clear configure through clear configure xlate-bypass Commands
|
|
|
- Calvin Lloyd
- 9 years ago
- Views:
Transcription
1 CHAPTER 6 clear configure through clear configure xlate-bypass s 6-1
2 clear configure Chapter 6 clear configure To clear the running configuration, use the clear configure command in global configuration mode. clear configure {primary secondary all command} Syntax command primary secondary all Clears the configuration for a specified command. For more information, see individual entries in this guide for each clear configure command command. Clears commands related to connectivity, including the following commands: tftp-server shun route ip address mtu failover monitor-interface boot Clears commands not related to connectivity (that are cleared using the primary keyword). Clears the entire running configuration. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was modified to allow you to clear the configuration for each commmand. 6-2
3 Chapter 6 clear configure Usage Guidelines When you enter this command in a security context, you clear only the context configuration. If you enter this command in the system execution space, you clear the system running configuration as well as all context running configurations. Because you cleared all context entries in the system configuration (see the context command), the contexts are no longer running, and you cannot change to a context execution space. Before clearing the configuration, make sure you save any changes to the boot config command (which specifies the startup configuration location) to the startup configuration; if you changed the startup configuration location only in the running configuration, then when you restart, the configuration loads from the default location. The following example clears the entire running configuration: hostname(config)# clear configure all configure http Merges a configuration file from the specified HTTP(S) URL with the running configuration. configure memory Merges the startup configuration with the running configuration. configure net Merges a configuration file from the specified TFTP URL with the running configuration. show running-config Shows the running configuration. 6-3
4 clear configure aaa Chapter 6 clear configure aaa To clear the AAA configuration, use the clear configure aaa command in global configuration mode. The clear configure aaa command removes the AAA command statements from the configuration. clear configure aaa Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear aaa command was introduced. 3.1(1) This command was changed from clear aaa. Usage Guidelines This command also resets the AAA parameters to their default values, if any. hostname(config)# clear configure aaa aaa accounting aaa authentication aaa authorization show running-config aaa Enables or disables accounting. Enables or disables user authentication. Enables or disables user authorization. Displays the AAA configuration. 6-4
5 Chapter 6 clear configure aaa-server clear configure aaa-server To remove all AAA server groups or to clear the specified group, use the clear configure aaa-server command in global configuration mode. clear configure aaa-server [server-tag] clear configure aaa-server [server-tag] host server-ip Syntax server-ip server-tag The IP address of the AAA server. (Optional) Symbolic name of the server group to be cleared. Remove all AAA server groups. Global configuration 1.1(1) The clear aaa-server command was introduced. 3.1(1) This command was changed from clear aaa-server. Usage Guidelines You can specify a particular AAA server group or, by default, all AAA server groups. Use the host keyword to specify a particular server within a server group. This command also resets the AAA server parameters to their default values, if any. Given the following configuration: hostname(config)# aaa-server svrgrp1 protocol sdi hostname(config)# aaa-server svrgrp1 host hostname(config-aaa-server)# timeout 9 hostname(config-aaa-server)# retry 7 hostname(config-aaa-server)# sdi-version sdi-5 hostname(config-aaa-server)# exit several commands and examples follow. The following command shows how to remove a specific server from a group: hostname(config)# clear config aaa-server svrgrp1 host
6 clear configure aaa-server Chapter 6 The following command shows how to remove a server group: hostname(config)# clear config aaa-server svrgrp1 The following command shows how to remove all server groups: hostname(config)# clear config aaa-server aaa-server host Specifies and manages host-specific AAA server connection data. aaa-server protocol Lets you configure AAA server parameters that are group-specific and common to all hosts. show running-config aaa Displays the current maximum number of concurrent proxy connections allowed per user, along with other AAA configuration values. 6-6
7 Chapter 6 clear configure access-group clear configure access-group To remove access groups from all the interfaces, use the clear configure access-group command. clear configure access-group Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear access-group. The following example shows how to remove all access groups: hostname(config)# clear configure access-group access-group show running-config access-group Binds an access list to an interface. Displays the current access group configuration. 6-7
8 clear configure access-list Chapter 6 clear configure access-list To clear an access list from the running configuration, use the clear configure access list command in global configuration mode. clear configure access-list [id] Syntax id (Optional) Name or number of an access list. All the access lists are cleared from the running configuration. Global configuration 3.1(1) This command was introduced. This example shows how to clear the access lists from the running configuration: hostname(config)# clear configure access-list access-list extended access-list standard clear access-list show access-list show running-config access-list Adds an access list to the configuration and configures policy for IP traffic through the firewall. Adds an access list to identify the destination IP addresses of OSPF routes, which can be used in a route map for OSPF redistribution. Clears access list counters. Displays counters for an access list. Displays the access list configuration running on the FWSM. 6-8
9 Chapter 6 clear configure alias clear configure alias To remove all alias commands from the configuration, use the clear configure alias command in global configuration mode. clear configure alias Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear alias. This example shows how to remove all alias commands from the configuration: hostname(config)# clear configure alias alias show running-config alias Translates one address into another. Displays the overlapping addresses with dual NAT commands in the configuration. 6-9
10 clear configure arp Chapter 6 clear configure arp To clear static ARP entries added by the arp command, use the clear configure arp command in global configuration mode. clear configure arp Syntax This command has no arguments or keywords. Global configuration 2.2(1) This command was introduced. 3.1(1) The configure keyword was added. The following example clears static ARP entries from the configuration: hostname# clear configure arp arp arp-inspection firewall transparent show arp statistics show running-config arp Adds a static ARP entry. For transparent firewall mode, inspects ARP packets to prevent ARP spoofing. Sets the firewall mode to transparent. Shows ARP statistics. Shows the current configuration of the ARP timeout. 6-10
11 Chapter 6 clear configure arp-inspection clear configure arp-inspection To clear the ARP inspection configuration, use the clear configure arp-inspection command in global configuration mode. clear configure arp-inspection Syntax This command has no arguments or keywords. Global configuration 2.2(1) This command was introduced. 3.1(1) This command was changed from clear arp-inspection. The following example clears the ARP inspection configuration: hostname# clear configure arp-inspection arp arp-inspection firewall transparent show arp statistics show running-config arp Adds a static ARP entry. For transparent firewall mode, inspects ARP packets to prevent ARP spoofing. Sets the firewall mode to transparent. Shows ARP statistics. Shows the current configuration of the ARP timeout. 6-11
12 clear configure asdm Chapter 6 clear configure asdm To remove all asdm commands from the running configuration, use the clear configure asdm command in global configuration mode. clear configure asdm [location group] Syntax group location (Optional) Clears only the asdm group commands from the running configuration. (Optional) Clears only the asdm location commands from the running configuration. Global configuration 1.1(1) This command was introduced (as the clear pdm command). 3.1(1) This command was changed from the clear pdm command to the clear configure asdm command. Usage Guidelines To view the asdm commands in the running configuration, use the show running-config asdm command. Clearing the asdm location and asdm group commands from the configuration causes ASDM to regenerate those commands the next time ASDM is accessed, but may disrupt active ASDM sessions. Note On FWSMs running in multiple context mode, the clear configure asdm group and clear configure asdm location commands are only available in the user contexts. The following example clears the asdm group commands from the running configuration: hostname(config)# clear configure asdm group hostname(config)# 6-12
13 Chapter 6 clear configure asdm asdm group Used by ASDM to associate object group names with interfaces. asdm location Used by ASDM to record IP address to interface associations. show running-config asdm Displays the asdm commands in the running configuration. 6-13
14 clear configure auth-prompt Chapter 6 clear configure auth-prompt To remove the previously specified authentication prompt challenge text and revert to the default value, if any, use the clear configure auth-prompt command in global configuration mode. clear configure auth-prompt Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear auth-prompt command was introduced. 3.1(1) This command was changed from clear auth-prompt. Usage Guidelines After you clear the authentication prompt, the prompt users see when they log in depends on the protocol they use: Users who log in using HTTP see the following prompt: HTTP Authentication. Users who log in using FTP see the following prompt: FTP Authentication. Users who log in using Telnet see no prompt. The following example shows how to clear the auth-prompt: hostname(config)# clear configure auth-prompt auth-prompt show running-config auth-prompt Sets the user authorization prompts. Displays the user authorization prompts. 6-14
