Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
4700M
Cisco 4700M Manuals
Manuals and User Guides for Cisco 4700M. We have
5
Cisco 4700M manuals available for free PDF download: Configuration Manual, Administration Manual, Upgrade Manual, Installation Manual, Replacement Manual
Cisco 4700M Configuration Manual (388 pages)
Application Control Engine Appliance Security
Brand:
Cisco
| Category:
Software
| Size: 7.03 MB
Table of Contents
Configuration Guide
1
Table of Contents
3
How to Use this Guide
18
Related Documentation
19
C H a P T E R 1 Configuring Security Access Control Lists
26
CHAPTER 1 Configuring Security Access Control Lists
26
ACL Overview
26
ACL Types and Uses
27
ACL Guidelines
27
ACL Entry Order
27
ACL Implicit Deny
28
Maximum Number of Acls and ACL Entries
28
ACL Configuration Quick Start
28
Configuring Acls
30
Configuring an Extended ACL
30
Configuring Comments in an Extended ACL
40
Configuring an Ethertype ACL
41
Resequencing Entries
42
Simplifying Access Control Lists with Object Groups
44
Overview of Object Groups
44
Adding a Description to a Network Object Group
45
Configuring a Host IP Address
45
Configuring a Network IP Address for a Network Object Group
45
Creating a Network Object Group
45
Configuring Service Object Groups
48
Adding a Description to a Service Object Group
48
Creating a Service Object Group
48
Defining Protocol Parameters for a Service Object Group
48
Using Object Groups in an ACL
52
Example of Configuring an Extended ACL Without Object Groups
52
Example of Configuring the Equivalent Extended ACL Using Object Groups
52
Example of How an Object Group Expands into Multiple ACL Entries
52
Applying an ACL to an Interface
55
Applying an ACL Globally to All Interfaces in a Context
56
Filtering Traffic with an ACL
57
ACL Configuration Examples
57
Examples of Extended Acls
57
Inbound and Outbound Acls
58
IP Addresses for Acls with NAT
58
Examples of Ethertype Acls
66
Displaying ACL Configuration Information and Statistics
67
Displaying ACL Configuration Information
67
Displaying ACL Statistics
67
Displaying the ACL Merge Tree Node Usage
69
Clearing ACL Statistics
69
CHAPTER 2 Configuring Authentication and Accounting Services
71
C H a P T E R 2 Configuring Authentication and Accounting Services
72
AAA Overview
72
Local Database and Remote Server Support
74
Local Database
75
TACACS+ Server
75
LDAP Directory Server
76
RADIUS Server
76
Authentication Overview
77
Accounting Overview
78
Authentication and Accounting Configuration Quick Start
78
Configuring the AAA Server
81
Configuring a TACACS+ Server
81
Configuring Authentication Settings on the TACACS+ Server
81
Configuring Accounting Settings on the TACACS+ Server
82
Defining Private Attributes for Virtualization Support in a TACACS+ Server
83
Configuring a RADIUS Server
85
Configuring Accounting Settings on the RADIUS Server
85
Configuring Authentication Settings on the RADIUS Server
85
Defining Private Attributes for Virtualization Support in a RADIUS Server
85
Configuring an LDAP Server
89
Defining Private Attributes for Virtualization Support in an LDAP Server
90
Creating User Accounts
93
Configuring the ACE as a Client of a RADIUS, TACACS+, or LDAP Server
94
Configuring RADIUS on the ACE
95
Configuring the Global RADIUS Server Dead-Time Interval
95
Configuring the RADIUS NAS-IP-Address Attribute
95
Setting the Global RADIUS Server Number of Retransmissions
95
Setting the Global RADIUS Server Preshared Key
95
Setting the Global RADIUS Server Timeout Value
95
Setting the RADIUS Server Parameters
95
Configuring TACACS+ on the ACE
101
Setting the Global Preshared Key
101
Setting the Global TACACS+ Server Dead-Time Interval
101
Setting the Global TACACS+ Server Timeout Value
101
Setting the TACACS+ Server Parameters
101
Configuring LDAP on the ACE
105
Setting the Global LDAP Server Port Setting
105
Setting the Global LDAP Server Timeout Value
105
Setting the LDAP Server Parameters
105
Setting the Global LDAP Server Timeout Value
108
Configuring AAA Server Groups
108
Configuring the User Profile Attribute Type for an LDAP Server
108
Creating a TACACS+, RADIUS, or LDAP Server Group
108
Setting the Dead-Time Interval for a RADIUS Server Group
108
Setting the Dead-Time Interval for a TACACS+ Server Group
108
Group
109
Configuring the User Profile Attribute Type for an LDAP Server Group
113
Configuring the Base DN for an LDAP Server Group
114
Configuring the Search Filter for an LDAP Server Group
115
Defining the Login Authentication Method
116
Defining the Default Accounting Method
118
Viewing AAA Status and Statistics
119
Displaying AAA Groups
119
Displaying RADIUS Server Configuration Information
119
Displaying TACACS+ Server Configuration Information
121
Displaying LDAP Server Configuration Information
122
Displaying Accounting Configuration Information
122
Displaying Accounting Log Information
123
Displaying Authentication Configuration Information
124
CHAPTER 3 Configuring Application Protocol Inspection
125
Application Protocol Inspection Overview
126
Performing Application Protocol Inspection
126
Application Inspection Protocol Overview
133
DNS Inspection
133
FTP Inspection
134
HTTP Deep Packet Inspection
136
ICMP Inspection
136
ILS Inspection
138
RTSP Inspection
139
SCCP Inspection
140
SIP Inspection
142
Application Protocol Inspection Configuration Quick Start Procedures
145
Configuring a Layer 7 FTP Command Inspection Policy
154
Configuring an FTP Inspection Class Map
155
Adding a Layer 7 FTP Inspection Class Map Description
155
Creating an FTP Inspection Class Map
155
Defining FTP Match Request Methods
155
Configuring a Layer 7 FTP Command Inspection Policy Map
157
Adding a Layer 7 FTP Inspection Policy Map Description
157
Creating a Layer 7 FTP Command Inspection Policy Map
157
Including Inline Match Statements in a Layer 7 FTP Command Inspection Policy Map
159
Associating a Layer 7 FTP Command Inspection Traffic Class with the Traffic Policy
160
Specifying the Layer 7 FTP Command Inspection Policy Actions
161
Configuring a Layer 7 HTTP Deep Inspection Policy
162
Configuring a Layer 7 HTTP Deep Inspection Class Map
163
Adding a Layer 7 HTTP Deep Packet Inspection Class Map Description
163
Creating an HTTP Deep Inspection Class Map
163
Defining a Header MIME-Type Messages for Inspection
163
Defining a Secondary Cookie for HTTP Inspection
163
Defining an HTTP Header for Inspection
163
Defining an HTTP Traffic Restricted Category
163
Defining HTTP Content Match Criteria
163
Defining the HTTP Maximum Header Length for Inspection
163
Defining the Length of the HTTP Content for Inspection
163
Configuring a Layer 7 HTTP Deep Packet Inspection Policy Map
187
Adding a Layer 7 HTTP Deep Packet Inspection Policy Map Description
187
Associating a Layer 7 HTTP Inspection Traffic Class with the Traffic Policy
187
Creating a Layer 7 HTTP Deep Packet Inspection Policy Map
187
Including Inline Match Statements in a Layer 7 HTTP Deep Packet
187
Inspection Policy Map
187
Specifying the Layer 7 HTTP Deep Packet Policy Actions
187
Description
188
Including Inline Match Statements in a Layer 7 HTTP Deep Packet Inspection Policy Map
189
Policy
191
Configuring a Layer 7 SCCP Inspection Policy
194
Creating a Layer 7 SCCP Inspection Policy Map
194
Adding a Description to the Layer 7 SCCP Inspection Policy Map
195
Including an Inline Match Statement in a Layer 7 SCCP Inspection Policy Map
196
Specifying the Layer 7 SCCP Inspection Policy Map Action
197
Configuring a Layer 7 SIP Inspection Policy
198
Configuring a Layer 7 SIP Inspection Class Map
198
Creating a Layer 7 SIP Inspection Class Map
199
Adding a Layer 7 Class Map Description for SIP Inspection
201
Defining the Called Party in the SIP to Header
201
Defining the Calling Party in the SIP from Header
202
Defining SIP Content Checks
203
Defining the SIP Instant Messaging Subscriber
205
Defining the Message Path Taken by SIP Messages
206
Defining the SIP Request Methods
207
Defining the SIP Party Registration Entities
208
Defining SIP URI Checks
209
Configuring a Layer 7 SIP Inspection Policy Map
210
Adding a Layer 7 SIP Inspection Policy Map Description
