Cisco 500 Series manuals
500 Series
Table of contents
- regulatory compliance and safety information
- Table Of Contents
- Statement 12—Power Supply Disconnection Warning
- Statement 19—TN Power Warning
- Statement 43—Jewelry Removal Warning
- Statement 94—Wrist Strap Warning
- Statement 119—Unit Short Circuit Protection
- Statement 150—Power Off Before Working on System
- Statement 162—EU Public Network Port Warning
- Statement 199—Emergency Access Warning
- Statement 245B—Explosive Device Proximity Wireless Network Device
- Statement 332—Antenna Installation Warning
- Statement 1001—Work During Lightning Activity
- Statement 1004—Installation Instructions
- Statement 1021—SELV Circuit
- Statement 1023—No. 26 AWG
- Statement 1030—Equipment Installation
- Statement 1040—Product Disposal
- Statement 1072—Shock Hazard from Interconnections
- Statement 1073—No User-Serviceable Parts
- Statement 1074—Comply with Local and National Electrical Codes
- European Directives
- Standards Compliance
- EMC Class A Notices and Warnings
- Japanese Electric Appliance and Radio Laws
- Telecom Approvals Listing
- Obtaining Documentation, Obtaining Support, and Security Guidelines
500 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- abbreviations and acronyms
- related documentation
- System Overview
- Chapter 1 Overview
- The Cisco 526 Wireless Express Mobility Controller
- WLC526 Controller Overview
- WLC526 Controller Specifications
- Configuration Options
- CCA Guide Mode and CCA Expert Mode
- Smartport Support for Catalyst Express 500 Series Switches
- Using the Command-Line Interface
- Access Points
- Adding a New Controller
- Verifying and Configuring Your Ethernet Adapter
- Configuring your Ethernet Adapter to a Static IP Address
- Adding LAP521 Access Points
- Chapter 3 Creating and Connecting to a Community
- Creating a Community
- connecting to a community
- Connecting To a Community
- creating a new wlan
- Chapter 4 Creating and Modifying WLAN and VLAN
- modify a wlan
- Modify a WLAN
- adding a vlan
- Adding a VLAN
- modifying a vlan
- Modifying a VLAN
- upgrading controller software
- Chapter 5 Controller Software Upgrade
- Restarting the Controller Using CCA
- C H A P T E R 6 Restarting, Resetting, Backing Up, and Restoring the Controller
- Backing Up the Controller Configuration
- Restoring the Controller Configuration
- Manually Restarting the Controller Using the Reset Button
- Manually Resetting the Controller to Factory Defaults
- adding a guest access vlan
- C H A P T E R 7 Adding Guest Access with Web Authentication
- creating a new ssid for the guest vlan
- Creating a New SSID for the Guest VLAN
- adding a guest user
- Adding a Guest User
- adding an employee access vlan
- C H A P T E R 8 Adding Employee Access with Web Authentication
- creating a new wlan ssid for the employee vlan
- Creating a New WLAN SSID for the Employee VLAN
- adding an employee user
- Adding an Employee User
- C H A P T E R 9 Adding Voice Access with Web Authentication
- Adding a Voice-Enabled VLAN
- creating a new ssid for the voice vlan
- Creating a New SSID for the Voice VLAN
- Overview
- A P P E N D I X A Configuring DHCP Option 43 for Cisco 520 Series Access Points
- Appendix B Converting an Autonomou Acces Point
- using cca to convert an ap521 access point
- Using CCA to Convert an AP521 Access Point
- deployment recommendations
- A P P E N D I X C Deployment Recommendations and Feature List
- Software Feature List for the WLC526 Controller
500 Series
Table of contents
500 Series
Table of contents
500 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this guide
- related documentation
- document conventions
- introduction to the security appliance
- security policy overview
- applying http, https, or ftp filtering
- vpn functional overview
- intrusion prevention services functional overview
- getting started
- restoring the factory default configuration
- asa 5510 and higher default configuration
- pix 515/515e default configuration
- setting transparent or routed firewall mode
- working with the configuration
- saving configuration changes in single context mode
- copying the startup configuration to the running configuration
- clearing and removing configuration settings
- how the security appliance classifies packets
- invalid classifier criteria
- classification examples
- cascading security contexts
- management access to security contexts
- context administrator access
- restoring single context mode
- interface overview
- understanding asa 5505 ports and interfaces
- default interface configuration
- configuring a switch port as a trunk port
- allowing communication between vlan interfaces on the same security level
- configuring ethernet settings, redundant interfaces, and subinterfaces
- configuring and enabling fiber interfaces
- configuring the fiber interface
- redundant interface overview
- adding a redundant interface
- changing the active interface
- maximum subinterfaces
- resource limits
- class members
- configuring a security context
- automatically assigning mac addresses to context interfaces
- changing between contexts and the system execution space
- changing the admin context
- reloading a security context
- reloading by removing and re-adding the context
- viewing resource allocation
- viewing resource usage
- monitoring syn attacks in contexts
- configuring interface parameters
- interface parameters overview
- default state of interfaces
- allowing communication between interfaces on the same security level
- configuring basic settings
- setting the date and time
- setting the time zone and daylight saving time date range
- setting the date and time using an ntp server
- setting the management ip address for a transparent firewall
- configuring ip routing
- configuring a static route
- configuring a default static route
- configuring static route tracking
- defining route maps
- configuring ospf
- ospf overview
- redistributing routes into ospf
- configuring ospf interface parameters
- configuring ospf area parameters
- configuring route summarization between ospf areas
- defining static ospf neighbors
- configuring route calculation timers
- displaying ospf update packet pacing
- restarting the ospf process
- redistributing routes into the rip routing process
- enabling rip authentication
- configuring eigrp
- enabling and configuring eigrp routing
- enabling and configuring eigrp stub routing
- enabling eigrp authentication
- defining an eigrp neighbor
- configuring the eigrp hello interval and hold time
- configuring summary aggregate addresses
- changing the interface delay value
- disabling neighbor change and warning message logging
- how the routing table is populated
- backup routes
- dynamic routing and failover
- configuring dhcp, ddns, and wccp services
- enabling the dhcp server
- configuring dhcp options
- using cisco ip phones with a dhcp server
- configuring dhcp relay services
- configuring dynamic dns
- example 1: client updates both a and ptr rrs for static ip addresses
- example 5: client updates a rr; server updates ptr rr
- wccp interaction with other features
- configuring multicast routing
- enabling multicast routing
- disabling igmp on an interface
- limiting the number of igmp states on an interface
- changing the query response time
- configuring pim features
