Cisco Systems Managing Your Security Services Module for Enhanced Home Security

Page 14

Chapter 19 Managing the AIP SSM and CSC SSM

Transferring an Image onto an SSM

hostname# show module 1

 

 

 

 

 

 

 

Mod

Card Type

 

 

 

 

Model

 

Serial No.

---

--------------------------------------------

------------------

-----------

1

ASA 5500 Series Security Services Module-20

ASA-SSM-20

 

JAB100301NE

Mod

MAC Address Range

 

 

Hw Version

Fw Version

Sw Version

---

---------------------------------

------------ ------------

---------------

1

0015.c6fa.2c0f to 0015.c6fa.2c0f

1.0

 

1.0(10)0

CSC

SSM 6.0 (Build#1349)

Mod

SSM Application Name

Status

 

SSM Application

Version

---

------------------------------ ---------------- --------------------------

1

CSC SSM

 

Down

 

6.0 (Build#1349)

 

Mod

Status

Data Plane Status

Compatibility

 

 

---

------------------

--------------------- -------------

 

 

1

Up

Up

 

 

 

 

 

 

The argument 1, at the end of the command, is the slot number occupied by the SSM. If you do not know the slot number, you can omit it and see information about all modules, including the adaptive security appliance, which is considered to occupy slot 0 (zero).

Use the details keyword to view additional information for the SSM.

The follow example output is from an adaptive security appliance with a CSC SSM installed.

hostname# show module 1 details

Getting details from the Service Module, please wait...

ASA 5500 Series Security Services Module-20

Model:

ASA-SSM-20

Hardware version:

1.0

Serial Number:

JAB100301NE

Firmware version:

1.0(10)0

Software version:

CSC SSM 6.0 (Build#1349)

MAC Address Range:

0015.c6fa.2c0f to 0015.c6fa.2c0f

App. name:

CSC SSM

App. Status:

Up

App. Status Desc:

CSC SSM scan services are available

App. version:

6.0 (Build#1349)

Data

plane Status:

Up

Status:

Up

HTTP

Service:

Up

Mail

Service:

Up

FTP

Service:

Up

Activated:

Yes

Mgmt

IP addr:

10.23.62.92

Mgmt

web port:

8443

Peer

IP addr:

<not enabled>

Transferring an Image onto an SSM

For an intelligent SSM, such as AIP SSM or CSC SSM, you can transfer application images from a TFTP server to the SSM. This process supports upgrade images and maintenance images.

Note If you are upgrading the application on the SSM, the SSM application may support backup of its configuration. If you do not back up the configuration of the SSM application, it is lost when you transfer an image onto the SSM. For more information about how your SSM supports backups, see the documentation for your SSM.

 

Cisco Security Appliance Command Line Configuration Guide

19-14

OL-8629-01

Image 14
Contents 19-1 Managing the AIP SSMAbout the AIP SSM 19-2 Getting Started with the AIP SSMDiverting Traffic to the AIP SSM 19-3 Sessioning to the AIP SSM and Running Setup 19-419-5 Managing the CSC SSMAbout the CSC SSM 19-6 Flow of Scanned Traffic with CSC SSMGetting Started with the CSC SSM 19-719-8 Determining What Traffic to Scan 19-9Common Network Configuration for CSC SSM Scanning 19-1019-11 Limiting Connections Through the CSC SSMDiverting Traffic to the CSC SSM 19-12 Checking SSM Status 19-13Transferring an Image onto an SSM 19-1419-15 19-16
Related manuals
Manual 49 pages 36.1 Kb Manual 144 pages 23.87 Kb Manual 16 pages 48.09 Kb

ASA 5500 specifications

Cisco Systems ASA 5500 is a robust security appliance designed to provide advanced network security and protection against both internal and external threats. Ideal for organizations of various sizes, the ASA 5500 series offers a wide range of features that combine firewall capabilities with intrusion prevention, VPN support, and application control, among others.

One of the key features of the ASA 5500 is its stateful firewall technology. This allows the device to monitor active connections and enforce security policies based on the state of the traffic. By maintaining the context of network sessions, the firewall can make informed decisions on whether to allow or deny traffic based on established rules.

In addition to traditional firewall functionalities, the ASA 5500 series integrates advanced intrusion prevention capabilities. By analyzing traffic patterns and identifying known threats, the IPS functionality helps organizations defend against a variety of malicious activities, such as DDoS attacks, malware, and unauthorized access attempts. The ASA 5500 continuously updates its threat intelligence through Cisco's global threat database, enhancing its ability to detect emerging threats in real-time.

Virtual Private Network (VPN) support is another significant aspect of the ASA 5500 series. The device offers secure, encrypted connections for remote users and branch offices, ensuring safe access to corporate resources over the Internet. It supports both IPsec and SSL VPN protocols, allowing organizations to choose the best option for their specific needs. This capability is crucial for businesses that require a secure environment for remote work.

The ASA 5500 series also features extensive application control and visibility tools. These tools enable organizations to manage and control the applications running on their network, ensuring that only authorized applications can communicate through the firewall. This level of control helps to mitigate risks associated with unauthorized applications, which can lead to data breaches or reduced productivity.

Moreover, the ASA 5500 is designed with high availability and scalability in mind. Its clustering support ensures that multiple units can work together to provide redundancy and load balancing, enhancing both performance and reliability. This characteristic is especially important for organizations looking to maintain continuous operation during traffic spikes or hardware failures.

In summary, Cisco Systems ASA 5500 is an all-in-one security solution that combines stateful firewall protection, intrusion prevention, VPN capabilities, and application control. With its robust feature set and focus on security, it is well-suited for organizations seeking to protect their networks from an ever-evolving landscape of cyber threats. Whether for small businesses or large enterprises, the ASA 5500 provides the necessary tools to create a secure networking environment.