Home > Cisco > Computer Equipment > Cisco Asdm 7 User Guide

Cisco Asdm 7 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Asdm 7 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 754
    							 
    30-21
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Configuring the ASA CX Module
    Step 8Check the Enable ASA CX for this traffic flow check box.
    Step 9In the If ASA CX Card Fails area, click one of the following:
    Permit traffic—Sets the ASA to allow all traffic through, uninspected, if the ASA CX module is 
    unavailable.
    Close traffic—Sets the ASA to block all traffic if the ASA CX module is unavailable. 
    Step 10(Optional) To enable the authentication proxy, which is required for active authentication, check the 
    Enable Auth Proxy check box. This option is not available in monitor-only mode.
    Step 11(Optional) For demonstration purposes only, check the Monitor-only check box to send a read-only 
    copy of traffic to the ASA CX module. See the “Monitor-Only Mode” section on page 30-3 for more 
    information.
    NoteYou must configure all classes and policies to be either in monitor-only mode, or in normal inline 
    mode; you cannot mix both modes on the same ASA.
    Step 12Click OK and then Apply.
    Step 13Repeat this procedure to configure additional traffic flows as desired. 
    						
    							 
    30-22
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Configuring the ASA CX Module
    Configuring Traffic-Forwarding Interfaces (Monitor-Only Mode)
    This section configures traffic-forwarding interfaces, where all traffic is forwarded directly to the ASA 
    CX module. This method is for demonstration purposes only. For a normal ASA CX service policy, see 
    the “Creating the ASA CX Service Policy” section on page 30-19.
    For more information see the “Monitor-Only Mode” section on page 30-3. See also the “Guidelines and 
    Limitations” section on page 30-6 for guidelines and limitations specific to traffic-forwarding interfaces.
    You can only configure this feature at the CLI; you can use the Command Line Interface tool.
    Prerequisites
    Be sure to configure both the ASA policy and the ASA CX to have matching modes: both in 
    monitor-only.
    In multiple context mode, perform this procedure within each security context.
    Detailed Steps
    Step 1Choose Tools > Command Line Interface.
    Step 2Click the Multiple Line radio button.
    Step 3Enter the following commands:
    Step 4Repeat for any additional interfaces.
    Step 5Click Send.
    Command Purpose
    Step 1interface physical_interface
    Example:
    ciscoasa(config)# interface 
    gigabitethernet 0/5
    Enters interface configuration mode for the physical interface you 
    want to use for traffic-forwarding.
    Step 2no nameif
    Example:
    ciscoasa(config-ifc)# no nameif
    Removes any name configured for the interface. If this interface 
    was used in any ASA configuration, that configuration is 
    removed. You cannot configure traffic-forwarding on a named 
    interface.
    Step 3traffic-forward cxsc monitor-only
    Example:
    ciscoasa(config-ifc)# traffic-forward cxsc 
    monitor-only
    Enables traffic-forwarding. You see a warning similar to the 
    following:
    WARNING: This configuration is purely for demo of CX 
    functionality and shouldnt be used on a production ASA 
    and any issues found when mixing demo feature with 
    production ASA is not supported.
    Step 4no shutdown
    Example:
    ciscoasa(config-ifc)# no shutdown
    Enables the interface. 
    						
    							 
    30-23
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Managing the ASA CX Module
    Examples
    The following example makes GigabitEthernet 0/5 a traffic-forwarding interface:
    Managing the ASA CX Module
    This section includes procedures that help you manage the module.
    Resetting the Password, page 30-23
    Reloading or Resetting the Module, page 30-24
    Shutting Down the Module, page 30-25
    (ASA 5512-X through ASA 5555-X) Uninstalling a Software Module Image, page 30-26
    (ASA 5512-X through ASA 5555-X) Sessioning to the Module From the ASA, page 30-26
    Resetting the Password
    You can reset the module password to the default. For the user admin, the default password is 
    Admin123. After resetting the password, you should change it to a unique value using the module 
    application.
    Resetting the module password causes the module to reboot. Services are not available while the module 
    is rebooting.
    If you cannot connect to ASDM with the new password, restart ASDM and try to log in again. If you 
    defined a new password and still have an existing password in ASDM that is different from the new 
    password, clear the password cache by choosing File > Clear ASDM Password Cache, then restart 
    ASDM and try to log in again. 
    						
    							 
    30-24
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Managing the ASA CX Module
    To reset the module password to the default of Admin123, perform the following steps.
    Guidelines
    In multiple context mode, perform this procedure in the system execution space.
    Detailed Steps
    Step 1From the ASDM menu bar, choose Tools > ASA CX Password Reset.
    The Password Reset confirmation dialog box appears.
    Step 2Click OK to reset the password to the default Admin123. 
    A dialog box displays the success or failure of the password reset.
    Step 3Click Close to close the dialog box.
    Reloading or Resetting the Module
    To reload or reset the module, enter one of the following commands at the ASA CLI.
    Guidelines
    In multiple context mode, perform this procedure in the system execution space. 
    						
    							 
    30-25
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Managing the ASA CX Module
    Detailed Steps
    Shutting Down the Module
    Shutting down the module software prepares the module to be safely powered off without losing 
    configuration data. Note: If you reload the ASA, the module is not automatically shut down, so we 
    recommend shutting down the module before reloading the ASA. To gracefully shut down the module, 
    perform the following steps at the ASA CLI.
    Guidelines
    In multiple context mode, perform this procedure in the system execution space.
    Detailed Steps
    Command Purpose
    For a hardware module (ASA 5585-X):
    hw-module module 1 reload
    For a software module (ASA 5512-X through 
    ASA 5555-X):
    sw-module module cxsc reload
    Example:
    ciscoasa# hw-module module 1 reload
    Reloads the module software.
    For a hardware module:
    hw-module module 1 reset
    For a software module:
    sw-module module cxsc reset
    Example:
    ciscoasa# hw-module module 1 reset
    Performs a reset, and then reloads the module.
    Command Purpose
    For a hardware module (ASA 5585-X):
    hw-module module 1 shutdown
    For a software module (ASA 5512-X through 
    ASA 5555-X):
    sw-module module cxsc shutdown
    Example:
    ciscoasa# hw-module module 1 shutdown
    Shuts down the module. 
    						
    							 
    30-26
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Managing the ASA CX Module
    (ASA 5512-X through ASA 5555-X) Uninstalling a Software Module Image
    To uninstall a software module image and associated configuration, perform the following steps.
    Guidelines
    In multiple context mode, perform this procedure in the system execution space.
    Detailed Steps
    (ASA 5512-X through ASA 5555-X) Sessioning to the Module From the ASA
    To access the ASA CX software module CLI from the ASA, you can session from the ASA. You can 
    either session to the module (using Telnet) or create a virtual console session. A console session might 
    be useful if the control plane is down and you cannot establish a Telnet session.
    You may need to access the CLI if you are using multiple context mode and you need to set basic network 
    settings using the CLI, or for troubleshooting.
    Guidelines
    In multiple context mode, perform this procedure in the system execution space. Command Purpose
    Step 1sw-module module cxsc uninstall
    Example:
    ciscoasa# sw-module module cxsc uninstall
    Module cxsc will be uninstalled. This will 
    completely remove the
    disk image associated with the sw-module 
    including any configuration
    that existed within it.
    Uninstall module ? [confirm]
    Permanently uninstalls the software module image and associated 
    configuration.
    Step 2reload
    Example:
    ciscoasa# reload
    Reloads the ASA. You must reload the ASA before you can install 
    a new module type. 
    						
    							 
    30-27
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Monitoring the ASA CX Module
    Detailed Steps
    Monitoring the ASA CX Module
    Use Tools > Command Line Interface to use monitoring commands.
    Showing Module Status, page 30-28
    Showing Module Statistics, page 30-28
    Monitoring Module Connections, page 30-28
    Capturing Module Traffic, page 30-32
    Problems with the Authentication Proxy, page 30-32
    NoteFor ASA CX-related syslog messages, see the syslog messages guide. ASA CX syslog messages start 
    with message number 429001. Command Purpose
    Telnet session.
    session cxsc
    Example:
    ciscoasa# session cxsc
    Opening command session with slot 1.
    Connected to module cxsc. Escape character 
    sequence is CTRL-^X.
    cxsc login: admin
    Password: Admin123
    Accesses the module using Telnet. You are prompted for the username and 
    password. The default username is admin, and the default password is 
    Admin123.
    Console session.
    session cxsc console
    Example:
    ciscoasa# session cxsc console
    Establishing console session with slot 1
    Opening console session with module cxsc.
    Connected to module cxsc. Escape character 
    sequence is CTRL-SHIFT-6 then x.
    cxsc login: admin
    Password: Admin123
    Accesses the module console. You are prompted for the username and 
    password. The default username is admin, and the default password is 
    Admin123.
    NoteDo not use this command in conjunction with a terminal server 
    where Ctrl-Shift-6, x is the escape sequence to return to the 
    terminal server prompt. Ctrl-Shift-6, x is also the sequence to 
    escape the ASA CX console and return to the ASA prompt. 
    Therefore, if you try to exit the ASA CX console in this situation, 
    you instead exit all the way to the terminal server prompt. If you 
    reconnect the terminal server to the ASA, the ASA CX console 
    session is still active; you can never exit to the ASA prompt. You 
    must use a direct serial connection to return the console to the ASA 
    prompt.
    Use the session cxsc command instead. 
    						
    							 
    30-28
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Monitoring the ASA CX Module
    Showing Module Status
    See the “ASA CX Status Tab” section on page 4-30 in the general operations configuration guide.
    Showing Module Statistics
    To show module statistics, enter the following command:
    Examples
    The following is sample output from the show service-policy command showing the ASA CX policy 
    and the current statistics as well as the module status when the authentication proxy is disabled:
    hostname# show service-policy cxsc
    Global policy: 
      Service-policy: global_policy
        Class-map: bypass
          CXSC: card status Up, mode fail-open, auth-proxy disabled
            packet input 2626422041, packet output 2626877967, drop 0, reset-drop 0, proxied 0
    The following is sample output from the show service-policy command showing the ASA CX policy 
    and the current statistics as well as the module status when the authentication proxy is enabled; in this 
    case, the proxied counters also increment:
    hostname# show service-policy cxsc
    Global policy: 
      Service-policy: pmap
        Class-map: class-default
          Default Queueing      Set connection policy: random-sequence-number disable
            drop 0
          CXSC: card status Up, mode fail-open, auth-proxy enabled
            packet input 7724, packet output 7701, drop 0, reset-drop 0, proxied 10
    Monitoring Module Connections
    To show connections through the ASA CX module, enter one of the following commands: Command Purpose
    show service-policy cxscDisplays the ASA CX statistics and status per service policy.
    Command Purpose
    show asp table classify domain cxscShows the NP rules created to send traffic to the ASA CX module.
    show asp table classify domain 
    cxsc-auth-proxyShows the NP rules created for the authentication proxy for the ASA CX 
    module. 
    						
    							 
    30-29
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Monitoring the ASA CX Module
    Examples
    The following is sample output from the show asp table classify domain cxsc command:
    ciscoasa# show asp table classify domain cxsc
    Input Table
    in  id=0x7ffedb4acf40, priority=50, domain=cxsc, deny=false
    hits=15485658, user_data=0x7ffedb4ac840, cs_id=0x0, use_real_addr, flags=0x0, 
    protocol=0
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
    input_ifc=outside, output_ifc=any
    in  id=0x7ffedb4ad4a0, priority=50, domain=cxsc, deny=false
    hits=992053, user_data=0x7ffedb4ac840, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
    input_ifc=inside, output_ifc=any show asp drop
    Shows dropped packets. The following drop types are used:
    Frame Drops:
    cxsc-bad-tlv-received—This occurs when ASA receives a packet 
    from CXSC without a Policy ID TLV.  This TLV must be present in 
    non-control packets if it does not have the Standy Active bit set in the 
    actions field.
    cxsc-request—The frame was requested to be dropped by CXSC due 
    a policy on CXSC whereby CXSC would set the actions to Deny 
    Source, Deny Destination, or Deny Pkt.
    cxsc-fail-close—The packet is dropped because the card is not up and 
    the policy configured was fail-close (rather than fail-open which 
    allows packets through even if the card was down).
    cxsc-fail—The CXSC configuration was removed for an existing 
    flow and we are not able to process it through CXSC it will be 
    dropped.  This should be very unlikely.
    cxsc-malformed-packet—The packet from CXSC contains an invalid 
    header.  For instance, the header length may not be correct.
    Flow Drops:
    cxsc-request—The CXSC requested to terminate the flow.  The 
    actions bit 0 is set.
    reset-by-cxsc—The CXSC requested to terminate and reset the flow.  
    The actions bit 1 is set.
    cxsc-fail-close—The flow was terminated because the card is down 
    and the configured policy was fail-close.
    show asp event dp-cp cxsc-msgThis output shows how many ASA CX module messages are on the dp-cp 
    queue.  Currently, only VPN queries from the ASA CX module are sent to 
    dp-cp.
    show connThis command already shows if a connection is being forwarded to a 
    module by displaying the ‘X - inspected by service module’ flag. 
    Connections being forwarded to the ASA CX module will also display the 
    ‘X’ flag. Command Purpose 
    						
    							 
    30-30
    Cisco ASA Series Firewall ASDM Configuration Guide
     
    Chapter 30      Configuring the ASA CX Module
      Monitoring the ASA CX Module
    in  id=0x7ffedb4ada00, priority=50, domain=cxsc, deny=false
    hits=0, user_data=0x7ffedb4ac840, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
    input_ifc=m, output_ifc=any
    Output Table:
    L2 - Output Table:
    L2 - Input Table:
    Last clearing of hits counters: Never
    The following is sample output from the show asp table classify domain cxsc-auth-proxy command. 
    For the first rule in the output, the destination “port=2000” is the auth-proxy port configured by the cxsc 
    auth-proxy port 2000 command, and the destination “ip/id=192.168.0.100” is the ASA interface IP 
    address.
    ciscoasa# show asp table classify domain cxsc-auth-proxy 
    Input Table
    in  id=0x7ffed86cc470, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=192.168.0.100, mask=255.255.255.255, port=2000, dscp=0x0
    input_ifc=inside, output_ifc=identity
    in  id=0x7ffed86cce20, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=2.2.2.2, mask=255.255.255.255, port=2000, dscp=0x0
    input_ifc=new2, output_ifc=identity
    in  id=0x7ffed86cd7d0, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=172.23.58.52, mask=255.255.255.255, port=2000, dscp=0x0
    input_ifc=mgmt, output_ifc=identity
    in  id=0x7ffed86caa80, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=0.0.0.0, mask=0.0.0.0, port=0
    dst ip/id=192.168.5.172, mask=255.255.255.255, port=2000, dscp=0x0
    input_ifc=outside, output_ifc=identity
    in  id=0x7ffed86cb3c0, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=::/0, port=0
            dst ip/id=fe80::5675:d0ff:fe5b:1102/128, port=2000
    input_ifc=outside, output_ifc=identity
    in  id=0x7ffed742be10, priority=121, domain=cxsc-auth-proxy, deny=false
    hits=0, user_data=0x7ffed86ca220, cs_id=0x0, flags=0x0, protocol=6
    src ip/id=::/0, port=0
    dst ip/id=1:1:1:1::10/128, port=2000
    input_ifc=outside, output_ifc=identity
    Output Table:
    L2 - Output Table:
    L2 - Input Table:
    Last clearing of hits counters: Never
    The following is sample output from the show asp drop command. This output is just an example and 
    lists all the possible reasons for a dropped frame or flow from the ASA CX module: 
    						
    All Cisco manuals Comments (0)