# (pound sign), 29
(*,G) multicast flows, 131
? (question mark), context-based help, 31
4GE (4-port Gigabit Ethernet) SSM, 725
AAA, configuring
command authorization, 283–285
AAA servers, user management, 272–280
end-user cut-through proxy, 287–301
abbreviating
commands, 30
contiguous 0s on IPv6 addresses, 61
ABRs (Area Border Routers), 101
absolute uauth timer, 9
access control, 323
accessing
ASA Flash memory partitions, 194–195
firewall user interface
with console connection, 232–233
with Telnet, 234
FWSM on Catalyst 6500 switch, 28
specific privilege levels, 263
accounting
local user activity, 272
of generic users on Cisco firewalls, 263–264
ACEs (access control entries)
time-based, 356
ACLs (access control lists)
ACEs
adding, 353
time-based, 356
applying
to lower-security interfaces, 351
to outbound direction, 8
compiling, 352
downloadable, verifying, 299
hit counters, resetting, 382
hit counts, displaying, 707–708
object groups, 352
enhanced service object groups, defining, 370–373
network object groups, defining, 364–365
protocol object groups, defining, 365–367
service object groups, defining, 369–370
recompiling, 353
renaming, 359
verifying firewall connectivity, 705–707
wildcards, specifying, 355
activating debug packet sessions, 690–691
activation keys
unlocking firewall features, 39
active firewall process, checking, 629–632
active shuns, verifying connectivity, 718–720
active-active failover pair, 474–477
configuration example, 501–508
active-standby failover pair, 474–475
configuration example, 498–501
AD (Anomaly Detection) policies, configuring on AIP SSM, 778–780
adding
address spoofing on outside interface, 5–6
address translation, 323
conn entries, 326
connection limits, configuring, 328–330
dynamic NAT, configuring, 341–346
dynamic PAT, configuring, 342–346
embryonic connections, limiting, 330–331
identity NAT, configuring, 338–340
inbound access, defining, 324
NAT exemption, 327
outbound access, defining, 323–324
outside NAT, 328
PAT, 326
policy NAT, configuring, 335–338
types of supported on Cisco firewalls, 326–327
xlate entries, 325
xlate table entries
clearing, 717
table timeout values, adjusting, 717–718
addressing, multicast, 127
adjacency logging (OSPF), disabling, 106
adjusting
fragment cache size, 72
resource limits to security contexts, 186
terminal screen width, 34
xlate table timeout values, 717–718
administration of ASA Flash memory, 196–200
administrative context, 158
administrative distance, 83–84
administrative sessions, monitoring, 244–245
administrative users, 261
managing with AAA servers, 280–287
administratively scoped addresses, 127, 142
advertising default routes, 96
AIP (Advanced Inspection and Prevention) SSM, 725
IPS policies, configuring, 777–780
IPS sensors, configuring, 780–781
IPS virtual sensors, configuring, 781–785
managing, 773
signature database file, updating, 774–776
alias keyword, 319
allocating
firewall resources to contexts, 185–191
resources in multiple-context mode, 185–186
analyzing firewall logs, 619–623
application inspection, 423, 426
DCERPC inspection, configuring, 437–438
DNS inspection, configuring, 438–440
ESMTP inspection, configuring, 441–443
FTP inspection, configuring, 443–446
GTP inspection, configuring, 446–448
H.323 inspection, configuring, 449–451
HTTP inspection, configuring, 452–460
ICMP inspection, configuring, 460–462
IM inspection, configuring, 462, 464
IPSec Passthru inspection, configuring, 465
matching text with regular expressions, 433–437
MGCP inspection, configuring, 465, 467
MGCP map, configuring, 467
NetBIOS inspection, configuring, 468
RADIUS accounting inspection, configuring, 468–469
SNMP accounting inspection, configuring, 470–471
application partition passwords, resetting, 308
applications
for optimizing Syslog servers, 590–591
logging analysis, 620
applying
ACLs to lower-security interfaces, 351
object groups to access lists, 373–379
policy maps to interface, 406–420
area 0, 107
areas (OSPF), subnet notation, 107
ARP (Address Resolution Protocol)
static entries, clearing, 319
ARP cache, clearing, 69
arp command, alias keyword, 319
ARP inspection, 314
configuring, 320
arp timeout command, 699
arrow keys, recalling commands, 32
ASA (Adaptive Security Algorithm), 4
ASA (Adaptive Security Appliance)
4GE SSM, 725
classifiers, 166
configuring as Auto Update Server, 228–232
CSC SSM, 725
automatic updates, configuring, 741–743
connecting to management interface, 740–741
inspection policy configuration, 744–769
repairing initial configuration, 738–740
failover pair capabilities, 39
Flash memory
partitions, accessing, 194–195
MAC address allocation, 165
Packet Tracer feature, verifying firewall connectivity, 692–694
Passwords, recovering, 302–305
SSM modules, initial configuration, 726–729
traceroute, performing, 703–705
ASA 7.3, configuring redundant interfaces, 48–49
ASA 8.0, configuring EIGRP, 97–101
ASBRs (Autonomous System Boundary Routers), 101
ASDM (Adaptive Security Device Manager)
accessing firewall user interface, 238–242
ACL hit counts, displaying, 707–708
firewall throughput, checking, 638–639
image file, copying into Flash memory, 238–239
packet capture sessions, configuring with Packet Capture Wizard, 683–685
assigning
IP address to interfaces, 54–58