15 Chapter 6 clear configure auto-update clear configure auto-update To clear the Auto Update Server configuration, use the clear configure auto-update command in global configuration mode. clear configure auto-update Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example clears the ARP inspection configuration: hostname# clear configure auto-update auto-update device-id auto-update poll-period auto-update server auto-update timeout show running-config auto-update Sets the FWSM device ID for use with an Auto Update Server. Sets how often the FWSM checks for updates from an Auto Update Server. Identifies the Auto Update Server. Stops traffic from passing through the FWSM if the Auto Update Server is not contacted within the timeout period. Shows the Auto Update Server configuration. 6-15
16 clear configure banner Chapter 6 clear configure banner To remove all the banners, use the clear configure banner command in global configuration mode. clear configure banner Syntax This command has no arguments or keywords. Global configuration 2.2(1) The clear banner command was introduced. 3.1(1) This command was changed to clear configure banner. The following example shows how to clear banners: hostname(config)# clear configure banner banner show running-config banner Configures the session, login, or message-of-the-day banner. Displays all banners. 6-16
17 Chapter 6 clear configure ca certificate map clear configure ca certificate map To remove all certificate map entries or to remove a specified certificate map entry, use the clear configure ca configurate map command in global configuration mode. clear configure ca certificate map [sequence-number] Syntax sequence-number (Optional) Specifies a number for the certificate map rule you are removing. The range is 1 through Global configuration 3.1(1) This command was introduced. The following example removes all certificate map entries. hostname(config)# clear configure ca certificate map hostname(config)# crypto ca certificate map Enters CA certificate map mode. 6-17
18 clear configure class Chapter 6 clear configure class To clear the class configuration, use the clear configure class command in global configuration mode. clear configure class Syntax This command has no arguments or keywords. Global configuration N/A N/A 2.2(1) This command was introduced. 3.1(1) This command was changed from clear class. The following example clears the class configuration: hostname(config)# clear configure class class context limit-resource member show class Configures a resource class. Configures a security context. Sets the resource limit for a class. Assigns a context to a resource class. Shows the contexts assigned to a class. 6-18
19 Chapter 6 clear configure class-map clear configure class-map To remove all class maps, use the clear configure class-map command in global configuration mode. clear configure class-map Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines To clear the class map for a specific class map name, use the no form of the class-map command. The following example shows how to clear all configured class-maps: hostname(config)# clear configure class-map class-map show running-config class-map Applies a traffic class to an interface. Displays the information about the class map configuration. 6-19
20 clear configure command-alias Chapter 6 clear configure command-alias To remove all non-default command aliases, use the clear configure command-alias command in global configuration mode. clear configure command-alias Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example shows how to remove all non-default command aliases: hostname(config)# clear configure command-alias command-alias show running-config command-alias Creates a command alias. Displays all non-default command aliases. 6-20
21 Chapter 6 clear configure console clear configure console To reset the console connection settings to defaults, use the clear configure console command in global configuration mode. clear configure console Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example shows how to reset the console connection settings to defaults: hostname(config)# clear configure console console timeout show running-config console timeout Sets the idle timeout for a console connection to the FWSM. Displays the idle timeout for a console connection to the FWSM. 6-21
22 clear configure context Chapter 6 clear configure context To clear all context configurations in the system configuration, use the clear configure context command in global configuration mode. clear configure context [noconfirm] Syntax noconfirm (Optional) Removes all contexts without prompting you for confirmation. This option is useful for automated scripts. Global configuration N/A N/A 2.2(1) This command was introduced. 3.1(1) This command was changed from clear context. Usage Guidelines This command lets you remove all contexts, including the admin context. The admin context cannot be removed using the no context command, but can be removed using the clear configure context command. The following example removes all contexts from the system configuration, and does not confirm the deletion: hostname(config)# clear configure context noconfirm admin-context changeto context Sets the admin context. Changes between contexts or the system execution space. Creates a security context in the system configuration and enters context configuration mode. 6-22
23 Chapter 6 clear configure context mode show context Sets the context mode to single or multiple. Shows a list of contexts (system execution space) or information about the current context. 6-23
24 clear configure crypto Chapter 6 clear configure crypto To remove the entire crypto configuration, including IPSec, crypto maps, dynamic crypto maps, CA trustpoints, all certificates, certificate map configurations, and ISAKMP, use the clear configure crypto command in global configuration mode. To remove specific configurations, use this command with keywords as shown in the syntax. Take caution when using this command. clear configure crypto [ca dynamic-map ipsec iskamp map] Syntax ca dynamic-map ipsec isakmp map Removes certification authority policy. Removes dynamic crypto map configuration. Removes IPSec configuration. Removes ISAKMP configuration. Removes crypto map configuration. Global configuration 3.1(1) This command was introduced. The following example issued in global configuration mode, removes all of the crypto configuration from the FWSM: hostname(config)# clear configure crypto hostname(config)# clear configure crypto Clears all or specified crypto dynamic maps from the configuration. dynamic-map clear configure crypto map Clears all or specified crypto maps from the configuration. clear configure isakmp policy Clears all ISAKMP policy configuration. show running-config crypto Displays the entire crypto configuration, including IPSec, crypto maps, dynamic crypto maps, and ISAKMP. 6-24
25 Chapter 6 clear configure crypto ca trustpoint clear configure crypto ca trustpoint To remove all trustpoints from the configuration, use the clear configure crypto ca trustpoint command in global configuration mode. clear configure crypto ca trustpoint Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example entered in global configuration mode, removes all trustpoints from the configuration: hostname(config)# clear configure crypto ca trustpoint hostname(config)# crypto ca trustpoint Enters the trustpoint subconfiguration level for the indicated trustpoint. 6-25
26 clear configure crypto dynamic-map Chapter 6 clear configure crypto dynamic-map To remove all or specified crypto dynamic maps from the configuration, use the clear configure crypto dynamic-map command in global configuration mode. clear configure crypto dynamic-map dynamic-map-name dynamic-seq-num Syntax dynamic-map-name dynamic-seq-num Specifies the name of a specific crypto dynamic map. Specifies the sequence number of the crypto dynamic map. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear crypto dynamic-map. The following example entered in global configuration mode, removes the crypto dynamic map mymaps with sequence number 3 from the configuration: hostname(config)# clear configure crypto dynamic-map mymaps 3 hostname(config)# clear configure crypto map show running-config crypto dynamic-map show running-config crypto map Clears the configuration of all or specified crypto maps. Displays all the active configuration for all dynamic crypto maps. Displays all the active configuration for all crypto maps. 6-26
27 Chapter 6 clear configure crypto map clear configure crypto map To remove all or specified crypto maps from the configuration, use the clear configure crypto map command in global configuration mode. clear configure crypto map map-name seq-num Syntax map-name seq-num Specifies the name of a specific crypto map. Specifies the sequence number of the crypto map. Global configuration 3.1(1) This command was introduced. The following example entered in global configuration mode, removes the crypto map mymaps with sequence number 3 from the configuration: hostname(config)# clear configure crypto map mymaps 3 hostname(config)# clear configure crypto dynamic-map crypto map interface show running-config crypto map show running-config crypto dynamic-map Clears the configuration of all or specified crypto dynamic maps. Applies a crypto map to an interface. Displays the active configuration for all crypto maps. Displays the active configuration for all dynamic crypto maps. 6-27
28 clear configure dhcpd Chapter 6 clear configure dhcpd To clear all of the DHCP server commands, binding, and statistics, use the clear configure dhcpd command in global configuration mode. clear configure dhcpd Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure dhcpd command clears all of the dhcpd commands, bindings, and statistical information. To clear only the statistic counters or binding information, use the clear dhcpd command. The following example shows how to clear all dhcpd commands: hostname(config)# clear configure dhcpd clear dhcpd show running-config dhcpd Clears the DHCP server bindings and statistic counters. Displays the current DHCP server configuration. 6-28
29 Chapter 6 clear configure dhcprelay clear configure dhcprelay To clear all of the DHCP relay configuration, use the clear configure dhcprelay command in global configuration mode. clear configure dhcprelay Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure dhcprelay command clears the DHCP relay statistics and configuration. To clear only the DHCP statistic counters, use the clear dhcprelay statistics command. The following example shows how to clear the DHCP relay configuration: hostname(config)# clear configure dhcprelay clear dhcprelay statistics debug dhcprelay show dhcprelay statistics show running-config dhcprelay Clears the DHCP relay agent statistic counters. Displays debug information for the DHCP relay agent. Displays DHCP relay agent statistic information. Displays the current DHCP relay agent configuration. clear configure dns To clear all DNS commands, use the clear configure dns command in global configuration mode. 6-29
30 clear configure dns Chapter 6 clear configure dns Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example clears all DNS commands: hostname(config)# clear configure dns dns domain-lookup dns name-server dns retries dns timeout show dns-hosts Enables the FWSM to perform a name lookup. Configures a DNS server address. Specifies the number of times to retry the list of DNS servers when the FWSM does not receive a response. Specifies the amount of time to wait before trying the next DNS server. Shows the DNS cache. 6-30
31 Chapter 6 clear configure established clear configure established To remove all established commands, use the clear configure established command in global configuration mode. clear configure established Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear established. Usage Guidelines To remove an established connection created by the established command, enter the clear local-hosts command. This example shows how to remove established commands: hostname(config)# clear configure established established show running-config established clear local-hosts Permits return connections on ports that are based on an established connection. Displays the allowed inbound connections that are based on established connections. Clears the current connections. 6-31
32 clear configure failover Chapter 6 clear configure failover To remove failover commands from the configuration and restore the defaults, use the clear configure failover command in global configuration mode. clear configure failover Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced (as clear failover). 3.1(1) was changed from clear failover to clear configure failover. Usage Guidelines This command clears all failover commands from the running configuration and restores the defaults. If you use the all keyword with the show running-config failover command, you will see the default failover configuration. The clear configure failover command is not available in a security context in multiple configuration mode; you must enter the command in the system execution space. The following example clears all failover commands from the configuration: hostname(config)# clear configure failover hostname(config)# show running-configuration failover no failover show running-config failover Displays the failover commands in the running configuration. 6-32
33 Chapter 6 clear configure filter clear configure filter To clear URL, FTP, and HTTPS filtering configuration, use the clear configure filter command in global configuration mode. clear configure filter Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear filter. Usage Guidelines The clear configure filter command clears the URL, FTP, and HTTPS filtering configuration. The following example clears the URL, FTP, and HTTPS filtering configuration: hostname# clear configure filter s filter ftp filter https filter url show running-config filter url-server Identifies the FTP traffic to be filtered by a URL filtering server. Identifies the HTTPS traffic to be filtered by a Websense server. Directs traffic to a URL filtering server. Displays the filtering configuration. Identifies an N2H2 or Websense server for use with the filter command. 6-33
34 clear configure firewall Chapter 6 clear configure firewall To set the firewall mode to the default routed mode, use the clear configure firewall command in global configuration mode. clear configure firewall Syntax This command has no arguments or keywords. Global configuration 2.2(1) This command was introduced. 3.1(1) In multiple context mode, you can enter this command within a context only. Previously, you entered it in the system execution space. This command was also changed from clear firewall. The following example sets the firewall mode to the default: hostname(config)# clear configure firewall arp firewall transparent show arp statistics show running-config arp Adds a static ARP entry. Sets the firewall mode to transparent. Shows ARP statistics. Shows the current configuration of the ARP timeout. 6-34
35 Chapter 6 clear configure fixup clear configure fixup To clear the fixup configuration, use the clear configure fixup command in global configuration mode. clear configure fixup Global configuration 1.1(1) The clear fixup command was introduced. 3.1(1) This command was changed from clear fixup. Usage Guidelines The clear configure fixup command removes the fixup configuration. The following example clears the fixup configuration: hostname# clear configure fixup s class-map policy-map Defines the traffic class to which to apply security actions. Associates a class map with specific security actions. 6-35
36 clear configure fragment Chapter 6 clear configure fragment To reset all the IP fragment reassembly configurations to defaults, use the clear configure fragment command in global configuration mode. clear configure fragment [interface] Syntax interface (Optional) Specifies the FWSM interface. If an interface is not specified, the command applies to all interfaces. Global configuration 1.1(1) The clear fragment command was introduced. 3.1(1) The configure keyword and optional interface argument were added. The command was also separated into two commands, clear fragment and clear configure fragment, to separate clearing of the configuration data from the operational data. Usage Guidelines The clear configure fragment command resets all the IP fragment reassembly configurations to defaults. In addition, the the chain, size, and timeout keywords are reset to their default values, which are as follows: chain is 24 packets size is 200 timeout is 5 seconds 6-36
37 Chapter 6 clear configure fragment This example shows how to reset all the IP fragment reassembly configurations to defaults: hostname(config)# clear configure fragment clear fragment Clears the operational data of the IP fragment reassembly module. fragment Provides additional management of packet fragmentation and improves compatibility with NFS. show fragment Displays the operational data of the IP fragment reassembly module. show running-config fragment Displays the IP fragment reassembly configuration. 6-37
38 clear configure ftp Chapter 6 clear configure ftp To clear the FTP configuration, use the clear configure ftp command in global configuration mode. clear configure ftp Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure ftp command clears the FTP configuration. The following example clears the FTP configuration: hostname# clear configure filter s filter ftp filter https filter url show running-config filter url-server Identifies the FTP traffic to be filtered by a URL filtering server. Identifies the HTTPS traffic to be filtered by a Websense server. Directs traffic to a URL filtering server. Displays the filtering configuration. Identifies an N2H2 or Websense server for use with the filter command. 6-38
39 Chapter 6 clear configure ftp-map clear configure ftp-map To clear the FTP map configuration, use the clear configure ftp-map command in global configuration mode. clear configure ftp-map Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure ftp-map command removes the FTP map configuration. The following example clears the FTP map configuration: hostname# clear configure ftp-map s class-map ftp-map inspect ftp request-command deny Defines the traffic class to which to apply security actions. Defines an FTP map and enables FTP map configuration mode. Applies a specific FTP map to use for application inspection. Specifies FTP commands to disallow. 6-39
40 clear configure global Chapter 6 clear configure global To remove the global commands from the configuration, use the clear configure global command in global configuration mode. clear configure global Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear global. The following example shows how to remove the global commands from the configuration: hostname(config)# clear configure global global show running-config global Creates entries from a pool of global addresses. Displays the global commands in the configuration. 6-40
41 Chapter 6 clear configure group-policy clear configure group-policy To remove the configuration for a particular group policy, use the clear configure group-policy command in global configuration mode, and append the name of the group policy. To remove all group-policy commands from the configuration except the default group policy, use this command without arguments. clear configure group-policy [name] Syntax name Specifies the name of the group policy. Remove all group-policy commands from the configuration, except the default group policy. Global configuration 3.1(1) This command was introduced. The following example shows how to clear the configuration for the group policy named FirstGroup. hostname(config)# clear configure group-policy FirstGroup group-policy group-policy attributes show running-config group-policy Creates, edits, or removes a group policy. Enters group-policy attributes mode, which lets you configure AVPs for a specified group policy. Displays the running configuration for a particular group policy or for all group policies. 6-41
42 clear configure gtp-map Chapter 6 clear configure gtp-map To clear GTP map configuration, use the clear configure gtp-map command in global configuration mode. clear configure gtp-map Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure gtp -map command removes the GTP map configuration. The following example clears GTP map configuration: hostname# clear configure gtp-map s clear service-policy inspect gtp debug gtp gtp-map inspect gtp show service-policy inspect gtp Clears global GTP statistics. Displays detailed information about GTP inspection. Defines a GTP map and enables GTP map configuration mode. Applies a specific GTP map to use for application inspection. Displays the GTP configuration. 6-42
43 Chapter 6 clear configure hostname clear configure hostname To reset the hostname to the default, use the clear configure hostname command in global configuration mode. clear configure hostname Syntax This command has no arguments or keywords. The default hostname is FWSM. Global configuration 1.1(1) This command was introduced. 3.1(1) The configure keyword was added. The following example clears the hostname: hostname(config)# clear configure hostname banner domain-name hostname Sets a login, message of the day, or enable banner. Sets the default domain name. Sets the hostname for the FWSM. 6-43
44 clear configure http Chapter 6 clear configure http To disable the HTTP server and to remove configured hosts that can access the HTTP server, use the clear configure http command in global configuration mode. clear configure http Global configuration Preexisting This command was preexisting. The following example shows how to clear the HTTP configuration. hostname(config)# clear configure http http Specifies hosts that can access the HTTP server by IP address and subnet mask. Specifies the FWSM interface through which the host accesses the HTTP server. http authentication-certificate Requires authentication via certificate from users who are establishing HTTPS connections to the FWSM. http server enable Enables the HTTP server. show running-config http Displays the hosts that can access the HTTP server, and whether or not the HTTP server is enabled. 6-44
