30-21
Cisco ASA Series Firewall CLI Configuration Guide
Chapter30 Configuring the ASA CX Module
Managing the ASA CX Module
Detailed Steps
Step8 Repeat for any additional interfaces.
Step9 Click Send.
Examples
The following example makes GigabitEthernet 0/5 a traffic-forwarding interface:
interface gigabitethernet 0/5
no nameif
traffic-forward cxsc monitor-only
no shutdown
Managing the ASA CX Module
This section includes procedures that help you manage the module.
Resetting the Password, page 30-22
Reloading or Resetting the Module, page30-22
Shutting Down the Module, page30-23
(ASA 5512-X through ASA 5555-X) Uninstalling a Software Module Image, page30-24
(ASA 5512-X through ASA 5555-X) Sessioning to the Module From the ASA, page30-24
Command Purpose
Step1 interface physical_interface
Example:
ciscoasa(config)# interface
gigabitethernet 0/5
Enters interface configuration mode for the physical interface you
want to use for traffic-forwarding.
Step2 no nameif
Example:
ciscoasa(config-ifc)# no nameif
Removes any name configured for the interface. If this interface
was used in any ASA configuration, that configuration is
removed. You cannot configure traffic-forwarding on a named
interface.
Step3 traffic-forward cxsc monitor-only
Example:
ciscoasa(config-ifc)# traffic-forward cxsc
monitor-only
Enables traffic-forwarding. You see a warning similar to the
following:
WARNING: This configuration is purely for demo of CX
functionality and shouldn't be used on a production ASA
and any issues found when mixing demo feature with
production ASA is not supported.
Step4 no shutdown
Example:
ciscoasa(config-ifc)# no shutdown
Enables the interface.