Cisco 11000 Series Secure
Content Accelerator
Configuration Guide
April 2003
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: 78-13124-06
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICA TION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency ener gy and, if not installed
and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate
radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television
reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in
part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation.
However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class
A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct
any interference to radio or television communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco
equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by
using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television
or radio are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCIP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ
Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and
Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to
Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE,
CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital,
the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient,
IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S.
and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0208R)
This product includes cryptographic software written by Eric A. Young. This product includes software written by Tim J. Hudson.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Cisco 11000 Series Secure Content Accelerator Configuration Guide
ix
Contents
Use with the CSS B-4
In-Line B-4
One-Armed Non-Transparent Proxy B-10
One-Armed Transparent Proxy B-19
Connecting the Device to a Terminal Server B-30
Web Site Changes B-30
Transparent Local-Listen B-31
APPENDIX
CCommand Summary C-1
Input Data Format Specification C-2
Text Conventions C-2
Editing and Completion Features C-3
Command Hierarchy C-5
Configuration Security C-6
Passwords C-6
Access Lists C-7
Factory Default Reset Password C-7
Methods to Manage the Device C-7
Initiating a Management Session C-9
Serial Management and IP Address Assignment C-9
Telnet C-10
Command Listing C-10
Top Level Command Set C-31
Non-Privileged Command Set C-31
Cisco 11000 Series Secure Content Accelerator Configuration Guide
x
clear screen C-31
cls C-31
enable C-31
78-13124-06
exit C-32
help C-32
monitor C-33
paws C-33
ping C-33
quit C-34
set monitor-interval C-34
show arp C-35
show copyrights C-35
show cpu C-35
show date C-36
Contents
show device C-36
show dns C-37
show flows C-37
show history C-37
show interface C-38
show interface errors C-38
show interface statistics C-39
show ip domain-name C-40
show ip name-server C-40
show ip routes C-41
show ip statistics C-41
show keepalive-monitor C-41
show log C-42
show memory C-42
78-13124-06
show messages C-42
show netstat C-43
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xi
Contents
show password C-43
show password access C-43
show password enable C-44
show password idle-timeout C-44
show processes C-44
show rdate-server C-45
show rip C-45
show route C-45
show sessions C-46
show sntp C-46
show sntp-server C-46
show ssl C-47
show ssl cert C-47
show ssl certgroup C-48
show ssl errors C-49
show ssl key C-54
show ssl secpolicy C-54
show ssl server C-55
show ssl session-stats C-56
show ssl statistics C-58
show ssl tcp-tuning C-60
show syslog C-61
show system-resources C-61
show telnet C-62
show terminal C-62
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Regulatory Standards Compliance 16
Canadian Radio Frequency Emissions Statement 16
FCC Class A 17
CISPR 22 (EN 55022) Class A 18
VCCI 18
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxiv
78-13124-06
Figure 2-1Secure Content Accelerator Front Panel 2-6
Figure 2-2Secure Content Accelerator Rear Panel 2-6
Figure 2-3SCA Ethernet Port Detail 2-7
Figure 2-4SCA2 Ethernet Port Detail 2-7
Figure 4-1Configuration Manager Hierarchy 4-2
Figure 5-1Password Request Dialog Box 5-4
Figure 5-2Basic User Interface Example 5-6
Figure 5-3Changing Hostname Configuration Example 5-8
Figure 5-4Resetting IP Information Configuration Example 5-9
Figure 5-5Ethernet Interface Configuration Example 5-10
Figure 5-6RIP Configuration Example 5-11
Figure 5-7Routing Table Configuration Example 5-12
FIGURES
Figure 5-8Adding a Route Example 5-12
Figure 5-9Syslog Configuration Example 5-13
Figure 5-10Access List Configuration Example 5-14
Figure 5-11Add Access List Entry Example 5-15
Figure 5-12Subsystem Access Configuration Example 5-16
Figure 5-13Device Reloading Example 5-17
Figure 5-14Save Changes Button 5-17
Figure 5-15Change Password Example 5-18
Figure 5-16SNMP Configuration Example 5-19
Figure 5-17SNMP Trap Example 5-20
Figure 5-18Add SNMP Trap Host Example 5-21
Cisco 11000 Series Secure Content Accelerator Configuration Guide
78-13124-06
xxv
Figures
Figure 5-19Private Keys Tab 5-22
Figure 5-20Add Private Key Example 5-23
Figure 5-21Importing a Private Key File Example 5-24
Figure 5-22Certificates Tab 5-25
Figure 5-23Add Certificate Example 5-26
Figure 5-24Importing a Certificate Example 5-27
Figure 5-25Security Policies Tab 5-28
Figure 5-26Add Security Policy Example 5-29
Figure 5-27Secure Servers Tab 5-30
Figure 5-28Add Secure Server Information Example 5-31
Figure 5-29Server Certificate and Security Policy Example 5-32
Figure 5-30SSL Session Cache Example 5-32
Figure 5-31Add URL Rewrite Rule Example 5-33
Figure 5-32Add Secure Server Information Example 5-33
Figure 5-33Add HTTP Headers Example 5-34
Figure 5-34Add Keepalives Example 5-34
Figure 5-35Certificate Groups Tab 5-35
Figure 5-36Add Certificate Group Example 5-36
Figure 5-37Assign Certificate Group Example 5-37
Figure 5-38Configuring for Other Protocols Example 5-38
Figure 5-39Generating a Private Key 5-39
Figure 5-40Key Not Displayed Example 5-40
Figure 5-41Key Displayed Example 5-41
Figure 5-42Generate CSR Example 5-42
Figure 5-43Generate Self-Signed Certificate 5-43
Figure 5-44Self-Signed Certificate Example 5-44
Figure 5-45Successfully Generated Self-Signed Certificate 5-45
Cisco 11000 Series Secure Content Accelerator Configuration Guide