Cisco 11000 Series Secure
Content Accelerator
Configuration Guide
April 2003
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: 78-13124-06
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICA TION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class
A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when
the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency ener gy and, if not installed
and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a
residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate
radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television
reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in
part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation.
However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class
A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct
any interference to radio or television communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco
equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by
using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television
or radio are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
Page 3
CCIP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ
Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and
Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to
Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE,
CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital,
the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient,
IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S.
and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0208R)
This product includes cryptographic software written by Eric A. Young. This product includes software written by Tim J. Hudson.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Cisco 11000 Series Secure Content Accelerator Configuration Guide
ix
Page 10
Contents
Use with the CSS B-4
In-Line B-4
One-Armed Non-Transparent Proxy B-10
One-Armed Transparent Proxy B-19
Connecting the Device to a Terminal Server B-30
Web Site Changes B-30
Transparent Local-Listen B-31
APPENDIX
CCommand Summary C-1
Input Data Format Specification C-2
Text Conventions C-2
Editing and Completion Features C-3
Command Hierarchy C-5
Configuration Security C-6
Passwords C-6
Access Lists C-7
Factory Default Reset Password C-7
Methods to Manage the Device C-7
Initiating a Management Session C-9
Serial Management and IP Address Assignment C-9
Telnet C-10
Command Listing C-10
Top Level Command Set C-31
Non-Privileged Command Set C-31
Cisco 11000 Series Secure Content Accelerator Configuration Guide
x
clear screen C-31
cls C-31
enable C-31
78-13124-06
Page 11
exit C-32
help C-32
monitor C-33
paws C-33
ping C-33
quit C-34
set monitor-interval C-34
show arp C-35
show copyrights C-35
show cpu C-35
show date C-36
Contents
show device C-36
show dns C-37
show flows C-37
show history C-37
show interface C-38
show interface errors C-38
show interface statistics C-39
show ip domain-name C-40
show ip name-server C-40
show ip routes C-41
show ip statistics C-41
show keepalive-monitor C-41
show log C-42
show memory C-42
78-13124-06
show messages C-42
show netstat C-43
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xi
Page 12
Contents
show password C-43
show password access C-43
show password enable C-44
show password idle-timeout C-44
show processes C-44
show rdate-server C-45
show rip C-45
show route C-45
show sessions C-46
show sntp C-46
show sntp-server C-46
show ssl C-47
show ssl cert C-47
show ssl certgroup C-48
show ssl errors C-49
show ssl key C-54
show ssl secpolicy C-54
show ssl server C-55
show ssl session-stats C-56
show ssl statistics C-58
show ssl tcp-tuning C-60
show syslog C-61
show system-resources C-61
show telnet C-62
show terminal C-62
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Regulatory Standards Compliance 16
Canadian Radio Frequency Emissions Statement 16
FCC Class A 17
CISPR 22 (EN 55022) Class A 18
VCCI 18
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxiv
78-13124-06
Page 25
Figure 2-1Secure Content Accelerator Front Panel 2-6
Figure 2-2Secure Content Accelerator Rear Panel 2-6
Figure 2-3SCA Ethernet Port Detail 2-7
Figure 2-4SCA2 Ethernet Port Detail 2-7
Figure 4-1Configuration Manager Hierarchy 4-2
Figure 5-1Password Request Dialog Box 5-4
Figure 5-2Basic User Interface Example 5-6
Figure 5-3Changing Hostname Configuration Example 5-8
Figure 5-4Resetting IP Information Configuration Example 5-9
Figure 5-5Ethernet Interface Configuration Example 5-10
Figure 5-6RIP Configuration Example 5-11
Figure 5-7Routing Table Configuration Example 5-12
FIGURES
Figure 5-8Adding a Route Example 5-12
Figure 5-9Syslog Configuration Example 5-13
Figure 5-10Access List Configuration Example 5-14
Figure 5-11Add Access List Entry Example 5-15
Figure 5-12Subsystem Access Configuration Example 5-16
Figure 5-13Device Reloading Example 5-17
Figure 5-14Save Changes Button 5-17
Figure 5-15Change Password Example 5-18
Figure 5-16SNMP Configuration Example 5-19
Figure 5-17SNMP Trap Example 5-20
Figure 5-18Add SNMP Trap Host Example 5-21
Cisco 11000 Series Secure Content Accelerator Configuration Guide
78-13124-06
xxv
Page 26
Figures
Figure 5-19Private Keys Tab 5-22
Figure 5-20Add Private Key Example 5-23
Figure 5-21Importing a Private Key File Example 5-24
Figure 5-22Certificates Tab 5-25
Figure 5-23Add Certificate Example 5-26
Figure 5-24Importing a Certificate Example 5-27
Figure 5-25Security Policies Tab 5-28
Figure 5-26Add Security Policy Example 5-29
Figure 5-27Secure Servers Tab 5-30
Figure 5-28Add Secure Server Information Example 5-31
Figure 5-29Server Certificate and Security Policy Example 5-32
Figure 5-30SSL Session Cache Example 5-32
Figure 5-31Add URL Rewrite Rule Example 5-33
Figure 5-32Add Secure Server Information Example 5-33
Figure 5-33Add HTTP Headers Example 5-34
Figure 5-34Add Keepalives Example 5-34
Figure 5-35Certificate Groups Tab 5-35
Figure 5-36Add Certificate Group Example 5-36
Figure 5-37Assign Certificate Group Example 5-37
Figure 5-38Configuring for Other Protocols Example 5-38
Figure 5-39Generating a Private Key 5-39
Figure 5-40Key Not Displayed Example 5-40
Figure 5-41Key Displayed Example 5-41
Figure 5-42Generate CSR Example 5-42
Figure 5-43Generate Self-Signed Certificate 5-43
Figure 5-44Self-Signed Certificate Example 5-44
Figure 5-45Successfully Generated Self-Signed Certificate 5-45
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Cisco 11000 Series Secure Content Accelerator Configuration Guide
78-13124-06
xxix
Page 30
Tables
Table C-13Security Policy Configuration Command Description C-26
Table C-14Server Configuration Command Description C-27
Table C-15TCP Tuning Configuration Command Description C-29
Table C-16Output Description for show ssl errors C-49
Table C-17Abbreviations Used for show ssl errors continuous C-53
Table C-18Output Description for show ssl session-stats C-57
Table C-19Output Description for show ssl statistics C-59
Table C-20Headers Inserted with httpheader client-cert Command C-173
Table C-21Headers Inserted with httpheader session Command C-174
Table C-22Headers Inserted with httpheader server-cert Command C-174
Table D-1Firmware Image Selection D-5
Table D-2Firmware Image Selection D-7
Table E-1Troubleshooting the Hardware E-2
Table F-1Secure Content Accelerator Cryptographic Algorithms 10
Table G-1Regulatory Standards Compliance 16
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxx
78-13124-06
Page 31
About This Guide
This guide can help you successfully install and configure the Cisco 11000 Series
Secure Content Accelerators (SCA and SCA2). It also provides helpful
troubleshooting suggestions for potential hardware and software problems.
How to Use This Guide
This section describes the contents of this guide.
SectionDescription
Chapter 1, OverviewThis chapter describes the features and
functions of the Secure Content
Accelerator.
Chapter 2, Installing the Hardware and
Software
Chapter 3, Using the QuickStart
Wizard
Chapter 4, Using the Configuration
Manager
78-13124-06
This chapter describes how to install
the Secure Content Accelerator as a
free-standing or rack-mount unit.
This chapter provides instructions for
using the QuickStart wizard.
This chapter describes how to use the
configuration manager to configure the
SSL appliance.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxi
Page 32
How to Use This Guide
About This Guide
SectionDescription
Chapter 5, Graphical User Interface
Reference
This chapter describes how to use the
Graphical User Interface (GUI) to
configure the Cisco Secure Content
Accelerator. The GUI provides a
conv enient, Web browser-based
method of configuring SSL appliances.
Chapter 6, FIPS OperationThis chapter provides a basic
introduction to FIPS and describes how
to configure the Secure Content
Accelerator for FIPS operation. FIPS
operation is only availble for the
SCA2.
Appendix A, SpecificationsThis appendix provides specifications
for the Secure Content Accelerator.
Appendix B, Deployment ExamplesThis appendix provides examples for
configuring and deploying the Secure
Content Accelerator in conjunction
with other networking hardware.
command descriptions and examples to
help you take advantage of Secure
Content Accelerator features.
xxxii
Appendix D, MiniMax Command
Summary
MiniMax command descriptions and
examples
Appendix E, T roubleshootingThis appendix provides information to
help you isolate and solve problems. It
also provides information on using the
Cisco Connection Online.
