Many
Manuals
search
Catégories
Marques
Accueil
Cisco
Systèmes de contrôle d'accès de sécurité
PIX 525
Spécifications
Cisco PIX 525 Spécifications Page 552
Télécharger
Partager
Partage
Ajouter à mon manuel
Imprimer
Page
/
604
Table des matières
DEPANNAGE
MARQUE LIVRES
Noté
.
/ 5. Basé sur
avis des utilisateurs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
C-8
Cisco Sec
urity Appl
iance C
ommand Lin
e Config
uratio
n Guide
OL-6721-01
Appe
ndix
C U
sing
the C
om
man
d-Li
ne Int
erfa
ce
Text Configura
tion Files
1
2
...
547
548
549
550
551
552
553
554
555
556
557
...
603
604
Configuration Guide
1
CONTENTS
3
2 Getting Started 2-1
4
9 Configuring IPv6 9-1
6
11 Configuring Failover 11-1
7
2 Configuring the Firewall
9
14 Applying NAT 14-1
10
Contents
11
OL-6721-01
11
20 Applying QoS Policies 20-1
13
3 Configuring VPN
16
4 System Administration
19
B Sample Configurations B-1
21
About This Guide
23
Related Documentation
24
Document Organization
24
Part 3: Configuring VPN
25
Document Conventions
26
Obtaining Documentation
27
Documentation Feedback
27
Submitting a Service Request
28
Firewall Functional Overview
33
Security Policy Overview
34
Stateful Inspection Overview
36
VPN Functional Overview
37
Security Context Overview
37
Security Context Overview
38
Getting Started
39
Saving Configuration Changes
41
Viewing the Configuration
41
Interface.”
43
Unsupported Features
46
Context Configuration Files
46
Shared Interface Guidelines
51
Cascading Security Contexts
53
Restoring Single Context Mode
55
Configuring Ethernet Settings
57
Configuring Subinterfaces
58
Configuring Subinterfaces
60
Removing a Security Context
65
Changing the Admin Context
65
Reloading a Security Context
67
Monitoring Security Contexts
68
Viewing Resource Usage
69
Security Level Overview
71
Configuring the Interface
72
Security Level
74
Configuring Basic Settings
77
Setting the Hostname
78
Setting the Domain Name
78
Setting the Date and Time
78
Configuring a Static Route
84
Configuring OSPF
85
OSPF Overview
86
Enabling OSPF
87
Adding a Route Map
88
Configuring OSPF NSSA
93
Generating a Default Route
95
Monitoring OSPF
97
Restarting the OSPF Process
97
Configuring RIP
98
Configuring Multicast Routing
99
Enabling Multicast Routing
100
Configuring IGMP Features
100
Configuring Group Membership
101
Changing the IGMP Version
103
Configuring PIM Features
104
Configuring DHCP
106
Configuring DHCP Options
108
Configuring the DHCP Client
110
Configuring IPv6
111
Configuring IPv6 Access Lists
114
The show ipv6 route Command
116
IPv6 Configuration Example
117
AAA Overview
119
About Authentication
120
About Authorization
120
About Accounting
120
Summary of Support
121
RADIUS Server Support
122
TACACS+ Server Support
123
SDI Server Support
124
NT Server Support
125
Kerberos Server Support
125
LDAP Server Support
126
Local Database Support
126
Fallback Support
127
Configuring Failover
133
Failover System Requirements
134
The Failover and State Links
135
State Link
136
Active/Standby Failover
137
Understanding Failover
138
Command Replication
139
Failover Triggers
140
Failover Actions
140
Active/Active Failover
141
Regular and Stateful Failover
145
Failover Health Monitoring
146
Prerequisites
148
Configuring the Primary Unit
150
Configuring Failover Criteria
154
Configure the Primary Unit
157
Configure the Secondary Unit
159
Figure 11-1 ASR Example
163
Configuring Failover
164
Show Failover—Active/Active
169
Viewing Monitored Interfaces
173
Forcing Failover
174
Disabling Failover
175
Monitoring Failover
175
Debug Messages
176
Configuring the Firewall
185
Firewall Mode Overview
187
IP Routing Support
188
Network Address Translation
188
Routed Mode Overview
189
Figure 12-2 Inside to Outside
190
Transparent Mode Overview
194
Transparent Firewall Features
195
Transparent Mode Overview
196
Access List Overview
203
Access List Types and Uses
204
Access List Overview
206
VPN Access (Extended)
207
Access List Guidelines
208
Access Control Implicit Deny
209
Adding a Standard Access List
215
Adding Object Groups
216
Adding a Network Object Group
217
Adding a Service Object Group
217
Nesting Object Groups
219
Displaying Object Groups
221
Removing Object Groups
221
Time Range Options
222
Logging Access List Activity
222
Access List Logging Overview
223
access_list_name
224
Managing Deny Flows
225
Applying NAT
227
Introduction to NAT
228
NAT Control
229
Chapter 14 Applying NAT
230
NAT Overview
230
NAT Types
231
Static NAT
233
Static PAT
233
Figure 14-7 Static PAT
234
Policy NAT
235
Mapped Address Guidelines
239
DNS and NAT
240
Configuring NAT Control
241
Using Dynamic NAT and PAT
242
Global 2: 209.165.201.11
245
NAT 2: 192.168.1.0/24
245
Figure 14-19 Dynamic NAT
248
Figure 14-20 Dynamic PAT
248
Using Static NAT
251
Using Static PAT
252
Bypassing NAT
255
209.165.201.1 209.165.201.1
256
Inside Outside
256
209.165.201.2 209.165.201.2
256
Security
256
Appliance
256
Configuring NAT Exemption
257
NAT Examples
258
Overlapping Networks
259
Redirecting Ports
260
NAT Examples
262
AAA Performance
269
Authentication Overview
270
Applying Filtering Services
281
Filtering ActiveX Objects
282
Filtering Java Applets
283
Filtering Overview
284
General Procedure
285
Filtering HTTP URLs
287
Filtering HTTPS URLs
288
Filtering FTP Requests
289
Viewing Caching Statistics
291
Overview
293
Class Map Example
296
Policy Map Procedure
297
Policy Map Examples
298
Restrictions
299
Action Order
301
Advanced Options
302
Types of Direction Policies
303
Implicit Direction Policies
303
Examples
303
Service Policy and NAT
306
Configuring TCP Normalization
310
Preventing IP Spoofing
311
Configuring the Fragment Size
313
Blocking Unwanted Connections
313
Applying QoS Policies
315
QoS Concepts
316
Identifying Traffic for QoS
317
Classifying Traffic for QoS
318
Defining a QoS Policy Map
320
Applying Rate Limiting
320
Verifying QoS Statistics
322
Activating the Service Policy
323
Applying Low Latency Queueing
323
Configuring Priority Queuing
324
Sizing the Priority Queue
324
Reducing Queue Latency
324
Viewing QoS Statistics
325
How Inspection Engines Work
328
Supported Protocols
329
Managing CTIQBE Inspection
336
Managing FTP Inspection
340
Configuring FTP Inspection
341
Managing GTP Inspection
345
Managing H.323 Inspection
350
Limitations and Restrictions
351
Monitoring H.225 Sessions
354
Monitoring H.245 Sessions
355
Monitoring H.323 RAS Sessions
355
Managing HTTP Inspection
356
Managing MGCP Inspection
359
MGCP Inspection Overview
360
Managing MGCP Inspection
361
Managing RTSP Inspection
365
RTSP Inspection Overview
366
Using RealPlayer
366
Restrictions and Limitations
367
Managing SIP Inspection
369
SCCP Inspection Overview
373
Supporting Cisco IP Phones
374
Managing SNMP Inspection
379
SNMP Inspection Overview
