Cisco ASA 5505 manuales

Manuales del propietario y guías del usuario para Hardware Cisco ASA 5505.
Ofrecemos 1 manuales en pdf Cisco ASA 5505 para descargar gratis por tipos de documentos: Manual de usuario


Cisco ASA 5505 Manual de usuario (1994 paginas)


Marca: Cisco | Categoria: Hardware | Tamaño: 22.87 MB |

 

Tabla de contenidos

Guide using the CLI

1

CONTENTS

3

2 Getting Started 2-1

4

3 Configuring Interfaces

8

Contents

10

4 Configuring Basic Settings

11

11 Configuring DHCP 11-1

12

13 Configuring Objects 13-1

12

6 Configuring IP Routing

16

21 Routing Overview 21-1

16

23 Defining Route Maps 23-1

17

24 Configuring OSPF 24-1

17

25 Configuring RIP 25-1

18

27 Configuring EIGRP 27-1

19

29 Information About NAT 29-1

21

31 Configuring Twice NAT 31-1

22

9 Configuring Access Control

24

54 Configuring QoS 54-1

39

14 Configuring Modules

41

16 Configuring VPN

46

77 Configuring Logging 77-1

57

79 Configuring SNMP 79-1

58

18 System Administration

60

82 Troubleshooting 82-1

61

19 Reference

62

About This Guide

65

Conventions

66

Getting Started with the ASA

69

VPN Specifications

71

New Features

71

Released: February 28, 2012

72

AAA Features

73

Released: October 31, 2012

74

• Secondary subnets

75

Remote Access Features

75

Monitoring Features

75

Released: June 18, 2012

76

New Features

78

Released: January 9, 2012

79

Troubleshooting Features

81

Released: June 20, 2011

82

Released: May 23, 2011

86

Interface Features

88

Routing Features

88

Released: January 31, 2011

89

Inspection Features

93

Firewall Functional Overview

94

Applying QoS Policies

96

Enabling Threat Detection

96

Firewall Mode Overview

97

Stateful Inspection Overview

97

VPN Functional Overview

98

Security Context Overview

99

Security Context Overview

100

Getting Started

101

Detailed Steps

103

Examples

105

Starting ASDM

106

Starting ASDM

107

Using ASDM in Demo Mode

109

Limitations

111

Saving Configuration Changes

116

Viewing the Configuration

118

Managing Feature Licenses

121

ASA 5505

122

ASA 5510

123

ASA 5520

124

ASA 5540

125

ASA 5550

126

ASA 5580

127

ASA 5512-X

128

ASA 5515-X

128

ASA 5525-X

129

ASA 5545-X

130

ASA 5555-X

131

ASA 5585-X with SSP-10

132

ASA 5585-X with SSP-20

133

General Licenses

134

Firewall Licenses

134

VPN Licenses

135

License Notes

136

Mobile Posture Support

137

Preinstalled License

141

Permanent License

141

Time-Based Licenses

141

Stacking Time-Based Licenses

143

Time-Based License Expiration

143

Failover and Shared Licenses

145

How Failover Licenses Combine

148

No Payload Encryption Models

150

Licenses FAQ

150

Configuring Licenses

152

Obtaining an Activation Key

153

Limitations and Restrictions

154

Configuring a Shared License

155

Monitoring Licenses

158

Monitoring the Shared License

164

Feature History for Licensing

166

Configuring the Firewall Mode

173

Transparent Firewall Network

174

Bridge Groups

174

Allowing Layer 3 Traffic

175

Allowed MAC Addresses

175

BPDU Handling

176

MAC Address vs. Route Lookups

176

Setting the Firewall Mode

180

Configuring ARP Inspection

183

Monitoring ARP Inspection

184

Firewall

185

Adding a Static MAC Address

187

Firewall Mode Examples

189

Figure 4-3 Inside to Outside

190

Firewall Mode Examples

191

Figure 4-6 Outside to Inside

193

Figure 4-7 DMZ to Inside

194

Figure 4-12 Outside to Inside

199

Context Configuration Files

202

Valid Classifier Criteria

203

Classification Examples

204

Cascading Security Contexts

206

System Administrator Access

207

Context Administrator Access

208

Resource Limits

208

Default Class

209

Class Members

210

Default MAC Address

211

Failover MAC Addresses

212

MAC Address Format

212

Configuring Multiple Contexts

214

Restoring Single Context Mode

216

Managing Security Contexts

223

Removing a Security Context

224

Changing the Admin Context

224

Reloading a Security Context

226

Monitoring Security Contexts

227

Table 5-2 show context Fields

228

Viewing Resource Allocation

229

Viewing Resource Usage

232

(ASA 5510 and Higher)

