Cisco Systems ASA 5500 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Cisco Systems ASA 5500, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Cisco Systems ASA 5500 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Cisco Systems ASA 5500. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Cisco Systems ASA 5500 should contain:
- informations concerning technical data of Cisco Systems ASA 5500
- name of the manufacturer and a year of construction of the Cisco Systems ASA 5500 item
- rules of operation, control and maintenance of the Cisco Systems ASA 5500 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Cisco Systems ASA 5500 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Cisco Systems ASA 5500, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Cisco Systems service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Cisco Systems ASA 5500.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Cisco Systems ASA 5500 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    CH A P T E R 19-1 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 19 Managing the AIP SSM and CSC SSM The Cisco ASA 5500 series adapti ve security appliance supports a v ariety of SSMs. This chapter describes how to configure the ad aptiv e security applia nce to support an AIP SSM or a CSC SSM, including h ow to send traff ic[...]

  • Page 2

    19-2 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the AIP SSM The AIP SSM can operate in one of tw o modes, as follo ws: • Inline mode —Places the AIP SSM directly in the traff ic flow . No traf fic can contin ue through the adaptiv e security appliance w ithout first[...]

  • Page 3

    19-3 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the AIP SSM Step 2 Create a class map to identify the traffi c th at should be di verted to the AIP SSM. Use the class-map command to do so, as follo ws: hostname(config)# class-map class_map_name hostname(config-cmap)# wh[...]

  • Page 4

    19-4 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the AIP SSM hostname(config-cmap)# match access-list IPS hostname(config-cmap)# policy-map my-ids-policy hostname(config-pmap)# class my-ips-class hostname(config-pmap-c)# ips promiscuous fail-close hostname(config-pmap-c)[...]

  • Page 5

    19-5 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM Note If you see the preceding li cense notice (w hich displays only in som e versions of software), y ou can ignore the message until you n eed to upgrade the signature f iles on the AIP SSM. The AIP SSM contin[...]

  • Page 6

    19-6 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM Figur e 19-1 Flow of Scanned T r affic with CSC SSM Y ou use ASDM for system setup and monit oring of th e CSC SSM. For advanced co nfiguration of conten t security policies in the CSC SSM software, you acces s[...]

  • Page 7

    19-7 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM Figur e 1 9-2 CSC SSM Deployment with a Management Networ k CSC SSM cannot suport stat eful failov er , because the CSC SSM does not maintain conn ection information and t herefore cannot provide the f ailov er[...]

  • Page 8

    19-8 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM Note The SSM management port IP address must be accessible by the hosts used to run ASDM. The IP addresses for the SSM management port and the adaptiv e security appliance management interface can be in differe[...]

  • Page 9

    19-9 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM W ith a Plus License, the additional features enab led by default are SMTP ant i-spam, SMTP content filt ering, POP3 anti-spam, URL blockin g, and URL filtering. T o access the CSC SSM G UI, in ASD M choose Con[...]

  • Page 10

    19-10 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM • Incoming SMTP connections d estined to inside mail servers. In Figure 19-3 , the adapti ve security applian ce should be configured to di v ert traf fic to CSC SSM requests from clients on the inside netw [...]

  • Page 11

    19-11 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM This access list matches inbound SMTP connections from any e xternal host to any host on the DMZ network. The po licy applied to the outside int erface would therefo re ensure that incoming SMTP email would be[...]

  • Page 12

    19-12 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Managing the CSC SSM hostname(config)# class-map class_map_name hostname(config-cmap)# where class_map_name is th e name of the traf fi c class. When you e nter the class-map command, the CLI enters class map conf iguration mode. [...]

  • Page 13

    19-13 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Checking SSM Status Example 19-1 is based on the netw ork shown in Fi gure 19-3 . It creates two service policies. The first policy , csc_out_polic y , is appli ed to the inside interf ace and uses the csc_out a ccess list to ensu[...]

  • Page 14

    19-14 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Transferring an Image onto an SSM hostname# show module 1 Mod Card Type Model Serial No. --- -------------------------------------------- ------------------ ----------- 1 ASA 5500 Series Security Services Module-20 ASA-SSM-20 JAB1[...]

  • Page 15

    19-15 Cisco Security Appliance Command Line Configuration Guid e OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Transferring an Image onto a n SSM T o transfer an image onto an intelligen t SSM, perform the follo wing steps: Step 1 Create or modify a recovery conf igurati on for the SSM. T o do so, perform the following steps: a. Determine [...]

  • Page 16

    19-16 Cisco Security Appliance Command Line Co nfiguration Guide OL-8629-01 Chapter 19 Managing the AIP SSM and CSC SSM Transferring an Image onto an SSM Step 3 Check the progress of t he im age transfer and SSM resta rt process. T o do so, use the show module command. For details, see th e “Checking SSM Status” section on page 19-13 . When the[...]