- About This Guide
-
- Introduction to the Security Appliance
- Getting Started
- Enabling Multiple Context Mode
- Configuring Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
- Configuring Ethernet Settings and Subinterfaces
- Adding and Managing Security Contexts
- Configuring Interface Parameters
- Configuring Basic Settings
- Configuring IP Routing
- Configuring Multicast Routing
- Configuring DHCP, DDNS, and WCCP Services
- Configuring IPv6
- Configuring AAA Servers and the Local Database
- Configuring Failover
-
- Firewall Mode Overview
- Identifying Traffic With Access Lists
- Applying NAT
- Permitting or Denying Network Access
- Applying AAA for Network Access
- Applying Filtering Services
- Using Modular Policy Framework
- Managing AIP SSM and CSC SSM
- Preventing Network Attacks
- Applying QoS Policies
- Applying Application Layer Protocol Inspection
- Configuring ARP Inspection and Bridging Parameters
-
- Configuring IPSec and ISAKMP
- Configuring L2TP over IPSec
- Setting General VPN Parameters
- Configuring Tunnel Groups, Group Policies, and Users
- Configuring IP Addresses for VPN
- Configuring Remote Access VPNs
- Configuring Network Admission Control
- Configuring Easy VPN on the ASA 5505
- Configuring the PPPoE Client
- Configuring LAN-to-LAN VPNs
- Configuring WebVPN
- Configuring SSL VPN Client
- Configuring Certificates
- Glossary
- Index
About This Guide
This preface introduce the Cisco Security Appliance Command Line Configuration Guide, and includes the following sections:
•Obtaining Documentation and Submitting a Service Request
Document Objectives
The purpose of this guide is to help you configure the security appliance using the command-line interface. This guide does not address every feature, but describes only the most common configurations.
You can also configure and monitor the security appliance by using ASDM, a web-based GUI application. ASDM includes configuration wizards to guide you through some common configuration scenarios, and online Help for less common scenarios. For more information, see the following URL:
http://www.cisco.com/en/US/products/ps6120/products_installation_and_configuration_guides_list.html
This guide applies to the Cisco PIX 500 series security appliances (PIX 515E, PIX 525, and PIX 535) and the Cisco ASA 5500 series security appliances (ASA 5505, ASA 5510, ASA 5520, ASA 5540, and ASA 5550). Throughout this guide, the term "security appliance" applies generically to all supported models, unless specified otherwise. The PIX 501, PIX 506E, and PIX 520 security appliances are not supported.
Audience
This guide is for network managers who perform any of the following tasks:
•Manage network security
•Install and configure firewalls/security appliances
•Configure VPNs
•Configure intrusion detection software
Related Documentation
For more information, refer to the following documentation:
•Cisco PIX Security Appliance Release Notes
•Cisco ASDM Release Notes
•Cisco PIX 515E Quick Start Guide
•Guide for Cisco PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0
•Migrating to ASA for VPN 3000 Series Concentrator Administrators
•Cisco Security Appliance Command Reference
•Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
•Cisco ASA 5500 Series Release Notes
•Cisco Security Appliance Logging Configuration and System Log Messages
•Cisco Secure Desktop Configuration Guide for Cisco ASA 5500 Series Administrators
Document Organization
This guide includes the chapters and appendixes described in Table 1.
|
|
---|---|
|
|
Provides a high-level overview of the security appliance. |
|
Describes how to access the command-line interface, configure the firewall mode, and work with the configuration. |
|
Describes how to use security contexts and enable multiple context mode. |
|
Describes how to configure switch ports and VLAN interfaces for the ASA 5505 adaptive security appliance. |
|
Chapter 5, "Configuring Ethernet Settings and Subinterfaces" |
Describes how to configure Ethernet settings for physical interfaces and add subinterfaces. |
Describes how to configure multiple security contexts on the security appliance. |
|
Describes how to configure each interface and subinterface for a name, security, level, and IP address. |
|
Describes how to configure basic settings that are typically required for a functioning configuration. |
|
Describes how to configure IP routing. |
|
Describes how to configure the DHCP server and DHCP relay. |
|
Describes how to configure multicast routing. |
|
Describes how to enable and configure IPv6. |
|
Chapter 13, "Configuring AAA Servers and the Local Database" |
Describes how to configure AAA servers and the local database. |
Describes the failover feature, which lets you configure two security appliances so that one will take over operation if the other one fails. |
|
|
|
Describes in detail the two operation modes of the security appliance, routed and transparent mode, and how data is handled differently with each mode. |
|
Describes how to identify traffic with access lists. |
|
Describes how address translation is performed. |
|
Describes how to control network access through the security appliance using access lists. |
|
Describes how to enable AAA for network access. |
|
Describes ways to filter web traffic to reduce security risks or prevent inappropriate use. |
|
Describes how to use the Modular Policy Framework to create security policies for TCP, general connection settings, inspection, and QoS. |
|
Describes how to configure the security appliance to send traffic to an AIP SSM or a CSC SSM, how to check the status of an SSM, and how to update the software image on an intelligent SSM. |
|
Describes how to configure protection features to intercept and respond to network attacks. |
|
Describes how to configure the network to provide better service to selected network traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and IP routed networks. |
|
Chapter 25, "Configuring Application Layer Protocol Inspection" |
Describes how to use and configure application inspection. |
Chapter 26, "Configuring ARP Inspection and Bridging Parameters" |
Describes how to enable ARP inspection and how to customize bridging operations. |
|
|
Describes how to configure ISAKMP and IPSec tunneling to build and manage VPN "tunnels," or secure connections between remote users and a private corporate network. |
|
Describes how to configure IPSec over L2TP on the security appliance. |
|
Describes miscellaneous VPN configuration procedures. |
|
Chapter 30, "Configuring Tunnel Groups, Group Policies, and Users" |
Describes how to configure VPN tunnel groups, group policies, and users. |
Describes how to configure IP addresses in your private network addressing scheme, which let the client function as a tunnel endpoint. |
|
Describes how to configure a remote access VPN connection. |
|
Describes how to configure Network Admission Control (NAC). |
|
Describes how to configure Easy VPN on the ASA 5505 adaptive security appliance. |
|
Describes how to configure the PPPoE client provided with the security appliance. |
|
Describes how to build a LAN-to-LAN VPN connection. |
|
Describes how to establish a secure, remote-access VPN tunnel to a security appliance using a web browser. |
|
Describes how to install and configure the SSL VPN Client. |
|
Describes how to configure a digital certificates, which contains information that identifies a user or device. Such information can include a name, serial number, company, department, or IP address. A digital certificate also contains a copy of the public key for the user or device. |
|
|
|
Describes how to access the security appliance for system management through Telnet, SSH, and HTTPS. |
|
Chapter 41, "Managing Software, Licenses, and Configurations" |
Describes how to enter license keys and download software and configurations files. |
Describes how to monitor the security appliance. |
|
Describes how to troubleshoot the security appliance. |
|
|
|
Describes the feature licenses and specifications. |
|
Describes a number of common ways to implement the security appliance. |
|
Describes how to use the CLI to configure the the security appliance. |
|
Provides a quick reference for IP addresses, protocols, and applications. |
|
Appendix E, "Configuring an External Server for Authorization and Authentication" |
Provides information about configuring LDAP and RADIUS authorization servers. |
"Glossary" |
Provides a handy reference for commonly-used terms and acronyms. |
"Index" |
Provides an index for the guide. |
Document Conventions
Command descriptions use these conventions:
•Braces ({ }) indicate a required choice.
•Square brackets ([ ]) indicate optional elements.
•Vertical bars ( | ) separate alternative, mutually exclusive elements.
•Boldface indicates commands and keywords that are entered literally as shown.
•Italics indicate arguments for which you supply values.
Examples use these conventions:
•Examples depict screen displays and the command line in screen font.
•Information you need to enter in examples is shown in boldface screen
font.
•Variables for which you must supply a value are shown in italic screen font.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.