243

Auto-MDI/MDIX Feature

244

Management Interface

244

Redundant Interfaces

246

EtherChannels

247

Load Balancing

249

EtherChannel MAC Address

249

Failover Guidelines

252

EtherChannel Guidelines

252

Default Connector Type

254

Default MAC Addresses

254

Detailed Steps (Single Mode)

255

CustomerA Context

261

CustomerB Context

262

Configuring an EtherChannel

269

Customizing the EtherChannel

271

Monitoring Interfaces

275

VLAN MAC Addresses

282

Power over Ethernet

282

Monitoring Traffic Using SPAN

282

Configuring VLAN Interfaces

284

Trunk Port Example

290

(Routed Mode)

293

Dual IP Stack (IPv4 and IPv6)

294

Information About the MTU

301

Configuring IPv6 Addressing

303

Information About IPv6

304

Modified EUI-64 Interface IDs

305

(Transparent Mode)

311

Security Levels

312

Configuring Bridge Groups

317

Unsupported Commands

326

Configuring Basic Settings

333

Changing the Enable Password

336

Setting the Hostname

336

Setting the Date and Time

337

Configuring the DNS Server

345

Monitoring DNS Cache

346

Feature History for DNS Cache

346

Configuring DHCP

347

Configuring a DHCP Server

348

Enabling the DHCP Server

349

Configuring DHCP Options

350

DHCP Monitoring Commands

354

Feature History for DHCP

354

Configuring Dynamic DNS

355

Configuring DDNS

356

DDNS Monitoring Commands

360

Feature History for DDNS

360

Configuring Objects

363

Information About Objects

364

Configuring a Service Object

366

Configuring Object Groups

368

Adding a Network Object Group

369

Adding a Service Object Group

370

Nesting Object Groups

372

Monitoring Objects and Groups

373

Creating a Regular Expression

374

Context Mode Guidelines

378

Access List Types

383

Access Control Entry Order

384

Access Control Implicit Deny

385

Where to Go Next

386

Adding EtherType Access Lists

397

Adding a Standard Access List

401

Adding Standard Access Lists

403

Monitoring Access Lists

404

Adding a Webtype Access List

407

Using Webtype Access Lists

408

Adding an IPv6 Access List

417

Configuring IPv6 Access Lists

420

Adding IPv6 Access Lists

421

Monitoring IPv6 Access Lists

423

Managing Deny Flows

429

Monitoring Deny Flows

431

Managing Deny Flows

432

Configuring IP Routing

433

Routing Overview

435

Switching

436

Path Determination

436

Supported Route Types

436

Static Versus Dynamic

437

Single-Path Versus Multipath

437

Flat Versus Hierarchical

437

Next Hop Selection Process

438

Displaying the Routing Table

440

Backup Routes

442

Dynamic Routing and Failover

443

Features That Support IPv6

443

IPv6-Enabled Commands

444

Disabling Proxy ARPs

445

Disabling Proxy ARPs

446

Configuring a Static Route

449

Defining Route Maps

457

Permit and Deny Clauses

458

Match and Set Clause Values

458

Defining a Route Map

460

Customizing a Route Map

460

Configuring OSPF

463

Customizing OSPF

466

Configuring OSPF NSSA

473

Restarting the OSPF Process

476

Monitoring OSPF

478

Feature History for OSPF

479

Feature History for OSPF

480

Configuring RIP

481

Routing Update Process

482

RIP Routing Metric

482

RIP Stability Features

482

RIP Timers

482

Customizing RIP

484

Configuring the RIP Version

485

Filtering Networks in RIP

488

Enabling RIP Authentication

