Manuals / Brands / Computer Equipment / Switch / Cisco Systems / Computer Equipment / Switch

Cisco Systems OL-16647-01 - page 1162

1 1230
Download 1230 pages, 14.85 Mb
Contents
Main Cisco ASDM User Guide Page CONTENTS Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Page Preface Related Documentation Document Conventions Obtaining Documentation and Submitting a Service Request Page Page Welcome to ASDM ASDM Client Operating System and Browser Requirements VPN Specifications Supported Platforms and SSMs Page New ASDM Features Multiple ASDM Session Support Unsupported Commands Ignored and View-Only Commands Effects of Unsupported Commands Discontinuous Subnet Masks Not Supported Interactive User Commands Not Supported by the ASDM CLI Tool About the ASDM Interface Menus File Menu View Menu Tools Menu Wizards Menu Window Menu Help Menu Toolbar ASDM Assistant How Do I? Tab Search Tab Status Bar Connection to Device Device List Common Buttons Keyboard Shortcuts Page Enabling Extended Screen Reader Support Organizational Folder About the Help Window Header Buttons Browser Window Home Pane Device Dashboard Tab Page Firewall Dashboard Tab Content Security Tab Page Intrusion Prevention Tab Connecting to IPS Page System Home Pane Page Introduction to the Security Appliance New Features by Platform Release New Features in Version 8.1(2) Page Page New Features in Version 8.1(1) New Features in Version 8.0(4) Page Page Page New Features in Version 8.0(3) New Features in Version 8.0(2) Page Page Page Page Page Firewall Functional Overview Security Policy Overview Permitting or Denying Traffic with Access Lists Applying NAT Protecting from IP Fragments Using AAA for Through Traffic Applying HTTP, HTTPS, or FTP Filtering Sending Traffic to the Advanced Inspection and Prevention Security Services Module Sending Traffic to the Content Security and Control Security Services Module Applying QoS Policies Applying Connection Limits and TCP Normalization Enabling Threat Detection Firewall Mode Overview Stateful Inspection Overview VPN Functional Overview Security Context Overview Page Page Defining Preferences and Using Configuration, Diagnostic, and File Management Tools Preferences Page Configuration Tools Reset Device to the Factory Default Configuration Save Running Configuration to TFTP Server Save Internal Log Buffer to Flash Command Line Interface Command Errors Interactive Commands Avoiding Conflicts with Other Administrators Show Commands Ignored by ASDM on Device Diagnostic Tools Packet Tracer Ping Using the Ping Tool Troubleshooting the Ping Tool Pinging from a Security Appliance Interface Pinging to a Security Appliance Interface Pinging Through the Security Appliance Traceroute Administrators Alert to Clientless SSL VPN Users ASDM Java Console Packet Capture Wizard Page Field Information for the Packet Capture Wizard Ingress Traffic Selector Egress Traffic Selector Buffers Summary Run Captures Save Captures File Management Tools File Management Manage Mount Points Add/Edit a CIFS/FTP Mount Point Upgrade Software from Local Computer File Transfer Upgrade Software from Cisco.com Wizard Page ASDM Assistant System Reload Backup and Restore Backing Up Configurations Page Page Restoring Configurations Page Before You Start Factory Default Configurations Restoring the Factory Default Configuration ASA 5505 Default Configuration 4-3 ASA 5510 and Higher Version Default Configuration command, then the IP address and mask are 192.168.1.1 and 255.255.255.0. The DHCP server is enabled on the adaptive security appliance, so a computer connecting to the interface receives an address between 192.168.1.2 and 192.168.1.254. The HTTP server is enabled for ASDM and is accessible to users on the 192.168.1.0 network. Configuring the Security Appliance for ASDM Access Setting Transparent or Routed Firewall Mode at the CLI Page Starting ASDM Downloading the ASDM Launcher Starting ASDM from the ASDM Launcher Using ASDM in Demo Mode Starting ASDM from a Web Browser Configuration Overview Page Page Page Page Page Using the Startup Wizard Startup Wizard Screens for ASA 5500 Series and PIX 500 Series Security Appliances Startup Wizard Screens for the ASA 5505 Adaptive Security Appliance Step 1 - Starting Point or Welcome Step 2 - Basic Configuration Step 3 - Auto Update Server Step 4 - Management IP Address Configuration Step 5 - Interface Selection Step 6 - Switch Port Allocation Step 7 - Interface IP Address Configuration Step 8 - Internet Interface Configuration - PPPoE Step 9 - Business Interface Configuration - PPPoE Step 10 - Home Interface Configuration - PPPoE Step 11 - General Interface Configuration Step 12 - Static Routes Add/Edit Static Routes Step 13 - DHCP Server Step 14 - Address Translation (NAT/PAT) Step 15 - Administrative Access Add/Edit Administrative Access Entry Step 16 - Easy VPN Remote Configuration Page Step 17 - Startup Wizard Summary Other Interfaces Configuration Edit Interface Interface Configuration Outside Interface Configuration - PPPoE Outside Interface Configuration Page Page Configuring Basic Device Settings Management IP Address System Time Clock NTP Add/Edit NTP Server Configuration Configuring Advanced Device Management Features Configuring HTTP Redirect Edit HTTP/HTTPS Settings Configuring Maximum SSL VPN Sessions History Metrics System Image/Configuration Activation Key Auto Update Page Set Polling Schedule Add/Edit Auto Update Server Advanced Auto Update Settings Boot Image/Configuration Add Boot Image