Cisco FirePOWER ASA 5500 series Configuration Manual page 35

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

About This Guide
Table 1
Document Organization (continued)
Chapter/Appendix
Chapter 7, "Configuring
Interface Parameters"
Chapter 8, "Configuring Basic
Settings"
Chapter 9, "Configuring IP
Routing"
Chapter 10, "Configuring
DHCP, DDNS, and WCCP
Services"
Chapter 11, "Configuring
Multicast Routing"
Chapter 12, "Configuring IPv6"
Chapter 13, "Configuring AAA
Servers and the Local Database"
Chapter 14, "Configuring
Failover"
Part 2: Configuring the Firewall
Chapter 15, "Firewall Mode
Overview"
Chapter 16, "Identifying Traffic
with Access Lists"
Chapter 17, "Applying NAT"
Chapter 18, "Permitting or
Denying Network Access"
Chapter 19, "Applying AAA for
Network Access"
Chapter 20, "Applying Filtering
Services"
Chapter 21, "Using Modular
Policy Framework"
Chapter 22, "Managing AIP
SSM and CSC SSM"
Chapter 23, "Preventing
Network Attacks"
Chapter 24, "Applying QoS
Policies"
Chapter 25, "Configuring
Application Layer Protocol
Inspection"
OL-10088-01
Definition
Describes how to configure each interface and subinterface for a name, security, level, and
IP address.
Describes how to configure basic settings that are typically required for a functioning
configuration.
Describes how to configure IP routing.
Describes how to configure the DHCP server and DHCP relay.
Describes how to configure multicast routing.
Describes how to enable and configure IPv6.
Describes how to configure AAA servers and the local database.
Describes the failover feature, which lets you configure two security appliances so that one
will take over operation if the other one fails.
Describes in detail the two operation modes of the security appliance, routed and
transparent mode, and how data is handled differently with each mode.
Describes how to identify traffic with access lists.
Describes how address translation is performed.
Describes how to control network access through the security appliance using access lists.
Describes how to enable AAA for network access.
Describes ways to filter web traffic to reduce security risks or prevent inappropriate use.
Describes how to use the Modular Policy Framework to create security policies for TCP,
general connection settings, inspection, and QoS.
Describes how to configure the security appliance to send traffic to an AIP SSM or a CSC
SSM, how to check the status of an SSM, and how to update the software image on an
intelligent SSM.
Describes how to configure protection features to intercept and respond to network attacks.
Describes how to configure the network to provide better service to selected network
traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode
(ATM), Ethernet and 802.1 networks, SONET, and IP routed networks.
Describes how to use and configure application inspection.
Cisco Security Appliance Command Line Configuration Guide
Document Organization
xxxv

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents