Viewing The Crash Dump; Common Problems - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Chapter 43
Troubleshooting the Security Appliance

Viewing the Crash Dump

If the security appliance crashes, you can view the crash dump information. We recommend contacting
Cisco TAC if you want to interpret the crash dump. See the show crashdump command in the
Security Appliance Command

Common Problems

This section describes common problems with the security appliance, and how you might resolve them.
Symptom
Symptom
Symptom
Symptom
OL-12172-03
The context configuration was not saved, and was lost when you reloaded.
Possible Cause
You did not save each context within the context execution space. If you are
configuring contexts at the command line, you did not save the current context before you changed
to the next context.
Save each context within the context execution space using the copy run start
Recommended Action
command. You cannot save contexts from the system execution space.
You cannot make a Telnet or SSH connection to the security appliance interface.
You did not enable Telnet or SSH to the security appliance.
Possible Cause
Recommended Action
Enable Telnet or SSH to the security appliance according to the instructions in
"Allowing Telnet Access" section on page 40-1
You cannot ping the security appliance interface.
You disabled ICMP to the security appliance.
Possible Cause
Enable ICMP to the security appliance for your IP address using the icmp
Recommended Action
command.
You cannot ping through the security appliance, although the access list allows it.
You did not enable the ICMP inspection engine or apply access lists on both the
Possible Cause
ingress and egress interfaces.
Because ICMP is a connectionless protocol, the security appliance does not
Recommended Action
automatically allow returning traffic through. In addition to an access list on the ingress interface,
you either need to apply an access list to the egress interface to allow replying traffic, or enable the
ICMP inspection engine, which treats ICMP connections as stateful connections.
Reference.
or the
Cisco Security Appliance Command Line Configuration Guide
"Allowing SSH Access" section on page
Common Problems
Cisco
40-2.
43-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents