Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -
Index
Numerics
100BaseTX Ethernet, interface speed6-10
10BaseT Ethernet, interface speed6-10
A
AAA
configuring authorization services3-15
deleting authorization caches8-53
setting system options8-78
setting up accounting3-1
setting up a server for3-15
specifying a server3-18
AAA challenge text See authorization prompt
access control list (ACL) See access list
access group3-23
access list
adding comments3-31, 3-32
binding a group to an interface3-23
configuring CiscoSecure acl attribute3-32
configuring ports7-34
creating3-25
creating for IPSec3-29
downloading3-25, 3-32
generating denied packet syslog message3-33
superceding apply and outbound commands7-34
using RADIUS authorization3-32
using TurboACL3-33
using vendor-specific identifiers3-32
using with IPSec3-35
accounting
providing user-based3-1
setting up3-1
using RADIUS3-1
using TACACS+3-1
ACL See access list
activation key
displaying3-38
updating3-38
ActiveX
aliasing interference3-42
blocking5-37
addressing
assigning global pools7-14
translations7-14, 7-16
Address Resolution Protocol, setting parameters3-43
aliasing
ARP3-43
configuring3-40
DNS system options8-81
interfering with ActiveX blocking3-42
setting overlapping addresses for NAT3-40
specifying for a network3-41
alternate address, ICMP message3-35, 6-9
application inspection See fixup protocol
ARP
aliasing3-43
changing3-43
dislaying the cache3-43
physical addressing3-44
setting the timeout value3-43
authentication
configuring for mail agents and newsreaders3-9
disabling
authentication verification3-13
enabling
authentication verification3-13
using certification authorities (CAs)4-3
using HTTPS3-8
using LOCAL3-3
using RADIUS3-3, 3-10
using SSL3-8
using TACACS+3-3, 3-10
using token-based4-61
using with crypto maps4-61
using with IPSec4-61
authentication, authorization, and accounting See AAA
authorization
enabling or disabling3-13
setting AAA challenge text3-45
using LOCAL3-13
using TACACS+3-13
auto, interface speed6-10
B
buffering
circular4-12
interface allocation6-12
packet capture4-11
C
cabling
status5-31
caching, URL9-10
capture
buffering4-12
copying information4-36
enabling4-11
output formats4-13
selecting options4-12
certificate revocation list (CRL), using4-2
certification authority (CA)
authenticating4-3
configuring the server4-6
declaring4-6
deleting RSA keys4-7
fingerprinting4-2
generating RSA key pairs4-6
including serial number in certificate4-5
obtaining an updated certificate revocation list (CRL)4-4
obtaining certificates4-5
querying a certificate or certificate revocation list (CRL)4-6
revoking certificates4-5
saving data to Flash memory4-6
saving RSA Key pairs and certificates4-6
sending enrollment request4-5
using LDAP (Lightweight Directory Access Protocol)4-6
using PKI protocol4-6
using registration authority (RA) mode4-3
using RSA public key record4-3
changing
firewall prompt label6-6
host name6-6
CiscoSecure 2.1, showing timeout values8-53
Cisco VPN 3000 Client, configuring support for9-31
Cisco VPN Client, setting up support for9-30
clear
auth-prompt3-45
clearing
aaa accounting configuration3-1
AAA server configuration3-18
access group configuration3-23
accounting3-1
alias configuration3-40
ARP configuration3-43
clock settings4-20
commands4-14
configurations4-14
counters4-14
crypto ipsec security associations4-52
ISAKMP configuration6-34
ISAKMP security associations6-34
local host network states8-19
logging6-40
object groups7-27
system buffer8-7
timeout values9-6
user authorization4-15
clients
Oracle SQL*Net5-7
setting up Easy VPN Remote9-28
SQL*Net5-7
VPN4-61
clock4-20
