Cisco GSS Administration Guide (Software Version 4.1(0))
Index
Downloads: This chapterpdf (PDF - 360.0KB) The complete bookPDF (PDF - 4.5MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

access lists

access-group command 5-5, 5-6

access-list command 5-3

adding rules to 5-6

associating with an interface 5-5

creating 5-3

destination port 5-4

disassociating from an interface 5-6

displaying 5-8

filtering traffic 5-1

ICMP traffic filtering 5-3

operator 5-4

overview 5-2

removing rules 5-7

source address 5-3

TCP traffic filtering 5-3

UDP traffic filtering 5-3

viewing 5-7

activating GSS devices 1-4

adding rules to access lists 5-6

administration password

changing 3-12, 3-13

restoring 3-13

administrator account, resetting 3-12

anycast

configuring 10-2

overview 10-1

associating access list with interface 5-5

B

backup of GSSM

full backup procedure 7-2

overview 7-2

boot information, displaying 2-30

C

certificate

accepting 1-2

attributes, modifying 2-14

certificate set-attributes command 2-14

installing 1-2

keys, deleting 2-14

modifying 2-14

trusting 1-2

changing GSSM roles in GSS network 2-25

CLI

GSS device monitoring 9-2, 9-3

logging in 2-2

monitoring GSS network statistics 9-1

privileged EXEC mode, enabling 2-2

privilege level, specifying 3-2

resetting CLI administrator account 3-12

resetting password 3-9

TACACS+ server, authorization settings 4-7

user account, creating 3-1

cold restart, performing 2-16

copying

files 2-12

startup configuration to or from disk 2-4, 2-5

CPU or memory processes 2-31

D

database

monitoring status of 9-4

purging 8-10

records, purging 8-11

restoring GSSM from full backup 7-4

validating records 9-5

validation report 9-5

DDoS

license file, acquiring 11-2, 11-3

license file, installing 11-2, 11-3

debug log message 8-10

default

password 1-2

username 1-2

deleting files 2-12

deployment, GSS devices behind firewall 5-9

directory

current working directory, displaying 2-10

displaying files 2-10

disabling GSS software 2-17

disassociating access list from interface 5-6

disk

displaying information 2-32

specifying for log file destination 8-3

downgrading

installing a lower software image A-9

E

enable command password 1-6

enabling GSS software 2-17

Ethernet interface, segmenting traffic 5-7

exporting primary GSSM data 1-7

F

factory defaults, restoring 2-17

fatal error log message 8-10

files

deleting 2-12

displaying entire contents 2-10

displaying in directory 2-10

displaying last 10 lines 2-9

listing within directory 2-33

renaming 2-11

securely copying 2-12

filtering

GSS traffic 5-1

ICMP traffic 5-3

TCP traffic 5-3

traffic type 5-3

UDP traffic 5-3

firewall

configuring for GSS 5-12

deploying GSS devices 5-9

inbound traffic to GSS 5-10

inbound traffic to the GSS 5-10

outbound traffic from the GSS 5-11

full GSSM backup 7-2

G

GeoDB License File 11-3

Global Site Selector

activating from primary GSSM 1-4

cold restart, performing 2-16

CPU or memory processes, displaying 2-31

deleting devices from primary GSSM 1-5

disabling GSS device 2-17

enabling GSS device 2-17

firewalls 5-9, 5-12

GSS-related port and protocols 5-2

hard disk information, displaying 2-32

inactivity timeout 2-13

inter-GSS communications 5-7

license data, displaying 2-29

license file, obtaining 11-2, 11-3

logging levels 8-1, 8-4, 8-5

logically removing or replacing 1-5

login accounts 3-1

memory blocks and statistics, displaying 2-30

MIB files 6-11

modifying device configuration from primary GSSM 1-4

monitoring through CLI 9-2, 9-3

monitoring through GUI 9-4

