Security Guide vA4(1.0) and A4(2.0), Cisco ACE Application Control Engine Module
Preface
Downloads: This chapterpdf (PDF - 136.0KB) The complete bookPDF (PDF - 6.31MB) | Feedback

Preface

Table Of Contents

Preface

Audience

How to Use This Guide

Related Documentation

Symbols and Conventions

Obtaining Documentation, Obtaining Support, and Security Guidelines


Preface


This guide describes how to configure the security features of the Cisco Application Control Engine (ACE) module in a Catalyst 6500 series switch or a Cisco 7600 series router, hereinafter referred to as the switch or router, respectively.

This guide describes how to perform the following ACE security configuration tasks:

Security access control lists (ACLs)

User authentication and accounting using a Terminal Access Controller Access Control System Plus (TACACS+), Remote Authentication Dial-In User Service (RADIUS), or Lightweight Directory Access Protocol (LDAP) server

Application protocol and HTTP deep packet inspection

TCP/IP normalization and IP fragmentation

Network Address Translation (NAT)

You can configure the ACE by using the following interfaces:

The command-line interface (CLI), a line-oriented user interface that provides commands for configuring, managing, and monitoring the ACE.

Device Manager graphic user interface (GUI), a Web browser-based GUI interface that provides a graphical user interface for configuring, managing, and monitoring the ACE.

This preface contains the following major sections:

Audience

How to Use This Guide

Related Documentation

Symbols and Conventions

Obtaining Documentation, Obtaining Support, and Security Guidelines

Audience

This guide is intended for the following trained and qualified service personnel who are responsible for configuring the ACE:

Web master

System administrator

System operator

How to Use This Guide

This guide is organized as follows:

Chapter
Description

Chapter 1, Configuring Security Access Control Lists

Describes how to configure security access control lists (ACLs) on your ACE. ACLs provide basic security for your network by filtering traffic and controlling network connections.

Chapter 2, Configuring Authentication and Accounting Services

Describes how to configure the ACE to perform user authentication and accounting (AAA) services to provide a higher level of security for users accessing the ACE.

Chapter 3, Configuring Application Protocol Inspection

Describes how to configure application protocol inspection for the ACE.

Chapter 4, Configuring TCP/IP Normalization and IP Reassembly Parameters

Describes how to configure TCP/IP normalization to protect your ACE and the data center from attacks. It also describes IP reassembly and UDP parameters.

Chapter 5, Configuring Network Address Translation

Describes NAT and how to configure it on the ACE. NAT protects your data center by hiding private addresses from public networks.


Related Documentation

In addition to this document, the ACE documentation set includes the following:

Document Title
Description

Release Note for the Cisco Application Control Engine Module

Provides information about operating considerations, caveats, and command-line interface (CLI) commands for the ACE.

Cisco Application Control Engine Module Hardware Installation Note

Provides information for installing the ACE into the Catalyst 6500 series switch or a Cisco 7600 series router.

Cisco Application Control Engine Module Getting Started Guide

Describes how to perform the initial setup and configuration tasks for the ACE.

Cisco Application Control Engine Module Administration Guide

Describes how to perform the following administration tasks on the ACE:

Setting up the ACE

Establishing remote access

Managing software licenses

Configuring class maps and policy maps

Managing the ACE software

Configuring SNMP

Configuring redundancy

Configuring the XML interface

Upgrading the ACE software

Cisco Application Control Engine Module Virtualization Configuration Guide

Describes how to operate your ACE in a single context or in multiple contexts.

Cisco Application Control Engine Module Routing and Bridging Configuration Guide

Describes how to perform the following routing and bridging tasks on the ACE:

Configuring VLAN interfaces

Configuring routing

Configuring bridging

Configuring Dynamic Host Configuration Protocol (DHCP)

Cisco Application Control Engine Module Server Load-Balancing Configuration Guide

Describes how to configure the following server load-balancing features on the ACE:

Real servers and server farms

Class maps and policy maps to load balance traffic to real servers in server farms

Server health monitoring (probes)

Stickiness

Firewall load balancing

TCL scripts

Cisco Application Control Engine Module SSL Configuration Guide

Describes how to configure the following Secure Sockets Layer (SSL) features on the ACE:

SSL certificates and keys

SSL initiation

SSL termination

End-to-end SSL

Cisco Application Control Engine Module System Message Guide

Describes how to configure system message logging on the ACE. This guide also lists and describes the system log (syslog) messages generated by the ACE.

Cisco Application Control Engine Module Command Reference

Provides an alphabetical list and descriptions of all CLI commands by mode, including syntax, options, and related commands.

Cisco CSM-to-ACE Conversion Tool User Guide

Describes how to use the CSM-to-ACE conversion tool to migrate Cisco Content Switching Module (CSM) running- or startup-configuration files to the ACE.

Cisco CSS-to-ACE Conversion Tool User Guide

Describes how to use the CSS-to-ACE conversion tool to migrate Cisco Content Services Switches (CSS) running-configuration or startup-configuration files to the ACE.

Cisco Application Control Engine (ACE) Troubleshooting Wiki

Describes the procedures and methodology in wiki format to troubleshoot the most common problems that you may encounter during the operation of your ACE.

Cisco Application Control Engine (ACE) Configuration Examples Wiki

Provides examples of common configurations for load balancing, security, SSL, routing and bridging, virtualization, and so on.


Symbols and Conventions

This publication uses the following conventions:

Convention
Description

boldface font

Commands, command options, and keywords are in boldface. Bold text also indicates a command in a paragraph.

italic font

Arguments for which you supply values are in italics. Italic text also indicates the first occurrence of a new term, book title, emphasized text.

{   }

Encloses required arguments and keywords.

[   ]

Encloses optional arguments and keywords.

{x | y | z}

Required alternative keywords are grouped in braces and separated by vertical bars.

[x | y | z]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.

screen font

Terminal sessions and information the system displays are in screen font.

boldface screen font

Information you must enter in a command line is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.

^

The symbol ^ represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

<   >

Nonprinting characters, such as passwords are in angle brackets.


Notes use the following conventions:


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.


Cautions use the following conventions:


Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

For additional information about CLI syntax formatting, see the Cisco Application Control Engine Module Command Reference.

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html