Table Of Contents
tls-proxy through type echo Commands
tls-proxy
tos
traceroute
track rtr
traffic-forward cxsc
traffic-non-sip
transfer-encoding
trustpoint (SSO Server)
tsig enforced
ttl-evasion-protection
tunnel-group
tunnel-group-list enable
tunnel-group-preference
tunnel-group general-attributes
tunnel-group ipsec-attributes
tunnel-group ppp-attributes
tunnel-group webvpn-attributes
tunnel-group-map
tunnel-group-map default-group
tunnel-group-map enable
tunnel-limit
tx-ring-limit
type echo
tls-proxy through type echo Commands
tls-proxy
To configure a TLS proxy instance in TLS configuration mode or to set the maximum sessions, use the tls-proxy command in global configuration mode. To remove the configuration, use the no form of this command.
tls-proxy [maximum-sessions max_sessions | proxy_name] [noconfirm]
no tls-proxy [maximum-sessions max_sessions | proxy_name] [noconfirm]
Syntax Description
max_sessions max_sessions
|
Specifies the maximum number of TLS proxy sessions to support on the platform.
|
noconfirm
|
Runs the tls-proxy command without requiring confirmation.
|
proxy_name
|
Specifies the name of the TLS proxy instance.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
8.0(2)
|
This command was introduced.
|
Usage Guidelines
Use the tls-proxy command to enter TLS proxy configuration mode to create a TLS proxy instance, or to set the maximum sessions supported on the platform.
Examples
The following example shows how to create a TLS proxy instance:
hostname(config)# tls-proxy my_proxy
hostname(config-tlsp)# server trust-point ccm_proxy
hostname(config-tlsp)# client ldc issuer ldc_server
hostname(config-tlsp)# client ldc keypair phone_common
Related Commands
Commands
|
Description
|
client
|
Defines a cipher suite and sets the local dynamic certificate issuer or keypair.
|
ctl-provider
|
Defines a CTL provider instance and enters provider configuration mode.
|
server trust-point
|
Specifies the proxy trustpoint certificate to be presented during the TLS handshake.
|
show tls-proxy
|
Shows the TLS proxies.
|
tos
To define a type of service byte in the IP header of an SLA operation request packet, use the tos command in SLA monitor protocol configuration mode. To restore the default value, use the no form of this command.
tos number
no tos
Syntax Description
number
|
The service type value to be used in the IP header. Valid values are from 0 to 255.
|
Defaults
The default type of service value is 0.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
SLA monitor protocol configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Usage Guidelines
This field contains information such as delay, precedence, reliability, and so on. This is can be used by other routers on the network for policy routing and features such as Committed Access Rate.
Examples
The following example configures an SLA operation with an ID of 123 that uses an ICMP echo request/response time probe operation. It sets the payload size of the echo request packets to 48 bytes, the number of echo requests sent during an SLA operation to 5, and the type of service byte to 80.
hostname(config)# sla monitor 123
hostname(config-sla-monitor)# type echo protocol ipIcmpEcho 10.1.1.1 interface outside
hostname(config-sla-monitor-echo)# num-packets 5
hostname(config-sla-monitor-echo)# request-data-size 48
hostname(config-sla-monitor-echo)# tos 80
hostname(config-sla-monitor-echo)# timeout 4000
hostname(config-sla-monitor-echo)# threshold 2500
hostname(config-sla-monitor-echo)# frequency 10
hostname(config)# sla monitor schedule 123 life forever start-time now
hostname(config)# track 1 rtr 123 reachability
Related Commands
Command
|
Description
|
num-packets
|
Specifies the number of request packets to send during an SLA operation.
|
request-data-size
|
Specifies the size of the request packet payload.
|
sla monitor
|
Defines an SLA monitoring operation.
|
type echo
|
Configures the SLA operation as an echo response time probe operation.
|
traceroute
To determine the route packets will take to their destination, use the traceroute command.
traceroute destination_ip | hostname [source source_ip | source-interface] [numeric] [timeout
timeout_value] [probe probe_num] [ttl min_ttl max_ttl] [port port_value] [use-icmp]
Syntax Description
destination_ip
|
Specifies the destination IP address for the traceroute.
|
hostname
|
The hostname of the host to which the route has to be traced. If the hostname is specified, define it with the name command, or configure a DNS server to enable traceroute to resolve the hostname to an IP address. Supports DNS domain names such as www.example.com.
|
source
|
Specifies an IP address or interface is used as the source for the trace packets.
|
source_ip
|
Specifies the source IP address for the packet trace. This IP address must be the IP address of one of the interfaces. In transparent mode, it must be the management IP address of the security appliance.
|
source_interface
|
Specifies the source interface for the packet trace. When specified, the IP address of the source interface is used.
|
numeric
|
Specifies the output print only the IP addresses of the intermediate gateways. If this keyword is not specified the traceroute attempts to look up the hostnames of the gateways reached during the trace.
|
timeout
|
Specifies a timeout value is used
|
timeout_value
|
Specifies the amount of time in seconds to wait for a response before the connection times out. The default is three seconds.
|
probe probe_num
|
The number of probes to be sent at each TTL level. The default count is 3.
|
ttl
|
Keyword to specify the range of Time To Live values to use in the probes.
|
min_ttl
|
The TTL value for the first probes. The default is 1, but it can be set to a higher value to suppress the display of known hops.
|
max-ttl
|
The largest TTL value that can be used. The default is 30. The command terminates when the traceroute packet reaches the destination or when the value is reached.
|
port port_value
|
The destination port used by the User Datagram Protocol (UDP) probe messages. The default is 33434.
|
use-icmp
|
Specifies the use of ICMP probe packets instead of UDP probe packets.
|
Defaults
This command has no default settings.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Priveleged EXEC
|
•
|
•
|
•
|
•
|
•
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Usage Guidelines
The traceroute command prints the result of each probe sent. Every line of output corresponds to a TTL value in increasing order. The following are the output symbols printed by the traceroute command:
Output Symbol
|
Description
|
*
|
No response was received for the probe within the timeout period.
