1-21
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 1 Service Policy Using the Modular Policy Framework
Examples for Service Policies (Modular Policy Framework)
Figure 1-3
HTTP Inspection and Connection Limits to Specific Servers
See the following commands for this example:
hostname(config)#
object network obj-192.168.1.2
hostname(config-network-object)#
host 192.168.1.2
hostname(config-network-object)#
nat (inside,outside) static 209.165.201.1
hostname(config)#
object network obj-192.168.1.0
hostname(config-network-object)#
subnet 192.168.1.0 255.255.255.0
hostname(config-network-object)#
nat (inside,outside) dynamic 209.165.201.2
hostname(config)#
access-list serverA extended permit tcp any host 209.165.201.1 eq 80
hostname(config)#
access-list ServerB extended permit tcp any host 209.165.200.227 eq 80
hostname(config)#
class-map http_serverA
hostname(config-cmap)#
match access-list serverA
hostname(config)#
class-map http_serverB
hostname(config-cmap)#
match access-list serverB
hostname(config)#
policy-map policy_serverA
hostname(config-pmap)#
class http_serverA
hostname(config-pmap-c)#
inspect http
hostname(config-pmap-c)#
set connection conn-max 100
hostname(config)#
policy-map policy_serverB
hostname(config-pmap)#
class http_serverB
hostname(config-pmap-c)#
inspect http
hostname(config)#
service-policy policy_serverB interface inside
hostname(config)#
service-policy policy_serverA interface outside
Applying Inspection to HTTP Traffic with NAT
In this example, the Host on the inside network has two addresses: one is the real IP address 192.168.1.1,
and the other is a mapped IP address used on the outside network, 209.165.200.225. You must use the
real IP address in the ACL in the class map. If you applied it to the outside interface, you would also use
the real address.
in
s
ide
o
u
t
s
ide
S
erver A
Re
a
l Addre
ss
: 192.16
8
.1.2
M
a
pped Addre
ss
: 209.165.201.1
Ho
s
t B
Re
a
l Addre
ss
: 192.16
8
.1.1
M
a
pped Addre
ss
: 209.165.201.2:
port
Ho
s
t A
209.165.200.226
S
erver B
209.165.200.227
port
8
0
port
8
0
in
s
p.
in
s
p.
s
et conn
s
14
33
57
S
ecurity
appliance
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...