
20-21
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 20 Using Modular Policy Framework
Modular Policy Framework Examples
hostname(config)#
service-policy new_global_policy global
Modular Policy Framework Examples
This section includes several Modular Policy Framework examples, and includes the following topics:
•
Applying Inspection to HTTP Traffic Globally, page 20-21
•
Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers, page 20-22
•
Applying Inspection to HTTP Traffic with NAT, page 20-22
Applying Inspection to HTTP Traffic Globally
In this example (see
Figure 20-1
), any HTTP connection (TCP traffic on port 80) that enters the FWSM
through any interface is classified for HTTP inspection.
Figure 20-1
Global HTTP Inspection
See the following commands for this example:
hostname(config)#
class-map http_traffic
hostname(config-cmap)#
match port tcp eq 80
hostname(config)#
policy-map http_traffic_policy
hostname(config-pmap)#
class http_traffic
hostname(config-pmap-c)#
inspect http
hostname(config)#
service-policy http_traffic_policy global
inside
port 80
outside
A
Host A
Host B
FWSM
port 80 insp.
insp.
143413
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......