30-20
Cisco ASA Series Firewall CLI Configuration Guide
Chapter30 Configuring the ASA CX Module
Configuring the ASA CX Module
Configuring Traffic-Forwarding Interfaces (Monitor-Only Mode)
This section configures traffic-forwarding interfaces, where all traffic is forwarded directly to the ASA
CX module. This method is for demonstration purposes only. For a normal ASA CX service policy, see
the “Creating the ASA CX Service Policy” section on page30-18.
For more information see the “Monitor-Only Mode” section on page30-3. See also the “Guidelines and
Limitations” section on page30-6 for guidelines and limitations specific to traffic-forwarding interfaces.
Prerequisites
Be sure to configure both the ASA policy and the ASA CX to have matching modes: both in
monitor-only.
In multiple context mode, perform this procedure within each security context.
Step6 (Optional)
class name2
Example:
ciscoasa(config-pmap)# class cx_class2
If you created multiple class maps for ASA CX traffic, you can
specify another class for the policy.
See the “Feature Matching Within a Service Policy” section on
page 1-3 for detailed information about how the order of classes
matters within a policy map. Traffic cannot match more than one
class map for the same action type.
Step7 (Optional)
cxsc {fail-close | fail-open} [auth-proxy
| monitor-only]
Example:
ciscoasa(config-pmap-c)# cxsc fail-close
auth-proxy
Specifies that the second class of traffic should be sent to the ASA
CX module.
Add as many classes as desired by repeating these steps.
Step8 service-policy policymap_name {global |
interface interface_name}
Example:
ciscoasa(config)# service-policy cx_policy
interface outside
Activates the policy map on one or more interfaces. global applies
the policy map to all interfaces, and interface applies the policy
to one interface. Only one global policy is allowed. You can
override the global policy on an interface by applying a service
policy to that interface. You can only apply one policy map to
each interface.
Command Purpose