- configuring a static rendezvous point address
- configuring pim message intervals
- supporting mixed bidirctional/sparse-mode pim networks
- for more information about multicast routing
- configuring ipv6 on an interface
- configuring a dual ip stack on an interface
- configuring ipv6 default and static routes
- configuring ipv6 access lists
- configuring ipv6 neighbor discovery
- configuring router advertisement messages
- configuring a static ipv6 neighbor
- the show ipv6 route command
- configuring aaa servers and the local database
- about authentication
- aaa server and local database support
- radius server support
- sdi server support
- ldap server support
- fallback support
- identifying aaa server groups and servers
- configuring an ldap server
- authorization with ldap for vpn
- using certificates and user login credentials
- supporting a zone labs integrity server
- configuring integrity server support
- hardware requirements
- the failover and stateful failover links
- stateful failover link
- active/active and active/standby failover
- determining which type of failover to use
- failover health monitoring
- unit health monitoring
- failover feature/platform matrix
- failover configuration limitations
- configuring lan-based active/standby failover
- configuring optional active/standby failover settings
- configuring active/active failover
- configuring lan-based active/active failover
- configuring optional active/active failover settings
- configuring unit health monitoring
- verifying the failover configuration
- viewing monitored interfaces
- testing the failover functionality
- disabling failover
- failover system messages
- changing command modes
- security considerations
- monitoring the auto update process
- routed mode overview
- an outside user visits a web server on the dmz
- an inside user visits a web server on the dmz
- a dmz user attempts to access an inside host
- transparent firewall network
- mac address vs. route lookups
- using the transparent firewall in your network
- unsupported features in transparent mode
- an inside user visits a web server using nat
- access list types
- access control implicit deny
- adding an extended access list
- allowing broadcast and multicast traffic through the transparent firewall
- adding an ethertype access list
- implicit permit of ip and arps only
- adding an ethertype ace
- adding a webtype access list
- adding object groups
- adding a network object group
- adding an icmp type object group
- nesting object groups
- using object groups with an access list
- displaying object groups
- scheduling extended access list activation
- applying the time range to an ace
- configuring logging for an access control entry
- managing deny flows
- nat overview
- nat in routed mode
- nat in transparent mode
- nat control
- nat types
- bypassing nat when nat control is enabled
- nat and same security level interfaces
- order of nat commands used to match real addresses
- dns and nat
- configuring nat control
- configuring dynamic nat or pat
- using static nat
- using static pat
- configuring static identity nat
- configuring nat exemption
- nat examples
- redirecting ports
- permitting or denying network access
- applying an access list to an interface
- applying aaa for network access
- authentication overview
- static pat and http
- enabling secure authentication of web clients
- authenticating directly with the security appliance
- enabling direct authentication using telnet
- configuring authorization for network access
- configuring radius authorization
- configuring a radius server to download per-user access control list names
- using mac addresses to exempt traffic from authentication and authorization
- applying filtering services
- filtering activex objects
- filtering java applets
- filtering urls and ftp requests with an external server
- buffering the content server response
- filtering http urls
- exempting traffic from filtering
- filtering ftp requests
- viewing filtering server statistics
- viewing buffer configuration and statistics
- viewing filtering configuration
- using modular policy framework
- default global policy
- creating a layer 3/4 class map for through traffic
- creating a layer 3/4 class map for management traffic
- configuring special actions for application inspections
- creating a regular expression class map
- identifying traffic in an inspection class map
- defining actions in an inspection policy map
- defining actions using a layer 3/4 policy map
- policy map guidelines
- feature matching guidelines within a policy map
- order in which multiple feature actions are applied
- modular policy framework examples
- applying inspection to http traffic globally
- applying inspection and connection limits to http traffic to specific servers
- applying inspection to http traffic with nat
- managing the aip ssm and csc ssm
- how the aip ssm works with the adaptive security appliance
- using virtual sensors
- aip ssm procedure overview
- sessioning to the aip ssm
- configuring the security policy on the aip ssm
- diverting traffic to the aip ssm
- managing the csc ssm
- about the csc ssm
- getting started with the csc ssm
- limiting connections through the csc ssm
- diverting traffic to the csc ssm
- checking ssm status
- transferring an image onto an ssm
- basic threat detection overview
- managing basic threat statistics
- configuring scanning threat detection
- managing shunned hosts
- viewing attackers and targets
- viewing threat statistics
- configuring tcp normalization
- configuring connection limits and timeouts
- dead connection detection overview
- preventing ip spoofing
- configuring the fragment size
- configuring ip audit for basic ips support
- qos concepts
- identifying traffic for qos
- defining a qos policy map
- applying rate limiting
- activating the service policy
- applying low latency queueing
- reducing queue latency
- viewing qos configuration
- viewing qos policy map configuration
- viewing qos priority queue statistics
- inspection engine overview
- inspection limitations
- configuring application inspection
- ctiqbe inspection
- verifying and monitoring ctiqbe inspection
- dcerpc inspection
- dns inspection
- how dns application inspection works
- configuring dns rewrite
- using the static command for dns rewrite
- dns rewrite with three nat zones
- configuring dns rewrite with three nat zones
- verifying and monitoring dns inspection
- configuring a dns inspection policy map for additional inspection control
- esmtp inspection
- configuring an ftp inspection policy map for additional inspection control
- verifying and monitoring ftp inspection
- configuring a gtp inspection policy map for additional inspection control
- verifying and monitoring gtp inspection
- h.323 inspection overview
- configuring an h.323 inspection policy map for additional inspection control
- configuring h.323 and h.225 timeout values
- monitoring h.245 sessions
- monitoring h.323 ras sessions
- configuring an http inspection policy map for additional inspection control
- im inspection overview
- icmp inspection
- mgcp inspection overview
- configuring an mgcp inspection policy map for additional inspection control
- configuring mgcp timeout values
- netbios inspection
- pptp inspection
- configuring a radius inspection policy map for additional inspection control