privilege levels
to users, 265
security level to interfaces, 54
unique MAC addresses to ASA physical addresses, 167–168
VLAN number to logical interface, 52–53
attributes of trunk links, 46
audit trails, generating, 245
AUS (Automatic Upgrade Server), automatically upgrading failover pair, 524
authentication
of generic users on Cisco firewalls, 262–263
uauth, absolute uauth timer, 9
authorization, local user configuration, 268–272
authorizing
firewall command access, 267–272
user activity with TACACS+ servers, 291–293
Auto Update client
configuring firewall as, 221–227
verifying operation, 227
Auto Update Server, configuring firewall as, 228–232
automatic CSC SSM updates, configuring, 741–743
automatically upgrading image files, 211
banners, configuring on user interface, 243–244
Base license, failover support, 39
BEQ (best-effort queuing), 73–74, 663
displaying information, 77
best practices
for firewall configuration, 21–23
for security policy maintenance, 21–23
bidirectional mode (PIM), 135
configuring, 138
Bidirectional NAT, 328
boot image setting, displaying, 201
bootstrap router method, 136
bridge mode (CSM), 550
broadcast traffic, 126
BSRs (bootstrap routers), 136
buffered logging, enabling, 626
buffered messages, viewing, 597
bump-in-the-wire, 312
calculating runtime differences on processes, 630–632
candidate RPs, 136
capture sessions
copying buffer contents
to TFTP server, 676
displaying trunk contents, 675–676
example, 682
verifying packets passing through interfaces, 666–673
capturing traffic
with Packet Capture Wizard, 683–685
on VLANs inside switch chassis, 686–689
Catalyst 6500 switch, FWSM, 20
accessing, 28
changeto command, 185
changeto system command, 584
changing message severity levels, 616
characteristics of context configuration files, 168–169
checking system resources, 627
firewall interface throughput, 655–665
firewall memory usage, 633–636
inspection engine activity, 645–646
stateful inspection resources, 636–638
circular logging buffer, 597
Cisco firewalls
clock management, 581
setting clock manually, 582–583
setting clock with NTP, 584–586
message logging, configuring, 591–613
supported translation types, 326–327
user management
accounting local user activity, 272
CiscoACS servers, configuring command authorization, 283–285
class maps, configuring, 398–406
clear ip verify statistics command, 86
clear traffic command, 514
clearing
ARP cache, 69
internal logging buffer, 615
static ARP entries, 319
xlate table entries, 717
CLI, initial firewall configuration, 41–42
clock management, 581
setting clock manually, 582–583
setting clock with NTP, 584–586
clock summer-time command, recurring keyword, 583
collecting Syslog firewall logs, 21–23
combining load balancing techniques, 530
command accounting, configuring, 286–287
command authorization, configuring, 283–285
command history, 32
commands
abbreviating, 30
active, viewing, 29
arp, alias keyword, 319
arp timeout, 699
changeto, 185
changeto system, 584
clear ip verify statistics, 86
clear traffic, 514
debug ntp authentication, 586
debug track, 94
editing, 30
entering, 29
executing on failover peer, 517–519
failover active, 516
failover exec, 519
failover mac address, 490
failover poll, 492
failover preempt, 486
failover reload-standby, 517
fragment chain, 72
inspect, 432
mac-address auto, 167
mode multiple, 172
operators, 356
ping
example, 696
permitting on ASA and PIX platforms, 696
preempt, 489
privilege levels, 262
regular expressions
operators, 33
same-security-traffic, 323
show admin-context, 191
show arp-inspection, 320
show dhcprelay statistics, 125
show failover, 497, 508–513, 521
show firewall, 312
show flash, 200
show ipv6 interface, 67
show local-host, 715
show memory detail, 634
show mode, 171
show pim topology, 153
show processes, 629
show resource allocation, 189
show running-config all, 30
show shun statistics, 383
show tech-support, 692
show traffic, 514
static, 327
syntax errors, 31
terminal width, 34
write mem, 42
community string (SNMP), defining, 257–258
compiling access lists, 352
conditional NAT
static NAT, 335
configuration commands, entering manually, 218
configuration examples
of active-active failover, 501–508
with FWSM, 500– 501
of active-standby failover, 474–475
configuration files
of contexts, characteristics, 168–169
running configuration
copying across failover pair, 217–218
displaying, 214
saving to Flash memory, 214–215
saving to TFTP server, 216–217
startup configuration
erasing configuration commands, 218
configuration mode, 29
configure terminal command, 41–42
configuring
address translation
application inspection, 426–432
IPSec Passthru inspection, 465
matching text with regular expressions, 433–437
MGCP map, 467
NetBIOS inspection, 468
RADIUS accounting inspection, 468–469
SNMP accounting inspection, 470–471
banners on user interface, 243–244
bidirectional PIM neighbor filtering, 144
command authorization, 283–285
CSC SSM, 729
FTP inspection policies, 753–755
POP3 inspection policies, 765–769
SMTP inspection policies, 755–764
verifying configuration, 123–124
DHCP server functions, 116–120
contexts, 495
health monitoring policy, 490–492
interface failure policy, 492
firewalls
as Auto Update client, 221–227
as Auto Update Server, 228–232
