
Index
IN-3
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
command line interface
See CLI
commands
command line editing 1-28
command output paging 1-29
configuring privilege levels 9-2 to 9-3
creating comments 1-29
displaying 1-29
commenting
ACLs 3-18
compiling MIBs 9-45
Computer Telephony Interface Quick Buffer Encoding
See CTIQBE
conduits
converting to ACLs 1-8
defined 1-8
using ACLs instead 1-8
Configurable Proxy Pinging
description 1-11
configuration examples
See examples
configuration file, failover
See failover
configuration mode 1-26
configurations 1-29
backing up 1-27
comments 1-29
copying with HTTP 11-5
maximum size 1-29
saving 2-3, 2-24
connection states 1-4
connectivity
inbound 3-2
outbound 3-4
testing 2-22
conversion tool
conduits to ACLs 1-7
copying
configurations 11-5
software 11-5
CPU utilization
SNMP 9-42
CRLs
time restrictions 6-9
crypto maps
applying to interfaces 6-17
entries 6-15
load sharing 6-28
See also dynamic crypto maps
CTIQBE 1-12, 5-14
CU-SeeMe application inspection 5-15
cut-through proxy 1-6
D
database application inspection 5-27
Data Encryption Standard
See DES
debug failover command 10-21
debugging
IPSec B-15
SMR 2-47
default configurations 1-30
default routes 2-3
demilitarized zone
See DMZ
denial of service attacks
protection from 1-9
DES
description E-2
IKE policy keywords (table) 6-3
DHCP clients
configuration 4-21 to 4-22
default route 4-21
described 1-20
PAT global address 4-21
Comentarios a estos manuales