Index
IN-3
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
using e-mail 37-49
with IMAP client 37-49
application inspection
about
25-2
applying 25-5
configuring 25-5
inspection class map 21-9
inspection policy map 21-10
security level requirements 7-1
special actions 21-5
Application Profile Customization Framework 37-29
ARP inspection
about
26-1
enabling 26-2
static entry 26-2
ARP spoofing 26-2
ARP test, failover 14-16
ASA (Adaptive Security Algorithm) 1-4
ASA 5505
backup interface
4-6
Base license 4-2
client
authentication
34-12
configuration restrictions, table 34-2
device pass-through 34-8
group policy attributes pushed to 34-10
mode 34-3
remote management 34-9
split tunneling 34-8
TCP 34-4
trustpoint 34-7
tunnel group 34-6
tunneling 34-5
Xauth 34-4
interfaces, about 4-1
MAC addresses 4-4
maximum VLANs 4-2
native VLAN support 4-11
non-forwarding interface 4-6
power over Ethernet 4-4
protected switch ports 4-9
Security Plus license 4-2
server (headend) 34-1, 34-2
SPAN 4-4
Spanning Tree Protocol, unsupported 4-9
VLAN interface configuration 4-5
ASDM software
allowing access
40-3
installing 41-3
ASR 14-34
asymmetric routing support 14-34
attributes
LDAP
E-5
policy E-2
RADIUS E-25
username 30-71
attribute-value pairs (AVP) 30-30
authentication
about
13-1
ASA 5505 as Easy VPN client 34-12
CLI access 40-5
FTP 19-2
HTTP 19-2
network access 19-1
privileged EXEC mode 40-5
restrictions, WebVPN 37-4
Telnet 19-2
web clients 19-5
WebVPN users with digital certificates 37-14
authorization
about
13-2
command 40-7
downloadable access lists 19-7
network access 19-5
Auto-MDI/MDIX 5-1
auto-signon
group policy WebVPN attribute
30-63
username WebVPN attribute 30-82