Device Name/Password System Software Add/Edit Client Update Page Page Configuring Interfaces in Single Mode Interface Overview Physical Interface Overview Default Physical Interface Settings Connector Types Redundant Interface Overview Redundant Interfaces and Failover Guidelines Redundant Interface MAC Address Physical Interface Guidelines for Use in a Redundant Interface VLAN Subinterface and 802.1Q Trunking Overview Maximum Subinterfaces Preventing Untagged Packets on the Physical Interface Default State of Interfaces Default Security Level Configuring an Interface (Single Mode) Page Page Enabling Same Security Level Communication (Single Mode) PPPoE IP Address and Route Settings Page Configuring Interfaces in Multiple Mode Configuring Interfaces in the System Configuration (Multiple Mode) Configuring Physical Interfaces in the System Configuration (Multiple Mode) Physical Interface Overview Default State of Physical Interfaces Connector Types Auto-MDI/MDIX Feature Configuring Redundant Interfaces in the System Configuration (Multiple Mode) Redundant Interface Overview Default State of Redundant Interfaces Redundant Interfaces and Failover Guidelines Redundant Interface MAC Address Physical Interface Guidelines for Use in a Redundant Interface Configuring VLAN Subinterfaces and 802.1Q Trunking in the System Configuration (Multiple Mode) Subinterface Overview Default State of Subinterfaces Maximum Subinterfaces Adding a Subinterface in the System Configuration (Multiple Mode) Enabling Jumbo Frame Support for the ASA 5580 in the System Configuration (Multiple Mode) Allocating Interfaces to Contexts Configuring Interface Parameters within each Context (Multiple Mode) Interface Parameters Overview Default State of Interfaces Default Security Level Configuring Interface Parameters in each Context (Multiple Mode) Enabling Same Security Level Communication (Multiple Mode) Page Page Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance Interface Overview Understanding ASA 5505 Ports and Interfaces Maximum Active VLAN Interfaces for Your License Page Default Interface Configuration VLAN MAC Addresses Power Over Ethernet Monitoring Traffic Using SPAN Security Level Overview Configuring VLAN Interfaces Interfaces > Interfaces Page Add/Edit Interface > General Page Add/Edit Interface > Advanced Configuring Switch Ports Interfaces > Switch Ports Edit Switch Port Page Page Configuring Security Contexts Security Context Overview Common Uses for Security Contexts Unsupported Features Context Configuration Files How the Security Appliance Classifies Packets Valid Classifier Criteria Unique Interfaces Unique MAC Addresses NAT Configuration Invalid Classifier Criteria Classification Examples Page 10-6 Cascading Security Contexts Management Access to Security Contexts System Administrator Access Context Administrator Access Enabling or Disabling Multiple Context Mode Backing Up the Single Mode Configuration Enabling Multiple Context Mode Restoring Single Context Mode Configuring Resource Classes Classes and Class Members Overview Resource Limits Default Class Class Members Adding a Resource Class Page Monitoring Context Resource Usage Configuring Security Contexts Adding a Security Context Automatically Assigning MAC Addresses MAC Address Overview Enabling Automatic MAC Address Assignment Configuring Dynamic And Static Routing Dynamic Routing OSPF Setup Setup > Process Instances Tab Edit OSPF Process Advanced Properties Page Setup > Area/Networks Tab Add/Edit OSPF Area Page Setup > Route Summarization Tab Add/Edit Route Summarization Filtering Add/Edit Filtering Entry Interface Interface > Authentication Tab Edit OSPF Interface Authentication Interface > Properties Tab Edit OSPF Interface Properties Edit OSPF Interface Advanced Properties Redistribution Page Add/Edit OSPF Redistribution Entry Static Neighbor Add/Edit OSPF Neighbor Entry Summary Address Add/Edit OSPF Summary Address Entry Virtual Link Add/Edit Virtual Link Advanced OSPF Virtual Link Properties RIP Setup Interface Edit RIP Interface Entry Filter Rules Add/Edit Filter Rule Network Rule Redistribution Add/Edit Route Redistribution EIGRP Configuring EIGRP Field Information for the EIGRP Panes Setup Process Instances Edit EIGRP Process Advanced Properties Networks Passive Interfaces Filter Rules Interface Redistribution Static Neighbor Summary Address Default Information Static Routes Static Route Tracking Configuring Static Route Tracking Field Information for Static Routes Static Routes Add/Edit Static Route Route Monitoring Options ASR Group Proxy ARPs Configuring Multicast Routing Multicast IGMP Access Group Add/Edit Access Group Join Group Add/Edit IGMP Join Group Protocol Configure IGMP Parameters Static Group Add/Edit IGMP Static Group Multicast Route Add/Edit Multicast Route MBoundary Edit Boundary Filter Add/Edit/Insert Neighbor Filter Entry MForwarding PIM Protocol Edit PIM Protocol Neighbor Filter Add/Edit/Insert Neighbor Filter Entry Bidirectional Neighbor Filter Add/Edit/Insert Bidirectional Neighbor Filter Entry Rendezvous Points Add/Edit Rendezvous Point Page Multicast Group Request Filter Request Filter Entry Route Tree DHCP, DNS and WCCP Services DHCP Relay Page Edit DHCP Relay Agent Settings Add/Edit Global DHCP Relay Server DHCP Server Page Edit DHCP Server Advanced DHCP Options Page DNS Client Add/Edit DNS Server Group Dynamic DNS Page Add/Edit Dynamic DNS Update Methods Add/Edit Dynamic DNS Interface Settings WCCP WCCP Service Groups Add or Edit