Streszczenie treści zawartej na stronie nr. 1
Cisco ASDM User Guide
Version 6.1
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-16647-01
Streszczenie treści zawartej na stronie nr. 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE
Streszczenie treści zawartej na stronie nr. 3
CONTENTS Preface xxxix Related Documentation xxxix Document Conventions xxxix Obtaining Documentation and Submitting a Service Request i-xl xl PART 1 Getting Started CHAPTER 1 Welcome to ASDM 1-1 ASDM Client Operating System and Browser Requirements 1-2 VPN Specifications 1-2 Supported Platforms and SSMs 1-2 New ASDM Features 1-4 Multiple ASDM Session Support 1-4 Unsupported Commands 1-4 Ignored and View-Only Commands 1-4 Effects of Unsuppor
Streszczenie treści zawartej na stronie nr. 4
Contents Enabling Extended Screen Reader Support 1-16 Organizational Folder 1-16 About the Help Window 1-16 Header Buttons 1-16 Browser Window 1-17 Home Pane 1-17 Device Dashboard Tab 1-18 Firewall Dashboard Tab 1-20 Content Security Tab 1-21 Intrusion Prevention Tab 1-23 Connecting to IPS 1-23 System Home Pane 1-25 CHAPTER 2 Introduction to the Security Appliance 2-1 New Features by Platform Release 2-1 New Features in Version 8.1(2)
Streszczenie treści zawartej na stronie nr. 5
Contents CHAPTER 3 Defining Preferences and Using Configuration, Diagnostic, and File Management Tools 3-1 Preferences 3-1 Configuration Tools 3-3 Reset Device to the Factory Default Configuration 3-3 Save Running Configuration to TFTP Server 3-4 Save Internal Log Buffer to Flash 3-5 Command Line Interface 3-5 Command Errors 3-6 Interactive Commands 3-6 Avoiding Conflicts with Other Administrators 3-6 Show Commands Ignored by ASDM on Device 3-6 Diagn
Streszczenie treści zawartej na stronie nr. 6
Contents PIX 515/515E Default Configuration 4-4 Configuring the Security Appliance for ASDM Access 4-4 Setting Transparent or Routed Firewall Mode at the CLI 4-4 Starting ASDM 4-6 Downloading the ASDM Launcher 4-6 Starting ASDM from the ASDM Launcher 4-6 Using ASDM in Demo Mode 4-7 Starting ASDM from a Web Browser 4-8 Configuration Overview 4-9 PART 2 Device Setup and Management CHAPTER 5 Using the Startup Wizard 5-1 Startup Wizard Screens for ASA 5500 S
Streszczenie treści zawartej na stronie nr. 7
Contents CHAPTER 6 Configuring Basic Device Settings 6-1 Management IP Address 6-1 System Time 6-2 Clock 6-2 NTP 6-3 Add/Edit NTP Server Configuration 6-4 Configuring Advanced Device Management Features 6-4 Configuring HTTP Redirect 6-4 Edit HTTP/HTTPS Settings 6-5 Configuring Maximum SSL VPN Sessions 6-5 History Metrics 6-6 System Image/Configuration 6-6 Activation Key 6-6 Auto Update 6-7 Set Polling Schedule 6-9 Add/Edit Auto Update
Streszczenie treści zawartej na stronie nr. 8
Contents Configuring an Interface (Single Mode) 7-5 Enabling Same Security Level Communication (Single Mode) 7-8 PPPoE IP Address and Route Settings 7-9 CHAPTER 8 Configuring Interfaces in Multiple Mode 8-1 Configuring Interfaces in the System Configuration (Multiple Mode) 8-1 Configuring Physical Interfaces in the System Configuration (Multiple Mode) 8-2 Physical Interface Overview 8-2 Configuring and Enabling Physical Interfaces in the System Configuration (Multip
Streszczenie treści zawartej na stronie nr. 9
Contents Configuring Switch Ports 9-11 Interfaces > Switch Ports 9-11 Edit Switch Port 9-12 CHAPTER 10 Configuring Security Contexts 10-1 Security Context Overview 10-1 Common Uses for Security Contexts 10-2 Unsupported Features 10-2 Context Configuration Files 10-2 How the Security Appliance Classifies Packets 10-2 Valid Classifier Criteria 10-3 Invalid Classifier Criteria 10-4 Classification Examples 10-4 Cascading Security Contexts 10-7 M
Streszczenie treści zawartej na stronie nr. 10
Contents Interface 11-10 Redistribution 11-14 Static Neighbor 11-17 Summary Address 11-18 Virtual Link 11-19 RIP 11-22 Setup 11-23 Interface 11-24 Filter Rules 11-25 Redistribution 11-27 EIGRP 11-28 Configuring EIGRP 11-29 Field Information for the EIGRP Panes 11-30 Static Routes 11-40 Static Route Tracking 11-41 Configuring Static Route Tracking 11-42 Field Information for Static Routes 11-42 Static Routes 11-42 Add/Edit
Streszczenie treści zawartej na stronie nr. 11
Contents MForwarding 12-11 PIM 12-11 Protocol 12-12 Edit PIM Protocol 12-12 Neighbor Filter 12-13 Add/Edit/Insert Neighbor Filter Entry 12-14 Bidirectional Neighbor Filter 12-14 Add/Edit/Insert Bidirectional Neighbor Filter Entry 12-15 Rendezvous Points 12-16 Add/Edit Rendezvous Point 12-16 Request Filter 12-18 Request Filter Entry 12-19 Route Tree 12-20 CHAPTER 13 DHCP, DNS and WCCP Services 13-1 DHCP Relay 13-1 Edit DHCP Relay Agent
Streszczenie treści zawartej na stronie nr. 12
Contents RADIUS Server Support 14-4 Authentication Methods 14-4 Attribute Support 14-4 RADIUS Authorization Functions 14-4 TACACS+ Server Support 14-4 SDI Server Support 14-5 SDI Version Support 14-5 Two-step Authentication Process 14-5 SDI Primary and Replica Servers 14-5 NT Server Support 14-5 Kerberos Server Support 14-5 LDAP Server Support 14-6 Authentication with LDAP 14-6 Securing LDAP Authentication with SASL 14-6 LDAP Server Types
Streszczenie treści zawartej na stronie nr. 13
Contents Active/Standby Failover 15-2 Active/Active Failover 15-2 Stateless (Regular) Failover 15-3 Stateful Failover 15-3 Configuring Failover with the High Availability and Scalability Wizard 15-4 Accessing and Using the High Availability and Scalability Wizard 15-4 Configuring Active/Active Failover with the High Availability and Scalability Wizard 15-4 Configuring Active/Standby Failover with the High Availability and Scalability Wizard 15-5 Configuring VPN
Streszczenie treści zawartej na stronie nr. 14
Contents Configuring CLI Parameters 16-2 Adding a Banner 16-2 Customizing a CLI Prompt 16-3 Changing the Console Timeout Period 16-4 Configuring File Access 16-4 Configuring the FTP Client Mode 16-4 Configuring the Security Appliance as a Secure Copy Server 16-5 Configuring the Security Appliance as a TFTP Client 16-5 Adding Mount Points 16-6 Adding a CIFS Mount Point 16-6 Adding an FTP Mount Point 16-6 Configuring Configuring ICMP Access
Streszczenie treści zawartej na stronie nr. 15
Contents Configure Logging Flash Usage 17-4 Syslog Setup 17-4 Edit Syslog ID Settings 17-5 Advanced Syslog Configuration 17-6 E-Mail Setup 17-7 Add/Edit E-Mail Recipients 17-8 Event Lists 17-8 Add/Edit Event List 17-10 Add/Edit Syslog Message ID Filter 17-10 Logging Filters 17-10 Edit Logging Filters 17-11 Add/Edit Class and Severity Filter 17-13 Add/Edit Syslog Message ID Filter 17-14 Rate Limit 17-14 Edit Rate Limit for Syslog Logging L
Streszczenie treści zawartej na stronie nr. 16
Contents MAC Address vs. Route Lookups 18-8 Using the Transparent Firewall in Your Network 18-9 Transparent Firewall Guidelines 18-9 Unsupported Features in Transparent Mode 18-10 How Data Moves Through the Transparent Firewall 18-11 An Inside User Visits a Web Server 18-12 An Inside User Visits a Web Server Using NAT 18-13 An Outside User Visits a Web Server on the Inside Network 18-14 An Outside User Attempts to Access an Inside Host 18-15 CHAPTER 19 Addin
Streszczenie treści zawartej na stronie nr. 17
Contents Add TLS Proxy Instance Wizard – Server Configuration 19-21 Add TLS Proxy Instance Wizard – Client Configuration 19-22 Add TLS Proxy Instance Wizard – Other Steps 19-24 Phone Proxy 19-24 Configuring the Phone Proxy 19-25 Creating a Phone Proxy Instance 19-25 Add/Edit TFTP Server 19-27 CTL File 19-28 Creating a CTL File 19-28 Add/Edit Record Entry 19-29 TLS Proxy 19-30 Add/Edit TLS Proxy 19-31 CTL Provider 19-32 Add/Edit CTL Provider
Streszczenie treści zawartej na stronie nr. 18
Contents Log Options 20-14 Configuring Ethertype Rules (Transparent Mode Only) 20-16 Add/Edit EtherType Rule 20-17 CHAPTER 21 Configuring NAT 21-1 NAT Overview 21-1 Introduction to NAT 21-1 NAT in Routed Mode 21-2 NAT in Transparent Mode 21-3 NAT Control 21-4 NAT Types 21-6 Dynamic NAT 21-6 PAT 21-8 Static NAT 21-8 Static PAT 21-9 Bypassing NAT When NAT Control is Enabled 21-10 Policy NAT 21-10 NAT and Same Security Level Interfac
Streszczenie treści zawartej na stronie nr. 19
Contents CHAPTER 22 Configuring Service Policy Rules 22-1 Service Policy Overview 22-1 Supported Features 22-1 Service Policy Elements 22-2 Default Global Policy 22-2 Feature Directionality 22-3 Feature Matching Guidelines 22-3 Order in Which Multiple Feature Actions within a Rule are Applied 22-4 Incompatibility of Certain Feature Actions 22-5 Feature Matching Guidelines for Multiple Service Policies 22-5 Adding a Service Policy Rule for Through Traffic
Streszczenie treści zawartej na stronie nr. 20
Contents Configuring TACACS+ Authorization 23-9 Configuring RADIUS Authorization 23-10 Configuring a RADIUS Server to Send Downloadable Access Control Lists 23-11 Configuring a RADIUS Server to Download Per-User Access Control List Names 23-15 Configuring Accounting for Network Access 23-15 Using MAC Addresses to Exempt Traffic from Authentication and Authorization 23-16 CHAPTER 24 Configuring Application Layer Protocol Inspection 24-1 Inspection Engine Overview