21-15
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 21 Using Modular Policy Framework
Defining Actions Using a Layer 3/4 Policy Map
For features that are applied unidirectionally, for example QoS priority queue, only traffic that exits the
interface to which you apply the policy map is affected. See
Table 21-2
for the directionality of each
feature.
Feature Matching Guidelines within a Policy Map
See the following guidelines for how a packet matches class maps in a policy map:
•
A packet can match only one class map in the policy map for each feature type.
•
When the packet matches a class map for a feature type, the security appliance does not attempt to
match it to any subsequent class maps for that feature type.
•
If the packet matches a subsequent class map for a different feature type, however, then the security
appliance also applies the actions for the subsequent class map.
For example, if a packet matches a class map for connection limits, and also matches a class map for
application inspection, then both class map actions are applied.
If a packet matches a class map for application inspection, but also matches another class map that
includes application inspection, then the second class map actions are not applied.
Feature Matching Guidelines for multiple Policy Maps
For TCP and UDP traffic (and ICMP when you enable stateful ICMP inspection), Modular Policy
Framework operates on traffic flows, and not just individual packets. If traffic is part of an existing
connection that matches a feature in a policy on one interface, that traffic flow cannot also match the
same feature in a policy on another interface; only the first policy is used.
For example, if HTTP traffic matches a policy on the inside interface to inspect HTTP traffic, and you
have a separate policy on the outside interface for HTTP inspection, then that traffic is not also inspected
on the egress of the outside interface. Similarly, the return traffic for that connection will not be
inspected by the ingress policy of the outside interface, nor by the egress policy of the inside interface.
For traffic that is not treated as a flow, for example ICMP when you do not enable stateful ICMP
inspection, returning traffic can match a different policy map on the returning interface. For example, if
you configure IPS inspection on the inside and outside interfaces, but the inside policy uses virtual
sensor 1 while the outside policy uses virtual sensor 2, then a non-stateful Ping will match virtual sensor
1 outbound, but will match virtual sensor 2 inbound.
Table 21-2
Feature Directionality
Feature
Single Interface Direction Global Direction
TCP normalization, TCP and UDP connection
limits and timeouts, and TCP sequence number
randomization
Bidirectional
Ingress
CSC
Bidirectional
Ingress
Application inspection
Bidirectional
Ingress
IPS
Bidirectional
Ingress
QoS input policing
Ingress
Ingress
QoS output policing
Egress
Egress
QoS priority queue
Egress
Egress
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......