1-20
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Service Policy Using the Modular Policy Framework
Configuration Examples for Modular Policy Framework
hostname(config)#
policy-map http_traffic_policy
hostname(config-pmap)#
class http_traffic
hostname(config-pmap-c)#
inspect http
hostname(config)#
service-policy http_traffic_policy global
Applying Inspection and Connection Limits to HTTP Traffic to Specific
Servers
In this example (see
), any HTTP connection destined for Server A (TCP traffic on port 80)
that enters the ASA through the outside interface is classified for HTTP inspection and maximum
connection limits. Connections initiated from Server A to Host A does not match the access list in the
class map, so it is not affected.
Any HTTP connection destined for Server B that enters the ASA through the inside interface is classified
for HTTP inspection. Connections initiated from Server B to Host B does not match the access list in the
class map, so it is not affected.
Figure 1-3
HTTP Inspection and Connection Limits to Specific Servers
See the following commands for this example:
hostname(config)#
object network obj-192.168.1.2
hostname(config-network-object)#
host 192.168.1.2
hostname(config-network-object)#
nat (inside,outside) static 209.165.201.1
hostname(config)#
object network obj-192.168.1.0
hostname(config-network-object)#
subnet 192.168.1.0 255.255.255.0
hostname(config-network-object)#
nat (inside,outside) dynamic 209.165.201.2
hostname(config)#
access-list serverA extended permit tcp any host 209.165.201.1 eq 80
hostname(config)#
access-list ServerB extended permit tcp any host 209.165.200.227 eq 80
hostname(config)#
class-map http_serverA
hostname(config-cmap)#
match access-list serverA
hostname(config)#
class-map http_serverB
hostname(config-cmap)#
match access-list serverB
hostname(config)#
policy-map policy_serverA
hostname(config-pmap)#
class http_serverA
hostname(config-pmap-c)#
inspect http
hostname(config-pmap-c)#
set connection conn-max 100
hostname(config)#
policy-map policy_serverB
hostname(config-pmap)#
class http_serverB
inside
outside
Server A
Real Address: 192.168.1.2
Mapped Address: 209.165.201.1
Host B
Real Address: 192.168.1.1
Mapped Address: 209.165.201.2:port
Host A
209.165.200.226
Server B
209.165.200.227
port 80
port 80
insp.
insp.
set conns
143357
Security
appliance
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......