1-7
Cisco ASA Series CLI Configuration Guide
Chapter 1 Getting Started with Application Layer Protocol Inspection
Configuring Application Layer Protocol Inspection
Configuring Application Layer Protocol Inspection
This feature uses Modular Policy Framework to create a service policy. Service policies provide a
consistent and flexible way to configure ASA features. For example, you can use a service policy to
create a timeout configuration that is specific to a particular TCP application, as opposed to one that
applies to all TCP applications. See
Chapter 1, “Configuring a Service Policy Using the Modular Policy
for more information. For some applications, you can perform special actions when you
enable inspection. See
Chapter 1, “Configuring a Service Policy Using the Modular Policy Framework,”
for more information.
Inspection is enabled by default for some applications. See the
section for more
information. Use this section to modify your inspection policy.
Detailed Steps
Step 1
To identify the traffic to which you want to apply inspections, add either a Layer 3/4 class map for
through traffic or a Layer 3/4 class map for management traffic. See the
“Creating a Layer 3/4 Class Map
for Through Traffic” section on page 1-12
and
“Creating a Layer 3/4 Class Map for Management
for detailed information. The management Layer 3/4 class map can be used
only with the RADIUS accounting inspection.
The default Layer 3/4 class map for through traffic is called “inspection_default.” It matches traffic using
a special
match
command,
match default-inspection-traffic
, to match the default ports for each
application protocol. This traffic class (along with
match any
, which is not typically used for inspection)
matches both IPv4 and IPv6 traffic for inspections that support IPv6. See the
Limitations” section on page 1-3
for a list of IPv6-enabled inspections.
You can specify a
match
access-list
command along with the
match default-inspection-traffic
command to narrow the matched traffic to specific IP addresses. Because the
match
default-inspection-traffic
command specifies the ports to match, any ports in the access list are ignored.
Tip
We suggest that you only inspect traffic on ports on which you expect application traffic; if you
inspect all traffic, for example using
match any
, the ASA performance can be impacted.
If you want to match non-standard ports, then create a new class map for the non-standard ports. See the
“Default Settings” section on page 1-4
for the standard ports for each inspection engine. You can
combine multiple class maps in the same policy if desired, so you can create one class map to match
certain traffic, and another to match different traffic. However, if traffic matches a class map that
contains an inspection command, and then matches another class map that also has an inspection
command, only the first matching class is used. For example, SNMP matches the inspection_default
class. To enable SNMP inspection, enable SNMP inspection for the default class in
. Do not add
another class that matches SNMP.
For example, to limit inspection to traffic from 10.1.1.0 to 192.168.1.0 using the default class map, enter
the following commands:
hostname(config)#
access-list inspect extended permit ip 10.1.1.0 255.255.255.0
192.168.1.0 255.255.255.0
hostname(config)#
class-map inspection_default
hostname(config-cmap)#
match access-list inspect
View the entire class map using the following command:
hostname(config-cmap)#
show running-config class-map inspection_default
!
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......