45 Chapter 6 clear configure http-map clear configure http-map To clear HTTP map configuration, use the clear configure http-map command in global configuration mode. clear configure http-map Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure http-map command removes the HTTP map configuration. The following example clears the HTTP map configuration: hostname# clear configure http-map s class-map debug http-map http-map inspect http policy-map Defines the traffic class to which to apply security actions. Displays detailed information about traffic associated with an HTTP map. Defines an HTTP map for configuring enhanced HTTP inspection. Applies a specific HTTP map to use for application inspection. Associates a class map with specific security actions. 6-45
46 clear configure icmp Chapter 6 clear configure icmp To clear the configured access rules for ICMP traffic, use the clear configure icmp command in global configuration mode. clear configure icmp Global configuration 3.1(1) Support for this command was introduced. Usage Guidelines The clear configure icmp command clears the configured access rules for ICMP traffic. The following example clears the clear configured access rules for ICMP traffic: hostname# clear configure icmp s clear configure icmp debug icmp show icmp timeout icmp Clears the ICMP configuration. Enables the display of debug information for ICMP. Displays ICMP configuration. Configures the idle timeout for ICMP. 6-46
47 Chapter 6 clear configure interface clear configure interface To clear the interface configuration, use the clear configure interface command in global configuration mode. clear configure interface[mapped_name interface_name] Syntax interface_name mapped_name (Optional) Identifies the interface name set with the nameif command. (Optional) In multiple context mode, identifies the mapped name if it was assigned using the allocate-interface command. If you do not specify an interface, the FWSM clears all interface configuration. Global configuration 3.1(1) This command was introduced. Usage Guidelines You cannot use the interface name in the system execution space, because the nameif command is only available within a context. Similarly, if you mapped the interface ID to a mapped name using the allocate-interface command, you can only use the mapped name in a context. The following example clears the interface configuration: hostname(config)# clear configure interface The following example clears the inside interface configuration: hostname(config)# clear configure interface inside The following example clears the int1 interface configuration in a context. int1 is a mapped name. hostname/contexta(config)# clear configure interface int1 The following example clears all interface configuration. hostname(config)# clear configure interface 6-47
48 clear configure interface Chapter 6 allocate-interface Assigns interfaces and subinterfaces to a security context. clear interface Clears counters for the show interface command. interface Configures an interface and enters interface configuration mode. show interface Displays the runtime status and statistics of interfaces. 6-48
49 Chapter 6 clear configure interface bvi clear configure interface bvi To clear the bridge virtual interface configuration, use the clear configure interface bvi command in global configuration mode. clear configure interface bvi bridge_group_number Syntax bridge_group_number Specifies the bridge group number as an integer between 1 and 100. Global configuration 3.1(1) This command was introduced. The following example clears the interface configuration for bridge group 1: hostname(config)# clear configure interface bvi 1 bridge-group interface interface bvi ip address show running-config interface bvi Groups two transparent firewall interfaces into a bridge group. Configures an interface. Enters the interface configuration mode for a bridge group so you can set the management IP address. Sets the management IP address for a bridge group. Shows the bridge group interface configuration. 6-49
50 clear configure ip Chapter 6 clear configure ip To clear all IP addresses set by the ip address command, use the clear configure ip command in global configuration mode. clear configure ip Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines In transparent firewall mode, this command clears the management IP address for the bridge groups. If you want to stop all current connections that use the old IP addresses, enter the clear local-hosts command. Otherwise, the connections time out as usual. The following example clears all IP addresses: hostname(config)# clear configure ip allocate-interface Assigns interfaces and subinterfaces to a security context. clear configure interface Clears all configuration for an interface. interface Configures an interface and enters interface configuration mode. ip address Sets the IP address for the interface. show running-config interface Displays the interface configuration. 6-50
51 Chapter 6 clear configure ip local pool clear configure ip local pool To remove IP address pools, use the clear configure ip local pool command in global configuration mode. clear ip local pool [poolname] Syntax poolname (Optional) Specifies the name of the IP address pool. Global configuration 3.1(1) Support for this command was introduced. The following example removes all IP address pools from the running configuration: hostname(config)# clear config ip local pool hostname(config)# clear configure ip local pool ip local pool Removes all ip local pools. Configures an IP address pool. 6-51
52 clear configure ip verify reverse-path Chapter 6 clear configure ip verify reverse-path To clear the ip verify reverse-path configuration, use the clear configure ip verify reverse-path command in global configuration mode. clear configure ip verify reverse-path Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear ip verify reverse-path command was introduced. 3.1(1) This command was changed to clear configure ip verify reverse-path. The following example clears the ip verify reverse-path configuration for all interfaces: hostname(config)# clear configure ip verify reverse-path clear ip verify statistics ip verify reverse-path show ip verify statistics show running-config ip verify reverse-path Clears the Unicast RPF statistics. Enables the Unicast Reverse Path Forwarding feature to prevent IP spoofing. Shows the Unicast RPF statistics. Shows the ip verify reverse-path configuration. 6-52
53 Chapter 6 clear configure ipv6 clear configure ipv6 To clear the global IPv6 commands from the running configuration, use the clear configure ipv6 command in global configuration mode. clear configure ipv6 [route access-list] Syntax route access-list (Optional) Clears the commands that statically define routes in the IPv6 routing table from the running configuration. (Optional) Clears the IPv6 access list commands from the running configuration. Without keywords, this command clears all IPv6 commands from the running configuration. Global configuration 3.1(1) This command was introduced. Usage Guidelines This command only clears the global IPv6 commands from the running configuration; it does not clear the IPv6 commands entered in interface configuration mode. The following example shows how to clear statically defined IPv6 routes from the IPv6 routing table: hostname(config)# clear configure ipv6 route hostname(config)# ipv6 route show ipv6 route show running-config ipv6 Defines a static route in the IPv6 routing table. Displays the contents of the IPv6 routing table. Displays the IPv6 commands in the running configuration. 6-53
54 clear configure isakmp Chapter 6 clear configure isakmp To remove all of the ISAKMP configuration, use the clear configure isakmp command in global configuration mode. clear configure isakmp Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example issued in global configuration mode, removes all of the ISAKMP configuration from the FWSM: hostname(config)# clear configure isakmp hostname(config)# clear configure isakmp policy isakmp enable show isakmp stats show isakmp sa show running-config isakmp Clears all ISAKMP policy configuration. Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the FWSM. Displays runtime statistics. Displays IKE runtime SA database with additional information. Displays all the active configuration. 6-54
55 Chapter 6 clear configure isakmp policy clear configure isakmp policy To remove all of the ISAKMP policy configuration, use the clear configure isakmp policy command in global configuration mode. clear configure isakmp policy priority Syntax priority Specifies the priority of the ISAKMP priority to be cleared. Global configuration 3.1(1) This command was introduced. The following example removes the ISAKMP policy with priority 3 from the configuration: hostname(config)# clear configure isakmp policy 3 hostname(config)# isakmp enable show isakmp stats show isakmp sa show running-config isakmp Enables ISAKMP negotiation on the interface on which the IPSec peer communicates with the FWSM. Displays runtime statistics. Displays IKE runtime SA database with additional information. Displays all the active configuration. 6-55
56 clear configure logging Chapter 6 clear configure logging To clear the logging configuration, use the clear configure logging command in global configuration mode. clear configure logging [disabled level] Syntax disabled level (Optional) Indicates that all disabled system log messages should be reenabled. When you use this option, no other logging configuration is cleared. (Optional) Indicates that the severity level assignments for system log messages should be reset to their default values. When you use this option, no other logging configuration is cleared. Global configuration 3.1(1) This command was introduced. Usage Guidelines You can use the show running-config logging command to view all logging configuration settings. If you use the clear configure logging command without either the disabled or level keyword, all logging configuration settings are cleared. The following example shows how to clear logging configuration. The output of the show logging command indicates that all logging features are disabled. hostname(config)# clear configure logging hostname(config)# show logging Syslog logging: disabled Facility: 20 Timestamp logging: disabled Standby logging: disabled Deny Conn when Queue Full: disabled Console logging: disabled Monitor logging: disabled Buffer logging: disabled Trap logging: disabled 6-56
57 Chapter 6 clear configure logging History logging: disabled Device ID: disabled Mail logging: disabled ASDM logging: disabled show logging Displays the enabled logging options. show running-config logging Displays the logging-related portion of the running configuration. 6-57