489

Restarting the RIP Process

490

Monitoring RIP

491

Configuration Example for RIP

491

Feature History for RIP

491

Feature History for RIP

492

Configuring Multicast Routing

493

Stub Multicast Routing

494

PIM Multicast Routing

494

Multicast Group Concept

494

Enabling Multicast Routing

495

Customizing Multicast Routing

496

Configuring IGMP Features

497

Configuring PIM Features

501

Filtering PIM Neighbors

504

Configuring EIGRP

509

Customizing EIGRP

512

Defining an EIGRP Neighbor

518

Filtering Networks in EIGRP

520

Disabling EIGRP Split Horizon

524

Monitoring EIGRP

525

Feature History for EIGRP

527

Feature History for EIGRP

528

Neighbor Reachable Time

541

Router Advertisement Messages

541

Configuring DAD Settings

547

Configuring the IPv6 Prefix

549

Information About NAT

555

NAT Terminology

556

NAT Types

557

NAT Types

558

Dynamic NAT

562

Information About Dynamic NAT

563

Dynamic PAT

564

Identity NAT

565

209.165.201.1 209.165.201.1

566

Inside Outside

566

209.165.201.2 209.165.201.2

566

NAT in Routed Mode

567

NAT in Transparent Mode

567

NAT for VPN

568

NAT for VPN

569

How NAT is Implemented

570

Information About Twice NAT

571

How NAT is Implemented

572

NAT Rule Order

574

NAT Interfaces

575

Routing NAT Packets

575

Mapped Addresses and Routing

576

Too late

577

DNS and NAT

578

DNS and NAT

579

Configuring Dynamic NAT

586

Configuring Identity NAT

594

Monitoring Network Object NAT

596

(Static NAT)

598

One-to-Many)

599

Configuring Twice NAT

607

Prerequisites for Twice NAT

608

Configuring Twice NAT

619

Monitoring Twice NAT

630

Feature History for Twice NAT

634

Modular Policy Framework

637

Policy Framework

639

Feature Directionality

640

Default Class Maps

646

port_num port_num}

651

Configuring Access Control

669

Configuring Access Rules

671

Implicit Permits

672

Implicit Deny

673

Inbound and Outbound Rules

673

Management Access Rules

675

Allowing MPLS

676

Monitoring Access Rules

678

Information About AAA

681

Information About AAA

682

Information About Accounting

683

Summary of Server Support

683

RADIUS Server Support

684

TACACS+ Server Support

685

RSA/SDI Server Support

685

NT Server Support

686

Kerberos Server Support

686

LDAP Server Support

686

LDAP Server Types

687

Using User Login Credentials

689

Using Certificates

689

Configuring AAA

690

Task Flow for Configuring AAA

691

Managing User Passwords

705

Changing User Passwords

707

Using Local Authentication

708

Using RADIUS Authentication

709

Using LDAP Authentication

709

Monitoring AAA Servers

710

Flexibility

715

Deployment Scenarios

716

Redundant

717

Inside Enterprise

719

AD Servers

719

AD Agent

719

WAN / LAN

719

Prerequisite

722

Task Flow in the ASA

722

Configuring Identity Options

726

Example 2

736

• Monitoring Groups, page 26

737

Monitoring AD Agents

738

Monitoring Groups

738

Configuring Management Access

741

Configuring Telnet Access

743

Using a Telnet Client

744

Configuring SSH Access

744

Using an SSH Client

745

Configuring CLI Parameters

746

Configuring a Login Banner

747

Customizing a CLI Prompt

748

Changing the Console Timeout

749

Configuring ICMP Access

750

Additional Guidelines

753

Command)

