. Using WebVPN with PDAs
  461. Using E-Mail over WebVPN
  462. E-mail Proxy Certificate Authentication
  463. Optimizing WebVPN Performance
  464. Configuring a Certificate for Signing Rewritten Java Content
  465. Configuring Application Profile Customization Framework
  466. APCF Example
  467. Viewing the WebVPN Home Page
  468. Viewing the Floating Toolbar
  469. Customizing WebVPN Pages
  470. Customizing the WebVPN Login Page
  471. Customizing the WebVPN Logout Page
  472. Customizing the WebVPN Home Page
  473. Customizing the Application Access Window
  474. Customizing the Prompt Dialogs
  475. Applying Customizations to Tunnel Groups, Groups and Users
  476. Requiring Usernames and Passwords
  477. Communicating Security Tips
  478. Capturing WebVPN Data
  479. Creating a Capture File
  480. Installing SVC
  481. Chapter 38 Configuring SSL VPN Client
  482. Enabling SVC
  483. Enabling Permanent SVC Installation
  484. Enabling Rekey
  485. Enabling Keepalive
  486. Viewing SVC Sessions
  487. Logging Off SVC Sessions
  488. Public Key Cryptography
  489. C H A P T E R 39 Configuring Certificates
  490. About Trustpoints
  491. About OCSP
  492. Supported CA Servers
  493. Configuring Key Pairs
  494. Removing Key Pairs
  495. Obtaining Certificates
  496. Obtaining Certificates Manually
  497. Configuring CRLs for a Trustpoint
  498. Exporting and Importing Trustpoints
  499. Exporting a Trustpoint Configuration
  500. Allowing Telnet Access
  501. Chapter 40 Managing System Acces
  502. Using an SSH Client
  503. Configuring AAA for System Administrators
  504. Configuring Authentication for CLI Access
  505. Configuring Authentication for the Enable Command
  506. Configuring Command Authorization
  507. Configuring TACACS+ Command Authorization
  508. Configuring Command Accounting
  509. Recovering from a Lockout
  510. Configuring a Login Banner
  511. Managing Licenses
  512. C H A P T E R 41 Managing Software, Licenses, and Configurations
  513. Downloading Software or Configuration Files to Flash Memory
  514. Downloading a File to the Startup or Running Configuration
  515. Configuring the Application Image and ASDM Image to Boot
  516. Performing Zero Downtime Upgrades for Failover Pairs
  517. Upgrading and Active/Active Failover Configuration
  518. Backing Up Configuration Files
  519. Backing Up a Context Configuration within a Context
  520. Configuring Client Updates as an Auto Update Server
  521. Viewing Auto Update Status
  522. Using SNMP
  523. C H A P T E R 42 Monitoring the Security Appliance
  524. Enabling SNMP
  525. Configuring and Managing Logs
  526. Enabling and Disabling Logging
  527. Configuring Log Output Destinations
  528. Sending System Log Messages to the Console Port
  529. Sending System Log Messages to an E-mail Address
  530. Sending System Log Messages to ASDM
  531. Sending System Log Messages to a Telnet or SSH Session
  532. Sending System Log Messages to the Log Buffer
  533. Filtering System Log Messages
  534. Message Filtering Overview
  535. Filtering System Log Messages with Custom Message Lists
  536. Customizing the Log Configuration
  537. Configuring the Logging Queue
  538. Generating System Log Messages in EMBLEM Format
  539. Changing the Severity Level of a System Log Message
  540. Changing the Amount of Internal Flash Memory Available for Logs
  541. Understanding System Log Messages
  542. Testing Your Configuration
  543. C H A P T E R 43 Troubleshooting the Security Appliance
  544. Pinging Through the Security Appliance
  545. Disabling the Test Configuration
  546. Traceroute
  547. Performing Password Recovery for the ASA 5500 Series Adaptive Security Appliance
  548. Password Recovery for the PIX 500 Series Security Appliance
  549. Disabling Password Recovery
  550. Other Troubleshooting Tools
  551. Supported Platforms and Feature Licenses
  552. A P P E N D I X A Feature Licenses and Specifications
  553. Security Services Module Support
  554. VPN Specifications
  555. Cisco VPN Client Support
  556. Cryptographic Standards
  557. Example 1: Multiple Mode Firewall With Outside Access
  558. Appendix B Sample Configuration
  559. Example 1: Admin Context Configuration
  560. Example 1: Customer C Context Configuration
  561. Example 2: Single Mode Firewall Using Same Security Level
  562. Example 3: Shared Resources for Multiple Contexts
  563. Example 3: System Configuration
  564. Example 3: Department 1 Context Configuration
  565. Example 3: Department 2 Context Configuration
  566. Example 4: Multiple Mode, Transparent Firewall with Outside Access
  567. Example 4: System Configuration
  568. Example 4: Admin Context Configuration
  569. Example 4: Customer A Context Configuration
  570. Example 4: Customer C Context Configuration
  571. Example 6: IPv6 Configuration
  572. Example 7: Cable-Based Active/Standby Failover (Routed Mode)
  573. Example 8: LAN-Based Active/Standby Failover (Routed Mode)
  574. Example 8: Secondary Unit Configuration
  575. Example 9: Primary Unit Configuration
  576. Example 9: Primary admin Context Configuration
  577. Example 9: Primary ctx1 Context Configuration
  578. Example 10: Cable-Based Active/Standby Failover (Transparent Mode)
  579. Example 11: LAN-Based Active/Standby Failover (Transparent Mode)
  580. Example 11: Secondary Unit Configuration
  581. Example 12: LAN-Based Active/Active Failover (Transparent Mode)
  582. Example 12: Primary System Configuration
  583. Example 12: Primary ctx1 Context Configuration
  584. Example 14: Dual ISP Support Using Static Route Tracking
  585. Example 14: ASA 5505 Base License
  586. Example 15: ASA 5505 Security Plus License with Failover and Dual-ISP Backup
  587. Example 15: Secondary Unit Configuration
  588. Local Ports and Protocols
  589. ipv6 addresses
  590. ICMP Types
  591. Selecting LDAP, RADIUS, or Local Authentication and Authorization
  592. A P P E N D I X E Configuring an External Server for Authorization and Authentication
  593. Reviewing the LDAP Directory Structure and Configuration Procedure
  594. Searching the Hierarchy
  595. Binding the Security Appliance to the LDAP Server
  596. Cisco -AV-Pair Attribute Syntax
  597. Example Security Appliance Authorization Schema
  598. Loading the Schema in the LDAP Server
  599. Reviewing Examples of Active Directory Configurations
  600. Example 2: Configuring LDAP Authentication with Microsoft Active Directory
  601. Example 3: LDAP Authentication and LDAP Authorization with Microsoft Active Directory
  602. Configuring an External RADIUS Server
  603. Security Appliance RADIUS Authorization Attributes
  604. Adding Comments C
  605. Passwords C
  606. Private Networks D
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Headsets
500 Series first page preview

500 Series

Brand: Cisco | Category: Switch
Related products
UC500 seriesSX series3200 SeriesDX seriesMX300 SeriesEX SeriesMCU 5300 seriesMX200 SeriesDX600 seriesMX Series
Cisco categories
More Cisco categories