58 clear configure logging rate-limit Chapter 6 clear configure logging rate-limit To reset the logging rate limit, use the clear configure logging rate-limit command in global configuration mode. clear configure logging rate-limit Syntax T This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example shows how to reset the logging rate limit: hostname(config)# clear configure logging rate-limit After the information is cleared, nothing more displays until the hosts reestablish their connections. logging rate limit show running config logging rate-limit Limits the rate at which system log messages are generated. Shows the current logging rate limit setting. 6-58
59 Chapter 6 clear configure mac-address-table clear configure mac-address-table To clear the mac-address-table static and mac-address-table aging-time configuration, use the clear configure mac-address-table command in global configuration mode. clear configure mac-address-table Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example clears the mac-address-table static and mac-address-table aging-time configuration: hostname# clear configure mac-address-table firewall transparent mac-address-table aging-time mac-address-table static mac-learn show mac-address-table Sets the firewall mode to transparent. Sets the timeout for dynamic MAC address entries. Adds static MAC address entries to the MAC address table. Disables MAC address learning for an interface. Shows the MAC address table, including dynamic and static entries. 6-59
60 clear configure mac-learn Chapter 6 clear configure mac-learn To clear the mac-learn configuration, use the clear configure mac-learn command in global configuration mode. clear configure mac-learn Syntax This command has no arguments or keywords. Global configuration 2.2(1) This command was introduced. 3.1(1) This command was changed from clear mac-learn. The following example clears the mac-learn configuration: hostname# clear configure mac-learn firewall transparent mac-address-table static mac-learn show mac-address-table Sets the firewall mode to transparent. Adds static MAC address entries to the MAC address table. Disables MAC address learning for an interface. Shows the MAC address table, including dynamic and static entries. 6-60
61 Chapter 6 clear configure mac-list clear configure mac-list To remove the indicated list of MAC addresses, previously specified the mac-list command, use the clear configure mac-list command in global configuration mode: clear configure mac-list id Syntax id A MAC address list name. No default behaviors or values. Global configuration 3.1(1) This command was introduced. Usage Guidelines To remove a list of MAC addresses, use the clear mac-list command. The following example shows how to clear a MAC address list: hostname(config)# clear configure mac-list firstmaclist mac-list show running-config mac-list Adds a list of MAC addresses using a first-match search. Displays the MAC addresses in the MAC address list indicated by the id value. 6-61
62 clear configure management-access Chapter 6 clear configure management-access To remove the configuration of an internal interface for management access of the FWSM, use the clear configure management-access command in global configuration mode. clear configure management-access Syntax This command has no arguments or keywords. Global configuration 3.1(1) The keyword configure was added. Usage Guidelines The management-access command lets you define an internal management interface using the IP address of the firewall interface specified in mgmt_if. (The interface names are defined by the nameif command and displayed in quotes,, in the output of the show interface command.) The clear configure management-access command removes the configuration of the internal management interface specified with the management-access command. The following example removes the configuration of an internal interface for management access of the FWSM: hostname(config)# clear configure management-access management-access show running-config management-access Configures an internal interface for management access. Displays the name of the internal interface configured for management access. 6-62
63 Chapter 6 clear configure mgcp-map clear configure mgcp-map To clear the MGCP map configuration, use the clear configure mgcp-map command in global configuration mode. clear configure mgcp-map Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure mgcp-map clears the MGCP map configuration. The following example clears clear the MGCP map configuration: hostname# clear configure mgcp-map s debug mgcp mgcp-map show conn show mgcp Enables MGCP debug information. Defines an MGCP map and enables MGCP map configuration mode. Displays the connection state for different connection types. Displays information about MGCP sessions established through the FWSM. 6-63
64 clear configure monitor-interface Chapter 6 clear configure monitor-interface To remove all monitor-interface commands from the running configuration and restore the default interface health monitoring, use the clear configure monitor-interface command in global configuration mode. clear configure monitor-interface Syntax This command has no arguments or keywords. Global configuration 2.2(1) This command was introduced. Usage Guidelines By default, virtual interfaces are not monitored for failover. Using the clear monitor-interface command clears the monitor-interface commands from the running configuration. To view the monitor-interface commands in the running configuration, use the show running-config monitor-interface command. The following example clears the monitor-interface commands from the running configuration: hostname(config)# clear configure monitor-interface hostname(config)# monitor-interface show running-config monitor-interface Enables health monitoring of a designated interface for failover purposes. Displays the monitor-interface commands in the running configuration. 6-64
65 Chapter 6 clear configure mroute clear configure mroute To remove the mroute commands from the running configuration, use the clear configure mroute command in global configuration mode. clear configure mroute Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example shows how to remove the mroute commands from the configuration: hostname(config)# clear configure mroute hostname(config)# mroute show mroute show running-config mroute Configures a static multicast route. Displays IPv4 multicast routing table. Displays configured multicast routes. 6-65
66 clear configure mtu Chapter 6 clear configure mtu To clear the configured maximum transmission unit values on all interfaces, use the clear configure mtu command in global configuration mode. clear configure mtu Syntax This command has no arguments or keywords. Using the clear configure mtu command sets the maximum transmission unit to the default of 1500 for all Ethernet interfaces. Global configuration 3.1(1) This command was introduced. The following example clears the current maximum transmission unit values on all interfaces: hostname(config)# clear configure mtu mtu show running-config mtu Specifies the maximum transmission unit for an interface. Displays the current maximum transmission unit block size. 6-66
67 Chapter 6 clear configure multicast-routing clear configure multicast-routing To remove the multicast-routing command from the running configuration, use the clear configure multicast-routing command in global configuration mode. clear configure multicast-routing Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure multicast-routing command removes the multicast-routing from the running configuration. The no multicast-routing command also removes the multicast-routing command from the running configuration. The following example shows how to remove the multicast-routing command from the running configuration: hostname(config)# clear configure multicast-routing multicast-routing Enables multicast routing on the FWSM. 6-67
68 clear configure name Chapter 6 clear configure name To clear the list of names from the configuration, use the clear configure name command in global configuration mode. clear configure name Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear name command was introduced. 3.1(1) This command was changed to clear configure name. The following example shows how to clear the name list: hostname(config)# clear configure name name show running-config name Associates a name with an IP address. Displays the list of names associated with IP addresses. 6-68
69 Chapter 6 clear configure nat clear configure nat To remove the NAT configuration, use the clear configure nat command in privileged EXEC mode. clear configure nat Syntax This command has no arguments or keywords. Privileged EXEC 1.1(1) This command was introduced. 2.2(1) This command was modified to support UDP maximum connections for local hosts. 3.1(1) This command was changed from clear nat. Usage Guidelines The following applies to transparent firewall mode: Note In transparent firewall mode, only NAT id 0 is valid. The following example shows how to remove the NAT configuration: hostname(config)# clear configure nat nat show running-config nat Associates a network with a pool of global IP addresses. Displays a pool of global IP addresses that are associated with the network. 6-69
70 clear configure object-group Chapter 6 clear configure object-group To remove all the object group commands from the configuration, use the clear configure object-group command in global configuration mode. clear configure object-group [{protocol service icmp-type network}] Syntax icmp-type network protocol service (Optional) Clears all ICMP groups. (Optional) Clears all network groups. (Optional) Clears all protocol groups. (Optional) Clears all service groups. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear object-group. The following example shows how to remove all the object-group commands from the configuration: hostname(config)# clear configure object-group group-object network-object object-group port-object show running-config object-group Adds network object groups. Adds a network object to a network object group. Defines object groups to optimize your configuration. Adds a port object to a service object group. Displays the current object groups. 6-70
71 Chapter 6 clear configure passwd clear configure passwd To clear the login password configuration and restore the default setting of cisco, use the clear configure passwd command in global configuration mode. clear configure {passwd password} Syntax passwd password You can enter either command; they are aliased to each other. Global configuration 1.1(1) The clear passwd command was introduced. 3.1(1) This command was changed to clear configure passwd. The following example clears the login password and restores it to the default of cisco : hostname(config)# clear configure passwd enable enable password passwd show curpriv show running-config passwd Enters privileged EXEC mode. Sets the enable password. Sets the login password. Shows the currently logged in username and the user privilege level. Shows the login password in encrypted form. 6-71
