15-7
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 15 Inspection of Database, Directory, and Management Protocols
GTP Inspection
Configure a GTP Inspection Policy Map
If you want to enforce additional parameters on GTP traffic, and the default map does not meet your
needs, create and configure a GTP map.
Before You Begin
Some traffic matching options use regular expressions for matching purposes. If you intend to use one
of those techniques, first create the regular expression or regular expression class map.
Procedure
Step 1
Create a GTP inspection policy map:
hostname(config)#
policy-map type inspect gtp
policy_map_name
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 2
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)#
description
string
Step 3
To apply actions to matching traffic, perform the following steps.
a.
Specify the traffic on which you want to perform actions using one of the following
match
commands. If you use a
match not
command, then any traffic that does not match the criterion in
the
match not
command has the action applied.
•
match
[
not
]
apn regex
{
regex_name
|
class
class_name
}—Matches the access point name
(APN) against the specified regular expression or regular expression class.
•
match
[
not
]
message id
{
message_id
|
range
message_id_1 message_id_2
}—Matches the
message ID, which can be 1 to 255. You can specify a single ID or a range of IDs.
•
match
[
not
]
message
length
min
bytes
max
bytes
—Matches messages where the length of the
UDP payload (GTP header plus the rest of the message) is between the minimum and maximum
values, from 1 to 65536.
•
match
[
not
]
version
{
version_id
|
range
version_id_1 version_id_2
}—Matches the GTP
version, which can be 0 to 255. You can specify a single version or a range of versions.
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {
drop
[
log
]|
log
|
rate-limit
message_rate
}
Not all options are available for each
match
command.
•
The
drop
keyword drops the packet.
•
The
log
keyword, which you can use alone or with
drop
, sends a system log message.
•
The
rate-limit
message_rate
argument limits the rate of messages. This option is available with
message id
only.
You can specify multiple
match
commands in the policy map. For information about the order of
match
commands, see
How Multiple Traffic Classes are Handled, page 12-4
Step 4
To configure parameters that affect the inspection engine, perform the following steps:
a.
To enter parameters configuration mode, enter the following command:
hostname(config-pmap)#
parameters
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...