759

Recovering from a Lockout

771

AAA Performance

775

ASA Authentication Prompts

777

Static PAT and HTTP

778

Feature History for AAA Rules

795

Configuring ActiveX Filtering

798

Caching Server Addresses

807

Filtering HTTP URLs

807

Enabling HTTP Filtering

808

Filtering HTTPS URLs

809

Filtering FTP Requests

810

Information About WCCP

815

Enabling WCCP Redirection

817

WCCP Monitoring Commands

818

Feature History for WCCP

818

Public Key Cryptography

820

Certificate Scalability

820

Key Pairs

820

Trustpoints

821

Revocation Checking

822

The Local CA

824

Configuring Key Pairs

827

Removing Key Pairs

828

Configuring Trustpoints

828

Enabling the Local CA Server

840

Debugging the Local CA Server

844

Disabling the Local CA Server

844

Deleting the Local CA Server

844

Configuring the Issuer Name

846

Configuring the CRL Lifetime

848

Downloading CRLs

851

Storing CRLs

852

Adding and Enrolling Users

854

Renewing Users

856

Restoring Users

857

Removing Users

857

Revoking Certificates

858

Table 42-2 Protocol Keywords

873

Protocols

877

How DNS Rewrite Works

878

Configuring DNS Rewrite

879

DNS Inspection

881

FTP Inspection

887

FTP Inspection

888

HTTP Inspection

892

ICMP Inspection

896

ICMP Error Inspection

897

Instant Messaging Inspection

897

IP Options Inspection

900

IPsec Pass Through Inspection

902

IPv6 Inspection

903

NetBIOS Inspection

904

PPTP Inspection

906

TFTP Inspection

910

H.323 Inspection

913

H.323 Inspection Overview

914

How H.323 Works

914

Monitoring H.225 Sessions

919

Monitoring H.245 Sessions

920

Monitoring H.323 RAS Sessions

920

MGCP Inspection

921

MGCP Inspection

922

RTSP Inspection

925

Using RealPlayer

926

Restrictions and Limitations

926

SIP Inspection

929

SIP Inspection

930

Skinny (SCCP) Inspection

935

Supporting Cisco IP Phones

936

Skinny (SCCP) Inspection

940

Directory Protocols

941

SQL*Net Inspection

942

Sun RPC Inspection

943

Managing Sun RPC Services

944

Sun RPC Inspection

946

Application Protocols

947

GTP Inspection

949

GTP Inspection

950

RADIUS Accounting Inspection

955

RSH Inspection

957

SNMP Inspection

957

XDMCP Inspection

958

XDMCP Inspection

959

Communications Proxy Features

975

Phone Proxy Functionality

983

Cisco Unified IP Phones

985

DNS Lookup Prerequisites

989

Access List Rules

989

NAT and PAT Prerequisites

990

End-User Phone Provisioning

994

Configuring the Phone Proxy

996

Configuring the Phone Proxy

999

Creating the CTL File

1000

Prerequisites

1001

What to Do Next

1001

Using an Existing CTL File

1002

What To Do Next

1004

Configuring Your Router

1009

Note Using the show logging

1013

IP Phone Registration Failure

1014

SSL Handshake Failure

1021

Certificate Validation Errors

1022

Audio Problems with IP Phones

1023

Saving SAST Keys

1023

Publisher

1025

Different Servers

1028

Server on Different Servers

1030

Example 6: VLAN Transversal

1033

LS Proxy for Encrypted Voice

1037

Inspection

1037

Figure 49-1 TLS Proxy Flow

1038

CTL Client Overview

1039

Licensing for the TLS Proxy

1041

Creating an Internal CA

1046

Monitoring the TLS Proxy

1051

OML HTTP etc

1056

Mobile Data

1057

Network (GPRS

1057

Data Channel)

1057

Advantage Proxy Only

1058

Mobility Advantage

1065

Proxy Only

1066

Enterprise Y Firewall omitted

1071

Director

1072

XMPP Federation Deployments

1073

Federation

1077

Installing Certificates

1078

Tickets and Passwords

1091

UC-IME server passes

1092

Call Fallback to the PSTN

1093

Basic Deployment

1094

Off Path Deployment

1095

Only UC-IME calls pass

1096

Guidelines and Limitations

1097

Guidelines and Limitations

1098

Guidelines

1105

Procedure

1105

Creating the TLS Proxy

1112

192.168.10.30

1118

Outside Cisco UCM address

1118

209.165.200.228

1118

ASA inside interface

1118

192.168.10.1

1118

Compatibility

1130

TCP Sequence Randomization

1131

TCP Normalization

1131

TCP State Bypass

1131

Default Settings

1133

Table 53-1 tcp-map Commands

1135

Example:

1140

Monitoring TCP State Bypass

1142

Configuring QoS

1145

Supported QoS Features

1146

What is a Token Bucket?