adjusting summer time settings4-20
allowed year range4-21
setting4-20
setting Daylight Savings time4-20
setting time zone4-20
command
clear
auth-prompt3-45
show
auth-prompt3-45
command-line interface (CLI) prompt, changing6-6
command modes
changing2-3
configuration2-3
enabling5-24
exiting7-52
privileged2-3
unprivileged2-3
commands
abbrievating2-2
changing modes2-3
completing2-2
firewall CLI help2-2
conduit
adding or deleting4-22
UDP port mapping4-28
using with RPC4-28
configuration
designating a TFTP server4-32
entering configure mode4-31
restoring factory-default4-30
using configure factory-default command4-33
using IKE mode4-61
using the configure command4-29
configuring
access control7-34
Diffie-Hellman groups6-37
firewall interfaces6-10
interfaces7-13
interface security level7-13
Intrusion Detection System (IDS) signatures6-20
IP addresses6-16
management access7-3
network address translation (NAT)7-14
object groups7-28
PPPoE9-21, 9-23
privilege levels7-50
reverse path verfication6-25
saving configuration9-35
showing running configuration8-36
showing start up configuration8-39
Unicast RPF IP6-25
URL filtering server9-12
VLANs6-11
VPN support9-30
connecting, embryonic limit7-15
connection flags
H.2258-11
H.3238-11
connections, outbound7-33
console
accessing with a serial cable4-33
changing settings9-4
setting a timeout4-33
using a session5-8
conversion error, ICMP message3-35, 6-9
copying
capture information4-36
using HTTP4-35, 4-36
crash, saving information4-38
cryptography engine, running Known Answer Test8-13
crypto ipsec
clearing security associations4-53
creating dynamic map entries4-46
creating security associations4-50
deleting security association4-50
reinitializing security associations4-53
specifying the Security Parameter Index (SPI)4-51
crypto map
creating dynamic entry4-46
creating entries4-57
deleting dynamic entry4-46
deleting entries4-57, 4-63
modifying entries4-63
modifying IPSec-ISAKMP entries4-63
setting PFS4-59
D
daisy-chaining, PIX Firewall units3-9
deleting, authorization caches8-53
deprecated commands
fragguard2-7
session enable2-7
sysopt route dnat2-7
sysopt security fragguard2-7
DHCP
configuring a relay agent5-17
enabling client feature6-18
polling6-16
relaying requests between interfaces5-17
Diffie-Hellman
Group 55-9
selecting a group4-66
setting PFS4-59
Diffie-Hellman groups
configuring6-37
Group 16-35
Group 26-35
Group 56-35, 6-39
disabling, command modes5-20
diskette, using4-32
displaying See showing
Document Organizationx
domain name, changing5-20
downgrading, to a previous version5-56
downloadable3-17
downloadable, access list Seeaccess list
dynamic map
creating5-21
viewing5-21
E
Easy VPN Remote
sending traffic to specified networks9-32
setting up9-27
setting up support for9-30
using with split tunnnelling9-32
echo reply, ICMP message3-35, 6-9
eeprom5-21
EMBLEM, syslog message formatting6-43
embryonic connection limit7-15
enabling
privileged mode5-24
resetting default password5-24
encryption
enabling IPSec6-35
key3-19
established connections
using to permit connections5-26
using XDMCP Support5-28
Ethernet, interface speed6-10
exemption, using MAC-based3-16
exiting, command modes5-29
F
failover
cabling5-31
debugging5-7
flagging5-31
licensing5-31
polling5-32
saving crash information4-38
setting up8-73
using hello packets5-32
file system, Flash memory5-56
filtering
by group5-39
username5-39
fingerprinting, certification authority (CA)4-2
fix7-49
fixup protocol
CTIQBE5-39
DNS5-39
ESP-IKE5-39
FTP5-39
FTPSQL*Net5-39
H.3235-39, 5-43, 5-46
HTTP5-39
ILS5-40
RSH5-39
SIP5-50, 5-51
Skinny5-40
SMTP5-39
VoIP5-43, 5-46
flags, failover5-31
Flash memory5-56
saving data to4-6
writing a configuration to9-35
Flood Defender See floodgaurd
floodguard
disabling5-57
enabling5-57
fragments
managing5-59
NFS compatibility5-59
free memory, showing8-20
full duplex, interface speed6-10
G
global IP addresses, associating a network with7-14
H
H.225
application inspection5-46
connection flag8-11
troubleshooting5-43
H.245
troubleshooting5-47
tunneling5-46
H.323
fixup protocol5-43, 5-46
troubleshooting5-47, 5-48
hardware
ARP addressing3-43
configuring a device ID6-10
setting interface speed6-10
Help, firewall CLI6-4
history, command8-17
host name
changing6-6
IP address aliasing7-11
HTTP
copying files4-35, 4-36
using to download4-35
HTTPS
authenticating3-8
using to copy files4-35, 4-36
I
ICMP
debugging5-6
disabling6-9
enabling6-9
tracing5-8
ICMP messages
network address translation of5-48
ICMP types
interpreting7-30
selecting6-9
selecting conduit options4-27
specifying selective access3-35
using in access lists3-35
IGMP See multicasting
IKE mode, configuring4-61
information reply, ICMP message3-35, 6-9
information request, ICMP message3-35, 6-9
interface cards
interrupt vectors6-13
MAC addresses6-13
interfaces
logical6-11
interfaces, defining for VLANs6-11
interfaces, firewall
binding an access list to3-23
buffer allocation6-12
configuring6-10
configuring management access7-3
displaying parameters6-10
management access7-2
setting interface speed6-10
showing activity8-52
showing duplex status6-13
showing interface speed6-13
shutting down6-12
static or default route7-56
interface speed, setting automatically6-10
Internet Locator Service fixup, and LDAP5-41
Intrusion Detection System (IDS)
configuring signatures6-20
specifying a signature
IP address
host name aliasing7-11
using in certificates4-5
ISAKMP
enabling IPSec6-28, 6-35
negotiating security associations6-28, 6-35
setting keep alive interval6-28
specifying the keep alive lifetime6-29
ISAKMP policy See ISAKMP
K
key, authentication3-19
killing, Telnet sessions6-39
Known Answer Tes (KAT), running8-13
L
LDAP (Lightweight Directory Access Protocol)
fixup protocol5-41
using with a certification authority (CA)4-6
licensing
FO, R, and UR5-31
for failover units5-31
line numbers
examples3-36
remarks3-30
setting3-26
LOCAL3-3, 3-17
local host
displaying detailed information8-18
network states8-18
logging
changing message levels6-45
changing the system message level6-43
configuring time stamps6-42
console6-40
disabling6-40
enabling6-40
history6-40
messages6-40, 6-41
monitoring6-42
queue size6-42
setting facilities6-41
SNMP
specifying a system log (syslog) server6-41
specifying a system log server6-40, 6-41, 6-43
timestamp6-40
logical interfaces6-11
logical interfaces, defining for VLAN6-11
M
MAC address
configuring ARP3-43
exempting a device based on3-16, 7-1
setting as ARP table entry3-43
Mail Guard, rejecting ESMTP commands5-54
mask reply, ICMP message3-35, 6-9
mask request, ICMP message3-35, 6-9
maximum transmission unit (MTU)
showing7-7
specifying7-7
mobile redirection, ICMP message3-35, 6-9
modes, command2-3
monitoring, firewall performance7-47
multicasting
acting as IGMP proxy7-10
configuring a static route7-6
configuring IGMP7-9
enabling support for7-9
enabling through the firewall7-9
routing7-10
routing traffic7-10
subcommands7-9
N
N2H2
caching server requests9-11
specifying as URL filtering server9-12
specifying server parameters9-12
specifying URL filtering server9-13
naming
host name6-6
interfaces7-13
IP addresses7-11
the firewall6-6
NAT
aliasing3-40
configuring7-14
debugging traversal6-33, 6-34
of ICMP messages5-48
setting overlapping addresses3-40
NAT traversal
disabling6-33
enabling6-33