- using realplayer
- configuring an rtsp inspection policy map for additional inspection control
- configuring a sip inspection policy map for additional inspection control
- configuring sip timeout values
- verifying and monitoring sip inspection
- sccp inspection overview
- verifying and monitoring sccp inspection
- smtp and extended smtp inspection
- snmp inspection
- sql*net inspection
- sun rpc inspection overview
- verifying and monitoring sun rpc inspection
- tftp inspection
- maximum tls proxy sessions
- configuring tls proxy
- debugging tls proxy
- ctl client
- xdmcp inspection
- configuring arp inspection
- adding a static arp entry
- customizing the mac address table
- setting the mac address timeout
- configuring vpn
- ipsec overview
- configuring isakmp policies
- enabling isakmp on the outside interface
- enabling ipsec over tcp
- waiting for active sessions to terminate before rebooting
- creating a certificate group matching rule and policy
- using the tunnel-group-map default-group command
- understanding transform sets
- changing ipsec sa lifetimes
- using dynamic crypto maps
- providing site-to-site redundancy
- clearing security associations
- supporting the nokia vpn client
- configuring l2tp over ipsec
- ipsec transport and tunnel modes
- configuring l2tp over ipsec connections
- tunnel group switching
- using l2tp debug commands
- enabling ipsec debug
- setting general ipsec vpn parameters
- permitting intra-interface traffic
- nat considerations for intra-interface traffic
- understanding load balancing
- implementing load balancing
- some typical mixed cluster scenarios
- configuring load balancing
- configuring the load balancing cluster attributes
- enabling redirection using a fully-qualified domain name
- configuring vpn session limits
- configuring connection profiles, group policies, and users
- connection profiles
- general connection profile connection parameters
- ipsec tunnel-group connection parameters
- connection profile connection parameters for clientless ssl vpn sessions
- configuring connection profiles
- configuring ipsec tunnel-group general attributes
- configuring ipsec remote-access connection profile general attributes
- enabling ipv6 vpn access
- configuring ipsec remote-access connection profile ipsec attributes
- configuring ipsec remote-access connection profile ppp attributes
- configuring lan-to-lan connection profiles
- default lan-to-lan connection profile configuration
- configuring lan-to-lan ipsec attributes
- configuring connection profiles for clientless ssl vpn sessions
- configuring tunnel-group attributes for clientless ssl vpn sessions
- customizing login windows for users of clientless ssl vpn sessions
- configuring microsoft active directory settings for password management
- using active directory to force the user to change password at next logon
- using active directory to specify maximum password age
- using active directory to override an account disabled aaa indicator
- using active directory to enforce minimum password length
- using active directory to enforce password complexity
- group policies
- default group policy
- configuring group policies
- configuring an internal group policy
- configuring vpn-specific attributes
- configuring security attributes
- configuring the banner message
- configuring ipsec-udp attributes
- configuring domain attributes for tunneling
- configuring attributes for vpn hardware clients
- configuring backup server attributes
- configuring microsoft internet explorer client parameters
- configuring network admission control parameters
- configuring address pools
- configuring firewall policies
- configuring client access rules
- configuring group-policy attributes for clientless ssl vpn sessions
- setting a user password and privilege level
- configuring vpn user attributes
- configuring clientless ssl vpn access for specific users
- configuring ip addresses for vpns
- configuring dhcp addressing
- configuring remote access ipsec vpns
- configuring isakmp policy and enabling isakmp on the outside interface
- adding a user
- creating a dynamic crypto map
- creating a crypto map entry to use the dynamic crypto map
- configuring network admission control
- adding, accessing, or removing a nac policy
- configuring a nac policy
- setting the revalidation timer
- configuring exemptions from nac
- assigning a nac policy to a group policy
- enabling and disabling clientless authentication
- changing nac framework session attributes
- configuring easy vpn services on the asa
- specifying the primary and secondary servers
- configuring automatic xauth authentication
- comparing tunneling options
- specifying the tunnel group or trustpoint
- specifying the trustpoint
- configuring split tunneling
- configuring remote management
- group policy and user attributes pushed to the client
- authentication options
- configuring the pppoe client
- configuring the pppoe client username and password
- enabling pppoe
- monitoring and debugging the pppoe client
- clearing the configuration
- configuring lan-to-lan ipsec vpns
- configuring an acl
- creating a crypto map and applying it to an interface
- observing clientless ssl vpn security precautions
- understanding features not supported in clientless ssl vpn
- configuring clientless ssl vpn and asdm ports
- configuring ssl/tls encryption protocols
- using single sign-on with clientless ssl vpn
- configuring sso authentication using siteminder
- configuring sso authentication using saml browser post profile
- configuring sso with the http form protocol
- creating and applying clientless ssl vpn resources
- configuring browser access to client-server plug-ins
- about installing browser plug-ins
- preparing the security appliance for a plug-in
- preparing the citrix metraframe server for clientless ssl vpn access
- providing a bookmark and optional sso support for citrix sessions
- viewing the plug-ins installed on the security appliance
- why port forwarding
- adding applications to be eligible for port forwarding
- assigning a port forwarding list
- enabling and disabling port forwarding
- about smart tunnels
- adding applications to be eligible for smart tunnel access
- assigning a smart tunnel list
- enabling and disabling smart tunnel access
- recovering from hosts file errors when using application access
- configuring file access
- using clientless ssl vpn with pdas
- configuring e-mail proxies
- configuring web e-mail: ms outlook web access
- configuring content transformation
- using proxy bypass
- apcf syntax
- apcf example
- clientless ssl vpn end user setup
- defining the end user interface
- viewing the clientless ssl vpn home page
- viewing the clientless ssl vpn application access panel
- viewing the floating toolbar
- how customization works
- editing the customization template
- importing a customization object
- applying customizations to connection profiles, group policies and users
- customizing help
- customizing a help file provided by cisco
- importing a help file to flash memory
- communicating security tips
- translating the language of user messages
- referencing the language in a customization object
- changing a group policy or user attributes to use the customization object
- using a browser to display capture data