|
nn msec
|
For each node, the round-trip time (in milliseconds) for the specified number of probes.
|
!N.
|
ICMP network unreachablee.
|
!H
|
ICMP host unreachable.
|
!P
|
ICMP protocol unreachable.
|
!A
|
ICMP administratively prohibited.
|
?
|
Unknown ICMP error.
|
Examples
The following example shows traceroute output that results when a destination IP address has been specified:
hostname# traceroute 209.165.200.225
Tracing the route to 209.165.200.225
1 10.83.194.1 0 msec 10 msec 0 msec
2 10.83.193.65 0 msec 0 msec 0 msec
3 10.88.193.101 0 msec 10 msec 0 msec
4 10.88.193.97 0 msec 0 msec 10 msec
5 10.88.239.9 0 msec 10 msec 0 msec
6 10.88.238.65 10 msec 10 msec 0 msec
7 172.16.7.221 70 msec 70 msec 80 msec
8 209.165.200.225 70 msec 70 msec 70 msec
Related Commands
Command
|
Description
|
capture
|
Captures packet information, including trace packets.
|
show capture
|
Displays the capture configuration when no options are specified.
|
packet-tracer
|
Enables packet tracing capabilities.
|
track rtr
To track the reachability of an SLA operation, use the track rtr command in global configuration mode. To remove the SLA tracking, use the no form of this command.
track track-id rtr sla-id reachabilitity
no track track-id rtr sla-id reachabilitity
Syntax Description
reachability
|
Specifies that the reachability of the object is being tracked.
|
sla-id
|
The ID of the SLA used by the tracking entry.
|
track-id
|
Creates a tracking entry object ID. Valid values are from 1 to 500.
|
Defaults
SLA tracking is disabled.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Usage Guidelines
The track rtr command creates a tracking entry object ID and specifies the SLA used by that tracking entry.
Every SLA operation maintains an operation return-code value, which is interpreted by the tracking process. The return code may be OK, Over Threshold, or several other return codes. Table 65-1 displays the reachability state of an object with respect to these return codes.
Table 65-1 SLA Tracking Return Codes
Tracking
|
Return Code
|
Track State
|
Reachability
|
OK or Over Threshold
|
Up
|
Any other code
|
Down
|
Examples
The following example configures an SLA operation with an ID of 123 and creates a tracking entry with the ID of 1 to track the reachability of the SLA:
hostname(config)# sla monitor 123
hostname(config-sla-monitor)# type echo protocol ipIcmpEcho 10.1.1.1 interface outside
hostname(config-sla-monitor-echo)# timeout 1000
hostname(config-sla-monitor-echo)# frequency 3
hostname(config)# sla monitor schedule 123 life forever start-time now
hostname(config)# track 1 rtr 123 reachability
Related Commands
Command
|
Description
|
route
|
Configures a static route.
|
sla monitor
|
Defines an SLA monitoring operation.
|
traffic-forward cxsc
To enable a traffic-forwarding interface for the ASA CX module for demonstration purposes, use the traffic-forward cxsc command in interface configuration mode. To disable traffic-forwarding, use the no form of this command.
traffic-forward cxsc monitor-only
no traffic-forward cxsc monitor-only
Syntax Description
monitor-only
|
Sets the ASA CX module to monitor-only mode. In monitor-only mode, the ASA CX module can process traffic for demonstration purposes, but then drops the traffic. You cannot use the traffic-forwarding interface for production purposes.
|
Command Default
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Interface configuration
|
—
|
•
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
9.1(2)
|
We introduced this command.
|
Usage Guidelines
For testing and demonstration purposes, you can configure an ASA interface to be a traffic-forwarding interface, where all traffic received is forwarded directly to the ASA CX module without any ASA processing. This feature is only supported in monitor-only mode. In this mode, the ASA CX module inspects the traffic as usual, makes policy decisions, and generates events. However, because the packets are read-only copies, the module actions do not affect the actual traffic. Instead, the module drops the copies after inspection.
See the following guidelines:
•
You cannot configure both monitor-only mode and normal inline mode at the same time on the ASA. Only one type of security policy is allowed.
•
The following features are not supported in monitor-only mode:
–
Deny policies
–
Active authentication
–
Decryption policies
•
The ASA CX does not perform packet buffering in monitor-only mode, and events will be generated on a best effort basis. For example, some events, such as ones with long URLs spanning packet boundaries, may be impacted by the lack of buffering.
•
Be sure to configure both the ASA policy and the ASA CX to have matching modes: both in monitor-only mode.
•
The ASA must be transparent mode.
•
You can configure only one interface as a traffic-forwarding interface. Other ASA interfaces can be used as normal.
•
Traffic-forwarding interfaces must be physical interfaces, not VLANs or BVIs. The physical interface also cannot have any VLANs associated with it.
•
Traffic-forwarding interfaces cannot be used for ASA traffic; you cannot name them or configure them for ASA features, including failover or management-only.
Examples
The following example makes GigabitEthernet 0/5 a traffic-forwarding interface:
interface gigabitethernet 0/5
traffic-forward cxsc monitor-only
Related Commands
Command
|
Description
|
interface
|
Enters interface configuration mode.
|
traffic-non-sip
To allow non-SIP traffic using the well-known SIP signaling port, use the traffic-non-sip command in parameters configuration mode. Parameters configuration mode is accessible from policy map configuration mode. To disable this feature, use the no form of this command.
traffic-non-sip
no traffic-non-sip
Syntax Description
This command has no arguments or keywords.
