Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-5650-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT
ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR
THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU
ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A
COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work,
Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP,
CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the
Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare,
GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys,
MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Pack e t , PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX,
ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (0502R)
Enabling Administrative Access to the CSS 1-10
Disabling Administrative Access to the CSS 1-11
Controlling CSS Network Traffic Through Access Control Lists 1-12
ACL Overview 1-13
ACL Configuration Quick Start 1-15
Creating an ACL 1-17
Deleting an ACL 1-18
Configuring Clauses 1-19
Adding a Clause When ACLs are Globally Enabled 1-25
Deleting a Clause 1-26
Applying an ACL to a Circuit or DNS Queries 1-27
Removing an ACL from Circuits or DNS Queries 1-28
Enabling ACLs on the CSS 1-29
Disabling ACLs on the CSS 1-30
Showing ACLs 1-30
Setting the Show ACL Counters to Zero 1-32
Logging ACL Activity 1-32
ACL Example 1-34
CHAPTER
iv
Configuring Network Qualifier Lists for ACLs 1-35
Creating an NQL 1-36
Describing an NQL 1-36
Adding Networks to an NQL 1-36
Adding an NQL to an ACL Clause 1-38
Showing NQL Configurations 1-38
Setting the Global TACACS+ Keepalive Frequency 4-7
Defining a TACACS+ Server 4-8
Setting TACACS+ Authorization 4-11
Sending Full CSS Commands to the TACACS+ Server 4-12
Setting TACACS+ Accounting 4-13
Showing TACACS+ Server Configuration Information 4-14
CHAPTER
5Configuring Firewall Load Balancing 5-1
Overview of FWLB 5-2
Firewall Synchronization 5-3
Configuring FWLB 5-3
Configuring a Keepalive Timeout for a Firewall 5-4
Configuring an IP Static Route for a Firewall 5-5
Configuring OSPF to Advertise Firewall Routes 5-6
Configuring RIP to Advertise Firewall Routes 5-7
Example of FWLB Static Route Configuration 5-7
Configuring FWLB with VIP and Virtual Interface Redundancy 5-10
This guide provides instructions for configuring the security features of the Cisco
11500 Series Content Services Switches (CSS). Information in this guide applies
to all CSS models except where noted.
The CSS software is available in a Standard or optional Enhanced feature set.
Proximity Database and Secure Management, which includes Secure Shell Host
and SSL strong encryption for the Device Management software, are optional
features.
This preface contains the following major sections:
• Audience
• How to Use This Guide
• Related Documentation
OL-5650-02
• Symbols and Conventions
• Obtaining Documentation
• Documentation Feedback
• Cisco Product Security Overview
• Obtaining Technical Assistance
• Obtaining Additional Publications and Information
In addition to this guide, the Content Services Switch documentation includes the
following publications.
Document TitleDescription
Release Note for the
Cisco 11500 Series
Content Services Switch
Cisco 11500 Series
Content Services Switch
Hardware Installation
Guide
Cisco Content Services
Switch Getting Started
Guide
Related Documentation
This release note provides information on
operating considerations, caveats, and command
line interface (CLI) commands for the Cisco 11500
series CSS.
This guide provides information for installing,
cabling, and powering the Cisco 11500 series CSS.
In addition, this guide provides information about
CSS specifications, cable pinouts, and hardware
troubleshooting.
This guide describes how to perform initial
administration and configuration tasks on the CSS,
including:
OL-5650-02
• Booting the CSS for the first time and on a
routine basis, and logging in to the CSS
• Configuring the username and password,
Ethernet management port, static IP routes,
and the date and time
• Configuring DNS server for hostname
resolution
• Configuring sticky cookies with a sticky
overview and advanced load-balancing method
using cookies
This guide describes how to perform CSS SSL
configuration tasks, including:
• SSL certificate and keys
• SSL termination
• Back-end SSL
• SSL initiation
This reference provides an alphabetical list of all
CLI commands including syntax, options, and
related commands.
This guide describes how to use the Device
Management user interface, an HTML-based
Web-based application that you use to configure
and manage your CSS.
Preface
Symbols and Conventions
This guide uses the following symbols and conventions to identify different types
of information.
CautionA caution means that a specific action you take could cause a loss of data or
adversely impact use of the equipment.
Warning
NoteA note provides important related information, reminders, and recommendations.
A warning describes an action that could cause you physical harm or damage
the equipment.
Bold text indicates a command in a paragraph.
OL-5650-02
Preface
Obtaining Documentation
Courier text
prompt.
Courier bold text indicates commands and text you enter in a command line.
Italics text indicates the first occurrence of a new term, book title, emphasized
text, and variables for which you supply values.
1. A numbered list indicates that the order of the list items is important.
a. An alphabetical list indicates that the order of the secondary list items is
• A bulleted list indicates that the order of the list topics is unimportant.
–
indicates text that appears on a command line, including the CLI
important.
An indented list indicates that the order of the list subtopics is
unimportant.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco
also provides several ways to obtain technical assistance and other technical
resources. These sections explain how to obtain technical information from Cisco
Systems.
Cisco.com
OL-5650-02
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
Cisco documentation and additional literature are available in a Documentation
DVD package, which may have shipped with your product. The Documentation
DVD is updated regularly and may be more current than printed documentation.
The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco
Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool
or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/
Ordering Documentation
Preface
You can find instructions for ordering documentation at this URL:
• Registered Cisco.com users (Cisco direct customers) can order Cisco product
documentation from the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
• Nonregistered Cisco.com users can order documentation through a local
account representative by calling Cisco Systems Corporate Headquarters
(California, USA) at 408 526-7208 or, elsewhere in North America, by
calling 1 800 553-NETS (6387).
Documentation Feedback
You can send comments about technical documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front
cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.ht
ml
From this site, you can perform these tasks:
• Report security vulnerabilities in Cisco products.
• Obtain assistance with security incidents that involve Cisco products.
Cisco Product Security Overview
• Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at
this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you
can access a Product Security Incident Response Team Really Simple Syndication
(PSIRT RSS) feed from this URL:
Cisco is committed to delivering secure products. We test our products internally
before we release them, and we strive to correct all vulnerabilities quickly. If you
think that you might have identified a vulnerability in a Cisco product, contact
PSIRT:
TipWe encourage you to use Pretty Good Privacy (PGP) or a compatible product to
encrypt any sensitive information that you send to Cisco. PSIRT can work from
encrypted information that is compatible with PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use
in your correspondence with PSIRT is the one that has the most recent creation
date in this public key server list:
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
Preface
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco
service contracts, Cisco Technical Support provides 24-hour-a-day,
award-winning technical assistance. The Cisco Technical Support Website on
Cisco.com features extensive online support resources. In addition, Cisco
Technical Assistance Center (TAC) engineers provide telephone support. If you
do not hold a valid Cisco service contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for
troubleshooting and resolving technical issues with Cisco products and
technologies. The website is available 24 hours a day, 365 days a year, at this
URL:
Access to all tools on the Cisco Technical Support Website requires a Cisco.com
user ID and password. If you have a valid service contract but do not have a user
ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
NoteUse the Cisco Product Identification (CPI) tool to locate your product serial
number before submitting a web or phone request for service. You can access the
CPI tool from the Cisco Technical Support Website by clicking the Too l s &
Resources link under Documentation & Tools.Choose Cisco Product
Identification Tool from the Alphabetical Index drop-down list, or click the
Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool
offers three search options: by product ID or model name; by tree view; or for
certain products, by copying and pasting show command output. Search results
show an illustration of your product with the serial number label location
highlighted. Locate the serial number label on your product and record the
information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4
service requests. (S3 and S4 service requests are those in which your network is
minimally impaired or for which you require product information.) After you
describe your situation, the TAC Service Request Tool provides recommended
solutions. If your issue is not resolved using the recommended resources, your
service request is assigned to a Cisco TAC engineer. The TAC Service Request
Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the
Cisco TAC by telephone. (S1 or S2 service requests are those in which your
production network is down or severely degraded.) Cisco TAC engineers are
assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has
established severity definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your
business operations. You and Cisco will commit all necessary resources around
the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or
significant aspects of your business operation are negatively affected by
inadequate performance of Cisco products. You and Cisco will commit full-time
resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most
business operations remain functional. You and Cisco will commit resources
during normal business hours to restore service to satisfactory levels.
