What to Do Next
What to Do Next
Cisco ASA 5505 Getting Started Guide
8-14
debug crypto isakmp sa
•
See also the Cisco Security Appliance Command Reference for detailed
information about each of these commands.
If you are deploying the adaptive security appliance only in a site-to-site VPN
environment, then you have completed the initial configuration. In addition, you
may want to consider performing some of the following steps:
To Do This...
Refine configuration and configure
optional and advanced features
Learn about daily operations
You can configure the adaptive security appliance for more than one application.
The following sections provide configuration procedures for other common
applications of the adaptive security appliance.
To Do This...
Configure the adaptive security
appliance to protect a web server in a
DMZ
Configure a remote-access VPN
Chapter 8
Scenario: Site-to-Site VPN Configuration
See...
Cisco Security Appliance Command
Line Configuration Guide
Cisco Security Appliance Command
Reference
Cisco Security Appliance Logging
Configuration and System Log
Messages
See...
Chapter 6, "Scenario: DMZ
Configuration"
Chapter 7, "Scenario: IPSec
Remote-Access VPN Configuration"
78-17612-02