25-26
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
FTP Inspection
hostname(config)# policy-map type inspect esmtp advanced_esmtp_map
hostname(config-pmap)# match sender-address regex class senders_black_list
hostname(config-pmap-c)# drop-connection log
hostname(config)# policy-map outside_policy
hostname(config-pmap)# class inspection_default
hostname(config-pmap-c)# inspect esmtp advanced_esmtp_map
hostname(config)# service-policy outside_policy interface outside
FTP Inspection
This section describes the FTP inspection engine. This section includes the following topics:
•
FTP Inspection Overview, page 25-26
•
Using the strict Option, page 25-26
•
Configuring an FTP Inspection Policy Map for Additional Inspection Control, page 25-27
•
Verifying and Monitoring FTP Inspection, page 25-31
FTP Inspection Overview
The FTP application inspection inspects the FTP sessions and performs four
tasks:
•
Prepares dynamic secondary data connection
•
Tracks the FTP command-response sequence
•
Generates an audit trail
•
Translates the embedded IP address
FTP application inspection prepares secondary channels for FTP data transfer. Ports for these channels
are negotiated through PORT or PASV commands. The channels are allocated in response to a file
upload, a file download, or a directory listing event.
Note
If you disable FTP inspection engines with the
no inspect ftp
command, outbound users can start
connections only in passive mode, and all inbound FTP is disabled.
Using the strict Option
Using the
strict
option with the
inspect ftp
command increases the security of protected networks by
preventing web browsers from sending embedded commands in FTP requests.
Note
To specify FTP commands that are not permitted to pass through the security appliance, create an FTP
map according to the
“Configuring an FTP Inspection Policy Map for Additional Inspection Control”
section on page 25-27
.
After you enable the
strict
option on an interface, FTP inspection enforces the following behavior:
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......