identity NAT for exclusive outbound use, 340
neighbor advertisements, 65–66
local user authorization, 268–272
medium-security interfaces, inbound access, 350–352
multiple-context mode, 170–173
navigating multiple security contexts, 173–174
example configuration, 115–116
on both sides of firewall, 104–105
prefix lists, 108
RADIUS user authorization, 294–295
verifying configuration, 96–97
example, 150
SSM modules
initial configuration, 726–729
switch ports, 485
access lists, 321
interface speed, 315
MAC address learning process, 318–319
non-IP protocol forwarding policy, 321–322
conn table, 7
connecting to CSC SSM management interface, 740–741
connection limits
configuring for address translation, 328–329
outbound, configuring on UDP/TCP, 329–330
connectionless protocols, 9
ICMP, stateful inspection, 10–13
connection-oriented protocols, 9
connections
maximum limit of, defining, 18
TCP intercept, 18
half-closed, 18
inbound access, 324
xlate lookup, 7
maximum number supported on Cisco firewalls, 37–39
stateful inspection, 7
connectivity
active shuns, verifying, 718–720
console connection, accessing firewall user interface, 232–233
content filtering, 19
examples, 396
context mode, displaying, 171
context-based help, 31
contexts, 158
allocating firewall resources, 185–191
assigning to failover groups, 495
classifiers, 166
configuration files, characteristics, 168–169
CPU usage, displaying, 192
inside context interfaces, sharing, 161–164
labeling, 175
multiple-context mode
navigating multiple security contexts, 173–174
physical interfaces, mapping to logical interfaces, 178
system execution space, features, 169–170
system name, viewing, 176
controlling
traffic
to/from medium-security interfaces, 349–352
copying
ASDM image into Flash memory, 238–239
capture buffer contents
to TFTP server, 676
files to/from Flash memory, 196–197
PDM image into Flash memory, 238–239
running configuration across failover pair, 217–218
CPU utilization
of contexts, displaying, 192
crashes
forcing, 250
crashinfo files
deleting, 251
generating, 249
creating
directories
in Flash memory, 198
in PIX 7.x Flash memory, 198–199
test crashinfo files, 249
critical messages (syslog), 802–803
CSC (Content Security and Control) SSM, 725
automatic updates, configuring, 741–743
configuring, 729
initial configuration, repairing, 738–740
initial settings, configuring, 733–738
inspection policies
management interface, connecting to, 740–741
traffic inspection, configuring, 730–733
CSM (Content Switching Module) FWLB, 549–552
displaying information, 569–571
example configuration, 561–569
CSS (Cisco Content Services Switch), 529
CSS FWLB
displaying information, 579
example configuration, 574–579
Ctrl-I command, displaying typed commands, 30
DCERPC (Distributed Computing Environment Remote Procedure Call), 437
DCERPC inspection, configuring, 437–438
DDNS (Dynamic DNS), 120
database, updating, 121
verifying configuration, 123–124
debug icmp trace command, 10–11
debug ntp authentication command, 586
debug packet sessions, enabling, 689–691
debug track command, 94
debugging
ICMP debugging, enabling, 697–698
debugging messages (syslog), 837–845
default behavior of firewalls, 4
default policies, defining, 421–423
default routes, 84
advertising, 96
defining
enhanced service object groups, 370–373
ICMP type object groups, 367–369
network object groups, 364–365
protocol object groups, 365–367
service object groups, 369–370
security policies in MPF, 397–398
server reactivation policies, 274
SNMP community string, 257–258
deleting
crashinfo files, 251
files from Flash memory, 197
depletion mode, 274
descriptions, adding to ACLs, 359–360
detecting
firewall failures, 480
spam
DHCP (Dynamic Host Configuration Protocol), 19
DHCP relay, configuring, 124–125
DHCP server, configuring, 116–120
directories
creating in Flash memory, 198–199
removing from Flash memory, 199
disabling
active commands, 29
OSPF adjacency logging, 106
screen paging, 34
disconnecting from active PDM sessions, 245
displaying
active PDM/ASDM management application sessions, 245
ARP inspection status, 320
available firewall interfaces, 46–47
boot image setting, 201
buffered messages, 597
configured contexts, 174
context information, 191
context mode, 171
system name, 176
CPU usage for contexts, 192
CSS FWLB information, 579
firewall crash information, 250–251
firewall features, 34
monitoring status of interfaces, 497
PIX 6.3 flash files, 200
priority queuing information, 77
redundant interface status, 49–50
running configuration, 214
startup configuration, 213–214
startup configuration environment variable, 212
typed commands, Ctrl-I, 30
disrupting
ping process, 697
traceroute process, 705
DMZ (demilitarized zone) networks, 349–352
protecting, 22
DNS Guard, 15
DNS inspection, configuring, 438–440
DNS resolution, configuring on firewall interface, 197
DoS attacks, preventing IP address spoofing, 84–86
downloadable ACLs
enabling on firewall, 298
verifying, 299
downloading operating system image from monitor prompt, 202–206
DUAL (Diffusing Update Algorithm), 97
dynamic NAT
dynamic PAT
editing commands, 30
EIGRP (Enhanced Interior Gateway Routing Protocol)
DUAL, 97
EMBLEM format (system messages), 588
maximum limit of, defining, 18
