Submit a ticketCall us

Looking to compare latest NPM features with previous versions of NPM?
The NPM new feature summary offers a comparison of new features and improvements offered with this release.

 

Home > Success Center > Firewall Security Manager (FSM) > View ASA multiple context

View ASA multiple context

Table of contents
Created by Justin Rouviere, last modified by MindTouch on Jun 23, 2016

Views: 20 Votes: 0 Revisions: 4

Overview

This article provides brief information and steps view ASA multiple context.

In ASA multi-context firewalls, there is one admin context and multiple user contexts. The admin context only specifies the interface assignments to each user context, no firewall rule/object definition. The user context contains the firewall rules/object definition and works as a separate firewall. FSM only analyzes the user context.

 

The admin context also has one special interface for firewall management purpose. The FSM connector can access each user context directly or access the user context through the admin context, for example, connecting to the admin context via the management interface, then switch from the admin context to the user context.

Basically, the FSM connector uses the admin context as a jumper.

 

FSM treats each user context as a separate firewall. Each user context consumes one license seat.

 

FSM does NOT analyze the admin context. The admin context config does NOT consume any license seat.

 

See FSM FAQ for more information.

Environment

All FSM versions

Steps

  1. Go to the following FSM location:
    C:\Program Files\SolarWinds\SolarWinds FSMServer\conf\ScriptTemplates\csa_admin_context.
  2. Copy the two .scripts to FSM Installed location) \SolarWinds FSMServer\conf\ScriptTemplates location.
  3. Restart FSM.
  4. Import through Connect to Device connector and click Finish.
  5. In device command template drop down, select Cisco Security Appliance using Admin Context and select Show internal Command template parameters.
  6. In Contextname value, specify the name of the context that needs to be extracted.


Use the Cisco Security Appliance using Admin Context only for devices that have multiple devices that are accessible only through the system context. In this instance, the device name or ip address must refer to the Admin context, because that is to which a connection is being sought.

 

 

 

Last modified
19:33, 22 Jun 2016

Tags

Classifications

Public