25-5
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
Configuring Application Inspection
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
service-policy global_policy global
Configuring Application Inspection
This feature uses Modular Policy Framework, so that implementing application inspection consists of
identifying traffic, applying inspections to the traffic, and activating inspections on an interface. For
some applications, you can perform special actions when you enable inspection. See
Chapter 21, “Using
Modular Policy Framework,”
for more information.
Inspection is enabled by default for some applications. See the
“Default Inspection Policy”
section for
more information. Use this section to modify your inspection policy.
To configure application inspection, perform the following steps:
Step 1
To identify the traffic to which you want to apply inspections, add either a Layer 3/4 class map for
through traffic or a Layer 3/4 class map for management traffic. See the
“Creating a Layer 3/4 Class Map
for Through Traffic” section on page 21-3
and
“Creating a Layer 3/4 Class Map for Management
Traffic” section on page 21-5
for detailed information. The management Layer 3/4 class map can be used
only with the RADIUS accounting inspection.
The default Layer 3/4 class map for through traffic is called “inspection_default.” It matches traffic using
a special
match
command,
match default-inspection-traffic
, to match the default ports for each
application protocol.
You can specify a
match
access-list
command along with the
match default-inspection-traffic
command to narrow the matched traffic to specific IP addresses. Because the
match
default-inspection-traffic
command specifies the ports to match, any ports in the access list are ignored.
If you want to match non-standard ports, then create a new class map for the non-standard ports. See the
“Default Inspection Policy” section on page 25-3
for the standard ports for each inspection engine. You
can combine multiple class maps in the same policy if desired, so you can create one class map to match
certain traffic, and another to match different traffic. However, if traffic matches a class map that
contains an inspection command, and then matches another class map that also has an inspection
command, only the first matching class is used. For example, SNMP matches the inspection_default
class. To enable SNMP inspection, enable SNMP inspection for the default class in
Step 5
. Do not add
another class that matches SNMP.
For example, to limit inspection to traffic from 10.1.1.0 to 192.168.1.0 using the default class map, enter
the following commands:
hostname(config)#
access-list inspect extended permit ip 10.1.1.0 255.255.255.0
192.168.1.0 255.255.255.0
hostname(config)#
class-map inspection_default
hostname(config-cmap)#
match access-list inspect
View the entire class map using the following command:
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......