2-5
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 2 Special Actions for Application Inspections (Inspection Policy Map)
Identifying Traffic in an Inspection Class Map
Examples
The following is an example of an HTTP inspection policy map and the related class maps. This policy
map is activated by the Layer 3/4 policy map, which is enabled by the service policy.
hostname(config)#
regex url_example example\.com
hostname(config)#
regex url_example2 example2\.com
hostname(config)#
class-map type regex match-any URLs
hostname(config-cmap)#
match
regex
url_example
hostname(config-cmap)#
match
regex
url_example2
hostname(config-cmap)#
class-map type inspect http match-all http-traffic
hostname(config-cmap)#
match req-resp content-type mismatch
hostname(config-cmap)#
match request body length gt 1000
hostname(config-cmap)#
match not request uri regex class URLs
hostname(config-cmap)#
policy-map type inspect http http-map1
hostname(config-pmap)#
class http-traffic
hostname(config-pmap-c)#
drop-connection log
hostname(config-pmap-c)#
match req-resp content-type mismatch
hostname(config-pmap-c)#
reset log
hostname(config-pmap-c)#
parameters
hostname(config-pmap-p)#
protocol-violation action log
hostname(config-pmap-p)#
policy-map test
hostname(config-pmap)#
class test
(a Layer 3/4 class map not shown)
hostname(config-pmap-c)#
inspect http http-map1
hostname(config-pmap-c)#
service-policy test interface outside
Identifying Traffic in an Inspection Class Map
This type of class map allows you to match criteria that is specific to an application. For example, for
DNS traffic, you can match the domain name in a DNS query.
A class map groups multiple traffic matches (in a match-all class map), or lets you match any of a list of
matches (in a match-any class map). The difference between creating a class map and defining the traffic
match directly in the inspection policy map is that the class map lets you group multiple match
commands, and you can reuse class maps. For the traffic that you identify in this class map, you can
specify actions such as dropping, resetting, and/or logging the connection in the inspection policy map.
If you want to perform different actions on different types of traffic, you should identify the traffic
directly in the policy map.
Restrictions
Not all applications support inspection class maps. See the CLI help for
class-map type inspect
for a
list of supported applications.
Summary of Contents for ASA 5512-X
Page 5: ...P A R T 1 Service Policies and Access Control ...
Page 6: ......
Page 51: ...P A R T 2 Network Address Translation ...
Page 52: ......
Page 127: ...P A R T 3 Application Inspection ...
Page 128: ......
Page 255: ...P A R T 4 Connection Settings and Quality of Service ...
Page 256: ......
Page 303: ...P A R T 5 Advanced Network Protection ...
Page 304: ......
Page 339: ...P A R T 6 ASA Modules ...
Page 340: ......