TCP intercept, 18
enabling
buffered logging, 626
debug packet sessions, 689–691
ICMP inspection, 703
RPF, 85
end users, 261
end-user cut-through proxy
configuration examples, 300–301
configuring on AAA servers, 287–300
enhanced service object groups, defining, 370–373
entering commands, 29
environment variable for startup configuration, displaying, 212
erasing
configuration commands from startup configuration, 218
error messages (syslog), 804–815
ESMTP inspection, configuring, 441–443
examining firewall crash information, 248–249
example configurations
examples
of content filters, 396
of context definition, 180–185
of firewall failover configuration
active-standby with FWSM, 500–501
active-standby with PIX firewalls, 498– 500
of ping command, 696
of SMR configuration, 150
exec banners, configuring on user interface, 243–244
executing commands
remotely, 519
extended access lists, 356–357
extended pings
disrupting, 697
failover, 19
active-active failover pair, 474–477
configuration example, 501–508
active-standby failover pair, 474–475
configuration example, 498–501
cause of, determining, 652–655
contexts, configuring, 495
displaying statistics, 508–513
health monitoring policy, configuring, 490–492
interfaces
failure policy, configuring, 492
LAN-based, 479
manually forcing role change, 516
primary unit, configuring, 485–488
required licenses, 475
resetting failed firewall unit, 517
stateful
toggling roles, 655
verifying
failover active command, 516
failover cable, 479
failover exec command, 519
failover hello messages, 492
failover mac address command, 490
failover pairs
copying running configuration across, 217–218
failover poll command, 492
failover preempt command, 486
failover reload-standby command, 517
failures, detecting, 480
feasible successors, 97
features of firewalls
displaying, 34
unlocking, 39
fields of system messages, 588
file blocking (HTTP), configuring on CSC SSM, 751
files
copying to/from Flash memory, 196–197
deleting from Flash, 197
renaming in Flash, 198
filtering. See also content filtering
fine-tuning logging message generation, 615–616
firewall farms, 527
firewall masks, 355
firewalls
configuring
as Auto Update client, 221–227
as Auto Update Server, 228–232
crashes, forcing, 250
interface throughput, checking, 655–665
first-hop routers, 128
fixed-group addresses, 127
fixup. See application inspection
flash files, displaying in PIX 6.3, 200
ASA
managing, 194
copying files to/from, 196–197
creating new directories, 198
deleting files from, 197
erasing, 200
formatting, 199
hierarchical structure, 195–196
operating system image
downloading from monitor prompt, 202– 206
PIX 7.x, creating directories, 198–199
removing directories, 199
renaming files, 198
running configuration, saving, 214–215
system integrity, verifying, 199
FO (Failover) license, 39
FO-AA (Failover-Active/Active) license, 39
forcing
failover role change, 516
firewall crashes, 250
foreign addresses, 6
formatting Flash memory, 199
fragment cache, adjusting size of, 72
fragment chain command, 72
FTP, uploading logging buffer contents, 598
FTP inspection
policies, configuring on CSC SSM, 753–755
FWLB (Firewall Load Balancing), 527–528
displaying information, 569–571
example configuration, 561–569
CSS FWLB
displaying information, 579
example configuration, 574–579
displaying information, 546–549
methods of, 529
FWSM (Firewall Services Module), 20
accessing on Catalyst 6500 switch, 28
failover pairs, 477
capabilities, 39
Flash memory management, 194–196
logical interfaces, 47
NTP support, 584
passwords, recovering, 307–308
security levels, 316
VLAN groups, defining, 47
General Queries (IGMPv2), 130
generating
audit trails, 245
test crashinfo files, 249
generic users
managing on Cisco firewalls, 262
global configuration mode, 29
globally scoped addresses, 127
GMT (Greenwich Mean Time), 581
Group-Specific Queries (IGMPv2), 130
GTP inspection, configuring, 446–449
H.323 inspection, configuring, 449–451
half-closed connections, 18
half-open connections, 17
hardware load balancing, CSM FWLB, 549–552
displaying information, 569–571
example configuration, 561–569
help system, context-based help, 31
hierarchical structure of flash file system, 195–196
history of failover state changes, displaying, 513
hit counter (ACL), resetting, 382
holdtime timer, setting, 491
HTTP inspection
policies, configuring on CSC SSM, 751
file blocking, 751
HTTP scanning, configuring on CSC SSM, 751–753
ICMP (Internet Control Message Protocol)
ACLs operation, 8
object groups, defining, 367–369
ping, 481
restricting traffic, 23
time-exceeded messages, permitting, 704
ICMP inspection
enabling, 703
identifying operating system image in Flash memory, 200–201
identity NAT, configuring, 338–340
idle uauth timer, 9
IEEE 802.1Q trunks, attributes, 46
IGMP (Internet Group Message Protocol)
IGMP proxy agent, 126
IM inspection, configuring, 462–464
image files, automatically upgrading, 211
inbound access, 324
configuring on medium-security interfaces, 350–352
inbound connections, 4
xlate lookup, 7
informational messages (syslog), 827–837
initial firewall configuration, 41–42
initial settings, configuring on CSC SSM, 733–738
initiating
after specific time interval, 247–248
multiple context mode, 172–173
inline interface configuration, 781
inside context interfaces, sharing, 161–164
inspect command, 432
inspection engines, 9. See also application inspection
ICMP stateful inspection, 10–13
TCP stateful inspection, 15–19
UDP stateful inspection, 13–15
inspection policies (CSC SSM), 744–753
interface polltime, 492
interface priority queues, 73–74
interfaces
ASA, assigning unique MAC addresses, 167–168
connectivity
checking routing table, 700
testing with ping packets, 695–696
verifying with traceroute, 700–703
DNS resolution, configuring, 197
inbound access, 324
inside context interfaces, sharing, 161–164
IP addresses
IPv6 addresses, configuring, 60–61
logical, assigning VLAN number, 52–53
lower-security, applying ACLs, 351
monitoring status, displaying, 497
physical, mapping to contexts, 158, 160–161
policy maps, applying, 406–423
redundant interface groups, 474
security level, assigning, 54
verifying packets passing through via capture sessions, 666–676
internal clock
internal logging buffer, clearing, 615
invoking
context-based help, 31
Packet Tracer tool, 694
displaying information, 546–549
IP address spoofing, preventing, 84–86
IP addresses, assigning to interfaces, 54–58
IP multicast, 127
addressing, 127
administratively scoped addresses, 142
bidirectional PIM neighbor filtering, configuring, 144
IGMP
multicast boundaries, configuring, 142–143
multicast trees, 128
configuring, 137–141 Sparse Mode, 131–134
Version 1, 136
PIM neighbor filtering, configuring, 143–144
PIM-SM, RP designation, 136–137
SMR
example configuration, 150
corresponding Cisco firewall keywords, 791– 794
ip verify reverse-path interface, 85
IPS (Intrusion Prevention Systems), configuring on AIP SSM, 778–780
IPSec Passthru inspection, configuring, 465
IPv6
neighbor advertisements, configuring, 65–66
neighbor discovery, configuring, 64–65
prefix advertisements, configuring, 66–67
ISNs (initial sequence numbers), 8, 331
knowledge base, 779
labeling contexts, 175
last-hop routers, 128
Layer 2 firewalls, 312
Layer 3 traffic
policy maps, defining, 406–420
Layer 4 traffic
policy maps, defining, 406–420
Leave Group messages (IGMPv2), 130
length of terminal screen, adjusting, 34
level 0 passwords, resetting, 263
license, registering, 39
licenses
activation keys, 39
Base license, failover support, 39
FO-AA, 39
required for failover, 475
upgrading, 39
limitations on outbound UDP/TCP connections, 329–330
limiting
embryonic connections, 330–331
resource allocation on security contexts, 186–188
resources allocated to contexts, 185–189
TCP MSS size, 71
link-state protocols, OSPF configuration, 105–112
listing available firewall interfaces, 46–47
LLQ (low-latency queue), 74, 663
displaying information, 77
load balancing
displaying information, 569–571
example configuration, 561–569
displaying information, 546–549
local addresses, 6
local database, user management, 264–265
accounting local user activity, 272
firewall command access, authorizing, 267–272
local user authentication, 265–267
local user authorization, configuring, 268–272
logging
logging messages, 587
analyzing firewall logs, 619–623
clearing internal logging buffer, 615
destinations, verifying, 614
logging to secure Syslog server with SSL, 604–611
manually testing message generation, 615
sending messages
to ASDM management application, 613
severity levels
changing, 616
setting, 587
time stamp synchronization, 588
logging timestamp message, 604
mapping to physical interfaces, 178
logical VLAN interfaces, 51–52
login banner, configuring on user interface, 243–244
lookups (xlate table), 7
lower-security interfaces, applying ACLs, 351
LSAs (link-state advertisements), 101
MAC addresses
of ASA physical interfaces, displaying, 165
learning process, configuring on transparent firewalls, 318–319
mac-address auto command, 167
management traffic, restricting access to, 23
managing
AIP SSM, 773
ASA, 194
startup configuration, 211–213
manually forcing failover role change, 516
manually resetting failed firewall units, 517
manually setting internal clock, 582–583
manually testing logging message generation, 615
manually upgrading active-standby pair, 520– 524
mapping
to logical interfaces (contexts), 178
mapping agents, 136
medium-security interfaces
inbound access, configuring, 350, 352
Membership Report messages, 129
Flash
copying files to/from, 196–197
creating directories in, 198
deleting files from, 197
downloading operating system image, 202–206
formatting, 199
identifying operating system image, 200–201
removing directories from, 199
renaming files in, 198
upgrading operating system image, 205–210
merging startup and running configuration commands, 219–221
messages
IGMP Membership Report, 129
logging, 587
analyzing firewall logs, 619–623
buffered messages, displaying, 597
destinations, verifying, 614
logging to secure Syslog server with SSL, 604–611
manually testing, 615
sending messages to ASDM management application, 613
sending messages to email address, 611–613
setting severity levels, 587
time stamp synchronization, 588
logging timestamp, 604
severity levels, changing, 616
syslog
severity level 1 alerts, 799-802
severity level 2 critical messages, 802-803
severity level 3 error messages, 804-815
severity level 4 warning messages, 815-821