Preface
Severity 4 (S4)—You require information or assistance with Cisco product
capabilities, installation, or configuration. There is little or no effect on your
business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is
available from various online and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and
logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• Cisco Press publishes a wide range of general networking, training and
certification titles. Both new and experienced users will benefit from these
publications. For current Cisco Press titles and other information, go to Cisco
Press at this URL:
• Pack et magazine is the Cisco Systems technical user magazine for
maximizing Internet and networking investments. Each quarter, Packet
delivers coverage of the latest industry trends, technology breakthroughs, and
Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies,
certification and training information, and links to scores of in-depth online
resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
• iQ Magazine is the quarterly publication from Cisco Systems designed to
help growing companies learn how they can use technology to increase
revenue, streamline their business, and expand services. The publication
identifies the challenges facing these companies and the technologies to help
solve them, using real-world case studies and business strategies to help
readers make sound technology investment decisions. You can access iQ
Magazine at this URL:
http://www.cisco.com/go/iqmagazine
• Internet Protocol Journal is a quarterly journal published by Cisco Systems
for engineering professionals involved in designing, developing, and
operating public and private internets and intranets. You can access the
Internet Protocol Journal at this URL:
OL-5650-02
http://www.cisco.com/ipj
• World-class networking training is available from Cisco. You can view
This chapter describes how to configure access to the CSS including network
traffic. Information in this chapter applies to all models of the CSS, except where
noted.
This chapter contains the following major sections:
• Changing the Administrative Username and Password
• Creating Usernames and Passwords
• Controlling Remote User Access to the CSS
• Controlling Administrative Access to the CSS
• Controlling CSS Network Traffic Through Access Control Lists
During the initial log in to the CSS you enter the default user name admin and the
default password system in lowercase text. For security reasons, you should
change the administrative username and password. Security on your CSS can be
compromised because the administrative username and password are configured
to be the same for every CSS shipped from Cisco Systems.
The administrative username and password are stored in nonvolatile random
access memory (NVRAM). Each time you reboot the CSS, it reads the username
and password from NVRAM and reinserts them in to the user database. SuperUser
status is assigned to the administrative username by default.
You can change the administrative username and password, but because the
information is stored in NVRAM, you cannot permanently delete them. If you
delete the administrative username using the no username command, the CSS
deletes the username from the running-config file, but restores the username from
NVRAM when you reboot the CSS.
Use the username-offdm name password text command to change the
administrative username or password.
1-2
NoteYou can also use the Security Options menu from the Offline DM menu (accessed
during the boot process) to change the administrative username and password.
Refer to the Cisco Content Services Switch Administration Guide for information
on the Offline DM menu.
For example, to change the default administrative username and password to a
different username and password, enter.
Logging into the CSS requires a username and password. The CSS supports a
maximum of 32 usernames, including the administrator and technician
usernames. You can assign each user with SuperUser or User status.
• User - Allows access to a limited set of commands that enable you to monitor
and display CSS parameters, but not change them. A User prompt ends with
the > symbol.
• SuperUser - Allows access to the full set of CLI commands, including those
in User mode, that enable you to configure the CSS. A SuperUser prompt
ends with the # symbol.
From SuperUser mode, you can enter global configuration mode and its
subordinate configuration modes. If you do not specify superuser when
configuring a new user, the new user has only user-level status by default.
CautionCreating or modifying a username and password is restricted to CSS users who
are identified as either administrators or technicians, and it is contingent on
whether the restrict user-database command has been entered.
Creating Usernames and Passwords
OL-5650-02
Use the username command to create usernames and passwords to log in to the
CSS. The syntax for this global configuration mode command is:
username name [des-password|password] password {superuser}
{dir-access access}
The following example creates a SuperUser named picard with a password of
captain.
• name - Sets the username you want to assign or change. Enter an unquoted
text string with no spaces and a maximum of 16 characters. To see a list of
existing usernames, enter username ?.
• des-password - Specifies the password is Data Encryption Standard (DES)
encrypted. Use this option only when you are creating a file for use as a script
or a startup configuration file. Enter the DES password as a case-sensitive
unquoted text string 6 to 64 characters in length.
• password - Specifies the password is not encrypted. Use this option when
you use the CLI to dynamically create users.
• password - The password. Enter an unquoted text string with no spaces and a
length of 6 to 16 characters. The CSS allows all special characters in a
password except for the percent sign (%).
NoteIf you specify the des-password option, you must know the encrypted
• superuser - Specifies SuperUser privileges to allow a user to access
SuperUser mode. If you do not enter this option, the user can only access User
mode.
• dir-access - (Optional) Defines the CSS directory access privileges for the
username. There are access privileges assigned to the seven CSS directories,
in the following order: Script, Log, Root (installed CSS software), Archive,
Release Root (configuration files), Core, and MIBs. By default, users have
both read- and write-access privileges (B) to all seven directories.
Administrators or technicians can use the dir-access option to selectively
implement a set of directory access privileges for each user. Changing the
access level also affects the use of the CLI commands associated with
directories.
Chapter 1 Controlling CSS Access
form of this password to successfully log in to the CSS. You can find the
CSS encrypted password in the running configuration. To display the CSS
running configuration, use the show running-config command (see the
“Creating Usernames and Passwords” section).
1-4
To use the dir-access option, you must first specify the restrict
user-database command to implement security restrictions for the CSS user
• access - Specifies directory access privileges for the username. By default,
users have both read- and write-access privileges (B) to all seven directories.
Enter, in order, one of the following access privilege codes for each of the
seven CSS directories:
–
–
–
–
Figure 1-1 illustrates the directory access privileges for a username.
Figure 1-1CSS Directory Access Privileges
NWBNNNR
Archive directory, set to None (no directory access)
Root directory, set to both read and write-access
Log directory, set to write-only access
Script directory, set to None (no directory access)
Creating Usernames and Passwords
R - Read-only access to the CSS directory
W - Write-only access to the CSS directory
B - Both read- and write-access privileges to the CSS directory
N - No access privileges to the CSS directory
MIBs directory, set to read-only access
Core directory, set to None (no directory access)
Release Root directory, set to None (no directory access)
59110
OL-5650-02
For example, to define directory access for username picard, enter:
To change a user password, reenter the username command and specify the new
password. Remember to include SuperUser privileges if required. For example:
To control access to the CSS, you can configure the CSS to authenticate remote
(virtual) or console users. The CSS can authenticate users by using the local user
database, RADIUS server, or TACACS+ server. You can also allow user access
without authenticating or disallowing all remote user access to the CSS.
You can set a maximum of three authentication methods: a primary, secondary,
or tertiary authentication method. The primary method is the first authentication
method that the CSS tries. If the primary authentication method fails (for
example, the RADIUS server is down or is unreachable), the CSS tries the
secondary method. And if the secondary method fails, then the CSS tries the
tertiary method. In the event the tertiary method also fails, the CSS displays a
message that authentication has failed.
The CSS does not attempt a secondary or tertiary authentication method under the
following conditions:
• If the authentication method is local, and the local username is not found in
the local user database.
• If the authentication method is local and the local username is found in the
local user database, but the password is invalid.
• If the authentication method is radius, and the RADIUS server rejects the
primary authentication request from the CSS.
1-6
• If the authentication method is tacacs, and the TACACS+ server rejects the
primary authentication request from the CSS.
Before you can use RADIUS or TACACS+ as either the virtual authentication
method or the console authentication method, you must enable communication
with the RADIUS or TACACS+ security server. Use either the radius-server
command (refer to the Chapter 3, Configuring the CSS as a Client of a RADIUS
Server) or the tacacs-server command (see the Chapter 4, Configuring the CSS
as a Client of a TACACS+ Server).
This section includes the following topics:
• Configuring Virtual Authentication
• Configuring Console Authentication
To display virtual and console authentication settings, use the show
user-database command.