1146

Information About Policing

1147

How QoS Features Interact

1148

Restrictions

1151

Configuring the Service Rule

1157

Monitoring QoS

1159

Feature History for QoS

1162

Database Files

1167

Database Traffic Types

1167

Enabling DNS Snooping

1174

Recommended Configuration

1177

Other Configuration Examples

1184

Where to Go Next

1185

Configuring Threat Detection

1187

Using Protection Tools

1207

Configuring the Fragment Size

1208

Blocking Unwanted Connections

1208

Configuring IP Audit

1209

IP Audit Signature List

1210

that is

1212

Configuring Modules

1219

Operating Modes

1222

Cisco ASA SSC-05

1228

Monitoring the ASA IPS module

1240

Resetting the Password

1243

Shutting Down the Module

1244

Configuring the ASA CX Module

1247

Initial Configuration

1249

Monitoring the ASA CX Module

1258

Showing Module Statistics

1259

Monitoring Module Connections

1260

Capturing Module Traffic

1263

General Recovery Procedures

1263

Debugging the Module

1265

Information About the CSC SSM

1269

Prerequisites for the CSC SSM

1273

Configuring the CSC SSM

1275

Connecting to the CSC SSM

1276

Configuring the CSC SSM

1277

Monitoring the CSC SSM

1281

Additional References

1286

Configuring High Availability

1287

Failover System Requirements

1290

Failover Link

1291

Stateful Failover Link

1292

Scenario 1—Not Recommended

1294

Scenario 2—Recommended

1294

Scenario 3—Recommended

1295

Scenario 4—Recommended

1295

Stateless (Regular) Failover

1297

Stateful Failover

1298

Auto Update Process Overview

1300

Failover Health Monitoring

1302

Interface Monitoring

1303

Failover Times

1304

Failover Messages

1304

Failover Messages

1305

Command Replication

1309

Failover Triggers

1310

Failover Actions

1310

Table 62-2 Failover Behavior

1311

Firewall Mode Guidelines

1313

IPv6 Guidelines

1313

Model Guidelines

1313

Configuring the Primary Unit

1314

Configuring Failover Criteria

1320

Controlling Failover

1322

Disabling Failover

1323

Restoring a Failed Unit

1323

Figure 63-1 ASR Example

1343

Remote Command Execution

1345

Changing Command Modes

1346

Configuring VPN

1351

Configuring IPsec and ISAKMP

1353

IPsec Overview

1354

ISAKMP and IKE Overview

1354

Remote Access IPsec VPNs

1355

Configuring ISAKMP

1360

Configuring ISAKMP

1362

Enabling IPsec over NAT-T

1366

Using NAT-T

1367

Configuring IPsec

1371

Defining Crypto Maps

1372

Configuring IPsec

1373

Crypto Map 1

1376

Crypto Map 2

1376

Using Interface Access Lists

1378

Changing IPsec SA Lifetimes

1381

Using Dynamic Crypto Maps

1383

Configuring L2TP over IPsec

1391

Tunnel mode

1392

Transport mode

1392

Understanding Load Balancing

1414

Implementing Load Balancing

1415

Eligible Platforms

1416

Eligible Clients

1416

VPN Load-Balancing Algorithm

1416

Configuring Load Balancing

1419

IP Address Pool Exhaustion

1422

Unique IP Address Pools

1422

Viewing Load Balancing

1423

• Group Policies, page 67-36

1427

Connection Profiles

1428

Connection Profiles

1429

Maximum Connection Profiles

1432

Applying Customization

1450

AnyConnect Client

1460

Group Policies

1462

Default Group Policy

1463

Configuring Group Policies

1465

Configuring DHCP Intercept

1478

Configuring an Idle Timeout

1480

Configuring IP Phone Bypass

1480

Configuring LEAP Bypass

1481

Configuring Address Pools

1488

Configuring Firewall Policies

1489

Cisco Integrated Firewall

1492

Cisco Security Agent

1492

No Firewall

1492

Custom Firewall

1493

Zone Labs Firewalls

1493

Sygate Personal Firewalls

1493

Specifying a “Deny” Message

1497

Specifying the User Home Page

1499

Configuring Auto-Signon

1499

Applying a URL List

1500

Specifying HTTP Compression

1502

Specifying the SSO Server

1503

Configuring User Attributes

1505

Configuring Inheritance

1507

Configuring Access Hours

1507

Configuring the Idle Timeout

1508