NetRanger See Intrusion Detection System (IDS)
Network Address Translation See NAT
network alias, specifying3-41
O
object grouping
defining7-27
ICMP message types7-31
nesting7-29
networks7-31
protocols7-31
services7-27, 7-31
showing7-30
to apply commands7-27
using7-29
or3-13
OSPF routing
configuring a prefix list7-49
configuring firewall interface parameters7-66
configuring global parameters7-60
redistributing routes7-57
show commands8-22
P
packet capture, enabling4-11
packets
received and sent6-13
tracing5-5
paging, screen
enabling or disabling7-38
specifying the number of lines7-38
parameter problem, ICMP message3-35, 6-9
password
setting for console access7-39
setting for Telnet7-39
PAT (Port Address Translation)
disabling6-2
enabling6-3
limitations5-50
specifying multiple translations6-3
permitting, return connections5-26
physical addressing, ARP3-44
pinging
and ICMP tracing5-6
configurable proxy6-8
IP addresses7-48
using with user authorization3-16
PIX Device Manager (PDM)
commands in firewall configuration7-40
disconnecting7-42
logging7-40
showing PDM sessions7-42
supporting commands7-40
polling, failover5-32
port, outbound7-34
Port Address Translation See PAT
port literals2-3
PPPoE
configuring9-21, 9-23
enabling client functionality6-19
implementing9-18
PPTP
fixup protocol5-41
using with conduits4-28
prefix list entry, configuring7-49
pre-shared key, configuring for VPN9-33
privileged mode, starting5-24
privilege levels
changing between7-51
showing current7-51
prompt
"(config)#"2-3
"#"2-3
">"2-3
protocols, using with port literals2-6
proxy
ARP3-43
pinging6-8
proxy server, using with VoIP5-51
Q
quitting, command modes7-52
R
RADIUS3-3
randomizing, sequence numbers7-16
RAS
fixup protocol5-43, 5-46
H.323 troubleshooting5-48
rebooting See reloading
redirect, ICMP message3-35, 6-9
Related Documentationxi
reloading
firewall configuration from Flash memory7-53
saving configuration changes7-53
without confirmation7-53
route, static or default7-56
router, changing default address sent5-18
router advertisement, ICMP message3-35, 6-9
router solicitation, ICMP message3-35, 6-9
routing, multicast traffic7-6
Routing Information Protocol (RIP)
broadcasting a default route7-54
changing settings7-54
enabling routing table updates7-54
MD5 authentication7-55
version 2 support7-54
RSA key pairs, generating4-6
RSA public key record, using with a certification authority (CA)4-3
running configuration, showing8-36
S
saving
configuration to another location9-35
configuration to Flash memory9-34
crash information4-38
Secure Sockets Layer (SSH)
specifying a host8-66
supporting secure shell8-66
security associations
clearing6-34
creating4-50
deleting4-50
negotiating6-28, 6-35
viewing4-50
security level
assigning7-13
defaults7-13
Security Parameter Index (SPI)
coordinating with peer4-68
specifying4-51
sequence numbers, randomizing7-16
server
specifying a TFTP server9-35
specifying for AAA3-18
server, syslog See logging
services
enabling8-1
handling IDENT connections8-2
session5-51
session initiation protocol (SIP)5-50, 5-51
setting
DHCP polling6-16
IP addresses6-16
show3-45, 8-4
auth-prompt3-45
showing
AAA3-3
AAA configuration3-1
AAA proxy limit3-18
AAA server configuration3-20
aaa-server configuration3-18
access-group configuration3-23
access list configuration3-25
active connections8-10
alias configuration3-40
ARP timeout3-43
authorization configuration3-13
buffer utilization8-7
certification authority (CA) certificates4-1
certification authority (CA) configuration4-1, 4-9
certification authority (CA) identity4-1, 4-9
checksum8-8
command history8-17
command information8-4
current configuration9-34
current privilege levels7-51
filtering displayed output8-4
firewall performance7-47
free memory8-20
interface names7-13
interface parameters6-10
interface transmission activity8-52
local host network states8-18
maximum transmission unit (MTU)6-13, 7-8
object groups7-27
privilege levels7-50
processes8-34
running configuration8-36
software version8-54
start up configuration8-39
system memory utilization8-20
technical support output8-42
Telnet sessions9-34
timeout values9-6
traffic8-52
URL server9-12
SIP
setting protocol timer values9-6
setting timeout values9-6
troubleshooting5-51
SNMP
configuring contact, location, and host information8-63
configuring on the firewall8-61
displaying object ID (OID)8-64
logging
software version, showing8-54
source3-35
source quench, ICMP message3-35, 6-9
split tunnelling, using9-32
spoofing, Unicast RPF IP6-25
SSH, debugging5-7
SSH See also HTTPS
start up configuration, showing8-39
static translations, using8-72
SYN attacks, intercepting8-74
syslog See logging
syslog server
denied packets message3-33
EMBLEM formatting6-41, 6-43
system logging See logging
system options
changing8-77
disabling DNS A record fixups8-78
disabling DNS A record replies8-78
keeping connections in TIME_WAIT state8-78
permitting IPSec packets8-78
permitting IPSec traffic8-78
permitting L2TP/IPSec traffic8-78
permitting PPTP traffic8-78
setting HTTP authentication8-78
T
TACACS3-1
TCP
intercepting SYN messages8-74
limiting embryonic connnections8-74
preventing packet randomization8-71
randomizing packet sequence number7-16, 8-71
returning a reset flag (RST) to the source8-1
Telnet
console debugging5-8
icmp tracing5-8
setting the console timeout9-2
setting the password7-39
showing active sessions9-34
terminating6-39
terminating a session6-39
using a Trace Channel5-8
terminal, changing console settings9-4
terminating, Telnet session6-39
TFTP
configuring a server4-32
saving configuration to another location9-35
specifying a server9-5
time exceeded, ICMP message3-35, 6-9
timestamp reply, ICMP message3-35, 6-9
timestamp request, ICMP message3-35, 6-9
timing out
freeing an RPC slot9-6
setting a maximum idle time9-6
setting translation slot value9-7
tracing, packets5-6
translation
addresses7-16
setting timeout value9-7
setting UDP, RPC, and H.323 timeout values9-7
troubleshooting
CTIQBE fixup5-43
H.3235-47
H.323 RAS5-48
showing connection detail8-12
SIP5-51
Skinny fixups5-52
tunneling
H.2455-46
IPSec8-79
TurboACL
enabling3-33
using3-33
U
UDP
setting idle time until slot is freed9-7
Unicast RPF IP
implementing6-25
spoofing6-25
unreachable, ICMP message3-35, 6-9
URL
caching9-10
configuring filtering server9-12
filtering5-37, 9-10, 9-13
user accounting3-1
user authentication, authorization, and accounting, providing3-3
user authentication See authentication
username, filtering5-39
V
viewing See showing
VLANs, configuring6-11
Voice over IP (VoIP)
fixup protocol5-43, 5-46
SIP fixup5-51
using proxy servers5-51
VoIP
static translation limitation8-74
troubleshooting5-47
VPN
configuring a pre-shared key9-33
configuring support9-30
creating a group policy9-31
downloading a group name9-31
global lifetime timeout values9-33
setting up client server9-27, 9-29
setting up Easy VPN Remote9-27
setting up Easy VPN Remote Server9-28
setting up for support Easy VPN Remote9-30
setting up MAC-based exemption9-27
setting up support for Cisco VPN Client9-30
using remote clients4-61
using split tunnelling9-32
W
Websense5-39
caching server request9-11
specifying as URL filtering server9-12
specifying server parameters9-12
specifying URL filtering server9-13
writing, to Flash memory9-34
X
xlate See translation