21-5
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 21 Using Modular Policy Framework
Identifying Traffic Using a Layer 3/4 Class Map
Creating a Layer 3/4 Class Map for Management Traffic
For management traffic to the security appliance, you might want to perform actions specific to this kind
of traffic. You can specify a management class map that can match an access list or TCP or UDP ports.
The types of actions available for a management class map in the policy map are specialized for
management traffic. Namely, this type of class map lets you inspect RADIUS accounting traffic and set
connection limits.
To create a class map for management traffic to the security appliance, perform the following steps:
Step 1
Create a class map by entering the following command:
hostname(config)#
class-map type management
class_map_name
hostname(config-cmap)#
Where
class_map_name
is a string up to 40 characters in length. The name “class-default” is reserved.
All types of class maps use the same name space, so you cannot reuse a name already used by another
type of class map. The CLI enters class-map configuration mode.
Step 2
(Optional) Add a description to the class map by entering the following command:
hostname(config-cmap)#
description
string
Step 3
Define the traffic to include in the class by matching one of the following characteristics. You can
include only one
match
command in the class map.
•
Access list—The class map matches traffic specified by an extended access list. If the security
appliance is operating in transparent firewall mode, you can use an EtherType access list.
hostname(config-cmap)#
match
access-list
access_list_name
For more information about creating access lists, see the
“Adding an Extended Access List” section
on page 16-5
or the
“Adding an EtherType Access List” section on page 16-8
.
For information about creating access lists with NAT, see the
“IP Addresses Used for Access Lists
When You Use NAT” section on page 16-3
.
•
TCP or UDP destination ports—The class map matches a single port or a contiguous range of ports.
hostname(config-cmap)#
match
port
{
tcp
|
udp
} {
eq
port_num
|
range
port_num
port_num
}
Tip
For applications that use multiple, non-contiguous ports, use the
match access-list
command
and define an ACE to match each port.
For a list of ports you can specify, see the
“TCP and UDP Ports” section on page D-11
.
For example, enter the following command to match TCP packets on port 80 (HTTP):
hostname(config-cmap)#
match tcp eq 80
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......