![Cisco ASA 5512-X Скачать руководство пользователя страница 368](http://html.mh-extra.com/html/cisco/asa-5512-x/asa-5512-x_configuration-manual_63717368.webp)
16-28
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 16 ASA FirePOWER (SFR) Module
Monitoring the ASA FirePOWER Module
The following example shows the location of the ASA FirePOWER boot image that was used with the
sw-module module sfr recover
command when installing the module.
hostname#
show module sfr recover
Module sfr recover parameters...
Boot Recovery Image: No
Image File Path: disk0:/asasfr-5500x-boot-5.3.1-44.img
Showing Module Statistics
Use the show service-policy sfr command to display statistics and status for each service policy that
includes the
sfr
command. Use
clear service-policy
to clear the counters.
The following example shows the ASA FirePOWER service policy and the current statistics as well as
the module status. In monitor-only mode, the input counters remain at zero.
ciscoasa#
show service-policy sfr
Global policy:
Service-policy: global_policy
Class-map: my-sfr-class
SFR: card status Up, mode fail-close
packet input 2626422041, packet output 2626877967, drop 0, reset-drop 0, proxied 0
Monitoring Module Connections
To show connections through the ASA FirePOWER module, enter one of the following commands:
•
show asp table classify domain
sfr
Shows the NP rules created to send traffic to the ASA FirePOWER module.
•
show asp drop
Shows dropped packets. The drop types are explained below.
•
show conn
Shows if a connection is being forwarded to a module by displaying the ‘X - inspected by service
module’ flag.
The
show asp drop
command can include the following drop reasons related to the ASA FirePOWER
module.
Frame Drops:
•
sfr-bad-tlv-received—This occurs when ASA receives a packet from FirePOWER without a Policy
ID TLV. This TLV must be present in non-control packets if it does not have the Standby/Active bit
set in the actions field.
•
sfr-request—The frame was requested to be dropped by FirePOWER due a policy on FirePOWER
whereby FirePOWER would set the actions to Deny Source, Deny Destination, or Deny Pkt. If the
frame should not have been dropped, review the policies on the module that are denying the flow.
•
sfr-fail-close—The packet is dropped because the card is not up and the policy configured was
‘fail-close’ (rather than ‘fail-open’ which allows packets through even if the card was down). Check
card status and attempt to restart services or reboot it.
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...