22-17
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 22 Managing the AIP SSM and CSC SSM
Managing the CSC SSM
where
n
is the maximum simultaneous connections the adaptive security appliance will allow per client.
This command prevents a single client from abusing the services of the CSC SSM or any server protected
by the SSM, including prevention of attempts at DoS attacks on HTTP, FTP, POP3, or SMTP servers that
the CSC SSM protects.
Step 7
Assign the traffic identified by the class map as traffic to be sent to the CSC SSM with the
csc
command:
hostname(config-pmap-c)#
csc
{
fail-close
|
fail-open
}
The
fail-close
and
fail-open
keywords control how the adaptive security appliance handles traffic when
the CSC SSM is unavailable. For more information about the operating modes and failure behavior, see
the
“About the CSC SSM” section on page 22-10
.
Step 8
Apply the policy map globally or to a specific interface with the
service-policy
command:
hostname(config-pmap-c)#
service-policy
policy_map_name
[
global
|
interface
interface_ID
]
where
policy_map_name
is the policy map you configured in
Step 4
. To apply the policy map to traffic
on all the interfaces, use the
global
keyword.To apply the policy map to traffic on a specific interface,
use the
interface
interface_ID
option, where
interface_ID
is the name assigned to the interface with the
nameif
command.
Only one global policy is allowed. You can override the global policy on an interface by applying a
service policy to that interface. You can only apply one policy map to each interface.
The adaptive security appliance begins diverting traffic to the CSC SSM as specified.
Example 22-1
is based on the network shown in
Figure 22-7
and shows the creation of two service
policies:
•
The first policy, csc_out_policy, is applied to the inside interface and uses the csc_out access list to
ensure that all outbound requests for FTP and POP3 are scanned. The csc_out access list also
ensures that HTTP connections from inside to networks on the outside interface are scanned, but it
includes a deny ACE to exclude HTTP connections from inside to servers on the DMZ network.
•
The second policy, csc_in_policy, is applied to the outside interface and uses the csc_in access list
to ensure that requests for SMTP and HTTP originating on the outside interface and destined for the
DMZ network are scanned by the CSC SSM. Scanning HTTP requests protects the web server from
HTTP file uploads.
Example 22-1 Service Policies for a Common CSC SSM Scanning Scenario
hostname
access-list csc_out permit tcp 192.168.10.0 255.255.255.0 any eq 21
hostname
access-list csc_out deny tcp 192.168.10.0 255.255.255.0 192.168.20.0 255.255.255.0 eq 80
hostname
access-list csc_out permit tcp 192.168.10.0 255.255.255.0 any eq 80
hostname
access-list csc_out permit tcp 192.168.10.0 255.255.255.0 any eq 110
hostname
class-map csc_outbound_class
hostname
match access-list csc_out
hostname
policy-map csc_out_policy
hostname
class csc_outbound_class
hostname(config-pmap-c)#
csc fail-close
hostname
service-policy csc_out_policy interface inside
hostname
access-list csc_in permit tcp any 192.168.20.0 255.255.255.0 eq 25
hostname
access-list csc_in permit tcp any 192.168.20.0 255.255.255.0 eq 80
hostname
class-map csc_inbound_class
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......