Context Configuration Files

Context configuration files have the following characteristics:

• Each context has its own configuration file.

• The security appliance also includes a system configuration that identifies basic settings for the security appliance, including a list of contexts.

Security Appliance

System Config Security Context Admin

Security Context Admin Config

Security Context B

Security Context B Config

Security Context C

Security Context C Config

© 2005 Cisco Systems, Ii

Each context has its own configuration file that identifies the security policy, interfaces, and almost all the options you can configure on a stand-alone firewall. You can store context configurations on the local disk partition on the Flash memory card, or you can download them from a TFTP, FTP, or Hypertext Transfer Protocol secure (HTTPS) server.

In addition to system configurations in individual security contexts, the security appliance also includes a system configuration that identifies basic settings for the security appliance, including a list of contexts. Like the single-mode configuration, the security appliance configuration resides as the startup configuration in the Flash memory partition.

Was this article helpful?

0 0

Post a comment