online status and resource usage 9-2, 9-3

operating configuration, displaying for TAC 9-6

ports and protocols 5-2, 5-10

purging system log messages 8-10

registering 1-4

renaming a file 2-11

replacing 2-24

reporting interval 1-7

restarting GSS software 2-16

running configuration 2-3, 2-4

services information, displaying 2-33

shutting down GSS software 2-16

software licenses 11-1

startup configuration 2-3, 2-4

status 2-33, 9-3

stopping GSS software 2-15

subsystem levels 8-1

subsystems 8-4, 8-5

system status, displaying 2-33, 9-3

UDI, displaying 2-32

user account, creating 3-1

user account, deleting 3-3

user account, modifying 3-2

version information 2-28

Global Site Selector Manager

activating 1-4

activating devices 1-4

backing up 7-2

changing role in GSS network 2-25

changing the GUI password 3-7

changing to standby 2-25

cold restart, performing 2-16

configuring, primary 4-22

configuring, standby 4-22

creating user account (GUI) 3-6

database, monitoring 9-4

default username and password 1-2

deleting GSS devices 1-5

disabling GSSM device 2-17

enabling GSSM device 2-17

exporting data 1-7

GUI, configuring 1-7

inactivity timeout 2-13

logging on 1-2

logically removing GSS or standby GSSM 1-5

login accounts 3-3

modifying devices 1-4

modifying user account (GUI) 3-7

monitoring device status from GUI 9-4

password 3-7

platform information 7-5

printing data 1-7

registering GSS devices 1-4

removing user account (GUI) 3-7

replacing 2-21, 2-23

restarting GSS software 2-16

restoring factory defaults 2-17

restoring full backup 7-4

reversing role in GSS network 2-26

role change 2-25

shutting down GSS software 2-16

stopping GSS software 2-15

TACACS+ server authorization 4-9

URL, secure HTTP 1-2

verifying role prior to upgrading A-4

viewing system logs 8-9

gss.log file 8-7

gssm standby-to-primary command 2-19, 2-26

GSS network

changing GSSM role 2-25

GSS, logically removing 1-5

limiting network traffic 5-7

logically removing a GSS 1-5

monitoring through CLI 9-1

monitoring through GUI 9-4

primary GSSM, logically removing 1-5

reversing GSSM role 2-26

segmenting network traffic 5-7

standby GSSM, logically removing 1-5

URL 1-2

GSS-related ports and protocols 5-2

GUI

configuration 1-7

default username and password 1-2

logging on 1-2

logging out 1-3

monitoring GSS device status 9-4

password 3-7

refreshing 1-7

session inactivity timeout 1-7

timeout 1-7

user account, creating 3-6

user account, modifying 3-7

user account, removing 3-7

user view, creating 3-10

GUI privilege level

administrator 3-3, 3-4

observer 3-3, 3-5

operator 3-3, 3-4

specifying 3-6

TACACS+ server authorization 4-9

H

hardware and software compatibility A-1

host, specifying as log file destination 8-5

I

Info log message 8-10

inter-GSS communications 5-7

K

keepalives with TACACS+ server 4-16

L

licenses

installing 11-3, 11-4

obtaining 11-2, 11-4

overview 11-1

Product Access Key 11-1

SWIFT application 11-2, 11-3

uninstalling 11-3, 11-4

loading startup configuration from external file 2-4

log files

destination, specifying disk 8-3

host destination, specifying 8-5

logging levels 8-1

rotating 8-9

subsystem 8-8

viewing from CiscoWorks RME Syslog Analyzer 8-13

logging

facility 8-6

follow command option 8-7, 8-8

host destination, specifying 8-5

levels 8-1, 8-3

log activity, displaying 8-8

logging disk command 8-3, 8-5

logs, displaying 8-8

purging log records 8-10

subsystems 8-4, 8-5

syslog facility 8-6

system logging 8-3

system message log, displaying 8-8

tail command option 8-7, 8-8

to a specific file on disk 8-3

