Index
IN-12
Cisco Security Appliance Command Line Configuration Guide
OL-10088-01
K
keep-alive-ignore
group policy WebVPN attribute
30-65
username WebVPN attribute 30-82
Kerberos
configuring
13-12
support 13-5
L
L2TP description 28-1
LAN-to-LAN tunnel group, configuring 30-13
latency
about
24-1
configuring 24-8
reducing 24-9
Layer 2 firewall
See transparent firewall
Layer 2 forwarding table
See MAC address table
Layer 2 Tunneling Protocol
28-1
LDAP
AAA support
13-6
application inspection 25-51
attribute mapping 13-8
Cisco attributes E-5
Cisco-AV-pair E-14
configuring 13-12
configuring a AAA server E-2 to E-18
directory about E-3
directory search E-4
example configuration procedures E-19 to E-22
hierarchy example E-3
permissions policy E-2
SASL 13-6
schema example E-15
schema loading E-18
schema planning E-3 to E-5
server configuration about E-3
server type 13-7
user authentication 13-6
user authorization 13-7
user permissions E-18
LEAP Bypass, group policy 30-46
licenses
FO
14-2
FO_AA 14-2
managing 41-1
per model A-1
UR 14-2
link up/down test 14-16
LLQ
See low-latency queue
load balancing
cluster configurations
29-7
concepts 29-5
eligible clients 29-7
eligible platforms 29-7
implementing 29-6
mixed cluster scenarios 29-8
platforms 29-7
prerequisites 29-6
local user database
adding a user
13-11
configuring 13-10
logging in 40-6
support 13-9
lockout recovery 40-15
log buffer
save to internal Flash
42-13
send to FTP server 42-14
logging
access lists
16-18
classes
filtering messages by
42-15
types 42-16
device-id, including in system log messages 42-19