WCCP Service Group Redirection Add or Edit WCCP Redirection Page Configuring AAA Servers and the Local Database AAA Overview About Authentication About Authorization About Accounting AAA Server and Local Database Support Summary of Support RADIUS Server Support Authentication Methods Attribute Support RADIUS Authorization Functions TACACS+ Server Support SDI Server Support SDI Version Support Two-step Authentication Process SDI Primary and Replica Servers NT Server Support LDAP Server Support Authentication with LDAP Securing LDAP Authentication with SASL LDAP Server Types Authorization with LDAP for VPN SSO Support for WebVPN with HTTP Forms Local Database Support User Profiles Fallback Support Configuring AAA Server Groups Adding a Server Group Adding a Server to a Group AAA Server Parameters RADIUS Server Fields Page TACACS+ Server Fields SDI Server Fields Windows NT Domain Server Fields Kerberos Server Fields LDAP Server Fields Page HTTP Form Server Fields Testing Server Authentication and Authorization Adding a User Account Page Configuring VPN Policy Attributes for a User Page Configuring LDAP Attribute Maps Adding an Authentication Prompt Page High Availability Understanding Failover Active/Standby Failover Active/Active Failover Stateless (Regular) Failover Stateful Failover Configuring Failover with the High Availability and Scalability Wizard Accessing and Using the High Availability and Scalability Wizard Configuring Active/Active Failover with the High Availability and Scalability Configuring Active/Standby Failover with the High Availability and Scalability Configuring VPN Load Balancing with the High Availability and Scalability Field Information for the High Availability and Scalability Wizard Choose the Type of Failover Configuration Check Failover Peer Connectivity and Compatibility Change Device to Multiple Mode Select Failover Communication Media Security Context Configuration Failover Link Configuration State Link Configuration Standby Address Configuration VPN Cluster Load Balancing Configuration Page Summary Field Information for the Failover Panes Failover - Single Mode Failover: Setup Page Failover: Interfaces (Routed Firewall Mode) Edit Failover Interface Configuration (Routed Firewall Mode) Failover: Interfaces (Transparent Firewall Mode) Edit Failover Interface Configuration (Transparent Firewall Mode) Failover: Criteria Failover: MAC Addresses Add/Edit Interface MAC Address Failover-Multiple Mode, Security Context Failover - Routed Edit Failover Interface Configuration Failover - Transparent Edit Failover Interface Configuration Failover-Multiple Mode, System Failover > Setup Tab Page Failover > Criteria Tab Failover > Active/Active Tab Add/Edit Failover Group Add/Edit Interface MAC Address Failover > MAC Addresses Tab Add/Edit Interface MAC Address Page Configuring Management Access Configuring Device Access for ASDM, Telnet, or SSH Configuring CLI Parameters Adding a Banner Customizing a CLI Prompt Changing the Console Timeout Period Configuring File Access Configuring the FTP Client Mode Configuring the Security Appliance as a Secure Copy Server Configuring the Security Appliance as a TFTP Client Adding Mount Points Adding a CIFS Mount Point Adding an FTP Mount Point Configuring Configuring ICMP Access Page Configuring a Management Interface Configuring SNMP Information About SNMP Information About SNMP Terminology Information About the Management Information Base and Traps Page Page 16-13 MIB or Trap Support Description of Security Appliance Support ENTITY-MIB Browsing of the following groups and tables: entPhysicalTable entLogicalTable The following objects are supported: 16-14 MIB or Trap Support Description of Security Appliance Support ENTITY-MIB (continued) Page Page Configuring an SNMP Agent and Management Station Configuring the SNMP Agent Adding an SNMP Management Station Configuring SNMP Traps Configuring Management Access Rules Configuring AAA for System Administrators Configuring Authentication for CLI, ASDM, and enable command Access Page Limiting User CLI and ASDM Access with Management Authorization Configuring Command Authorization Command Authorization Overview Supported Command Authorization Methods About Preserving User Credentials Security Contexts and Command Authorization Configuring Local Command Authorization Local Command Authorization Prerequisites Default Command Privilege Levels Assigning Privilege Levels to Commands and Enabling Authorization Configuring TACACS+ Command Authorization TACACS+ Command Authorization Prerequisites Configuring Commands on the TACACS+ Server Page Enabling TACACS+ Command Authorization Configuring Management Access Accounting Recovering from a Lockout Page Page Configuring Logging About Logging Security Contexts in Logging Using Logging Logging Setup Configure FTP Settings Configure Logging Flash Usage Syslog Setup Edit Syslog ID Settings Advanced Syslog Configuration E-Mail Setup Add/Edit E-Mail Recipients Event Lists Page Add/Edit Event List Add/Edit Syslog Message ID Filter Logging Filters Edit Logging Filters Page Add/Edit Class and Severity Filter Add/Edit Syslog Message ID Filter Rate Limit Edit Rate Limit for Syslog Logging Level Add/Edit Rate Limit for Syslog Message Syslog Servers Add/Edit Syslog Server SMTP Using NetFlow Matching NetFlow Events to Configured Collectors Page Page Page Firewall Mode Overview Routed Mode Overview IP Routing Support How Data Moves Through the Security Appliance in Routed Firewall Mode An