Defaults
This command is enabled by default.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Parameters configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Examples
The following example shows how to allow non-SIP traffic using the well-known SIP signaling port in a SIP inspection policy map:
hostname(config)# policy-map type inspect sip sip_map
hostname(config-pmap)# parameters
hostname(config-pmap-p)# traffic-non-sip
Related Commands
Command
|
Description
|
class
|
Identifies a class map name in the policy map.
|
class-map type inspect
|
Creates an inspection class map to match traffic specific to an application.
|
policy-map
|
Creates a Layer 3/4 policy map.
|
show running-config policy-map
|
Display all current policy map configurations.
|
transfer-encoding
To restrict HTTP traffic by specifying a transfer encoding type, use the transfer-encoding command in HTTP map configuration mode, which is accessible using the http-map command. To disable this feature, use the no form of this command.
transfer-encoding type {chunked | compress | deflate | gzip | identity | default} action {allow |
reset | drop} [log]
no transfer-encoding type {chunked | compress | deflate | gzip | identity | default} action {allow
| reset | drop} [log]
Syntax Description
action
|
Specifies the action taken when a connection using the specified transfer encoding type is detected.
|
allow
|
Allows the message.
|
chunked
|
Identifies the transfer encoding type in which the message body is transferred as a series of chunks.
|
compress
|
Identifies the transfer encoding type in which the message body is transferred using UNIX file compression.
|
default
|
Specifies the default action taken by the ASA when the traffic contains a supported request method that is not on a configured list.
|
deflate
|
Identifies the transfer encoding type in which the message body is transferred using zlib format (RFC 1950) and deflate compression (RFC 1951).
|
drop
|
Closes the connection.
|
gzip
|
Identifies the transfer encoding type in which the message body is transferred using GNU zip (RFC 1952).
|
identity
|
Identifies connections in which the message body is no transfer encoding is performed.
|
log
|
(Optional) Generates a syslog.
|
reset
|
Sends a TCP reset message to client and server.
|
type
|
Specifies the type of transfer encoding to be controlled through HTTP application inspection.
|
Defaults
This command is disabled by default. When the command is enabled and a supported transfer encoding type is not specified, the default action is to allow the connection without logging. To change the default action, use the default keyword and specify a different default action.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
HTTP map configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
When you enable the transfer-encoding command, the ASA applies the specified action to HTTP connections for each supported and configured transfer encoding type.
The ASA applies the default action to all traffic that does not match the transfer encoding types on the configured list. The preconfigured default action is to allow connections without logging.
For example, given the preconfigured default action, if you specify one or more encoding types with the action of drop and log, the ASA drops connections containing the configured encoding types, logs each connection, and allows all connections for the other supported encoding types.
If you want to configure a more restrictive policy, change the default action to drop (or reset) and log (if you want to log the event). Then configure each permitted encoding type with the allow action.
Enter the transfer-encoding command once for each setting you wish to apply. You use one instance of the transfer-encoding command to change the default action and one instance to add each encoding type to the list of configured transfer encoding types.
When you use the no form of this command to remove an application category from the list of configured application types, any characters in the command line after the application category keyword are ignored.
Examples
The following example provides a permissive policy, using the preconfigured default, which allows all supported application types that are not specifically prohibited.
hostname(config)# http-map inbound_http
hostname(config-http-map)# transfer-encoding gzip drop log
hostname(config-http-map)#
In this case, only connections using GNU zip are dropped and the event is logged.
The following example provides a restrictive policy, with the default action changed to reset the connection and to log the event for any encoding type that is not specifically allowed.
hostname(config)# http-map inbound_http
hostname(config-http-map)# port-misuse default action reset log
hostname(config-http-map)# port-misuse identity allow
hostname(config-http-map)#
In this case, only connections using no transfer encoding are allowed. When HTTP traffic for the other supported encoding types is received, the ASA resets the connection and creates a syslog entry.
Related Commands
Commands
|
Description
|
class-map
|
Defines the traffic class to which to apply security actions.
|
debug appfw
|
Displays detailed information about traffic associated with enhanced HTTP inspection.
|
http-map
|
Defines an HTTP map for configuring enhanced HTTP inspection.
|
inspect http
|
Applies a specific HTTP map to use for application inspection.
|
policy-map
|
Associates a class map with specific security actions.
|
trustpoint (SSO Server)
To specify the name of a trustpoint that identifies the certificate to be sent to the SAML POST-type SSO server, use the trustpoint command in config-webvpn-sso-saml mode. To eliminate a trustpoint specification, use the no form of this command.
trustpoint trustpoint-name
no trustpoint trustpoint-name
Syntax Description
trustpoint-name
|
Specifies the name of the trustpoint to use.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Config webvpn sso saml
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
8.0(2)
|
This command is introduced.
|
Usage Guidelines
Single sign-on support, available only for WebVPN, lets users access different secure services on different servers without entering a username and password more than once. The ASA currently supports the SAML POST-type SSO server and the SiteMinder-type of SSO server.
This command applies only to SAML-type SSO Servers.
A trustpoint represents a Certificate Authority identity, based on a CA-issued certificate that can be relied upon as being valid without the need for validation testing, especially a public-key certificate used to provide the first public key in a certification path.
Examples
The following example enters config-webvpn-sso-saml mode and names a trustpoint for identifying the certificate to be sent to the SAML POST type SSO Server:
hostname(config-webvpn)# sso server
hostname(config-webvpn-sso-saml)# trustpoint mytrustpoint
Related Commands
Command
|
Description
|
crypto ca trustpoint
|
Manages trustpoint information.
|
show webvpn sso server
|
Displays the operating statistics for all SSO servers configured on the security device.
|
sso server
|
Creates, names, and specifies type for an SSO server.
|
tsig enforced
To require a TSIG resource record to be present, use the tsig enforced command in parameters configuration mode. To disable this feature, use the no form of this command.
tsig enforced action {drop [log] | log}
no tsig enforced [action {drop [log] | log}]
Syntax Description
drop
|
Drops the packet if TSIG is not present.
|
log
|
Generates a system message log.
|
Defaults
This command is disabled by default.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Parameters configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Usage Guidelines
This command enables monitoring and enforcement of TSIG presence in DNS transactions.
Examples
The following example shows how to enable TSIG enforcement in a DNS inspection policy map:
hostname(config)# policy-map type inspect dns preset_dns_map
hostname(config-pmap)# parameters
hostname(config-pmap-p)# tsig enforced action log
Related Commands
Command
|
Description
|
class
|
Identifies a class map name in the policy map.
|
class-map type inspect
|
Creates an inspection class map to match traffic specific to an application.
|
policy-map
|
Creates a Layer 3/4 policy map.
|
show running-config policy-map
|
Display all current policy map configurations.
|
ttl-evasion-protection
To enable the Time-To-Live evasion protection, use the ttl-evasion-protection command in tcp-map configuration mode. To remove this specification, use the no form of this command.
ttl-evasion-protection
no ttl-evasion-protection
Syntax Description
This command has no arguments or keywords.