- configuring anyconnect vpn client connections
- remote pc system requirements
- enabling anyconnect client connections
- enabling permanent client installation
- ensuring reliable dtls connections through third-party firewalls
- enabling anyconnect client profile downloads
- enabling additional anyconnect client features
- enabling start before logon
- configuring advanced ssl vpn features
- enabling keepalive
- using compression
- viewing ssl vpn sessions
- updating ssl vpn client images
- configuring certificates
- certificate scalability
- about trustpoints
- about ocsp
- supported ca servers
- configuring key pairs
- removing key pairs
- obtaining certificates
- obtaining certificates manually
- configuring crls for a trustpoint
- exporting and importing trustpoints
- exporting a trustpoint configuration
- the local ca
- configuring the local ca server
- customizing the local ca server
- certificate characteristics
- defining storage for local ca files
- setting up external local ca file storage
- crl downloading
- setting up enrollment parameters
- enrollment requirements
- starting and stopping the local ca server
- debugging the local ca server
- adding and enrolling users
- renewing users
- revocation checking
- display the local ca certificate
- display the user database
- local ca server maintenance and backup procedures
- local ca certificate rollover
- managing system access
- allowing ssh access
- using an ssh client
- enabling https access
- configuring aaa for system administrators
- configuring authentication to access privileged exec mode (the enable command)
- authenticating users using the login command
- configuring command authorization
- command authorization overview
- configuring local command authorization
- configuring tacacs+ command authorization
- configuring command accounting
- recovering from a lockout
- configuring a login banner
- managing software, licenses, and configurations
- entering a new activation key
- downloading software or configuration files to flash memory
- downloading a file to the startup or running configuration
- configuring the application image and asdm image to boot
- configuring the file to boot as the startup configuration
- upgrading an active/standby failover configuration
- backing up configuration files
- backing up a context configuration in flash memory
- using a script to back up and restore files
- running the script
- configuring auto update support
- configuring communication with an auto update server
- configuring client updates as an auto update server
- viewing auto update status
- monitoring the security appliance
- enabling snmp
- configuring and managing logs
- enabling and disabling logging
- configuring log output destinations
- sending system log messages to the console port
- sending system log messages to an e-mail address
- sending system log messages to asdm
- sending system log messages to a telnet or ssh session
- sending system log messages to the log buffer
- filtering system log messages
- filtering system log messages by class
- filtering system log messages with custom message lists
- customizing the log configuration
- including the date and time in system log messages
- generating system log messages in emblem format
- changing the severity level of a system log message
- changing the amount of internal flash memory available for logs
- understanding system log messages
- testing your configuration
- pinging security appliance interfaces
- pinging through the security appliance
- disabling the test configuration
- packet tracer
- recovering passwords for the asa 5500 series adaptive security appliance
- recovering passwords for the pix 500 series security appliance
- disabling password recovery
- resetting the password on the ssm hardware module
- erasing the flash file system
- common problems
- cisco vpn client support
- cryptographic standards
- example 1: system configuration
- example 1: admin context configuration
- example 1: customer c context configuration
- example 2: single mode firewall using same security level
- example 3: department 1 context configuration
- example 3: department 2 context configuration
- example 4: multiple mode, transparent firewall with outside access
- example 4: system configuration
- example 4: admin context configuration
- example 4: customer a context configuration
- example 4: customer c context configuration
- example 6: ipv6 configuration
- example 7: cable-based active/standby failover (routed mode)
- example 8: lan-based active/standby failover (routed mode)
- example 8: secondary unit configuration
- example 9: primary unit configuration
- example 9: primary admin context configuration
- example 9: primary ctx1 context configuration
- example 11: primary unit configuration
- example 11: secondary unit configuration
- example 12: primary unit configuration
- example 12: primary system configuration
- example 12: primary ctx1 context configuration
- example 13: dual isp support using static route tracking
- example 14: asa 5505 base license
- example 15: primary unit configuration
- example 15: secondary unit configuration
- using the command-line interface
- command modes and prompts
- command completion
- automatic text entries
- ipv6 address types
- multicast address
- anycast address
- required addresses
- protocols and applications
- local ports and protocols
- icmp types
- understanding policy enforcement of permissions and attributes
- reviewing the ldap directory structure and configuration procedure
- searching the hierarchy
- binding the security appliance to the ldap server
- cisco-av-pair attribute syntax
- example security appliance authorization schema
- loading the schema in the ldap server
- example user file
- example 2: configuring ldap authentication with microsoft active directory
- example 3: ldap authentication and ldap authorization with microsoft active directory
- security appliance tacacs+ attributes
- l o s s a r y
500 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- getting started
- launching the configuration utility
- quick start device configuration
- Interface Naming Conventions
- window navigation
- system summary
- etherlike statistics
- gvrp statistics
- x eap statistics
- acl statistics
- tcam utilization
- Health
- rmon statistics
- rmon history
- rmon history table
- rmon events control
- rmon alarms
- view log
- setting system log settings
- setting remote logging settings
- viewing memory logs
- system files
- Upgrade/Backup Firmware/Language
- active image
- configuration file backwards compatibility
- configuration files properties
- Copy/Save Configuration
- Auto Configuration/Image Update via DHCP
- Overview
- types of units in stack
- unit leds
- topology discovery
- unit id assignment
- Master Selection Process
- Unit Failure in Stack
- software auto synchronization in stack
- stack ports
- port speeds
- Default Configuration
- device models
- System Settings
- Console Settings (Autobaud Rate Support)
- management interface
- time settings
- routing resources
- Diagnostics
- Discovery - LLDP
- Traceroute
- system time options
- sntp modes
- configuring system time
- adding a unicast sntp server
- configuring the sntp mode
- defining sntp authentication
- time range
- copper ports tests
- displaying optical module status