Inside User Visits a Web Server An Outside User Visits a Web Server on the DMZ An Inside User Visits a Web Server on the DMZ An Outside User Attempts to Access an Inside Host A DMZ User Attempts to Access an Inside Host Transparent Mode Overview Transparent Firewall Network Allowing Layer 3 Traffic Allowed MAC Addresses Passing Traffic Not Allowed in Routed Mode MAC Address vs. Route Lookups Using the Transparent Firewall in Your Network Transparent Firewall Guidelines Unsupported Features in Transparent Mode How Data Moves Through the Transparent Firewall An Inside User Visits a Web Server An Inside User Visits a Web Server Using NAT An Outside User Visits a Web Server on the Inside Network An Outside User Attempts to Access an Inside Host Page Adding Global Objects Using Network Objects and Groups Network Object Overview Configuring a Network Object Configuring a Network Object Group Using Network Objects and Groups in a Rule Viewing the Usage of a Network Object or Group Configuring Service Groups Service Groups Add/Edit Service Group Browse Service Groups Configuring Class Maps Configuring Inspect Maps Configuring Regular Expressions Regular Expressions Add/Edit Regular Expression Page Build Regular Expression Page Test Regular Expression Add/Edit Regular Expression Class Map Configuring TCP Maps Configuring Global Pools Configuring Time Ranges Add/Edit Time Range Add/Edit Recurring Time Range Encrypted Traffic Inspection TLS Proxy Wizard Page Configure TLS Proxy Pane Adding a TLS Proxy Instance Add TLS Proxy Instance Wizard Server Configuration Add TLS Proxy Instance Wizard Client Configuration Page Add TLS Proxy Instance Wizard Other Steps Phone Proxy Configuring the Phone Proxy Creating a Phone Proxy Instance Page Add/Edit TFTP Server CTL File Creating a CTL File Add/Edit Record Entry TLS Proxy Add/Edit TLS Proxy CTL Provider Add/Edit CTL Provider Page Configuring Access Rules and EtherType Rules Information About Access Rules and EtherType Rules Information About Both Access Rules and EtherType Rules Using Access Rules and EtherType Rules on the Same Interface Rule Order Implicit Deny Inbound and Outbound Rules Information About Access Rules IP Addresses Used for Access Rules When You Use NAT Page Access Rules for Returning Traffic Allowing Broadcast and Multicast Traffic through the Transparent Firewall Using Access Rules Information About EtherType Rules Supported EtherTypes Implicit Permit of IP and ARPs Only IPv6 Unsupported Allowing MPLS Configuring Access Rules Page Page Rule Queries New/Edit Rule Query Add/Edit Access Rule Manage Service Groups Add/Edit Service Group Advanced Access Rule Configuration Log Options Page Configuring Ethertype Rules (Transparent Mode Only) Add/Edit EtherType Rule Page Configuring NAT NAT Overview Introduction to NAT NAT in Routed Mode NAT in Transparent Mode 21-4 NAT Control Page NAT Types Dynamic NAT 21-7 PAT Static NAT Static PAT Bypassing NAT When NAT Control is Enabled Policy NAT 21-11 NAT and Same Security Level Interfaces Order of NAT Rules Used to Match Real Addresses Mapped Address Guidelines DNS and NAT Page Configuring NAT Control Using Dynamic NAT Dynamic NAT Implementation Real Addresses and Global Pools Paired Using a Pool ID NAT Rules on Different Interfaces with the Same Global Pools Global Pools on Different Interfaces with the Same Pool ID Multiple NAT Rules with Different Global Pools on the Same Interface Multiple Addresses in the Same Global Pool Outside NAT Real Addresses in a NAT Rule Must be Translated on All Lower or Same Security Interfaces Managing Global Pools Configuring Dynamic NAT, PAT, or Identity NAT Page Configuring Dynamic Policy NAT or PAT Page Using Static NAT Configuring Static NAT, PAT, or Identity NAT Page Page Configuring Static Policy NAT, PAT, or Identity NAT Page Using NAT Exemption Page Page Configuring Service Policy Rules Service Policy Overview Supported Features Service Policy Elements Default Global Policy Feature Directionality Feature Matching Guidelines Order in Which Multiple Feature Actions within a Rule are Applied Incompatibility of Certain Feature Actions Feature Matching Guidelines for Multiple Service Policies Adding a Service Policy Rule for Through Traffic Page Page Page Adding a Service Policy Rule for Management Traffic RADIUS Accounting Inspection Overview Configuring a Service Policy Rule for Management Traffic Page Page Managing the Order of Service Policy Rules RADIUS Accounting Field Descriptions Select RADIUS Accounting Map Add RADIUS Accounting Policy Map RADIUS Inspect Map RADIUS Inspect Map Host RADIUS Inspect Map Other Page Applying AAA for Network Access AAA Performance Configuring Authentication for Network Access Information About Authentication One-Time Authentication Applications Required to Receive an Authentication Challenge Security Appliance Authentication Prompts Static PAT and HTTP Configuring Network Access Authentication Enabling the Redirection Method of Authentication for HTTP and HTTPS Enabling Secure Authentication of Web Clients Authenticating Directly with the Security Appliance Authenticating Telnet Connections with a Virtual Server Authenticating HTTP(S) Connections with a Virtual Server Page Configuring the Authentication Proxy Limit Configuring Authorization for Network Access Configuring TACACS+ Authorization Configuring RADIUS Authorization Configuring a RADIUS Server to Send Downloadable Access Control Lists About the Downloadable Access List Feature and Cisco Secure ACS Page Configuring Cisco Secure ACS for Downloadable Access Lists Configuring Any RADIUS Server for Downloadable Access Lists Converting Wildcard Netmask Expressions in Downloadable Access Lists Configuring a RADIUS Server to Download Per-User Access Control List Names Configuring Accounting for Network Access Using MAC Addresses to Exempt Traffic from Authentication and Authorization Page Page Configuring Application Layer Protocol Inspection Inspection Engine Overview When to Use Application Protocol Inspection Inspection Limitations Default Inspection Policy Configuring Application Inspection CTIQBE Inspection CTIQBE Inspection Overview Limitations and Restrictions DCERPC Inspection DNS Inspection How DNS Application Inspection Works How DNS Rewrite Works ESMTP Inspection FTP Inspection FTP Inspection Overview Using Strict FTP Verifying and Monitoring FTP Inspection GTP Inspection H.323 Inspection H.323 Inspection Overview How H.323 Works Limitations and Restrictions HTTP Inspection Instant Messaging Inspection ICMP Inspection ICMP Error Inspection ILS Inspection MGCP Inspection Page MMP Inspection Configuring MMP Inspection for a TLS Proxy NetBIOS Inspection PPTP Inspection RADIUS Accounting Inspection RSH Inspection RTSP Inspection RTSP Inspection Overview Using RealPlayer Restrictions and Limitations SIP Inspection SIP Inspection Overview SIP Instant Messaging Skinny (SCCP) Inspection SCCP Inspection Overview Supporting Cisco IP Phones Restrictions and Limitations SMTP and Extended SMTP Inspection SNMP Inspection SQL*Net Inspection Sun RPC Inspection Sun RPC Inspection Overview SUNRPC Server Add/Edit SUNRPC Service TFTP Inspection XDMCP Inspection Service Policy Field Descriptions Rule Actions > Protocol Inspection Tab Page Select DCERPC Map Select DNS Map Select ESMTP Map Select FTP Map Select GTP Map Select H.323 Map Select HTTP Map Select IM Map Select IPSec-Pass-Thru Map Select MGCP Map Select NETBIOS Map Select RTSP Map Select SCCP (Skinny) Map Select SIP Map Select SNMP Map Class Map Field Descriptions DNS Class Map Add/Edit DNS Traffic Class Map Add/Edit DNS Match Criterion Page Manage Regular Expressions Manage Regular Expression Class Maps FTP Class Map Add/Edit FTP Traffic Class Map Add/Edit FTP Match Criterion Page H.323 Class Map Add/Edit H.323 Traffic Class Map Add/Edit H.323 Match Criterion HTTP Class Map Add/Edit HTTP Traffic Class Map Add/Edit HTTP Match Criterion Page Page Page IM Class Map Add/Edit IM Traffic Class Map Add/Edit IM Match Criterion Page SIP Class Map Add/Edit SIP Traffic Class Map Add/Edit SIP Match Criterion Page Inspect Map Field Descriptions Page Page DCERPC Inspect Map Add/Edit DCERPC Policy Map DNS Inspect Map Page Add/Edit DNS Policy Map (Security Level) Add/Edit DNS Policy Map (Details) Page Add/Edit DNS Inspect Manage Class Maps ESMTP Inspect Map MIME File Type Filtering Add/Edit ESMTP Policy Map (Security Level) Add/Edit ESMTP Policy Map (Details) Add/Edit ESMTP Inspect Page Page Page FTP Inspect Map File Type Filtering Add/Edit FTP Policy Map (Security Level) Add/Edit FTP Policy Map (Details) Add/Edit FTP Map Page GTP Inspect Map IMSI Prefix Filtering Add/Edit GTP Policy Map (Security Level) Add/Edit GTP Policy Map (Details) Page Add/Edit GTP Map H.323 Inspect Map Phone Number Filtering Add/Edit H.323 Policy Map (Security Level) Add/Edit H.323 Policy Map (Details) Add/Edit HSI Group Add/Edit H.323 Map HTTP Inspect Map URI Filtering Add/Edit HTTP Policy Map (Security Level) Add/Edit HTTP Policy Map (Details) Add/Edit HTTP Map Page Page Page Instant Messaging (IM) Inspect Map Add/Edit Instant Messaging (IM) Policy Map Add/Edit IM Map Page IPSec Pass Through Inspect Map Add/Edit IPSec Pass Thru Policy Map (Security Level) Add/Edit IPSec Pass Thru Policy Map (Details) MGCP Inspect Map Gateways and Call Agents Add/Edit MGCP Policy Map Add/Edit MGCP Group NetBIOS Inspect Map Add/Edit NetBIOS Policy Map RTSP Inspect Map Add/Edit RTSP Policy Map Add/Edit RTSP Inspect SCCP (Skinny) Inspect Map Message ID Filtering Add/Edit SCCP (Skinny) Policy Map (Security Level) Add/Edit SCCP (Skinny) Policy Map (Details) Add/Edit Message ID Filter SIP Inspect Map Add/Edit SIP Policy Map (Security Level) Add/Edit SIP Policy Map (Details) Page Add/Edit SIP Inspect Page SNMP Inspect Map Add/Edit SNMP Map Page Configuring QoS QoS Overview Supported QoS Features What is a Token Bucket? Policing Overview Priority Queueing Overview Traffic Shaping Overview How QoS Features Interact DSCP and DiffServ Preservation Creating the Standard Priority Queue for an Interface Creating a Policy for Standard Priority Queueing and/or Policing Creating a Policy for Traffic Shaping and Hierarchical Priority Queueing Page Configuring Filter Rules URL Filtering Configuring URL Filtering URL Filtering Servers Add/Edit Parameters for Websense URL Filtering Add/Edit Parameters for Secure Computing SmartFilter URL Filtering Advanced URL Filtering Filter Rules Page Add/Edit Filter Rule Page Filtering the Rule Table Define Query Browse Source/Destination/Service Page Configuring Advanced Firewall Protection Configuring Threat Detection Configuring Basic Threat Detection Basic Threat Detection Overview Configuring Basic Threat Detection Configuring Scanning Threat Detection Configuring Threat Statistics Page Configuring Connection Settings Connection Limit Overview TCP Intercept Overview Disabling TCP Intercept for Management Packets for Clientless SSL VPN Compatibility Dead Connection Detection Overview TCP Normalization