Applying an ACL Filter

1508

Configuring AAA Addressing

1520

Configuring DHCP Addressing

1521

Configuring an Address Pool

1533

Adding a User

1534

Defining a Tunnel Group

1535

Creating a Dynamic Crypto Map

1536

Licensing Requirements

1542

Licensing Requirements

1543

Prerequisites for NAC

1544

Configuring a NAC Policy

1548

Specifying the Mode

1561

Configuring IPsec Over TCP

1562

Comparing Tunneling Options

1563

Specifying the Tunnel Group

1565

Specifying the Trustpoint

1565

Configuring Split Tunneling

1566

Configuring Remote Management

1567

• Authentication Options

1568

EasyVPN Hardware Client

1568

Authentication Options

1570

Configuring the PPPoE Client

1571

Enabling PPPoE

1573

Clearing the Configuration

1575

Using Related Commands

1575

Using Related Commands

1576

Summary of the Configuration

1577

Configuring Interfaces

1578

Outside Interface

1579

Creating an IKEv2 Proposal

1582

Configuring an ACL

1583

Step 2 Save your changes

1586

Managing Passwords

1598

Gathering HTTP Form Data

1610

Configuring SSO for Plug-ins

1614

Encoding

1615

Encoding

1616

Accessing Resources

1617

Using an LDAP Server

1618

Understanding How KCD Works

1628

Authentication Flow with KCD

1629

Before Configuring KCD

1630

Configuring KCD

1631

About Smart Tunnels

1635

Why Smart Tunnels?

1635

Assigning a Smart Tunnel List

1641

Requirements

1648

Logging Off Smart Tunnel

1649

Configuring Port Forwarding

1650

Automating Port Forwarding

1656

Application Access User Notes

1657

Understanding the hosts File

1658

Configuring File Access

1660

Configuring E-mail Proxies

1665

Configuring Caching

1667

Disabling Content Rewrite

1669

Using Proxy Bypass

1669

APCF Syntax

1671

Viewing the Floating Toolbar

1675

Modifying Your HTML File

1687

Customizing Help

1692

Communicating Security Tips

1695

Features

1696

Browsing the Web

1697

Using Port Forwarding

1698

Using E-mail Via Web Access

1700

Using E-mail Via E-mail Proxy

1700

Using Smart Tunnel

1700

Creating Translation Tables

1702

Capturing Data

1707

Capturing Data

1710

Configuring DTLS

1718

Prompting Remote Users

1718

Profile Editor in ASDM

1720

Standalone Profile Editor

1720

Enabling Start Before Logon

1721

Enabling Rekey

1724

Enabling Keepalive

1726

Using Compression

1726

Adjusting MTU Size

1727

Configuring Session Timeouts

1727

Enabling IPv6 VPN Access

1728

Dependencies

1733

Host Scan Packaging

1734

Uninstalling Host Scan

1737

Call Home

1741

Configuring Logging

1743

Analyzing Syslog Messages

1744

Syslog Message Format

1745

Severity Levels

1745

Filtering Syslog Messages

1746

Using Custom Message Lists

1746

Prerequisites for Logging

1747

Configuring Logging

1749

Creating a Custom Event List

1755

Configuring the Logging Queue

1757

Enabling Secure Logging

1758

Disabling a Syslog Message

1760

Monitoring the Logs

1761

Feature History for Logging

1762

Feature History for Logging

1763

Information About NSEL

1765

Information About NSEL

1766

Prerequisites for NSEL

1767

Configuring NSEL

1768

Configuring NSEL Collectors

1769

Delaying Flow-Create Events

1773

Monitoring NSEL

1774

Feature History for NSEL

1778

Feature History for NSEL

1779

Configuring SNMP

1781

Table 79-1 SNMP Terminology

1782

SNMP Object Identifiers

1783

Information About SNMP

1784

Supported Tables in MIBs

1791

Note Not supported on the

1793

SNMP Version 3

1795

Security Models

1796

SNMP Groups

1796

SNMP Users

1796

SNMP Hosts

1796

Prerequisites for SNMP

1797

Configuring SNMP Traps

1800

Using SNMP Version 1 or 2c

1802

Using SNMP Version 3

1803

Troubleshooting Tips

1804

Interface Types and Examples

1805

Monitoring SNMP

1806

SNMP Syslog Messaging

1807

SNMP Monitoring

1807

Feature History for SNMP

1811

Feature History for SNMP

1812

Smart Call Home

1813

What is Sent to Cisco?