72 clear configure pim Chapter 6 clear configure pim To clear all of the global pim commands from the running configuration, use the clear configure pim command in global configuration mode. clear configure pim Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure pim command clears all of the pim commands from the running configuration. To clear PIM traffic counters and topology information, use the clear pim counters and the clear pim topology commands. The clear configure pim command only clears the pim commands entered in global configuration mode; it does not clear the interface-specific pim commands. The following example shows how to clear all pim commands from the running configuration: hostname(config)# clear configure pim clear pim topology clear pim counters show running-config pim Clears the PIM topology table. Clears the PIM traffic counters. Displays the pim commands in the running configuration. 6-72
73 Chapter 6 clear configure policy-map clear configure policy-map To remove the policy-map specification from the configuration, use the clear configure policy-map command in global configuration mode. clear configure policy-map Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. This example shows the clear configure policy-map command: hostname(config)# clear configure policy-map policy-map show running-config policy-map Configures a policy; that is, an association of a traffic class and one or more actions. Displays the entire policy configuration. 6-73
74 clear configure prefix-list Chapter 6 clear configure prefix-list To remove the prefix-list commands from the running configuration, use the clear configure prefix-list command in global configuration mode. clear configure prefix-list [prefix-list-name] Syntax prefix-list-name (Optional) The name of a prefix list. When a prefix list name is specified, only the commands for that prefix list are removed from the configuration. Global configuration 1.1(1) This command was introduced (as clear prefix-list). 3.1(1) This command was changed from clear prefix-list to clear configure prefix-list. Usage Guidelines The clear configure prefix-list command removes the prefix-list commands and the prefix-list description commands from the running configuration. If a prefix list name is specified, then the prefix-list command and prefix-list description command, if present, for that prefix list only are removed from the running configuration. This command does not remove the no prefix-list sequence command from the running configuration. The following example removes all prefix-list commands from the running configuration for a prefix list named MyPrefixList: hostname# clear configure prefix-list MyPrefixList show running-config prefix-list Displays the prefix-list commands in the running configuration. 6-74
75 Chapter 6 clear configure privilege clear configure privilege To remove the configured privilege levels for commands, use the clear configure privilege command in global configuration mode. clear configure privilege Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear privilege command was introduced. 3.1(1) This command was changed from clear privilege. Usage Guidelines There is no undo. This example shows how to reset the configured privilege levels for the commands: hostname(config)# clear configure privilege privilege show curpriv show running-config privilege Configures the command privilege levels. Displays current privilege level Displays privilege levels for commands. 6-75
76 clear configure prompt Chapter 6 clear configure prompt To clear the customized prompt, use the clear configure prompt command in global configuration mode. clear configure prompt Syntax This command has no arguments or keywords. The default prompt is the hostname. In multiple context mode, the hostname is followed by the current context name (hostname/context). Global configuration 3.1(1) This command was introduced. The following example clears the customized prompt: hostname(config)# clear configure prompt prompt Creates a customized prompt. show running-config prompt Displays the configured prompt. 6-76
77 Chapter 6 clear configure rip clear configure rip To clear the rip commands from the running configuration, use the clear configure rip command in global configuration mode. clear configure rip Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced (as clear rip). 3.1(1) This command was changed from clear rip to clear configure rip. Usage Guidelines The clear configure rip command removes all rip commands from the configuration. Use the no form of the commands to clear specific commands. The following example clears all RIP commands from the running configuration: hostname(config)# clear configure rip debug rip rip show running-config rip Displays debug information for RIP. Configures RIP on the specified interface. Displays the RIP commands in the running configuration. 6-77
78 clear configure route Chapter 6 clear configure route To remove the route commands from the configuration that do not contain the connect keyword, use the clear configure route command in global configuration mode. clear configure route [interface_name ip_address [netmask gateway_ip]] Syntax gateway_ip (Optional) Specifies the IP address of the gateway router (the next hop address for this route). interface_name (Optional) Internal or external network interface name. ip_address (Optional) Internal or external network IP address. netmask (Optional) Specifies a network mask to apply to the ip_address. Global configuration 1.1(1) This command was introduced (as clear route). 3.1(1) This command was changed from clear route to clear configure route. Usage Guidelines Use to specify a default route. You can abbreviate the IP address as 0 and the netmask as 0. The following example shows how to remove the route commands from the configuration that do not contain the connect keyword: hostname(config)# clear configure route route show route show running-config route Specifies a static or default route for the an interface. Displays route information. Displays configured routes. 6-78
79 Chapter 6 clear configure route-map clear configure route-map To remove all of the route maps, use the clear configure route-map command in global configuration mode. clear configure route-map Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced (as clear route-map). 3.1(1) This command was changed from clear route-map to clear configure route-map. Usage Guidelines Use the clear configure route-map command in global configuration mode to remove all route-map commands in the configuration. The route-map command is used to configure conditions of redistributing the routes from one routing protocol into another routing protocol. To remove individual route-map commands, use the no route-map command. The following example shows how to remove the conditions of redistributing routes from one routing protocol into another routing protocol: hostname(config)# clear configure route-map route-map show running-config route-map Defines the conditions for redistributing routes from one routing protocol into another. Displays the information about the route map configuration. 6-79
80 clear configure router Chapter 6 clear configure router To clear all router commands from the running configuration, use the clear configure router command in global configuration mode. clear configure router [ospf [id] bgp [as-num]] Syntax as-num bgp as-num id ospf (Optional) The BGP autonomous system number. (Optional) Specifies that only BGP commands are removed from the configuration. (Optional) The OSPF process ID. (Optional) Specifies that only OSPF commands are removed from the configuration. If no keywords are specified, all router commands and associated sub-commands are cleared from the configuration. Global configuration 1.1(1) This command was introduced (as clear router). 3.1(1) This command was changed from clear router to clear configure router. 3.2(1) The bgp keyword was added. The following example clears all OSPF commands associated with OSPF process 1 from the running configuration: hostname(config)# clear configure router ospf 1 hostname(config)# The following example clears all BGP commands associated with the BGP routing process with the autonomous system number of 100: hostname(config)# clear configure router bgp 100 hostname(config)# 6-80
81 Chapter 6 clear configure router show running-config router Displays the commands in the global router configuration. 6-81
82 clear configure service-policy Chapter 6 clear configure service-policy To clear the service policy configuration for enabled policies, use the clear configure service-policy command in privileged EXEC mode. clear configure service-policy Privileged EXEC 3.1(1) This command was introduced. The following is an example of the clear service-policy command: hostname(config)# clear configure service-policy show service-policy show running-config service-policy service-policy clear service-policy Displays the service policy. Displays the service policies configured in the running configuration. Configures the service policy. Clears service policy statistics. 6-82
83 Chapter 6 clear configure snmp-map clear configure snmp-map To clear the SNMP map configuration, use the clear configure snmp-map command in global configuration mode. clear configure snmp-map Global configuration 3.1(1) This command was introduced. Usage Guidelines The clear configure snmp-map command removes the SNMP map configuration. The following example clears the SNMP map configuration: hostname# clear configure snmp-map s class-map deny version inspect snmp snmp-map Defines the traffic class to which to apply security actions. Disallows traffic using a specific version of SNMP. Enable SNMP application inspection. Defines an SNMP map and enables SNMP map configuration mode. 6-83
84 clear configure snmp-server Chapter 6 clear configure snmp-server To disable the Simple Network Management Protocol (SNMP) server, use the clear configure snmp-server command in global configuration mode. clear configure snmp-server Syntax This command has no arguments or keywords. This command has no default settings. Global configuration 3.1(1) Support for this command was introduced. This example shows how to disable the SNMP server: hostname #clear snmp-server snmp-server show snmp-server statistics Provides the security appliance event information through SNMP. Displays information about the SNMP server configuration. 6-84
85 Chapter 6 clear configure ssh clear configure ssh To clear all SSH commands from the running configuration, use the clear configure ssh command in global configuration mode. clear configure ssh Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was changed from the clear ssh comma nd to the clear configure ssh command. Usage Guidelines This command clears all SSH commands from the configuration. To clear specific commands, use the no form of those commands. The following example clears all SSH commands from the configuration: hostname(config)# clear configure ssh show running-config Displays the current SSH commands in the running configuration. ssh ssh Allows SSH connectivity to the FWSM from the specified client or network. ssh scopy enable Enables a secure copy server on the FWSM. ssh timeout Sets the timeout value for idle SSH sessions. ssh version Restricts the FWSM to using either SSH Version 1 or SSH Version
86 clear configure static Chapter 6 clear configure static To remove all the static commands from the configuration, use the clear configure static command in global configuration mode. clear configure static Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 2.2(1) This command was modified to support UDP maximum connections for local hosts. 3.1(1) This command was changed from clear static. This example shows how to remove all the static commands from the configuration: hostname(config)# clear configure static show running-config static static Displays all static commands in the configuration. Configures a persistent one-to-one address translation rule by mapping a local IP address to a global IP address. 6-86
87 Chapter 6 clear configure sunrpc-server clear configure sunrpc-server To clear the remote processor call services from the FWSM, use the clear configure sunrpc-server command in global configuration mode. clear configure sunrpc-server [active] Syntax active (Optional) Identifies the SunRPC services that are currently active on the FWSM. Global configuration 3.1(1) This command was introduced. Usage Guidelines The sunrpc-server command displays the configured router ospf commands. Note If the highest-level IP address on the FWSM is a private address, this address is sent in hello packets and database definitions. To prevent this action, set the router-id ip_address to a global address. The following example shows how to clear the SunRPC services from the FWSM: hostname(config)# clear configure sunrpc-server active sunrpc-server show running-config sunrpc-server Creates the SunRPC services table. Displays the information about the SunRPC configuration. 6-87
88 clear configure sysopt Chapter 6 clear configure sysopt To clear the configuration for all sysopt commands, use the clear configure sysopt command in global configuration mode. clear configure sysopt Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear sysopt. The following example clears all sysopt command configuration: hostname(config)# clear configure sysopt show running-config sysopt sysopt connection permit-ipsec sysopt connection tcpmss sysopt connection timewait sysopt nodnsalias Shows the sysopt command configuration. Permits any packets that come from an IPSec tunnel without checking any access lists for interfaces. Overrides the maximum TCP segment size or ensures that the maximum is not less than a specified size. Forces each TCP connection to linger in a shortened TIME_WAIT state after the final normal TCP close-down sequence. Disables alteration of the DNS A record address when you use the alias command. 6-88
89 Chapter 6 clear configure telnet clear configure telnet To remove the Telnet connection and idle timeout from the configuration, use the clear configure telnet command in global configuration mode. clear configure telnet Syntax This command has no arguments or keywords. Global configuration 3.1(1) The keyword configure was added. This example shows how to remove the Telnet connection and the idle timeout from the FWSM configuration: hostname(config)# clear configure telnet show running-config telnet telnet Displays the current list of IP addresses that are authorized to use Telnet connections to the FWSM. Adds Telnet access to the console and sets the idle timeout. 6-89
90 clear configure terminal Chapter 6 clear configure terminal To clear the terminal display width setting, use the clear configure terminal command in global configuration mode. clear configure terminal Syntax This command has no keywords or arguments. The default display width is 80 columns. Global configuration 2.2(1) The clear terminal command was introduced. 3.1(1) This command was changed to clear configure terminal. The following example clears the display width: hostname# clear configure terminal terminal terminal width show running-config terminal Sets the terminal line parameters. Sets the terminal display width. Displays the current terminal settings. 6-90
91 Chapter 6 clear configure time-range clear configure time-range To clear all configured time ranges, use the clear configure time-range command in global configuration mode. clear configure time-range Syntax This command has no arguments or keywords. Global configuration 3.1(1) This command was introduced. The following example clears all configured time ranges: hostname(config)# clear configure time-range show time-range Shows all time range entries. 6-91
92 clear configure timeout Chapter 6 clear configure timeout To restore the default idle time durations in the configuration, use the clear configure timeout command in global configuration mode. clear configure timeout Syntax This command has no arguments or keywords. Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear timeout. This example shows how to remove the maximum idle time durations from the configuration: hostname(config)# clear configure timeout show running-config timeout timeout Displays the timeout value of the designated protocol. Sets the maximum idle time duration. 6-92
93 Chapter 6 clear configure tunnel-group clear configure tunnel-group To remove all or specified tunnel groups from the configuration, use the clear config tunnel-group command in global configuration. clear config tunnel-group [name] Syntax name (Optional) Specifies the name of a tunnel group. Global configuration 3.1(1) This command was introduced. The following example entered in global configuration mode, removes the toengineering tunnel group from the configuration: hostname(config)# clear config tunnel-group toengineering hostname(config)# show running-config tunnel-group tunnel-group Displays information about all or selected tunnel-groups. Enters tunnel-group subconfiguration mode for the specified type. 6-93
94 clear configure url-block Chapter 6 clear configure url-block To clear clears URL pending block buffer and long URL support configuration, use the clear configure url-block command in global configuration mode. clear configure url-block Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear url-block. Usage Guidelines The clear configure url-block command clears URL pending block buffer and long URL support configuration. The following example clears URL pending block buffer and long URL support configuration: hostname# clear configure url-block s clear url-block block statistics show url-block url-block url-cache url-server Clears the block buffer usage counters. Displays information about the URL cache, which is used for buffering URLs while waiting for responses from an N2H2 or Websense filtering server. Manage the URL buffers used for web server responses. Enables URL caching while pending responses from an N2H2 or Websense server and sets the size of the cache. Identifies an N2H2 or Websense server for use with the filter command. 6-94
95 Chapter 6 clear configure url-cache clear configure url-cache To clear the URL cache, use the clear configure url-cache command in global configuration mode. clear configure url-cache Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear url-cache. Usage Guidelines The clear configure url-cache command clears the URL cache. The following example clears the URL cache: hostname# clear configure url-cache s clear url-cache statistics filter url show url-cache statistics url-cache url-server Removes url-cache command statements from the configuration. Directs traffic to a URL filtering server. Displays information about the URL cache, which is used for buffering URLs while waiting for responses from an N2H2 or Websense filtering server. Enables URL caching while pending responses from an N2H2 or Websense server and sets the size of the cache. Identifies an N2H2 or Websense server for use with the filter command. 6-95
96 clear configure url-server Chapter 6 clear configure url-server To clear the URL filtering server configuration, use the clear configure url-server command in global configuration mode. clear configure url-server Global configuration 1.1(1) This command was introduced. 3.1(1) This command was changed from clear url-server. Usage Guidelines The clear configure url-server command clears the URL filtering server configuration. The following example URL filtering server configuration: hostname# clear configure url-server s clear url-server show url-server url-cache url-block url-server Clears the URL filtering server statistics. Displays information about the URL cache, which is used for buffering URLs while waiting for responses from an N2H2 or Websense filtering server. Enables URL caching while pending responses from an N2H2 or Websense server and sets the size of the cache. Manages the URL buffers used for web server responses while waiting for a filtering decision from the filtering server. Identifies an N2H2 or Websense server for use with the filter command. 6-96
97 Chapter 6 clear configure username clear configure username To clear the username database, use the clear configure username command. To clear the configuration for a particular user, use this command and append the username. clear configure username [name] Syntax name (Optional) Specifies the username to be deleted. Global configuration 1.1(1) The clear username command was introduced. 3.1(1) This command was changed from clear username. Usage Guidelines The internal user authentication database consists of the users entered with the username command. The login command uses this database for authentication. The following example shows how to clear the configuration for the user named anyuser: hostname(config)# clear configure username anyuser show running-config username username username attributes Displays the running configuration for a particular user or for all users. Adds a user to the FWSM database. Lets you configure AVPs for specific users. 6-97
98 clear configure virtual Chapter 6 clear configure virtual To remove the authentication virtual server from the configuration, use the clear configure virtual command in global configuration mode. clear configure virtual Syntax This command has no arguments or keywords. Global configuration 1.1(1) The clear virtual command was introduced. 3.1(1) This command was changed from clear virtual. Usage Guidelines There is no undo. This example shows the clear configure virtual command: hostname(config)# clear configure virtual show running-config virtual virtual http virtual telnet Displays the IP address for the authentication virtual server. Allows separate authentication with the FWSM and with the HTTP server. Authenticates users with the virtual Telnet server for traffic types for which the FWSM does not supply an authentication prompt. 6-98