211
Creating a Layer 7 SIP Policy Map
211
Including Inline Match Statements in a Layer 7 SIP Inspection Policy Map
212
Associating the Layer 7 SIP Inspection Class Map with the Policy Map
213
Specifying the Layer 7 SIP Inspection Policy Map Actions
214
Configuring a Layer 3 and Layer 4 Application Protocol Inspection Traffic Policy
215
Configuration Guidelines for Inspection Traffic Policies
215
Configuring a Layer 3 and Layer 4 Class Map
217
Adding a Layer 3 and Layer 4 Class Map Description
218
Defining Access-List Match Criteria
219
Defining TCP/UDP Port Number or Port Range Match Criteria
220
Configuring a Layer 3 and Layer 4 Policy Map
223
Adding a Layer 3 and Layer 4 Policy Map Description
223
Creating a Layer 3 and Layer 4 Policy Map
223
Defining Layer 3 and Layer 4 Application Protocol Inspection Policy Actions
223
Specifying a Layer 3 and Layer 4 Traffic Class with the Traffic Policy
223
Policy
224
Configuring a DNS Parameter Map
230
Configuring a DNS Query Timeout
231
Associating a DNS Parameter Map with a Layer 3 and Layer 4 Policy Map
231
Configuring an HTTP Parameter Map
233
Disabling Case-Sensitivity Matching
234
Setting the Maximum Number of Bytes to Parse in HTTP Headers
234
Map
235
Setting the Maximum Number of Bytes to Parse in HTTP Content
235
Configuring an SCCP Parameter Map
236
Creating an SCCP Parameter Map
237
SCCP Inspection Configuration Considerations
237
Enabling Registration Enforcement
238
Setting the Maximum Message ID
238
Setting the Minimum and Maximum SCCP Prefix Length
239
Associating an SCCP Parameter Map with a Layer 3 and Layer 4 Policy Map
240
Configuring a SIP Parameter Map
240
Creating a SIP Parameter Map
241
SIP Inspection Configuration Considerations
241
Configuring a Timeout for a SIP Media Secure Port
242
Enabling Instant Messaging
242
Enabling Maximum Forward Field Validation
243
Configuring User Agent Software Version Options
244
Enabling Strict Header Validation
244
Map
246
Enabling Non-SIP URI Detection in SIP Messages
246
Applying a Service Policy
247
Examples of Application Protocol Inspection Configurations
249
Layer 7 HTTP Protocol Deep Packet Inspection
249
Layer 7 FTP Command Inspection
250
Layer 3 and Layer 4 Application Protocol Inspection for DNS Inspection
252
Information
253
Displaying HTTP Protocol Inspection Statistics
253
Viewing Application Protocol Inspection Statistics and Service Policy Information
253
Displaying Service Policy Configuration Information
254
CHAPTER 4 Configuring TCP/IP Normalization and IP Reassembly Parameters
259
TCP Normalization Overview
260
C H a P T E R 4 Configuring TCP/IP Normalization and IP Reassembly Parameters
261
IP Normalization Overview
261
TCP/IP Normalization and Termination Configuration Quick Start
261
Configuring a Connection Parameter Map for TCP/IP Normalization and Termination
264
Creating a Connection Parameter Map for TCP/IP, UDP, and ICMP
265
Configuring Rate Limits for a Policy Map
266
Setting the Maximum Receive or Transmit Buffer Share
267
Setting a Range for the Maximum Segment Size
268
Configuring ACE Behavior for a Segment that Exceeds the Maximum Segment Size
270
Setting the Maximum Number of TCP SYN Retries
270
Enabling Nagle's Algorithm
271
Enabling Random TCP Sequence Numbers
271
Configuring How the ACE Handles Reserved Bits
272
Configuring the Timeout for an Embryonic Connection
272
Configuring the Timeout for a Half-Closed Connection
273
Configuring the Connection Inactivity Timeout
274
Setting How the ACE Applies TCP Optimizations to Packets
274
Setting the Window Scale Factor
276
Enabling the TCP Slow Start Algorithm
277
Setting the ACK Delay Timer
277
Configuring How the ACE Handles TCP SYN Segments that Contain Data
278
Configuring How the ACE Handles TCP Options
278
Setting the Urgent Pointer Policy
282
Setting the Type of Service
283
Configuring a Traffic Policy for TCP/IP Normalization and Termination
284
Configuring a Layer 4 Class Map
284
Defining a Class Map Description
285
Defining a TCP or UDP Port Number or Port Range Match Criteria
285
Specifying IP Address Match Criteria
