8-27
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 8 Inspection for Voice and Video Protocols
SIP Inspection
•
match
[
not
]
im-subscriber regex
{
regex_name
|
class
class_name
}—Matches the SIP IM
subscriber against the specified regular expression or regular expression class.
•
match
[
not
]
message-path regex
{
regex_name
|
class
class_name
}—Matches the SIP via
header against the specified regular expression or regular expression class.
•
match
[
not
]
request-method
method
—Matches a SIP request method: ack, bye, cancel, info,
invite, message, notify, options, prack, refer, register, subscribe, unknown, update.
•
match
[
not
]
third-party-registration regex
{
regex_name
|
class
class_name
}—Matches the
requester of a third-party registration against the specified regular expression or regular
expression class.
•
match
[
not
]
uri {sip | tel} length gt
bytes
—Matches a URI in the SIP headers of the selected
type (SIP or TEL) that is greater than the length specified, between 0 and 65536 bytes.
d.
Enter
exit
to leave class map configuration mode.
Step 2
Create a SIP inspection policy map, enter the following command:
hostname(config)#
policy-map type inspect sip
policy_map_name
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 3
(Optional) To add a description to the policy map, enter the following command:
hostname(config-pmap)#
description
string
Step 4
To apply actions to matching traffic, perform the following steps.
a.
Specify the traffic on which you want to perform actions using one of the following methods:
•
If you created a SIP class map, specify it by entering the following command:
hostname(config-pmap)#
class
class_map_name
hostname(config-pmap-c)#
•
Specify traffic directly in the policy map using one of the
match
commands described for SIP
class maps. If you use a
match not
command, then any traffic that does not match the criterion
in the
match not
command has the action applied.
b.
Specify the action you want to perform on the matching traffic by entering the following command:
hostname(config-pmap-c)# {[
drop
|
drop-connection
|
reset
] [
log
] |
rate-limit
message_rate
}
Not all options are available for each
match
or
class
command. See the CLI help or the command
reference for the exact options available.
The
drop
keyword drops all packets that match.
The
drop-connection
keyword drops the packet and closes the connection.
The
reset
keyword drops the packet, closes the connection, and sends a TCP reset to the server
and/or client.
The
log
keyword, which you can use alone or with one of the other keywords, sends a system log
message.
The
rate-limit
message_rate
argument limits the rate of messages. Rate limiting is available for
request method matches to “invite” and “register” only.
You can specify multiple
class
or
match
commands in the policy map. For information about the order
of
class
and
match
commands, see
Defining Actions in an Inspection Policy Map, page 2-4
.
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...