severity level 5 notifications, 821-822
severity level 6 informational messages, 827-832
severity level 7 debugging messages, 831-845
system messages, format, 588
MGCP inspection, configuring, 465, 467
MGCP map, configuring, 467
monitoring firewall activity, 251–252
objects, 253
mode multiple command, 172
modifying message severity levels, 616
monitor screen length/width, changing, 34
monitoring
active shun activity, 383
administrative sessions, 244–245
firewall activity with SNMP, 251–252
traps, 255
firewall configuration changes, 722–723
xlate entries based on local address, 710
MOTD banners, configuring on user interface, 243–244
MPF (Modular Policy Framework), defining security policies, 397–398
mroutes, 142
MSS (maximum segment size), configuring, 71
MTU (maximum transmission unit), interface configuration, 70–71
boundaries, configuring, 142–143
IGMP
OUI values, 127
routing
multicast trees, 128
example configuration, 150
multicast groups, 126
multicast trees, 128
multiple-context mode, 158, 313
classifiers, 160
navigating multiple security contexts, 173–174
naming format for downloadable ACLs, 299
NAT
Bidirectional, 328
identity NAT, configuring, 338–340
policy NAT, configuring, 335–338
NAT exemption, 327
navigating multiple security contexts, 173–174
NBNS (NetBIOS Name Service), configuring NetBIOS inspection, 468
neighbor advertisements, IPv6 configuration, 65–66
neighbor discovery, IPv6 configuration, 64–65
NetBIOS inspection, configuring, 468
network object groups, defining, 364–365
non-IP protocol forwarding policy, configuring on transparent firewall, 321–322
notifications (syslog), 821-827
NTP (Network Time Protocol), setting internal clock, 584–586
object groups, 352
enhanced service object groups, defining, 370–373
network object groups, defining, 364–365
protocol object groups, defining, 365–367
service object groups, defining, 369–370
operating system
of active-standby failover pair, upgrading, 520–524
downloading image from monitor prompt, 202–206
identifying image in Flash memory, 200–201
operators, 356
optimizing Syslog servers, 589
options (commands), entering, 29
OSPF (Open Shortest Path First)
Areas, subnet notation, 107
example configuration, 115–116
prefix lists, configuring, 108
redistribution, configuring, 112–115
static route redistribution, configuring, 114
virtual links, 109
OUI (Organizationally Unique Identifier) values, 127, 168
outbound connections, 4
xlate lookup, 7
output interface queues, 73–74
Outside NAT, 328
packet capture, 19
Packet Capture Wizard, enabling packet capture sessions in ASDM, 683–685
packet classifiers, 160
Packet Tracer feature, verifying firewall connectivity, 692–694
Packet Tracer tool, invoking, 694
packets
ICMP, stateful inspection of, 10–13
TCP, stateful inspection of, 15–19
UDP, stateful inspection of, 13–15
for xlate table entries, 6
partitions, accessing ASA Flash memory, 194–195
passwords, recovering
PAT (Port Address Translation), 326
dynamic PAT, configuring, 342–346
PDM (PIX Device Manager)
accessing firewall user interface, 238–242
image file, copying into Flash memory, 238–239
perfmon counters, checking firewall throughput, 643–645
permitting ICMP time-exceeded messages, 704
physical interfaces, mapping
to logical interfaces, 178
PIM (Protocol Independent Multicast), 130–131
bidirectional mode, 135
neighbor filtering, configuring, 143–144
bidirectional configuring, 144
shared trees, 132
Version 1, 136
PIM-SM, RP designation, 136–137
ping command, 481
example, 696
permitting on ASA and PIX platforms, 696
PIX
failover pair capabilities, 39
passwords, recovering, 306–307
PIX 6.3, displaying flash files, 200
policy maps
default policies, defining, 421–423
policy NAT, configuring, 335–338
POP3 inspection policies, configuring on CSC SSM, 765–766
corresponding Cisco firewall keywords, 791–794
predefined logging messages, 591–592
preempt command, 489
prefix advertisements (IPv6), configuring, 66–67
preventing
primary failover unit, configuring, 485–488
priority queuing
displaying information, 77
privilege levels, 262
accessing, 263
assigning
to users, 265
privileged EXEC mode, 28
processes, calculating runtime differences, 630–632
promiscuous monitoring, 780
protecting DMZ, 22
Protocol field, 787
corresponding Cisco firewall keywords, 788
protocol object groups, defining, 365–367
queuing
priority queuing
displaying information, 77
transmit ring, 7
R (Restricted) license, 39
RADIUS
accounting inspection, configuring, 468–469
user authorization, configuring, 294–295
rate-limiting logging messages, 593
recalling commands, 32
recompiling access lists, 353
recurring keyword (clock summer-time command), 583
redistribution, configuring OSPF, 112–115
redundant interface groups, 474
redundant interfaces, configuring, 48–49
registering firewall licenses, 39
regular expressions
regular expressions
application inspection, text matching, 433–437
operators, 33
after specific time interval, 247–248
remark ACEs, adding to ACLs, 359–360
remote command execution, 519
removing
directories in Flash memory, 199
static routes, 88
renaming
ACLs, 359
files in Flash memory, 198
repairing CSC SSM initial configuration, 738–740
requirements for active-active failover, 482–484
resetting
ACL hit counters, 382