to sys.log file, disabling 8-6

to sys.log file, enabling 8-4

turning off from disk 8-4, 8-6

logging levels 8-1, 8-4, 8-5

logically removing

GSS from a network 1-5

GSS or standby GSSM from the network 1-5

standby GSSM from a network 1-5

log in

CLI 2-2

default GUI username and password 1-2

inactivity timeout, specifying 2-13

logging out 1-3

primary GSSM GUI 1-2

SSH 2-2

Telnet 2-2

login accounts

creating on GSS 3-1

creating on GSSM 3-6

deleting 3-3

GSSM 3-3

managing 3-1

modifying 3-2, 3-7

removing 3-7

log out 1-3

M

memory blocks and statistics 2-30

messages

purging 8-10

system log 8-11

viewing 8-9

MIBs 6-1, 6-11

monitoring

database status 9-4

GSS network status 9-1

online status 9-2, 9-3

resource usage 9-2, 9-3

status of GSS devices by CLI 9-2

status of GSS devices from the GUI 9-4

N

network

See GSS network

O

operator range 5-4

P

packets

denying 5-3

permitting 5-3

Partner Initiated Customer Access

See PICA

password

changing default administration password 3-12, 3-13

CLI, resetting 3-9

CLI user account, creating 3-2

default (GUI) 1-2

GSSM GUI, changing 3-7

GUI, entering 1-2

GUI user account, changing password 3-7

GUI user account, creating 3-6

resetting CLI administrator account 3-12

restoring default administration password 3-13

PICA A-5

platform information

restoring 7-5

summary 7-5

ports and protocols 5-2, 5-10

printing primary GSSM data 1-7

privileged EXEC mode, enabling 2-2

protocols and ports for GSS devices 5-2

purging system log messages 8-10

R

record

database records, validating 9-5

purging 8-10

recovery CD A-11

recovery image A-11

refreshing the GUI 1-7

registering GSS devices 1-4

renaming a GSS file 2-11

replacing

flowchart 2-18

GSS 2-24

primary GSSM 2-21

standby GSSM 2-23

report, database validation creating 9-5

reset-gui-admin-password command 3-13

resetting

CLI administrator account 3-12

CLI password 3-9

password 3-12

restarting GSS software 2-16

restoring

default administration password 3-13

GSSM from full backup 7-4

GSSM platform information 7-5

overview 7-3

rotating log files 8-9

running configuration file

changing 2-4

copying 2-4

copying as startup-config file 2-4

displaying 2-5

overview 2-3

saving to startup configuration 2-3

summary 2-3, 2-4

S

segmenting GSS traffic by interface 5-7

session inactivity timeout 1-7

severity log message 8-10

show commands

show access-group command 5-9

show access-list command 5-7, 5-8

show boot-config command 2-30

show disk command 2-32

show inventory command 2-32

show license command 2-29

show logging command 8-8

show logs command 8-7

show memory command 2-30

show processes command 2-31

show services command 2-33

show system-status command 2-33, 9-3

show tacacs command 4-20

show tech-support command 9-6

show uptime command 2-31

show user command 2-13

show users command 2-13

show version command 2-28

shutting down GSS software 2-16

SNMP

configuring 6-5

disabling 6-5

enabling 6-5

MIB files, viewing 6-11

overview 6-1

port, changing 6-11

server notifications 6-6, 6-7, 6-8

setup 6-5

snmp command 6-5

specifying notification operation recipients 6-9

supported MIBs and notifications 6-2

viewing status 6-10

SNMP notification operations

snmp-server host command 6-9

specifying recipients 6-9

SNMP server notifications

enabling 6-6, 6-7, 6-8

snmp-server cpu-rising-threshold command 6-7

snmp-server enable traps command 6-6, 6-8

software

boot information, showing 2-30

disabling GSS device 2-17

enabling GSS device 2-17

restarting 2-16

shutting down 2-16

stopping 2-15

upgrade procedure A-1

version information, showing 2-28

software licenses

installing 11-3, 11-4

obtaining 11-2, 11-4

overview 11-1

Product Access Key 11-1

SWIFT application 11-2, 11-3

uninstalling 11-3, 11-4

software upgrade

obtaining A-1

standby GSSM 1-5

changing to primary 2-25

logically removing 1-5

registering with primary GSSM 1-4

replacing 2-23

startup configuration

changing 2-3, 2-4

loading from external file 2-4

saving running configuration as startup configuration 2-3

startup configuration file

changing 2-4

copying 2-4

copying device startup configuration settings 2-5

copying running configuration file as 2-4

displaying 2-7

loading from external file 2-5

overview 2-3

stopping GSS software 2-15

subsystem log files

rotating 8-9

viewing 8-8

subsystems 8-1, 8-4, 8-5

SWIFT application 11-2, 11-3

sys.log 8-4, 8-6

syslog, configuring 8-3

system

logging 8-3

message log 8-8

status, displaying 2-33, 9-3

system log

messages 8-11

purging 8-10

severity 8-10

typical messages 8-11

viewing 8-9

viewing from CiscoWorks RME Syslog Analyzer 8-13

viewing from GUI 8-10

system uptime, displaying 2-31

T

TAC

displaying GSS operating configuration 9-6

tech report 9-6

TACACS+

accounting overview 4-2

authentication overview 4-2

authorization overview 4-2

Cisco Secure Access Control Server (ACS) 4-4

disabling 4-21

GSS, disabling/enabling keepalives 4-16

GSS, inserting header information into a request 4-19

GSS, specifying accounting 4-19

GSS, specifying authentication 4-17

GSS, specifying authorization 4-18

GSS, specifying server hosts 4-14

GSS, specifying server timeout 4-17

overview 4-1

primary GSSM GUI privilege level authorization 4-9

primary GSSM user view authorization 4-13

quick start 4-3

server, accounting settings 4-13

server, authentication settings 4-4

server, authorization settings 4-5

server, configuring 4-4

shared secret with GSS 4-15

statistics, clearing 4-21

statistics, displaying 4-20

tail command option 8-8

terminal screen line length, configuring 2-14

third-party software, viewing information 1-8

traffic

filtering 5-3

limiting 5-7

segmenting by interface 5-7

U

UDI 2-32

upgrading

GSS software A-1

installing a new software image A-7

sequence A-1

verifying GSSM role prior to upgrading A-4

user

account, creating 3-6

account, modifying 3-7

account, removing 3-7

information, displaying 2-13

user account

CLI account, creating 3-1

CLI account, deleting 3-3

CLI account, modifying 3-2

CLI user, privilege levels 3-2

creating for GUI 3-6

creating with CLI 3-1

deleting 3-3

GUI user, privilege levels 3-3, 3-4, 3-5, 3-6

GUI user, views 3-6

GUI user account, changing password 3-7

GUI user account, creating 3-6

GUI user account, modifying 3-7

GUI user account, removing 3-7

modifying 3-2, 3-7

removing 3-7

view overview 3-9

username

default (GUI) 1-2

GUI, entering 1-2

GUI user account, creating 3-6

user roles 3-3, 3-6

user view

answers, adding 3-10

answers, removing 3-11

creating 3-10

deleting 3-11

general configuration 3-10

keepalives, adding 3-10

keepalives, removing 3-11

locations, adding 3-10

locations, removing 3-11

modifying 3-11

naming 3-10

overview 3-9

owners, adding 3-11

owners, removing 3-11

specifying 3-6

TACACS+ server authorization 4-13

V

validating database records 9-5

verifying GSSM role A-4

version information 2-28

viewing

access lists 5-7

gss.log file 8-7

MIB files 6-11

SNMP status 6-10

subsystem log files 8-8

system log 8-9

system logs from CiscoWorks RME Syslog Analyzer 8-13

system logs from GUI 8-10

third-party software information 1-8

W

warning log message 8-10