7-19
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 7 Inspection of Basic Internet Protocols
HTTP Inspection
•
protocol-violation action
{
drop-connection
[
log
] |
reset
[
log
] |
log
}—Sets the maximum
number of characters in the body of an HTTP message that should be searched in a body match.
The default is 200 bytes. A large number will have a significant impact on
performance.xxxChecks for HTTP protocol violations. You must also choose the action to take
for violations (drop connection, reset, or log) and whether to enable or disable logging.
•
spoof-server
string
—Substitutes a string for the server header field, WebVPN streams are not
subject to the
spoof-server
command.
Example
The following example shows how to define an HTTP inspection policy map that will allow and log any
HTTP connection that attempts to access “www\.xyz.com/.*\.asp" or "www\.xyz[0-9][0-9]\.com" with
methods "GET" or "PUT." All other URL/Method combinations will be silently allowed.
hostname(config)#
regex url1 “www\.xyz.com/.*\.asp”
hostname(config)#
regex url2 “www\.xyz[0-9][0-9]\.com”
hostname(config)#
regex get “GET”
hostname(config)#
regex put “PUT”
hostname(config)#
class-map type regex match-any url_to_log
hostname(config-cmap)#
match regex url1
hostname(config-cmap)#
match regex url2
hostname(config-cmap)#
exit
hostname(config)#
class-map type regex match-any methods_to_log
hostname(config-cmap)#
match regex get
hostname(config-cmap)#
match regex put
hostname(config-cmap)#
exit
hostname(config)#
class-map type inspect http http_url_policy
hostname(config-cmap)#
match request uri regex class url_to_log
hostname(config-cmap)#
match request method regex class methods_to_log
hostname(config-cmap)#
exit
hostname(config)#
policy-map type inspect http http_policy
hostname(config-pmap)#
class http_url_policy
hostname(config-pmap-c)#
log
Configure the HTTP Inspection Service Policy
HTTP inspection is not enabled in the default inspection policy, so you must enable it if you need this
inspection. However, the default inspect class does include the default HTTP ports, so you can simply
edit the default global inspection policy to add HTTP inspection. You can alternatively create a new
service policy as desired, for example, an interface-specific policy.
Procedure
Step 1
If necessary, create an L3/L4 class map to identify the traffic for which you want to apply the inspection.
class-map
name
match
parameter
Example:
hostname(config)# class-map http_class_map
hostname(config-cmap)# match access-list http
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...