1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Inspection of Basic Internet Protocols
DNS Inspection
policy-map type inspect dns
name
Example:
hostname(config)# policy-map type inspect
dns dns-map
Creates an inspection policy map in which you want to match
traffic directly.
You can specify multiple
match
commands in the policy map. For
information about the order of
match
commands, see the
“Defining Actions in an Inspection Policy Map” section on
page 2-4
.
Step 2
match
[
not
]
header-flag
[
eq
]
{
f_well_known
[
f_well_known
...] |
f_value
}
For direct match only:
{
drop
[
log
] |
drop-connection
[
log
]|
[
enforce-tsig
{[
drop
] [
log
]}] [
mask
[
log
]]
|
log
}
Example:
hostname(config-pmap)# match header-flag
AA QR
hostname(config-pmap-c)# mask log
hostname(config-pmap-c)# enforce-tsig log
Matches a specific flag or flags that are set in the DNS header,
where the
f_well_known
argument is the DNS flag bit. The
f_value
argument is the 16-bit value in hex starting with 0x. The
eq
keyword specifies an exact match (match all); without the
eq
keyword, the packet only needs to match one of the specified
headers (match any).
To specify traffic that should not match, use the
match not
command.
If you are matching directly in the inspection policy map, specify
the action(s) for the match:
•
drop
[
log
]—Drops the packet.
log
also logs the packet.
•
drop-connection
[
log
]—Drops the packet and closes the
connection.
log
also logs the packet.
•
enforce-tsig
{[
drop
] [
log
]}—Enforces the TSIG resource
record in a message.
drop
drops a packet without the TSIG
resource record.
log
also logs the packet.
•
mask
[
log
]—
M
asks out the matching portion of the packet.
log
also logs the packet.
•
log
—Logs the packet.
Step 3
match
[
not
]
dns-type
{
eq
{
t_well_known
|
t_val}
}
{
range
t_val1 t_val2
}
For direct match only:
{
drop
[
log
] |
drop-connection
[
log
]|
enforce-tsig
{[
drop
] [
log
]} |
log
}
Example:
hostname(config-pmap)# match dns-type eq
aaaa
hostname(config-pmap-c)# enforce-tsig log
Matches a DNS type, where the
t_well_known
argument is the
DNS flag bit. The
t_val
arguments are arbitrary values in the DNS
type field (0-65535). The
range
keyword specifies a range, and
the
eq
keyword specifies an exact match.
To specify traffic that should not match, use the
match not
command.
If you are matching directly in the inspection policy map, specify
the action for the match:
•
drop
[
log
]—Drops the packet.
log
also logs the packet.
•
drop-connection
[
log
]—Drops the packet and closes the
connection.
log
also logs the packet.
•
enforce-tsig
{[
drop
] [
log
]}—Enforces the TSIG resource
record in a message.
drop
drops a packet without the TSIG
resource record.
log
also logs the packet.
•
log
—Logs the packet.
Command
Purpose
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......