Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    24-7
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Testing Your Configuration
    Tracing Packets with Packet Tracer
    The packet tracer tool provides packet tracing for packet sniffing and network fault isolation, as well as 
    detailed information about the packets and how they are processed by the ASA. If a configuration 
    command did not cause the packet to drop, the packet tracer tool can provide information about the cause 
    in an easily readable format. 
    In addition, you can trace the lifespan of a packet through the ASA to see whether the packet is operating 
    correctly with the packet tracer tool. This tool enables you to do the following:
    Debug all packet drops in a production network.
    Verify the configuration is working as intended.
    Show all rules applicable to a packet, along with the CLI commands that caused the rule addition.
    Show a time line of packet changes in a data path.
    Inject tracer packets into the data path.
    Search for an IPv4 or IPv6 address based on the user identity and the FQDN.
    To use the packet tracer, perform the following steps:
    Step 1In the main ASDM application window, choose Tools > Packet Tracer.
    The Cisco ASDM Packet Tracer dialog box appears.
    Step 2Choose the source interface for the packet trace from the drop-down list.
    Step 3Specify the protocol type for the packet trace. Available protocol types include ICMP, IP, TCP, and UDP.
    Step 4In the Source drop-down list, select one of the following options:
    IP Address
    User
    FQDN
    Security Tag
    Security Name
    Select the Security Tag or Security Name options when you want to trace packets sent by the ASA 
    when integrated with the Cisco TrustSec solution. Security names are created on the Cisco ISE and 
    provide user-friendly names for security groups. 
    If a security policy is configured on the ASA with that security tags or security names, the ASA 
    enforces the policy. (You can create security policies on the ASA that contain security tags or 
    security names. To enforce policies based on security group names, the ASA needs the security 
    group table to map security names to security tags.)
    See the “Configuring the ASA to Integrate with Cisco TrustSec” section on page 39-1 in the general 
    operations configuration guide for information about configuring the ASA to integrate with the 
    Cisco TrustSec solution. 
    Step 5Based on the option you selected from the Source drop-down list, enter the corresponding text for the 
    item you want to trace; for example, enter the source IP address for the packet trace in the Source IP 
    Address field.
    Step 6For TCP and UDP only, choose the source port for the packet trace from the drop-down list.
    Step 7In the Destination drop-down list, select one of the following options:
    IP Address 
    						
    							 
    24-8
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Monitoring Performance
    FQDN
    Security Tag
    Security Name
    Step 8Based on the option you selected from the Destination drop-down list, enter the corresponding text for 
    the item you want to trace; for example, enter the source IP address for the packet trace in the Destination 
    IP Address field.
    Step 9For TCP and UDP only, choose the destination port for the packet trace from the drop-down list.
    Step 10For ICMP only, choose the type of packet trace from the Type drop-down list. Then enter the trace code 
    and trace ID in the appropriate fields.
    Step 11For IP only, enter the protocol number in the Protocol field. Valid values range from 0 to 255.
    Step 12Click Start to trace the packet.
    The Information Display Area shows detailed messages about the results of the packet trace.
    NoteTo display a graphical representation of the packet trace, check the Show animation check box.
    Step 13Click Clear to start a new packet trace.
    Monitoring Performance
    To view ASA performance information in a graphical or tabular format, perform the following steps: 
    Step 1In the ASDM main window, choose Monitoring > Properties > Connection Graphs > Perfmon.
    Step 2Select one or more entries from the Available Graphs list, then click Add to move them to the Selected 
    Graphs list. To remove an entry from the Selected Graphs list, click Remove. The available options are 
    the following:
    AAA Perfmon—Displays the ASA AAA performance information.
    Inspection Perfmon—Displays the ASA inspection performance information.
    Web Perfmon—Displays the ASA web performance information, including URL access and URL 
    server requests.
    Connections Perfmon—Displays the ASA connections performance information.
    Xlate Perfmon—Displays the ASA NAT performance information.
    You can choose up to four types of statistics to show in one graph window. You can open multiple graph 
    windows at the same time.
    Step 3To use an existing window title, select one from the drop-down list. To display graphs in a new window, 
    enter a new window title in the Graph Window Title field. 
    Step 4Click Show Graphs to view performance statistics in a new or updated graph window.
    Step 5Click the Ta b l e tab to view the same performance statistics in a tabular format. 
    Step 6From the View drop-down list on either tab, choose to display updates to information in the following 
    time periods: Real-time, data every 10 sec; Last 10 minutes, data every 10 sec; Last 60 minutes, data 
    every 1 min; Last 12 hours, data every 12 minutes; or Last 5 days, data every two hours. 
    						