285
Configuring a Layer 3 and Layer 4 Policy Map
289
Associating a Layer 3 and Layer 4 Class Map with a Policy Map
289
Associating a Connection Parameter Map with a Policy Map
290
Associating a Layer 3 and Layer 4 Policy Map with a Service Policy
291
Configuring Interface Normalization Parameters
291
Disabling TCP Normalization on an Interface
292
Disabling the ICMP Security Checks on an Interface
293
Configuring SYN-Cookie Denial-Of-Service Protection
294
Configuration and Operational Considerations
294
Configuring SYN Cookie Dos Protection on an Interface
294
Overview of SYN Cookie Dos Protection
294
Configuring How the ACE Handles the Don't Fragment Bit
296
Configuring How the ACE Handles IP Options
297
Setting the IP Packet TTL
298
Configuring Unicast Reverse-Path Forwarding
298
Configuring IP Fragment Reassembly Parameters
300
IP Fragment Reassembly Configuration Quick Start
300
Configuring the MTU for an Interface
302
Configuring the Maximum Number of Fragments in a Packet
302
Configuring the Minimum Fragment Size for Reassembly
303
Configuring an IP Reassembly Timeout
303
Example of a TCP/IP Normalization and IP Reassembly Configuration
304
Reassembly, and SYN Cookie
306
Displaying TCP/IP and UDP Connection Configurations
306
Displaying a Connection Parameter Map
307
Displaying TCP/IP and UDP Connection Statistics
310
Displaying Global Context Connection Statistics
312
Displaying IP Statistics
313
Displaying IP Fragmentation and Reassembly Statistics
313
Displaying IP Traffic Information
313
Displaying TCP Statistics
317
Displaying UDP Statistics
318
Displaying Service Policy Statistics
319
Displaying SYN Cookie Statistics
320
Clearing TCP/IP and UDP Connections and Statistics
322
Clearing Connections
322
Clearing Connection Statistics
323
Clearing IP, TCP, and UDP Statistics
323
Clearing IP Statistics
323
Clearing TCP Statistics Clearing UDP Statistics
323
Clearing UDP Statistics
324
Clearing IP Fragmentation and Reassembly Statistics
325
Clearing SYN Cookie Statistics
325
CHAPTER 5 Configuring Network Address Translation
327
Network Address Translation Overview
328
Dynamic NAT
329
Dynamic PAT
331
Server Farm-Based Dynamic NAT
332
Static NAT
332
Static Port Redirection
333
Maximum Number of NAT Commands
333
Global Address Guidelines
334
Configuring an Idle Timeout for NAT
334
Configuring Dynamic NAT and PAT
335
Dynamic NAT and PAT Configuration Quick Start
335
Configuring an ACL
338
Configuring Interfaces for Dynamic NAT and PAT
338
Creating a Global IP Address Pool for NAT
338
Configuring a Class Map
341
Configuring a Class Map for Passive FTP
342
Configuring a Policy Map
342
Action
343
Service Policy
344
Applying the Dynamic NAT and PAT Policy Map to an Interface Using a Service Policy
344
Configuring Server Farm-Based Dynamic NAT
346
Server Farm-Based Dynamic NAT Configuration Quick Start
346
Configuring an ACL for Server Farm-Based Dynamic NAT
350
Configuring Interfaces for Server Farm-Based Dynamic NAT
350
Creating a Global IP Address Pool for Dynamic NAT
350
Configuring Real Servers and a Server Farm
352
Configuring a Layer 7 Load-Balancing Class Map for Server Farm-Based Dynamic NAT
352
Configuring a Layer 7 Load-Balancing Policy Map for Server Farm-Based Dynamic NAT
353
Configuring Server Farm-Based Dynamic NAT as a Layer 7 Policy Action
354
Policy
357
Configuring Static NAT and Static Port Redirection
358
Static NAT Configuration Quick Start
358
Configuring an ACL for Static NAT and Static Port Redirection
361
Configuring Interfaces for Static NAT and Static Port Redirection
361
Configuring a Class Map
361
Configuring a Policy Map
362
Configuring Static NAT and Static Port Redirection as a Policy Action
363
Interface Using a Service Policy
365
Displaying NAT Configurations and Statistics
367
Displaying NAT and PAT Configurations
367
Displaying IP Address and Port Translations
367
Dynamic NAT Example
368
Dynamic PAT Example
368
Static NAT Example
368
Static Port Redirection (Static PAT) Example
368
Clearing Xlates
370
NAT Configuration Examples
371
Dynamic NAT and PAT (SNAT) Configuration Example
371
Server Farm-Based Dynamic NAT (SNAT) Configuration Example
372
Static Port Redirection (DNAT) Configuration Example
373
SNAT with Cookie Load Balancing Example
374
I N D E X
377
Advertisement
Cisco 4700M Administration Manual (292 pages)
Application Control Engine Appliance
Brand:
Cisco
| Category:
Software
| Size: 8.38 MB
Table of Contents
Table of Contents
3
How to Use this Guide
12
Related Documentation
13
Chapter 1 Setting up the ACE
18
Prerequisites for Setting up the ACE
18
Default Settings
18
Establishing a Console Connection on the ACE
20
Using the Setup Script to Enable Connectivity to the Device Manager
21
Connecting and Logging in to the ACE
24
Changing or Resetting the Administrative Password
25
Changing the Administrative Password
26
Resetting the Administrator Account Password
27
Assigning a Name to the ACE
28
Configuring an ACE Inactivity Timeout
29
Configuring a Message-Of-The-Day Banner
30
Configuring the Date and Time
32
Setting the System Time and Date
32
Configuring the Time Zone
33
Adjusting for Daylight Saving Time
36
Synchronizing the ACE with an NTP Server
38
Configuring Terminal Settings
40
Configuring Terminal Display Attributes
40
Configuring Virtual Terminal Line Settings
42
Modifying the Boot Configuration
43
Setting the Boot Method from the Configuration Register
43
Setting the BOOT Environment Variable
44
Configuring the ACE to Bypass the Startup Configuration File During the Boot Process
45
Using the GRUB Boot Loader to Specify the System Boot Image During a Reload
47
Restarting the ACE
47
Restarting the ACE from the CLI
47
Shutting down the ACE
49
Displaying or Clearing the ACE Setup Configuration and Statistics
49
Displaying ACE Setup Configuration and Statistics
49
Displaying NTP Statistics and Information
49
Displaying Other ACE Setup Configuration Information
52
Clearing NTP Statistics
53
Chapter 2 Enabling Remote Access to the ACE
55
Chapter 2 Enabling Remote Acces to the ACE
56
Guidelines and Limitations
56
Default Settings
56
Enabling Remote Access to the ACE
57
Task Flow for Enabling Remote Access to the ACE
57
Configuring Remote Network Management Traffic Services
58
Creating and Configuring a Remote Management Class Map
59
Creating a Layer 3 and Layer 4 Remote Access Policy Map
63
Applying a Service Policy Globally to All VLAN Interfaces in the same Context
65
Applying a Service Policy to a Specific VLAN Interface
67
Configuring the Maximum Number of Telnet Management Sessions
69
Configuring SSH Management Session Parameters
70
Configuring Maximum Number of SSH Sessions
70
Generating SSH Host Key Pairs
71
Terminating an Active User Session
73
Enabling ICMP Messages to the ACE
74
Directly Accessing a User Context through SSH
75
Displaying Remote Access Session Information
76
Displaying Telnet Session Information
77
Displaying SSH Session Information
77
Displaying Other Remote Access Session Information
78
Configuration Example for Enabling Remote Access to the ACE
79
Chapter 3 Managing ACE Software Licenses
81
Information about ACE Licenses
81
Guidelines and Limitations
85
Prerequisites
85
Default License Feature Capabilities
85
Managing ACE Appliance Software Licenses
86
Tasks for Ordering an Upgrade License and Generating a Key
86
Copying a License File to the ACE
86
Installing a New or Upgrade License File
87
Replacing a Demo License with a Permanent License
88
Removing a License
89
Removing a Performance Throughput, HTTP Compression, Application Acceleration License, or SSL License
89
Removing a Virtual Context License
91
Backing up an ACE License File
93
Retrieving an ACE License File
93
Displaying ACE License Configurations and Statistics
94
Chapter 4 Managing the ACE Software
97
Saving Configuration Files
97
Saving the Configuration File in Flash Memory
98
Saving Configuration Files to a Remote Server
98
Copying the Configuration File to the Disk0: File System
99
Merging the Startup-Configuration File with the Running-Configuration File
100
Displaying Configuration File Content
100
Clearing the Startup-Configuration File
102
Copying Configuration Files from a Remote Server
103
Using the File System on the ACE
104
Copying Files
104
Copying a Packet Capture Buffer
104
Copying an ACE Software System Image to a Remote Server
104
Copying Files from a Remote Server
104
Copying Files to a Remote Server
104
Copying Files to Another Directory on the ACE
104
Copying Licenses
104
Uncompressing Files in the Disk0: File System
109
Untarring Files in the Disk0: File System
110
Creating a New Directory
111
Deleting an Existing Directory
111
Moving Files
111
Deleting Files
112
Displaying Files Residing on the ACE
114
Saving Show Command Output to a File
115
Managing Core Dump Files
117
Copying Core Dumps
117
Clearing the Core Directory
118
Deleting a Core Dump File
119
Capturing Packet Information
119
Enabling the Packet Capture Function
120
Copying Packet Capture Buffer Information
121
Displaying or Clearing Packet Information
122
Displaying Packet Information
122
Clearing Capture Buffer Information
123
Using the Configuration Checkpoint and Rollback Service
123
Creating a Configuration Checkpoint
123
Deleting a Configuration Checkpoint
124
Rolling Back a Running Configuration
125
Displaying Checkpoint Information
125
Reformatting the Flash Memory
126
Chapter 5 Displaying ACE Hardware and Software System Information
129
Information about Displaying ACE Hardware and Software Information
129
Displaying Hardware Information
130
Displaying Installed Software Information
131
Displaying System Processes and Memory Resources Limits
132
Displaying General System Process Information
132
Displaying Detailed Process Status Information and Memory Resource Limits
135
Displaying System Information
137
Displaying or Clearing ICMP Statistics
139
Displaying or Collecting Technical Information for Reporting Problems
141
Chapter 6 Configuring Redundant Aces
145
Information about Redundancy
145
Redundancy Protocol
146
Stateful Failover
147
Ft Vlan
148
Configuration Synchronization
148
Redundancy State for Software Upgrade or Downgrade
149
Guidelines and Limitations
149
Default Settings
150
Configuring Redundant Aces
151
Task Flow for Configuring Redundancy
151
Configuring Redundancy
153
Configuring an FT VLAN
153
Configuring an Alias IP Address
155
Configuring an FT Peer
156
Configuring an FT Group
158
Modifying an FT Group
160
Specifying the Peer Hostname
160
Specifying the MAC Address Banks for a Shared VLAN
161
Forcing a Failover
162
Synchronizing Redundant Configurations
163
Configuring Tracking and Failure Detection
165
Configuring Tracking and Failure Detection for a Host or Gateway
166
Configuring Tracking and Failure Detection for an Interface
169
Displaying or Clearing Redundancy Information
171
Displaying Redundancy Information
172
Displaying Bulk Synchronization Command Failures on the Standby ACE
172
Displaying Redundancy Configuration Information
172
Displaying FT Group Information
173
Displaying Memory Statistics
176
Displaying the IDMAP Table
176
Displaying the Redundancy Internal Software History
176
Displaying Peer Information
177
Displaying FT Statistics
179
Displaying FT Tracking Information
180
Clearing Redundancy Statistics
183
Clearing Transport-Layer Statistics
183
Clearing All Redundancy Statistics
184
Clearing Heartbeat Statistics
184
Clearing the Redundancy History
184
Clearing Tracking-Related Statistics
184
Configuration Example of Redundancy
185
Chapter 7 Configuring SNMP
187
Information about SNMP
187
Managers and Agents
188
SNMP Manager and Agent Communication
188
SNMP Traps and Informs
189
Snmpv3 CLI User Management and AAA Integration
189
CLI and SNMP User Synchronization
190
Multiple String Index Guidelines
190
Supported Mibs and Notifications
191
Default Settings for SNMP
216
Configuring SNMP
217
Task Flow for Configuring SNMP
217
Configuring SNMP Users
218
Defining SNMP Communities
221
Configuring an SNMP Contact
222
Configuring an SNMP Location
223
Configuring SNMP Notifications
224
Configuring SNMP Notification Hosts
224
Enabling SNMP Notifications
226
Enabling the IETF Standard for SNMP Linkup and Linkdown Traps
228
Unmasking the SNMP Community Name and Community Security Name Oids
229
Assigning a Trap-Source Interface for SNMP Traps
230
Accessing ACE User Context Data through the Admin Context IP Address
231
Accessing User Context Data When Using Snmpv1/V2
231
Accessing User Context Data When Using Snmpv3
232
Configuring an Snmpv3 Engine ID for an ACE Context
232
Configuring SNMP Management Traffic Services
233
Creating and Configuring a Layer 3 and Layer 4 Class Map
234
Creating a Layer 3 and Layer 4 Policy Map
236
Applying a Service Policy Globally to All VLAN Interfaces in the same Context
238
Applying a Service Policy to a Specific VLAN Interface
239
Displaying or Clearing SNMP and Service Policy Statistics
241
Displaying SNMP and Service Policy Statics
241
Displaying SNMP Statistical Information
241
Displaying SNMP Service Policy Statistics
244
Clearing SNMP Service Policy Statistics
245
Example of an SNMP Configuration
245
Chapter 8 Configuring the XML Interface
247
Information about XML
247
HTTP and HTTPS Support with the ACE
248
HTTP Return Codes
249
Document Type Definition
250
Guidelines and Limitations
252
Default Settings
252
Configuring the XML Interface
253
Task Flow for Configuring XML
253
Configuring HTTP and HTTPS Management Traffic Services
254
Applying a Service Policy Globally to All VLAN Interfaces in the same Context
254
Applying a Service Policy to a Specific VLAN Interface
254
Creating a Layer 3 and Layer 4 Policy Map
254
Creating and Configuring a Class Map
254
Creating a Layer 3 and Layer 4 Policy Map
257
Applying a Service Policy to a Specific VLAN Interface
260
Enabling the Display of Raw XML Request Show Command Output in XML Format
261
Accessing the ACE DTD File
264
Displaying or Clearing XML Service Policy Statistics
265
Displaying XML Service Policy Statistics
265
Clearing XML Service Policy Statistics
265
Example of ACE CLI Command and the XML Equivalent
266
Appendix
267
Upgrading or Downgrading Your ACE Software
267
Overview of Upgrading ACE Software
267
A P P E N D I X a Upgrading or Downgrading Your ACE Software
268
Prerequisites for Upgrading Your ACE
268
Changing the Admin Password
268
Changing the Www User Password
268
Checking Your Configuration for FT Priority and Preempt
268
Creating a Checkpoint
268
Updating Your Application Protocol Inspection Configurations
269
Performing Software Upgrades and Downgrades
270
Task Flow for Upgrading the ACE Software
270
Task Flow for Downgrading the ACE Software
273
Copying the Software Upgrade Image to the ACE
275
Configuring the ACE to Autoboot the Software Image
276
Configuring the Configuration Register to Autoboot the Boot Variable
276
Setting the Boot Variable
276
Reloading the ACE
277
Displaying Software Image Information
277
Displaying the Boot Variable and Configuration Register
278
Displaying the Software Version
278
I N D E X
281
Cisco 4700M Upgrade Manual (24 pages)
Upgrading Memory
Brand:
Cisco
| Category:
Storage
| Size: 0.6 MB
Table of Contents
Safety Recommendations
3
Safety with Electricity
4
Preventing Electrostatic Discharge Damage
4
Required Tools
5
Memory Replacement Procedures
11
Testing Your Installation
23
Cisco Connection Online
23
Advertisement
Cisco 4700M Installation Manual (18 pages)
Rack-Mount and Wall-Mount
Brand:
Cisco
| Category:
Network Router
| Size: 0.34 MB
Table of Contents
Safety Recommendations
2
Safety with Electricity
2
Required Tools and Parts
3
Cisco Connection Online
18
Cisco 4700M Replacement Manual (16 pages)
Replacing the Power Supply
Brand:
Cisco
| Category:
Network Router
| Size: 0.62 MB
Table of Contents
Safety Recommendations
4
Safety with Electricity
4
Preventing Electrostatic Discharge Damage
5
Tools and Equipment Required
5
Replacing the Component Tray
12
Cisco Connection Online
16
Advertisement
Related Products
Cisco 4700 series
Cisco ME 4924-10GE
Cisco 4500-M
Cisco 4006 - Catalyst Switch
Cisco 4000 Series
Cisco Catalyst 4948
Cisco 4331
Cisco 4331 ISR
Cisco 4351 ISR
Cisco 4321 ISR
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL