Download Print this page

Cisco ASA 5506-X Configuration Manual page 28

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

History for Service Policies
Figure 1-4
Mapped IP: 209.165.200.225
See the following commands for this example:
hostname(config)# object network obj-192.168.1.1
hostname(config-network-object)# host 192.168.1.1
hostname(config-network-object)# nat (VM1,outside) static 209.165.200.225
hostname(config)# access-list http_client extended permit tcp host 192.168.1.1 any eq 80
hostname(config)# class-map http_client
hostname(config-cmap)# match access-list http_client
hostname(config)# policy-map http_client
hostname(config-pmap)# class http_client
hostname(config-pmap-c)# inspect http
hostname(config)# service-policy http_client interface inside
History for Service Policies
Feature Name
Modular Policy Framework
Management class map for use with RADIUS
accounting traffic
Inspection policy maps
Regular expressions and policy maps
Match any for inspection policy maps
Cisco ASA Series Firewall CLI Configuration Guide
1-22
HTTP Inspection with NAT
insp.
Host
Real IP: 192.168.1.1
Releases
7.0(1)
7.2(1)
7.2(1)
7.2(1)
8.0(2)
Chapter 1
Security
appliance
port 80
inside
Description
Modular Policy Framework was introduced.
The management class map was introduced for use with
RADIUS accounting traffic. The following commands were
introduced: class-map type management, and inspect
radius-accounting.
The inspection policy map was introduced. The following
command was introduced: class-map type inspect.
Regular expressions and policy maps were introduced to be
used under inspection policy maps. The following
commands were introduced: class-map type regex, regex,
match regex.
The match any keyword was introduced for use with
inspection policy maps: traffic can match one or more
criteria to match the class map. Formerly, only match all
was available.
Service Policy Using the Modular Policy Framework
outside
Server
209.165.201.1

Hide quick links:

Advertisement

loading