Defaults
TTL evasion protection offered by the ASA is enabled by default.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Tcp-map configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The tcp-map command is used along with the Modular Policy Framework infrastructure. Define the class of traffic using the class-map command and customize the TCP inspection with tcp-map commands. Apply the new TCP map using the policy-map command. Activate TCP inspection with service-policy commands.
Use the tcp-map command to enter tcp-map configuration mode. Use the ttl-evasion-protection command in tcp-map configuration mode to prevent attacks that attempt to evade security policy.
For instance, an attacker can send a packet that passes policy with a very short TTL. When the TTL goes to zero, a router between the ASA and the endpoint drops the packet. It is at this point that the attacker can send a malicious packet with a long TTL that appears to the ASA to be a retransmission and is passed. To the endpoint host, however, it is the first packet that has been received by the attacker. In this case, an attacker is able to succeed without security preventing the attack. Enabling this feature prevents such attacks.
Examples
The following example shows how to disable TTL evasion protection on flows from network 10.0.0.0 to 20.0.0.0:
hostname(config)# access-list TCP1 extended permit tcp 10.0.0.0 255.0.0.0 20.0.0.0
255.0.0.0
hostname(config)# tcp-map tmap
hostname(config-tcp-map)# no ttl-evasion-protection
hostname(config)# class-map cmap
hostname(config-cmap)# match access-list TCP1
hostname(config)# policy-map pmap
hostname(config-pmap)# class cmap
hostname(config-pmap)# set connection advanced-options tmap
hostname(config)# service-policy pmap global
Related Commands
Command
|
Description
|
class
|
Specifies a class map to use for traffic classification.
|
policy-map
|
Configures a policy; that is, an association of a traffic class and one or more actions.
|
set connection
|
Configures connection values.
|
tcp-map
|
Creates a TCP map and allows access to tcp-map configuration mode.
|
tunnel-group
To create and manage the database of connection-specific records for IPsec and WebVPN tunnels, use the tunnel-group command in global configuration mode. To remove a tunnel group, use the no form of this command.
tunnel-group name type type
no tunnel-group name
Syntax Description
name
|
Specifies the name of the tunnel group. This can be any string you choose. If the name is an IP address, it is usually the IP address of the peer.
|
type
|
Specifies the type of tunnel group:
• remote-access—Allows a user to connect using either IPsec remote access or WebVPN (portal or tunnel client).
• ipsec-l2l—Specifies IPsec LAN-to-LAN, which allows two sites or LANs to connect securely across a public network like the Internet.
Note The following tunnel-group types are deprecated in Release 8.0(2): ipsec-ra—IPsec remote access webvpn—WebVPN The ASA converts these to the remote-access type.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
See Note.
|
•
|
•
|
—
|
Note
The tunnel-group command is available in transparent firewall mode to allow configuration of a LAN-to-LAN tunnel group, but not a remote-access group or a WebVPN group. All the tunnel-group commands that are available for LAN-to-LAN are also available in transparent firewall mode.
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Added webvpn type.
|
8.0(2)
|
Added remote-access type and deprecated ipsec-ra and webvpn types.
|
8.3(1)
|
The name argument was modified to accept IPv6 addresses.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
SSL VPN users (both AnyConnect and clientless) can choose which tunnel group to access using these different methods:
•
group-url
•
group-alias
•
certificate maps, if using certificates
This command and subcommands configures the ASA to allow users to select a group via a drop-down menu when they log in to the webvpn service. The groups that appear in the menu are either aliases or URLs of real connection profiles (tunnel groups) configured on the ASA.
The ASA has the following default tunnel groups:
•
DefaultRAGroup, the default IPsec remote-access tunnel group
•
DefaultL2LGroup, the default IPsec LAN-to-LAN tunnel group
•
DefaultWEBVPNGroup, the default WebVPN tunnel group.
You can change these groups, but not delete them. The ASA uses these groups to configure default tunnel parameters for remote access and LAN-to-LAN tunnel groups when there is no specific tunnel group identified during tunnel negotiation.
After entering the tunnel-group command, you enter the appropriate following commands to configure specific attributes for a particular tunnel group. Each of these commands enters a configuration mode for configuring tunnel-group attributes.
•
tunnel-group general-attributes
•
tunnel-group ipsec-attributes
•
tunnel-group webvpn-attributes
•
tunnel-group ppp-attributes
For LAN-to-LAN connections, the ASA attempts to select a tunnel group for a connection by matching the peer address specified in the crypto map to a tunnel group of the same name. Therefore, for IPv6 peers, you should configure the tunnel group name as the IPv6 address of the peer. You can specify the tunnel group name in short or long notation. The CLI reduces the name to the shortest notation. For example, if you enter this tunnel group command:
hostname(config)# tunnel-group 2001:0db8:0000:0000:0000:0000:1428:57ab type ipsec-l2l
The tunnel group appears in the configuration as:
tunnel-group 2001:0db8::1428:57ab type ipsec-l2l
Examples
The following examples are entered in global configuration mode. The first configures a remote access tunnel group. The group name is group1.
hostname(config)# tunnel-group group1 type remote-access
The following example shows the tunnel-group command configuring the webvpn tunnel group named "group1". You enter this command in global configuration mode:
hostname(config)# tunnel-group group1 type webvpn
Related Commands
Command
|
Description
|
clear configure tunnel-group
|
Clears all configured tunnel groups.
|
show running-config tunnel-group
|
Shows the tunnel group configuration for all tunnel groups or for a particular tunnel group.
|
tunnel-group general-attributes
|
Enters the config-general mode for configuring general tunnel-group attributes
|
tunnel-group ipsec-attributes
|
Enters the config-ipsec mode for configuring IPsec tunnel-group attributes.
|
tunnel-group ppp-attributes
|
Enters the config-ppp mode for configuring PPP settings for L2TP connections.
|
tunnel-group webvpn-attributes
|
Enters the config-webvpn mode for configuring WebVPN tunnel-group attributes.
|
tunnel-group-list enable
To enable the tunnel-groups defined in tunnel-group group-alias, use the tunnel-group-list enable command:
tunnel-group-list enable
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Webvpn configuration
|
•
|
|
•
|
•
|
—
|
Usage Guidelines
This command is used in conjuction with the tunnel-group group-alias and group-url commands for clientless and AnyConnect VPN client sessions. It enables the feature so that the tunnel-group drop-down is displayed on the login page. The group-alias is a text string such as employees, engineering, or consultants defined by the ASA administrator to display to end users.