    							 
    24-9
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Monitoring System Resources
    Step 7(Optional) Click Export to display the Export Graph Data dialog box. The selected performance 
    statistics to export are already checked.
    Step 8(Optional) Click Export again to display the Save dialog box. 
    Step 9(Optional) Click Save to save the performance statistics to a text file (.txt) on your local drive for future 
    reference.
    Step 10(Optional) Click Print to display the Print Graph dialog box.
    Step 11(Optional) Choose the graph or table name from the drop-down list, then click Print to display the Print 
    dialog box.
    Step 12(Optional) Click OK to print the selected performance statistics.
    Monitoring System Resources
    This section includes the following topics:
    Blocks, page 24-9
    CPU, page 24-10
    Memory, page 24-10
    Blocks
    To view the free and used memory blocks, perform the following steps:
    Step 1In the ASDM main window, choose Monitoring > Properties > System Resources Graphs > Blocks. 
    Step 2Select one or more entries from the Available Graphs list, then click Add to move them to the Selected 
    Graphs list. To remove an entry from the Selected Graphs list, click Remove. The available options are 
    the following:
    Blocks Used—Displays the ASA used memory blocks.
    Blocks Free—Displays the ASA free memory blocks.
    You can choose up to four types of statistics to show in one graph window. You can open multiple graph 
    windows at the same time.
    Step 3To use an existing window title, select one from the drop-down list. To display graphs in a new window, 
    enter a new window title in the Graph Window Title field. 
    Step 4Click Show Graphs to view system resource statistics in a new or updated graph window.
    Step 5Click the Ta b l e tab to view the same performance statistics in a tabular format. 
    Step 6From the View drop-down list on either tab, choose to display updates to information in the following 
    time periods: Real-time, data every 10 sec; Last 10 minutes, data every 10 sec; Last 60 minutes, data 
    every 1 min; Last 12 hours, data every 12 minutes; or Last 5 days, data every two hours.
    Step 7(Optional) Click Export to display the Export Graph Data dialog box. The selected memory block 
    statistics to export are already checked.
    Step 8(Optional) Click Export again to display the Save dialog box.  
    						
    							 
    24-10
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Monitoring System Resources
    Step 9(Optional) Click Save to save the memory block statistics to a text file (.txt) on your local drive for future 
    reference.
    Step 10(Optional) Click Print to display the Print Graph dialog box.
    Step 11(Optional) Choose the graph or table name from the drop-down list, then click Print to display the Print 
    dialog box.
    Step 12(Optional) Click OK to print the selected memory block statistics.
    CPU
    To view the CPU utilization, perform the following steps: 
    Step 1In the ASDM main window, choose Monitoring > Properties > System Resources Graphs > CPU. 
    Step 2Select one or more entries from the Available Graphs list, then click Add to move them to the Selected 
    Graphs list. To remove an entry from the Selected Graphs list, click Remove. 
    You can choose up to four types of statistics to show in one graph window. You can open multiple graph 
    windows at the same time.
    Step 3To use an existing window title, select one from the drop-down list. To display graphs in a new window, 
    enter a new window title in the Graph Window Title field. 
    Step 4Click Show Graphs to view system resource statistics in a new or updated graph window.
    Step 5Click the Ta b l e tab to view the same performance statistics in a tabular format. 
    Step 6From the View drop-down list on either tab, choose to display updates to information in the following 
    time periods: Real-time, data every 10 sec; Last 10 minutes, data every 10 sec; Last 60 minutes, data 
    every 1 min; Last 12 hours, data every 12 minutes; or Last 5 days, data every two hours.
    Step 7(Optional) Click Export to display the Export Graph Data dialog box. The selected CPU utilization 
    statistics to export are already checked.
    Step 8(Optional) Click Export again to display the Save dialog box. 
    Step 9(Optional) Click Save to save the CPU utilization statistics to a text file (.txt) on your local drive for 
    future reference.
    Step 10(Optional) Click Print to display the Print Graph dialog box.
    Step 11(Optional) Choose the graph or table name from the drop-down list, then click Print to display the Print 
    dialog box.
    Step 12(Optional) Click OK to print the selected CPU utilization statistics.
    Memory
    To view the memory utilization, perform the following steps:
    Step 1In the ASDM main window, choose Monitoring > Properties > System Resources Graphs > Blocks.  
    						
