SIMULATION
Scenario:
Your organization is deploying the ASA CX software module in the ASA which connects the organization's internal network to the Internet. A colleague has configured the policy on the CX module itself. Your task is to configure the ASA to forward the appropriate traffic to the CX module for processing.
Currently there are no policies configured for the inside interface. Your goal is to match all traffic which traverses the inside interface using the system default class, and send that traffic to the CX module. The CX will use active authentication. Also in the event of a CX module failure, no traffic should be allowed.
Access to the console of the ASA by clicking on its icon in the topology map. The enable password is Cisco!23. Use inside-policy as the name of the policy map that you configure. After you have successfully applied the policy map to the inside interface, verify that it is active using an appropriate show command.


Correct Answer:
See the solution below.
Explanation/Reference:
Explanation:
Review the explanation part for full solution.
We need to create a policy map named inside-policy and send the traffic to the CXSC blade:
ASA-FW# config t
ASA-FW(config)# policy-map inside-policy
ASA-FW(config-pmap)# policy-map inside-policy
ASA-FW(config-pmap)# class class-default
ASA-FW(config-pmap-c)# cxsc fail-close auth-proxy
ASA-FW(config-pmap-c)# exit
ASA-FW(config-pmap)# exit
The fail-close is needed as per instructions that if the CX module fails, no traffic should be allowed. The auth-proxy keyword is needed for active authentication. Next, we need to apply this policy map to the inside interface:
ASA-FW(config)#service-policy inside-policy interface inside.
Finally, verify that the policy is active:
ASA-FW# show service-policy interface inside
Interface inside:
Service-policy: inside-policy
Class-map: class-default
Default QueueingCXSC: card status Up, mode fail-close, auth-proxy enabled Packet input 181, packet output 183, drop 0, reset-drop 0, proxied 0