1-19
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 1 Service Policy Using the Modular Policy Framework
Monitoring Service Policies
Monitoring Service Policies
To monitor service policies, enter the following command:
•
show service-policy
Displays the service policy statistics.
Examples for Service Policies (Modular Policy Framework)
This section includes several Modular Policy Framework examples.
•
Applying Inspection and QoS Policing to HTTP Traffic, page 1-19
•
Applying Inspection to HTTP Traffic Globally, page 1-20
•
Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers, page 1-20
•
Applying Inspection to HTTP Traffic with NAT, page 1-21
Applying Inspection and QoS Policing to HTTP Traffic
In this example, any HTTP connection (TCP traffic on port 80) that enters or exits the ASA through the
outside interface is classified for HTTP inspection. Any HTTP traffic that exits the outside interface is
classified for policing.
Figure 1-1
HTTP Inspection and QoS Policing
See the following commands for this example:
hostname(config)#
class-map http_traffic
hostname(config-cmap)#
match port tcp eq 80
hostname(config)#
policy-map http_traffic_policy
hostname(config-pmap)#
class http_traffic
hostname(config-pmap-c)#
inspect http
hostname(config-pmap-c)#
police output 250000
hostname(config)#
service-policy http_traffic_policy interface outside
14
33
56
in
s
ide
port
8
0
o
u
t
s
ide
A
Ho
s
t A
Ho
s
t B
port
8
0
S
ecurity
appliance
in
s
p.
in
s
p.
police
Summary of Contents for ASA 5512-X
Page 5: ...P A R T 1 Service Policies and Access Control ...
Page 6: ......
Page 51: ...P A R T 2 Network Address Translation ...
Page 52: ......
Page 127: ...P A R T 3 Application Inspection ...
Page 128: ......
Page 255: ...P A R T 4 Connection Settings and Quality of Service ...
Page 256: ......
Page 303: ...P A R T 5 Advanced Network Protection ...
Page 304: ......
Page 339: ...P A R T 6 ASA Modules ...
Page 340: ......