21-11
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 21 Using Modular Policy Framework
Configuring Special Actions for Application Inspections
The following example creates an HTTP class map that can match any of the criteria:
hostname(config-cmap)#
class-map type inspect http match-any monitor-http
hostname(config-cmap)#
match request method get
hostname(config-cmap)#
match request method put
hostname(config-cmap)#
match request method post
Defining Actions in an Inspection Policy Map
When you enable an inspection engine in the Layer 3/4 policy map, you can also optionally enable
actions as defined in an inspection policy map.
To create an inspection policy map, perform the following steps:
Step 1
To create the HTTP inspection policy map, enter the following command:
hostname(config)#
policy-map type inspect
application
policy_map_name
hostname(config-pmap)#
See the
“Configuring Application Inspection” section on page 25-5
for a list of applications that support
inspection policy maps.
The
policy_map_name
argument is the name of the policy map up to 40 characters in length. All types
of policy maps use the same name space, so you cannot reuse a name already used by another type of
policy map. The CLI enters policy-map configuration mode.
Step 2
To apply actions to matching traffic, perform the following steps:
a.
Specify the traffic on which you want to perform actions using one of the following methods:
•
Specify the inspection class map that you created in the
“Identifying Traffic in an Inspection
Class Map” section on page 21-10
by entering the following command:
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
Not all applications support inspection class maps.
•
Specify traffic directly in the policy map using one of the
match
commands described for each
application in
Chapter 25, “Configuring Application Layer Protocol Inspection.”
If you use a
match not
command, then any traffic that matches the criterion in the
match not
command does
not have the action applied.
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {[
drop
[
send-protocol-error
] |
drop-connection
[
send-protocol-error
]|
mask
|
reset
] [
log
] |
rate-limit
message_rate
}
Not all options are available for each application. Other actions specific to the application might also
be available. See
Chapter 25, “Configuring Application Layer Protocol Inspection,”
for the exact
options available.
The
drop
keyword drops all packets that match.
The
send-protocol-error
keyword sends a protocol error message.
The
drop-connection
keyword drops the packet and closes the connection.
The
mask
keyword masks out the matching portion of the packet.
The
reset
keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......