Index
IN-10
Cisco ASA Series Firewall CLI Configuration Guide
applications supported by ASA 14-3
Cisco Unified Presence architecture 19-1
configuring for Cisco Unified Presence 19-8
licenses 14-4, 17-5, 18-6, 19-7, 20-7
tocken bucket 23-2
traffic shaping
overview 23-4
transmit queue ring limit 23-2, 23-3
transparent firewall
DHCP packets, allowing 6-6
packet handling 6-5
transparent mode
NAT 3-11
troubleshooting
H.323 11-9
H.323 RAS 11-10
phone proxy 16-28
SIP 11-24
Trusted Flow Acceleration
modes 6-7
trust relationship
Cisco Unified Mobility 18-5
Cisco Unified Presence 19-4
twice NAT
about 3-14
comparison with network object NAT 3-13
configuring 5-1
dynamic NAT 5-7
dynamic PAT 5-11
examples 5-25
guidelines 5-2
identity NAT 5-21
monitoring 5-24
prerequisites 5-2
static NAT 5-18
tx-ring-limit 23-2, 23-3
U
UDP
bomb attack 28-7
chargen DoS attack 28-7
snork attack 28-7
URLs
filtering 29-1
filtering, about 29-7
filtering, configuration 29-11
V
viewing QoS statistics 23-16
virtual HTTP 7-3
virtual sensors 31-16
VoIP
proxy servers 11-18
troubleshooting 11-9
VPN client
NAT rules 3-18
W
web clients, secure authentication 7-10