- configuring port and vlan mirroring
- viewing cpu utilization and secure core technology
- bonjour in layer 2 system mode
- bonjour in layer 3 system mode
- lldp and cdp
- configuring lldp
- lldp overview
- lldp properties
- lldp port settings
- lldp med network policy
- lldp med port settings
- lldp local information
- lldp neighbor information
- lldp statistics
- lldp overloading
- configuring cdp
- cdp statistics
- port management
- port configuration
- loopback detection
- configuring loopback detection
- link aggregation
- configuring lag settings
- configuring lacp
- configuring green ethernet
- az energy efficient ethernet feature
- udld overview
- udld operation
- usage guidelines
- Dependencies On Other Features
- Before You Start
- configuring udld
- what is a smartport
- special smartport types
- smartport macros
- applying a smartport type to an interface
- macro failure and the reset operation
- auto smartport
- identifying smartport type
- multiple devices attached to the port
- error handling
- relationships with other features and backwards compatibility
- Configuring Smartport Using The Web-based Interface
- smartport properties
- smartport type settings
- smartport interface settings
- Built-in Smartport Macros
- poe on the device
- poe configuration considerations
- poe properties
- poe settings
- vlan management
- vlan description
- private vlan
- traffic flow
- regular vlans
- interface settings
- vlan membership
- private vlan settings
- gvrp settings
- vlan groups
- voice vlan
- voice vlan configuration
- access port multicast tv vlan
- igmp snooping
- customer port multicast tv vlan
- port multicast vlan membership
- spanning tree
- stp status and global settings
- spanning tree interface settings
- rapid spanning tree settings
- multiple spanning tree
- VLANs to a MSTP Instance
- mstp instance settings
- mstp interface settings
- static mac addresses
- dynamic mac addresses
- reserved mac addresses
- multicast forwarding
- typical multicast setup
- multicast address properties
- multicast properties
- ip multicast group addresses
- igmp snooping configuration
- igmp interface settings
- igmp proxy
- mld snooping
- mld proxy
- IGMP/MLD Snooping IP Multicast Group
- multicast router ports
- forward all
- loopback interface
- ipv4 management and interfaces
- ipv4 routes
- access list
- arp proxy
- dhcp snooping binding database
- dhcp server
- ipv6 management and interfaces
- ipv6 global configuration
- ipv6 interface
- ipv6 tunnel
- defining ipv6 addresses
- ipv6 default router list
- defining ipv6 neighbors information
- viewing ipv6 route tables
- dhcpv6 relay
- domain name
- search list
- how rip operates on the device
- passive mode
- configuring rip
- access lists
- Configurable Elements of VRRP
- vrrp router priority and preemption
- vrrp advertisements
- vrrp statistics
- defining users
- configuring tacacs
- configuring radius
- accounting using a radius server
- radius workflow
- key management
- Management Access Method
- active access profile
- defining profile rules
- management access authentication
- secure sensitive data management
- ssl server authentication settings
- ssh server
- ssh client
- defining storm control
- configuring port security
- denial of service prevention
- types of dos attacks
- defense against dos attacks
- configuring dos prevention
- dhcp snooping
- configuring ip source guard work flow
- enabling ip source guard
- binding database
- arp inspection
- how arp prevents cache poisoning
- interaction between arp inspection and dhcp snooping
- arp inspection work flow
- defining dynamic arp inspection interfaces settings
- defining arp inspection access control rules
- First Hop Security
- Overview of 802.1X
- authentication server
- Authenticator Overview
- multiple authentication methods
- Common Tasks
- x configuration through the gui
- x port authentication
- defining host and session authentication
- viewing authenticated hosts
- defining time ranges
- Authentication Method and Port Mode Support
- IPv6 First Hop Security Overview
- Router Advertisement Guard
- DHCPv6 Guard
- Neighbor Binding Integrity
- IPv6 Source Guard
- Attack Protection
- Policies, Global Parameters and System Defaults
- Default Settings and Configuration
- Configuring IPv6 First Hop Security through Web GUI
- Secure Copy (SCP) and SSH
- protection methods
- SSH Server Authentication
- ssh client authentication
- before you begin
- ssh client configuration through the gui
- SSH Server Configuration
- Introduction
- ssd management
- SSD Properties
- local passphrase
- configuration file integrity control
- read mode
- ssd control block
- running configuration file
- backup and mirror configuration file
- ssd management channels
- configuring ssd
- access control
- acl logging
- configuring acls
- MAC-based ACLs
- IPv4-based ACLs
- IPv6-Based ACLs
- acl binding
- quality of service
- qos features and components
- qos modes
- qos workflow
- setting qos properties
- configuring qos queues
- mapping dscp to queue
- configuring bandwidth
- configuring egress shaping per queue
- tcp congestion avoidance
- qos basic mode
- interface qos settings
- qos advanced mode
- workflow to configure advanced qos mode
- defining class mapping
- qos policers
- defining aggregate policers
- configuring a policy
- policy binding
- managing qos statistics
- viewing queues statistics
- snmp versions and workflow
- snmpv1 and v2
- supported mibs
- snmp engine id
- configuring snmp views
- creating snmp groups
- managing snmp users
- defining snmp communities
- defining trap settings
- notification recipients
- defining snmpv3 notification recipients
- snmp notification filters
500 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this guide
- related documentation
- document conventions
- documentation feedback
- Intrusion Prevention Services Functional Overview
- Security Context Overview
- Getting Started with Your Platform Model
- Chapter 2 Getting Started
- ASA 5510 and Higher Default Configuration
- PIX 515/515E Default Configuration
- Setting Transparent or Routed Firewall Mode
- Working with the Configuration
- Saving Configuration Changes in Single Context Mode
- Copying the Startup Configuration to the Running Configuration
- Clearing and Removing Configuration Settings
- Chapter 3 Enabling Multiple Context Mode
- How the Security Appliance Classifies Packets
- Invalid Classifier Criteria
- Classification Examples
- Cascading Security Contexts
- Management Access to Security Contexts
- Context Administrator Access
- Restoring Single Context Mode
- Appliance
- Understanding ASA 5505 Ports and Interfaces
- Default Interface Configuration
- VLAN MAC Addresses
- Security Level Overview
- Configuring Switch Ports as Access Ports
- Configuring a Switch Port as a Trunk Port
- Allowing Communication Between VLAN Interfaces on the Same Security Level
- C H A P T E R 5 Configuring Ethernet Settings and Subinterfaces
- Configuring and Enabling Fiber Interfaces
- Configuring and Enabling RJ-45 Interfaces
- Configuring Resource Management
- Resource Limits
- C H A P T E R 6 Adding and Managing Security Contexts
- Class Members
- Configuring a Security Context
- Automatically Assigning MAC Addresses to Context Interfaces
- Managing Security Contexts
- Changing the Admin Context
- Reloading a Security Context
- Reloading by Removing and Re-adding the Context
- Viewing Resource Allocation
- Viewing Resource Usage
- Monitoring SYN Attacks in Contexts
- C H A P T E R 7 Configuring Interface Parameters
- Configuring the Interface
- Allowing Communication Between Interfaces on the Same Security Level
- Changing the Login Password
- Chapter 8 Configuring Basic Setting
- Setting the Time Zone and Daylight Saving Time Date Range
- Setting the Date and Time Using an NTP Server
- Setting the Management IP Address for a Transparent Firewall
- Configuring Static and Default Routes
- Chapter 9 Configuring IP Routing
- Configuring a Default Route
- Defining Route Maps
- Configuring OSPF
- OSPF Overview
- Redistributing Routes Into OSPF
- Configuring OSPF Interface Parameters
- Configuring OSPF Area Parameters
- Configuring OSPF NSSA
- Configuring Route Summarization Between OSPF Areas
- Defining Static OSPF Neighbors
- Generating a Default Route
- Logging Neighbors Going Up or Down
- Monitoring OSPF
- Configuring RIP
- Redistributing Routes into the RIP Routing Process
- Configuring RIP Send/Receive Version on an Interface
- Monitoring RIP
- How the Routing Table is Populated
- Backup Routes
- Configuring a DHCP Server
- C H A P T E R 10 Configuring DHCP, DDNS, and WCCP Services
- Configuring DHCP Options
- Using Cisco IP Phones with a DHCP Server
- Configuring DHCP Relay Services
- Configuring Dynamic DNS
- Example 1: Client Updates Both A and PTR RRs for Static IP Addresses
- Client and Updates Both RRs
- Example 5: Client Updates A RR; Server Updates PTR RR
- WCCP Interaction With Other Features
- Multicast Routing Overview
- C H A P T E R 11 Configuring Multicast Routing
- Disabling IGMP on an Interface
- Limiting the Number of IGMP States on an Interface
- Changing the Query Response Time
- Configuring PIM Features
- Configuring a Static Rendezvous Point Address
- Configuring a Multicast Boundary
- Supporting Mixed Bidirctional/Sparse-Mode PIM Networks
- IPv6-enabled Commands
- Configuring IPv6
- Configuring IPv6 on an Interface
- Configuring a Dual IP Stack on an Interface
- Configuring IPv6 Default and Static Routes
- Configuring IPv6 Access Lists
- Configuring IPv6 Neighbor Discovery
- Configuring Router Advertisement Messages
- Configuring a Static IPv6 Neighbor
- The show ipv6 route Command
- AAA Overview
- C H A P T E R 13 Configuring AAA Servers and the Local Database
- Summary of Support
- Authentication Methods
- SDI Version Support
- LDAP Server Support
- Authorization with LDAP for VPN
- LDAP Attribute Mapping
- SSO Support for WebVPN with HTTP Forms
- User Profiles
- Identifying AAA Server Groups and Servers
- Using Certificates and User Login Credentials
- Using certificates
- Overview of Integrity Server and Security Appliance Interaction
- Understanding Failover
- Chapter 14 Configuring Failover
- The Failover and Stateful Failover Links
- Stateful Failover Link
- Active/Active and Active/Standby Failover
- Active/Active Failover
- Determining Which Type of Failover to Use
- Failover Health Monitoring
- Interface Monitoring
- Failover Feature/Platform Matrix
- Failover Configuration Limitations
- Configuring LAN-Based Active/Standby Failover
- Configuring Optional Active/Standby Failover Settings
- Configuring Active/Active Failover
- Configuring LAN-Based Active/Active Failover
- Configuring Optional Active/Active Failover Settings
- Configuring Unit Health Monitoring
- Verifying the Failover Configuration
- Viewing Monitored Interfaces
- Testing the Failover Functionality
- Disabling Failover
- Failover System Messages
- Routed Mode Overview
- Chapter 15 Firewall Mode Overview
- An Inside User Visits a Web Server
- An Outside User Visits a Web Server on the DMZ
- An Inside User Visits a Web Server on the DMZ
- An Outside User Attempts to Access an Inside Host
- A DMZ User Attempts to Access an Inside Host
- Transparent Firewall Network
- MAC Address Lookups
- Unsupported Features in Transparent Mode
- How Data Moves Through the Transparent Firewall
- An Outside User Visits a Web Server on the Inside Network
- Access List Overview
- Access List Types
- C H A P T E R 16 Identifying Traffic with Access Lists
- Adding an Extended Access List
- Allowing Special IP Traffic through the Transparent Firewall
- Adding an EtherType Access List
- Adding a Standard Access List
- Adding a Webtype Access List
- Adding Object Groups
- Adding a Network Object Group
- Adding an ICMP Type Object Group
- Nesting Object Groups
- Using Object Groups with an Access List
- Displaying Object Groups
- Scheduling Extended Access List Activation
- Applying the Time Range to an ACE
- Configuring Logging for an Access Control Entry
- Managing Deny Flows
- NAT Overview
- Introduction to NAT
- Chapter 17 Applying NAT
- NAT Types
- Static NAT
- Bypassing NAT when NAT Control is Enabled
- NAT and Same Security Level Interfaces
- Order of NAT Commands Used to Match Real Addresses
- Configuring NAT Control
- Using Dynamic NAT and PAT
- Configuring Dynamic NAT or PAT
- Using Static NAT
- Using Static PAT
- Bypassing NAT
- Configuring Static Identity NAT
- Configuring NAT Exemption
- NAT Examples
- Overlapping Networks
- Redirecting Ports
- C H A P T E R 18 Permitting or Denying Network Access
- Applying an Access List to an Interface
- AAA Performance
- Chapter 19 Applying AAA for Network Acces
- Static PAT and HTTP
- Enabling Secure Authentication of Web Clients
- Configuring RADIUS Authorization
- Configuring a RADIUS Server to Download Per-User Access Control List Names
- Configuring Accounting for Network Access
- Using MAC Addresses to Exempt Traffic from Authentication and Authorization
- Filtering Overview
- C H A P T E R 20 Applying Filtering Services
- Filtering Java Applets
- URL Filtering Overview
- Buffering the Content Server Response
- Caching Server Addresses
- Enabling Filtering of Long HTTP URLs
- Filtering HTTPS URLs
- Viewing Filtering Statistics and Configuration
- Viewing Buffer Configuration and Statistics
- Viewing Caching Statistics
- Modular Policy Framework Overview
- Chapter 21 Using Modular Policy Framework
- Creating a Layer 3/4 Class Map for Through Traffic
- Creating a Layer 3/4 Class Map for Management Traffic
- Creating a Regular Expression
- Creating a Regular Expression Class Map
- Identifying Traffic in an Inspection Class Map
- Defining Actions in an Inspection Policy Map
- Defining Actions Using a Layer 3/4 Policy Map
- Default Layer 3/4 Policy Map
- Adding a Layer 3/4 Policy Map
- Applying a Layer 3/4 Policy to an Interface Using a Service Policy
- Applying Inspection and QoS Policing to HTTP Traffic
- Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers
- Applying Inspection to HTTP Traffic with NAT
- Managing the AIP SSM
- Chapter 22 Managing AIP SSM and CSC SSM
- Sessioning to the AIP SSM and Running Setup
- Managing the CSC SSM
- Getting Started with the CSC SSM
- Determining What Traffic to Scan
- Limiting Connections Through the CSC SSM
- Checking SSM Status
- Transferring an Image onto an SSM
- Configuring TCP Normalization
- Chapter 23 Preventing Network Attack
- Configuring Connection Limits and Timeouts
- Preventing IP Spoofing
- Configuring the Fragment Size
- Configuring IP Audit for Basic IPS Support
- Overview
- Chapter 24 Applying Qo Policie
- Identifying Traffic for QoS
- Defining a QoS Policy Map
- Applying Rate Limiting
- Activating the Service Policy
- Applying Low Latency Queueing
- Reducing Queue Latency
- Viewing QoS Configuration
- Viewing QoS Policy Map Configuration
- Viewing QoS Statistics
- Viewing QoS Priority Queue Statistics
- C H A P T E R 25 Configuring Application Layer Protocol Inspection
- Default Inspection Policy
- Configuring Application Inspection
- CTIQBE Inspection
- Limitations and Restrictions
- DCERPC Inspection
- Configuring a DCERPC Inspection Policy Map for Additional Inspection Control
- DNS Inspection
- How DNS Rewrite Works
- Configuring DNS Rewrite
- Using the Alias Command for DNS Rewrite
- DNS Rewrite with Three NAT Zones
- Configuring DNS Rewrite with Three NAT Zones
- Verifying and Monitoring DNS Inspection
- ESMTP Inspection
- FTP Inspection
- FTP Inspection Overview
- Configuring an FTP Inspection Policy Map for Additional Inspection Control
- Verifying and Monitoring FTP Inspection
- GTP Inspection
- Configuring a GTP Inspection Policy Map for Additional Inspection Control
- Verifying and Monitoring GTP Inspection
- H.323 Inspection
- Configuring H.323 and H.225 Timeout Values
- Monitoring H.245 Sessions
- Monitoring H.323 RAS Sessions
- Configuring an HTTP Inspection Policy Map for Additional Inspection Control
- Instant Messaging Inspection
- IM Inspection Overview
- ICMP Inspection
- MGCP Inspection
- MGCP Inspection Overview
- Configuring an MGCP Inspection Policy Map for Additional Inspection Control
- Configuring MGCP Timeout Values
- Configuring a NetBIOS Inspection Policy Map for Additional Inspection Control
- PPTP Inspection
- RADIUS Accounting Inspection
- RSH Inspection
- Restrictions and Limitations
- SIP Instant Messaging
- Configuring a SIP Inspection Policy Map for Additional Inspection Control
- Configuring SIP Timeout Values
- Verifying and Monitoring SIP Inspection
- SCCP Inspection Overview
- Verifying and Monitoring SCCP Inspection
- SMTP and Extended SMTP Inspection
- SNMP Inspection
- SQL*Net Inspection
- Sun RPC Inspection Overview
- Verifying and Monitoring Sun RPC Inspection
- TFTP Inspection
- Configuring ARP Inspection
- C H A P T E R 26 Configuring ARP Inspection and Bridging Parameters
- Customizing the MAC Address Table
- Setting the MAC Address Timeout
- Tunneling Overview
- Chapter 27 Configuring IPSec and ISAKMP
- Configuring ISAKMP Policies
- Enabling ISAKMP on the Outside Interface
- Enabling IPSec over NAT-T
- Enabling IPSec over TCP
- Waiting for Active Sessions to Terminate Before Rebooting
- Creating a Certificate Group Matching Rule and Policy
- Using the Tunnel-group-map default-group Command
- Understanding Transform Sets
- Applying Crypto Maps to Interfaces
- Changing IPSec SA Lifetimes
- Using Dynamic Crypto Maps
- Providing Site-to-Site Redundancy
- Clearing Security Associations
- Supporting the Nokia VPN Client
- L2TP Overview
- IPSec Transport and Tunnel Modes
- Chapter 28 Configuring L2TP over IPSec
- Tunnel Group Switching
- Using L2TP Debug Commands
- Enabling IPSec Debug
- Configuring VPNs in Single, Routed Mode
- C H A P T E R 29 Setting General IPSec VPN Parameters
- NAT Considerations for Intra-Interface Traffic
- Understanding Load Balancing
- Implementing Load Balancing
- Eligible Platforms
- Some Typical Mixed Cluster Scenarios
- Configuring Load Balancing
- Configuring the Load Balancing Cluster Attributes
- Configuring VPN Session Limits
- Overview of Tunnel Groups, Group Policies, and Users
- C H A P T E R 30 Configuring Tunnel Groups, Group Policies, and Users
- IPSec Tunnel-Group Connection Parameters
- WebVPN Tunnel-Group Connection Parameters
- Configuring Tunnel Groups
- Configuring IPSec Tunnel-Group General Attributes
- Configuring IPSec Remote-Access Tunnel Group IPSec Attributes
- Configuring IPSec Remote-Access Tunnel Group PPP Attributes
- Configuring LAN-to-LAN Tunnel Groups
- Configuring LAN-to-LAN Tunnel Group General Attributes
- Configuring WebVPN Tunnel Groups
- Configuring WebVPN Tunnel-Group General Attributes
- Configuring WebVPN Tunnel-Group WebVPN Attributes
- Customizing Login Windows for WebVPN Users
- Configuring Microsoft Active Directory Settings for Password Management
- Using Active Directory to Specify Maximum Password Age
- Using Active Directory to Override an Account Disabled AAA Indicator
- Using Active Directory to Enforce Minimum Password Length
- Using Active Directory to Enforce Password Complexity
- Group Policies
- Default Group Policy
- Configuring Group Policies
- Configuring an Internal Group Policy
- Configuring VPN-Specific Attributes
- Configuring Security Attributes
- Configuring the Banner Message
- Configuring Split-Tunneling Attributes
- Configuring Domain Attributes for Tunneling
- Configuring Attributes for VPN Hardware Clients
- Configuring Backup Server Attributes
- Configuring Microsoft Internet Explorer Client Parameters
- Configuring Network Admission Control Parameters
- Configuring Address Pools
- Configuring Firewall Policies
- Configuring Client Access Rules
- Configuring Group-Policy WebVPN Attributes
- Configuring User Attributes
- Viewing the Username Configuration
- Configuring WebVPN for Specific Users
- Configuring an IP Address Assignment Method
- Chapter 31 Configuring IP Addresse for VPN
- Configuring DHCP Addressing
- Summary of the Configuration
- C H A P T E R 32 Configuring Remote Access IPSec VPNs
- Configuring ISAKMP Policy and Enabling ISAKMP on the Outside Interface
- Configuring an Address Pool
- Defining a Tunnel Group
- Creating a Dynamic Crypto Map
- Creating a Crypto Map Entry to Use the Dynamic Crypto Map
- Uses, Requirements, and Limitations
- C H A P T E R 33 Configuring Network Admission Control
- Configuring the Default ACL for NAC
- Configuring Exemptions from NAC
- Changing Advanced Settings
- Changing the Login Credentials Used for Clientless Authentication
- Configuring NAC Session Attributes
- Setting the Query-for-Posture-Changes Timer
- Specifying the Client/Server Role of the Cisco ASA 5505
- Specifying the Primary and Secondary Servers
- Configuring Automatic Xauth Authentication
- Comparing Tunneling Options
- Specifying the Tunnel Group or Trustpoint
- Specifying the Trustpoint
- Configuring Split Tunneling
- Configuring Remote Management
- Group Policy and User Attributes Pushed to the Client
- Authentication Options
- PPPoE Client Overview
- Chapter 35 Configuring the PPPoE Client
- Enabling PPPoE
- Monitoring and Debugging the PPPoE Client
- Clearing the Configuration
- C H A P T E R 36 Configuring LAN-to-LAN IPSec VPNs
- Creating a Transform Set
- Creating a Crypto Map and Applying It To an Interface
- Getting Started with WebVPN
- Chapter 37 Configuring WebVPN
- Using SSL to Access the Central Site
- Setting WebVPN HTTP/HTTPS Proxy
- Enabling Cookies on Browsers for WebVPN
- Configuring SSO with HTTP Basic or NTLM Authentication
- Configuring SSO Authentication Using SiteMinder
- Configuring SSO with the HTTP Form Protocol
- Authenticating with Digital Certificates
- Creating Port Forwarding, URL, and Access Lists in Global Configuration Mode
- Configuring WebVPN Tunnel Group Attributes
- Configuring Application Access
- Recovering from hosts File Errors When Using Application Access
- Stopping Application Access Improperly
- Configuring File Access
- Configuring Access to Citrix MetaFrame Services
