2-5
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 2 Special Actions for Application Inspections (Inspection Policy Map)
Identifying Traffic in an Inspection Class Map
Examples
The following is an example of an HTTP inspection policy map and the related class maps. This policy
map is activated by the Layer 3/4 policy map, which is enabled by the service policy.
hostname(config)#
regex url_example example\.com
hostname(config)#
regex url_example2 example2\.com
hostname(config)#
class-map type regex match-any URLs
hostname(config-cmap)#
match
regex
url_example
hostname(config-cmap)#
match
regex
url_example2
hostname(config-cmap)#
class-map type inspect http match-all http-traffic
hostname(config-cmap)#
match req-resp content-type mismatch
hostname(config-cmap)#
match request body length gt 1000
hostname(config-cmap)#
match not request uri regex class URLs
hostname(config-cmap)#
policy-map type inspect http http-map1
hostname(config-pmap)#
class http-traffic
hostname(config-pmap-c)#
drop-connection log
hostname(config-pmap-c)#
match req-resp content-type mismatch
hostname(config-pmap-c)#
reset log
hostname(config-pmap-c)#
parameters
hostname(config-pmap-p)#
protocol-violation action log
hostname(config-pmap-p)#
policy-map test
hostname(config-pmap)#
class test
(a Layer 3/4 class map not shown)
hostname(config-pmap-c)#
inspect http http-map1
hostname(config-pmap-c)#
service-policy test interface outside
Identifying Traffic in an Inspection Class Map
This type of class map allows you to match criteria that is specific to an application. For example, for
DNS traffic, you can match the domain name in a DNS query.
A class map groups multiple traffic matches (in a match-all class map), or lets you match any of a list of
matches (in a match-any class map). The difference between creating a class map and defining the traffic
match directly in the inspection policy map is that the class map lets you group multiple match
commands, and you can reuse class maps. For the traffic that you identify in this class map, you can
specify actions such as dropping, resetting, and/or logging the connection in the inspection policy map.
If you want to perform different actions on different types of traffic, you should identify the traffic
directly in the policy map.
Restrictions
Not all applications support inspection class maps. See the CLI help for
class-map type inspect
for a
list of supported applications.
Содержание ASA 5512-X
Страница 5: ...P A R T 1 Service Policies and Access Control ...
Страница 6: ......
Страница 50: ...3 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 3 Access Rules History for Access Rules ...
Страница 51: ...P A R T 2 Network Address Translation ...
Страница 52: ......
Страница 126: ...5 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 5 NAT Examples and Reference DNS and NAT ...
Страница 127: ...P A R T 3 Application Inspection ...
Страница 128: ......
Страница 255: ...P A R T 4 Connection Settings and Quality of Service ...
Страница 256: ......
Страница 288: ...12 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 12 Quality of Service History for QoS ...
Страница 303: ...P A R T 5 Advanced Network Protection ...
Страница 304: ......
Страница 339: ...P A R T 6 ASA Modules ...
Страница 340: ......
Страница 398: ...17 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 ASA CX Module History for the ASA CX Module ...