Appendix F, SSL IntroductionThis appendix presents a short
introduction to SSL and a description
of how the components are used in
configuration. Instructions for
generating keys and certificates with
OpenSSL is also included chapter.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
78-13124-06
Page 33
About This Guide
SectionDescription
Appendix G, Regulatory InformationThis appendix provides information on
GlossaryThis section provides definitions of
IndexThe index provides a detailed list to
Symbols and Conventions
This guide uses the following symbols and conventions to emphasize certain
information.
Symbols and Conventions
regulatory compliance.
terms used in this document.
help you locate specific information
quickly.
Warning
CautionA caution means that a specific action you take could cause a loss of
This warning symbol means danger. You are in a situation that
could cause bodily injury. Before you work on any equipment, be
aware of the hazards involved with electrical circuitry and be
familiar with standard practices for preventing accidents. Read
the installation instructions before you connect the system to its
power source.
data or adversely impact use of the equipment.
NoteA note provides important related information, reminders, and
recommendations.
Bold text indicates a command in a paragraph.
Courier text indicates text that appears in a command line (such as the command
line interface) or is returned by the computer.
Courier bold text indicates commands and text you enter in a command line.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxiii
Page 34
Symbols and Conventions
About This Guide
Italic text indicates the first occurrence of a new term, a book title, and
emphasized text.
1.A numbered list indicates that the order of the list items is important.
a. An alphabetical list indicates that the order of the secondary list items is
important.
•A bulleted list indicates that the order of the list topics is unimportant.
–
An indented dashed list indicates that the order of the list topics is
unimportant.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxiv
78-13124-06
Page 35
About This Guide
Obtaining Documentation
Cisco provides several ways to obtain documentation, technical assistance, and
other technical resources. These sections explain how to obtain technical
information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at
this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
Obtaining Documentation
International Cisco web sites can be accessed from this URL:
Cisco documentation and additional literature are available in a Cisco
Documentation CD-ROM package, which may have shipped with your product.
The Documentation CD-ROM is updated monthly and may be more current than
printed documentation. The CD-ROM package is available as a single unitor
through an annual subscription.
Registered Cisco.com users can order the Documentation CD-ROM (product
number DOC-CONDOCCD=) through the online Subscription Store:
http://www.cisco.com/go/subscription
Ordering Documentation
You can find instructions for ordering documentation at this URL:
•Registered Cisco.com users can order the Documentation CD-ROM
(Customer Order Number DOC-CONDOCCD=) through the online
Subscription Store:
http://www.cisco.com/go/subscription
•Nonregistered Cisco.com users can order documentation through a local
account representative by calling Cisco Systems Corporate Headquarters
(California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by
calling 800 553-NETS (6387).
Documentation Feedback
You can submit comments electronically on Cisco.com. On the Cisco
Documentation home page, click Feedback at the top of the page.
You can e-mail your comments to bug-doc@cisco.com.
You can submit your comments by mail by using the response card behind the
front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxvi
78-13124-06
Page 37
About This Guide
Obtaining Technical Assistance
Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center
(TAC) Website, as a starting point for all technical assistance. Customers and
partners can obtain online documentation, troubleshooting tips, and sample
configurations from the Cisco TAC website. Cisco.com registered users have
complete access to the technical support resources on the Cisco TAC website,
including TAC tools and utilities.
Cisco.com
Cisco.com offers a suite of interactive, networked services that let you access
Cisco information,networking solutions, services, programs, and resources at any
time, from anywhere in the world.
Obtaining Technical Assistance
Cisco.com provides a broad range of features and services to help you with these
tasks:
•Streamline business processes and improve productivity
•Resolve technical issues with online support
•Download and test software packages
•Order Cisco learning materials and merchandise
•Register for online skill assessment, training, and certification programs
T o obtain customized information and service, you can self-register on Cisco.com
at this URL:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC is av ailable to all customers who need technical assistance with a
Cisco product, technology, or solution. Two levels of support are available: the
Cisco TAC website and the Cisco TAC Escalation Center. The avenue of support
that you choose depends on the priority of the problem and the conditions stated
in service contracts, when applicable.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxvii
Page 38
Obtaining Technical Assistance
We categorize Cisco TAC inquiries according to urgency:
Cisco TAC Website
About This Guide
•Priority level 4 (P4)—You need information or assistance concerning Cisco
product capabilities, product installation, or basic product configuration.
•Priority level 3 (P3)—Your network performance is degraded. Network
functionality is noticeably impaired, but most business operations continue.
•Priority level 2 (P2)—Your production network is severely degraded,
affecting significant aspects of business operations. No workaround is
available.
•Priority level 1 (P1)—Your production network is down, and a critical impact
to business operations will occur if service is not restored quickly. No
workaround is available.
You can use the Cisco TAC website to resolve P3 and P4 issues yourself, saving
both cost and time. The site provides around-the-clock access to online tools,
knowledge bases, and software. To access the Cisco TAC website, go to this URL:
http://www.cisco.com/tac
All customers, partners, and resellers who have a valid Cisco service contract
have complete access to the technical support resources on the Cisco TAC
website. Some services on the Cisco TAC website require a Cisco.com login ID
and password. If you have a valid service contract but do not have a login ID or
password, go to this URL to register:
http://tools.cisco.com/RPF/register/register.do
If you are a Cisco.com registered user, and you cannot resolve your technical
issues by using the Cisco TAC website, you can open a case online at this URL:
http://www.cisco.com/en/US/support/index.html
If you have Internet access, we recommend that you open P3 and P4 cases through
the Cisco TAC website so that you can describe the situation in your own words
and attach any necessary files.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xxxviii
78-13124-06
Page 39
About This Guide
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2
issues. These classifications are assigned when severe network degradation
significantly impacts business operations. When you contact the TAC Escalation
Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country,
go to this URL:
Before calling, please check with your network operationscenter to determine the
level of Cisco support services to which your company is entitled: for example,
SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When
you call the center, please ha ve av ailable your service agreement number and your
product serial number.
Obtaining Additional Publications and Information
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is
available from various online and printed sources.
•The Cisco Product Catalog describes the networking products offered by
Cisco Systems as well as ordering and customer support services. Access the
Cisco Product Catalog at this URL:
•Cisco Press publishes a wide range of networking publications. Cisco
suggests these titles for new and experienced users: Internetworking Terms
and Acronyms Dictionary, Internetworking Technology Handbook,
Internetworking Troubleshooting Guide, and the Internetworking Design
Guide. For current Cisco Press titles and other information, go to Cisco Press
online at this URL:
http://www.ciscopress.com
•Packet magazine is the Cisco monthly periodical that provides industry
professionals with the latest information about the field of networking. You
can access Packet magazine at this URL:
•Internet Protocol Journal is a quarterly journal published by Cisco Systems
for engineering professionals involved in the design, development, and
operation of public and private internets and intranets. You can access the
Internet Protocol Journal at this URL:
Cisco 11000 Series Secure Content Accelerator Configuration Guide
xl
78-13124-06
Page 41
CHAPTER
Overview
This chapter describes the features and functions of the Secure Content
Accelerator. This chapter contains the following sections:
•Product Overview
•Secure Content Accelerator Versions
1
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
1-1
Page 42
Product Overview
Product Overview
The Secure Content Accelerator is a Secure Sockets Layer (SSL) of floading solution.
You can secure a server for testing purposes immediately using a pre-loaded default
key and certificate rather than wait up to a week for your ke y and certificate to arri ve.
Simply load your own certificate and key when they are available.
The Cisco 11000 Series Secure Content Accelerator is compatible with all Cisco
content switches—the Cisco LocalDirector, the Catalyst Content Switching Module,
and the Cisco CSS 11000 Series Content Services Switches.
The Secure Content Accelerator provides:
•Secure URL rewrite, prev enting URL redirects and references from breaking
or circumventing SSL sessions.
•FIPS-compliant operation (SCA2 only)
Chapter 1 Overview
•Firmware signatures are verified during startup and when a firmware image is
uploaded to or loaded on the device.
•Auto logout for increased configuration security
•Management via command line and Web-based graphical user interfaces
•Hardware server keepalive support
•Arbitrary HTTP headers
•TCP tuning facility
•Syslog facility support
•Authentication logging
•SSL version control
•RIP client version 1 and 2 support
•Multiple SNTP server support
•SNMP MIB-II support (read-only)
•Transparent/non-transparent SSL proxy toggling
•Non-SSL traffic blocking when operating in default in-line (dual-port) mode
•Arbitrary certificate size
•Netscape International Step-Up Certificate and Microsoft Server Gated
Cryptography support
Cisco 11000 Series Secure Content Accelerator Configuration Guide
1-2
78-13124-06
Page 43
Chapter 1 Overview
Secure Content Accelerator Versions
•Private key security
•Client and server certificate authentication
•Configurable shared cipher and ephemeral RSA error messages
•On-device key and certificate generation
•HTTPS, IMAPS, POP3S, NNTPS, and LDAPS as well as TLS version 1.0,
and SSL version 2.0 and 3.0 support
Secure Content Accelerator Versions
This document applies to all Secure Content Accelerator hardware models, the
SCA and SCA2. Any differences in displayed information are described where
applicable. The table below presents the differences between the two Secure
Content Accelerator models.
Table 1-1Secure Content Accelerator Model Differences
FeatureSCASCA2
Maximum Connections500030,000
Maximum Session Cache 75,000300,000
Maximum SSL Servers2554095
Maximum Keys2554095
Maximum Certificates2554095
CPU250 MHz Motorola 8240600 MHz IBM 750CXE
RAM64MB256MB
Flash16MB32MB
Cryptographic EngineRainbow FastMap 200Broadcom 5821
Maximum 1024-bit
2004000
RSA Operations/
Second
Hardware DigestNoYes
Hardware CipherNoYes
Hardware RNGNoYes
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
1-3
Page 44
Secure Content Accelerator Versions
Chapter 1 Overview
Cisco 11000 Series Secure Content Accelerator Configuration Guide
1-4
78-13124-06
Page 45
CHAPTER
2
Installing the Hardware and Software
This chapter describes how to install the Secure Content Accelerator as a
free-standing or rack-mounted unit. Suggestions for using the Secure Content
Accelerator in conjunction with other networking hardware are described in
Appendix B, Deployment Examples.
This chapter contains the following sections:
•Site Requirements
•Shipment Contents
•Unpacking the Secure Content Accelerator
78-13124-06
•Installing the Hardware
•Panel Descriptions
•Connecting to Power
•Connecting to Ethernet
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-1
Page 46
Site Requirements
Site Requirements
Before you select an installation site for the Secure Content Accelerator, read the
electrical, environmental, and physical requirements as described in Appendix A.
Chapter 2 Installing the Hardware and Software
Warning
Before you install, operate, or service the system, read the Site
Preparation and Safety Guide. This guide contains important safety
information you should know before working with the system.
Please see Appendix A.
Required Tools and Equipment
To install the Secure Content Accelerator, you need the following tools and
equipment:
•A Phillips screwdriver
•Rack-mount screws and appropriate screwdriver
Shipment Contents
The Secure Content Accelerator shipment contains the following items:
•Secure Content Accelerator
•Mounting brackets and hardware
•Null modem cable
•Two power cables
•Secure Content Accelerator compact disk containing:
–
Secure Content Accelerator documentation
–
Release Notes
–
PDF version of this guide
–
Firmware files
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-2
78-13124-06
Page 47
Chapter 2 Installing the Hardware and Software
Unpacking the Secure Content Accelerator
Unpacking the Secure Content Accelerator
The Secure Content Accelerator is shipped in a protective carton. The appliance
is a self-contained chassis; no modules or components can be added or removed.
NoteA tamper-evident sticker is affixed to the Secure Content
Accelerator. When using the device for FIPS-compliant operation,
this sticker must remain in place and untouched.
To unpack the Secure Content Accelerator:
1.Remove all enclosed packing materials. Save the packing materials in case
you need to repack the Secure Content Accelerator later.
2.Remove all accessories from the shipping carton.
3.Check the accessories against the items listed in the section “Shipment
Contents”.
Installing the Hardware
Warning
Before working on a system that has an on/off switch, turn OFF the
power and unplug the power cord. This unit has more than one
power cord. To reduce the risk of electric shock, disconnect the
two power supply cords before servicing the unit. The safety cover
is an integral part of the product. Do not operate the unit without
the safety cover installed. Operating the unit without the cover in
place will invalidate the safety approvals and pose a risk of fire
and electrical hazards.
The Secure Content Accelerator can be placed on a flat surface as a free-standing
unit or rack-mounted in an equipment cabinet. The following sections describe the
steps to install the Secure Content Accelerator as a:
•Free-standing unit
•Rack-mounted unit
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-3
Page 48
Installing the Hardware
Chapter 2 Installing the Hardware and Software
Prior to installing the Secure Content Accelerator, observe the following
installation requirements:
•The Maximum Rated Ambient Temperature (Tmra) for the Secure Content
Accelerator is 105° F (40° C). To ensure the Tmra for this device is not
exceeded, allow at least 1 inch (2.54 cm) of space around the four sides of the
Secure Content Accelerator.
•This equipment is designed to support only its own weight. Do not place other
equipment or material on the Secure Content Accelerator.
Warning
Review nameplate ratings for correct voltage and load
requirements. For safety, this equipment is required to be grounded
through the ground conductor of the AC power cords. Do not
remove the cover of the Secure Content Accelerator. There are
electrical shock hazards present in the unit if the cover is
removed. T o reduce the risk of fi re or electric shock, do not expose
the Secure Content Accelerator to rain or moisture. To disconnect
power, remove both power cords. Please review the caution label
on the Secure Content Accelerator.
Installing as a Free-Standing Unit
Position the Secure Content Accelerator on a level surface in an area with access
to your network cabling. When installing the Secure Content Accelerator note that
Ethernet and serial cables attach to the front of the chassis and power cables attach
to the back.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-4
78-13124-06
Page 49
Chapter 2 Installing the Hardware and Software
Installing as a Rack-Mounted Unit
Panel Descriptions
Warning
To prevent bodily injury when mounting or servicing this unit in a
rack, you must take special precautions to ensure that the system
remains stable. The following guidelines are provided to ensure
your safety: 1) This unit should be mounted at the bottom of the rack
if it is the only unit in the rack. 2) When mounting this unit in a
partially filled rack, load the rack from the bottom to the top with
the heaviest component at the bottom of the rack. 3) If the rack is
provided with stabilizing devices, install the stabilizers before
mounting or servicing the unit in the rack.
Before you begin, you will need the mounting brackets and six screws shipped
with the Secure Content Accelerator, a #2 Phillips screwdriver, rack-mounting
screws and an appropriate screwdriver.
1.Position the Secure Content Accelerator with the front panel facing you.
2.Position a mounting bracket on one side of the chassis, aligning the holes in
the bracket with the screw holes on the chassis.
3.Secure the bracket to the chassis with three screws and the Phillips
screwdriver.
4.Repeat steps 2 and 3 to install a mounting bracket on the other side of the
chassis.
5.Raise the Secure Content Accelerator to the installation height. Align the
screw holes of the mounting brackets with the holes on the equipment rack.
6.Use the appropriate screwdriver and screws to secure each mounting bracket
to each side of the rack.
Panel Descriptions
The front panel of the Secure Content Accelerator, shown in Figure 2-1, contains
the following connectors, switches, and LEDs:
•Two DB9 serial ports, marked “AUX” and “CONSOLE”
•Two RJ-45 10/100 Ethernet interface ports, marked “SERVER” and
“NETWORK”
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-5
Page 50
Panel Descriptions
Chapter 2 Installing the Hardware and Software
•Three Ethernet management LEDs associated with each port
•One “TEST” LED
•One “RESET” switch
Figure 2-1Secure Content Accelerator Front Panel
The rear panel of the Secure Content Accelerator, shown in Figure 2-2, contains
the following connectors and switches:
•Two power inputs
•Two power switches
Figure 2-2Secure Content Accelerator Rear Panel
Figure 2-3 shows the LED layout of the SCA Ethernet ports. Table 2-1 describes
the function of each LED on the SCA.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-6
78-13124-06
Page 51
Chapter 2 Installing the Hardware and Software
Figure 2-3SCA Ethernet Port Detail
Reset SwitchTest LED
100 ACT LNKServerNetwork100 ACT LNK
Table 2-1SCA Port LED Descriptions
LED NameColorState Indication
LKGreenOffNo link established
Panel Descriptions
OnLink established
TXAmberBlinkingTransmit activity detected
RXGreenBlinkingReceive activity detected
TestAmberOffSelf-diagnostics are successful
OnSelf-diagnostics are running
Figure 2-4 shows the LED layout of the SCA2 Ethernet ports. Table 2-2 describes
the function of each LED on the device.
Figure 2-4SCA2 Ethernet Port Detail
Reset SwitchTest LED
100 ACT LNKServerNetwork100 ACT LNK
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-7
Page 52
Connecting to Power
Chapter 2 Installing the Hardware and Software
Table 2-2SCA2 Port LED Descriptions
LED NameColorState Indication
LNKGreenOffNo link established
OnLink established
ACTAmberBlinkingTransmit activity detected
100GreenOff10Mbps
On100Mbps
TestAmberOffSelf-diagnostics are successful
OnSelf-diagnostics are running
Identifying SCA Models
SCA and SCA2 models can be differentiated by the text on the product label.
Connecting to Power
The Secure Content Accelerator is powered by dual AC power supplies. Before
you install the power cords, ensure that you have read Appendix A for electrical
specifications.
1.Ensure that the Secure Content Accelerator power switches are in the 0 (off)
position.
2.Attach the power cables to the Secure Content Accelerator by plugging the
AC power cord connector into the power receptacle at the rear panel.
3.Plug the power cords into dedicated three-wire grounding receptacles.
4.Switch the power switches to the 1 (on) position.
NoteConnect the power supplies to different circuits to further ensure
appliance availability.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-8
78-13124-06
Page 53
Chapter 2 Installing the Hardware and Software
Connecting to Ethernet
This section describes how to attach the Secure Content Accelerator to Ethernet.
For network deployment instructions and suggestions, see Appendix B,
Deployment Examples.
CautionIf you are using the Secure Content Accelerator in two-port mode,
you must connect the cables to it so that client requests (inbound)
and server requests (outbound) move through different ports.
Inbound traffic uses the “Network” port; outbound traffic uses the
“Server” port. If you are using the appliance in one-port mode, you
must connect it so that both client requests and server traffic travel
through the “Network” port. Use only Category 5 UTP cables with
RJ-45 connectors. The Secure Content Accelerator Ethernet
interfaces are configured as NIC ports. Use a straight-through cable
to connect the Secure Content Accelerator to a hub or switch. Use a
crossover cable to connect the Secure Content Accelerator to a NIC.
Connecting to Ethernet
1.Connect the “Network” port to the Internet.
2.Connect the “Server” port to the servers (or to the “Network” port if using
one-port mode).
3.Check the LK LEDs for connection viability . If one or both LK LEDs are not
lit, see Appendix E, Troubleshooting, for suggestions.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-9
Page 54
Connecting to Ethernet
Chapter 2 Installing the Hardware and Software
Cisco 11000 Series Secure Content Accelerator Configuration Guide
2-10
78-13124-06
Page 55
CHAPTER
3
Using the QuickStart Wizard
The QuickStart wizard helps you set up the SSL appliance rapidly using the most
basic information. To perform a more advanced configuration, use the
configuration manager as described in Chapter 4. The QuickStart wizard
presented in this chapter is available only from a CLI-based management session.
See Chapter 5 for information about using the Secure Server wizard from a
GUI-based management session.
This chapter contains the following sections:
•Before Y ou Begin
•Initiating a Management Session
78-13124-06
•Starting the QuickStart Wizard
•Using the QuickStart Wizard
•Using the QuickStart Wizard with a Configured Appliance
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-1
Page 56
Before You Begin
Before You Begin
Before configuring the SSL appliance you must have a certificate and keys for the
server. Y ou can use the files you received from the Certificate Authority, copy the
keys and certificate from an existing secure server, use default keys and
certificates preloaded in the device, or generate your own keys and certificates.
Instructions for exporting keys and certificates from existing server are found in
“Using Existing Keys and Certificates” in Appendix F.
Additionally, be aware that you might have to make several changes to your Web
pages. The nature of the changes depends upon whether you are securing a
previously unsecured site, or adding the SSL appliance to an already secure server
installation. These changes are described in the section “Web Site Changes” in
Appendix B, Deployment Examples.
Chapter 3 Using the QuickStart Wizard
NoteWhen using the QuickStart wizard in FIPS Mode, only
FIPS-approved algorithms are available.
Initiating a Management Session
Use the appropriate instructions below to initiate a management session with the
Cisco Secure Content Accelerator.
NoteWhen using the Secure Content Accelerator in FIPS Mode, only
serial management is allowed.
Serial Management and IP Address Assignment
Follow these steps to initiate a management session via a serial connection and set
an IP address for the device.
Note
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-2
When configuring an SCA2 via a serial connection, the displayed
prompt is “SCA2” unless a hostname has been defined for the device.
78-13124-06
Page 57
Chapter 3 Using the QuickStart Wizard
NoteThe default terminal settings on the SSL devices and modules is 80
columns by 25 lines. To ensure the best display and reduce the
chance of graphic anomalies, please use the same settings with the
serial terminal software. The device terminal settings can be
changed, if necessary. Use the standard ANSI setting on the serial
terminal software.
1.Attach the included null modem cable to the appliance port marked
“CONSOLE”. Attach the other end of the null modem cable to a serial port
on the configuring computer.
2.Launch any terminal emulation application that communicates with the serial
port connected to the appliance. Use these settings: 9,600 baud, 8 data bits,
no parity, 1 stop bit, no flow control.
Initiating a Management Session
Telnet
3.Press Return. Initial information is displayed followed by an SCA> prompt.
4.Enter Privileged and Configuration modes and set the IP address using the
following commands. Replace the IP address in the example with the
appropriate one.
NoteWhen prompted to supply a file name during serial management, you
must supply it as a URL in the form of HOST/PATH/FILENAME
using the http://, https://, ftp://, or tftp:// prefix.
After you have assigned an IP address to the Cisco Secure Content Accelerator
using the serial console CLI, you can connect to the appliance via telnet.
1.Initiate a telnet session with the IP address previously assigned to the
appliance.
2.An SCA> prompt is displayed.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-3
Page 58
Starting the QuickStart Wizard
NoteWhen prompted to supply a file name during a telnet management
session, you must supply it as a URL in the form of
HOST/PATH/FILENAME using the http://, https://, ftp://, or tftp://
prefix.
Starting the QuickStart Wizard
After initiating a management session as described previously, start the
QuickStart wizard via a serial or telnet connection by entering these commands:
enable
quick-start
If you are using telnet, go to “Using the QuickStart Wizard” below.
Chapter 3 Using the QuickStart Wizard
If you are using a serial connection and the device has not been assigned an IP
address, you are prompted to assign a hostname and IP address before beginning
the QuickStart configuration process.
Would you like to specify a hostname and IP address for this device?:
Enter the hostname for this device:
The hostname is a user-specified device name. In this example, we use the name
myDevice. When prompted for them, enter the IP address, netmask, and default
gateway for the device. You are prompted to accept the information before
continuing with configuration.
The following configuration will be saved to the device.
Enter y if the listing is correct. Go to “Using the QuickStart W izard” belo w. Enter
n if the information is incorrect. You are prompted for the configuration
information again.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-4
78-13124-06
Page 59
Chapter 3 Using the QuickStart Wizard
Using the QuickStart Wizard
Read the opening screen information and respond to the prompt.
Would you like to use the QuickStart wizard to create an ssl-server?
(y/n):
If you do not have a key and certificate available and do not wish to use a default
key and certificate, enter n or q. If you have read and agree with the introductory
information, enter y. The following text is be displayed:
Enter a name for your ssl-server:
Enter a name for the logical secure server (“ssl-server”) you are configuring. The
name is used for identification purposes only. (In this example, we name the
server myServer.) If it already exists, you are asked to provide a different name.
Using the QuickStart Wizard
NoteSecure server names can consist of Arabic numerals and upper- and
lowercase alphabetic, underscore (_), hyphen (-), and period (.)
characters. Secure server names must begin with an alphabetic
character and have a limit of 15 characters.
Enter the IP address for myServer:
This is the IP address of the real server to which the clear text should be sent.
Enter the SSL port:
Enter the TCP service port for the appliance to monitor for secure connection
requests. The default is 443, but you can specify a different number. You cannot
specify a TCP service port already configured to the same IP address.
Enter the clear text port:
Enter the number of the TCP service port for the SSL appliance to use to send
clear text to the server. If you specify TCP service port 80, you are warned that
the port will be unavailable for non-SSL requests. (See Appendix F for a
discussion of port blocking.) Y ou can abort the current clear te xt port designation
and enter a different TCP service port, or approve using TCP service port 80 for
clear text.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-5
Page 60
Using the QuickStart Wizard
You have completed TCP service port configuration of the logical secure server
and are ready to specify a key to use.
The following ssl-server will be created.
Each ssl-server is associated with a key.
1. Key is stored in a file on a http or ftp server.
2. Want to use an existing or default Key.
Choose the option corresponding to your situation (1/2):
NoteIf you are using a key created with an IIS or non-PEM-encoded key
or certificate, use the default keys and certificates included with SSL
device. After configuring the device with the QuickStart wizard, use
the configuration manager to load your own certificate and key. See
“Example: Setting up a Secure Server” in Chapter 4 and “SSL
Configuration Command Set” in Appendix C.
If you have the key available via a URL, type 1.
Enter the name of the key for ssl-server ‘myServer’:
Enter the name to assign a key. This name is used for identification only.
NoteKey names can consist of Arabic numerals and upper - and lowercase
alphabetic, underscore (_), hyphen (-), and period (.) characters. Key
names must begin with an alphabetic character and have a limit of
15 characters.
Enter the URL for a PEM encoded key file:
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-6
78-13124-06
Page 61
Chapter 3 Using the QuickStart Wizard
Enter the URL for the key as prompted. If the QuickStart wizard is unable to find
or load the file, you receive an error message and are allowed to restart key
assignment. After the key is properly loaded, configure the certificate as described
below.
T o use a ke y alr eady loaded into the appliance (including defaults) rather than key
on disk, type 2 when prompted to choose an option. All available keys are
displayed. Enter the name of the key to use. If you enter an in v alid k ey name, you
receive an error message and are prompted to re-enter the key name.
After the key has been properly loaded, you are shown a summary and asked to
configure a certificate.
1. Certificate is stored in a file on a http or ftp server.
2. Want to use an existing or default Certificate.
Choose the option corresponding to your situation (1/2):
If you have the certificate available via a URL, type 1.
Enter the name of the certificate for ssl-server ‘myServer’:
Enter the name to assign the certificate. This name is used for identification only.
NoteCertificate names can consist of Arabic numerals and upper- and
lowercase alphabetic, underscore (_), hyphen (-), and period (.)
characters. Certificate names must begin with an alphabetic or
underscore character and have a limit of 127 characters.
Enter URL for a PEM encoded X509 certificate file:
Enter the URL for the certificate as prompted. If the QuickStart wizard is unable
to find or load the file, you receive an error message and are allowed to restart
certificate assignment. After the certificate is properly loaded, configure a security
policy as described below.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-7
Page 62
Using the QuickStart Wizard
To use a certificate already loaded into the appliance (including default
certificates) rather than certificate on disk, type 2 when prompted to choose an
option. All av ailable certificates are displayed. Enter the name of the certificate to
use. If you enter an inv alid certificate name, you receiv e an error message and are
prompted to re-enter the certificate name.
NoteWhen using default keys and certificates, the certificate and key you
choose must match. The pre-loaded “default” and “default-512”
keys and certificates are interchangeable and can be used in
combination. The “default-1024” key and certificate must be used in
conjunction. If you have entered a ke y and certificate that cannot be
used together, you are asked whether to re-enter the key and
certificate. If you do not choose to re-enter the key and certificate,
your choices are accepted, but the secure server is not configured
correctly and will not function properly.
Chapter 3 Using the QuickStart Wizard
After the certificate has been properly loaded, you are shown a summary and
asked to specify a security policy.
RSA key size of 1024, exp ARC2_MD5, DES_SHA1, ARC4_SHA1,
MD5, and SHA1
default-RSA key size of 1024, ARC4_MD5, ARC4_SHA1 and exp ARC4_MD5,
ARC4_SHA1, ARC2_MD5
RSA key size of 512, exp ARC4_MD5, MD5, and SHA1
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-8
78-13124-06
Page 63
Chapter 3 Using the QuickStart Wizard
ARC4 is compatible with RC4™ RSA Data Security; ARC2 is compatible with
RC2™ RSA Data Security.
Enter the security policy for ssl-server ‘myServer’ [default]:
At the prompt, enter the name of the security policy to use, or simply press Enter
to use the “default” security policy. The “strong” policy includes the most secure
algorithms. The “weak” policy algorithms are less secure and appropriate for
export use. The “default” policy algorithms are those most commonly used. See
Appendix F for more algorithm information. If you enter an invalid security
policy name, you receiv e an error message and are prompted to re-enter the name.
NoteWhen using the QuickStart wizard in FIPS Mode, only security
policies containing one or more FIPS-compliant algorithms are
available.
Using the QuickStart Wizard
After the name of the security policy is accepted, you are prompted to verify the
logical secure server configuration.
If the information is correct, type y. The logical secure server you ha ve configured
is created. If you type n, the server configuration process restarts using the current
secure server.
Would you like to use the QuickStart wizard to create another
ssl-server? (y/n):
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-9
Page 64
Using the QuickStart Wizard
Type y to begin the server configuration process again with a new server. Type n
to set a configuration (enable) password for the device.
Would you like to set a password to protect configuration of the SCA?
(y/n):
Type y, and enter a password. Re-enter it to confirm.
You must set an enable password for the device to ensure its configuration
security. The password you enter is not displayed.
Would you like to set a name for this device? (y/n/q):
Type y, and enter a name for the SSL appliance.
A default gateway is needed to connect outside of your local subnet.
Would you like to set a default gateway for this device? (y/n/q): y
Enter a default gateway for this device:
Chapter 3 Using the QuickStart Wizard
SETUP CONFIGURATION PASSWORD PROTECTION
A default gateway is needed for the device to connect outside of the local subnet.
Type y, and enter the IP address at the prompt.
A summary screen shows information about the device, k eys, certificates, security
policies, and the logical secure servers configured on it.
SCA myDevice
Keys capacity 255, defined 3
----------------------------------NameIdRCV
-----------------------------------
default10Y
default-51220Y
default-102430Y
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-10
78-13124-06
Page 65
Chapter 3 Using the QuickStart Wizard
Certificates capacity 511, defined 3
---------------------------------------------------------NameIdRCCGRCPS V
The list of keys includes all those loaded into the device. The columns and their
descriptions are shown in the table below.
78-13124-06
IdPlaintext IPSTCertCA Group
00110.1.2.3:80AmyCert*not set*
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-11
Page 66
Using the QuickStart Wizard
ColumnDescription
IdThe number of the key as loaded into the device
RC (Reference Count)The number of logical secure servers using the key
V (Validity)The validity of the key as loaded into the device
The list of certificates includes all certificates loaded into the device. The columns
and their descriptions are shown in the table below.
ColumnDescription
IdThe number of the certificate as loaded into the
Chapter 3 Using the QuickStart Wizard
device
RCCG (Reference Count
Certificate Group)
RCPS (Reference Count
The number of certificate groups using the
certificate
The number of SSL servers using the certificate
Proxy Server)
V (Validity)The validity of the certificate as loaded into the
device; “Y” indicates the certificate is valid, “N”
indicates the certificate is invalid
The list of security policies includes all those configured on the device. The
columns and their descriptions are shown in the table below.
ColumnDescription
NameThe name of the security policy
IdThe number of the security policy as loaded into the device
RC (Reference
The number of SSL servers using the security policy
Count)
PolicyListThe names of the individual cryptographic schemes associated
with each security policy
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-12
78-13124-06
Page 67
Chapter 3 Using the QuickStart Wizard
The list of SSL servers includes all those configured on the device. The columns
and their descriptions are shown in the table below.
ColumnDescription
NameThe name of the SSL server
IdThe number of the SSL server as loaded into the device
Secure SSL IPThe IP address and TCP service port to monitor for SSL
Plaintext IPThe IP address and TCP service port used to send decrypted
KCThe validity of the key and certificate pair assigned to the SSL
Using the QuickStart Wizard
transaction requests
SSL traffic to the server
server; “U” indicates the key or certificate is not defined, “Y”
indicates the key and certificate match, “N” indicates the key
and certificate do not match
PKeyThe name of the private key assigned to the SSL server
STStatus: A (OK), I (incomplete or invalid), U (user-disabled), F
(FIPS-suspended), B (backend (hardware) server unavailable)
CertThe name of the certificate assigned to the SSL server
SecpolicyThe name of the security policy assigned to the SSL server
CA GroupThe name of the certificate chain, if one has been assigned to
the server
You are asked whether to save the configuration to flash memory.
Would you like to save your configuration to flash? (y/n):
If you type y, you will be asked to wait while the configuration is saved to flash,
and the QuickStart wizard finishes. If you type n, the QuickStart wizard finishes.
CautionIf the configuration is not saved to flash memory, the configuration
is lost during a power cycle or when the reload command is used.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-13
Page 68
Chapter 3 Using the QuickStart Wizard
Using the QuickStart Wizard with a Configured Appliance
Using the QuickStart Wizard with a Configured
Appliance
If you wish to run the QuickStart wizard for a previously configured Cisco Secure
Content Accelerator, follow these steps:
1.Initiate a management session and start the configuration manager as
described previously.
2.Use the appropriate method to attach to the device.
3.Enter Privileged mode.
4.Enter the command quick-start.
5.Go to “Using the QuickStart Wizard”.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
3-14
78-13124-06
Page 69
CHAPTER
4
Using the Configuration Manager
This chapter describes how to use the configuration manager to configure the SSL
appliance. Refer to Appendix F for a brief introduction to how the SCA works
SSL protocol components. This chapter contains the following sections:
•Overview
•Configuration Security
•Before Y ou Begin
•Initiating a Management Session
•Configuring the Device
78-13124-06
•Step-Up Certificates and Server-Gated Cryptography
•Configuring Certificate Groups
•Using Client and Server Certificate Authentication
•Generating Keys and Certificates
•Supporting SNMP
•Supporting RIP
•Supporting Other Secure Protocols
•Supporting FIPS
•Working with Syslogs
•Disabling SSL Versions
•Enabling Keepalives
•Setting the Idle-Timeout
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-1
Page 70
Overview
Overview
Chapter 4 Using the Configuration Manager
Whether used via serial or telnet connection, the command line interface
configuration manager provides greater control over the SSL appliance than the
QuickStart or Secure Server wizard alone.
The configuration manager allows you to control hardware and SSL portions of
the appliance through a discreet mode and submode system as shown in the
hierarchy diagram in Figure 4-1.
Figure 4-1Configuration Manager Hierarchy
TOP LEVEL
COMMANDS
TCP-TUNING
BACKEND
SERVER
TCP-TUNING
REVERSE-PROXY
SERVER
TCP-TUNING
TCP-TUNINGSERVER
CERTIFICATE
CERTIFICATE
GROUP
NON-PRIVILEGED
PRIVILEGED
CONFIGURATION
SECURITY
KEY
POLICY
SSLINTERFACE
To configure items in a submode, activate the submode by entering a command in
the mode above it. For example, to set the network interface speed or duplex you
must first enter enable, configure, then interface network. To return to the higher
Configuration mode, simply enter end or exit or press CTRL+D. The finished
command returns to the Top Level from any mode. Appendix C lists all
commands for SSL devices.
NoteRefer to Chapter 6 for FIPS Mode instructions.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-2
78-13124-06
Page 71
Chapter 4 Using the Configuration Manager
NoteThe system prompts displayed by the configuration manager vary
slightly depending upon the management session type used and
Secure Content Accelerator version. Secure Content Accelerator
version 2 is indicated by an “SCA2” prompt.
Configuration Security
Cisco Secure Content Accelerator devices allow easy, flexible configuration
without compromising the security of your network or their own configuration.
Passwords
Configuration Security
NoteFIPS-compliant operation requires both access- and
Access Lists
Cisco Secure Content Accelerator devices use two levels of passw ord protection:
access- and enable-level. Access-level passwords control who can access the
device via telnet and serial connections. Enable-level passwords control who can
view the same data av ailable with access-lev el passwords as well as view sensiti ve
data and configure the device.
SSL devices are shipped without passwords. Setting passwords is important
because the device can be administered over a network. For more information
about passwords, see the commands password access and password enable in
Appendix C.
configuration-level passwords. See Chapter 6 for more information.
Access lists control which computers can attach to a specific device. No access
lists exist when you first install the Secure Content Accelerator. You can restrict
the computers allowed to manage the appliance by adding their IP addresses to
one or more access lists for each device. For more information about configuring
access lists, see the commands show access-list, access-list, snmp access-list,
telnet access-list, and web-mgmt access-list in Appendix C.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-3
Page 72
Before You Begin
NoteIn FIPS Mode you can configure access lists but can assign them
only to the SNMP subsystem.
Factory Default Reset Password
If you have forgotten your access or enable password, you can use a factory-set
password during a serial configuration session. When prompted for a password,
enter FailSafe (case-sensitive). Y ou are asked to confirm the action. The appliance
reboots (reloads) with factory default settings.
CautionAll configuration is lost when using the factory default reset.
Chapter 4 Using the Configuration Manager
Before You Begin
Before configuring the SSL appliance you must have a certificate and keys for the
server. Y ou can use the files you received from the Certificate Authority, copy the
keys and certificate from an existing secure server, use default keys and
certificates preloaded in the device, or generate your own keys and certificates.
Instructions for exporting keys and certificates from existing server is found in
“Using Existing Keys and Certificates” in Appendix F.
Additionally, be aware that you must make several changes to your Web pages.
The nature of the changes depends upon whether you are securing a previously
unsecured site, or adding the SSL appliance to an already secure server
installation. These changes are described in section “Web Site Changes” in
Appendix B.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-4
78-13124-06
Page 73
Chapter 4 Using the Configuration Manager
Initiating a Management Session
Initiating a Management Session
Use the appropriate instructions below to initiate a management session with the
Secure Content Accelerator.
NoteWhen using the Secure Content Accelerator in FIPS Mode, only
serial management is allowed.
Serial Management and IP Address Assignment
Follow these steps to initiate a management session via a serial connection and set
an IP address for the device.
NoteThe default terminal settings on the SSL devices and modules is 80
columns by 25 lines. To ensure the best display and reduce the
chance of graphic anomalies, please use the same settings with the
serial terminal software. The device terminal settings can be
changed, if necessary. Use the standard ANSI setting on the serial
terminal software.
1.Attach the included null modem cable to the appliance port marked
“CONSOLE”. Attach the other end of the null modem cable to a serial port
on the configuring computer.
2.Launch any terminal emulation application that communicates with the serial
port connected to the appliance. Use these settings: 9600 baud, 8 data bits, no
parity, 1 stop bit, no flow control.
3.Press Return. Initial information is displayed followed by an SCA> prompt.
4.Enter Privileged and Configuration modes and set the IP address using the
following commands. Replace the IP address in the example with the
appropriate one.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-5
Page 74
Configuring the Device
Telnet
Chapter 4 Using the Configuration Manager
NoteWhen prompted to supply a file name during serial management, you
must supply it as a URL in the form of HOST/PATH/FILENAME
using the http://, https://, ftp://, or tftp:// prefix.
After you have assigned an IP address to the Cisco Secure Content Accelerator
using the serial console CLI, you can connect to the appliance via telnet.
1.Initiate a telnet session with the IP address previously assigned to the
appliance.
2.An
NoteWhen prompted to supply a file name during a telnet
SCA>
prompt is displayed.
management session, you must supply it as a URL in the
form of HOST/PA TH/FILEN AME using the http://, https://,
ftp://, or tftp:// prefix.
Configuring the Device
When you configure an appliance to perform SSL offloading you are actually
setting up one or more logical secure servers whose SSL-related configurations
reside in the appliance. Each logical secure server has several attributes:
•A unique IP address for the real server providing content
•Specifications for the appropriate key and certificate to use
•A security policy specifying the cryptographic scheme(s) to use
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-6
78-13124-06
Page 75
Chapter 4 Using the Configuration Manager
Example: Setting up Basic Device Parameters
This example describes how to use the configuration manager to set the basic SSL
appliance configuration.
1.Initiate a serial management session, and set the IP address of the device to
(config[myDevice])# ip route default 10.1.2.1
(config[myDevice])#
5.Set an enable password to protect the appliance configuration. The password
is requested whenever the enable command is given.
NotePasswords are not echoed to the screen.
(config[myDevice])# password enable
Enter new password:
Confirm password:
(config[myDevice])# end
SCAE
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-7
Page 76
Configuring the Device
Example: Setting up a Secure Server
This example describes how to use the configuration manager rather than the
QuickStart wizard to set up a secure server. In this example, the default SSL port
(443) and remote port (81) are used.
1.Enter Privileged, Configuration, and SSL Configuration modes.
2.Enter Key Configuration mode and create a key named myKey. Load the
PEM-encoded key file. Return to SSL Configuration Mode.
(config-ssl[myDevice])# key myKey create
(config-ssl-key[myKey])# pem keyFile
(config-ssl-key[myKey])# end
(config-ssl[myDevice])#
Chapter 4 Using the Configuration Manager
NoteUse the der command when using DER-encoded keys
and certificates, the net-iis command when using keys
exported from IIS 4.
NoteKey names can consist of Arabic numerals and upper-
and lowercase alphabetic, underscore (_), hyphen (-),
and period (.) characters. Key names must be gin with an
alphabetic character and have a limit of 15 characters.
3.Enter Certificate Configuration mode and create a certificate named myCert.
Then load the PEM-encoded certificate file. Return to SSL Configuration
Mode.
(config-ssl[myDevice])# cert my create
(config-ssl-cert[myCert])# pem certFile
(config-ssl-cert[myCert])# end
(config-ssl[myDevice])#
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-8
78-13124-06
Page 77
Chapter 4 Using the Configuration Manager
NoteCertificate names can consist of Arabic numerals and
upper- and lowercase alphabetic, underscore (_),
hyphen (-), and period (.) characters. Certificate names
must begin with an alphabetic character and have a limit
of 127 characters.
4.Enter Security Policy Configuration mode and create a security policy named
myPol. Assign the “strong” cryptography policy to it. Return to SSL
Configuration mode.
(config-ssl[myDevice])# secpolicy myPol create
(config-ssl-secpolicy[myPol])# crypto strong
(config-ssl-secpolicy[myPol])# end
(config-ssl[myDevice])#
Configuring the Device
NoteWhen using FIPS Mode only the FIPS security policy is
available.
NoteSecurity policy names can consist of Arabic numerals
and upper- and lowercase alphabetic, underscore (_),
hyphen (-), and period (.) characters. Security policy
names must begin with an alphabetic character and have
a limit of 15 characters.
5.Enter Server Configuration mode and create a server named myServer. Assign
the IP address 10.1.2.4. Assign port 443 for monitoring for SSL connections
and port 81 for sending clear text. Assign the key, certificate, and security
policies just created. Then exit to Top Level mode.
NoteWhen using this configuration, client browsers must be set to use this
device as a proxy.
Example: Configuring Secure URL Rewrite
The Secure URL Rewrite feature prevents URL redirects and references from
breaking or circumventing SSL sessions. This example uses the CLI. The same
options are available in the GUI.
1.Open a management session with the device.
2.Enter Privileged, Configuration, and SSL Configuration modes:
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-12
78-13124-06
Page 81
Chapter 4 Using the Configuration Manager
domainNameThe domain or file identifier as a domain name, IP
sslportKeyword identifying the specified port to be used for
portidA port identification for SSL traffic.
clearportKeyword identifying the specific port to be used for
portidA port identification for clear text traffic.
redirectonlyA keyword is used to indicate that only the
Configuring the Device
address, or path and file name. An * (asterisk) wild
card character can be used to specify more than one
server in a single domain, e.g., “*.company.com”.
SSL traffic.
clear text traffic.
“Location:”field in the HTTP 30x redirect header
should be rewritten. This solves a common problem
with Web servers using insecure HTTP 30x redirects.
Enter a URL rewrite rule for the www.mybusiness.com.
http://www.mybusiness1.com:81 are rewritten to
https://www.mybusiness1.com.
To securely rewrite only 30x-series redirects (i.e., 302 or 304) referencing
http:// rather than all instances of http:// (such as those that appear
intentionally in the application data), use the redirectonly option. (This
command must be entered on a single line.)
For more information about URL rewriting, contact your Cisco representati ve for
a copy of the white paper SSL Offloaders and Contextual Consistency.
Example: Configuring SNTP Servers
Up to four SNTP servers can be configured on the Secure Content Accelerator.
NoteTo provide increased security, we recommend using an SNTP server
on the internal network. Using an external SNTP server might
compromise network security.
1.Open a management session with the device.
2.Enter Privileged and Configuration modes:
SCA> enable
SCA# configure
(config[SCA])#
3.Enter the IP addresses or host names of up to four SNTP servers. (Host names
are resolved to IP addresses in the device configuration.)
(config[SCA])# sntp server 10.1.24.2
(config[SCA])# sntp server 10.1.24.4
(config[SCA])# sntp server 10.2.22.2
(config[SCA])# sntp server 10.2.22.6
(config[SCA])#
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-14
78-13124-06
Page 83
Chapter 4 Using the Configuration Manager
4.The default polling interval is 86400 seconds (one day). To change this
interval to 43200 seconds (12 hours), enter use the sntp interval command.
(config[SCA])# sntp interval 43200
(config[SCA])#
5.To view the results of these commands, you can use either the show sntp or
show device command. The show sntp command and an example of returned
The show device command and an example of returned information are
presented below.
(config[SCA])# show device
...
SNTP sync'ing:every 43200 (s) from 10.1.24.2, 10.1.24.4,
10.2.22.2, 10.2.22.6
...
Any errors resulting from polling or synchronization are written to syslog messages .
Example: Restricting Access using an Access List
Access lists permit or deny management access to the device or module. Up to 999
access lists can be configured. Access lists are created then assigned for use by the
telnet and Web management subsystems. An access list can be used by the SNMP
subsystem as well. This example demonstrates ho w to create two access lists and
assign each to a management subsystem.
1.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
(config[myDevice)#
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-15
Page 84
Configuring the Device
Chapter 4 Using the Configuration Manager
2.Create an access list allowing management access to all IP addresses.
NoteIn FIPS Mode, access lists can be configured but assigned only to the
SNMP subsystem.
Configuring an Ethernet Interface
The Ethernet interfaces on the SSL appliance can be configured at either 10 Mbps
or 100 Mbps and half or full duplex. Enter Privileged and Configuration modes.
In the following example, the “Network” interface of myDevice is forced to full
duplex. Make sure to save this configuration to flash.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-16
78-13124-06
Page 85
Chapter 4 Using the Configuration Manager
Example: Saving a Configuration File
Once you have configured your device and it is running well, you should sa v e the
configuration to a separate file. This file can be used to restore the device in case
of a power cycle or serious error. This example demonstrates how to save the
startup-configuration to a file.
1.Enter Privileged mode.
SCA> enable
SCA#
2.Save the existing configuration to be the startup-configuration.
SCA# write flash
SCA#
3.Save the startup-configuration to a file.
Step-Up Certificates and Server-Gated Cryptography
Before this file is uploaded to the device, you must reload the keys and configure
the passwords on the device. Use the same key object names previously used to
reference the keys.
Step-Up Certificates and Server-Gated Cryptography
Cisco Secure Content Accelerator support both Netscape International Step-Up
Certificates and Microsoft Server-Gated Cryptography. Ephemeral RSA must be
enabled for the device to function properly with these certificates. Load the
certificate normally.
NoteY ou must specify that your certificate work with both Microsoft and
Netscape browsers when requesting it from the CA. Otherwise, the
server cannot support both browsers.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-17
Page 86
Configuring Certificate Groups
Configuring Certificate Groups
Certificate groups are collections of certificates used for certificate chains and
client and server authentication. Certificate chains are used in certain
circumstances such as when a known, trusted CA (such as Thawte or VeriSign)
provides a certificate to attest that certificates created by an intermediary CA can
be trusted. For example, a company can create its o wn certificates for internal use
only; howev er , clients do not accept the certificates because they were not created
by a known CA. When private certificates are chained with the trusted CA
certificate, clients accept them during SSL negotiations.
Example: Configuring a Certificate Group
The locally created certificate, the intermediary CA certificate signed by a trusted CA,
and any other intermediary certificates are loaded into individual certificate objects
that are combined into a certificate group. This example demonstrates how to:
Chapter 4 Using the Configuration Manager
•Load an intermediate CA certificate into a certificate object
•Create a certificate group
•Enable using the group as a certificate chain
The name of the SSL device is myDevice. The name of the secure logical server
is server1. The name of the DER-encoded, intermediary CA certificate is
CACertFile. The name of the PEM-encoded certificate generated by the
intermediary CA is localCertFile. The name of the certificate group is
CACertGroup.
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
(config[myDevice)#
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-18
78-13124-06
Page 87
Chapter 4 Using the Configuration Manager
3.Enter SSL Configuration mode and create an intermediary certificate object
named CACert, entering into Certificate Configuration mode. Load the
DER-encoded CACertFile file into the certificate object, and return to SSL
Configuration mode.
(config[myDevice])# ssl
(config-ssl[myDevice])# cert CACert create
(config-ssl-cert[CACert])# der CACertFile
(config-ssl-cert[CACert])# end
(config-ssl[myDevice])#
4.Create a certificate object named localCert, load the PEM-encoded certificate
file, and return to SSL Configuration mode.
(config-ssl[myDevice])# cert localCert create
(config-ssl-cert[localCert])# pem localCertFile
(config-ssl-cert[localCert])# end
(config-ssl[myDevice])#
Configuring Certificate Groups
5.Enter Certificate Group Configuration mode, create the certificate group
CACertGroup, load the certificate object CACert, and return to SSL
Configuration mode.
(config-ssl[myDevice])# certgroup CACertGroup create
(config-ssl-certgroup[CACertGroup])# cert CACert
(config-ssl-certgroup[CACertGroup])# end
(config-ssl[myDevice])#
6.Enter Server Configuration mode, create the logical secure server server1,
assign an IP address, SSL and clear text ports, a security policy myPol, the
certificate group CACertGroup, certificate localCert, key localKey
(compatible with the local certificate), and exit to Privileged mode.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-19
Page 88
Configuring Certificate Groups
7.Save the configuration to flash memory . If it is not sa v ed, the configuration is
lost during a power cycle or when the reload command is used.
