25-47
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 25 Configuring Application Layer Protocol Inspection
HTTP Inspection
Where the
field
is the predefined message header keyword. The
regex
regex_name
argument is the
regular expression you created in
Step 1
. The
class
regex_class_name
is the regular expression class
map you created in
Step 2
. The
length gt
max_bytes
is the maximum message body length in bytes.
The
count gt
max_count
is the maximum number of header fields.
k.
(Optional) To match text found in the HTTP response message status line, enter the following
command:
hostname(config-cmap)#
match
[
not
]
response status-line
{
regex
[
regex_name
|
class
regex_class_name
]}
Where the
regex
regex_name
argument is the regular expression you created in
Step 1
. The
class
regex_class_name
is the regular expression class map you created in
Step 2
.
Step 4
Create an HTTP inspection policy map, enter the following command:
hostname(config)#
policy-map type inspect http
policy_map_name
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 5
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)#
description
string
Step 6
To apply actions to matching traffic, perform the following steps.
a.
Specify the traffic on which you want to perform actions using one of the following methods:
•
Specify the HTTP class map that you created in
Step 3
by entering the following command:
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
•
Specify traffic directly in the policy map using one of the
match
commands described in
Step 3
.
If you use a
match not
command, then any traffic that does not match the criterion in the
match
not
command has the action applied.
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {[
drop
[
send-protocol-error
] |
drop-connection
[
send-protocol-error
]|
mask
|
reset
] [
log
] |
rate-limit
message_rate
}
Not all options are available for each
match
or
class
command. See the CLI help or the
Cisco
Security Appliance Command Reference
for the exact options available.
The
drop
keyword drops all packets that match.
The
send-protocol-error
keyword sends a protocol error message.
The
drop-connection
keyword drops the packet and closes the connection.
The
mask
keyword masks out the matching portion of the packet.
The
reset
keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
The
log
keyword, which you can use alone or with one of the other keywords, sends a system log
message.
The
rate-limit
message_rate
argument limits the rate of messages.
You can specify multiple
class
or
match
commands in the policy map. For information about the order
of
class
and
match
commands, see the
“Defining Actions in an Inspection Policy Map” section on
page 21-11
.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......