application partition passwords, 308
failed firewall unit, 517
level 0 passwords, 263
resources, allocating to contexts, 185–191
restricting
access to management traffic, 23
ICMP traffic, 23
RFC 2827, 5
RFC Sourcebook, 787
RIP (Routing Information Protocol)
configuring on firewall, 95–97
verifying configuration, 96–97
route lookups, 531
route maps (OSPF), configuring, 112–115
routed firewall mode, 311
router mode (CSM), 550
routing information sources, 83
routing tables, checking connectivity, 700
RP (Rendezvous Point), 131
RPF (Reverse Path Forwarding), 84, 128–129
enabling, 85
preventing IP address spoofing, 85–86
running configuration, 478
configuration commands, entering manually, 218
copying across failover pair, 217–218
displaying, 214
merging configuration commands with startup configuration, 219–221
saving to Flash memory, 214–215
saving to TFTP server, 216–217
runtime differences, calculating on processes, 630–632
same-security-traffic command, 323
saving
firewall crash information, 248–249
running configuration to Flash memory, 214– 215
running configuration to TFTP server, 216–217
scheduling firewall reloads, 247
screen paging, disabling, 34
searching for regular expressions, 32–33
security contexts, 158
security levels
assigning to interfaces, 54
on FWSM, 316
security policies
“security wheel”, 23
selecting startup configuration, 212–213
sending Syslog messages with TCP, 602
server reactivation policies, defining, 274
service contact port, 791
service object groups, defining, 369–370
severity levels, 587
changing, 616
setting for message logging, 587
severity level 1 alerts, 799-802
severity level 2 critical messages, 802-803
severity level 3 error messages, 804-815
severity level 4 warning messages, 815-821
severity level 5 notifications, 821-827
severity level 6 informational messages, 827-837
severity level 7 debugging messages, 832-845
shared trees, 131-132
sharing inside context interfaces, 161–164
show activation-key command, 170, 518
show admin-context command, 191
show arp-inspection command, 320
show dhcprelay statistics command, 125
show failover command, 497, 508–513, 521
show firewall command, 312
show flash command, 200
show interface command, 176, 515
show ipv6 interface command, 67
show local-host command, 715
show logging command, 614, 622
show memory detail command, 634
show mode command, 171
show pim topology command, 153
show processes command, 629
show resource allocation command, 189
show running-config all command, 30
show service-policy command, 427, 645
show shun statistics command, 383
show tech-support command, 692
show traffic command, 514
shuns
verifying connectivity, 718–720
signature database file (AIP SSM), updating, 774–776
single-context mode, 158
site-local addresses, 61
SLA (service level agreement) monitor process, configuring, 89–92
SMR (stub multicast router), 128
example configuration, 150
SMTP inspection policies, configuring on CSC SSM, 755–758
SNMP (Simple Network Management Protocol)
accounting inspection, configuring, 470–471
monitoring firewall activity, 251–252
software load balancing, IOS FWLB, 530–531
displaying information, 546–549
source address, spoofing, 5
spam
detecting in POP3 e-mail, 767–768
SMTP inspection, configuring, 759–762
SPAN (switch port analyzer), configuring traffic capture sessions, 687
Sparse Mode (PIM), 131
sparse mode (PIM)
shared trees, 132
specifications of Cisco firewalls, 20–21
spoofed IP addresses, preventing, 84–86
SPT (shortest path tree), 135
SSH (Secure Shell), accessing firewall user interface, 235–237
SSL (Secure Sockets Layer), secure Syslog server logging, 604–611
4GE SSM, 725
AIP SSM, 725
IPS policies, configuring, 777–780
managing, 773
signature database file, updating, 774–776
CSC SSM, 725
automatic updates, configuring, 741–743
FTP inspection policies, configuring, 753–755
initial configuration, repairing, 738–740
inspection policies, configuring, 744–753
management interface, connecting to, 740–741
POP3 inspection policies, configuring, 765–769
SMTP inspection policies, configuring, 755–764
initial configuration, 726–729
startup configuration, 478
configuration commands, merging with running configuration commands, 219–221
environment variable, displaying, 212
erasing configuration commands from, 218
stateful backup, 531
stateful failover, 481
packet classifiers, 160
stateless backup, 531
stateless failover, 481
static ARP entries, clearing, 319
static command, 327
static routes
redistributing into OSPF, 114
removing, 88
SLA monitor process, configuring, 89–92
stealth firewalls, 312
sticky connections, 532
stratum, 581
structure of flash file system hierarchy, 195–196
stub routers, 126
supported translation types on Cisco firewalls, 326–327
switch ports, configuring, 485
synchronizing time stamps on logging messages, 588
syntax errors, 31
Syslog, 19
firewall logs, collecting, 21–23
firewall throughput, checking, 639
messages
sending with TCP, 602
severity level 1 alerts, 799-802
severity level 2 critical messages, 802-803
severity level 3 error messages, 804-815
severity level 4 warning messages, 815-821
severity level 5 notifications, 821-827
severity level 6 informational messages, 827-837
severity level 7 debugging messages, 831-845