1814

DNS Requirement

1815

Configuring Smart Call Home

1819

Configuring DNS

1820

Subscribing to Alert Groups

1821

Configuring the Mail Server

1827

Monitoring Smart Call Home

1831

System Administration

1833

Viewing Files in Flash Memory

1835

Configuration

1842

Running the Script

1844

Sample Script

1845

• asa5505: Cisco 5505 ASA

1852

Downgrading Your Software

1853

Performing the Downgrade

1854

Downgrading Your Software

1855

Troubleshooting

1857

Pinging ASA Interfaces

1859

Security

1860

Appliance

1860

Reloading the ASA

1864

Performing Password Recovery

1864

Disabling Password Recovery

1866

Erasing the Flash File System

1868

Other Troubleshooting Tools

1869

Common Problems

1870

Common Problems

1871

Reference

1873

APPENDIX

1875

Command Modes and Prompts

1876

Syntax Formatting

1877

Abbreviating Commands

1877

Command-Line Editing

1877

Command Completion

1878

Command Help

1878

Filtering show Command Output

1878

Command Output Paging

1879

Adding Comments

1879

Text Configuration Files

1879

Automatic Text Entries

1881

Line Order

1881

Passwords

1881

Supported Character Sets

1882

Private Networks

1884

Subnet Masks

1884

Determining the Subnet Mask

1885

Class B-Size Network Address

1886

IPv6 Addresses

1887

IPv6 Address Types

1888

Global Address

1889

Site-Local Address

1889

Link-Local Address

1889

Multicast Address

1890

Anycast Address

1891

IPv6 Address Prefixes

1892

Protocols and Applications

1893

TCP and UDP Ports

1893

Table B-7 Port Literal Values

1894

TCP and UDP Ports

1895

Local Ports and Protocols

1896

ICMP Types

1897

ICMP Types

1898

Attributes

1899

Searching the LDAP Hierarchy

1901

Cisco AV Pairs ACL Examples

1912

Figure C-4 Banner Displayed

1916

Step 1 Right-click the user

1916

Step 2 Click the General tab

1923

• group policy name

1927

• OU=group policy name

1927

• OU=group policy name;

1927

Engineering, Sales

1933

Attribute Description

1937

Numerics

1939

Glossary

1940

XR 12410 Manual de usuario   Cisco XR 12410 User Manual, 238 paginas 3200 Series Manual de usuario   Cisco 3200 Series User Manual, 60 paginas WIRELESS LAN CONTROLLER OL-17037-01 Manual de usuario   Cisco WIRELESS LAN CONTROLLER OL-17037-01 User Manual, 80 paginas LINKSYS WMP600N Manual de usuario   Cisco LINKSYS WMP600N User Manual, 37 paginas MICA V110 Manual de usuario   Cisco MICA V110 User Manual, 10 paginas IDTA153 Manual de usuario   Cisco IDTA153 Manual del usuario, 2 paginas OL-12812-01 Manual de usuario   Cisco OL-12812-01 User Manual, 18 paginas 2600-DC Series Manual de usuario   Cisco 2600-DC Series User Manual, 20 paginas 7300-6T3 Manual de usuario   Cisco 7300-6T3 User Manual, 54 paginas 3545 MCU Manual de usuario   Cisco 3545 MCU User Manual, 56 paginas 3000 Manual de usuario   Cisco 3000 User Manual, 16 paginas 7206VXR NPE-400 Manual de usuario   Cisco 7206VXR NPE-400 User Manual, 22 paginas 3515 MCU12 Manual de usuario   Cisco 3515 MCU12 User Manual, 54 paginas 340 Manual de usuario   Cisco 340 User Manual, 62 paginas 2600XM Series Manual de usuario   Cisco 2600XM Series User Manual, 28 paginas WIRELESS ACCESS POINT WAP4410N Manual de usuario   Cisco WIRELESS ACCESS POINT WAP4410N User Manual, 62 paginas 4000 Manual de usuario   Cisco 4000 User Manual, 18 paginas OL-6109-01 Manual de usuario   Cisco OL-6109-01 User Manual, 22 paginas 3515 MCU24 Manual de usuario   Cisco 3515 MCU24 User Manual, 44 paginas 3620 Manual de usuario   Cisco 3620 User Manual, 12 paginas