- Using WebVPN with PDAs
- Using E-Mail over WebVPN
- E-mail Proxy Certificate Authentication
- Optimizing WebVPN Performance
- Configuring a Certificate for Signing Rewritten Java Content
- Configuring Application Profile Customization Framework
- APCF Example
- Viewing the WebVPN Home Page
- Viewing the Floating Toolbar
- Customizing WebVPN Pages
- Customizing the WebVPN Login Page
- Customizing the WebVPN Logout Page
- Customizing the WebVPN Home Page
- Customizing the Application Access Window
- Customizing the Prompt Dialogs
- Applying Customizations to Tunnel Groups, Groups and Users
- Requiring Usernames and Passwords
- Communicating Security Tips
- Capturing WebVPN Data
- Creating a Capture File
- Installing SVC
- Chapter 38 Configuring SSL VPN Client
- Enabling SVC
- Enabling Permanent SVC Installation
- Enabling Rekey
- Enabling Keepalive
- Viewing SVC Sessions
- Logging Off SVC Sessions
- Public Key Cryptography
- C H A P T E R 39 Configuring Certificates
- About Trustpoints
- About OCSP
- Supported CA Servers
- Configuring Key Pairs
- Removing Key Pairs
- Obtaining Certificates
- Obtaining Certificates Manually
- Configuring CRLs for a Trustpoint
- Exporting and Importing Trustpoints
- Exporting a Trustpoint Configuration
- Allowing Telnet Access
- Chapter 40 Managing System Acces
- Using an SSH Client
- Configuring AAA for System Administrators
- Configuring Authentication for CLI Access
- Configuring Authentication for the Enable Command
- Configuring Command Authorization
- Configuring TACACS+ Command Authorization
- Configuring Command Accounting
- Recovering from a Lockout
- Configuring a Login Banner
- Managing Licenses
- C H A P T E R 41 Managing Software, Licenses, and Configurations
- Downloading Software or Configuration Files to Flash Memory
- Downloading a File to the Startup or Running Configuration
- Configuring the Application Image and ASDM Image to Boot
- Performing Zero Downtime Upgrades for Failover Pairs
- Upgrading and Active/Active Failover Configuration
- Backing Up Configuration Files
- Backing Up a Context Configuration within a Context
- Configuring Client Updates as an Auto Update Server
- Viewing Auto Update Status
- Using SNMP
- C H A P T E R 42 Monitoring the Security Appliance
- Enabling SNMP
- Configuring and Managing Logs
- Enabling and Disabling Logging
- Configuring Log Output Destinations
- Sending System Log Messages to the Console Port
- Sending System Log Messages to an E-mail Address
- Sending System Log Messages to ASDM
- Sending System Log Messages to a Telnet or SSH Session
- Sending System Log Messages to the Log Buffer
- Filtering System Log Messages
- Message Filtering Overview
- Filtering System Log Messages with Custom Message Lists
- Customizing the Log Configuration
- Configuring the Logging Queue
- Generating System Log Messages in EMBLEM Format
- Changing the Severity Level of a System Log Message
- Changing the Amount of Internal Flash Memory Available for Logs
- Understanding System Log Messages
- Testing Your Configuration
- C H A P T E R 43 Troubleshooting the Security Appliance
- Pinging Through the Security Appliance
- Disabling the Test Configuration
- Traceroute
- Performing Password Recovery for the ASA 5500 Series Adaptive Security Appliance
- Password Recovery for the PIX 500 Series Security Appliance
- Disabling Password Recovery
- Other Troubleshooting Tools
- Supported Platforms and Feature Licenses
- A P P E N D I X A Feature Licenses and Specifications
- Security Services Module Support
- VPN Specifications
- Cisco VPN Client Support
- Cryptographic Standards
- Example 1: Multiple Mode Firewall With Outside Access
- Appendix B Sample Configuration
- Example 1: Admin Context Configuration
- Example 1: Customer C Context Configuration
- Example 2: Single Mode Firewall Using Same Security Level
- Example 3: Shared Resources for Multiple Contexts
- Example 3: System Configuration
- Example 3: Department 1 Context Configuration
- Example 3: Department 2 Context Configuration
- Example 4: Multiple Mode, Transparent Firewall with Outside Access
- Example 4: System Configuration
- Example 4: Admin Context Configuration
- Example 4: Customer A Context Configuration
- Example 4: Customer C Context Configuration
- Example 6: IPv6 Configuration
- Example 7: Cable-Based Active/Standby Failover (Routed Mode)
- Example 8: LAN-Based Active/Standby Failover (Routed Mode)
- Example 8: Secondary Unit Configuration
- Example 9: Primary Unit Configuration
- Example 9: Primary admin Context Configuration
- Example 9: Primary ctx1 Context Configuration
- Example 10: Cable-Based Active/Standby Failover (Transparent Mode)
- Example 11: LAN-Based Active/Standby Failover (Transparent Mode)
- Example 11: Secondary Unit Configuration
- Example 12: LAN-Based Active/Active Failover (Transparent Mode)
- Example 12: Primary System Configuration
- Example 12: Primary ctx1 Context Configuration
- Example 14: Dual ISP Support Using Static Route Tracking
- Example 14: ASA 5505 Base License
- Example 15: ASA 5505 Security Plus License with Failover and Dual-ISP Backup
- Example 15: Secondary Unit Configuration
- Local Ports and Protocols
- ipv6 addresses
- ICMP Types
- Selecting LDAP, RADIUS, or Local Authentication and Authorization
- A P P E N D I X E Configuring an External Server for Authorization and Authentication
- Reviewing the LDAP Directory Structure and Configuration Procedure
- Searching the Hierarchy
- Binding the Security Appliance to the LDAP Server
- Cisco -AV-Pair Attribute Syntax
- Example Security Appliance Authorization Schema
- Loading the Schema in the LDAP Server
- Reviewing Examples of Active Directory Configurations
- Example 2: Configuring LDAP Authentication with Microsoft Active Directory
- Example 3: LDAP Authentication and LDAP Authorization with Microsoft Active Directory
- Configuring an External RADIUS Server
- Security Appliance RADIUS Authorization Attributes
- Adding Comments C
- Passwords C
- Private Networks D
500 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Cisco Headset 520 Series
- Cisco Headset 530 Series
- Cisco Headset 560 Series
- Cisco Headset 560 Series Standard Base
- Cisco Headset 560 Series Multibase
- Connect the Multibase to a Bluetooth Device
- Related Documentation
- Cisco IP Phone 8800 Series Documentation
- Wired Headsets
- Mute Yourself on a Call
- End a Call and Answer an Incoming Call
- Make and Answer Calls
- Reject a Call
- End a Call and Resume a Held Call
- On-Premises Phone Headset Customization
- Adjust Your Speaker Feedback (Y-Cable Only)
- Multiplatform Phone Headset Customization
- Adjust Your Microphone Volume (USB Only)
- Jabber Headset Customization
- Webex Meetings Headset Customization
- Troubleshoot Your Cisco Headset 500 Series
- Problems With Your Headset Audio
- You Hear Broken or Inconsistent Sound in Your Cisco Headset 560 Series
- Other People Can't Hear You on Your Cisco Headset 520 Series or Cisco Headset 530 Series
- Other People Can't Hear You on Your Cisco Headset 560 Series
- Base with Y-Cable Doesn't Work
- There is No Audio With Bluetooth Turned On
- Headset Does Not Hold a Charge
- Maintain Your Cisco Headset 500 Series
- Update Your Headset Firmware on Cisco Jabber
- Important Headset Safety Information
- Compliance Statements for the USA
- Compliance Statement for Singapore