Overview Enabling Connection Limits and TCP Normalization Page Page Configuring IP Audit IP Audit Policy Add/Edit IP Audit Policy Configuration IP Audit Signatures IP Audit Signature List Page Page Page Configuring the Fragment Size Show Fragment Edit Fragment Configuring Anti-Spoofing Configuring TCP Options Page TCP Reset Settings Configuring Global Timeouts Page Configuring IPS AIP SSM Overview How the AIP SSM Works with the Adaptive Security Appliance Operating Modes Using Virtual Sensors AIP SSM Procedure Overview Accessing IDM from ASDM Configuring the AIP SSM Security Policy in IDM Assigning Virtual Sensors to Security Contexts Diverting Traffic to the AIP SSM Intrusion Prevention Tab Field Descriptions Resetting the AIP SSM Password Configuring Trend Micro Content Security Connecting to the CSC SSM Managing the CSC SSM About the CSC SSM Page Getting Started with the CSC SSM Page Determining What Traffic to Scan Page Rule Actions for CSC Scanning CSC SSM Setup Activation/License IP Configuration Host/Notification Settings Management Access Host/Networks Password Restoring the Default Password Wizard Setup CSC Setup Wizard Activation Codes Configuration CSC Setup Wizard IP Configuration CSC Setup Wizard Host Configuration CSC Setup Wizard Management Access Configuration CSC Setup Wizard Password Configuration CSC Setup Wizard Traffic Selection for CSC Scan Specify traffic for CSC Scan CSC Setup Wizard Summary Web Mail SMTP Tab POP3 Tab File Transfer Updates Page Configuring ARP Inspection and Bridging Parameters Configuring ARP Inspection ARP Inspection Edit ARP Inspection Entry ARP Static Table Add/Edit ARP Static Configuration Customizing the MAC Address Table MAC Address Table Page Add/Edit MAC Address Entry MAC Learning Page Page SSL VPN Wizard SSL VPN Feature SSL VPN Interface User Authentication Group Policy Bookmark List IP Address Pools and Client Image Summary Page Page VPN VPN Wizard VPN Tunnel Type Remote Site Peer IKE Policy Hosts and Networks Summary Remote Access Client VPN Client Authentication Method and Name Client Authentication New Authentication Server Group User Accounts Address Pool Attributes Pushed to Client IPsec Settings (Optional) Page Page Page Configuring Certificates CA Certificate Authentication Page Add/Install a CA Certificate Edit CA Certificate Configuration Show CA Certificate Details Request CRL Delete a CA Certificate Configuration Options for CA Certificates Page Page Page Advanced Configuration Options Page Identity Certificates Authentication Page Page Page Show Identity Certificate Details Delete an Identity Certificate Export an Identity Certificate Generate Certificate Signing Request Installing Identity Certificates Code-Signer Certificates Show Code-Signer Certificate Details Delete a Code-Signer Certificate Import or Export a Code-Signer Certificate Local Certificate Authority Default Local CA Server Configuring the Local CA Sever Page More Local CA Configuration Options Page Deleting the Local CA Server Manage User Certificates Revoking a Local CA Certificate Unrevoking a Local CA Certificate Manage User Database Add a Local CA User Edit a Local CA User Page IKE IKE Parameters Page Page IKE Policies Add/Edit IKE Policy Assignment Policy Address Pools Add/Edit IP Pool IPsec Crypto Maps Page Create IPsec Rule/Tunnel Policy (Crypto Map) - Basic Tab Page Create IPsec Rule/Tunnel Policy (Crypto Map) - Advanced Tab Create IPsec Rule/Traffic Selection Tab Page Page Pre-Fragmentation Edit IPsec Pre-Fragmentation Policy IPsec Transform Sets Add/Edit Transform Set Load Balancing Page Page Setting Global NAC Parameters Configuring Network Admission Control Policies About NAC Uses, Requirements, and Limitations What to Do Next Add/Edit Posture Validation Exception Page Page General Client Software Page Edit Client Update Entry Default Tunnel Gateway Group Policies Add/Edit External Group Policy Add AAA Server Group Adding or Editing a Remote Access Internal Group Policy, General Attributes Page Configuring the Portal for a Group Policy Page Configuring Customization for a Group Policy Adding or Editing a Site-to-Site Internal Group Policy Browse Time Range Add/Edit Time Range Add/Edit Recurring Time Range ACL Manager Standard ACL Extended ACL Add/Edit/Paste ACE Page Browse Source/Destination Address Browse Source/Destination Port Add TCP Service Group Browse ICMP Add ICMP Group Browse Other Add Protocol Group Add/Edit Internal Group Policy > Servers Add/Edit Internal Group Policy > IPSec Client Client Access Rules Add/Edit Client Access Rule Add/Edit Internal Group Policy > Client Configuration Tab Add/Edit Internal Group Policy > Client Configuration Tab > General Client Parameters Tab View/Config Banner Add/Edit Internal Group Policy > Client Configuration Tab > Cisco Client Parameters Tab Add or Edit Internal Group Policy > Advanced > IE Browser Proxy Add/Edit Standard Access List Rule Add/Edit Internal Group Policy > Client Firewall Tab Page Add/Edit Internal Group Policy > Hardware Client Tab Page Add/Edit Server and URL List Add/Edit Server or URL Configuring SSL VPN Connections Setting the Basic Attributes for an SSL VPN Connection Setting Advanced Attributes for an IPSec or SSL VPN Connection Setting General Attributes for an IPSec or SSL VPN Connection Page Configuring SSL VPN Client Connections Login Setting Key Regeneration Dead Peer Detection Customization ACLs Configuring Clientless SSL VPN Connections Add or Edit Clientless SSL VPN Connections Add or Edit