8-33
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 8 Inspection for Voice and Video Protocols
Skinny (SCCP) Inspection
•
RTP conformance: Not enforced.
Also note that inspection of encrypted traffic is not enabled. You must configure a TLS proxy to inspect
encrypted traffic.
Configure SCCP (Skinny) Inspection
SCCP (Skinny) application inspection performs translation of embedded IP address and port numbers
within the packet data, and dynamic opening of pinholes. It also performs additional protocol
conformance checks and basic state tracking.
SCCP inspection is enabled by default. You need to configure it only if you want non-default processing,
or if you want to identify a TLS proxy to enable encrypted traffic inspection. If you want to customize
SCCP inspection, use the following process.
Procedure
Step 1
Configure a Skinny (SCCP) Inspection Policy Map for Additional Inspection Control, page 8-33
.
Step 2
Configure the SCCP Inspection Service Policy, page 8-34
.
Configure a Skinny (SCCP) Inspection Policy Map for Additional Inspection Control
To specify actions when a message violates a parameter, create an SCCP inspection policy map. You can
then apply the inspection policy map when you enable SCCP inspection.
Procedure
Step 1
Create an SCCP inspection policy map.
hostname(config)#
policy-map type inspect skinny
policy_map_name
hostname(config-pmap)#
Where the
policy_map_name
is the name of the policy map. The CLI enters policy-map configuration
mode.
Step 2
(Optional) Add a description to the policy map.
hostname(config-pmap)#
description
string
Step 3
(Optional) Drop traffic based on the station message ID field in SCCP messages.
a.
Identify the traffic based on the station message ID value in hexadecimal, from 0x0 to 0xffff. You
can either specify a single ID, or a range of IDs, using the
match
[
not
]
message-id
command. If you
use a
match not
command, then any traffic that does not match the criterion in the
match not
command has the action applied.
hostname(config-pmap)#
match message-id
value
hostname(config-pmap)#
match message-id range
start_value
end_value
Example:
hostname(config-pmap)# match message-id 0x181
hostname(config-pmap)# match message-id range 0x200 0xffff
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...