SCA# write flash
SCA#
Example: Importing Certificate Groups
PKCS#7 certificate groups can be imported directly into the device. This example
demonstrates how to import a PEM-encoded PKCS#7 file into the Cisco Secure
Content Accelerator .
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
Chapter 4 Using the Configuration Manager
3.Enter SSL Configuration mode.
(config[myDevice])# ssl
(config-ssl[myDevice])#
4.Specify the PKCS#7 file to import, indicating the appropriate encoding (in
this example, PEM). In this example, the name of the certificate group to
create is myCertGroup. The certificate prefix is impt. (The certificate prefix is
optional. This command must be entered on one line.)
5.The file is imported, and certificates and a certificate group are generated. The
certificates are named incrementally from impt_1 to impt_N, where N is the
number of certificates in the PKCS#7 file. The certificate with the highest
incremented number is the server certificate.
NoteSee the entry in Appendix C for additional command options.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-20
78-13124-06
Page 89
Chapter 4 Using the Configuration Manager
Using Client and Server Certificate Authentication
Using Client and Server Certificate Authentication
To further ensure transaction security, client or server certificate authentication
can be configured on servers. Backend and reverse-proxy servers can be
configured for server certificate authentication; basic secure servers can be
configured for client certificate authentication. To use either of these certificate
authentication methods, a certificate group must have been created.
Example: Configuring Server Certificate Authentication
Server certification authentication can be configured on both backend and
reverse-proxy serv ers. The configuration procedure for both server types is nearly
identical. This example demonstrates ho w to configure an existing backend server
for server certificate authorization using the certificate group servTrustGroup. The
domain name (for backend server configuration only) is www.mycorp.com.
Several options are available for authentication errors to ignore. In this example
the backend server is set to not ignore errors, resulting in immediate
disconnection.
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
(config[myDevice])#
3.Enter SSL Configuration mode and Backend Server Configuration mode for
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-21
Page 90
Using Client and Server Certificate Authentication
4.Enter the following commands to enable server certificate authentication, set
the handling authentication of errors to the most stringent level, and assign
the certificate group to use for comparison. (The final command must be
entered on a single line.)
5.Enter a domain name to use for certificate comparison. This is necessary only
for backend servers when server certificate authentication is not set to ignore
domain name errors. (The final command must be entered on a single line.)
Client certification authentication can be configured on basic secure servers. This
example demonstrates how to configure an existing server for client certificate
authorization using the certificate group clientTrustGroup. Several options are
available for authentication error handling. In this example, the server is set to
handle all errors by disconnecting the SSL session and redirecting the client to a
standard HTML error page.
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
(config[myDevice])#
3.Enter SSL Configuration mode and Server Configuration mode for the server
myServ.
(config[myDevice])# ssl
(config-ssl[myDevice])# server myServ
(config-ssl-server[myServ])#
4.Enter the following commands to enable client certificate authentication, set
the handling of authentication of errors, and assign the certificate group to use
for comparison.
2.Enter the following command to generate a 1024-bit key using the seed string
lemon. The key is displayed once using DES encryption. The resulting k ey is
stored on the device as well as exported to a PEM-encoded file named
mykey.pem. (This command must be entered on one line.)
(config-ssl-key[myGenKey])# genrsa bits 1024 encrypt des seed
lemon output https://www.mywebsite.com/mykey.pem
NoteUsing the HTTPS protocol ensures that your key is transmitted
securely.
Example: Generating a Certificate
1.Enter Privileged, Configuration, and SSL Configuration modes.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-24
78-13124-06
Page 93
Chapter 4 Using the Configuration Manager
2.Enter the following command to generate a certificate using the key created
in the previous example. An MD5 digest is displayed and the certificate is
saved in a file named myGenCert. (This command must be entered on one
line.) A wizard starts, requesting certificate information.
NoteUsing the HTTPS protocol ensures that your certificate is
transmitted securely.
Supporting SNMP
Cisco Secure Content Accelerator devices have basic support for SNMP
functions. The device is shipped with SNMP disabled. This example demonstrates
how to set basic SNMP data.
Supporting SNMP
Example: Configuring SNMP
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
3.Enter SNMP data and enable SNMP. Access-list 1 has already been created.
(See Appendix C for information for using the access-list command.) Return
to Privileged mode.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-25
Page 94
Supporting RIP
4.Save the configuration to flash memory . If not sa v ed, the configuration is lost
during a power cycle or when the reload command is used.
SCA# write flash
SCA#
Supporting RIP
Cisco Secure Content Accelerator devices support Routing Information Protocol
(RIP) versions 1 and 2. This example demonstrates how to enable RIP version 1
packet usage.
Example: Configuring RIP
Chapter 4 Using the Configuration Manager
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
3.Enable reception and processing of RIP version 1 packets. Then return to
Privileged mode.
(config[myDevice])# rip v1
(config[myDevice])# end
SCA#
4.Save the configuration to flash memory . If not sa v ed, the configuration is lost
during a power cycle or if the reload command is used.
SCA# write flash
SCA#
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-26
78-13124-06
Page 95
Chapter 4 Using the Configuration Manager
Supporting Other Secure Protocols
Along with SSL, Cisco Secure Content Accelerator devices can support other
secure protocols using TLS v1.0, SSL v2.0, and SSL v3.0. IMAPS, POP3S,
NNTPS, and LDAPS are some e xamples. The steps belo w sho w how to configure
the SSL appliance for setting up a secure server to process only POP3S (S-POP)
mail.
Example: Configuring a Secure Mail Server
NoteThe steps in this example are abbreviated to show only relevant
changes from the standard SSL server setup.
Supporting Other Secure Protocols
1.Initiate a management session as described above. Enter Privileged and
Configuration modes. Enter a default router. Enter SSL Configuration mode.
2.Enter Server Configuration mode and create a server named mySecureMail.
Assign an IP address and netmask. Assign port 995 for monitoring for POP3S
(S-POP) connections and port 110 for sending clear text. Assign the
appropriate key, certificate, and security policy. Return to Privileged mode.
portKeyword identifying the TCP port to be used for
portidA port identification for syslog traffic.
facilityKeyword identifying the facility to be used
facilvalueThe facility number, from 0 to 7.
Chapter 4 Using the Configuration Manager
syslog message transfer
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
3.Enter syslog information. Return to Privileged mode.
(config[myDevice])# syslog ip 10.1.1.2.122 port 514 facility 1
(config[myDevice])# end
SCA#
4.Save the configuration to flash memory . If not sa v ed, the configuration is lost
during a power cycle or when the reload command is used.
SCA# write flash
SCA#
Disabling SSL Versions
In certain situations, you may want to disable individual SSL versions. The SCA
allows you to enable or disable these on a version-by-v ersion basis for individual
servers.
1.Initiate a management session as described previously.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-28
78-13124-06
Page 97
Chapter 4 Using the Configuration Manager
2.Enter Privileged, Configuration, and SSL Configuration modes.
5.Verify the active SSL/TLS versions for this server by entering the info
command.
(config-ssl-server[myServer])# info
Enabling Keepalives
...
SSL version: v3 tls1
...
6.Return to Privileged mode.
(config-ssl-server[myServer])# finished
SCA#
7.Save the configuration to flash memory . If not sa v ed, the configuration is lost
during a power cycle or when the reload command is used.
SCA# write flash
SCA#
Enabling Keepalives
You can enable and configure keepalive “GET” messages between the virtual
servers on the device and hardware servers to which they refer. If no response is
received from the hardware server after specific number of failures (maxfailure),
the virtual server is marked as “suspended”. When the hardware server comes back
online, the keepalive messages discover the server and mark it “active” again.
78-13124-06
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-29
Page 98
Enabling Keepalives
Chapter 4 Using the Configuration Manager
The following example demonstrates enabling keepalives and configuring
settings.
1.Initiate a management session as described previously.
2.Enter Privileged, Configuration, and SSL Configuration modes.
8.Save the configuration to flash memory . If not sa v ed, the configuration is lost
during a power cycle or when the reload command is used.
SCA# write flash
SCA#
Cisco 11000 Series Secure Content Accelerator Configuration Guide
4-30
78-13124-06
Page 99
Chapter 4 Using the Configuration Manager
Setting the Idle-Timeout
Use the idle-timeout to further ensure the device configuration security. Telnet
and GUI management sessions are monitored for activity. If a management
session is idle beyond the specified idle-timeout, the telnet connection is closed
or the Web GUI connection or serial console connection is logged out. The default
timeout period is 15 minutes.
In the following example, the idle-timeout period is changed to 10 minutes.
1.Initiate a management session as described previously.
2.Enter Privileged and Configuration modes.
SCA> enable
SCA# configure
(config[myDevice])#
Setting the Idle-Timeout
3.Reset the timeout period using the following command.