
Index
IN-5
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
H.323
troubleshooting
21-28, 21-29
help, command line C-4
HMAC hashing method 23-3
hosts, subnet masks for D-3
HSRP 12-9
HTTP
authentication
31-5
filtering 17-4
I
ICMP
ACL
13-11
testing connectivity 33-4
type numbers D-15
ID method for ISAKMP peers, determining 23-6
IKE
benefits
23-3
creating policies 23-4
See also ISAKMP
IM
21-43
inactive keyword
ACLs
13-20
inbound ACLs 15-1
information
reply, ICMP message
D-16
request, ICMP message D-16
inside, definition 1-1
inspection engines
security level requirements
6-1
static PAT 14-8
installation
software to current partition
32-3
Instant Messaging
See IM
interfaces
configuring for remote access
27-2
enabled status 6-2
failover monitoring 11-14
global addresses 14-24
naming 6-3
shared 3-6
Internet Security Association and Key Management
Protocol
See ISAKMP
IP addresses
classes
D-2
configuring an assignment method 26-1
configuring for VPNs 26-1
configuring local IP address pools 26-2
management, transparent firewall 7-5
overlapping between contexts 3-4
private D-2
subnet mask D-4
IPSec
ACLs
23-13
basic configuration with static crypto maps 23-16
Cisco VPN Client 23-2
clearing SAs 23-21
configuring 23-1, 23-11
crypto map entries 23-12
fragmentation policy 23-7
LAN-to-LAN configurations 23-2
over NAT-T, enabling 23-7
over TCP, enabling 23-7
overview 23-2
remote access configurations 23-2
SA lifetimes, changing 23-15
setting maximum active VPN sessions 24-2
tunnel 23-11
viewing configuration 23-20
ISAKMP
configuring
23-1, 23-2
determining an ID method for peers 23-6
disabling in aggressive mode 23-6
enabling on the outside interface 23-5, 27-3
Komentarze do niniejszej Instrukcji