Cisco Security Appliance Command Reference, Version 7.0
About
Downloads: This chapterpdf (PDF - 177.0KB) The complete bookPDF (PDF - 18.73MB) | Feedback

About This Guide

Table Of Contents

About This Guide

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request


About This Guide


This preface introduces the Cisco Security Appliance Command Reference.

This preface includes the following sections:

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request

Document Objectives

This guide contains the commands available for use with the security appliance to protect your network from unauthorized use and to establish Virtual Private Networks to connect remote sites and users to your network.

You can also configure and monitor the security appliance by using ASDM, a web-based GUI application. ASDM includes configuration wizards to guide you through some common configuration scenarios, and online Help for less common scenarios. For more information, see: http://www.cisco.com/univercd/cc/td/doc/product/netsec/secmgmt/asdm/index.htm.

This guide applies to the Cisco PIX 500 series security appliances (PIX 515/515E, PIX 525, and PIX 535) and the Cisco ASA 5500 series security appliances (ASA 5510, ASA 5520, and ASA 5540). Throughout this guide, the term "security appliance" applies generically to all supported models, unless specified otherwise. The PIX 501, PIX 506E, and PIX 520 security appliances are not supported in software Version 7.0.

Audience

This guide is for network managers who perform any of the following tasks:

Manage network security

Install and configure firewall/security appliances

Configure VPNs

Configure intrusion detection software

Use this guide with the Cisco Security Appliance Command Line Configuration Guide.

Document Organization

This guide includes the following chapters:

Chapter 1, "Using the Command-Line Interface," introduces you to the security appliance commands and access modes

Chapter 2, "A through B Commands," provides detailed descriptions of all commands that begin with the letters A through B.

Chapter 3, "C Commands," provides detailed descriptions of all commands that begin with the letter C.

Chapter 4, "D through F Commands," provides detailed descriptions of all commands that begin with the letters D through F.

Chapter 5, "G through L Commands," provides detailed descriptions of all commands that begin with the letters G through L.

Chapter 6, "M through R Commands," provides detailed descriptions of all commands that begin with the letters M through R.

Chapter 7, "S Commands," provides detailed descriptions of all commands that begin with the letter S.

Chapter 8, "T through Z Commands," provides detailed descriptions of all commands that begin with the letters T through Z.

Document Conventions

The security appliance command syntax descriptions use the following conventions:

Command descriptions use these conventions:

Braces ({ }) indicate a required choice.

Square brackets ([ ]) indicate optional elements.

Vertical bars ( | ) separate alternative, mutually exclusive elements.

Boldface indicates commands and keywords that are entered literally as shown.

Italics indicate arguments for which you supply values.

Examples use these conventions:

Examples depict screen displays and the command line in screen font.

Information you need to enter in examples is shown in boldface screen font.

Variables for which you must supply a value are shown in italic screen font.

Examples might include output from different platforms; for example, you might not recognize an interface type in an example because it is not available on your platform. Differences should be minor.


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.


For information on modes, prompts, and syntax, see Chapter 1, "Using the Command-Line Interface."

Related Documentation

For more information, refer to the following documentation:

Cisco Security Appliance Command Line Configuration Guide

Cisco Security Appliance System Log Messages

Guide for Cisco PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0

Cisco PIX Security Appliance Release Notes

Cisco PIX 515E Quick Start Guide

Cisco ASA 5500 Series Quick Start Guide

Cisco ASA 5500 Series Release Notes

Cisco ASDM Release Notes

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.