25-23
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
DNS Inspection
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {[
drop
[
send-protocol-error
] |
drop-connection
[
send-protocol-error
]|
mask
|
reset
] [
log
] |
rate-limit
message_rate
}
Not all options are available for each
match
or
class
command. See the CLI help or the
Cisco
Security Appliance Command Reference
for the exact options available.
The
drop
keyword drops all packets that match.
The
send-protocol-error
keyword sends a protocol error message.
The
drop-connection
keyword drops the packet and closes the connection.
The
mask
keyword masks out the matching portion of the packet.
The
reset
keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
The
log
keyword, which you can use alone or with one of the other keywords, sends a system log
message.
The
rate-limit
message_rate
argument limits the rate of messages.
You can specify multiple
class
or
match
commands in the policy map. For information about the order
of
class
and
match
commands, see the
“Defining Actions in an Inspection Policy Map” section on
page 21-11
.
Step 7
To configure parameters that affect the inspection engine, perform the following steps:
a.
To enter parameters configuration mode, enter the following command:
hostname(config-pmap)#
parameters
hostname(config-pmap-p)#
b.
To randomize the DNS identifier for a DNS query, enter the following command:
hostname(config-pmap-p)#
id-randomization
c.
To enable logging for excessive DNS ID mismatches, enter the following command:
hostname(config-pmap-p)#
id-mismatch
[
count
number
duration
seconds
]
action log
Where the
count
string
argument specifies the maximum number of mismatch instances before a
system message log is sent. The
duration
seconds
specifies the period, in seconds, to monitor.
d.
To require a TSIG resource record to be present, enter the following command:
hostname(config-pmap-p)#
tsig enforced action
{
drop
[
log
] | [
log
}
Where the
count
string
argument specifies the maximum number of mismatch instances before a
system message log is sent. The
duration
seconds
specifies the period, in seconds, to monitor.
The following example shows a how to define a DNS inspection policy map.
hostname(config)# regex domain_example “example\.com”
hostname(config)# regex domain_foo “foo\.com”
hostname(config)# ! define the domain names that the server serves
hostname(config)# class-map type inspect regex match-any my_domains
hostname(config-cmap)# match regex domain_example
hostname(config-cmap)# match regex domain_foo
hostname(config)# ! Define a DNS map for query only
hostname(config)# class-map type inspect dns match-all pub_server_map
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......