EasyManuals Logo
Home>Cisco>Firewall>5510 - ASA SSL / IPsec VPN Edition

Cisco 5510 - ASA SSL / IPsec VPN Edition User Manual

Cisco 5510 - ASA SSL / IPsec VPN Edition
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1517 background imageLoading...
Page #1517 background image
1-13
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring the ASA CX Module
Managing the ASA CX Module
Managing the ASA CX Module
This section includes procedures that help you manage the module and includes the following topics:
Resetting the Password, page 1-13
Reloading or Resetting the Module, page 1-14
Shutting Down the Module, page 1-15
Note You can install or upgrade your image from within the ASA CX module. See the ASA CX module
documentaiton for more information.
Resetting the Password
You can reset the module password to the default. For the user admin, the default password is
Admin123. After resetting the password, you should change it to a unique value using the module
application.
Resetting the module password causes the module to reboot. Services are not available while the module
is rebooting.
Step 6
(Optional)
class name2
Example:
hostname(config-pmap)# class cx_class2
If you created multiple class maps for ASA CX traffic, you can
specify another class for the policy.
See the “Feature Matching Within a Service Policy” section on
page 1-3 for detailed information about how the order of classes
matters within a policy map. Traffic cannot match more than one
class map for the same action type.
Step 7
(Optional)
cxsc {fail-close | fail-open} [auth-proxy]
Example:
hostname(config-pmap-c)# cxsc fail-close
auth-proxy
Specifies that the second class of traffic should be sent to the ASA
CX module.
Add as many classes as desired by repeating these steps.
Step 8
service-policy policymap_name {global |
interface interface_name}
Example:
hostname(config)# service-policy cx_policy
interface outside
Activates the policy map on one or more interfaces. global applies
the policy map to all interfaces, and interface applies the policy
to one interface. Only one global policy is allowed. You can
override the global policy on an interface by applying a service
policy to that interface. You can only apply one policy map to
each interface.
Command Purpose

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals