Cisco ASA 5505 Configuration Manual page 910

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

RSH Inspection
Fields
Modes
The following table shows the modes in which this feature is available:
Firewall Mode
Routed
RSH Inspection
RSH inspection is enabled by default. The RSH protocol uses a TCP connection from the RSH client to
the RSH server on TCP port 514. The client and server negotiate the TCP port number where the client
listens for the STDERR output stream. RSH inspection supports NAT of the negotiated port number if
necessary.
SNMP Inspection
This section describes the IM inspection engine. This section includes the following topics:
Cisco ASA 5500 Series Configuration Guide using ASDM
40-16
Name—Shows the name of the previously configured RADIUS accounting map.
Description—Enter the description of the RADIUS accounting map, up to 200 characters in length.
Other Parameters—Lets you configure additional parameters.
Send response to the originator of the RADIUS message—Sends a message back to the host
from which the RADIUS message was sent.
Enforce timeout—Enables the timeout for users.
Users Timeout—Timeout for the users in the database (hh:mm:ss).
Enable detection of GPRS accounting—Enables detection of GPRS accounting. This option is
only available when GTP/GPRS license is enabled.
Validate Attribute—Attribute information.
Attribute Number—Specify the attribute number to validate when an Accounting Start is
received.
Add—Adds the entry to the Attribute table.
Delete—Deletes the entry from the Attribute table.
Security Context
Transparent Single
SNMP Inspection Overview, page 40-17
"Select SNMP Map" section on page 40-17
"SNMP Inspect Map" section on page 40-17
Chapter 40
Configuring Inspection for Management Application Protocols
Multiple
Context
System
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents