14-7
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 14 Inspection for Voice and Video Protocols
H.323 Inspection
Where
class_map_name
is the name of the class map. The
match-all
keyword is the default, and
specifies that traffic must match all criteria to match the class map. The
match-any
keyword
specifies that the traffic matches the class map if it matches at least one of the criteria. The CLI
enters class-map configuration mode, where you can enter one or more
match
commands.
b.
(Optional) To add a description to the class map, enter the following command:
hostname(config-cmap)#
description
string
Where
string
is the description of the class map (up to 200 characters).
c.
Specify the traffic on which you want to perform actions using one of the following
match
commands. If you use a
match not
command, then any traffic that does not match the criterion in
the
match not
command has the action applied.
•
match
[
not
]
called-party regex
{
regex_name
|
class
class_name
}—Matches the called party
against the specified regular expression or regular expression class.
•
match
[
not
]
calling-party regex
{
regex_name
|
class
class_name
}—Matches the calling party
against the specified regular expression or regular expression class.
•
match
[
not
]
media-type
{
audio
|
data
|
video
}—Matches the media type.
Step 2
Create an H.323 inspection policy map:
hostname(config)#
policy-map type inspect h323
policy_map_name
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 3
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)#
description
string
Step 4
To apply actions to matching traffic, perform the following steps.
You can specify multiple
class
or
match
commands in the policy map. For information about the order
of
class
and
match
commands, see
How Multiple Traffic Classes are Handled, page 12-4
.
a.
Specify the traffic on which you want to perform actions using one of the following methods:
•
If you created an H.323 class map, specify it by entering the following command:
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
•
Specify traffic directly in the policy map using one of the
match
commands described for H.323
class maps. If you use a
match not
command, then any traffic that does not match the criterion
in the
match not
command has the action applied.
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {
drop
[
log
] |
drop-connection
|
reset
}
The
drop
keyword drops the packet. For media type matches, you can include the
log
keyword to
send a system log message.
The
drop-connection
keyword drops the packet and closes the connection. This option is available
for called or calling party matching.
The
reset
keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client. This option is available for called or calling party matching.
Step 5
To configure parameters that affect the inspection engine, perform the following steps:
a.
To enter parameters configuration mode, enter the following command:
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...