99 Chapter 6 clear configure xlate-bypass clear configure xlate-bypass To set the xlate bypass configuration to the default (disabled), use the clear configure xlate-bypass command in global configuration mode. clear configure xlate-bypass Syntax This command has no arguments or keywords. Privileged EXEC 3.2(1) This command was introduced. The following example clears the xlate bypass configuration: hostname(config)# clear configure xlate-bypass nat nat-control same-security-traffic inter-interface show xlate xlate-bypass Configures NAT. Enables NAT control. Allows interfaces on the same security level to communicate. Shows current translation and connection information. Enables xlate bypass. 6-99
100 Chapter
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Configuring Network Address Translation
CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
Configuring Class Maps and Policy Maps
CHAPTER 4 Configuring Class Maps and Policy Maps This chapter describes how to configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing
Configuring Basic Settings
CHAPTER 10 This chapter describes how to configure basic settings on your ASA that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Configuring Remote Access IPSec VPNs
CHAPTER 34 Remote access VPNs let single users connect to a central site through a secure connection over a TCP/IP network such as the Internet. This chapter describes how to build a remote access VPN
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
DNS Commands ip dns spoofing
DNS Commands ip dns spoofing ip dns spoofing To enable Domain Name System (DNS) spoofing, use the ip dns spoofing command in global configuration mode. To disable DNS spoofing, use the no form of this
Configuring the ASA IPS Module
CHAPTER 62 This chapter describes how to configure the ASA IPS module. The ASA IPS module might be a physical module or a software module, depending on your ASA model. For a list of supported ASA IPS modules
Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall
IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to irewall Table of Contents Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall...1 Cisco has announced
Monitoring the Firewall Services Module
24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide
Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1
Prepared by SonicWALL, Inc. 09/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable
Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520
Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later) at one
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
Cisco PIX. Upgrade-Workshop PixOS 7. Dipl.-Ing. Karsten Iwen CCIE #14602 (Security) http://security-planet.de
Cisco PIX Upgrade-Workshop PixOS 7 http://security-planet.de 22 March, 2007 Agenda Basics Access-Control Inspections Transparent Firewalls Virtual Firewalls Failover VPNs Failover Sec. 7 P. 393 Active/Standby
Controlling Access Through the Firewall
C HAPTER 6 Controlling Access Through the Firewall A firewall s main function is to provide effective security between pairs of its interfaces. To do this, all of the traffic destined to pass through it
same-security-traffic through show asdm sessions Commands
24 CHAPTER same-security-traffic through show asdm sessions Commands 24-1 same-security-traffic Chapter 24 same-security-traffic To permit communication between interfaces with equal security levels, or
BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION WRITTEN BY: HARRIS ANDREA ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET
BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET WRITTEN BY: HARRIS ANDREA MSC ELECTRICAL ENGINEERING AND COMPUTER SCIENCE CISCO
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel
itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1
Cisco ASA Configuration Guidance
Cisco ASA Configuration Guidance Abstract The modern network perimeter is more complicated than ever. The number of applications, protocols, and attacks that a firewall is expected to support and protect
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Cisco NetFlow Security Event Logging Guide: Cisco ASA 5580 Adaptive Security Appliance and Cisco NetFlow Collector
Cisco NetFlow Security Event Logging Guide: Cisco ASA 5580 Adaptive Security Appliance and Cisco NetFlow Collector Cisco ASA Software Version 8.1 for Cisco ASA 5580 Adaptive Security Appliance has introduced
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Topic 7 DHCP and NAT. Networking BAsics.
Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What
Application Notes SL1000/SL500 VPN with Cisco PIX 501
Application Notes SL1000/SL500 VPN with Cisco PIX 501 Version 1.0 Copyright 2006, ASUSTek Computer, Inc. i Revision History Version Author Date Status 1.0 Martin Su 2006/5/4 Initial draft Copyright 2006,
The information in this document is based on these software and hardware versions:
Contents Introduction Prerequisites Requirements Components Used Background Information Advanced Protocol Handling Configuration Scenarios Scenario 1: FTP Client configured for Active Mode Scenario 2:
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example
PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
Configuring the Cisco PIX Firewall for SSH by Brian Ford ([email protected])
SSH Overview SSH is a client program that allows a user to establish a secure terminal session with a remote host that is running the SSH server (or daemon) program. Other programs, like the telnet utility
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure and Verify
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
IPSec interoperability between Palo Alto firewalls and Cisco ASA. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.
IPSec interoperability between Palo Alto firewalls and Cisco ASA Tech Note PAN-OS 4.1 Revision A Contents Overview... 3 Platforms and Software Versions... 3 Network topology... 3 VPN Tunnel Configuration
Configuring Stickiness
CHAPTER5 This chapter describes how to configure stickiness (sometimes referred to as session persistence) on an ACE module. It contains the following major sections: Stickiness Overview Configuration
Chapter 3 Using Access Control Lists (ACLs)
Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol
Foreword Introduction Product Overview Introduction to Network Security Firewall Technologies Network Firewalls Packet-Filtering Techniques
Foreword Introduction Product Overview Introduction to Network Security Firewall Technologies Network Firewalls Packet-Filtering Techniques Application Proxies Network Address Translation Port Address
FWSM introduction Intro 5/1
Intro 5/0 Content: FWSM introduction Requirements for FWSM 3.2 How the Firewall Services Module Works with the Switch Using the MSFC Firewall Mode Overview Stateful Inspection Overview Security Context
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client
A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder
Adding an Extended Access List
CHAPTER 11 This chapter describes how to configure extended access lists (also known as access control lists), and it includes the following topics: Information About Extended Access Lists, page 11-1 Licensing
Configuring Server Load Balancing
CHAPTER 6 This chapter describes how to configure server load balancing (SLB) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About Server
Configuring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp
iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp Table of Contents Configuring an IPSec Tunnel Cisco Secure PIX Firewall to Checkpoint 4.1 Firewall...1 Introduction...1 Before You Begin...1
Configuring SSL Termination
CHAPTER3 This chapter describes the steps required to configure a context on the Cisco Application Control Engine (ACE) module as a virtual SSL server for SSL termination. It contains the following major
ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example
ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example Document ID: 112182 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Load Balancing Router. User s Guide
Load Balancing Router User s Guide TABLE OF CONTENTS 1: INTRODUCTION... 1 Internet Features... 1 Other Features... 3 Package Contents... 4 Physical Details... 4 2: BASIC SETUP... 8 Overview... 8 Procedure...
P and FTP Proxy caching Using a Cisco Cache Engine 550 an
P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1
Integrated Cisco Products
Installation Guide Supplement for use with Integrated Cisco Products Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
ASA 8.x: VPN Access with the AnyConnect VPN Client Using Self Signed Certificate Configuration Example
ASA 8.x: VPN Access with the AnyConnect VPN Client Using Self Signed Certificate Configuration Example Document ID: 99756 Contents Introduction Prerequisites Requirements Components Used Conventions Background
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
PIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Configuring the Identity Firewall
CHAPTER 36 This chapter describes how to configure the ASA for the Identity Firewall. The chapter includes the following sections: Information About the Identity Firewall, page 1 Licensing for the Identity
WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Fortinet Network Security NSE4 test questions and answers:http://www.it-tests.com/NSE4.html
IT-TESTs.com IT Certification Guaranteed, The Easy Way! \ http://www.it-tests.com We offer free update service for one year Exam : NSE4 Title : Fortinet Network Security Expert 4 Written Exam (400) Vendor
Using PIX Firewall in SOHO Networks
CHAPTER 4 This chapter describes features provided by the PIX Firewall that are used in the small office, home office (SOHO) environment. It includes the following sections: Using PIX Firewall as an Easy
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
Chapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Lab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
Chapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
Configuring the PIX Firewall with PDM
Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Lab 8.3.13 Configure Cisco IOS Firewall CBAC
Lab 8.3.13 Configure Cisco IOS Firewall CBAC Objective Scenario Topology In this lab, the students will complete the following tasks: Configure a simple firewall including CBAC using the Security Device
Integrating Cisco Secure PIX Firewall and IP/VC Videoconferencing Networks
Integrating Cisco Secure PIX Firewall and IP/VC Videoconferencing Networks An IP/VC Application Note Jonathan Roberts Network Consultant Engineer Enterprise Voice, Video Business Unit September 24, 2001