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Examples
hostname# configure terminal
hostname(config)# tunnel-group ExampleGroup1 webvpn-att
hostname(config-tunnel-webvpn)# group-alias Group1 enable
hostname(config-tunnel-webvpn)# exit
hostname(config-webvpn)# tunnel-group-list enable
Related Commands
Command
|
Description
|
tunnel-group
|
Creates a VPN connection profile or accesses the database of VPN connection profiles.
|
group-alias
|
Configures an alias for a connection profile (tunnel group).
|
group-url
|
Matches the URL or IP address specified by the VPN endpoint to the connection profile.
|
show running-config tunnel-group
|
Shows the tunnel group configuration for all tunnel groups or for a particular tunnel group.
|
tunnel-group-preference
To change the VPN preference to a connection profile with a group URL that matches the one specified by the endpoint, use the tunnel-group-preference command in webvpn configuration mode. To remove the command from the configuration, use the no form.
tunnel-group-preference group-url
no tunnel-group-preference group-url
Syntax Description
This command has no arguments or keywords.
Command Default
By default, if the ASA matches a certificate field value specified in a connection profile to the field value of the certificate used by the endpoint, the ASA assigns that profile to the VPN connection. This command overrides the default behavior.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Config-webvpn
|
•
|
—
|
•
|
—
|
—
|
Command History
Release
|
Modification
|
8.2(5)/8.4(2)
|
We introduced this command.
|
Usage Guidelines
This command changes the preference of a connection profile during the connection profile selection process. It lets you rely on the group URL preference used by many older ASA software releases. If the endpoint specifies a group URL that is not present in a connection profile, but it specifies a certificate value that matches that of a connection profile, the ASA assigns that connection profile to the VPN session.
Although you enter this command in webvpn configuration mode, it changes the connection profile selection preference for all clientless and AnyConnect VPN connections negotiated by the ASA.
Examples
The following example changes the preference of a connection profile during the connection profile selection process:
hostname(config-webvpn)# tunnel-group-preference group-url
Related Commands
Command
|
Description
|
tunnel-group
|
Creates a VPN connection profile or accesses the database of VPN connection profiles.
|
group-url
|
Matches the URL or IP address specified by the VPN endpoint to the connection profile.
|
show running-config tunnel-group
|
Shows the tunnel group configuration for all tunnel groups or for a particular tunnel group.
|
tunnel-group general-attributes
To enter the general-attribute configuration mode, use the tunnel-group general-attributes command in global configuration mode. This mode is used to configure settings that are common to all supported tunneling protocols.
To remove all general attributes, use the no form of this command.
tunnel-group name general-attributes
no tunnel-group name general-attributes
Syntax Description
general-attributes
|
Specifies attributes for this tunnel-group.
|
name
|
Specifies the name of the tunnel-group.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Tunnel-group general-attributes configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Various attributes from other tunnel-group types migrated to the general tunnel-group attributes list, and the prompt for tunnel-group general-attributes mode changed.
|
9.0(1)
|
Support for multiple context mode was added.
|
Examples
The following example entered in global configuration mode, creates a remote-access tunnel group for a remote-access connection using the IP address of the LAN-to-LAN peer, then enters general-attributes configuration mode for configuring tunnel-group general attributes. The name of the tunnel group is 209.165.200.225.
hostname(config)# tunnel-group 209.165.200.225 type remote-access
hostname(config)# tunnel-group 209.165.200.225 general-attributes
hostname(config-tunnel-general)#
The following example entered in global configuration mode, creates a tunnel group named" remotegrp" for an IPsec remote access connection, and then enters general configuration mode for configuring general attributes for the tunnel group named "remotegrp":
hostname(config)# tunnel-group remotegrp type ipsec_ra
hostname(config)# tunnel-group remotegrp general
hostname(config-tunnel-general)
Related Commands
Command
|
Description
|
clear configure tunnel-group
|
Clears the entire tunnel-group database or just the specified tunnel-group.
|
show running-config tunnel-group
|
Displays the currently running tunnel-group configuration for a specified tunnel group or for all tunnel groups.
|
tunnel-group
|
Creates and manages the database of connection-specific records for IPsec and WebVPN tunnels.
|
tunnel-group ipsec-attributes
To enter the ipsec-attribute configuration mode, use the tunnel-group ipsec-attributes command in global configuration mode. This mode is used to configure settings that are specific to the IPsec tunneling protocol.
To remove all IPsec attributes, use the no form of this command.
tunnel-group name ipsec-attributes
no tunnel-group name ipsec-attributes
Syntax Description
ipsec-attributes
|
Specifies attributes for this tunnel-group.
|
name
|
Specifies the name of the tunnel-group.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
7.1(1)
|
Various IPsec tunnel-group attributes migrated to the general tunnel-group attributes list, and the prompt for tunnel-group ipsec-attributes mode changed.
|
9.0(1)
|
Support for multiple context mode was added.
|
Examples
The following example entered in global configuration, creates a tunnel group for the IPsec remote-access tunnel group named remotegrp, and then specifies IPsec group attributes:
hostname(config)# tunnel-group remotegrp type ipsec_ra
hostname(config)# tunnel-group remotegrp ipsec-attributes
hostname(config-tunnel-ipsec)
Related Commands
Command
|
Description
|
clear configure tunnel-group
|
Clears the entire tunnel-group database or just the specified tunnel-group.
|
show running-config tunnel-group
|
Displays the currently running tunnel-group configuration for a specified tunnel group or for all tunnel groups.
|
tunnel-group
|
Creates and manages the database of connection-specific records for IPsec and WebVPN tunnels.
|
tunnel-group ppp-attributes
To enter the ppp-attributes configuration mode and configure PPP settings that are used by L2TP over IPsec connections, use the tunnel-group ppp-attributes command in global configuration mode.
To remove all PPP attributes, use the no form of this command.
tunnel-group name ppp-attributes
no tunnel-group name ppp-attributes
Syntax Description
name
|
Specifies the name of the tunnel-group.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
Examples
The following example creates the tunnel group telecommuters and enters ppp-attributes configuration mode:
hostname(config)# tunnel-group telecommuters type pppoe
hostname(config)# tunnel-group telecommuters ppp-attributes
hostname(tunnel-group-ppp)#
Related Commands
Command
|
Description
|
clear configure tunnel-group
|
Clears the entire tunnel-group database or just the specified tunnel-group.
|
show running-config tunnel-group
|
Displays the currently running tunnel-group configuration for a specified tunnel group or for all tunnel groups.
|
tunnel-group
|
Creates and manages the database of connection-specific records for IPsec and WebVPN tunnels.
|
tunnel-group webvpn-attributes
To enter the webvpn-attribute configuration mode, use the tunnel-group webvpn-attributes command in global configuration mode. This mode configures settings that are common to WebVPN tunneling.
To remove all WebVPN attributes, use the no form of this command.
tunnel-group name webvpn-attributes
no tunnel-group name webvpn-attributes
Syntax Description
webvpn-attributes
|
Specifies WebVPN attributes for this tunnel-group.
|
name
|
Specifies the name of the tunnel-group.
|
Defaults
No default behavior or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.1(1)
|
This command was introduced.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
In addition to the general attributes, you can also configure the following attributes specific to WebVPN connections in webvpn-attribute mode:
•
authentication
•
customization
•
dns-group
•
group-alias
•
group-url
•
without-csd
Examples
The following example entered in global configuration mode, creates a tunnel group for a WebVPN connection using the IP address of the LAN-to-LAN peer, then enters webvpn-configuration mode for configuring WebVPN attributes. The name of the tunnel group is 209.165.200.225.
hostname(config)# tunnel-group 209.165.200.225 type webvpn
hostname(config)# tunnel-group 209.165.200.225 webvpn-attributes
hostname(config-tunnel-webvpn)#
The following example entered in global configuration mode, creates a tunnel group named" remotegrp" for a WebVPN connection, and then enters webvpn configuration mode for configuring WebVPN attributes for the tunnel group named "remotegrp":
hostname(config)# tunnel-group remotegrp type webvpn
hostname(config)# tunnel-group remotegrp webvpn-attributes
hostname(config-tunnel-webvpn)#
Related Commands
Command
|
Description
|
clear configure tunnel-group
|
Clears the entire tunnel-group database or just the specified tunnel-group.
|
show running-config tunnel-group
|
Displays the currently running tunnel-group configuration for a specified tunnel group or for all tunnel groups.
|
tunnel-group
|
Creates and manages the database of connection-specific records for IPsec and WebVPN tunnels.
|
tunnel-group-map
When the adaptive security appliance receives an IPsec connection request with client certificate authentication, it assigns a connection profile to the connection according to a policy you configure.
That policy can be to use rules you configure, use the certificate OU field, use the IKE identity (i.e. hostname, IP address, key ID), the client's IP address, or a default connection profile to assign the connection profile. For SSL connections, the adaptive security appliance only uses the rules you configure to assign the connection profile.
The tunnel-group-map command assigns a connection profile to the connection based on rules you configure by associating an existing map name with a connection profile.
Use the no form of this command to disassociate a connection profile with a map name. The no form of the command does not delete the map name, just its association with a connection profile.
This is the syntax of the command:
tunnel-group-map [mapname] [rule-index] [connection-profile]
no tunnel-group-map [mapname] [rule-index]
Note
•
You create the certificate map name with this command:
crypto ca certificate map [mapname] [rule-index]
•
A "tunnel group" is old terminology for what we now call a "connection profile." Think of the tunnel-group-map command as creating a connection profile map.
Syntax Description
Syntax DescriptionSyntax Description
mapname
|
Required. Identifies the name of the existing certificate map.
|
rule-index
|
Required. Identifies the rule-index associated with the mapname. The rule-index parameter was defined using the crypto ca certificate map command. The values are 1 to 65535.
|
connection-profile
|
Designates the connection profile name for this certificate map list.
|
Defaults
If a tunnel-group-map is not defined, and the ASA receives an IPsec connection request with client certificate authentication, the ASA assigns a connection profile by trying to match the certificate authentication request to one of these policies, in this order:
Certificate ou field—Determines connection profile based on the value of the organizational unit (OU) field in the subject distinguished name (DN).
IKE identity—Determines the connection profile based on the content of the phase1 IKE ID.
peer-ip—Determines the connection profile based on the established client IP address.
Default Connection Profile—If the ASA does not match the previous three policies, it assigns the default connection profile. The default profile is DefaultRAGroup. The default connection profile would otherwise be configured using the tunnel-group-map default-group command.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
—
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
The map name you specify must already exist before you can associate it with a connection profile. You create a map name using the crypto ca certificate map command. Refer to the documentation on the crypto ca certificate map command for more information.
Once you have associated map names with connection profiles, you need to enable the tunnel-group-map to use the rules you have configured rather than the default polices described earlier. To do this you must run the tunnel-group-map enable rules command in global configuration mode.
