
CHAPTER
3-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
3
Enabling Multiple Context Mode
This chapter describes how to use security contexts and enable multiple context mode. This chapter
includes the following sections:
• Security Context Overview, page 3-1
• Enabling or Disabling Multiple Context Mode, page 3-10
Security Context Overview
You can partition a single security appliance into multiple virtual devices, known as security contexts.
Each context is an independent device, with its own security policy, interfaces, and administrators.
Multiple contexts are similar to having multiple standalone devices. Many features are supported in
multiple context mode, including routing tables, firewall features, IPS, and management. Some features
are not supported, including VPN and dynamic routing protocols.
In multiple context mode, the security appliance includes a configuration for each context that identifies
the security policy, interfaces, and almost all the options you can configure on a standalone device. The
system administrator adds and manages contexts by configuring them in the system configuration,
which, like a single mode configuration, is the startup configuration. The system configuration identifies
basic settings for the security appliance. The system configuration does not include any network
interfaces or network settings for itself; rather, when the system needs to access network resources (such
as downloading the contexts from the server), it uses one of the contexts that is designated as the admin
context.
The admin context is just like any other context, except that when a user logs in to the admin context,
then that user has system administrator rights and can access the system and all other contexts.
This section provides an overview of security contexts, and includes the following topics:
• Common Uses for Security Contexts, page 3-2
• Unsupported Features, page 3-2
• Context Configuration Files, page 3-2
• How the Security Appliance Classifies Packets, page 3-3
• Sharing Interfaces Between Contexts, page 3-6
• Logging into the Security Appliance in Multiple Context Mode, page 3-10
Kommentare zu diesen Handbüchern