
16
Cisco PIX Security Appliance Release Notes Version 7.2
OL-10104-01
New Features
For more information, see the “Using the Command Line Interface” chapter in the Cisco Security Appliance
Command Line Configuration Guide. For a complete description of the command syntax, see the Cisco
Security Appliance Command Reference.
Save All Context Configurations from the System
You can now save all context configurations at once from the system execution space using the write
memory all command.
For more information, see the “Device Initialization and Configuration Synchronization”
section in the
Cisco Security Appliance Command Line Configuration Guide. For a complete description of the
command syntax, see the Cisco Security Appliance Command Reference.
Intra-Interface Communication for Clear Traffic
You can now allow any traffic to enter and exit the same interface, and not just VPN traffic. For more
information, see the “Permitting Intra-Interface Traffic” chapter in the Cisco Security Appliance
Command Line Configuration Guide.
Modular Policy Framework Support for Management Traffic
You can now define a Layer 3/4 class map for to-the-security-appliance traffic, so you can perform
special actions on management traffic. For this version, you can inspect RADIUS accounting traffic.
For more information, see the “Using the Modular Policy Framework” chapter in the Cisco Security
Appliance Command Line Configuration Guide.
Management and Serviceability
This section includes the following topics:
• Traceroute, page 16
• Packet Tracer, page 16
• WCCP, page 17
• IPv6 Security Enforcement of IPv6 Addresses, page 17
• Inspection IPS, CSC and URL Filtering for WebVPN, page 17
Traceroute
The traceroute command allows you to trace the route of a packet to its destination.
For more information, see the “Traceroute” section in the Cisco Security Appliance Command Line
Configuration Guide. For a complete description of the command syntax, see the Cisco Security
Appliance Command Reference.
Packet Tracer
The packet tracer tool allows you to trace the life span of a packet through the security appliance to see
if it is behaving as expected.
Komentáře k této Příručce