Default Inspection Policy Maps; Configure Application Layer Protocol Inspection - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 12
Getting Started with Application Layer Protocol Inspection
Table 12-1
Supported Application Inspection Engines (continued)
Application
Default Port NAT Limitations
XDMCP
UDP/177
VXLAN
UDP/4789
The default policy configuration includes the following commands:
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225 _default_h323_map
inspect h323 ras _default_h323_map
inspect ip-options _default_ip_options_map
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp _default_esmtp_map
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp

Default Inspection Policy Maps

Some inspection types use hidden default policy maps. For example, if you enable ESMTP inspection
without specifying a map, _default_esmtp_map is used.
The default inspection is described in the sections that explain each inspection type. You can view these
default maps using the show running-config all policy-map command.
DNS inspection is the only one that uses an explicitly-configured default map, preset_dns_map.

Configure Application Layer Protocol Inspection

You configure application inspection in service policies. Service policies provide a consistent and
flexible way to configure ASA features. For example, you can use a service policy to create a timeout
configuration that is specific to a particular TCP application, as opposed to one that applies to all TCP
applications. For some applications, you can perform special actions when you enable inspection. See
No extended PAT.
No NAT64.
(Clustering) No static PAT.
Not applicable
message-length maximum client auto
message-length maximum 512
dns-guard
protocol-enforcement
nat-rewrite
Configure Application Layer Protocol Inspection
Standards
Comments
RFC 7348
Virtual Extensible Local Area Network.
Cisco ASA Series Firewall CLI Configuration Guide
12-9

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents