Index
IN-11
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
See ISAKMP
intrusion prevention configuration
22-2
IP addresses
ASA 5505
4-7
classes D-1
configuring an assignment method for remote access
clients
31-1
configuring for VPNs 31-1
configuring local IP address pools 31-2
interface 7-4
management, transparent firewall 8-5
private D-2
subnet mask D-4
IP phone 34-8
IP phone bypass, group policy 30-45
IPS configuration 22-2
IPSec
about
27-2
access list 27-20
basic configuration with static crypto maps 27-22
Cisco VPN Client 27-2
configuring 27-1, 27-11
crypto map entries 27-12
enabling debug 28-8
fragmentation policy 27-8
LAN-to-LAN configurations 27-2
modes 28-2
over NAT-T, enabling 27-7
over TCP, enabling 27-8
over UDP, group policy, configuring attributes 30-40
remote access configurations 27-2
remote-access tunnel group 30-6
SA lifetimes, changing 27-22
setting maximum active VPN sessions 29-3
tunnel 27-11
viewing configuration 27-26
IPSec parameters, tunnel group 30-3
ipsec-ra, creating an IPSec remote-access tunnel 30-6
IP spoofing, preventing 23-5
IPv6
access lists
12-6
commands 12-1
configuring alongside IPv4 12-4
default route 12-5
dual IP stack 12-4
duplicate address detection 12-4
enabling 12-3
neighbor discovery 12-7
router advertisement messages 12-9
static neighbor 12-11
static routes 12-5
verifying 12-11
IPv6 addresses
anycast
D-9
command support for 12-1
format D-5
multicast D-8
prefixes D-10
required D-10
types of D-6
unicast D-6
ISAKMP
about
27-2
configuring 27-1, 27-2
determining an ID method for peers 27-6
disabling in aggressive mode 27-6
enabling on the outside interface 27-6, 32-3
keepalive setting, tunnel group 30-3
policies, configuring 27-5
See also IKE
J
Java applets, filtering 20-2
Java object signing 37-28
java-trustpoint 37-28