Cisco Security Appliance Command Reference, Version 7.2
About this Guide
Downloads: This chapterpdf (PDF - 198.0KB) The complete bookPDF (PDF - 20.65MB) | Feedback

About This Guide

Table Of Contents

About This Guide

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request


About This Guide


This preface introduces the Cisco Security Appliance Command Reference.

This preface includes the following sections:

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request

Document Objectives

This guide contains the commands available for use with the security appliance to protect your network from unauthorized use and to establish Virtual Private Networks to connect remote sites and users to your network.

You can also configure and monitor the security appliance by using ASDM, a web-based GUI application. ASDM includes configuration wizards to guide you through some common configuration scenarios and online Help for less common scenarios. For more information, see the following URL: http://www.cisco.com/en/US/docs/security/asa/asa80/asdm60/user/guide/usrguide.html.

This guide applies to the Cisco PIX 500 series security appliances (PIX 515/515E, PIX 525, and PIX 535) and the Cisco ASA 5500 series security appliances (ASA 5510, ASA 5520, and ASA 5540). Throughout this guide, the term "security appliance" applies generically to all supported models, unless specified otherwise. The PIX 501, PIX 506E, and PIX 520 security appliances are not supported in software Version 7.0(1).

Audience

This guide is for network managers who perform any of the following tasks:

Manage network security

Install and configure firewall/security appliances

Configure VPNs

Configure intrusion detection software

Use this guide with the Cisco Security Appliance Command Line Configuration Guide.

Document Organization

This guide includes the following chapters:

Chapter 1, "Using the Command-Line Interface," introduces you to the security appliance commands and access modes.

Chapter 2, "aaa accounting command through accounting-server-group Commands," provides detailed descriptions of the aaa accounting through accounting-server-group commands.

Chapter 3, "acl-netmask-convert through auto-update timeout Commands," provides detailed descriptions of the activation-key through auto-update timeout commands.

Chapter 4, "backup interface through browse-networks Commands," provides detailed descriptions of the backup-servers through boot commands.

Chapter 5, "cache through clear compression Commands," provides detailed descriptions of the cache-time through clear capture commands.

Chapter 6, "clear configure through clear configure zonelabs-integrity Commands," provides detailed descriptions of the clear configure through clear configure virtual commands.

Chapter 7, "clear conn through clear xlate Commands," provides detailed descriptions of the clear console-output through clear xlate commands.

Chapter 8, "client-access-rule through crl configure Commands," provides detailed descriptions of the client-access-rule through crl-configure commands.

Chapter 9, "crypto ca authenticate through customization Commands," provides detailed descriptions of the crypto ca authenticate through crypto map set commands.

Chapter 10, "ddns through debug xdmcp Commands," provides detailed descriptions of the debug aaa through debug xdmcp commands.

Chapter 11, "default through duplex Commands," provides detailed descriptions of the default through duplex commands.

Chapter 12, "email through functions Commands," provides detailed descriptions of the email through functions commands.

Chapter 13, "gateway through hw-module module shutdown Commands," provides detailed descriptions of the gateway through hw-module module shutdown commands.

Chapter 14, "icmp through imap4s Commands," provides detailed descriptions of the icmp through imap4s commands.

Chapter 15, "inspect ctiqbe through inspect xdmcp Commands," provides detailed descriptions of the inspect ctiqbe through inspect xdmcp commands.

Chapter 16, "interface-dhcp through issuer-name Commands," provides detailed descriptions of the interface-dhcp through issuer-name commands.

Chapter 17, "java-trustpoint through kill Commands," provides detailed descriptions of the join-failover-group through kill commands.

Chapter 18, "l2tp tunnel hello through log-adj-changes Commands," provides detailed descriptions of the 12tp tunnel hello through login commands.

Chapter 19, "logging asdm through logout message Commands," provides detailed descriptions of the logging asdm through logout message commands.

Chapter 20, "mac address through multicast-routing Commands," provides detailed descriptions of the mac-address through multicast-routing commands.

Chapter 21, "nac through override-account-disable Commands," provides detailed descriptions of the name through outstanding commands.

Chapter 22, "packet-tracer through pwd Commands," provides detailed descriptions of the participate through pwd commands.

Chapter 23, "queue-limit through rtp-conformance Commands," provides detailed descriptions of the queue-limit through router ospf commands.

Chapter 24, "same-security-traffic through show asdm sessions Commands," provides detailed descriptions of the same-security-traffic through show asdm sessions commands.

Chapter 25, "show asp drop through show curpriv Commands," provides detailed descriptions of the show asp drop through show curpriv commands.

Chapter 26, "show ddns update interface through show ipv6 traffic Commands," provides detailed descriptions of the show debug through show ipv6 traffic commands.

Chapter 27, "show isakmp ipsec-over-tcp stats through show route Commands," provides detailed descriptions of the show isakmp sa through show route commands.

Chapter 28, "show running-config through show running-config isakmp Commands," provides detailed descriptions of the show running-config through show running-config isakmp commands.

Chapter 29, "show running-config ldap through show running-config wccp Commands," provides detailed descriptions of the show running-config logging through show running-config webvpn commands.

Chapter 30, "show service-policy through show xlate Commands," provides detailed descriptions of the show service-policy through show xlate commands.

Chapter 31, "shun through sysopt radius ignore-secret Commands," provides detailed descriptions of the shun through sysopt uauth allow-http-cache commands.

Chapter 32, "tcp-map through type echo Commands," provides detailed descriptions of the tcp-map through tunnel-limit commands.

Chapter 33, "urgent-flag through zonelabs integrity ssl-client-authentication Commands," provides detailed descriptions of the urgent-flag through write terminal commands.

Document Conventions

Command descriptions use these conventions:

Braces ({ }) indicate a required choice.

Square brackets ([ ]) indicate optional elements.

Vertical bars ( | ) separate alternative, mutually exclusive elements.

Boldface indicates commands and keywords that are entered literally as shown.

Italics indicate arguments for which you supply values.

Examples use these conventions:

Examples depict screen displays and the command line in screen font.

Information you need to enter in examples is shown in boldface screen font.


Note Variables for which you must supply a value are shown in italic screen font.Means reader take note. Notes contain helpful suggestions or references to material not addressed in the manual.


For information on modes, prompts, and syntax, see Chapter 1, "Using the Command-Line Interface."

Related Documentation

For more information, refer to the following documentation:

Cisco ASDM Release Notes

Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide

Cisco ASA 5500 Series Hardware Installation Guide

Cisco ASA 5500 Series Quick Start Guide

Cisco ASA 5500 Series Release Notes

Cisco PIX Security Appliance Release Notes

Cisco PIX 515E Quick Start Guide

Cisco Security Appliance Command Line Configuration Guide

Cisco Security Appliance System Log Messages

Guide for Cisco PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0

Regulatory Compliance and Safety Information for the Cisco ASA 5500 Series

Release Notes for Cisco Secure Desktop

Migrating to ASA for VPN 3000 Concentrator Series Administrators

Selected ASDM VPN Configuration Procedures for the Cisco ASA 5500 Series

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.