Driver Support Document

Cisco firewalls, Firewall Services Module (FWSM) Series, Context within Multiple Mode (OBSOLETE, PLEASE REDISCOVER)

Show Tested Devices Grid

SYSOID Mapping
SYSOID MODEL OS VERSION
 1.3.6.1.4.1.9.1.674 ciscoWsSvcFwm1sc 3.1(1), 3.2(6), 4.0(6)
 1.3.6.1.4.1.9.1.522 cat6500FirewallSm 3.1(1), 3.2(6), 4.0(6)

Driver Features Support Grid

Driver FeaturesAccess Methods
(X signifies feature support)CLISNMPTFTPCLI+TFTPSNMP+TFTPFTPCLI+FTPSNMP+FTPCLI+SFTPSCPCLI+SCPSNMP+SCPHTTP/HTTPS
  Driver Discovery release notes                          
X General Access release notes
(CLI protocols: telnet, ssh1, ssh2, console)
X     X                  
Configuration
X Retrieve Running Configuration release notes X     X                  
X Retrieve Startup Configuration   X     X                  
  Retrieve Binary Configuration                            
X Device information parsing  
X Enhanced Layer2 Basic IP information parsing  
X Configuration Deployment to Running release notes       X                  
X Configuration Deployment to Startup         X                  
  Binary Configuration Deployment                            
Diagnostics
X Routing Table   X                        
X OSPF Neighbors   X                        
X Interfaces   X                        
  Modules and Inventory                            
  Flash Storage Space                            
  File System                            
X Uptime     X                      
X ICMP Test   X                        
X Topology Parsing   X                        
  Duplex Parsing                            
  Enhanced VLAN Parsing  
Features
  Software Center                            
  Software Image Synchronization                            
X Password Management release notes
(Can modify: limited username, limited password, full password, read-only community strings)
X                        
X Syslog Configuration and Change Detection release notes Syslog patterns X                        
X Custom Scripts and Diagnostics  
Bulk deploy available
X                        
X ACL Parsing  
  ACL Provisioning                            
  VLAN Provisioning                            
X Configlet Parsing  
X QoS Parsing  
  VRF Parsing  
  Context Management                            

Driver Discovery

Release Notes

Deduplication of Cisco FWSM Contexts

It is not recommended to run manual or automated deduplication tasks against the Cisco FWSM contexts because there is no way to prevent all contexts from being deduplicated/deactivated. Independent discovery tasks are recommended.

return to top

General Access

Release Notes

Device Context Support

Device Context support extends to both IP and non-IP Device Contexts. With non-IP Device Contexts, some functionality, such as TFTP transfers, are not supported because the Device Context does not provide it. Using command scripts, you can configure the Device Context to support full IP functionality.

Disabling context management

The context management feature adds independent device entries for contexts on the device automatically by using the inventory diagnostic. This feature can be disabled by adding the access variable "disable_context" and setting it to true. Disabling the feature will remove any previously created context devices permanently and will result in the inability to directly manage contexts with NA. Changes will take effect the next time the inventory diagnostic task is run.

Disable tagging of Primary and Secondary devices

By default, the tag "primary" or "secondary" is added to the hostname field to indicate the presence of a failover system, because this coul cause the hostnames to be set to the same value. This would interfere with the management of the device's virtual contexts. To disable this alteration, set the "keep_hostname" access variable to "true", which will cause the hostname to be left unaltered.

return to top

Retrieve Running Configuration

Release Notes

May need to change the TFTP interface access setting

To retrieve (or deploy) a PIX device configuration using TFTP, you may need to specify the TFTP interface to use on the device. If the device self-selects the wrong interface for the TFTP settings, you can override the TFTP interface access setting in the device's password rules in the system. Note that you must either set up a device-specific password rule or define a password rule that applies specifically to PIX devices that are exhibiting this problem.

To change a device password rule:

  1. Edit the device and select "Use device-specific password information" or create or edit a device password rule applying to the appropriate device(s).
  2. Click "Show Device Access Settings"
  3. Choose "PIX TFTP interface" from one of the drop-down menus for "Name"
  4. Enter the desired interface (e.g. "outside") for the "Value" of this setting.
  5. Ensure all other authentication information is correct, and then save the device or password rule.

return to top

Configuration Deployment to Running

Release Notes

Double-check deployed configurations

The PIX occasionally has difficulty merging new configuration commands with the existing configuration. Because of this, we recommend that you double-check PIX configurations after you deploy them from the system.

First, take a snapshot of the configuration. Then check whether your changes were actually deployed to the running configuration as expected. Sometimes the system reports the deployment as failed, but still applies changes to the running configuration.

return to top

Syslog Configuration and Change Detection

Release Notes

No support for real-time change detection via AAA

The PIX does not support accounting sessions. Therefore, the system cannot provide real-time change detection through AAA.

Syslog interface must be defined

Cisco Firewalls require the specification of the interface to be used for relaying of syslog messages. The custom access variable "SyslogInterface" should be set to the correct interface to ensure correct operation of Syslog tasks.

return to top

Password Management

Release Notes

SNMP Updater cannot modify SNMP hosts

The SNMP community string updater can update, modify, or remove SNMP community strings. It cannot add, modify, or remove SNMP host entries that might be needed for desired SNMP functionality.

Changing limited password

The Limited Access Password field in the Deploy Passwords task only changes the telnet console access password, using the passwd command on the device.

return to top

Syslog Triggering

return to top