secure logging with SSL, 604–611
servers, optimizing, 589
viewing recent messages, 626–627
system execution space, 158, 169
system messages, EMBLEM format, 588
system name (contexts), displaying, 176
system resources, checking, 627
firewall interface throughput, 655–665
firewall memory usage, 633–636
inspection engine activity, 645–646
stateful inspection resources, 636–638
TACACS+ servers
authorizing user activity, 291–293
enable authentication support, 281
TCP
connections
embryonic connections, 18, 330–331
half-closed connections, 18
half-open connections, 17
ISNs, 331
MSS, configuring, 71
sending Syslog messages, 602
TCP intercept, 18
TCP normalization, 18
Telnet, accessing firewall user interface, 234
terminal screen width, adjusting, 34
terminal width command, 34
termination of TCP connections, 17
test crashinfo files, generating, 249
testing
address reachability, 91
connectivity
logging message generation, 615
TFTP server, saving running configuration to, 216–217
three-way handshakes, 15
time stamps, synchronizing on logging messages, 588
timed reactivation, 274
time-based ACEs, 356
time-exceeded messages (ICMP), permitting, 704
timers
CPU utilization, 629
Holdtime, setting, 491
idle uauth timer, 9
toggling failover roles, 655
traceroute
disrupting, 705
verifying firewall connectivity, 700–703
traffic
capture sessions, enabling on VLAN inside switch chassis, 686– 689
controlling
to/from medium-security interfaces, 349– 352
traffic counters, checking firewall throughput, 640–643
traffic inspection, configuring on CSC SSM, 730–733
translation table size, checking, 636–637
translations
conditional, 335
dynamic NAT, configuring, 341–346
dynamic PAT, configuring, 342–346
identity NAT, configuring, 338–340
NAT exemption, configuring, 340–341
policy NAT, configuring, 335–338
xlate table entries
clearing, 717
timeout values, adjusting, 717–718
transmit ring, 76
transparent firewall mode, 312–314
ARP inspection, 314
interface support, 312
transparent firewalls
access lists, configuring, 321
ARP inspection, configuring, 319–321
interface speed, configuring, 315
MAC address learning process, configuring, 318–319
management address, configuring, 317–319
non-IP protocol forwarding policy, configuring, 321–322
triggering a firewall reload, 246–247
after specific time interval, 247–248
troubleshooting logging buffer content uploads to FTP server, 598
trunk link attributes, 46
trunks, displaying contents, 675–676
tuning OSPF, 110
Turbo ACLs
compiling, 352
recompiling, 353
uauth
absolute uauth timer, 9
verifying firewall connectivity, 720–722
UDP
Connections, monitoring, 711–716
unicast traffic, 126
unique MAC addresses, assigning to physical interfaces, 167–168
unlocking firewall features, 39
updating
AIP SSM signature database file, 774–776
DDNS database, 121
upgrading
active-standby failover pair, 520–524
failover pair with AUS, 524
image files, 211
licenses, 39
operating system image, 205–210
uploading logging buffer contents to FTP, 598
UR (Unrestricted) license, 39
URL blocking, configuring on CSC SSM, 745–746
URL filtering, configuring on CSC SSM, 746–750
URLs, RFC Sourcebook, 787
user activity, generating audit trails, 245
user activity accounting, configuring, 300
user authentication. See
uauth user contexts, 158
user EXEC mode, 28
user interface
accessing
with console connection, 232–233
with Telnet, 234
administrative sessions, monitoring, 244–245
command history, 32
commands
abbreviating, 30
editing, 30
entering, 29
context-based help, 31
regular expressions
operators, 33
user interface modes, 28
configuration mode, 29
privileged EXEC mode, 28
user EXEC mode, 28
user management (Cisco firewalls)
end-user cut-through proxy, 287–301
generic users, 262
accounting local user activity, 272
firewall command access, authorizing, 267–272
local user authentication, 265–267
VACL (VLAN ACLs), enabling traffic capture sessions, 688–689
verifying
based on local addresses, 710
Auto Update client operation, 227
downloadable ACLs, 299
failover communication, 647–650
firewall connectivity, 691–692
checking routing table, 700
with Packet Tracer feature, 692–694
testing with ping packets, 695–696
Flash memory system integrity, 199
IGMP multicast operation, 151–152
message logging activity, 614
packets passing through interfaces via capture sessions, 666–676
PIM multicast routing, 152–155
viewing
active commands, 29
boot image setting, 201
buffered messages, 597
configured contexts, 174
context information, 191
context mode, 171
firewall crash information, 250–251
list of firewall features, 34
priority queuing information, 77
running configuration, 214
startup configuration, 213–214
virtual links, 109
virtual sensors, configuring on AIP SSM, 781–785
VLAN groups, defining on FWSM, 47
VLAN inline pair configuration, 781
VLAN number, assigning to logical interface, 52–53
VLANs
traffic, capturing inside switch chassis, 686–689
VPN users, 261
warning messages (syslog), 815-821
weighted least connections algorithm, 557
weighted round robin algorithm, 557
well-known port numbers, service contact port, 791
wildcards, specifying for ACLs, 355
write mem command, 42
xlate table, 6
entries, 325
clearing, 717
locating based on local addresses, 710
parameters, 6
lookups, 7
3.12.150.168