
C H A P T E R
3-1
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
3
Connecting to the Firewall Services Module and
Managing the Configuration
This chapter describes how to access the command-line interface and work with the configuration. This
chapter includes the following sections:
•
Connecting to the Firewall Services Module, page 3-1
•
Managing the Configuration, page 3-3
Connecting to the Firewall Services Module
This section describes how to connect or “session” to the FWSM from the switch command line. It also
describes how to log out of the FWSM to access the switch CLI. This section includes the following
topics:
•
Logging in to the FWSM, page 3-1
•
Logging out of the FWSM, page 3-2
Logging in to the FWSM
The FWSM does not have an external console port, you must session in to the FWSM for initial
configuration. Later, when you configure interfaces and IP addresses on the FWSM itself, you can access
the FWSM CLI remotely through an FWSM interface. See
Chapter 23, “Configuring Management
Access,”
for more information.
Without any additional configuration for user authentication (see the
“AAA for System Administrators”
section on page 23-10
), the login method consists of logging in as the default user:
1.
The login password lets you access user EXEC mode.
2.
To access configuration commands, you must enter privileged EXEC mode, which requires a second
password.
3.
From privileged EXEC mode, you can access global configuration mode, which does not require a
password.
Caution
Management access to the FWSM causes a degradation in performance. We recommend that you avoid
accessing the FWSM when high network performance is critical.
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......