Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference, 3.2
About This Guide
Downloads: This chapterpdf (PDF - 368.0KB) The complete bookPDF (PDF - 41.41MB) | Feedback

About This Guide

Table Of Contents

About This Guide

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request


About This Guide


This preface describes who should read the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference, how it is organized, and its document conventions. This preface includes the following sections:

Document Objectives

Audience

Document Organization

Document Conventions

Related Documentation

Obtaining Documentation and Submitting a Service Request

Document Objectives

This guide contains the commands available for use with the FWSM to protect your network from unauthorized use.

You can also configure and monitor the FWSM by using ASDM, a web-based GUI application. ASDM includes configuration wizards to guide you through some common configuration scenarios, and online Help for less common scenarios. For more information, see: http://www.cisco.com/univercd/cc/td/doc/product/netsec/secmgmt/asdm/index.htm.

Audience

This publication is for experienced network administrators who are responsible for managing network security, configuring firewalls, managing default and static routes, and managing TCP and UDP services. Use this guide with the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide.

Document Organization

This guide includes the following chapters:

Chapter 1, "Using the Command-Line Interface," introduces you to the FWSM commands and access modes.

Chapter 2, "aaa accounting command through accounting-server-group Commands," provides detailed descriptions of the aaa accounting through accounting-server-group commands.

Chapter 3, "activation-key through auto-update timeout Commands," provides detailed descriptions of the activation-key through auto-update timeout commands.

Chapter 4, "backup-servers through bridge-group Commands," provides detailed descriptions of the backup-servers through bridge-group commands.

Chapter 5, "cache-time through clear capture Commands," provides detailed descriptions of the cache-time through clear capture commands

Chapter 6, "clear configure through clear configure xlate-bypass Commands," provides detailed descriptons of the clear configure through clear configure virtual commands.

Chapter 7, "clear console-output through clear xlate Commands," provides detailed descriptons of the clear console-output through clear xlate commands.

Chapter 8, "client-access-rule through crl-configure Commands," provides detailed descriptons of the client-access-rule through crl-configure commands.

Chapter 9, "crypto ca authenticate through crypto map set trustpoint Commands," provides detailed descriptons of the crypto ca authenticate through crypto map set trustpoint commands.

Chapter 10, "debug aaa through debug sip Commands," provides detailed descriptons of the debug aaa through debug sip commands.

Chapter 11, "default through drop Commands," provides detailed descriptons of the default through drop commands.

Chapter 12, "email through ftp-map Commands," provides detailed descriptons of the email through ftp-map commands.

Chapter 13, "gateway through hw-module module reset Commands," provides detailed descriptons of the gateway through http-map commands.

Chapter 14, "icmp through ignore lsa mospf Commands," provides detailed descriptons of the icmp through ignore lsamospf commands.

Chapter 15, "inspect ctiqbe through inspect xdmcp Commands," provides detailed descriptons of the inspect ctiqbe through inspect xdmcp commands.

Chapter 16, "interface through issuer-name Commands," provides detailed descriptons of the interface through issuer-name commands.

Chapter 17, "join-failover-group through kill Commands,"provides detailed descriptons of the join-failover-group through kill commands.

Chapter 18, "ldap-base-dn through log-adj-changes Commands," provides detailed descriptons of the ldap-base-dn through log-adj-changes commands.

Chapter 19, "logging asdm through logout Commands," provides detailed descriptons of the inspect ctiqbe through inspect xdmcp commands.

Chapter 20, "mac-address-table aging-time through multicast-routing Commands,"provides detailed descriptons of the mac-address-table through multicast-routing commands.

Chapter 21, "name through ospf transmit-delay Commands," provides detailed descriptons of the name through ospf transmit-delaycommands.

Chapter 22, "pager through pwd Commands," provides detailed descriptons of the passwd through pwd commands.

Chapter 23, "quit through router-id Commands," provides detailed descriptons of the queue-limit through router-id commands.

Chapter 24, "same-security-traffic through show asdmsessions Commands," provides detailed descriptons of the same-security-traffic through show asdm sessions commands.

Chapter 25, "show asp drop through show curpriv Commands," provides detailed descriptons of the show asp drop through show curpriv commands.

Chapter 26, "show debug through show ipv6 traffic Commands," provides detailed descriptons of the show debug through show ipv6 traffic commands.

Chapter 27, "show isakmp sa through show route Commands," provides detailed descriptons of the show isakmp sa through show route commands.

Chapter 28, "show running-config through show running-config isakmp Commands," provides detailed descriptons of the show running-config through show running-config isakmp commands.

Chapter 29, "show running-config logging through show running-config xlate-bypass Commands," provides detailed descriptons of the show running-config logging through show running-config vpn-sessionb commands.

Chapter 30, "show service-policy through show xlate Commands," provides detailed descriptons of the show service-policy through show xlate commands.

Chapter 31, "shun through sysopt uauth allow-http-cache Commands," provides detailed descriptons of the shun through sysopt unauth allow-http-cache commands.

Chapter 32, "tcp-map through tunnel-limit Commands," provides detailed descriptons of the tcp-map through tunnel-limit commands.

Chapter 33, "upgrade-mp through xlate-bypass Commands," provides detailed descriptons of the upgrade-mp through write terminal commands.

Document Conventions

The FWSM command syntax descriptions use the following conventions:

Command descriptions use these conventions:

Braces ({ }) indicate a required choice.

Square brackets ([ ]) indicate optional elements.

Vertical bars ( | ) separate alternative, mutually exclusive elements.

Boldface indicates commands and keywords that are entered literally as shown.

Italics indicate arguments for which you supply values.

Examples use these conventions:

Examples depict screen displays and the command line in screen font.

Information you need to enter in examples is shown in boldface screen font.

Variables for which you must supply a value are shown in italic screen font.

Examples might include output from different platforms; for example, you might not recognize an interface type in an example because it is not available on your platform. Differences should be minor.


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.


For information on modes, prompts, and syntax, see Chapter 1, "Using the Command-Line Interface."

Related Documentation

For more information, refer to the following documentation:

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Logging Configuration and System Log Messages

Upgrading the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module to Release 3.1

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Release Notes

Cisco ASDM Release Notes

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.