ASDM allows you to manage new and existing security contexts, if the security Cisco ASA is already running in the multicontext mode. Consult Chapter 9, "Security Contexts," on how to set up an Cisco ASA for multiple security contexts.
When an Cisco ASA is converted from single to multiple mode, the security Cisco ASA saves the default configuration under the admin context. To create a new context, navigate to Configuration > Features > Security Contexts under the System context and click Add. ASDM prompts you to specify the name of the new context and the associated interfaces, as shown in Figure 19-24. The name of the security context is Cubs, and GigabitEthernet0/1 and GigabitEthernet0/2 are the two interfaces allocated to this context. The configuration of this context is saved in the local Flash (disk0:) as Cubs.
Figure 19-24. Creating a New Security Context
All other features in a security context are set up the same as discussed earlier in this chapter. To switch from one security context to another, select the desired security context from the Context drop-down menu, as shown in Figure 19-25.
Figure 19-25. Selecting the Desired Security Context
Part I: Product Overview
Introduction to Network Security
Product History
Hardware Overview
Part II: Firewall Solution
Initial Setup and System Maintenance
Network Access Control
IP Routing
Authentication, Authorization, and Accounting (AAA)
Application Inspection
Security Contexts
Transparent Firewalls
Failover and Redundancy
Quality of Service
Part III: Intrusion Prevention System (IPS) Solution
Intrusion Prevention System Integration
Configuring and Troubleshooting Cisco IPS Software via CLI
Part IV: Virtual Private Network (VPN) Solution
Site-to-Site IPSec VPNs
Remote Access VPN
Public Key Infrastructure (PKI)
Part V: Adaptive Security Device Manager
Introduction to ASDM
Firewall Management Using ASDM
IPS Management Using ASDM
VPN Management Using ASDM
Case Studies