Examples
The following example associates the map name SalesGroup, with rule index 10, to the SalesConnectionProfile connection profile.
hostname(config)# tunnel-group-map SalesGroup 10 SalesConnectionProfile
Related Commands
Command
|
Description
|
crypto ca certificate map [map name]
|
Enters ca certificate map configuration mode and you can use it to create a certificate map name.
|
tunnel-group-map enable
|
Enables certificate-based IKE sessions based on established rules.
|
tunnel-group-map default-group
|
Designates an existing tunnel-group name as the default tunnel group.
|
tunnel-group-map default-group
The tunnel-group-map default-group command specifies the default tunnel-group to use if the name could not be determined using other configured methods.
Use the no form of this command to eliminate a tunnel-group-map.
tunnel-group-map [rule-index] default-group tunnel-group-name
no tunnel-group-map
Syntax Description
Syntax DescriptionSyntax Description
default-group tunnel-group-name
|
Specifies a default tunnel group to use when the name cannot be derived by other configured methods. The tunnel-group name must already exist.
|
rule index
|
Optional. Refers to parameters specified by the crypto ca certificate map command. The values are 1 to 65535.
|
Defaults
The default value for the tunnel-group-map default-group is DefaultRAGroup.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
The tunnel-group-map commands configure the policy and rules by which certificate-based IKE sessions are mapped to tunnel groups. To associate the certificate map entries, created using the crypto ca certificate map command, with tunnel groups, use the tunnel-group-map command in global configuration mode. You can invoke this command multiple times as long as each invocation is unique and you do not reference a map index more than once.
The crypto ca certificate map command maintains a prioritized list of certificate mapping rules. There can be only one map. But this map can have up to 65535 rules. Refer to the documentation on the crypto ca certificate map command for more information.
The processing that derives the tunnel-group name from the certificate ignores entries in the certificate map that are not associated with a tunnel group (any map rule not identified by this command).
Examples
The following example entered in global configuration mode, specifies a default tunnel group to use when the name cannot be derived by other configured methods. The name of the tunnel group to use is group1:
hostname(config)# tunnel-group-map default-group group1
Related Commands
Command
|
Description
|
crypto ca certificate map
|
Enters crypto ca certificate map configuration mode.
|
subject-name (crypto ca certificate map)
|
Identifies the DN from the CA certificate that is to be compared to the rule entry string.
|
tunnel-group-map enable
|
Configures the policy and rules by which certificate-based IKE sessions are mapped to tunnel groups
|
tunnel-group-map enable
The tunnel-group-map enable command configures the policy and rules by which certificate-based IKE sessions are mapped to tunnel groups. Use the no form of this command to restore the default values.
tunnel-group-map [rule-index] enable policy
no tunnel-group-map enable [rule-index]
Syntax Description
Syntax DescriptionSyntax Description
policy
|
Specifies the policy for deriving the tunnel group name from the certificate. Policy can be one of the following:
ike-id—Indicates that if a tunnel-group is not determined based on a rule lookup or taken from the ou, then the certificate-based IKE sessions are mapped to a tunnel group based on the content of the phase1 IKE ID.
ou—Indicates that if a tunnel-group is not determined based on a rule lookup, then use the value of the organizational unit (OU) in the subject distinguished name (DN).
peer-ip—Indicates that if a tunnel-group is not determined based on a rule lookup or taken from the ou or ike-id methods, then use the established peer IP address.
rules—Indicates that the certificate-based IKE sessions are mapped to a tunnel group based on the certificate map associations configured by this command.
|
rule index
|
Optional. Refers to parameters specified by the crypto ca certificate map command. The values are 1 to 65535.
|
Defaults
The default values for the tunnel-group-map command are enable ou and default-group set to DefaultRAGroup.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Global configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
9.0(1)
|
Support for multiple context mode was added.
|
Usage Guidelines
The crypto ca certificate map command maintains a prioritized list of certificate mapping rules. There can be only one map. But this map can have up to 65535 rules. Refer to the documentation on the crypto ca certificate map command for more information.
Examples
The following example enables mapping of certificate-based IKE sessions to a tunnel group based on the content of the phase1 IKE ID:
hostname(config)# tunnel-group-map enable ike-id
The following example enables mapping of certificate-based IKE sessions to a tunnel group based on the established IP address of the peer:
hostname(config)# tunnel-group-map enable peer-ip
The following example enables mapping of certificate-based IKE sessions based on the organizational unit (OU) in the subject distinguished name (DN):
hostname(config)# tunnel-group-map enable ou
The following example enables mapping of certificate-based IKE sessions based on established rules:
hostname(config)# tunnel-group-map enable rules
Related Commands
Command
|
Description
|
crypto ca certificate map
|
Enters CA certificate map mode.
|
subject-name (crypto ca certificate map)
|
Identifies the DN from the CA certificate that is to be compared to the rule entry string.
|
tunnel-group-map default-group
|
Designates an existing tunnel-group name as the default tunnel group.
|
tunnel-limit
To specify the maximum number of GTP tunnels allowed to be active on the ASA, use the tunnel limit command in GTP map configuration mode, which is accessed by using the gtp-map command. Use the no to set the tunnel limit back to its default.
tunnel-limit max_tunnels
no tunnel-limit max_tunnels
Syntax Description
max_tunnels
|
This is the maximum number of tunnels allowed. The ranges is from 1 to 4294967295 for the global overall tunnel limit.
|
Defaults
The default for the tunnel limit is 500.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Gtp map configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
New requests will be dropped once the number of tunnels specified by this command is reached.
Examples
The following example specifies a maximum of 10,000 tunnels for GTP traffic:
hostname(config)# gtp-map qtp-policy
hostname(config-gtpmap)# tunnel-limit 10000
Related Commands
Commands
|
Description
|
clear service-policy inspect gtp
|
Clears global GTP statistics.
|
debug gtp
|
Displays detailed information about GTP inspection.
|
gtp-map
|
Defines a GTP map and enables GTP map configuration mode.
|
inspect gtp
|
Applies a specific GTP map to use for application inspection.
|
show service-policy inspect gtp
|
Displays the GTP configuration.
|
tx-ring-limit
To specify the depth of the priority queues, use the tx-ring-limit command in priority-queue mode. To remove this specification, use the no form of this command.
Note
This command is not supported on ASA 5580 Ten Gigabit Ethernet interfaces. (Ten Gigabit Ethernet interfaces are supported for priority queues on the ASA 5585-X.) This command is also not supported for the ASA 5512-X through ASA 5555-X Management interface.
This command is not supported on the ASA Services Module.
tx-ring-limit number-of-packets
no tx-ring-limit number-of-packets
Syntax Description
number-of-packets
|
Specifies the maximum number of low-latency or normal priority packets allowed into the Ethernet transmit driver before the driver pushes back to the queues on the interface to let them buffer packets until the congestion clears. The range of tx-ring-limit values is 3 through 128 packets on the PIX platform and 3 through 256 packets on the ASA platform.
|
Defaults
The default tx-ring-limit is 128 packets.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
Priority-queue
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.0(1)
|
This command was introduced.
|
Usage Guidelines
The ASA allows two classes of traffic: low-latency queuing (LLQ) for higher priority, latency sensitive traffic (such as voice and video) and best-effort, the default, for all other traffic. The ASA recognizes priority traffic and enforces appropriate Quality of Service (QoS) policies. You can configure the size and depth of the priority queue to fine-tune the traffic flow.
You must use the priority-queue command to create the priority queue for an interface before priority queuing takes effect. You can apply one priority-queue command to any interface that can be defined by the nameif command.
The priority-queue command enters priority-queue mode, as shown by the prompt. In priority-queue mode, you can configure the maximum number of packets allowed in the transmit queue at any given time (tx-ring-limit command) and the number of packets of either type (priority or best -effort) allowed to be buffered before dropping packets (queue-limit command).
Note
You must configure the priority-queue command in order to enable priority queueing for the interface.
The tx-ring-limit and the queue-limit that you specify affect both the higher priority low-latency queue and the best-effort queue. The tx-ring-limit is the number of either type of packets allowed into the driver before the driver pushes back to the queues sitting in front of the interface to let them buffer packets until the congestion clears. In general, you can adjust these two parameters to optimize the flow of low-latency traffic.
Because queues are not of infinite size, they can fill and overflow. When a queue is full, any additional packets cannot get into the queue and are dropped. This is tail drop. To avoid having the queue fill up, you can use the queue-limit command to increase the queue buffer size.
Note
The upper limit of the range of values for the queue-limit and tx-ring-limit commands is determined dynamically at run time. To view this limit, enter help or ? on the command line. The key determinant is the memory needed to support the queues and the memory available on the device. The range of queue-limit values is 0 through 2048 packets. The range of tx-ring-limit values is 3 through 128 packets on the PIX platform and 3 through 256 packets on the ASA platform.
On ASA Model 5505 (only), configuring priority-queue on one interface overwrites the same configuration on all other interfaces. That is, only the last applied configuration is present on all interfaces. Further, if the priority-queue configuration is removed from one interface, it is removed from all interfaces.
To work around this issue, configure the priority-queue command on only one interface. If different interfaces need different settings for the queue-limit and/or tx-ring-limit commands, use the largest of all queue-limits and smallest of all tx-ring-limits on any one interface (CSCsi13132).
Examples
The following example configures a priority queue for the interface named test, specifying a queue limit of 2048 packets and a transmit queue limit of 256 packets.
hostname(config)# priority-queue test
hostname(priority-queue)# queue-limit 2048
hostname(priority-queue)# tx-ring-limit 256
Related Commands
Command
|
Description
|
clear configure priority-queue
|
Removes the current priority queue configuration on the named interface.
|
priority-queue
|
Configures priority queuing on an interface.
|
queue-limit
|
Specifies the maximum number of packets that can be enqueued to a priority queue before it drops data.
|
show priority-queue statistics
|
Shows the priority-queue statistics for the named interface.
|
show running-config priority-queue
|
Shows the current priority queue configuration. If you specify the all keyword, this command displays all the current priority-queue, queue-limit, and tx-ring-limit command configuration values.
|
type echo
To configure the SLA operation as an echo response time probe operation, use the type echo command in SLA monitor configuration mode. To remove the type from teh SLA configuration, use the no form of this command.
type echo protocol ipIcmpEcho target interface if-name
no type echoprotocol ipIcmpEcho target interface if-name
Syntax Description
interface if-name
|
Specifies the interface name, as specified by the nameif command, of the interface used to send the echo request packets. The interface source address is used as the source address in the echo request packets.
|
protocol
|
The protocol keyword. The only value supported is ipIcmpEcho, which specifies using an IP/ICMP echo request for the echo operation.
|
target
|
The IP address or host name of the object being monitored.
|
Defaults
No default behaviors or values.
Command Modes
The following table shows the modes in which you can enter the command:
Command Mode
|
Firewall Mode
|
Security Context
|
Routed
|
Transparent
|
Single
|
Multiple
|
Context
|
System
|
SLA monitor configuration
|
•
|
•
|
•
|
•
|
—
|
Command History
Release
|
Modification
|
7.2(1)
|
This command was introduced.
|
Usage Guidelines
The default size of the payload of the ICMP packets is 28 bytes, creating a total ICMP packet size of 64 bytes. The payload size can be changed using the request-data-size command.
Examples
The following example configures an SLA operation with an ID of 123 that uses an ICMP echo request/response time probe operation. It creates a tracking entry with the ID of 1 to track the reachability of the SLA. The frequency of the SLA operation is set to 10 seconds, the threshold to 2500 milliseconds, and the timeout value us set to 4000 milliseconds.
hostname(config)# sla monitor 123
hostname(config-sla-monitor)# type echo protocol ipIcmpEcho 10.1.1.1 interface outside
hostname(config-sla-monitor-echo)# threshold 2500
hostname(config-sla-monitor-echo)# timeout 4000
hostname(config-sla-monitor-echo)# frequency 10
hostname(config)# sla monitor schedule 123 life forever start-time now
hostname(config)# track 1 rtr 123 reachability
Related Commands
Command
|
Description
|
num-packets
|
Specifies the number of request packets to send during an SLA operation.
|
request-data-size
|
Specifies the size of the payload for the SLA operation request packet.
|
sla monitor
|
Defines an SLA monitoring operation.
|