    							 
    24-11
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Monitoring Connections
    Step 2Select one or more entries from the Available Graphs list, then click Add to move them to the Selected 
    Graphs list. To remove an entry from the Selected Graphs list, click Remove. The available options are 
    the following:
    Free Memory—Displays the ASA free memory.
    Used Memory—Displays the ASA used memory.
    You can choose up to four types of statistics to show in one graph window. You can open multiple graph 
    windows at the same time.
    Step 3To use an existing window title, select one from the drop-down list. To display graphs in a new window, 
    enter a new window title in the Graph Window Title field. 
    Step 4Click Show Graphs to view system resource statistics in a new or updated graph window.
    Step 5Click the Ta b l e tab to view the same performance statistics in a tabular format. 
    Step 6From the View drop-down list on either tab, choose to display updates to information in the following 
    time periods: Real-time, data every 10 sec; Last 10 minutes, data every 10 sec; Last 60 minutes, data 
    every 1 min; Last 12 hours, data every 12 minutes; or Last 5 days, data every two hours.
    Step 7(Optional) Click Export to display the Export Graph Data dialog box. The selected memory utilization 
    statistics to export are already checked.
    Step 8(Optional) Click Export again to display the Save dialog box. 
    Step 9(Optional) Click Save to save the memory utilization statistics to a text file (.txt) on your local drive for 
    future reference.
    Step 10(Optional) Click Print to display the Print Graph dialog box.
    Step 11(Optional) Choose the graph or table name from the drop-down list, then click Print to display the Print 
    dialog box.
    Step 12(Optional) Click OK to print the selected memory utilization statistics.
    Monitoring Connections
    To view current connections in a tabular format, in the ASDM main window, choose Monitoring > 
    Properties > Connections. Each connection is identified by the following parameters:
    Protocol
    Source:
    –Security ID
    –Security Name
    –IP address
    –Port
    Destination:
    –Security ID
    –Security Name
    –IP address
    –Port 
    						
    							 
    24-12
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 24      Troubleshooting Connections and Resources
      Monitoring Per-Process CPU Usage
    Idle time since the last packet was sent or received
    Amount of sent and received traffic on the connection
    Monitoring Per-Process CPU Usage
    You can monitor the processes that run on the CPU. You can obtain information about the percentage of 
    CPU that is used by a certain process. CPU usage statistics are sorted in descending order to display the 
    highest consumer at the top. Also included is information about the load on the CPU per process, at 5 
    seconds, 1 minute, and 5 minutes before the log time. This information is updated automatically every 
    5 seconds to provide real-time statistics. In ASDM, it is updated every 30 seconds. 
    To view CPU usage on a per-process basis, perform the following steps:
    Step 1In the ASDM main window, choose Monitoring > Properties > Per-Process CPU Usage.
    Step 2To pause the auto-refresh of the screen, click Stop auto-refresh.
    Step 3To save the information on the screen to a local text file, click Save log to local file.
    The Save dialog box appears.
    Step 4Enter the name of the text file, then click Save.
    To color code processes according to their CPU usage range, click Configure CPU usage.
    The Color Settings dialog box appears.
    Step 5Choose one of the following range options: 49% and below, 50% to 79%, and 80% and above. 
    Step 6Click the foreground or background cell to display the Pick a Color dialog box, and select the foreground 
    and background colors for the given ranges. 
    Step 7Click one of the following tabs to pick the color palette: Swatches, HSB, or RGB. When you are done, 
    click OK.
    Step 8Click OK to view the color-coded entries.
    Step 9Click Refresh to refresh the data manually at any time. 
    						
    							 
    PART 7
    Configuring Advanced Network Protection 
    						
    							CH A P T E R
     
    25-1
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    25
    Configuring the ASA for Cisco Cloud Web 
    Security
    Cisco Cloud Web Security provides web security and web filtering services through the 
    Software-as-a-Service (SaaS) model. Enterprises with the ASA in their network can use Cloud Web 
    Security services without having to install additional hardware.
    When Cloud Web Security is enabled on the ASA, the ASA transparently redirects selected HTTP and 
    HTTPS traffic to the Cloud Web Security proxy servers. The Cloud Web Security proxy servers then scan 
    the content and allow, block, or send a warning about the traffic based on the policy configured in Cisco 
    ScanCenter to enforce acceptable use and to protect users from malware.
    The ASA can optionally authenticate and identify users with Identity Firewall (IDFW) and AAA rules. 
    The ASA encrypts and includes the user credentials (including usernames and/or user groups) in the 
    traffic it redirects to Cloud Web Security. The Cloud Web Security service then uses the user credentials 
    to match the traffic to the policy. It also uses these credentials for user-based reporting. Without user 
    authentication, the ASA can supply an (optional) default username and/or group, although usernames 
    and groups are not required for the Cloud Web Security service to apply policy.
    You can customize the traffic you want to send to Cloud Web Security when you create your service 
    policy rules. You can also configure a “whitelist” so that a subset of web traffic that matches the service 
    policy rule instead goes directly to the originally requested web server and is not scanned by Cloud Web 
    Security.
    You can configure a primary and a backup Cloud Web Security proxy server, each of which the ASA 
    polls regularly to check for availability.
    NoteThis feature is also called “ScanSafe,” so the ScanSafe name appears in some commands. 
    						
    							 
    25-2
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 25      Configuring the ASA for Cisco Cloud Web Security
      Information About Cisco Cloud Web Security
    This chapter includes the following sections:
    Information About Cisco Cloud Web Security, page 25-2
    Licensing Requirements for Cisco Cloud Web Security, page 25-6
    Prerequisites for Cloud Web Security, page 25-7
    Guidelines and Limitations, page 25-7
    Default Settings, page 25-8
    Configuring Cisco Cloud Web Security, page 25-8
    Monitoring Cloud Web Security, page 25-26
    Related Documents, page 25-27
    Feature History for Cisco Cloud Web Security, page 25-27
    Information About Cisco Cloud Web Security
    This section includes the following topics:
    Redirection of Web Traffic to Cloud Web Security, page 25-2
    User Authentication and Cloud Web Security, page 25-2
    Authentication Keys, page 25-3
    ScanCenter Policy, page 25-4
    Cloud Web Security Actions, page 25-5
    Bypassing Scanning with Whitelists, page 25-6
    IPv4 and IPv6 Support, page 25-6
    Failover from Primary to Backup Proxy Server, page 25-6
    Redirection of Web Traffic to Cloud Web Security
    When an end user sends an HTTP or HTTPS request, the ASA receives it and optionally retrieves the 
    user and/or group information. If the traffic matches an ASA service policy rule for Cloud Web Security, 
    then the ASA redirects the request to the Cloud Web Security proxy servers. The ASA acts as an 
    intermediary between the end user and the Cloud Web Security proxy server by redirecting the 
    connection to the proxy server. The ASA changes the destination IP address and port in the client 
    requests and adds Cloud Web Security-specific HTTP headers and then sends the modified request to the 
    Cloud Web Security proxy server. The Cloud Web Security HTTP headers include various kinds of 
    information, including the username and user group (if available).
    User Authentication and Cloud Web Security
    User identity can be used to apply policy in Cloud Web Security. User identity is also useful for Cloud 
    Web Security reporting. User identity is not required to use Cloud Web Security. There are other methods 
    to identify traffic for Cloud Web Security policy.  
    						
    All Cisco manuals Comments (0)