
5-3
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 5 Adding and Managing Security Contexts
Configuring a Security Context
If you specify a range of subinterfaces, you can specify a matching range of mapped names. Follow these
guidelines for ranges:
• The mapped name must consist of an alphabetic portion followed by a numeric portion. The
alphabetic portion of the mapped name must match for both ends of the range. For example, enter
the following range:
int0-int10
If you enter gigabitethernet1.1-gigabitethernet1.5 happy1-sad5, for example, the command fails.
• The numeric portion of the mapped name must include the same quantity of numbers as the
subinterface range. For example, both ranges include 100 interfaces:
gigabitethernet0.100-gigabitethernet0.199 int1-int100
If you enter gigabitethernet0.100-gigabitethernet0.199 int1-int15, for example, the command
fails.
Specify visible to see physical interface properties in the show interface command even if you set a
mapped name. The default invisible keyword specifies to only show the mapped name.
The following example shows gigabitethernet1.100, gigabitethernet1.200, and gigabitethernet2.300
through gigabitethernet1.305 assigned to the context. The mapped names are int1 through int8.
hostname(config-ctx)# allocate-interface gigabitethernet1.100 int1
hostname(config-ctx)# allocate-interface gigabitethernet1.200 int2
hostname(config-ctx)# allocate-interface gigabitethernet2.300-gigabitethernet2.305
int3-int8
Step 4 To identify the URL from which the system downloads the context configuration, enter the following
command:
hostname(config-ctx)# config-url
url
When you add a context URL, the system immediately loads the context so that it is running.
Note Enter the allocate-interface command(s) before you enter the config-url command. The security
appliance must assign interfaces to the context before it loads the context configuration; the context
configuration might include commands that refer to interfaces (interface, nat, global...). If you enter the
config-url command first, the security appliance loads the context configuration immediately. If the
context contains any commands that refer to interfaces, those commands fail.
See the following URL syntax:
• flash:/[path/]filename
This URL indicates the internal Flash memory.
• ftp://[user[:password]@]server[:port]/[path/]filename[;type=xx]
The type can be one of the following keywords:
–
ap—ASCII passive mode
–
an—ASCII normal mode
–
ip—(Default) Binary passive mode
–
in—Binary normal mode
• http[s]://[user[:password]@]server[:port]/[path/]filename
• tftp://[user[:password]@]server[:port]/[path/]filename[;int=interface_name]
Kommentare zu diesen Handbüchern