Table Of Contents
About This Guide
Document Objectives
Audience
Document Organization
Document Conventions
Related Documentation
Obtaining Documentation and Submitting a Service Request
About This Guide
This preface introduces the Cisco Security Appliance Command Reference.
This preface includes the following sections:
•
Document Objectives
•
Audience
•
Document Organization
•
Document Conventions
•
Related Documentation
•
Obtaining Documentation and Submitting a Service Request
Document Objectives
This guide contains the commands available for use with the security appliance to protect your network from unauthorized use and to establish Virtual Private Networks to connect remote sites and users to your network.
You can also configure and monitor the security appliance by using ASDM, a web-based GUI application. ASDM includes configuration wizards to guide you through some common configuration scenarios, and online Help for less common scenarios. For more information, see: http://www.cisco.com/univercd/cc/td/doc/product/netsec/secmgmt/asdm/index.htm.
This guide applies to the Cisco PIX 500 series security appliances (PIX 515/515E, PIX 525, and PIX 535) and the Cisco ASA 5500 series security appliances (ASA 5510, ASA 5520, and ASA 5540). Throughout this guide, the term "security appliance" applies generically to all supported models, unless specified otherwise. The PIX 501, PIX 506E, and PIX 520 security appliances are not supported in software Version 7.0.
Audience
This guide is for network managers who perform any of the following tasks:
•
Manage network security
•
Install and configure firewall/security appliances
•
Configure VPNs
•
Configure intrusion detection software
Use this guide with the Cisco Security Appliance Command Line Configuration Guide.
Document Organization
This guide includes the following chapters:
•
Chapter 1, "Using the Command-Line Interface," introduces you to the security appliance commands and access modes
•
Chapter 2, "A through B Commands," provides detailed descriptions of all commands that begin with the letters A through B.
•
Chapter 3, "C Commands," provides detailed descriptions of all commands that begin with the letter C.
•
Chapter 4, "D through F Commands," provides detailed descriptions of all commands that begin with the letters D through F.
•
Chapter 5, "G through L Commands," provides detailed descriptions of all commands that begin with the letters G through L.
•
Chapter 6, "M through R Commands," provides detailed descriptions of all commands that begin with the letters M through R.
•
Chapter 7, "S Commands," provides detailed descriptions of all commands that begin with the letter S.
•
Chapter 8, "T through Z Commands," provides detailed descriptions of all commands that begin with the letters T through Z.
Document Conventions
The security appliance command syntax descriptions use the following conventions:
Command descriptions use these conventions:
•
Braces ({ }) indicate a required choice.
•
Square brackets ([ ]) indicate optional elements.
•
Vertical bars ( | ) separate alternative, mutually exclusive elements.
•
Boldface indicates commands and keywords that are entered literally as shown.
•
Italics indicate arguments for which you supply values.
Examples use these conventions:
•
Examples depict screen displays and the command line in screen font.
•
Information you need to enter in examples is shown in boldface screen
font.
•
Variables for which you must supply a value are shown in italic screen font.
•
Examples might include output from different platforms; for example, you might not recognize an interface type in an example because it is not available on your platform. Differences should be minor.
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
For information on modes, prompts, and syntax, see Chapter 1, "Using the Command-Line Interface."
Related Documentation
For more information, refer to the following documentation:
•
Cisco Security Appliance Command Line Configuration Guide
•
Cisco Security Appliance System Log Messages
•
Guide for Cisco PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0
•
Cisco PIX Security Appliance Release Notes
•
Cisco PIX 515E Quick Start Guide
•
Cisco ASA 5500 Series Quick Start Guide
•
Cisco ASA 5500 Series Release Notes
•
Cisco ASDM Release Notes
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.