Clientless SSL VPN Connections > Basic Add or Edit Clientless SSL VPN Connections > Advanced Add or Edit Clientless SSL VPN Connections > Advanced > General Page Assign Authentication Server Group to Interface Add or Edit SSL VPN Connections > Advanced > Authorization Assign Authorization Server Group to Interface Add or Edit SSL VPN Connections > Advanced > SSL VPN Add or Edit Clientless SSL VPN Connections > Advanced > SSL VPN Add or Edit Clientless SSL VPN Connections > Advanced > Name Servers Configure DNS Server Groups Add or Edit Clientless SSL VPN Connections > Advanced > Clientless SSL VPN IPSec Remote Access Connection Profiles Add or Edit an IPSec Remote Access Connection Profile Add or Edit IPSec Remote Access Connection Profile Basic Mapping Certificates to IPSec or SSL VPN Connection Profiles Add/Edit Certificate Matching Rule Add/Edit Certificate Matching Rule Criterion Configure Site-to-Site Tunnel Groups Add/Edit Site-to-Site Connection Adding or Editing a Site-to-Site Tunnel Group Crypto Map Entry Crypto Map Entry for Static Peer Address Managing CA Certificates Install Certificate Configure Options for CA Certificate Revocation Check Tab Add/Edit Remote Access Connections > Advanced > General Configuring Client Addressing Add IPSec Remote Access Connection and Add SSL VPN Access Connection Assign Address Pools to Interface Select Address Pools Add or Edit IP Pool Add/Edit Tunnel Group > General Tab > Authentication Add/Edit SSL VPN Connection > General > Authorization Page Add/Edit SSL VPN Connections > Advanced > Accounting Add/Edit Tunnel Group > General > Client Address Assignment Add/Edit Tunnel Group > General > Advanced Add/Edit Tunnel Group > IPSec for Remote Access > IPSec Page Add/Edit Tunnel Group for Site-to-Site VPN Add/Edit Tunnel Group > PPP Add/Edit Tunnel Group > IPSec for LAN to LAN Access > General > Basic Page Add/Edit Tunnel Group > IPSec for LAN to LAN Access > IPSec Page Add/Edit Tunnel Group > Clientless SSL VPN Access > General > Basic Add/Edit Tunnel Group > Clientless SSL VPN > Basic Configuring Internal Group Policy IPSec Client Attributes Configuring Client Addressing for SSL VPN Connections Assign Address Pools to Interface Select Address Pools Add or Edit an IP Address Pool Authenticating SSL VPN Connections System Options Configuring SSL VPN Connections, Advanced Configuring Split Tunneling Zone Labs Integrity Server Page Easy VPN Remote Page Advanced Easy VPN Properties Page Page Configuring Dynamic Access Policies Understanding VPN Access Policies Configuring Dynamic Access Policies DAP Support for Remote Access Connection Types DAP and AAA AAA Attribute Definitions DAP and Endpoint Security Endpoint Attribute Definitions Page DAP and Anti-Virus, Anti-Spyware, and Personal Firewall Programs DAP Connection Sequence Test Dynamic Access Policies Add/Edit Dynamic Access Policies Page Page Page Page Add/Edit AAA Attributes Page Retrieve AD Groups from selected AD Server Group Add/Edit Endpoint Attributes Page Guide Syntax for Creating Lua EVAL Expressions Constructing DAP Logical Expressions The DAP CheckAndMsg Function Checking for a Single Antivirus Program Checking for Antivirus Definitions Within the Last 10 Days Checking for a Hotfix on the User PC Checking for Antivirus Programs Checking for Antivirus Programs and Definitions Older than 1 1/2 Days Advanced Lua Functions OU-Based Match Group Membership Example Further Information on Lua Operator for Endpoint Category DAP Examples Using DAP to Define Network Resources Using DAP to Apply a WebVPN ACL Enforcing CSD Checks and Applying Policies via DAP Page Page Clientless SSL VPN End User Set-up Requiring Usernames and Passwords Communicating Security Tips Configuring Remote Systems to Use Clientless SSL VPN Features Page Page Page Page Capturing Clientless SSL VPN Data Creating a Capture File Using a Browser to Display Capture Data Page Page Clientless SSL VPN Security Precautions ACLs Add ACL Add/Edit ACE Configuring the Setup for Cisco Secure Desktop Upload Image Page Configuring Application Helper Add/Edit APCF Profile Upload APCF package Auto Signon Add/Edit Auto Signon Entry Configuring Session Settings Java Code Signer Content Cache Content Rewrite Java Code Signer Encoding Add\Edit Encoding Web ACLs Page Port Forwarding Why Port Forwarding? Requirements and Restrictions Add/Edit Port Forwarding List Add/Edit Port Forwarding Entry Configuring the Use of External Proxy Servers Configuring Proxy Bypass Add/Edit Proxy Bypass Rule DTLS Settings SSL VPN Client Settings Page Add/Replace SSL VPN Client Image Upload Image Add/Edit SSL VPN Client Profiles Upload Package Bypass Interface Access List SSO Servers Configuring SiteMinder and SAML Browser Post Profile SAML POST SSO Server Configuration Adding the Cisco Authentication Scheme to SiteMinder Add/Edit SSO Servers Clientless SSL VPN Access Page Configuring Smart Tunnel Access About Smart Tunnels Why Smart Tunnels? Smart Tunnel Requirements and Limitations General Requirements and Limitations Windows Requirements and Limitations Mac OS Requirements and Limitations Configuring a Smart Tunnel (Lotus example) Add or Edit Smart Tunnel List Add or Edit Smart Tunnel Entry Page Add or Edit Smart Tunnel Auto Sign-on Server List Add or Edit Smart Tunnel Auto Sign-on Server Entry Configuring Customization Objects Add Customization Object Import/Export Customization Object Creating XML-Based Portal Customization Objects and URL Lists Understanding the XML Customization File