380
Parameters
383
Adding a Static ARP Entry
384
Enabling ARP Inspection
384
MAC Address Table Overview
385
Adding a Static MAC Address
385
Viewing the MAC Address Table
386
Configuring VPN
387
Configuring IPSec and ISAKMP
389
IPSec Overview
390
Configuring ISAKMP
390
ISAKMP Overview
391
Configuring ISAKMP Policies
392
Enabling IPSec over NAT-T
395
Enabling IPSec over TCP
395
Configuring IPSec
399
Understanding Transform Sets
400
Defining Crypto Maps
400
Using Interface Access Lists
401
Configuring IPSec
402
Changing IPSec SA Lifetimes
403
Using Dynamic Crypto Maps
406
Configuring Client Update
412
Configuring Client Update
414
• Group Policies, page 25-10
415
Tunnel Groups
416
IPSec Connection Parameters
417
Configuring Tunnel Groups
418
Group Policies
424
Default Group Policy
425
Configuring Group Policies
426
ACL name
428
Configuring Users
440
Configuring Specific Users
441
Configuring User Attributes
442
Configuring Users
446
Configuring AAA Addressing
448
Configuring DHCP Addressing
449
Summary of the Configuration
451
Configuring Interfaces
452
Outside Interface
453
Configuring an Address Pool
454
Adding a User
454
Creating a Transform Set
454
Defining a Tunnel Group
455
Step 4 Save your changes
456
Step 3 Save your changes
456
Configuring LAN-to-LAN VPNs
459
Configuring an ACL
462
Step 2 Save your changes
465
Configuring Certificates
467
Certificate Scalability
468
About Key Pairs
468
About Trustpoints
469
About CRLs
469
Certificate Configuration
470
Configuring Key Pairs
471
Configuring Trustpoints
472
Obtaining Certificates
474
[ certificate data omitted ]
476
[ PKCS12 data omitted ]
480
System Administration
483
Managing System Access
485
Allowing SSH Access
486
Using an SSH Client
487
Changing the Login Password
487
Recovering from a Lockout
499
Configuring a Login Banner
500
Configurations
501
Entering a New Activation Key
502
Installation Overview
502
Viewing Files in Flash Memory
502
Backing Up the Configuration
506
Using System Log Messages
509
Using SNMP
509
Enabling SNMP
511
Testing Your Configuration
512
Performing Password Recovery
517
Other Troubleshooting Tools
519
Common Problems
520
Supported Platforms
523
Platform Feature Licenses
523
Platform Feature Licenses
524
VPN Specifications
526
Cryptographic Standards
527
VPN Specifications
528
Sample Configurations
529
Figure B-2 Example 2
534
Figure B-3 Example 3
536
APPENDIX
545
Command Modes and Prompts
546
Syntax Formatting
547
Abbreviating Commands
547
Command-Line Editing
547
Command Completion
547
Command Help
548
Filtering show Command Output
548
Command Output Paging
549
Adding Comments
549
Text Configuration Files
550
Line Order
551
Passwords
551
Text Configuration Files
552
Private Networks
554
Subnet Masks
554
Determining the Subnet Mask
555
Class C-Size Network Address
556
Class B-Size Network Address
556
IPv6 Addresses
557
IPv6 Address Types
558
Global Address
559
Site-Local Address
559
Link-Local Address
559
Unspecified Address
560
Loopback Address
560
Interface Identifiers
560
Multicast Address
560
Anycast Address
561
IPv6 Address Prefixes
562
Protocols and Applications
563
TCP and UDP Ports
564
TCP and UDP Ports
565
Local Ports and Protocols
566
ICMP Types
567
ICMP Types
568
Numerics
569
Glossary
570
Commentaires sur ces manuels
Pas de commentaire
Publish
Imprimer le document
Imprimer la page 552
Commentaires sur ces manuels