Structure Page Page Page 38-48 Table 38-3 XML-Based Customization File Structure Customization Example The following example illustrates the following customization options: text string Text for TEXT type panes column number 38-49 Using the Customization Template The Customization Template 38-51 38-52 38-53 38-54 38-55 38-56 38-57 38-58 38-59 38-60 38-61 38-62 Help Customization Customizing a Help File Provided by Cisco Creating Help Files for Languages Not Provided by Cisco Import/Export Application Help Content Configuring Browser Access to Client-Server Plug-ins About Installing Browser Plug-ins Plug-in Requirements and Restrictions Preparing the Security Appliance for a Plug-in Installing Plug-ins Redistributed by Cisco Page Assembling and Installing Third-Party Plug-insExample: Citrix Java Presentation Server Client Language Localization Understanding Language Translation Page Creating a Translation Table Add/Edit Localization Entry AnyConnect Customization Resources Binary Installs Import/Export Language Localization Page Configure GUI Customization Objects (Bookmark Lists) Add/Edit Bookmark List Add Bookmark Entry Import/Export Bookmark List Configure GUI Customization Objects (Web Contents) Import/Export Web Content Add/Edit Post Parameter Clientless SSL VPN Macro Substitutions Using Macros 1 - 4 Using Macros 5 and 6 Example 1: Setting a Homepage Example 2: Setting a Bookmark or URL Entry Page Page E-Mail Proxy Configuring E-Mail Proxy AAA POP3S Tab Page IMAP4S Tab Page SMTPS Tab Access Page Edit E-Mail Proxy Access Authentication Page Default Servers Page Delimiters Page Configuring SSL Settings SSL Edit SSL Certificate SSL Certificates Page Page Page Monitoring Interfaces ARP Table DHCP DHCP Server Table DHCP Client Lease Information DHCP Statistics MAC Address Table Dynamic ACLs Interface Graphs Page Page Graph/Table PPPoE Client interface connection Track Status for Monitoring Statistics for Page Monitoring VPN VPN Connection Graphs IPSec Tunnels Sessions VPN Statistics Sessions Page Page Sessions Details Page Sub-session Details NAC Details Encryption Statistics NAC Session Summary Protocol Statistics VLAN Mapping Sessions Global IKE/IPSec Statistics Crypto Statistics Compression Statistics Cluster Loads SSO Statistics for Clientless SSL VPN Session Page Page Monitoring Routing Monitoring OSPF LSAs Type 1 Type 2 Type 3 Type 4 Type 5 Type 7 Monitoring OSPF Neighbors Page Monitoring EIGRP Neighbors Displaying Routes Monitoring Properties Monitoring AAA Servers Viewing AAA Server Statistics Updating the Operational State of an AAA Server Fields Used to Monitor AAA Servers Monitoring Device Access Monitoring User Lockouts Viewing Lockouts Removing All User Lockouts Removing One User Lockout Monitoring Authenticated Users Monitoring Active Sessions Viewing Active Sessions Page Disconnecting an Active Session Fields Used to Monitor Device Access Fields for Monitoring User Lockouts Fields for Monitoring Users Who Have Authenticated with a Server Connection Graphs Perfmon Xlates CRL DNS Cache IP Audit Page System Resources Graphs Blocks CPU Memory WCCP Service Groups Redirection Page Page Page Monitoring Logging About Log Viewing Log Buffer Log Buffer Viewer Real-Time Log Viewer Real-Time Log Viewer Page Monitoring Failover Monitoring Failover in Single Context Mode or in a Security Context Status Page Page Graphs Page Monitoring Failover in the System Execution Space System Page Page Failover Group 1 and Failover Group 2 Page Page Page Monitoring Trend Micro Content Security Threats Live Security Events Live Security Events Log Software Updates Resource Graphs CSC CPU CSC Memory Page Page Page A Feature Licenses ASA 5505 Feature Licenses ASA 5510 Feature Licenses ASA 5520 Feature Licenses ASA 5540 Feature Licenses ASA 5550 Feature Licenses ASA 5580 Feature Licenses PIX 515/515E Feature Licenses PIX 525 Feature Licenses PIX 535 Feature Licenses Page Page Page B Troubleshooting Testing Your Configuration Enabling ICMP Debug Messages and System Log Messages Pinging Security Appliance Interfaces B-3 Pinging Through the Security Appliance ? Disabling the Test Configuration Traceroute Packet Tracer Reloading the Security Appliance Recovering from a Lockout Performing Password Recovery Recovering Passwords for the ASA 5500 Series Adaptive Security Appliance Recovering Passwords for the PIX 500 Series Security Appliance Disabling Password Recovery Using the ROM Monitor to Load a Software Image Erasing the Flash File System Other Troubleshooting Tools Viewing Debug Messages Capturing Packets Viewing the Crash Dump TACACS+ Server Lockout Common Problems Page C Configuring an External Server for Authorization and Authentication Understanding Policy Enforcement of Permissions and Attributes Configuring an External LDAP Server Organizing the Security Appliance for LDAP Operations Searching the Hierarchy Binding the Security Appliance to the LDAP Server Login DN Example for Active Directory Defining the Security Appliance LDAP Configuration Supported Cisco Attributes for LDAP Authorization Page Page Page Page Page Cisco-AV-Pair Attribute Syntax Page Additional Information for using ASDM to Configure LDAP Configuring an External RADIUS Server Reviewing the RADIUS Configuration Procedure Security Appliance RADIUS Authorization Attributes Page Page Page Page Page Page Page Configuring an External TACACS+ Server Page INDEX Numerics A Page Page B C Page D E F G H I signature matches J K L M N O P Q R S Page T Page U V W X Z